From 23ff0a700882240404940fed28797293bb5341e6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 10 Oct 2024 14:03:23 +0000 Subject: [PATCH] Auto-Update: 2024-10-10T14:00:21.253206+00:00 --- CVE-2022/CVE-2022-45xx/CVE-2022-4534.json | 8 +- CVE-2023/CVE-2023-363xx/CVE-2023-36325.json | 8 +- CVE-2023/CVE-2023-371xx/CVE-2023-37154.json | 4 +- CVE-2023/CVE-2023-453xx/CVE-2023-45359.json | 4 +- CVE-2023/CVE-2023-453xx/CVE-2023-45361.json | 4 +- CVE-2023/CVE-2023-458xx/CVE-2023-45872.json | 8 +- CVE-2023/CVE-2023-465xx/CVE-2023-46586.json | 4 +- CVE-2023/CVE-2023-466xx/CVE-2023-46615.json | 47 +- CVE-2023/CVE-2023-513xx/CVE-2023-51370.json | 47 +- CVE-2023/CVE-2023-529xx/CVE-2023-52952.json | 8 +- CVE-2024/CVE-2024-14xx/CVE-2024-1439.json | 59 +- CVE-2024/CVE-2024-206xx/CVE-2024-20659.json | 8 +- CVE-2024/CVE-2024-207xx/CVE-2024-20787.json | 8 +- CVE-2024/CVE-2024-214xx/CVE-2024-21490.json | 23 +- CVE-2024/CVE-2024-215xx/CVE-2024-21532.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21533.json | 4 +- CVE-2024/CVE-2024-220xx/CVE-2024-22068.json | 4 +- CVE-2024/CVE-2024-224xx/CVE-2024-22442.json | 22 +- CVE-2024/CVE-2024-248xx/CVE-2024-24875.json | 47 +- CVE-2024/CVE-2024-248xx/CVE-2024-24884.json | 47 +- CVE-2024/CVE-2024-252xx/CVE-2024-25282.json | 4 +- CVE-2024/CVE-2024-252xx/CVE-2024-25283.json | 4 +- CVE-2024/CVE-2024-252xx/CVE-2024-25284.json | 4 +- CVE-2024/CVE-2024-252xx/CVE-2024-25285.json | 4 +- CVE-2024/CVE-2024-252xx/CVE-2024-25286.json | 4 +- CVE-2024/CVE-2024-257xx/CVE-2024-25705.json | 8 +- CVE-2024/CVE-2024-257xx/CVE-2024-25706.json | 8 +- CVE-2024/CVE-2024-257xx/CVE-2024-25709.json | 8 +- CVE-2024/CVE-2024-258xx/CVE-2024-25825.json | 8 +- CVE-2024/CVE-2024-258xx/CVE-2024-25885.json | 4 +- CVE-2024/CVE-2024-265xx/CVE-2024-26596.json | 8 +- CVE-2024/CVE-2024-267xx/CVE-2024-26785.json | 6 +- CVE-2024/CVE-2024-268xx/CVE-2024-26836.json | 6 +- CVE-2024/CVE-2024-268xx/CVE-2024-26876.json | 6 +- CVE-2024/CVE-2024-269xx/CVE-2024-26972.json | 6 +- CVE-2024/CVE-2024-270xx/CVE-2024-27011.json | 6 +- CVE-2024/CVE-2024-270xx/CVE-2024-27012.json | 8 +- CVE-2024/CVE-2024-270xx/CVE-2024-27072.json | 6 +- CVE-2024/CVE-2024-274xx/CVE-2024-27457.json | 8 +- CVE-2024/CVE-2024-278xx/CVE-2024-27861.json | 16 +- CVE-2024/CVE-2024-281xx/CVE-2024-28168.json | 8 +- CVE-2024/CVE-2024-291xx/CVE-2024-29176.json | 89 +- CVE-2024/CVE-2024-300xx/CVE-2024-30092.json | 8 +- CVE-2024/CVE-2024-301xx/CVE-2024-30118.json | 8 +- CVE-2024/CVE-2024-30xx/CVE-2024-3057.json | 8 +- CVE-2024/CVE-2024-312xx/CVE-2024-31227.json | 8 +- CVE-2024/CVE-2024-312xx/CVE-2024-31228.json | 8 +- CVE-2024/CVE-2024-314xx/CVE-2024-31449.json | 8 +- CVE-2024/CVE-2024-326xx/CVE-2024-32608.json | 8 +- CVE-2024/CVE-2024-335xx/CVE-2024-33506.json | 8 +- CVE-2024/CVE-2024-338xx/CVE-2024-33897.json | 41 +- CVE-2024/CVE-2024-346xx/CVE-2024-34662.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34663.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34664.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34665.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34666.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34667.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34668.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34669.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34670.json | 8 +- CVE-2024/CVE-2024-346xx/CVE-2024-34671.json | 10 +- CVE-2024/CVE-2024-346xx/CVE-2024-34672.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35202.json | 37 + CVE-2024/CVE-2024-352xx/CVE-2024-35215.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35288.json | 4 +- CVE-2024/CVE-2024-359xx/CVE-2024-35963.json | 6 +- CVE-2024/CVE-2024-359xx/CVE-2024-35964.json | 6 +- CVE-2024/CVE-2024-359xx/CVE-2024-35965.json | 6 +- CVE-2024/CVE-2024-35xx/CVE-2024-3506.json | 8 +- CVE-2024/CVE-2024-360xx/CVE-2024-36051.json | 25 + CVE-2024/CVE-2024-364xx/CVE-2024-36478.json | 8 +- CVE-2024/CVE-2024-368xx/CVE-2024-36814.json | 4 +- CVE-2024/CVE-2024-369xx/CVE-2024-36917.json | 10 +- CVE-2024/CVE-2024-369xx/CVE-2024-36936.json | 6 +- CVE-2024/CVE-2024-369xx/CVE-2024-36996.json | 7 +- CVE-2024/CVE-2024-36xx/CVE-2024-3656.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37179.json | 8 +- CVE-2024/CVE-2024-375xx/CVE-2024-37547.json | 14 +- CVE-2024/CVE-2024-379xx/CVE-2024-37976.json | 8 +- CVE-2024/CVE-2024-379xx/CVE-2024-37979.json | 8 +- CVE-2024/CVE-2024-379xx/CVE-2024-37982.json | 8 +- CVE-2024/CVE-2024-379xx/CVE-2024-37983.json | 8 +- CVE-2024/CVE-2024-380xx/CVE-2024-38029.json | 8 +- CVE-2024/CVE-2024-380xx/CVE-2024-38085.json | 21 +- CVE-2024/CVE-2024-380xx/CVE-2024-38097.json | 8 +- CVE-2024/CVE-2024-381xx/CVE-2024-38124.json | 8 +- CVE-2024/CVE-2024-381xx/CVE-2024-38129.json | 8 +- CVE-2024/CVE-2024-381xx/CVE-2024-38149.json | 8 +- CVE-2024/CVE-2024-381xx/CVE-2024-38179.json | 8 +- CVE-2024/CVE-2024-382xx/CVE-2024-38212.json | 8 +- CVE-2024/CVE-2024-382xx/CVE-2024-38229.json | 8 +- CVE-2024/CVE-2024-382xx/CVE-2024-38261.json | 8 +- CVE-2024/CVE-2024-382xx/CVE-2024-38262.json | 8 +- CVE-2024/CVE-2024-382xx/CVE-2024-38265.json | 8 +- CVE-2024/CVE-2024-385xx/CVE-2024-38594.json | 6 +- CVE-2024/CVE-2024-388xx/CVE-2024-38815.json | 8 +- CVE-2024/CVE-2024-388xx/CVE-2024-38817.json | 4 +- CVE-2024/CVE-2024-388xx/CVE-2024-38818.json | 8 +- CVE-2024/CVE-2024-392xx/CVE-2024-39210.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39436.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39437.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39438.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39439.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39440.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39515.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39516.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39525.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39586.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39806.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39831.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40334.json | 8 +- CVE-2024/CVE-2024-411xx/CVE-2024-41123.json | 15 +- CVE-2024/CVE-2024-416xx/CVE-2024-41685.json | 8 +- CVE-2024/CVE-2024-417xx/CVE-2024-41798.json | 8 +- CVE-2024/CVE-2024-419xx/CVE-2024-41902.json | 8 +- CVE-2024/CVE-2024-419xx/CVE-2024-41981.json | 8 +- CVE-2024/CVE-2024-428xx/CVE-2024-42831.json | 8 +- CVE-2024/CVE-2024-429xx/CVE-2024-42934.json | 8 +- CVE-2024/CVE-2024-429xx/CVE-2024-42988.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43362.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43363.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43364.json | 8 +- CVE-2024/CVE-2024-433xx/CVE-2024-43365.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43453.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43456.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43468.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43480.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43481.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43483.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43484.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43485.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43488.json | 8 +- CVE-2024/CVE-2024-434xx/CVE-2024-43497.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43500.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43501.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43502.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43503.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43504.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43505.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43506.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43508.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43509.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43511.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43512.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43513.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43514.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43515.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43516.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43517.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43518.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43519.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43520.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43521.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43522.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43523.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43524.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43525.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43526.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43527.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43528.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43529.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43532.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43533.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43534.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43535.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43536.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43537.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43538.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43540.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43541.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43542.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43543.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43544.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43545.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43546.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43547.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43549.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43550.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43551.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43552.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43553.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43554.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43555.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43556.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43557.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43558.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43559.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43560.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43561.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43562.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43563.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43564.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43565.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43567.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43570.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43571.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43574.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43575.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43576.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43581.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43582.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43583.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43584.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43585.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43589.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43590.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43591.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43592.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43593.json | 8 +- CVE-2024/CVE-2024-435xx/CVE-2024-43599.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43601.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43603.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43604.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43607.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43608.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43609.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43610.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43611.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43612.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43614.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43615.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43616.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43696.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43697.json | 8 +- CVE-2024/CVE-2024-437xx/CVE-2024-43789.json | 8 +- CVE-2024/CVE-2024-438xx/CVE-2024-43895.json | 8 +- CVE-2024/CVE-2024-439xx/CVE-2024-43918.json | 8 +- CVE-2024/CVE-2024-439xx/CVE-2024-43939.json | 4 +- CVE-2024/CVE-2024-439xx/CVE-2024-43940.json | 4 +- CVE-2024/CVE-2024-440xx/CVE-2024-44068.json | 8 +- CVE-2024/CVE-2024-443xx/CVE-2024-44349.json | 12 +- CVE-2024/CVE-2024-446xx/CVE-2024-44674.json | 8 +- CVE-2024/CVE-2024-450xx/CVE-2024-45051.json | 8 +- CVE-2024/CVE-2024-450xx/CVE-2024-45060.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45115.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45116.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45117.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45118.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45119.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45120.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45121.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45122.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45123.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45124.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45125.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45127.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45128.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45129.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45130.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45131.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45132.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45133.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45134.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45135.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45136.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45137.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45138.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45139.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45140.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45141.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45142.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45143.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45144.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45145.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45146.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45148.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45149.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45150.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45152.json | 8 +- CVE-2024/CVE-2024-451xx/CVE-2024-45160.json | 4 +- CVE-2024/CVE-2024-451xx/CVE-2024-45179.json | 4 +- CVE-2024/CVE-2024-452xx/CVE-2024-45230.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45231.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45277.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45278.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45282.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45290.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45291.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45292.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45293.json | 8 +- CVE-2024/CVE-2024-452xx/CVE-2024-45297.json | 8 +- CVE-2024/CVE-2024-453xx/CVE-2024-45330.json | 8 +- CVE-2024/CVE-2024-453xx/CVE-2024-45382.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45463.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45464.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45465.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45466.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45467.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45468.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45469.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45470.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45471.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45472.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45473.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45474.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45475.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45476.json | 8 +- CVE-2024/CVE-2024-457xx/CVE-2024-45720.json | 8 +- CVE-2024/CVE-2024-457xx/CVE-2024-45746.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45873.json | 4 +- CVE-2024/CVE-2024-458xx/CVE-2024-45874.json | 4 +- CVE-2024/CVE-2024-458xx/CVE-2024-45880.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45894.json | 8 +- CVE-2024/CVE-2024-459xx/CVE-2024-45918.json | 8 +- CVE-2024/CVE-2024-459xx/CVE-2024-45919.json | 4 +- CVE-2024/CVE-2024-460xx/CVE-2024-46076.json | 8 +- CVE-2024/CVE-2024-462xx/CVE-2024-46237.json | 8 +- CVE-2024/CVE-2024-462xx/CVE-2024-46292.json | 8 +- CVE-2024/CVE-2024-463xx/CVE-2024-46304.json | 8 +- CVE-2024/CVE-2024-463xx/CVE-2024-46307.json | 8 +- CVE-2024/CVE-2024-463xx/CVE-2024-46316.json | 8 +- CVE-2024/CVE-2024-464xx/CVE-2024-46410.json | 4 +- CVE-2024/CVE-2024-465xx/CVE-2024-46539.json | 8 +- CVE-2024/CVE-2024-465xx/CVE-2024-46590.json | 6 +- CVE-2024/CVE-2024-468xx/CVE-2024-46870.json | 8 +- CVE-2024/CVE-2024-468xx/CVE-2024-46871.json | 8 +- CVE-2024/CVE-2024-468xx/CVE-2024-46886.json | 8 +- CVE-2024/CVE-2024-468xx/CVE-2024-46887.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47007.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47008.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47009.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47010.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47011.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47046.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47079.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47095.json | 8 +- CVE-2024/CVE-2024-471xx/CVE-2024-47161.json | 8 +- CVE-2024/CVE-2024-471xx/CVE-2024-47191.json | 4 +- CVE-2024/CVE-2024-471xx/CVE-2024-47194.json | 8 +- CVE-2024/CVE-2024-471xx/CVE-2024-47195.json | 8 +- CVE-2024/CVE-2024-471xx/CVE-2024-47196.json | 8 +- CVE-2024/CVE-2024-473xx/CVE-2024-47334.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47410.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47411.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47412.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47413.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47414.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47415.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47416.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47417.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47418.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47419.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47420.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47421.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47422.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47423.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47424.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47425.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47553.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47555.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47556.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47557.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47558.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47559.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47562.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47563.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47565.json | 8 +- CVE-2024/CVE-2024-475xx/CVE-2024-47594.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47610.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47658.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47659.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47660.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47661.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47662.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47663.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47664.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47665.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47666.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47667.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47668.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47669.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47670.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47671.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47672.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47673.json | 8 +- CVE-2024/CVE-2024-477xx/CVE-2024-47763.json | 8 +- CVE-2024/CVE-2024-477xx/CVE-2024-47772.json | 8 +- CVE-2024/CVE-2024-477xx/CVE-2024-47773.json | 8 +- CVE-2024/CVE-2024-477xx/CVE-2024-47780.json | 8 +- CVE-2024/CVE-2024-477xx/CVE-2024-47781.json | 8 +- CVE-2024/CVE-2024-477xx/CVE-2024-47782.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47812.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47813.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47814.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47815.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47816.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47817.json | 4 +- CVE-2024/CVE-2024-478xx/CVE-2024-47818.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47822.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47823.json | 4 +- CVE-2024/CVE-2024-478xx/CVE-2024-47828.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47832.json | 8 +- CVE-2024/CVE-2024-478xx/CVE-2024-47833.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47948.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47949.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47950.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47951.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47967.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47968.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47969.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47971.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47972.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47973.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47974.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47975.json | 8 +- CVE-2024/CVE-2024-479xx/CVE-2024-47976.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48902.json | 4 +- CVE-2024/CVE-2024-489xx/CVE-2024-48933.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48941.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48942.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48949.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48957.json | 8 +- CVE-2024/CVE-2024-489xx/CVE-2024-48958.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5968.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6157.json | 56 + CVE-2024/CVE-2024-65xx/CVE-2024-6530.json | 60 ++ CVE-2024/CVE-2024-67xx/CVE-2024-6747.json | 8 +- CVE-2024/CVE-2024-70xx/CVE-2024-7037.json | 8 +- CVE-2024/CVE-2024-70xx/CVE-2024-7038.json | 8 +- CVE-2024/CVE-2024-70xx/CVE-2024-7041.json | 8 +- CVE-2024/CVE-2024-70xx/CVE-2024-7048.json | 8 +- CVE-2024/CVE-2024-70xx/CVE-2024-7049.json | 8 +- CVE-2024/CVE-2024-72xx/CVE-2024-7206.json | 8 +- CVE-2024/CVE-2024-72xx/CVE-2024-7292.json | 8 +- CVE-2024/CVE-2024-72xx/CVE-2024-7293.json | 8 +- CVE-2024/CVE-2024-72xx/CVE-2024-7294.json | 8 +- CVE-2024/CVE-2024-76xx/CVE-2024-7612.json | 8 +- CVE-2024/CVE-2024-78xx/CVE-2024-7840.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7963.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8014.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8015.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8048.json | 8 +- CVE-2024/CVE-2024-82xx/CVE-2024-8215.json | 8 +- CVE-2024/CVE-2024-82xx/CVE-2024-8264.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8422.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8431.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8433.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8477.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8482.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8488.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8513.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8518.json | 8 +- CVE-2024/CVE-2024-86xx/CVE-2024-8626.json | 8 +- CVE-2024/CVE-2024-86xx/CVE-2024-8629.json | 8 +- CVE-2024/CVE-2024-87xx/CVE-2024-8729.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8884.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8911.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8925.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8926.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8927.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8943.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8964.json | 8 +- CVE-2024/CVE-2024-89xx/CVE-2024-8977.json | 4 +- CVE-2024/CVE-2024-89xx/CVE-2024-8983.json | 4 +- CVE-2024/CVE-2024-89xx/CVE-2024-8987.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9005.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9021.json | 4 +- CVE-2024/CVE-2024-90xx/CVE-2024-9022.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9026.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9057.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9064.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9065.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9066.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9067.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9072.json | 8 +- CVE-2024/CVE-2024-90xx/CVE-2024-9074.json | 8 +- CVE-2024/CVE-2024-91xx/CVE-2024-9124.json | 8 +- CVE-2024/CVE-2024-91xx/CVE-2024-9156.json | 8 +- CVE-2024/CVE-2024-91xx/CVE-2024-9167.json | 8 +- CVE-2024/CVE-2024-92xx/CVE-2024-9201.json | 4 +- CVE-2024/CVE-2024-92xx/CVE-2024-9205.json | 8 +- CVE-2024/CVE-2024-92xx/CVE-2024-9207.json | 4 +- CVE-2024/CVE-2024-92xx/CVE-2024-9286.json | 8 +- CVE-2024/CVE-2024-92xx/CVE-2024-9292.json | 8 +- CVE-2024/CVE-2024-93xx/CVE-2024-9377.json | 8 +- CVE-2024/CVE-2024-93xx/CVE-2024-9379.json | 4 +- CVE-2024/CVE-2024-93xx/CVE-2024-9380.json | 4 +- CVE-2024/CVE-2024-93xx/CVE-2024-9381.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9412.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9449.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9451.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9457.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9463.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9464.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9465.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9466.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9467.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9468.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9469.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9470.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9471.json | 8 +- CVE-2024/CVE-2024-94xx/CVE-2024-9473.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9518.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9519.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9520.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9522.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9549.json | 16 +- CVE-2024/CVE-2024-95xx/CVE-2024-9575.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9581.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9596.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9602.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9603.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9620.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9621.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9622.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9623.json | 4 +- CVE-2024/CVE-2024-96xx/CVE-2024-9671.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9675.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9680.json | 8 +- CVE-2024/CVE-2024-96xx/CVE-2024-9685.json | 8 +- CVE-2024/CVE-2024-97xx/CVE-2024-9780.json | 8 +- CVE-2024/CVE-2024-97xx/CVE-2024-9781.json | 8 +- CVE-2024/CVE-2024-97xx/CVE-2024-9782.json | 141 +++ CVE-2024/CVE-2024-97xx/CVE-2024-9783.json | 141 +++ CVE-2024/CVE-2024-97xx/CVE-2024-9784.json | 141 +++ CVE-2024/CVE-2024-97xx/CVE-2024-9785.json | 141 +++ CVE-2024/CVE-2024-97xx/CVE-2024-9786.json | 141 +++ CVE-2024/CVE-2024-97xx/CVE-2024-9796.json | 8 +- CVE-2024/CVE-2024-97xx/CVE-2024-9798.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9802.json | 8 +- README.md | 73 +- _state.csv | 1037 ++++++++++--------- 522 files changed, 4603 insertions(+), 1613 deletions(-) create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35202.json create mode 100644 CVE-2024/CVE-2024-360xx/CVE-2024-36051.json create mode 100644 CVE-2024/CVE-2024-61xx/CVE-2024-6157.json create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6530.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9782.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9783.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9784.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9785.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9786.json diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4534.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4534.json index eb72ac31f8b..9ddc8325b43 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4534.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4534.json @@ -2,13 +2,17 @@ "id": "CVE-2022-4534", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:07.773", - "lastModified": "2024-10-08T09:15:07.773", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Limit Login Attempts (Spam Protection) plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.3. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in." + }, + { + "lang": "es", + "value": "El complemento Limit Login Attempts (Spam Protection) para WordPress es vulnerable a la suplantaci\u00f3n de direcciones IP en versiones hasta la 5.3 incluida. Esto se debe a restricciones insuficientes sobre d\u00f3nde se recupera la informaci\u00f3n de la direcci\u00f3n IP para el registro de solicitudes y las restricciones de inicio de sesi\u00f3n. Los atacantes pueden proporcionar el encabezado X-Forwarded-For con una direcci\u00f3n IP diferente que se registrar\u00e1 y se puede usar para eludir configuraciones que pueden haber bloqueado el inicio de sesi\u00f3n de una direcci\u00f3n IP o un pa\u00eds." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json index 762970a54c2..85379f4f65b 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json @@ -2,13 +2,17 @@ "id": "CVE-2023-36325", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:11.303", - "lastModified": "2024-10-09T06:15:11.303", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "i2p before 2.3.0 (Java) allows de-anonymizing the public IPv4 and IPv6 addresses of i2p hidden services (aka eepsites) via a correlation attack across the IPv4 and IPv6 addresses that occurs when a tunneled, replayed message has a behavior discrepancy (it may be dropped, or may result in a Wrong Destination response). An attack would take days to complete." + }, + { + "lang": "es", + "value": "i2p anterior a la versi\u00f3n 2.3.0 (Java) permite desanonimizar las direcciones IPv4 e IPv6 p\u00fablicas de los servicios ocultos de i2p (tambi\u00e9n conocidos como eepsites) mediante un ataque de correlaci\u00f3n entre las direcciones IPv4 e IPv6 que se produce cuando un mensaje tunelizado y reproducido tiene una discrepancia de comportamiento (puede descartarse o puede dar como resultado una respuesta de destino incorrecto). Un ataque tardar\u00eda d\u00edas en completarse." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37154.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37154.json index b0431796b0b..6a46741a8d0 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37154.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37154.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37154", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:12.943", - "lastModified": "2024-10-09T22:35:00.577", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45359.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45359.json index 65bfc808a91..8ff8c7c3862 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45359.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45359.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45359", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:13.097", - "lastModified": "2024-10-09T22:35:01.493", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45361.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45361.json index 19851957b83..05c4b7288b8 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45361.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45361.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45361", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:13.203", - "lastModified": "2024-10-09T14:35:07.353", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45872.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45872.json index 02a24944f99..26bd09da7aa 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45872.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45872.json @@ -2,13 +2,17 @@ "id": "CVE-2023-45872", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:13.323", - "lastModified": "2024-10-09T06:15:13.323", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Qt before 6.2.11 and 6.3.x through 6.6.x before 6.6.1. When a QML image refers to an image whose content is not known yet, there is an assumption that it is an SVG document, leading to a denial of service (application crash) if it is not actually an SVG document." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Qt anterior a la versi\u00f3n 6.2.11 y en las versiones 6.3.x a 6.6.x anteriores a la versi\u00f3n 6.6.1. Cuando una imagen QML hace referencia a una imagen cuyo contenido a\u00fan no se conoce, se supone que se trata de un documento SVG, lo que genera una denegaci\u00f3n de servicio (falla de la aplicaci\u00f3n) si en realidad no es un documento SVG." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46586.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46586.json index 52143c56417..43e42780166 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46586.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46586", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:13.447", - "lastModified": "2024-10-09T14:35:07.683", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46615.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46615.json index ad327fdfeb1..0dd05ea69fb 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46615.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46615.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46615", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:11.717", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T13:24:23.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kallidan:kd_coming_soon:*:*:*:*:wordpress:*:*:*", + "versionEndIncluding": "1.7", + "matchCriteriaId": "6D1BD50B-D0AD-43D3-8AF2-46BFB0626631" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/kd-coming-soon/wordpress-kd-coming-soon-plugin-1-7-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json index 7ad66695e3a..c2af5033121 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51370.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51370", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T07:15:09.637", - "lastModified": "2024-02-12T14:20:03.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:46:36.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:wp_chat_app:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.4.4", + "matchCriteriaId": "F5EBB0C7-3801-4AE1-9B1D-867AD89D838E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-whatsapp/wordpress-wp-chat-app-plugin-3-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52952.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52952.json index 319d5eb45a4..a6c13744702 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52952.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52952.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52952", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:10.097", - "lastModified": "2024-10-08T09:15:10.097", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in HiMed Cockpit 12 pro (J31032-K2017-H259) (All versions >= V11.5.1 < V11.6.2), HiMed Cockpit 14 pro+ (J31032-K2017-H435) (All versions >= V11.5.1 < V11.6.2), HiMed Cockpit 18 pro (J31032-K2017-H260) (All versions >= V11.5.1 < V11.6.2), HiMed Cockpit 18 pro+ (J31032-K2017-H436) (All versions >= V11.5.1 < V11.6.2). The Kiosk Mode of the affected devices contains a restricted desktop environment escape vulnerability. This could allow an unauthenticated local attacker to escape the restricted environment and gain access to the underlying operating system." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en HiMed Cockpit 12 pro (J31032-K2017-H259) (todas las versiones >= V11.5.1 < V11.6.2), HiMed Cockpit 14 pro+ (J31032-K2017-H435) (todas las versiones >= V11.5.1 < V11.6.2), HiMed Cockpit 18 pro (J31032-K2017-H260) (todas las versiones >= V11.5.1 < V11.6.2), HiMed Cockpit 18 pro+ (J31032-K2017-H436) (todas las versiones >= V11.5.1 < V11.6.2). El modo quiosco de los dispositivos afectados contiene una vulnerabilidad de escape del entorno de escritorio restringido. Esto podr\u00eda permitir que un atacante local no autenticado escape del entorno restringido y obtenga acceso al sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1439.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1439.json index 3e37fec7b27..82216725fe9 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1439.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1439.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1439", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-12T11:15:08.147", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T13:55:20.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "cve-coordination@incibe.es", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.2.11", + "matchCriteriaId": "A76BD816-1BB5-48BF-996B-8F4AD1BEE3CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-vulnerability-moodle", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20659.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20659.json index 78a9ce8c41c..fce84105734 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20659.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20659", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:05.220", - "lastModified": "2024-10-08T18:15:05.220", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Hyper-V Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de Windows Hyper-V" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json index 9a303061510..044cfc38728 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20787", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T09:15:05.000", - "lastModified": "2024-10-09T09:15:05.000", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Painter versions 10.0.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 10.0.1 y anteriores de Substance3D - Painter se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21490.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21490.json index 02682d9a7d1..f641f920acb 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21490.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21490.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21490", "sourceIdentifier": "report@snyk.io", "published": "2024-02-10T05:15:08.650", - "lastModified": "2024-05-14T14:54:54.393", - "vulnStatus": "Modified", + "lastModified": "2024-10-10T13:51:02.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*", + "criteria": "cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.3.0", - "matchCriteriaId": "4615CD79-CE8C-46FF-B9CC-633B2AD05D26" + "matchCriteriaId": "BAF43CA0-8F6F-4B34-AE11-85134A4E8491" } ] } @@ -102,11 +102,17 @@ "references": [ { "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113", @@ -125,7 +131,10 @@ }, { "url": "https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21532.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21532.json index 5e243a2c52e..473bf75b4c0 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21532.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21532.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21532", "sourceIdentifier": "report@snyk.io", "published": "2024-10-08T05:15:13.920", - "lastModified": "2024-10-08T05:15:13.920", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package ggit are vulnerable to Command Injection via the fetchTags(branch) API, which allows user input to specify the branch to be fetched and then concatenates this string along with a git command which is then passed to the unsafe exec() Node.js child process API." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete ggit son vulnerables a la inyecci\u00f3n de comandos a trav\u00e9s de la API fetchTags(branch), que permite la entrada del usuario para especificar la rama que se buscar\u00e1 y luego concatena esta cadena junto con un comando git que luego se pasa a la API del proceso secundario exec() de Node.js inseguro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json index 213da12609e..705daa75730 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21533", "sourceIdentifier": "report@snyk.io", "published": "2024-10-08T05:15:14.180", - "lastModified": "2024-10-08T16:35:04.437", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json index 6ac8fb1cefe..8377e6e4981 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22068", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-10-10T09:15:03.190", - "lastModified": "2024-10-10T09:15:03.190", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json index 6bd32852315..6ec7ae122a6 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22442", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-16T16:15:04.017", - "lastModified": "2024-09-05T17:12:12.433", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:47:22.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -83,6 +83,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -90,9 +91,20 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:hpe:3par_service_provider:*:*:*:*:*:*:*:*", - "versionEndExcluding": "5.1.2", - "matchCriteriaId": "939B605C-A7C5-4AF1-9A66-7536C6100BB2" + "criteria": "cpe:2.3:o:hp:3par_service_processor_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.2.0", + "matchCriteriaId": "8294955E-CB75-4F2B-89B9-EFE1BDACA913" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:3par_service_processor:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D241CDD7-CAA1-460D-814D-9302B76054F5" } ] } diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24875.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24875.json index 8caa2bb6e48..d102c8ca121 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24875.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24875", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:12.110", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T13:27:56.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "7.5.13", + "matchCriteriaId": "8CC556B7-656B-48C5-BF04-F96422CAD4C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/link-library/wordpress-link-library-plugin-7-5-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json index a6c4daf8f44..4437931dee8 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24884", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-12T09:15:12.320", - "lastModified": "2024-02-12T14:19:54.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T13:37:34.213", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ari-soft:contact_form_7_connector:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.2", + "matchCriteriaId": "D6F2F04F-EB55-459A-82DB-48A8721CADDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ari-cf7-connector/wordpress-contact-form-7-connector-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25282.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25282.json index 070235a356f..381964a829f 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25282.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25282", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:07.287", - "lastModified": "2024-10-09T15:35:11.880", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25283.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25283.json index 02307f2b0fa..3303f21f7d9 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25283.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25283", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:07.483", - "lastModified": "2024-10-09T15:35:12.690", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25284.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25284.json index 87824f19f35..de9b99ab11d 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25284.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25284.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25284", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:07.597", - "lastModified": "2024-10-09T15:35:13.433", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json index 11e686a04a9..f9859377dca 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25285.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25285", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:07.700", - "lastModified": "2024-10-09T16:35:07.700", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25286.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25286.json index 0e1abdfc0b5..744c4095c75 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25286.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25286", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:07.880", - "lastModified": "2024-10-09T15:35:14.180", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json index 0e68f084970..be4ff1d79a7 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25705", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:12.603", - "lastModified": "2024-10-08T17:15:30.027", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-site Scripting en Esri Portal for ArcGIS Experience Builder 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto no autenticado crear un v\u00ednculo manipulado que, al hacer clic en \u00e9l, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son bajos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json index 4f52b5b030e..b5f9b619b2b 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25706.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25706", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:12.830", - "lastModified": "2024-10-08T17:15:30.303", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS <=11.0 that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de HTML en Esri Portal for ArcGIS <=11.0 que puede permitir que un atacante remoto no autenticado cree una URL que, al hacer clic en ella, podr\u00eda generar un mensaje que incite a una v\u00edctima desprevenida a visitar un sitio web arbitrario. Esto podr\u00eda simplificar los ataques de phishing." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json index 92978d5f74b..42c10b5e921 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25709", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:13.340", - "lastModified": "2024-10-08T17:15:30.607", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 \u2013 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-site Scripting Almacenado en Esri Portal for ArcGIS versiones 10.8.1 \u2013 1121 que puede permitir que un atacante remoto autenticado cree un v\u00ednculo manipulado que se puede guardar como una nueva ubicaci\u00f3n al mover un elemento existente, lo que potencialmente ejecutar\u00e1 c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son altos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json index 180de7b4f71..0ed4f443a47 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25825.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25825", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T16:15:04.277", - "lastModified": "2024-10-09T16:15:04.277", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "FydeOS for PC 17.1 R114, FydeOS for VMware 17.0 R114, FydeOS for You 17.1 R114, and OpenFyde R114 were discovered to be configured with the root password saved as a wildcard. This allows attackers to gain root access without a password." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que FydeOS for PC 17.1 R114, FydeOS for VMware 17.0 R114, FydeOS for You 17.1 R114 y OpenFyde R114 estaban configurados con la contrase\u00f1a ra\u00edz guardada como comod\u00edn. Esto permite a los atacantes obtener acceso a la ra\u00edz sin una contrase\u00f1a." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25885.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25885.json index 468b6c3f710..6980a4403b4 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25885.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25885.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25885", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T18:15:05.423", - "lastModified": "2024-10-09T15:35:14.920", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json index 71cd9dd0044..48c43226d6a 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26596", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.500", - "lastModified": "2024-04-17T19:54:59.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T12:15:02.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/69a1e2d938dbbfcff0e064269adf60ad26dbb102", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/844f104790bd69c2e4dbb9ee3eba46fde1fcea7b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json index 1c2686bf1b2..a49527d34a3 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26785", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.187", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-10-10T12:15:03.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -24,6 +24,10 @@ { "url": "https://git.kernel.org/stable/c/fc719ecbca45c9c046640d72baddba3d83e0bc0b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fd4d5cd7a2e8f08357c9bfc0905957cffe8ce568", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26836.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26836.json index 4a4be54f483..b721376b4b2 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26836.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26836.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26836", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.713", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-10-10T12:15:03.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://git.kernel.org/stable/c/2bfbe1e0aed00ba51d58573c79452fada3f62ed4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/2deb10a99671afda30f834e95e5b992a805bba6a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/6f7d0f5fd8e440c3446560100ac4ff9a55eec340", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json index 88fb736a459..47f4f6146db 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26876.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26876", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.777", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-10-10T12:15:03.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://git.kernel.org/stable/c/28a94271bd50e4cf498df0381f776f8ea40a289e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/50f4b57e9a9db4ede9294f39b9e75b5f26bae9b7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/955c1252930677762e0db2b6b9e36938c887445c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26972.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26972.json index 7693c51b98c..d64efaa3f30 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26972.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26972.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26972", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:13.597", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-10-10T12:15:03.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/3faea7810e2b3e9a9a92ef42d7e5feaeb8ff7133", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/62b5ae00c2b835639002ce898ccb5d82c51073ae", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27011.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27011.json index 1a783f6f207..fcef94551c1 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27011.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27011.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27011", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:19.583", - "lastModified": "2024-05-13T08:15:11.983", + "lastModified": "2024-10-10T12:15:03.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -24,6 +24,10 @@ { "url": "https://git.kernel.org/stable/c/86a1471d7cde792941109b93b558b5dc078b9ee9", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a1bd2a38a1c6388fc8556816dc203c3e9dc52237", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27012.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27012.json index f04c24089bf..a1deeb981bc 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27012.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27012", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:19.743", - "lastModified": "2024-05-23T19:15:29.050", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T12:15:03.490", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -116,6 +116,10 @@ } ], "references": [ + { + "url": "https://git.kernel.org/stable/c/164936b2fc88883341fe7a2d9c42b69020e5cafd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/86658fc7414d4b9e25c2699d751034537503d637", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json index e8a5c774020..15f5b15fb4e 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27072", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.127", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-10-10T12:15:03.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -24,6 +24,10 @@ { "url": "https://git.kernel.org/stable/c/65e6a2773d655172143cc0b927cdc89549842895", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dea46e246ef0f98d89d59a4229157cd9ffb636bf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27457.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27457.json index 5094767efc9..83d7da1cb70 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27457.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27457.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27457", "sourceIdentifier": "secure@intel.com", "published": "2024-10-08T19:15:13.420", - "lastModified": "2024-10-08T19:15:13.420", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper check for unusual or exceptional conditions in Intel(R) TDX Module firmware before version 1.5.06 may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en el firmware del m\u00f3dulo Intel(R) TDX anterior a la versi\u00f3n 1.5.06 puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27861.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27861.json index 00e5c21e378..8eba853848f 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27861.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27861", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:47.897", - "lastModified": "2024-09-23T18:56:59.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T13:13:53.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json index 2bdf7593d43..d60a9962314 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28168", "sourceIdentifier": "security@apache.org", "published": "2024-10-09T12:15:02.850", - "lastModified": "2024-10-09T14:35:10.237", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of XML External Entity Reference ('XXE') vulnerability in Apache XML Graphics FOP.\n\nThis issue affects Apache XML Graphics FOP: 2.9.\n\nUsers are recommended to upgrade to version 2.10, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de restricci\u00f3n incorrecta de referencia de entidad externa XML ('XXE') en Apache XML Graphics FOP. Este problema afecta a Apache XML Graphics FOP: 2.9. Se recomienda a los usuarios que actualicen a la versi\u00f3n 2.10, que soluciona el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json index febef15ea25..558e594807c 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29176.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29176", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-26T03:15:10.533", - "lastModified": "2024-09-23T21:11:39.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:04:03.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] }, @@ -83,6 +83,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -91,8 +92,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", "versionEndExcluding": "7.7.5.40", - "matchCriteriaId": "C6A0B6C8-491A-46F2-A330-15000DE501BA" + "matchCriteriaId": "6BD07CAF-9671-475C-810D-1BFBFA881E09" }, { "vulnerable": true, @@ -109,6 +111,85 @@ "matchCriteriaId": "8EF3066F-F378-4AA6-B50C-B33C22C57492" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:dell:apex_protection_storage:-:*:*:*:in-cloud:*:*:*", + "matchCriteriaId": "83DBF4F3-791C-48A2-B37E-6B3F6177B470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:a:dell:apex_protection_storage:-:*:*:*:on-premises:*:*:*", + "matchCriteriaId": "D007B2BB-082B-4D33-A6A1-77714341C75C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F820D2BB-4773-4B2F-BC50-9474B44DB8F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84F58819-777E-43C1-B1EA-FFD7CDF79234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.16.0.0", + "matchCriteriaId": "D655A40E-7358-4E29-BDC6-8CC2E8BA1D63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dm5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B15806F-F6F1-4B26-921C-FE7620B3539F" + } + ] } ] } diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30092.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30092.json index 2add3ed95ce..af8661cefcc 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30092.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30092.json @@ -2,13 +2,17 @@ "id": "CVE-2024-30092", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:05.513", - "lastModified": "2024-10-08T18:15:05.513", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Hyper-V Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Hyper-V" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30118.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30118.json index ee63bcb2716..c82fb4b44bb 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30118.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30118.json @@ -2,13 +2,17 @@ "id": "CVE-2024-30118", "sourceIdentifier": "psirt@hcl.com", "published": "2024-10-09T20:15:07.570", - "lastModified": "2024-10-09T20:15:07.570", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to because of improperly handling the request data." + }, + { + "lang": "es", + "value": "HCL Connections es vulnerable a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n que podr\u00eda permitir que un usuario obtenga informaci\u00f3n confidencial a la que no tiene derecho debido al manejo inadecuado de los datos solicitados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json index 6934c154699..fdc7812c0c2 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3057.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3057", "sourceIdentifier": "psirt@purestorage.com", "published": "2024-10-08T17:15:53.770", - "lastModified": "2024-10-08T17:15:53.770", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw exists whereby a user can make a specific call to a FlashArray endpoint allowing privilege escalation." + }, + { + "lang": "es", + "value": "Existe una falla por la cual un usuario puede realizar una llamada espec\u00edfica a un endpoint FlashArray permitiendo la escalada de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31227.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31227.json index ec1ddfbcbec..7666fbd4421 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31227.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31227.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31227", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:05.050", - "lastModified": "2024-10-07T20:15:05.050", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Redis es una base de datos de c\u00f3digo abierto en memoria que persiste en el disco. Un usuario autenticado con privilegios suficientes puede crear un selector de ACL mal formado que, cuando se accede a \u00e9l, desencadena un p\u00e1nico del servidor y la consiguiente denegaci\u00f3n de servicio. El problema existe en Redis 7 anterior a las versiones 7.2.6 y 7.4.1. Se recomienda a los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31228.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31228.json index 0e7841a75a9..310561c8545 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31228.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31228.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31228", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:05.277", - "lastModified": "2024-10-07T20:15:05.277", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Redis es una base de datos de c\u00f3digo abierto en memoria que persiste en el disco. Los usuarios autenticados pueden desencadenar una denegaci\u00f3n de servicio mediante el uso de patrones de coincidencia de cadenas largas especialmente manipulados en comandos compatibles, como `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` y definiciones de ACL. La coincidencia de patrones extremadamente largos puede provocar una recursi\u00f3n sin l\u00edmites, lo que lleva a un desbordamiento de pila y un bloqueo del proceso. Este problema se ha solucionado en las versiones 6.2.16, 7.2.6 y 7.4.1 de Redis. Se recomienda a los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31449.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31449.json index 6f10d1da995..6564945122b 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31449.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31449.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31449", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:05.507", - "lastModified": "2024-10-07T20:15:05.507", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Redis es una base de datos en memoria de c\u00f3digo abierto que persiste en el disco. Un usuario autenticado puede usar un script Lua especialmente manipulado para provocar un desbordamiento del b\u00fafer de pila en la librer\u00eda de bits, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo. El problema existe en todas las versiones de Redis con scripts Lua. Este problema se ha solucionado en las versiones 6.2.16, 7.2.6 y 7.4.1 de Redis. Se recomienda a los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json index 68435fafcf1..c61e5d62138 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32608", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T05:15:13.110", - "lastModified": "2024-10-09T05:15:13.110", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution." + }, + { + "lang": "es", + "value": "La librer\u00eda HDF5 hasta la versi\u00f3n 1.14.3 tiene corrupci\u00f3n de memoria en H5A__close que resulta en la corrupci\u00f3n del puntero de instrucci\u00f3n y causa la denegaci\u00f3n de servicio o la posible ejecuci\u00f3n de c\u00f3digo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json index 1ba1a38d0a5..637e1d3b7c2 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33506", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-10-08T15:15:14.717", - "lastModified": "2024-10-08T15:15:14.717", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiManager 7.4.2 and below, 7.2.5 and below, 7.0.12 and below allows a remote authenticated attacker assigned to an Administrative Domain (ADOM) to access device summary of unauthorized ADOMs via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado [CWE-200] en FortiManager 7.4.2 y anteriores, 7.2.5 y anteriores, 7.0.12 y anteriores permite que un atacante remoto autenticado asignado a un dominio administrativo (ADOM) acceda al resumen del dispositivo de ADOM no autorizados a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33897.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33897.json index 7dc02bb4d9e..e6d65bedfb4 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33897.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33897", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T14:16:03.870", - "lastModified": "2024-08-12T16:15:15.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T13:00:37.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -111,8 +111,33 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+:-:*:*:*:*:*:*:*", - "matchCriteriaId": "32438363-2228-41D7-915C-E54343F71E84" + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3" } ] } @@ -122,7 +147,11 @@ "references": [ { "url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf", @@ -142,7 +171,7 @@ "url": "https://www.hms-networks.com/cyber-security", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Not Applicable" ] } ] diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json index eff660ddda8..2b81d20f790 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34662", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:03.037", - "lastModified": "2024-10-08T07:15:03.037", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in ActivityManager prior to SMR Oct-2024 Release 1 in select Android 12, 13 and SMR Sep-2024 Release 1 in select Android 14 allows local attackers to execute privileged behaviors." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en ActivityManager anterior a SMR Oct-2024 Release 1 en algunos Android 12 y 13 y SMR Sep-2024 Release 1 en algunos Android 14 permite que atacantes locales ejecuten comportamientos privilegiados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34663.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34663.json index 4ce4cec188d..446157b2e1a 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34663.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34663.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34663", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:03.497", - "lastModified": "2024-10-08T07:15:03.497", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in libSEF.quram.so prior to SMR Oct-2024 Release 1 allows local attackers to write out-of-bounds memory." + }, + { + "lang": "es", + "value": "El desbordamiento de enteros en libSEF.quram.so anterior a SMR Oct-2024 Release 1 permite a atacantes locales escribir en la memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34664.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34664.json index bd87ca8c7ae..e10e9bb192a 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34664.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34664.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34664", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:03.750", - "lastModified": "2024-10-08T07:15:03.750", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper check for exception conditions in Knox Guard prior to SMR Oct-2024 Release 1 allows physical attackers to bypass Knox Guard in a multi-user environment." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n incorrecta de las condiciones de excepci\u00f3n en Knox Guard antes de la versi\u00f3n 1 de SMR de octubre de 2024 permite que atacantes f\u00edsicos eludan Knox Guard en un entorno multiusuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34665.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34665.json index 4b6ecab32e4..1ceb55f6f74 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34665.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34665.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34665", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:04.053", - "lastModified": "2024-10-08T07:15:04.053", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in parsing h.264 format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el formato h.264 de an\u00e1lisis en librtppayload.so anterior a la versi\u00f3n 1 de SMR Oct-2024 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34666.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34666.json index 0a873c37f46..fe6e0cbfcfe 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34666.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34666.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34666", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:04.363", - "lastModified": "2024-10-08T07:15:04.363", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in parsing h.264 format in a specific mode in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el an\u00e1lisis del formato h.264 en un modo espec\u00edfico en librtppayload.so anterior a la versi\u00f3n 1 de SMR Oct-2024 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34667.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34667.json index 26d9285f896..8b210fcfbc5 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34667.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34667.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34667", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:04.643", - "lastModified": "2024-10-08T07:15:04.643", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in parsing h.265 format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el formato h.265 de an\u00e1lisis en librtppayload.so anterior a la versi\u00f3n 1 de SMR Oct-2024 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34668.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34668.json index c7a2a76cfe5..b52a0c43af0 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34668.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34668.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34668", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:04.897", - "lastModified": "2024-10-08T07:15:04.897", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in parsing h.263 format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el formato h.263 de an\u00e1lisis en librtppayload.so anterior a la versi\u00f3n 1 de SMR Oct-2024 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34669.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34669.json index e267d975f0e..01a6910bb4f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34669.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34669.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34669", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:05.137", - "lastModified": "2024-10-08T07:15:05.137", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in parsing h.263+ format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el an\u00e1lisis del formato h.263+ en librtppayload.so anterior a la versi\u00f3n 1 de SMR Oct-2024 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34670.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34670.json index e0676688161..f3502d973b2 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34670.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34670.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34670", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:05.390", - "lastModified": "2024-10-08T07:15:05.390", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of implicit intent for sensitive communication in Sound Assistant prior to version 6.1.0.9 allows local attackers to get sensitive information." + }, + { + "lang": "es", + "value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en Sound Assistant anterior a la versi\u00f3n 6.1.0.9 permite a atacantes locales obtener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34671.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34671.json index 1419576e30e..798fcbf0213 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34671.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34671.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34671", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:05.640", - "lastModified": "2024-10-08T07:15:05.640", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Use of implicit intent for sensitive communication in translation\ud63bin Samsung Internet prior to version 26.0.3.1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability." + "value": "Use of implicit intent for sensitive communication in translation?in Samsung Internet prior to version 26.0.3.1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "El uso de la intenci\u00f3n impl\u00edcita de obtener comunicaciones confidenciales en translation?in Samsung Internet anterior a la versi\u00f3n 26.0.3.1 permite a atacantes locales obtener informaci\u00f3n confidencial. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34672.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34672.json index 1993e81ca94..483e19c6f61 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34672.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34672.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34672", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:05.880", - "lastModified": "2024-10-08T07:15:05.880", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in SamsungVideoPlayer prior to versions 7.3.29.1 in Android 12, 7.3.36.1 in Android 13, and 7.3.41.230 in Android 14 allows local attackers to access video file of other users." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en SamsungVideoPlayer anterior a las versiones 7.3.29.1 en Android 12, 7.3.36.1 en Android 13 y 7.3.41.230 en Android 14 permite a atacantes locales acceder a archivos de video de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json new file mode 100644 index 00000000000..5f9a3770d46 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-35202", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-10T13:15:14.077", + "lastModified": "2024-10-10T13:15:14.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/", + "source": "cve@mitre.org" + }, + { + "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bitcoin/bitcoin/pull/26898", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/bitcoin/bitcoin/releases/tag/v25.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35215.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35215.json index 9cb97684794..6593f3e2bdd 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35215.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35215.json @@ -2,13 +2,17 @@ "id": "CVE-2024-35215", "sourceIdentifier": "secure@blackberry.com", "published": "2024-10-08T18:15:05.717", - "lastModified": "2024-10-08T18:15:05.717", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in IP socket options processing of the Networking Stack in QNX Software Development Platform (SDP) version(s) 7.1 and 7.0 could allow an attacker with local access to cause a denial-of-service condition in the context of the Networking Stack process." + }, + { + "lang": "es", + "value": "La desreferencia de puntero NULL en el procesamiento de opciones de socket IP de la pila de red en la plataforma de desarrollo de software (SDP) QNX versiones 7.1 y 7.0 podr\u00eda permitir que un atacante con acceso local provoque una condici\u00f3n de denegaci\u00f3n de servicio en el contexto del proceso de la pila de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35288.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35288.json index 3db04c2512f..8d3734d8017 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35288.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35288", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:08.233", - "lastModified": "2024-10-09T21:35:09.590", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35963.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35963.json index e966f594fad..33c32823999 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35963.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35963.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35963", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.390", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-10T12:15:03.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/0c18a64039aa3f1c16f208d197c65076da798137", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/50173882bb187e70e37bac01385b9b114019bee2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35964.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35964.json index 5183ba946a1..4fc0b5ae5fb 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35964.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35964.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35964", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.457", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-10T12:15:03.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://git.kernel.org/stable/c/0c4a89f4690478969729c7ba5f69d53d8516aa12", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/6a6baa1ee7a9df33adbf932305053520b9741b35", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/9e8742cdfc4b0e65266bb4a901a19462bda9285e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35965.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35965.json index 976b88a5d60..474c87373df 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35965.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35965.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35965", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.520", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-10T12:15:03.867", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/28234f8ab69c522ba447f3e041bbfbb284c5959a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/4f3951242ace5efc7131932e2e01e6ac6baed846", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3506.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3506.json index 54c33895619..cef19f086c6 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3506.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3506.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3506", "sourceIdentifier": "cf45122d-9d50-442a-9b23-e05cde9943d8", "published": "2024-10-08T10:15:04.417", - "lastModified": "2024-10-08T10:15:04.417", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A possible buffer overflow in selected cameras' drivers from XProtect Device Pack can allow an attacker with access to internal network to execute commands on Recording Server under strict conditions." + }, + { + "lang": "es", + "value": "Un posible desbordamiento de b\u00fafer en los controladores de c\u00e1maras seleccionadas de XProtect Device Pack puede permitir que un atacante con acceso a la red interna ejecute comandos en el servidor de grabaci\u00f3n bajo condiciones estrictas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36051.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36051.json new file mode 100644 index 00000000000..0806d1f64b9 --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36051.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36051", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-10T13:15:14.187", + "lastModified": "2024-10-10T13:15:14.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In btcd before 0.24.2, removeOpcodeByData mishandles the consensus rules for legacy signature verification. There can be a standard transaction that would be considered valid by Bitcoin Core but invalid by btcd." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/btcsuite/btcd/releases/tag/v0.24.2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36478.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36478.json index 3ddf538ce0f..e5459d61ab8 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36478.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36478", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:10.360", - "lastModified": "2024-09-09T13:30:12.647", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T12:15:03.947", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -84,6 +84,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://git.kernel.org/stable/c/aaadb755f2d684f715a6eb85cb7243aa0c67dfa9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36814.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36814.json index c29f0e44e3b..4bb3fdda5a9 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36814.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36814", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T19:15:13.753", - "lastModified": "2024-10-09T20:35:24.090", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36917.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36917.json index c2fe11ff9a2..91998c045fe 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36917.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36917.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36917", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:15.050", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-10-10T12:15:04.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" @@ -25,6 +29,10 @@ "url": "https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36936.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36936.json index 616c4ff5fcc..f0a5991650d 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36936.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36936.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36936", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:16.713", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-10-10T12:15:04.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -24,6 +24,10 @@ { "url": "https://git.kernel.org/stable/c/781e34b736014188ba9e46a71535237313dcda81", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e115c1b5de55a105c75aba8eb08301c075fa4ef4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json index 4495dcb6dc7..2405834089a 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36996", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:08.917", - "lastModified": "2024-08-02T14:47:12.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:30:29.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -112,8 +112,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.2312", "versionEndExcluding": "9.1.2312.109", - "matchCriteriaId": "9E9D55D4-74F4-4499-BAF7-2BF2AD8DEE29" + "matchCriteriaId": "F2E66C0D-BD3A-46CE-9578-068401F094C0" } ] } diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3656.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3656.json index 1aa16a3d507..d9474dc433e 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3656.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3656.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3656", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-09T19:15:13.547", - "lastModified": "2024-10-10T07:15:02.927", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Keycloak. Ciertos endpoints en la API REST de administraci\u00f3n de Keycloak permiten que usuarios con pocos privilegios accedan a funcionalidades administrativas. Esta falla permite que los usuarios realicen acciones reservadas para administradores, lo que puede provocar violaciones de datos o comprometer el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37179.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37179.json index 53acff4c3bb..9a11976a422 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37179.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37179.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37179", "sourceIdentifier": "cna@sap.com", "published": "2024-10-08T04:15:06.600", - "lastModified": "2024-10-08T04:15:06.600", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP BusinessObjects Business Intelligence Platform allows an authenticated user to send a specially crafted request to the Web Intelligence Reporting Server to download any file from the machine hosting the service, causing high impact on confidentiality of the application." + }, + { + "lang": "es", + "value": "SAP BusinessObjects Business Intelligence Platform permite que un usuario autenticado env\u00ede una solicitud especialmente manipulada al servidor de informes Web Intelligence para descargar cualquier archivo de la m\u00e1quina que aloja el servicio, lo que provoca un alto impacto en la confidencialidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json index 17047278408..d98c3516b13 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37547", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T15:15:10.500", - "lastModified": "2024-07-19T11:15:02.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:37:34.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 3.6 }, { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json index 3ac7858ac0d..7d86352fbd2 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37976", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:05.913", - "lastModified": "2024-10-08T18:15:05.913", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de la interfaz de firmware extensible de reanudaci\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json index cb9a5a12db0..466a2ca200e 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37979", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.117", - "lastModified": "2024-10-08T18:15:06.117", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json index bce0befe2f4..ac132001607 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37982", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.313", - "lastModified": "2024-10-08T18:15:06.313", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de la interfaz de firmware extensible de reanudaci\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json index ef37862b016..14633640f49 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37983", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.520", - "lastModified": "2024-10-08T18:15:06.520", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de la interfaz de firmware extensible de reanudaci\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json index 35697fe26e5..da9d048a3a8 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38029", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.730", - "lastModified": "2024-10-08T18:15:06.730", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft OpenSSH for Windows Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft OpenSSH para Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json index b1b5b8aaaf3..8fb5dd54997 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38085", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:44.080", - "lastModified": "2024-07-12T15:46:00.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:39:30.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -113,23 +113,18 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.22621.3880", - "matchCriteriaId": "29AB4D70-37A2-4A7E-9326-79E2EF762B02" + "versionEndExcluding": "10.0.22631.3880", + "matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", - "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", - "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json index b69c0c60ce6..3fbbab11a61 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38097", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.933", - "lastModified": "2024-10-08T18:15:06.933", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Azure Monitor Agent Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del agente de Azure Monitor" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json index 89296c0d633..608e260be1d 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38124", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.127", - "lastModified": "2024-10-08T18:15:07.127", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Netlogon Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Netlogon" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json index 94f52eb040b..75d86632a24 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38129", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.323", - "lastModified": "2024-10-08T18:15:07.323", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kerberos Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Kerberos de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json index 0d8fb9471d0..aaf55043c1b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38149", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.517", - "lastModified": "2024-10-08T18:15:07.517", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "BranchCache Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en BranchCache" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json index cf59ce665b1..e576ebad4fe 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38179", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.717", - "lastModified": "2024-10-08T18:15:07.717", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la infraestructura hiperconvergente (HCI) de Azure Stack" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json index eab6bab53b1..cb22423a7c8 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38212", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.940", - "lastModified": "2024-10-08T18:15:07.940", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json index c7078b9231a..3139ef28577 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38229", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.153", - "lastModified": "2024-10-08T18:15:08.153", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET and Visual Studio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en .NET y Visual Studio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json index 76ddc5ee124..ca4004ee779 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38261", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.367", - "lastModified": "2024-10-08T18:15:08.367", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json index e87f5b87e5e..2b7df522980 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38262", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.593", - "lastModified": "2024-10-08T18:15:08.593", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio de licencias de escritorio remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json index f33cec3c95b..7471b78dbcc 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38265", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.797", - "lastModified": "2024-10-08T18:15:08.797", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38594.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38594.json index 164c51f14c7..a2e75b77b17 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38594.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38594.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38594", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.467", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-10-10T12:15:04.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -28,6 +28,10 @@ { "url": "https://git.kernel.org/stable/c/6f476aff2d8da1a189621c4c16a76a6c534e4312", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b538fefeb1026aad9dcdcbb410c42b56dff8aae9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38815.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38815.json index f5d0218193e..ec756b4080e 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38815.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38815.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38815", "sourceIdentifier": "security@vmware.com", "published": "2024-10-09T20:15:07.820", - "lastModified": "2024-10-09T20:15:07.820", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware NSX contains a content spoofing vulnerability.\u00a0\n\nAn unauthenticated malicious actor may be able to craft a URL and redirect a victim to an attacker controlled domain leading to sensitive information disclosure." + }, + { + "lang": "es", + "value": "VMware NSX contiene una vulnerabilidad de suplantaci\u00f3n de contenido. Un actor malintencionado no autenticado podr\u00eda manipular una URL y redirigir a una v\u00edctima a un dominio controlado por un atacante, lo que dar\u00eda lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38817.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38817.json index ee73e221f12..dd2b2884c02 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38817.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38817", "sourceIdentifier": "security@vmware.com", "published": "2024-10-09T20:15:08.037", - "lastModified": "2024-10-10T08:15:03.443", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38818.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38818.json index 0bb25e8d58f..c5e80a5b5f5 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38818.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38818.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38818", "sourceIdentifier": "security@vmware.com", "published": "2024-10-09T20:15:08.230", - "lastModified": "2024-10-09T20:15:08.230", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware NSX contains a local privilege escalation vulnerability.\u00a0\n\nAn authenticated malicious actor may exploit this vulnerability to obtain permissions from a separate group role than previously assigned." + }, + { + "lang": "es", + "value": "VMware NSX contiene una vulnerabilidad de escalada de privilegios locales. Un actor malintencionado autenticado puede aprovechar esta vulnerabilidad para obtener permisos de un rol de grupo distinto al asignado anteriormente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39210.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39210.json index d57e31ecfd3..42c9d18d093 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39210.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39210", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T16:15:05.230", - "lastModified": "2024-07-09T16:22:51.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:35:11.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:best_house_rental_management_system_project:best_house_rental_management_system:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.0", - "matchCriteriaId": "ED30A65B-91AB-4AE5-9563-D9B2DEA6AF5D" + "matchCriteriaId": "E9460139-A7EA-4030-BEB5-135791FD01BF" } ] } diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json index 6098e05fc28..ef18bc2fd70 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39436", "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:06.550", - "lastModified": "2024-10-09T07:15:06.550", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio linkturbonative, es posible que se produzca una inyecci\u00f3n de comandos debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, con la necesidad de permisos de ejecuci\u00f3n de System." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json index bdc7163bc27..3d1614cbc0d 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39437", "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:08.313", - "lastModified": "2024-10-09T07:15:08.313", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio linkturbonative, es posible que se produzca una inyecci\u00f3n de comandos debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, con la necesidad de permisos de ejecuci\u00f3n de System." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json index 01631fc5d96..c7caf8ccdb4 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39438", "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:08.687", - "lastModified": "2024-10-09T07:15:08.687", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio linkturbonative, es posible que se produzca una inyecci\u00f3n de comandos debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, con la necesidad de permisos de ejecuci\u00f3n de System." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json index b8acab9ea9e..cb9877c31d6 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39439", "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:08.940", - "lastModified": "2024-10-09T07:15:08.940", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DRM service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio DRM, es posible que se produzca una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n local del servicio, con privilegios de ejecuci\u00f3n de System necesarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json index eeccce5eb80..1bba84d81d4 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39440", "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:09.217", - "lastModified": "2024-10-09T07:15:09.217", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DRM service, there is a possible system crash due to null pointer dereference. This could lead to local denial of service with System execution privileges needed." + }, + { + "lang": "es", + "value": "En el servicio DRM, es posible que se produzca un bloqueo del sistema debido a la desreferencia de un puntero nulo. Esto podr\u00eda provocar una denegaci\u00f3n local del servicio con privilegios de ejecuci\u00f3n de System necesarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json index 481e1acfa24..ae2075e828c 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39515", "sourceIdentifier": "sirt@juniper.net", "published": "2024-10-09T20:15:08.430", - "lastModified": "2024-10-09T20:15:08.430", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nIn some cases, rpd fails to restart requiring a manual restart via the 'restart routing' CLI command.\n\nThis issue only affects systems with BGP traceoptions enabled and \n\nrequires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue.\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n * All versions before 21.4R3-S8,\u00a0\n * 22.2 before 22.2R3-S5,\u00a0\n * 22.3 before 22.3R3-S4,\u00a0\n * 22.4 before 22.4R3-S3,\u00a0\n * 23.2 before 23.2R2-S2,\u00a0\n * 23.4 before 23.4R2;\u00a0\n\n\nJunos OS Evolved:\u00a0\n\n * All versions before 21.4R3-S8-EVO,\u00a0\n * 22.2-EVO before 22.2R3-S5-EVO,\u00a0\n * 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * 22.4-EVO before 22.4R3-S3-EVO,\u00a0\n * 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * 23.4-EVO before 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n incorrecta de la coherencia dentro de la entrada en el demonio de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edficamente malformado para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. En algunos casos, rpd no se reinicia y requiere un reinicio manual a trav\u00e9s del comando CLI 'restart route'. Este problema solo afecta a los sistemas con opciones de rastreo BGP habilitadas y requiere que ya se haya establecido una sesi\u00f3n BGP. Los sistemas sin opciones de rastreo BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-S8, * 22.2 anteriores a 22.2R3-S5, * 22.3 anteriores a 22.3R3-S4, * 22.4 anteriores a 22.4R3-S3, * 23.2 anteriores a 23.2R2-S2, * 23.4 anteriores a 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * 22.2-EVO anteriores a 22.2R3-S5-EVO, * 22.3-EVO anteriores a 22.3R3-S4-EVO, * 22.4-EVO anteriores a 22.4R3-S3-EVO, * 23.2-EVO anteriores a 23.2R2-S2-EVO, * 23.4-EVO anteriores a 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39516.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39516.json index 5983cf0a154..2f94ee07361 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39516.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39516.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39516", "sourceIdentifier": "sirt@juniper.net", "published": "2024-10-09T20:15:08.680", - "lastModified": "2024-10-09T21:15:12.850", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Out-of-Bounds Read vulnerability in\n\nthe routing protocol daemon (rpd) of \n\n Juniper Networks Junos OS and Junos OS Evolved\u00a0allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\n\n\nThis issue only affects systems with BGP traceoptions enabled. Systems without BGP traceoptions enabled are not affected by this issue.\n\n\n\n\n\nThis issue affects iBGP and eBGP with \n\nany address family\n\n configured.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S8,\n * 22.2 before 22.2R3-S5,\u00a0\n * 22.3 before 22.3R3-S4,\u00a0\n * 22.4 before 22.4R3-S3,\u00a0\n * 23.2 before 23.2R2-S2,\u00a0\n * 23.4 before 23.4R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S8-EVO,\u00a0\n * 22.2-EVO before 22.2R3-S5-EVO,\u00a0\n * 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * 22.4-EVO before 22.4R3-S3-EVO,\u00a0\n * 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * 23.4-EVO before 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de lectura fuera de los l\u00edmites en el demonio de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edficamente malformado para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo afecta a los sistemas con opciones de rastreo de BGP habilitadas. Los sistemas sin opciones de rastreo de BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP con cualquier familia de direcciones configurada. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-S8, * 22.2 anteriores a 22.2R3-S5, * 22.3 anteriores a 22.3R3-S4, * 22.4 anteriores a 22.4R3-S3, * 23.2 anteriores a 23.2R2-S2, * 23.4 anteriores a 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * 22.2-EVO anteriores a 22.2R3-S5-EVO, * 22.3-EVO anteriores a 22.3R3-S4-EVO, * 22.4-EVO anteriores a 22.4R3-S3-EVO, * 23.2-EVO anteriores a 23.2R2-S2-EVO, * 23.4-EVO anteriores a 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json index 1d495f7a645..932777a45ca 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39525", "sourceIdentifier": "sirt@juniper.net", "published": "2024-10-09T20:15:08.920", - "lastModified": "2024-10-09T20:15:08.920", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS).\u00a0Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue only affects systems with\u00a0BGP traceoptions enabled and \n\nrequires a BGP session to be already established.\u00a0 Systems without\u00a0BGP traceoptions enabled are not affected by this issue.\n\nThis issue affects iBGP and eBGP, and both\u00a0IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S8,\u00a0\n * from 21.4 before 21.4R3-S8,\u00a0\n * from 22.2 before 22.2R3-S4,\u00a0\n * from 22.3 before 22.3R3-S4,\n * from 22.4 before 22.4R3-S3,\u00a0\n * from 23.2 before 23.2R2-S1,\u00a0\n * from 23.4 before 23.4R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S8-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S8-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S4-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S4-EVO,\n * from 22.4-EVO before 22.4R3-S3-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S1-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el demonio de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edfico para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo afecta a los sistemas con opciones de rastreo de BGP habilitadas y requiere que ya se haya establecido una sesi\u00f3n de BGP. Los sistemas sin opciones de rastreo de BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * desde 21.4 hasta 21.4R3-S8, * desde 22.2 hasta 22.2R3-S4, * desde 22.3 hasta 22.3R3-S4, * desde 22.4 hasta 22.4R3-S3, * desde 23.2 hasta 23.2R2-S1, * desde 23.4 hasta 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * desde 21.4-EVO hasta 21.4R3-S8-EVO, * desde 22.2-EVO hasta 22.2R3-S4-EVO, * desde 22.3-EVO hasta 22.3R3-S4-EVO, * desde 22.4-EVO hasta 22.4R3-S3-EVO, * desde 23.2-EVO hasta 23.2R2-S1-EVO, * desde 23.4-EVO hasta 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json index 2cfcfb02d02..1d36367a54c 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39586", "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-09T07:15:09.473", - "lastModified": "2024-10-09T07:15:09.473", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell AppSync Server, version 4.3 through 4.6, contains an XML External Entity Injection vulnerability. An adjacent high privileged attacker could potentially exploit this vulnerability, leading to information disclosure." + }, + { + "lang": "es", + "value": "Dell AppSync Server, versi\u00f3n 4.3 a 4.6, contiene una vulnerabilidad de inyecci\u00f3n de entidad externa XML. Un atacante adyacente con privilegios elevados podr\u00eda aprovechar esta vulnerabilidad, lo que dar\u00eda lugar a la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json index 5a1170f8daf..c81e25a4d29 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39806", "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.183", - "lastModified": "2024-10-08T04:15:07.183", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json index c94e836acee..5c3149b3662 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39831", "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.447", - "lastModified": "2024-10-08T04:15:07.447", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.1.0 se permite a un atacante local con altos privilegios la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json index 8854fbeaf0b..16f9d15a346 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40334", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.760", - "lastModified": "2024-08-01T13:57:11.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:40:06.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*", - "matchCriteriaId": "C487F7F9-25BB-41FD-907C-3B6859E1E6FE" + "criteria": "cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*", + "matchCriteriaId": "0790E0F4-51A6-479C-9321-8E42F139EDC7" } ] } diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json index fdabe3288ec..579eae804f4 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41123", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T15:15:13.213", - "lastModified": "2024-09-05T16:12:21.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:56:29.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*", - "versionEndExcluding": "3.3.3", - "matchCriteriaId": "E5CFEABA-B7D5-4D35-9C56-CC81B839DD36" + "versionEndExcluding": "3.2.7", + "matchCriteriaId": "EBF24ACB-780A-4611-B978-F93033207F85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*", + "versionStartIncluding": "3.2.8", + "versionEndExcluding": "3.3.2", + "matchCriteriaId": "35894CC8-FEFA-4F30-A9FF-4582B7DF108C" } ] } diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json index 0dca6ea7e13..ecd55ce3f4f 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41685", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-07-26T12:15:02.977", - "lastModified": "2024-08-06T12:51:23.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T12:48:12.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -126,8 +126,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:*:*:*:*:*:*:*:*", - "matchCriteriaId": "C3AC77A6-E942-41FD-998A-12E96BA002CF" + "criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FA5240-DBBB-42C6-807F-59024B25269A" } ] } diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41798.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41798.json index dc84fe4498b..f1129aaba16 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41798.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41798.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41798", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:11.177", - "lastModified": "2024-10-08T09:15:11.177", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KM PAC3200 (All versions). Affected devices only provide a 4-digit PIN to protect from administrative access via Modbus TCP interface. Attackers with access to the Modbus TCP interface could easily bypass this protection by brute-force attacks or by sniffing the Modbus clear text communication." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KM PAC3200 (todas las versiones). Los dispositivos afectados solo proporcionan un PIN de 4 d\u00edgitos para protegerse del acceso administrativo a trav\u00e9s de la interfaz Modbus TCP. Los atacantes con acceso a la interfaz Modbus TCP podr\u00edan eludir f\u00e1cilmente esta protecci\u00f3n mediante ataques de fuerza bruta o espiando la comunicaci\u00f3n de texto plano de Modbus." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41902.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41902.json index 16310800186..8ebe03af758 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41902.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41902.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41902", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:11.453", - "lastModified": "2024-10-08T09:15:11.453", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en JT2Go (todas las versiones anteriores a V2406.0003). La aplicaci\u00f3n afectada contiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila que podr\u00eda activarse al analizar archivos PDF especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41981.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41981.json index 4377b0c8cfd..8e8a8fb947f 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41981.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41981.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41981", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:11.813", - "lastModified": "2024-10-08T09:15:11.813", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Simcenter Nastran 2306 (All versions), Simcenter Nastran 2312 (All versions), Simcenter Nastran 2406 (All versions < V2406.5000). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted BDF files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Simcenter Nastran 2306 (todas las versiones), Simcenter Nastran 2312 (todas las versiones) y Simcenter Nastran 2406 (todas las versiones < V2406.5000). La aplicaci\u00f3n afectada es vulnerable a un desbordamiento de b\u00fafer basado en el mont\u00f3n mientras analiza archivos BDF especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42831.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42831.json index e90df47f519..1e338baf82a 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42831.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42831.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42831", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T18:15:04.497", - "lastModified": "2024-10-07T20:35:04.807", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability in Elaine's Realtime CRM Automation v6.18.17 allows attackers to execute arbitrary JavaScript code in the web browser of a user via injecting a crafted payload into the dialog parameter at wrapper_dialog.php." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) reflejado en Elaine's Realtime CRM Automation v6.18.17 permite a los atacantes ejecutar c\u00f3digo JavaScript arbitrario en el navegador web de un usuario mediante la inyecci\u00f3n de un payload manipulado en el par\u00e1metro de di\u00e1logo en wrapper_dialog.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json index ce11b4e795f..c0f81c8ff8d 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42934", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T05:15:13.270", - "lastModified": "2024-10-09T05:15:13.270", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator, resulting in denial of service or (with very low probability) authentication bypass or code execution." + }, + { + "lang": "es", + "value": "OpenIPMI anterior a 2.0.36 tiene un acceso a una matriz fuera de los l\u00edmites (para el tipo de autenticaci\u00f3n) en el simulador ipmi_sim, lo que resulta en una denegaci\u00f3n de servicio o (con muy baja probabilidad) en la omisi\u00f3n de la autenticaci\u00f3n o la ejecuci\u00f3n del c\u00f3digo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json index 8163745fddd..2c3df0facdc 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42988.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42988", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T17:15:16.337", - "lastModified": "2024-10-09T17:15:16.337", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lack of access control in ChallengeSolves (/api/v1/challenges//solves) of CTFd v2.0.0 - v3.7.2 allows authenticated users to retrieve a list of users who have solved the challenge, regardless of the Account Visibility settings. The issue is fixed in v3.7.3+." + }, + { + "lang": "es", + "value": "La falta de control de acceso en ChallengeSolves (/api/v1/challenges//solves) de CTFd v2.0.0 - v3.7.2 permite que los usuarios autenticados recuperen una lista de usuarios que han resuelto el desaf\u00edo, independientemente de la configuraci\u00f3n de Visibilidad de la cuenta. El problema se solucion\u00f3 en la versi\u00f3n v3.7.3+." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43362.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43362.json index 21826ffe7fe..cd28bdceda0 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43362.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43362.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43362", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:15.470", - "lastModified": "2024-10-07T21:15:15.470", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cacti is an open source performance and fault management framework. The `fileurl` parameter is not properly sanitized when saving external links in `links.php` . Morever, the said fileurl is placed in some html code which is passed to the `print` function in `link.php` and `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `fileurl` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "Cacti es un framework de trabajo de gesti\u00f3n de errores y rendimiento de c\u00f3digo abierto. El par\u00e1metro `fileurl` no se desinfecta correctamente al guardar enlaces externos en `links.php`. Adem\u00e1s, dicho fileurl se coloca en alg\u00fan c\u00f3digo html que se pasa a la funci\u00f3n `print` en `link.php` e `index.php`, lo que finalmente genera XSS almacenado. Los usuarios con el privilegio de crear enlaces externos pueden manipular el par\u00e1metro `fileurl` en la solicitud de publicaci\u00f3n http mientras crean enlaces externos para realizar ataques XSS almacenados. La vulnerabilidad conocida como XSS (Cross-Site Scripting) ocurre cuando una aplicaci\u00f3n permite que se muestre una entrada de usuario no confiable en una p\u00e1gina web sin la validaci\u00f3n o el escape adecuados. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 1.2.28. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43363.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43363.json index 5b19de604a8..256a4f2c65e 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43363.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43363.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43363", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:15.743", - "lastModified": "2024-10-07T21:15:15.743", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Cacti es un framework de trabajo de gesti\u00f3n de rendimiento y fallos de c\u00f3digo abierto. Un usuario administrador puede crear un dispositivo con un nombre de host malicioso que contenga c\u00f3digo php y repetir el proceso de instalaci\u00f3n (completar solo el paso 5 del proceso de instalaci\u00f3n es suficiente, no es necesario completar los pasos anteriores o posteriores) para usar un archivo php como archivo de registro de Cacti. Despu\u00e9s de que el nombre de host malicioso termine en los registros (envenenamiento de registros), uno puede simplemente ir a la URL del archivo de registro para ejecutar comandos para lograr RCE. Este problema se ha solucionado en la versi\u00f3n 1.2.28 y se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43364.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43364.json index b4281da29fb..4fa2a5580c0 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43364.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43364.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43364", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:16.017", - "lastModified": "2024-10-07T21:15:16.017", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cacti is an open source performance and fault management framework. The `title` parameter is not properly sanitized when saving external links in links.php . Morever, the said title parameter is stored in the database and reflected back to user in index.php, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `title` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Cacti es un framework de trabajo de gesti\u00f3n de errores y rendimiento de c\u00f3digo abierto. El par\u00e1metro `title` no se desinfecta correctamente al guardar enlaces externos en links.php. Adem\u00e1s, dicho par\u00e1metro title se almacena en la base de datos y se refleja de nuevo al usuario en index.php, lo que finalmente genera XSS almacenado. Los usuarios con el privilegio de crear enlaces externos pueden manipular el par\u00e1metro `title` en la solicitud de publicaci\u00f3n http mientras crean enlaces externos para realizar ataques XSS almacenados. La vulnerabilidad conocida como XSS (Cross-Site Scripting) ocurre cuando una aplicaci\u00f3n permite que se muestre una entrada de usuario no confiable en una p\u00e1gina web sin la validaci\u00f3n o el escape adecuados. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 1.2.28. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json index d411a5a5040..9e0401be1de 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43365", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:16.247", - "lastModified": "2024-10-07T21:15:16.247", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cacti is an open source performance and fault management framework. The`consolenewsection` parameter is not properly sanitized when saving external links in links.php . Morever, the said consolenewsection parameter is stored in the database and reflected back to user in `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the \u201cconsolenewsection\u201d parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Cacti es un framework de trabajo de gesti\u00f3n de errores y rendimiento de c\u00f3digo abierto. El par\u00e1metro `consolenewsection` no se desinfecta correctamente al guardar enlaces externos en links.php. Adem\u00e1s, dicho par\u00e1metro consolenewsection se almacena en la base de datos y se refleja de nuevo al usuario en `index.php`, lo que finalmente genera XSS almacenado. Los usuarios con el privilegio de crear enlaces externos pueden manipular el par\u00e1metro \u201cconsolenewsection\u201d en la solicitud de publicaci\u00f3n http mientras crean enlaces externos para realizar ataques XSS almacenados. La vulnerabilidad conocida como XSS (Cross-Site Scripting) ocurre cuando una aplicaci\u00f3n permite que se muestre una entrada de usuario no confiable en una p\u00e1gina web sin la validaci\u00f3n o el escape adecuados. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 1.2.28. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json index ef53e5d7c6d..3218e556f6e 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43453", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.070", - "lastModified": "2024-10-08T18:15:09.070", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json index c50ea0520a1..09fe252e850 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43456", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.283", - "lastModified": "2024-10-08T18:15:09.283", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Services\u00a0Tampering Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de manipulaci\u00f3n de los servicios de escritorio remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json index 3b2b7eca094..481dc3a2dcf 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43468", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.537", - "lastModified": "2024-10-08T18:15:09.537", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Configuration Manager Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Configuration Manager" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43480.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43480.json index 535c24ae92a..384580ef9c7 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43480.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43480.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43480", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.833", - "lastModified": "2024-10-08T18:15:09.833", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Azure Service Fabric for Linux Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Azure Service Fabric para Linux" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json index 6d7b5452829..d2591e66885 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43481", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.147", - "lastModified": "2024-10-08T18:15:10.147", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Power BI Report Server Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en el servidor de informes de Power BI" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json index 601ac55efc9..6f59a64d2d9 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43483", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.367", - "lastModified": "2024-10-08T18:15:10.367", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en .NET, .NET Framework y Visual Studio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json index 06009498493..8b5cf796a2b 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43484", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.633", - "lastModified": "2024-10-08T18:15:10.633", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en .NET, .NET Framework y Visual Studio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json index b5c0c401ccd..ae161f80ab2 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43485", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.840", - "lastModified": "2024-10-08T18:15:10.840", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET and Visual Studio Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en .NET y Visual Studio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json index 176d0e6a266..69cbd08ec0c 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43488", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:11.030", - "lastModified": "2024-10-08T18:15:11.030", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Missing authentication for critical function in Visual Studio Code extension for Arduino allows an unauthenticated attacker to perform remote code execution through network attack vector." + }, + { + "lang": "es", + "value": "La falta de autenticaci\u00f3n para una funci\u00f3n cr\u00edtica en la extensi\u00f3n de Visual Studio Code para Arduino permite que un atacante no autenticado realice una ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del vector de ataque de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43497.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43497.json index ed35c3858b1..7370b3548f8 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43497.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43497.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43497", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:11.293", - "lastModified": "2024-10-08T18:15:11.293", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DeepSpeed Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en DeepSpeed" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json index 90a02010264..254209959ad 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43500.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43500", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:11.480", - "lastModified": "2024-10-08T18:15:11.480", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resilient File System (ReFS) Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del sistema de archivos resiliente de Windows (ReFS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json index b9269f7293e..05a5226d830 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43501.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43501", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:11.670", - "lastModified": "2024-10-08T18:15:11.670", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador del sistema de archivos de registro com\u00fan de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json index 91fdbc861f7..2d0b6e30c48 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43502.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43502", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:11.863", - "lastModified": "2024-10-08T18:15:11.863", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43503.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43503.json index e6d3ab06b9e..ce34e4688bc 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43503.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43503.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43503", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.050", - "lastModified": "2024-10-08T18:15:12.050", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft SharePoint Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft SharePoint" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json index 952378765ba..042c4293fba 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43504", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.240", - "lastModified": "2024-10-08T18:15:12.240", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json index 5aa6a77e861..e88bdf880bb 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43505", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.433", - "lastModified": "2024-10-08T18:15:12.433", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office Visio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json index 5cd63fb1d28..7bd5d4cdf16 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43506.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43506", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.620", - "lastModified": "2024-10-08T18:15:12.620", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "BranchCache Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en BranchCache" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json index 4bb9bd694b9..3eaa99190aa 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43508.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43508", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.823", - "lastModified": "2024-10-08T18:15:12.823", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Graphics Component Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del componente gr\u00e1fico de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json index e6bbdc9f5f6..460f720a4d6 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43509.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43509", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:13.073", - "lastModified": "2024-10-08T18:15:13.073", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Graphics Component Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en componentes gr\u00e1ficos de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json index d6c58694d1d..10e361d71e3 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43511.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43511", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:13.287", - "lastModified": "2024-10-08T18:15:13.287", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43512.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43512.json index 2131b3ad3d5..5c406886ee9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43512.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43512.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43512", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:13.493", - "lastModified": "2024-10-08T18:15:13.493", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Standards-Based Storage Management Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json index b70708b07c6..0b1270c0bb8 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43513.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43513", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:13.703", - "lastModified": "2024-10-08T18:15:13.703", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "BitLocker Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de BitLocker" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json index 95a8c5e6757..e7e595b9317 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43514.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43514", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:13.913", - "lastModified": "2024-10-08T18:15:13.913", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el sistema de archivos resiliente de Windows (ReFS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json index f04a144c756..2b1cd1f6dd4 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43515.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43515", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:14.130", - "lastModified": "2024-10-08T18:15:14.130", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en la interfaz de sistemas inform\u00e1ticos peque\u00f1os de Internet (iSCSI)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json index 3c1b8e0bb35..0b1c3bbb22e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43516.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43516", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:14.343", - "lastModified": "2024-10-08T18:15:14.343", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el modo kernel seguro de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json index 18b87fb2a33..abf8ac93d1f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43517.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43517", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:14.540", - "lastModified": "2024-10-08T18:15:14.540", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft ActiveX Data Objects Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en objetos de datos de Microsoft ActiveX" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json index 28538f686fd..304997f3526 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43518.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43518", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:14.770", - "lastModified": "2024-10-08T18:15:14.770", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servidor de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json index 92556630d97..3f3cbd36422 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43519.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43519", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:14.977", - "lastModified": "2024-10-08T18:15:14.977", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el proveedor OLE DB WDAC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json index 2b4a031d57a..beb6602b868 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43520.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43520", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:15.183", - "lastModified": "2024-10-08T18:15:15.183", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en el kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json index 7d72b60e5f3..70f09510d0c 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43521.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43521", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:15.393", - "lastModified": "2024-10-08T18:15:15.393", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Hyper-V Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en Windows Hyper-V" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json index 1f3b3d52824..0a9fda7cb07 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43522.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43522", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:15.600", - "lastModified": "2024-10-08T18:15:15.600", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de la autoridad de seguridad local (LSA) de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json index 0d740ba5aba..11132a984ac 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43523.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43523", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:15.800", - "lastModified": "2024-10-08T18:15:15.800", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json index 2d90a999306..129f12d16ac 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43524.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43524", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.000", - "lastModified": "2024-10-08T18:15:16.000", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json index f56e83afb30..5dc0413a6f2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43525.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43525", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.220", - "lastModified": "2024-10-08T18:15:16.220", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json index c84b69a7046..a838cbf4092 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43526.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43526", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.420", - "lastModified": "2024-10-08T18:15:16.420", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json index c57713c9e34..0a9b37638b2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43527", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.620", - "lastModified": "2024-10-08T18:15:16.620", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json index 7c14fea67a1..480bf40afb9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43528", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.810", - "lastModified": "2024-10-08T18:15:16.810", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el modo kernel seguro de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json index 28796c87cd5..8c18376b250 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43529", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.027", - "lastModified": "2024-10-08T18:15:17.027", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Print Spooler Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el administrador de trabajos de impresi\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json index d632caf7b7d..45947d67548 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43532", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.230", - "lastModified": "2024-10-08T18:15:17.230", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote Registry Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el servicio de registro remoto" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json index 972f1fba9d1..2ecbfcbfce2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43533", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.437", - "lastModified": "2024-10-08T18:15:17.437", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote Desktop Client Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el cliente de escritorio remoto" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json index 53eea6e5162..5088328df21 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43534", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.630", - "lastModified": "2024-10-08T18:15:17.630", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Graphics Component Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del componente gr\u00e1fico de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json index fed98ce5ab6..ffe9663cf69 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43535", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.830", - "lastModified": "2024-10-08T18:15:17.830", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el controlador de modo kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json index e0eb1fc5a3b..805e36434ea 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43536", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.030", - "lastModified": "2024-10-08T18:15:18.030", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json index 5873379a90b..a70e23ec10b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43537", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.263", - "lastModified": "2024-10-08T18:15:18.263", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json index 1271f66892e..d1e0454dbcc 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43538.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43538", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.457", - "lastModified": "2024-10-08T18:15:18.457", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json index 97f7a9fe9ed..3c538c32cb2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43540.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43540", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.650", - "lastModified": "2024-10-08T18:15:18.650", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json index cd89c4532d6..97b2a539773 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43541.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43541", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.857", - "lastModified": "2024-10-08T18:15:18.857", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del protocolo de inscripci\u00f3n de certificados simples de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json index 269985ff6cc..81e0cdfd6d0 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43542.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43542", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:19.067", - "lastModified": "2024-10-08T18:15:19.067", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json index b622f97a393..b0ee9a6e8a8 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43543.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43543", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:19.270", - "lastModified": "2024-10-08T18:15:19.270", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json index 803c792b52f..38b48d54c90 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43544.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43544", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:19.487", - "lastModified": "2024-10-08T18:15:19.487", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del protocolo de inscripci\u00f3n de certificados simples de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json index 67f5a78428c..10eb1962f1b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43545.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43545", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:19.690", - "lastModified": "2024-10-08T18:15:19.690", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servidor del protocolo de estado de certificado en l\u00ednea (OCSP) de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json index 61811194fe7..0cc32d9225f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43546.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43546", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:19.893", - "lastModified": "2024-10-08T18:15:19.893", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Cryptographic Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n criptogr\u00e1fica de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43547.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43547.json index ace13dcc9d1..9ad23decb6e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43547.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43547.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43547", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:20.160", - "lastModified": "2024-10-08T18:15:20.160", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kerberos Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Kerberos en Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json index 9c37dc8a9b0..52f07144fd2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43549.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43549", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:20.377", - "lastModified": "2024-10-08T18:15:20.377", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json index c06ed0da50a..987a2ede4ba 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43550.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43550", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:20.583", - "lastModified": "2024-10-08T18:15:20.583", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Secure Channel Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de canal seguro de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json index a9a94002d71..3d4472d65d4 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43551.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43551", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:20.783", - "lastModified": "2024-10-08T18:15:20.783", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Storage Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el almacenamiento de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json index 1d439460bfc..9c9d839f901 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43552.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43552", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:20.987", - "lastModified": "2024-10-08T18:15:20.987", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Shell Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el shell de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43553.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43553.json index d932f2c98fc..4a73e209aab 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43553.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43553.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43553", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:21.183", - "lastModified": "2024-10-08T18:15:21.183", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NT OS Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el kernel del sistema operativo NT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json index 7d0a5fc86cc..2add6f6ea98 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43554.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43554", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:21.400", - "lastModified": "2024-10-08T18:15:21.400", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel-Mode Driver Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del controlador en modo kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json index f564338c839..22ccfcab487 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43555.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43555", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:21.627", - "lastModified": "2024-10-08T18:15:21.627", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json index 4073f11b87a..879639e8578 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43556", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:21.840", - "lastModified": "2024-10-08T18:15:21.840", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Graphics Component Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en componentes gr\u00e1ficos de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json index eafa401e6d7..251537edc52 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43557.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43557", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:22.063", - "lastModified": "2024-10-08T18:15:22.063", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json index b5b51fcfcdf..e8368e2ac07 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43558.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43558", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:22.260", - "lastModified": "2024-10-08T18:15:22.260", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json index f01a850a75f..a132dda9586 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43559.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43559", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:22.450", - "lastModified": "2024-10-08T18:15:22.450", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json index 3bb0ef491a8..aac6e387a95 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43560.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43560", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:22.653", - "lastModified": "2024-10-08T18:15:22.653", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el controlador del puerto de almacenamiento de Microsoft Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json index 993ba42b975..6f04f0f5bed 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43561.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43561", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:22.970", - "lastModified": "2024-10-08T18:15:22.970", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Mobile Broadband Driver Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del controlador de banda ancha de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json index 7616a481d2b..a9f1fd1d29b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43562.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43562", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:23.167", - "lastModified": "2024-10-08T18:15:23.167", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Network Address Translation (NAT) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de traducci\u00f3n de direcciones de red (NAT) de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json index b82abc312b4..b634f7dd476 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43563", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:23.410", - "lastModified": "2024-10-08T18:15:23.410", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Controlador de funci\u00f3n auxiliar de Windows para vulnerabilidad de elevaci\u00f3n de privilegios de WinSock" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json index 2fb04a4bc08..3b60cff3183 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43564.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43564", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:23.613", - "lastModified": "2024-10-08T18:15:23.613", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json index 2ca3775406c..409b6e8ce34 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43565.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43565", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:23.810", - "lastModified": "2024-10-08T18:15:23.810", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Network Address Translation (NAT) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de traducci\u00f3n de direcciones de red (NAT) de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json index 3d59d4e135c..c50d54ed798 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43567.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43567", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.010", - "lastModified": "2024-10-08T18:15:24.010", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Hyper-V Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en Windows Hyper-V" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json index abef90f830f..2e31b29f4e9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43570", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.207", - "lastModified": "2024-10-08T18:15:24.207", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json index 72e4f5fa178..a12fecd6e0e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43571", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.400", - "lastModified": "2024-10-08T18:15:24.400", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sudo for Windows Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Sudo para Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json index 1d79e82045d..eedb4a2d586 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43574", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.030", - "lastModified": "2024-10-08T18:15:25.030", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la interfaz de programaci\u00f3n de aplicaciones de voz (SAPI) de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json index a3b150e340f..388a5f1e46b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43575", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.257", - "lastModified": "2024-10-08T18:15:25.257", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Hyper-V Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en Windows Hyper-V" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json index 591e3673898..48faf12e651 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43576", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.450", - "lastModified": "2024-10-08T18:15:25.450", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json index 6f0d6d93a99..a000cc095da 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43581", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.647", - "lastModified": "2024-10-08T18:15:25.647", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft OpenSSH for Windows Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft OpenSSH para Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json index 9de9c19fa5b..f81cd7badc3 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43582", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.850", - "lastModified": "2024-10-08T18:15:25.850", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote Desktop Protocol Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servidor de protocolo de escritorio remoto" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json index ce06650b4d8..63f20fad6ce 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43583", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.063", - "lastModified": "2024-10-08T18:15:26.063", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Winlogon Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Winlogon" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json index f4ca68618e0..1eee70db62b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43584", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.283", - "lastModified": "2024-10-08T18:15:26.283", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Scripting Engine Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad de Windows Scripting Engine" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json index 186846fe84b..7857bef1e25 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43585", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.497", - "lastModified": "2024-10-08T18:15:26.497", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code Integrity Guard Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad Code Integrity Guard" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json index c3fc3ebe011..a9d606b999f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43589", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.700", - "lastModified": "2024-10-08T18:15:26.700", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json index 9acd7445a47..5dd57e44f9b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43590", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.913", - "lastModified": "2024-10-08T18:15:26.913", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual C++ Redistributable Installer Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el instalador redistribuible de Visual C++" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json index feaccb9b160..33e5dd0ecfd 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43591", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.127", - "lastModified": "2024-10-08T18:15:27.127", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la integraci\u00f3n de la l\u00ednea de comandos (CLI) de Azure" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json index 026fb40930c..9e20b6344c3 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43592", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.327", - "lastModified": "2024-10-08T18:15:27.327", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json index bee39aaaaff..02497ae1a43 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43593", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.553", - "lastModified": "2024-10-08T18:15:27.553", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json index e8afa33f42b..e24479adbb6 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43599", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.753", - "lastModified": "2024-10-08T18:15:27.753", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote Desktop Client Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el cliente de escritorio remoto" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json index 927bcdbc06f..5f00571b625 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43601", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.953", - "lastModified": "2024-10-08T18:15:27.953", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Code for Linux Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Visual Studio Code para Linux" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json index cb9408ec279..39e9f7aff89 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43603", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.150", - "lastModified": "2024-10-08T18:15:28.150", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Collector Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio recopilador de Visual Studio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json index ca8b1a97af7..e56f3c649ba 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43604", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.347", - "lastModified": "2024-10-08T18:15:28.347", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Outlook for Android Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Outlook para Android" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json index 841d90c1006..833aefe998e 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43607", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.597", - "lastModified": "2024-10-08T18:15:28.597", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json index 63bc78260fb..e09aa9f0f3e 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43608", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.813", - "lastModified": "2024-10-08T18:15:28.813", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json index 8cb0a058124..0558ca3de28 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43609", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.037", - "lastModified": "2024-10-08T18:15:29.037", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Office" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json index 9d4e9edac75..c9588984259 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43610.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43610", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-09T17:15:19.397", - "lastModified": "2024-10-09T17:15:19.397", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticated attacker to view sensitive information through network attack vector" + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Copilot Studio permite que un atacante no autenticado vea informaci\u00f3n confidencial a trav\u00e9s del vector de ataque de red" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json index 83ae217bb0a..08fbce34d60 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43611", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.240", - "lastModified": "2024-10-08T18:15:29.240", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json index 0088437cbbf..b96d02ac2f7 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43612", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.437", - "lastModified": "2024-10-08T18:15:29.437", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Power BI Report Server Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad en el servidor de informes de Power BI" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json index 09bc6ae9481..14d111468e4 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43614", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.623", - "lastModified": "2024-10-08T18:15:29.623", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de Microsoft Defender for Endpoint for Linux" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json index 0695f8cee92..b6f622148b9 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43615", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.813", - "lastModified": "2024-10-08T18:15:29.813", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft OpenSSH for Windows Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft OpenSSH para Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json index fa8496b86bc..f1210b81abd 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43616", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:30.020", - "lastModified": "2024-10-08T18:15:30.020", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json index 6373d038476..307465adcbd 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43696", "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.680", - "lastModified": "2024-10-08T04:15:07.680", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque un DOS por p\u00e9rdida de memoria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json index 2282493fefb..0ae941d9241 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43697", "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.913", - "lastModified": "2024-10-08T04:15:07.913", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque un ataque de denegaci\u00f3n de servicio (DOS) mediante una entrada incorrecta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43789.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43789.json index 75e95d3b2a2..c5a88c5cf2f 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43789.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43789.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43789", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:16.710", - "lastModified": "2024-10-07T21:15:16.710", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. Un usuario puede crear una publicaci\u00f3n con muchas respuestas y luego intentar obtenerlas todas a la vez. Esto puede reducir potencialmente la disponibilidad de una instancia de Discourse. Este problema se ha corregido en la \u00faltima versi\u00f3n de Discourse. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43895.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43895.json index 4f50c3379ae..f94d9babecf 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43895.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43895.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43895", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:04.333", - "lastModified": "2024-09-10T18:08:57.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T12:15:04.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -108,6 +108,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/5357141b4c2e2b332b6f11607ba8c5fbc2669a10", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/70275bb960c71d313254473d38c14e7101cee5ad", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json index df10ce807d2..b6368ec8238 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43918", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:29.010", - "lastModified": "2024-09-06T15:51:25.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T13:01:57.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:woobewoo:product_table:*:*:pro:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:woobewoo:product_table:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "1.9.5", - "matchCriteriaId": "1492771E-D665-4404-B3CA-50720F09EE17" + "matchCriteriaId": "4095B3CB-E5E7-408F-83F5-8BF7F6EE8C77" } ] } diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43939.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43939.json index 41fb1274826..992ed897a8a 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43939.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43939", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:29.633", - "lastModified": "2024-08-30T16:29:15.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T13:09:09.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43940.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43940.json index 4d725a6d079..e8485322406 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43940.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43940.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43940", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:29.833", - "lastModified": "2024-08-30T16:27:22.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T13:11:52.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json index 7557c7af729..0767ad46c1b 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44068.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44068", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T19:15:09.907", - "lastModified": "2024-10-07T19:37:23.523", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the m2m scaler driver in Samsung Mobile Processor and Wearable Processor Exynos 9820, 9825, 980, 990, 850,and W920. A Use-After-Free in the mobile processor leads to privilege escalation." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el controlador del escalador m2m en los procesadores m\u00f3viles y port\u00e1tiles Samsung Exynos 9820, 9825, 980, 990, 850 y W920. Un error de uso despu\u00e9s de la liberaci\u00f3n en el procesador m\u00f3vil provoca una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json index 3a42fd98b3a..db9a088ac31 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44349.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44349", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T17:15:54.027", - "lastModified": "2024-10-08T19:35:17.550", - "vulnStatus": "Received", + "lastModified": "2024-10-10T13:15:14.273", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el portal de inicio de sesi\u00f3n en AnteeoWMS anterior a v4.7.34 permite a atacantes no autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de nombre de usuario y la divulgaci\u00f3n de algunos datos en la base de datos subyacente." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://cybergon.com/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/AndreaF17/PoC-CVE-2024-44349", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-446xx/CVE-2024-44674.json b/CVE-2024/CVE-2024-446xx/CVE-2024-44674.json index 7a488ee1c86..c38e9304f17 100644 --- a/CVE-2024/CVE-2024-446xx/CVE-2024-44674.json +++ b/CVE-2024/CVE-2024-446xx/CVE-2024-44674.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44674", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T18:15:04.590", - "lastModified": "2024-10-07T20:35:07.293", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link COVR-2600R FW101b05 is vulnerable to Buffer Overflow. In the function sub_24E28, the HTTP_REFERER is obtained through an environment variable, and this field is controllable, allowing it to be used as the value for src." + }, + { + "lang": "es", + "value": "D-Link COVR-2600R FW101b05 es vulnerable a desbordamiento de b\u00fafer. En la funci\u00f3n sub_24E28, el HTTP_REFERER se obtiene a trav\u00e9s de una variable de entorno y este campo es controlable, lo que permite utilizarlo como valor para src." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45051.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45051.json index c61d93af419..a26e0a6d9ef 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45051.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45051.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45051", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:16.930", - "lastModified": "2024-10-07T21:15:16.930", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. Una direcci\u00f3n de correo electr\u00f3nico manipulada con fines malintencionados podr\u00eda permitir a un atacante eludir las restricciones basadas en dominios y obtener acceso a sitios, categor\u00edas o grupos privados. Este problema se ha corregido en la \u00faltima versi\u00f3n estable, beta y de pruebas aprobadas de Discourse. Se recomienda a todos los usuarios del \u00e1rea que actualicen la versi\u00f3n. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json index 58c13bda176..f674bd29c3b 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45060", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.170", - "lastModified": "2024-10-07T21:15:17.170", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. One of the sample scripts in PhpSpreadsheet is susceptible to a cross-site scripting (XSS) vulnerability due to improper handling of input where a number is expected leading to formula injection. The code in in `45_Quadratic_equation_solver.php` concatenates the user supplied parameters directly into spreadsheet formulas. This allows an attacker to take control over the formula and output unsanitized data into the page, resulting in JavaScript execution. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "PHPSpreadsheet es una librer\u00eda PHP pura para leer y escribir archivos de hojas de c\u00e1lculo. Uno de los scripts de muestra de PhpSpreadsheet es susceptible a una vulnerabilidad de cross-site scripting (XSS) debido a un manejo inadecuado de la entrada donde se espera un n\u00famero, lo que lleva a la inyecci\u00f3n de f\u00f3rmulas. El c\u00f3digo en `45_Quadratic_equation_solver.php` concatena los par\u00e1metros suministrados por el usuario directamente en f\u00f3rmulas de hojas de c\u00e1lculo. Esto permite que un atacante tome el control de la f\u00f3rmula y muestre datos no saneados en la p\u00e1gina, lo que resulta en la ejecuci\u00f3n de JavaScript. Este problema se ha solucionado en las versiones de lanzamiento 1.29.2, 2.1.1 y 2.3.0. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json index 689f6f446eb..19a4ee92856 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45115", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:03.127", - "lastModified": "2024-10-10T10:15:03.127", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json index f81e8076e84..1fbb40c7593 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45116", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:03.930", - "lastModified": "2024-10-10T10:15:03.930", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json index 11cbd52903f..aab71d83bac 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45117", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.150", - "lastModified": "2024-10-10T10:15:04.150", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json index fb02b3900f3..5de33f52a11 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45118", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.357", - "lastModified": "2024-10-10T10:15:04.357", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json index 5da5295fb84..e1ea958c61e 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45119", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.563", - "lastModified": "2024-10-10T10:15:04.563", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json index 9a63b8cb860..f468ed0ff5f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45120", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.787", - "lastModified": "2024-10-10T10:15:04.787", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json index 877a64e20e4..b848b6de78b 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45121", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.997", - "lastModified": "2024-10-10T10:15:04.997", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json index 3c7d0e55374..504d1e13c60 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45122", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:05.200", - "lastModified": "2024-10-10T10:15:05.200", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json index a6dc7352a42..e961d0c3435 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45123", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:05.400", - "lastModified": "2024-10-10T10:15:05.400", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45124.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45124.json index b3293142ba2..6aa4b514250 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45124.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45124", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:05.607", - "lastModified": "2024-10-10T10:15:05.607", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45125.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45125.json index a44148e2072..b4c696bee03 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45125.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45125.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45125", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:05.797", - "lastModified": "2024-10-10T10:15:05.797", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45127.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45127.json index 3f61b1fcf6d..000283ef8b0 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45127.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45127.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45127", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:06.027", - "lastModified": "2024-10-10T10:15:06.027", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45128.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45128.json index b9e3a473253..efd61cde098 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45128.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45128", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:06.230", - "lastModified": "2024-10-10T10:15:06.230", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45129.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45129.json index 8f55a1b28f9..771bd8d61d9 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45129.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45129.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45129", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:06.423", - "lastModified": "2024-10-10T10:15:06.423", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45130.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45130.json index 945a9f500e8..14d0c8ea8bc 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45130.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45130", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:06.700", - "lastModified": "2024-10-10T10:15:06.700", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45131.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45131.json index 6efd1470273..04df0fbb38f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45131.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45131", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:06.913", - "lastModified": "2024-10-10T10:15:06.913", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45132.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45132.json index 2ac1d33573d..0fbe13244c4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45132.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45132", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:07.140", - "lastModified": "2024-10-10T10:15:07.140", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45133.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45133.json index 8c6327fb101..45fe78ef367 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45133.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45133", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:07.340", - "lastModified": "2024-10-10T10:15:07.340", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45134.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45134.json index 071cdf36221..4693283b63b 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45134.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45134", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:07.540", - "lastModified": "2024-10-10T10:15:07.540", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45135.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45135.json index d33d90e0ea6..4ad337d2ea8 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45135.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45135", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:07.757", - "lastModified": "2024-10-10T10:15:07.757", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json index c3816a8c841..8808da9aef4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45136", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:13.163", - "lastModified": "2024-10-09T15:15:13.163", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InCopy versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution by an attacker. An attacker could exploit this vulnerability by uploading a malicious file which can then be executed on the server. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 19.4, 18.5.3 y anteriores de InCopy se ven afectadas por una vulnerabilidad de carga sin restricciones de archivos de tipo peligroso que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario por parte de un atacante. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo malicioso que luego se puede ejecutar en el servidor. Para aprovechar este problema se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json index 7efd7b05cfd..aa11b7cf638 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45137", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:13.373", - "lastModified": "2024-10-09T15:15:13.373", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions 19.4, 18.5.3 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by uploading a malicious file which, when executed, could run arbitrary code in the context of the server. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 19.4, 18.5.3 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo malicioso que, al ejecutarse, podr\u00eda ejecutar c\u00f3digo arbitrario en el contexto del servidor. Para aprovechar este problema se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json index 365fdf5ec25..3a450776b04 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45138", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:05.723", - "lastModified": "2024-10-09T14:15:05.723", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json index d7a36609446..371a4ea415f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45139", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:05.947", - "lastModified": "2024-10-09T14:15:05.947", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json index bfddf806352..6870fd9358d 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45140", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.167", - "lastModified": "2024-10-09T14:15:06.167", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json index d304dd3dab5..d90db3b74bc 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45141", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.380", - "lastModified": "2024-10-09T14:15:06.380", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json index 21cc8282e7a..608f0b745d4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45142", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.583", - "lastModified": "2024-10-09T14:15:06.583", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de condici\u00f3n de escritura de lo que se escribe y lo que se escribe, que podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario en el contexto del usuario actual. Esta vulnerabilidad permite a un atacante escribir un valor controlado en una ubicaci\u00f3n de memoria arbitraria, lo que puede provocar la ejecuci\u00f3n de c\u00f3digo. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json index 1900c023ef9..6f52b44300a 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45143", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.783", - "lastModified": "2024-10-09T14:15:06.783", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json index 6699695fda9..41e55de8e20 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45144", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.973", - "lastModified": "2024-10-09T14:15:06.973", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json index 957f89c8d81..5b08ab65fb3 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45145", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:03.283", - "lastModified": "2024-10-09T10:15:03.283", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lightroom Desktop versions 7.4.1, 13.5, 12.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 7.4.1, 13.5, 12.5.1 y anteriores de Lightroom Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json index 82daa11a4c4..9f9d9dd0f86 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45146", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T09:15:05.693", - "lastModified": "2024-10-09T09:15:05.693", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dimension versions 4.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 4.0.3 y anteriores de Dimension se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json index d119ccd687f..c646630fa4e 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45148", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:07.963", - "lastModified": "2024-10-10T10:15:07.963", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45149.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45149.json index 8966d4071c5..3db6eab2ed1 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45149.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45149", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:08.170", - "lastModified": "2024-10-10T10:15:08.170", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json index 06f75de74be..40109b3d305 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45150", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T09:15:06.210", - "lastModified": "2024-10-09T09:15:06.210", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dimension versions 4.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 4.0.3 y anteriores de Dimension se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json index 663722d7d4f..9022d8bfb9f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45152", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:07.183", - "lastModified": "2024-10-09T14:15:07.183", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.3 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45160.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45160.json index a9b278ce212..a717a030256 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45160.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45160", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T05:15:13.343", - "lastModified": "2024-10-09T21:35:10.460", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45179.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45179.json index f795f4a95da..a8803c419a0 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45179.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45179.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45179", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T04:15:09.487", - "lastModified": "2024-10-09T14:35:11.783", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json index f71d769bddf..46e796ff202 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45230", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T16:15:11.903", - "lastModified": "2024-10-08T16:15:11.903", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 5.1 anterior a 5.1.1, 5.0 anterior a 5.0.9 y 4.2 anterior a 4.2.16. Los filtros de plantilla urlize() y urlizetrunc() est\u00e1n sujetos a un posible ataque de denegaci\u00f3n de servicio mediante entradas muy grandes con una secuencia espec\u00edfica de caracteres." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json index e86792ce175..e749eb5e956 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45231", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T16:15:11.997", - "lastModified": "2024-10-08T16:15:11.997", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django v5.1.1, v5.0.9 y v4.2.16. La clase django.contrib.auth.forms.PasswordResetForm, cuando se utiliza en una vista que implementa flujos de restablecimiento de contrase\u00f1a, permite a atacantes remotos enumerar las direcciones de correo electr\u00f3nico de los usuarios mediante el env\u00edo de solicitudes de restablecimiento de contrase\u00f1a y la observaci\u00f3n del resultado (solo cuando el env\u00edo de correo electr\u00f3nico falla constantemente)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45277.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45277.json index 906f91cb2bb..ea3426de7e2 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45277.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45277.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45277", "sourceIdentifier": "cna@sap.com", "published": "2024-10-08T04:15:08.133", - "lastModified": "2024-10-08T10:15:04.770", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SAP HANA Node.js client package versions from 2.0.0 before 2.21.31 is impacted by Prototype Pollution vulnerability allowing an attacker to add arbitrary properties to global object prototypes. This is due to improper user input sanitation when using the nestTables feature causing low impact on the availability of the application. This has no impact on Confidentiality and Integrity." + }, + { + "lang": "es", + "value": "Las versiones del paquete de cliente SAP HANA Node.js de la 2.0.0 anterior a la 2.21.31 se ven afectadas por la vulnerabilidad de contaminaci\u00f3n de prototipos, que permite a un atacante agregar propiedades arbitrarias a los prototipos de objetos globales. Esto se debe a una desinfecci\u00f3n inadecuada de la entrada del usuario al utilizar la funci\u00f3n nestTables, lo que tiene un impacto bajo en la disponibilidad de la aplicaci\u00f3n. Esto no tiene impacto en la confidencialidad ni la integridad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45278.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45278.json index 9e8135d4ea9..08990486bbb 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45278.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45278.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45278", "sourceIdentifier": "cna@sap.com", "published": "2024-10-08T04:15:08.400", - "lastModified": "2024-10-08T04:15:08.400", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Commerce Backoffice does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application." + }, + { + "lang": "es", + "value": "SAP Commerce Backoffice no codifica lo suficiente las entradas controladas por el usuario, lo que genera una vulnerabilidad de tipo Cross-Site Scripting (XSS). Despu\u00e9s de una explotaci\u00f3n exitosa, un atacante puede causar un impacto limitado en la confidencialidad e integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45282.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45282.json index a35175b8947..ee634e3d483 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45282.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45282.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45282", "sourceIdentifier": "cna@sap.com", "published": "2024-10-08T04:15:08.633", - "lastModified": "2024-10-08T04:15:08.633", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fields which are in 'read only' state in Bank Statement Draft in Manage Bank Statements application, could be modified by MERGE method. The property of an OData entity representing assumably immutable method is not protected against external modifications leading to integrity violations. Confidentiality and Availability are not impacted." + }, + { + "lang": "es", + "value": "Los campos que est\u00e1n en estado de \"solo lectura\" en Bank Statement Draft in Manage Bank Statements application. La propiedad de una entidad OData que representa un m\u00e9todo supuestamente inmutable no est\u00e1 protegida contra modificaciones externas que provoquen violaciones de integridad. La confidencialidad y la disponibilidad no se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json index ed13e5f2fdf..7e58022f7cb 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45290", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.397", - "lastModified": "2024-10-07T21:15:17.397", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "PHPSpreadsheet es una librer\u00eda PHP pura para leer y escribir archivos de hojas de c\u00e1lculo. Un atacante puede crear un archivo XLSX que vincule archivos multimedia desde URL externas. Al abrir el archivo XLSX, PhpSpreadsheet recupera el tama\u00f1o y el tipo de imagen leyendo el contenido del archivo, si la ruta proporcionada es una URL. Al usar URL `php://filter` especialmente manipulada, un atacante puede filtrar el contenido de cualquier archivo o URL. Tenga en cuenta que esta vulnerabilidad es diferente de GHSA-w9xv-qf98-ccq4 y reside en un componente diferente. Un atacante puede acceder a cualquier archivo del servidor o filtrar informaci\u00f3n de URL arbitrarias, lo que podr\u00eda exponer informaci\u00f3n confidencial, como las credenciales de AWS IAM. Este problema se ha solucionado en las versiones de lanzamiento 1.29.2, 2.1.1 y 2.3.0. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json index 4c425b744c2..0983cc9f88a 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45291", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.633", - "lastModified": "2024-10-07T21:15:17.633", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file that links images from arbitrary paths. When embedding images has been enabled in HTML writer with `$writer->setEmbedImages(true);` those files will be included in the output as `data:` URLs, regardless of the file's type. Also URLs can be used for embedding, resulting in a Server-Side Request Forgery vulnerability. When embedding images has been enabled, an attacker can read arbitrary files on the server and perform arbitrary HTTP GET requests. Note that any PHP protocol wrappers can be used, meaning that if for example the `expect://` wrapper is enabled, also remote code execution is possible. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. there are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "PHPSpreadsheet es una librer\u00eda PHP pura para leer y escribir archivos de hojas de c\u00e1lculo. Un atacante puede construir un archivo XLSX que vincule im\u00e1genes desde rutas arbitrarias. Cuando se ha habilitado la incrustaci\u00f3n de im\u00e1genes en el escritor HTML con `$writer->setEmbedImages(true);`, esos archivos se incluir\u00e1n en la salida como URL `data:`, independientemente del tipo de archivo. Tambi\u00e9n se pueden usar URL para incrustar, lo que da como resultado una vulnerabilidad de Server-Side Request Forgery. Cuando se ha habilitado la incrustaci\u00f3n de im\u00e1genes, un atacante puede leer archivos arbitrarios en el servidor y realizar solicitudes HTTP GET arbitrarias. Tenga en cuenta que se puede utilizar cualquier contenedor de protocolo PHP, lo que significa que si, por ejemplo, se habilita el contenedor `expect://`, tambi\u00e9n es posible la ejecuci\u00f3n remota de c\u00f3digo. Este problema se ha solucionado en las versiones de lanzamiento 1.29.2, 2.1.1 y 2.3.0. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json index e8f60ef89bc..bf9529ed713 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45292.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45292", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:05.857", - "lastModified": "2024-10-07T20:15:05.857", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. `\\PhpOffice\\PhpSpreadsheet\\Writer\\Html` does not sanitize \"javascript:\" URLs from hyperlink `href` attributes, resulting in a Cross-Site Scripting vulnerability. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "PHPSpreadsheet es una librer\u00eda PHP pura para leer y escribir archivos de hojas de c\u00e1lculo. `\\PhpOffice\\PhpSpreadsheet\\Writer\\Html` no elimina las URL \"javascript:\" de los atributos de hiperv\u00ednculo `href`, lo que genera una vulnerabilidad de cross-site scripting. Este problema se ha solucionado en las versiones de lanzamiento 1.29.2, 2.1.1 y 2.3.0. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json index bd0adda4ff3..3a32be6b074 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45293.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45293", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:06.100", - "lastModified": "2024-10-07T20:15:06.100", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. The security scanner responsible for preventing XXE attacks in the XLSX reader can be bypassed by slightly modifying the XML structure, utilizing white-spaces. On servers that allow users to upload their own Excel (XLSX) sheets, Server files and sensitive information can be disclosed by providing a crafted sheet. The security scan function in src/PhpSpreadsheet/Reader/Security/XmlScanner.php contains a flawed XML encoding check to retrieve the input file's XML encoding in the toUtf8 function. The function searches for the XML encoding through a defined regex which looks for `encoding=\"*\"` and/or `encoding='*'`, if not found, it defaults to the UTF-8 encoding which bypasses the conversion logic. This logic can be used to pass a UTF-7 encoded XXE payload, by utilizing a whitespace before or after the = in the attribute definition. Sensitive information disclosure through the XXE on sites that allow users to upload their own excel spreadsheets, and parse them using PHPSpreadsheet's Excel parser. This issue has been addressed in release versions 1.29.1, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "PHPSpreadsheet es una librer\u00eda PHP pura para leer y escribir archivos de hojas de c\u00e1lculo. El esc\u00e1ner de seguridad responsable de prevenir ataques XXE en el lector XLSX se puede eludir modificando ligeramente la estructura XML, utilizando espacios en blanco. En servidores que permiten a los usuarios cargar sus propias hojas de Excel (XLSX), los archivos del servidor y la informaci\u00f3n confidencial se pueden divulgar proporcionando una hoja manipulada. La funci\u00f3n de escaneo de seguridad en src/PhpSpreadsheet/Reader/Security/XmlScanner.php contiene una comprobaci\u00f3n de codificaci\u00f3n XML defectuosa para recuperar la codificaci\u00f3n XML del archivo de entrada en la funci\u00f3n toUtf8. La funci\u00f3n busca la codificaci\u00f3n XML a trav\u00e9s de una expresi\u00f3n regular definida que busca `encoding=\"*\"` y/o `encoding='*'`, si no se encuentra, se utiliza de forma predeterminada la codificaci\u00f3n UTF-8 que elude la l\u00f3gica de conversi\u00f3n. Esta l\u00f3gica se puede utilizar para pasar un payload XXE codificada en UTF-7, utilizando un espacio en blanco antes o despu\u00e9s del = en la definici\u00f3n del atributo. Divulgaci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s de XXE en sitios que permiten a los usuarios cargar sus propias hojas de c\u00e1lculo de Excel y analizarlas mediante el analizador de Excel de PHPSpreadsheet. Este problema se ha solucionado en las versiones de lanzamiento 1.29.1, 2.1.1 y 2.3.0. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45297.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45297.json index 285e6f896b8..a5d2c11823d 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45297.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45297.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45297", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.870", - "lastModified": "2024-10-07T21:15:17.870", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. Los usuarios pueden ver temas con una etiqueta oculta si conocen la etiqueta o el nombre de esa etiqueta. Este problema se ha corregido en la \u00faltima versi\u00f3n estable, beta y de pruebas aprobadas de Discourse. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45330.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45330.json index 2d7ae032a4c..73cffb68d41 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45330.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45330.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45330", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-10-08T15:15:15.010", - "lastModified": "2024-10-08T15:15:15.010", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of externally-controlled format string in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.2 through 7.2.5 allows attacker to escalate its privileges via specially crafted requests." + }, + { + "lang": "es", + "value": "El uso de una cadena de formato controlada externamente en las versiones 7.4.0 a 7.4.3 y 7.2.2 a 7.2.5 de Fortinet FortiAnalyzer permite a un atacante aumentar sus privilegios a trav\u00e9s de solicitudes especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json index 2d30fc69d6d..03b5a701829 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45382", "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:08.873", - "lastModified": "2024-10-08T04:15:08.873", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through out-of-bounds write." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.1.0 y versiones anteriores se permite que un atacante local provoque DOS a trav\u00e9s de escritura fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json index 9cfb17e9f9c..3619002a0e6 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45463", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.080", - "lastModified": "2024-10-08T09:15:12.080", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites m\u00e1s all\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json index 57a1cfdcb59..16a2988e3d4 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45464", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.370", - "lastModified": "2024-10-08T09:15:12.370", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites m\u00e1s all\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json index fe9d6136ddc..13d47bc80a0 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45465", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.640", - "lastModified": "2024-10-08T09:15:12.640", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites m\u00e1s all\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json index 32489051d46..6fcf21563d7 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45466", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.903", - "lastModified": "2024-10-08T09:15:12.903", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una lectura fuera de los l\u00edmites m\u00e1s all\u00e1 del final de una estructura asignada mientras se analizan archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json index 358b0ac1092..43e060aed46 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45467", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.180", - "lastModified": "2024-10-08T09:15:13.180", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json index ddf2d569f31..7315a1cfd9b 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45468", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.443", - "lastModified": "2024-10-08T09:15:13.443", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos WRL especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json index d858f8488fa..a7ad72a4195 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45469", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.757", - "lastModified": "2024-10-08T09:15:13.757", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una vulnerabilidad de escritura fuera de los l\u00edmites al analizar un archivo WRL especialmente manipulado. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json index 966879634a3..1ea7909d7bd 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45470", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.973", - "lastModified": "2024-10-08T09:15:13.973", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una vulnerabilidad de escritura fuera de los l\u00edmites al analizar un archivo WRL especialmente manipulado. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json index 740d6d01268..54415606e43 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45471", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:14.293", - "lastModified": "2024-10-08T09:15:14.293", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.\r\nThis could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una vulnerabilidad de escritura fuera de los l\u00edmites al analizar un archivo WRL especialmente manipulado. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json index 718e8fdd57f..1babe334642 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45472", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:14.557", - "lastModified": "2024-10-08T09:15:14.557", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos WRL especialmente manipulados. Un atacante podr\u00eda aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json index 4aa3aeb4767..c80c525326a 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45473", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:14.860", - "lastModified": "2024-10-08T09:15:14.860", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos WRL especialmente manipulados. Un atacante podr\u00eda aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json index 5e4263736ef..b588bd12b04 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45474", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:15.090", - "lastModified": "2024-10-08T09:15:15.090", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos WRL especialmente manipulados. Un atacante podr\u00eda aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json index afe32bd62f6..2e23688a0f8 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45475", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:15.457", - "lastModified": "2024-10-08T09:15:15.457", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos WRL especialmente manipulados. Un atacante podr\u00eda aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json index 7b8175a2a3f..968698dd0c5 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45476", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:15.830", - "lastModified": "2024-10-08T09:15:15.830", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted WRL files. An attacker could leverage this vulnerability to crash the application causing denial of service condition." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2302 (todas las versiones anteriores a V2302.0016) y Tecnomatix Plant Simulation V2404 (todas las versiones anteriores a V2404.0005). Las aplicaciones afectadas contienen una vulnerabilidad de desreferencia de puntero nulo al analizar archivos WRL especialmente manipulados. Un atacante podr\u00eda aprovechar esta vulnerabilidad para bloquear la aplicaci\u00f3n y provocar una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json index 5fe2eb39f6e..e0a33cc74b7 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45720", "sourceIdentifier": "security@apache.org", "published": "2024-10-09T13:15:11.337", - "lastModified": "2024-10-09T13:15:11.337", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\n\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\n\nSubversion is not affected on UNIX-like platforms." + }, + { + "lang": "es", + "value": "En las plataformas Windows, una conversi\u00f3n de codificaci\u00f3n de caracteres de \"ajuste \u00f3ptimo\" de argumentos de l\u00ednea de comandos a ejecutables de Subversion (por ejemplo, svn.exe, etc.) puede provocar una interpretaci\u00f3n inesperada de los argumentos de l\u00ednea de comandos, incluida la inyecci\u00f3n de argumentos y la ejecuci\u00f3n de otros programas, si se procesa una cadena de argumentos de l\u00ednea de comandos especialmente manipulada. Todas las versiones de Subversion hasta Subversion 1.14.3 incluida se ven afectadas solo en plataformas Windows. Se recomienda a los usuarios actualizar a la versi\u00f3n Subversion 1.14.4, que soluciona este problema. Subversion no se ve afectado en plataformas tipo UNIX." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json index 3343e7c0cb1..dcb6f501f19 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45746", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T17:15:19.727", - "lastModified": "2024-10-09T17:15:19.727", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Trusted Firmware-M hasta 2.1.0. Los mensajes de buz\u00f3n proporcionados (y controlados) por el usuario contienen un puntero a una lista de argumentos de entrada (in_vec) y argumentos de salida (out_vec). Estos punteros de lista nunca se validan. Cada lista de argumentos contiene un puntero de b\u00fafer y un campo de longitud de b\u00fafer. Despu\u00e9s de una llamada PSA, la longitud de los argumentos de salida detr\u00e1s del puntero sin marcar se actualiza en mailbox_direct_reply, independientemente del resultado de la llamada. Esto permite que un atacante escriba en cualquier parte del firmware seguro, lo que se puede utilizar para tomar el control del flujo de control, lo que conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45873.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45873.json index e7605525bdc..39056985049 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45873.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45873", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T22:15:02.993", - "lastModified": "2024-10-08T14:35:03.647", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45874.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45874.json index 6931f9c6e9e..361543d3861 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45874.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45874", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T22:15:03.077", - "lastModified": "2024-10-08T14:35:04.530", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json index e2d1a87bfe1..be85e9099fa 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45880", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T15:15:15.217", - "lastModified": "2024-10-08T16:35:06.407", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el enrutador Motorola CX2L v1.0.2 y versiones anteriores. La vulnerabilidad est\u00e1 presente en la funci\u00f3n SetStationSettings. El sistema invoca directamente la funci\u00f3n del sistema para ejecutar comandos para configurar par\u00e1metros como la direcci\u00f3n MAC sin el filtrado de entrada adecuado. Esto permite que los usuarios malintencionados inyecten y ejecuten comandos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json index 02ec535244b..ec34d9bda6c 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45894", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T19:15:09.980", - "lastModified": "2024-10-07T19:15:09.980", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "BlueCMS 1.6 suffers from Arbitrary File Deletion via the file_name parameter in an /admin/database.php?act=del request." + }, + { + "lang": "es", + "value": "BlueCMS 1.6 sufre una eliminaci\u00f3n arbitraria de archivos a trav\u00e9s del par\u00e1metro file_name en una solicitud /admin/database.php?act=del." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json index adde3de4b4e..19c40968260 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45918.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45918", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T17:15:54.120", - "lastModified": "2024-10-08T17:15:54.120", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fujian Kelixin Communication Command and Dispatch Platform <=7.6.6.4391 is vulnerable to SQL Injection via /client/get_gis_fence.php." + }, + { + "lang": "es", + "value": "Fujian Kelixin Communication Command and Dispatch Platform <=7.6.6.4391 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /client/get_gis_fence.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45919.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45919.json index 296ba6ffa67..35f697a62c1 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45919.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45919", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T21:15:18.083", - "lastModified": "2024-10-08T14:35:05.300", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46076.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46076.json index 6d068c9165d..5dabf134559 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46076.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46076", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T18:15:04.653", - "lastModified": "2024-10-07T20:35:09.897", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RuoYi v4.7.9 and before has a security flaw that allows escaping from comments within the code generation feature, enabling the injection of malicious code." + }, + { + "lang": "es", + "value": "RuoYi v4.7.9 y anteriores tienen una falla de seguridad que permite escapar de los comentarios dentro de la funci\u00f3n de generaci\u00f3n de c\u00f3digo, lo que permite la inyecci\u00f3n de c\u00f3digo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json index dcdb0ebee42..298adf2804f 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46237", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T14:15:07.393", - "lastModified": "2024-10-09T14:15:07.393", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) via the patname, pataddress, and medhis parameters in doctor/add-patient.php and doctor/edit-patient.php." + }, + { + "lang": "es", + "value": "PHPGurukul Hospital Management System 4.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de los par\u00e1metros patname, pataddress y medhis en doctor/add-patient.php y doctor/edit-patient.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json index dc797869d0e..7833d9dd45f 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46292.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46292", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T16:15:04.373", - "lastModified": "2024-10-09T17:35:14.650", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer en modsecurity v3.0.12 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una entrada manipulada insertada en el par\u00e1metro de nombre." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json index 53e4205b960..de9fbdbc5e3 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46304.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46304", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T16:15:04.437", - "lastModified": "2024-10-09T17:35:15.410", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow vulnerability in libcoap v4.3.5-rc2 and below allows a remote attacker to cause a denial of service via the coap_handle_request_put_block function in src/coap_block.c." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en libcoap v4.3.5-rc2 y anteriores permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n coap_handle_request_put_block en src/coap_block.c." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json index 7e06f7a6893..b3a59a5880b 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46307.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46307", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T17:15:19.813", - "lastModified": "2024-10-09T17:15:19.813", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products." + }, + { + "lang": "es", + "value": "Un vac\u00edo en la l\u00f3gica de pago de Sparkshop v1.16 permite a los atacantes modificar arbitrariamente la cantidad de productos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json index 5d2a577fb0c..8581a5437dd 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46316.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46316", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T16:15:04.487", - "lastModified": "2024-10-09T19:35:08.177", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DrayTek Vigor3900 v1.5.1.6 was discovered to contain a command injection vulnerability via the sub_2C920 function at /cgi-bin/mainfunction.cgi. This vulnerability allows attackers to execute arbitrary commands via supplying a crafted HTTP message." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DrayTek Vigor3900 v1.5.1.6 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_2C920 en /cgi-bin/mainfunction.cgi. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios mediante el suministro de un mensaje HTTP manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46410.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46410.json index 892eeb98321..ee1856e01ea 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46410.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46410", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T18:15:30.480", - "lastModified": "2024-10-09T15:35:16.780", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46539.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46539.json index a9679a6c7f5..8920fff4925 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46539.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46539.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46539", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T18:15:30.580", - "lastModified": "2024-10-08T20:35:12.927", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in the Bluetooth Low Energy (BLE) component of Fire-Boltt Artillery Smart Watch NJ-R6E-10.3 allow attackers to cause a Denial of Service (DoS)." + }, + { + "lang": "es", + "value": "Los permisos inseguros en el componente Bluetooth Low Energy (BLE) del reloj inteligente Fire-Boltt Artillery NJ-R6E-10.3 permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json index 0441016bea2..a201c634ec6 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46590", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:18.067", - "lastModified": "2024-09-24T15:23:47.237", + "lastModified": "2024-10-10T13:14:14.267", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -72,8 +72,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:draytek:vigor3910:*:*:*:*:*:*:*:*", - "matchCriteriaId": "D49ECBAF-1C4F-42BA-8555-73B24BD3E833" + "criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347" } ] } diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46870.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46870.json index 5c284b1c126..6d56594f3ed 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46870.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46870.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46870", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.463", - "lastModified": "2024-10-09T14:15:07.463", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Disable DMCUB timeout for DCN35\n\n[Why]\nDMCUB can intermittently take longer than expected to process commands.\n\nOld ASIC policy was to continue while logging a diagnostic error - which\nworks fine for ASIC without IPS, but with IPS this could lead to a race\ncondition where we attempt to access DCN state while it's inaccessible,\nleading to a system hang when the NIU port is not disabled or register\naccesses that timeout and the display configuration in an undefined\nstate.\n\n[How]\nWe need to investigate why these accesses take longer than expected, but\nfor now we should disable the timeout on DCN35 to avoid this race\ncondition. Since the waits happen only at lower interrupt levels the\nrisk of taking too long at higher IRQ and causing a system watchdog\ntimeout are minimal." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Deshabilitar el tiempo de espera de DMCUB para DCN35 [Por qu\u00e9] DMCUB puede tardar intermitentemente m\u00e1s de lo esperado en procesar comandos. La antigua pol\u00edtica de ASIC era continuar mientras se registra un error de diagn\u00f3stico, lo que funciona bien para ASIC sin IPS, pero con IPS esto podr\u00eda llevar a una condici\u00f3n de ejecuci\u00f3n donde intentamos acceder al estado de DCN mientras es inaccesible, lo que lleva a un bloqueo del sistema cuando el puerto NIU no est\u00e1 deshabilitado o los accesos de registro agotan ese tiempo de espera y la configuraci\u00f3n de pantalla en un estado indefinido. [C\u00f3mo] Necesitamos investigar por qu\u00e9 estos accesos tardan m\u00e1s de lo esperado, pero por ahora debemos deshabilitar el tiempo de espera en DCN35 para evitar esta condici\u00f3n de ejecuci\u00f3n. Dado que las esperas ocurren solo en niveles de interrupci\u00f3n m\u00e1s bajos, el riesgo de tomar demasiado tiempo en IRQ m\u00e1s alto y causar un tiempo de espera del perro guardi\u00e1n del sistema es m\u00ednimo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json index 13467772978..06cae340f70 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46871", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.533", - "lastModified": "2024-10-09T14:15:07.533", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX\n\n[Why & How]\nIt actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller\nnumber to create array dmub_callback & dmub_thread_offload has potential to access\nitem out of array bound. Fix it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Corrija el valor definido para AMDGPU_DMUB_NOTIFICATION_MAX [Por qu\u00e9 y c\u00f3mo] En realidad, expone '6' tipos en la enumeraci\u00f3n dmub_notification_type. No 5. El uso de un n\u00famero menor para crear la matriz dmub_callback y dmub_thread_offload tiene el potencial de acceder a un elemento fuera del l\u00edmite de la matriz. Arr\u00e9glelo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46886.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46886.json index c33b54dfa02..539a2cbc215 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46886.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46886.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46886", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:16.093", - "lastModified": "2024-10-08T09:15:16.093", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web server of affected devices does not properly validate input that is used for a user redirection. This could allow an attacker to make the server redirect the legitimate user to an attacker-chosen URL. For a successful exploit, the legitimate user must actively click on an attacker-crafted link." + }, + { + "lang": "es", + "value": "El servidor web de los dispositivos afectados no valida correctamente la entrada que se utiliza para la redirecci\u00f3n del usuario. Esto podr\u00eda permitir que un atacante haga que el servidor redirija al usuario leg\u00edtimo a una URL elegida por el atacante. Para que la explotaci\u00f3n tenga \u00e9xito, el usuario leg\u00edtimo debe hacer clic activamente en un enlace manipulado por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json index 58f401c6dec..6117d531861 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46887", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:16.447", - "lastModified": "2024-10-08T09:15:16.447", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load." + }, + { + "lang": "es", + "value": "El servidor web de los dispositivos afectados no autentica correctamente la solicitud del usuario al endpoint '/ClientArea/RuntimeInfoData.mwsl'. Esto podr\u00eda permitir que un atacante remoto no autenticado obtenga informaci\u00f3n sobre los tiempos de ciclo m\u00e1ximos reales y configurados actuales, as\u00ed como sobre la carga de comunicaci\u00f3n m\u00e1xima configurada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json index a90f6ceb791..6ec0f6aedab 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47007", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.210", - "lastModified": "2024-10-08T17:15:54.210", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference in WLAvalancheService.exe of Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to cause a denial of service." + }, + { + "lang": "es", + "value": "Una desreferencia de puntero NULL en WLAvalancheService.exe de Ivanti Avalanche anterior a la versi\u00f3n 6.4.5 permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json index a7b734051c8..c7e9d49eb60 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47008", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.463", - "lastModified": "2024-10-08T17:15:54.463", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-side request forgery in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information." + }, + { + "lang": "es", + "value": "Server-side request forgery en Ivanti Avalanche anterior a la versi\u00f3n 6.4.5 permite que un atacante remoto no autenticado filtre informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json index 8b2154637bb..2a263f07afc 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47009", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.777", - "lastModified": "2024-10-08T17:15:54.777", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication." + }, + { + "lang": "es", + "value": "Path Traversal en Ivanti Avalanche anterior a la versi\u00f3n 6.4.5 permite que un atacante remoto no autenticado evite la autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json index defba5fc98b..221b4eaaa2a 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47010", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.240", - "lastModified": "2024-10-08T17:15:55.240", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication." + }, + { + "lang": "es", + "value": "Path Traversal en Ivanti Avalanche anterior a la versi\u00f3n 6.4.5 permite que un atacante remoto no autenticado evite la autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json index a2344581bfb..cce64e67887 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47011", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.533", - "lastModified": "2024-10-08T17:15:55.533", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information" + }, + { + "lang": "es", + "value": "Path Traversal en Ivanti Avalanche antes de la versi\u00f3n 6.4.5 permite que un atacante remoto no autenticado filtre informaci\u00f3n confidencial" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47046.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47046.json index 798e8af3509..563326265eb 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47046.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47046.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47046", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:16.757", - "lastModified": "2024-10-08T09:15:16.757", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Simcenter Nastran 2306 (All versions), Simcenter Nastran 2312 (All versions), Simcenter Nastran 2406 (All versions < V2406.5000). The affected application is vulnerable to memory corruption while parsing specially crafted BDF files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Simcenter Nastran 2306 (todas las versiones), Simcenter Nastran 2312 (todas las versiones) y Simcenter Nastran 2406 (todas las versiones < V2406.5000). La aplicaci\u00f3n afectada es vulnerable a la corrupci\u00f3n de memoria al analizar archivos BDF especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47079.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47079.json index 39025e07d18..60db715a6f5 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47079.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47079", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T20:15:06.400", - "lastModified": "2024-10-07T20:15:06.400", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Meshtastic is an open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices. Meshtastic firmware is an open source firmware implementation for the broader project. The remote hardware module of the firmware does not have proper checks to ensure a remote hardware control message was received should be considered valid. This issue has been addressed in release version 2.5.1. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Meshtastic es una red en malla descentralizada, fuera de la red y de c\u00f3digo abierto dise\u00f1ada para funcionar en dispositivos asequibles y de bajo consumo. El firmware Meshtastic es una implementaci\u00f3n de firmware de c\u00f3digo abierto para un proyecto m\u00e1s amplio. El m\u00f3dulo de hardware remoto del firmware no tiene las comprobaciones adecuadas para garantizar que se reciba un mensaje de control de hardware remoto que se considere v\u00e1lido. Este problema se ha solucionado en la versi\u00f3n 2.5.1. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47095.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47095.json index 2e19aee0506..0f1acd4d8e4 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47095.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47095.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47095", "sourceIdentifier": "33c584b5-0579-4c06-b2a0-8d8329fcab9c", "published": "2024-10-08T08:15:02.237", - "lastModified": "2024-10-08T08:15:02.237", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Follet School Solutions Destiny before v22.0.1 AU1 allows a remote attacker to run arbitrary client-side code via the expiredSupportMessage parameter of handleloginform.do." + }, + { + "lang": "es", + "value": "La vulnerabilidad de cross-site scripting en Follet School Solutions Destiny anterior a v22.0.1 AU1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario del lado del cliente a trav\u00e9s del par\u00e1metro expiredSupportMessage de handleloginform.do." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json index 1f29fe2dbcf..068a0e952ad 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47161.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47161", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-08T16:15:12.147", - "lastModified": "2024-10-08T16:15:12.147", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07.3 password could be exposed via Sonar runner REST API" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.07.3 la contrase\u00f1a podr\u00eda quedar expuesta a trav\u00e9s de la API REST de Sonar runner" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47191.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47191.json index 3129b9e300d..81340b6083d 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47191.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47191.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47191", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T05:15:13.420", - "lastModified": "2024-10-09T21:35:12.200", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json index 00364c24802..cd6f89384fc 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47194", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.047", - "lastModified": "2024-10-08T09:15:17.047", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vish2.exe in affected applications allows a specific DLL file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vish2.exe from a user-writable directory." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en ModelSim (todas las versiones anteriores a V2024.3) y Questa (todas las versiones anteriores a V2024.3). vish2.exe en las aplicaciones afectadas permite cargar un archivo DLL espec\u00edfico desde el directorio de trabajo actual. Esto podr\u00eda permitir que un atacante local autenticado inyecte c\u00f3digo arbitrario y aumente los privilegios en instalaciones donde los administradores o procesos con privilegios elevados ejecutan vish2.exe desde un directorio en el que el usuario puede escribir." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json index 648150549c2..4a9dbe3aad1 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47195", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.300", - "lastModified": "2024-10-08T09:15:17.300", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en ModelSim (todas las versiones < V2024.3), Questa (todas las versiones < V2024.3). gdb.exe en las aplicaciones afectadas permite que se cargue un archivo ejecutable espec\u00edfico desde el directorio de trabajo actual. Esto podr\u00eda permitir que un atacante local autenticado inyecte c\u00f3digo arbitrario y aumente los privilegios en instalaciones donde los administradores o procesos con privilegios elevados ejecutan gdb.exe desde un directorio en el que el usuario puede escribir." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json index 050344a3cbd..9a230f70960 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47196", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.563", - "lastModified": "2024-10-08T09:15:17.563", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en ModelSim (todas las versiones < V2024.3), Questa (todas las versiones < V2024.3). vsimk.exe en las aplicaciones afectadas permite que se cargue un archivo tcl espec\u00edfico desde el directorio de trabajo actual. Esto podr\u00eda permitir que un atacante local autenticado inyecte c\u00f3digo arbitrario y aumente los privilegios en instalaciones donde los administradores o procesos con privilegios elevados ejecutan vsimk.exe desde un directorio en el que el usuario puede escribir." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47334.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47334.json index 8fb219bb68b..9d8c136f9dc 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47334.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47334", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-09T11:15:13.157", - "lastModified": "2024-10-09T11:15:13.157", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho Flow Zoho Flow for WordPress allows SQL Injection.This issue affects Zoho Flow for WordPress: from n/a through 2.7.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Zoho Flow Zoho Flow para WordPress permite la inyecci\u00f3n SQL. Este problema afecta a Zoho Flow para WordPress: desde n/a hasta 2.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47410.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47410.json index 832871304cf..0e503ee975f 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47410.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47410.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47410", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:04.540", - "lastModified": "2024-10-09T10:15:04.540", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basada en pila que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47411.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47411.json index d639178e639..222d90f54ed 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47411.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47411.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47411", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:04.793", - "lastModified": "2024-10-09T10:15:04.793", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de acceso a puntero no inicializado que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47412.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47412.json index 2096b58b657..27af2aa4f38 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47412.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47412.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47412", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:05.017", - "lastModified": "2024-10-09T10:15:05.017", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47413.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47413.json index 3934bfd83f3..e2f6c047d72 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47413.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47413.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47413", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:05.210", - "lastModified": "2024-10-09T10:15:05.210", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47414.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47414.json index 2a04f384977..7bc8cf1f1aa 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47414.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47414.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47414", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:05.417", - "lastModified": "2024-10-09T10:15:05.417", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47415.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47415.json index fca6794a690..57fc5599b04 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47415.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47415.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47415", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:05.627", - "lastModified": "2024-10-09T10:15:05.627", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47416.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47416.json index 50897c4b897..26e5b5fc2ad 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47416.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47416.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47416", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:05.830", - "lastModified": "2024-10-09T10:15:05.830", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de enteros o de envoltura que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47417.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47417.json index b31314b9f4b..e4bca644363 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47417.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47417.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47417", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:06.060", - "lastModified": "2024-10-09T10:15:06.060", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47418.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47418.json index c161f8a6bd8..619392887f0 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47418.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47418.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47418", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:06.277", - "lastModified": "2024-10-09T10:15:06.277", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47419.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47419.json index 9b42c8bff3c..890e8cdf1fb 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47419.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47419.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47419", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:06.480", - "lastModified": "2024-10-09T10:15:06.480", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47420.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47420.json index 23dde9a368b..994105e56b7 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47420.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47420.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47420", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:06.660", - "lastModified": "2024-10-09T10:15:06.660", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.7, 24.0.4 y anteriores de Animate se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json index a37ee345973..64f316655e4 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47421", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:13.977", - "lastModified": "2024-10-09T15:15:13.977", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.6, 2022.4 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites al analizar un archivo manipulado, lo que podr\u00eda provocar una lectura m\u00e1s all\u00e1 del final de una estructura de memoria asignada. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json index 28a1b050551..e7abc37b338 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47422", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.190", - "lastModified": "2024-10-09T15:15:14.190", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious path into the search directories, which the application could unknowingly execute. This could allow the attacker to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2020.6, 2022.4 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de ruta de b\u00fasqueda no confiable que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante podr\u00eda aprovechar esta vulnerabilidad insertando una ruta maliciosa en los directorios de b\u00fasqueda, que la aplicaci\u00f3n podr\u00eda ejecutar sin saberlo. Esto podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el contexto del usuario actual. Para aprovechar este problema se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json index 035859bc46d..605232c31ef 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47423", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.393", - "lastModified": "2024-10-09T15:15:14.393", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by uploading a malicious file which can be automatically processed or executed by the system. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2020.6, 2022.4 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de carga sin restricciones de archivos de tipo peligroso que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante podr\u00eda aprovechar esta vulnerabilidad cargando un archivo malicioso que el sistema pueda procesar o ejecutar autom\u00e1ticamente. Para aprovechar este problema, es necesaria la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json index e62d5d4453b..bac5da8646d 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47424", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.600", - "lastModified": "2024-10-09T15:15:14.600", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.6, 2022.4 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de enteros o de envoltura que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json index 677e5b55511..7fed04d8481 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47425", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.800", - "lastModified": "2024-10-09T15:15:14.800", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.6, 2022.4 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.6, 2022.4 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47553.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47553.json index d49aba0f971..d73b1fa367b 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47553.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47553.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47553", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.847", - "lastModified": "2024-10-08T09:15:17.847", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command.\r\nThis could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Siemens SINEC Security Monitor (todas las versiones anteriores a la V4.9.0). La aplicaci\u00f3n afectada no valida correctamente la entrada del usuario en el comando ```ssmctl-client```. Esto podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios ejecute c\u00f3digo arbitrario con privilegios de root en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47555.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47555.json index f0168a299c6..19ea2ba1b25 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47555.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47555.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47555", "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T18:15:04.787", - "lastModified": "2024-10-07T18:15:04.787", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authentication - User & System Configuration" + }, + { + "lang": "es", + "value": "Autenticaci\u00f3n faltante: configuraci\u00f3n de usuario y sistema" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json index 3b888c8614b..d0747a1c0cf 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47556", "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.057", - "lastModified": "2024-10-07T19:15:10.057", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pre-Auth RCE via Path Traversal" + }, + { + "lang": "es", + "value": "RCE previa a la autorizaci\u00f3n mediante Path Traversal" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json index 3d7f5511234..d1fffe0c30d 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47557", "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.260", - "lastModified": "2024-10-07T19:15:10.260", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pre-Auth RCE via Path Traversal" + }, + { + "lang": "es", + "value": "RCE previa a la autorizaci\u00f3n mediante Path Traversal" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json index e7400f57956..5d7247b07c9 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47558", "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.473", - "lastModified": "2024-10-07T19:15:10.473", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated RCE via Path Traversal" + }, + { + "lang": "es", + "value": "RCE autenticado mediante Path Traversal" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json index a92a60590d4..cc35b369084 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47559", "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.677", - "lastModified": "2024-10-07T19:15:10.677", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated RCE via Path Traversal" + }, + { + "lang": "es", + "value": "RCE autenticado mediante Path Traversal" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47562.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47562.json index 0c7028c7c70..0a50b8eeb76 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47562.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47562.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47562", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:18.110", - "lastModified": "2024-10-08T09:15:18.110", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command.\r\nThis could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Siemens SINEC Security Monitor (todas las versiones anteriores a V4.9.0). La aplicaci\u00f3n afectada no neutraliza correctamente los elementos especiales en la entrada del usuario al comando ```ssmctl-client```. Esto podr\u00eda permitir que un atacante local autenticado y con pocos privilegios ejecute comandos privilegiados en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47563.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47563.json index d49de1fc58d..3a8ab8e271f 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47563.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47563.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47563", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:18.403", - "lastModified": "2024-10-08T09:15:18.403", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files.\r\nThis could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Siemens SINEC Security Monitor (todas las versiones anteriores a la V4.9.0). La aplicaci\u00f3n afectada no valida correctamente la ruta de archivo que se proporciona a un endpoint destinado a crear archivos CSR. Esto podr\u00eda permitir que un atacante remoto no autenticado cree archivos en directorios editables fuera de la ubicaci\u00f3n prevista y, por lo tanto, comprometa la integridad de los archivos en esos directorios editables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47565.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47565.json index 803e696d833..7b6083ef9a9 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47565.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47565.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47565", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:18.730", - "lastModified": "2024-10-08T09:15:18.730", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate that user input complies with a list of allowed values.\r\nThis could allow an authenticated remote attacker to compromise the integrity of the configuration of the affected application." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Siemens SINEC Security Monitor (todas las versiones anteriores a la V4.9.0). La aplicaci\u00f3n afectada no valida correctamente que la entrada del usuario cumpla con una lista de valores permitidos. Esto podr\u00eda permitir que un atacante remoto autenticado comprometa la integridad de la configuraci\u00f3n de la aplicaci\u00f3n afectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47594.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47594.json index 4c84063dc8a..24584825188 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47594.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47594.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47594", "sourceIdentifier": "cna@sap.com", "published": "2024-10-08T04:15:09.087", - "lastModified": "2024-10-08T04:15:09.087", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Enterprise Portal (KMC) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability in KMC servlet. An attacker could craft a script and trick the user into clicking it. When a victim who is registered on the portal clicks on such link, confidentiality and integrity of their web browser session could be compromised." + }, + { + "lang": "es", + "value": "SAP NetWeaver Enterprise Portal (KMC) no codifica lo suficiente las entradas controladas por el usuario, lo que genera una vulnerabilidad de tipo Cross-Site Scripting en el servlet KMC. Un atacante podr\u00eda crear un script y enga\u00f1ar al usuario para que haga clic en \u00e9l. Cuando una v\u00edctima registrada en el portal hace clic en dicho enlace, la confidencialidad e integridad de su sesi\u00f3n de navegador web podr\u00edan verse comprometidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47610.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47610.json index a097ce845a2..82d3f1641a9 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47610.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47610.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47610", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:18.163", - "lastModified": "2024-10-07T21:15:18.163", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InvenTree is an Open Source Inventory Management System. In affected versions of InvenTree it is possible for a registered user to store javascript in markdown notes fields, which are then displayed to other logged in users who visit the same page and executed. The vulnerability has been addressed as follows: 1. HTML sanitization has been enabled in the front-end markdown rendering library - `easymde`. 2. Stored markdown is also validated on the backend, to ensure that malicious markdown is not stored in the database. These changes are available in release versions 0.16.5 and later. All users are advised to upgrade. There are no workarounds, an update is required to get the new validation functions." + }, + { + "lang": "es", + "value": "InvenTree es un sistema de gesti\u00f3n de inventario de c\u00f3digo abierto. En las versiones afectadas de InvenTree, es posible que un usuario registrado almacene javascript en campos de notas de Markdown, que luego se muestran a otros usuarios registrados que visitan la misma p\u00e1gina y se ejecutan. La vulnerabilidad se ha solucionado de la siguiente manera: 1. Se ha habilitado la desinfecci\u00f3n de HTML en la librer\u00eda de renderizado de Markdown del frontend: `easymde`. 2. El Markdown almacenado tambi\u00e9n se valida en el backend, para garantizar que el Markdown malicioso no se almacene en la base de datos. Estos cambios est\u00e1n disponibles en las versiones de lanzamiento 0.16.5 y posteriores. Se recomienda a todos los usuarios que actualicen. No hay workarounds, se requiere una actualizaci\u00f3n para obtener las nuevas funciones de validaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json index 908a54aa8a2..4c1754f4f75 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47658", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.603", - "lastModified": "2024-10-09T14:15:07.603", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: stm32/cryp - call finalize with bh disabled\n\nThe finalize operation in interrupt mode produce a produces a spinlock\nrecursion warning. The reason is the fact that BH must be disabled\nduring this process." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: stm32/cryp - call finalize with bh disabled La operaci\u00f3n finalize en modo de interrupci\u00f3n produce una advertencia de recursi\u00f3n de spinlock. La raz\u00f3n es que BH debe estar deshabilitado durante este proceso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json index bf87405e078..a709c4c5aad 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47659", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.660", - "lastModified": "2024-10-09T14:15:07.660", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmack: tcp: ipv4, fix incorrect labeling\n\nCurrently, Smack mirrors the label of incoming tcp/ipv4 connections:\nwhen a label 'foo' connects to a label 'bar' with tcp/ipv4,\n'foo' always gets 'foo' in returned ipv4 packets. So,\n1) returned packets are incorrectly labeled ('foo' instead of 'bar')\n2) 'bar' can write to 'foo' without being authorized to write.\n\nHere is a scenario how to see this:\n\n* Take two machines, let's call them C and S,\n with active Smack in the default state\n (no settings, no rules, no labeled hosts, only builtin labels)\n\n* At S, add Smack rule 'foo bar w'\n (labels 'foo' and 'bar' are instantiated at S at this moment)\n\n* At S, at label 'bar', launch a program\n that listens for incoming tcp/ipv4 connections\n\n* From C, at label 'foo', connect to the listener at S.\n (label 'foo' is instantiated at C at this moment)\n Connection succeedes and works.\n\n* Send some data in both directions.\n* Collect network traffic of this connection.\n\nAll packets in both directions are labeled with the CIPSO\nof the label 'foo'. Hence, label 'bar' writes to 'foo' without\nbeing authorized, and even without ever being known at C.\n\nIf anybody cares: exactly the same happens with DCCP.\n\nThis behavior 1st manifested in release 2.6.29.4 (see Fixes below)\nand it looks unintentional. At least, no explanation was provided.\n\nI changed returned packes label into the 'bar',\nto bring it into line with the Smack documentation claims." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smack: tcp: ipv4, corregir etiquetado incorrecto Actualmente, Smack refleja la etiqueta de las conexiones entrantes tcp/ipv4: cuando una etiqueta 'foo' se conecta a una etiqueta 'bar' con tcp/ipv4, 'foo' siempre obtiene 'foo' en los paquetes ipv4 devueltos. Por lo tanto, 1) los paquetes devueltos est\u00e1n etiquetados incorrectamente ('foo' en lugar de 'bar') 2) 'bar' puede escribir en 'foo' sin estar autorizado para escribir. Aqu\u00ed hay un escenario para ver esto: * Tome dos m\u00e1quinas, llam\u00e9moslas C y S, con Smack activo en el estado predeterminado (sin configuraciones, sin reglas, sin hosts etiquetados, solo etiquetas incorporadas) * En S, agregue la regla de Smack 'foo bar w' (las etiquetas 'foo' y 'bar' est\u00e1n instanciadas en S en este momento) * En S, en la etiqueta 'bar', inicie un programa que escuche conexiones entrantes tcp/ipv4 * Desde C, en la etiqueta 'foo', con\u00e9ctese al oyente en S. (la etiqueta 'foo' est\u00e1 instanciada en C en este momento) La conexi\u00f3n es exitosa y funciona. * Env\u00ede algunos datos en ambas direcciones. * Recolecte tr\u00e1fico de red de esta conexi\u00f3n. Todos los paquetes en ambas direcciones est\u00e1n etiquetados con el CIPSO de la etiqueta 'foo'. Por lo tanto, la etiqueta 'bar' escribe en 'foo' sin estar autorizada, e incluso sin ser conocida en C. Si a alguien le importa: exactamente lo mismo sucede con DCCP. Este comportamiento se manifest\u00f3 por primera vez en la versi\u00f3n 2.6.29.4 (ver Correcciones a continuaci\u00f3n) y parece no ser intencional. Al menos, no se proporcion\u00f3 ninguna explicaci\u00f3n. Cambi\u00e9 la etiqueta de los paquetes devueltos por \"barra\" para que coincida con lo que afirma la documentaci\u00f3n de Smack." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json index 4eab7e82c29..2dea76731fb 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47660", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.730", - "lastModified": "2024-10-09T14:15:07.730", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: clear PARENT_WATCHED flags lazily\n\nIn some setups directories can have many (usually negative) dentries.\nHence __fsnotify_update_child_dentry_flags() function can take a\nsignificant amount of time. Since the bulk of this function happens\nunder inode->i_lock this causes a significant contention on the lock\nwhen we remove the watch from the directory as the\n__fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask()\nraces with __fsnotify_update_child_dentry_flags() calls from\n__fsnotify_parent() happening on children. This can lead upto softlockup\nreports reported by users.\n\nFix the problem by calling fsnotify_update_children_dentry_flags() to\nset PARENT_WATCHED flags only when parent starts watching children.\n\nWhen parent stops watching children, clear false positive PARENT_WATCHED\nflags lazily in __fsnotify_parent() for each accessed child." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fsnotify: borrar indicadores PARENT_WATCHED de forma diferida En algunas configuraciones, los directorios pueden tener muchas entradas (normalmente negativas). Por lo tanto, la funci\u00f3n __fsnotify_update_child_dentry_flags() puede tardar una cantidad significativa de tiempo. Dado que la mayor parte de esta funci\u00f3n se realiza en inode->i_lock, esto provoca una contenci\u00f3n significativa en el bloqueo cuando eliminamos la vigilancia del directorio, ya que la llamada __fsnotify_update_child_dentry_flags() desde fsnotify_recalc_mask() compite con las llamadas __fsnotify_update_child_dentry_flags() desde __fsnotify_parent() que ocurren en los hijos. Esto puede provocar informes de bloqueo suave informados por los usuarios. Solucione el problema llamando a fsnotify_update_children_dentry_flags() para establecer los indicadores PARENT_WATCHED solo cuando el padre comience a vigilar a los hijos. Cuando el padre deja de vigilar a los hijos, borra los indicadores de falsos positivos PARENT_WATCHED de forma diferida en __fsnotify_parent() para cada hijo al que acceda." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json index b947be5ad32..3025665efd0 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47661", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.020", - "lastModified": "2024-10-09T15:15:15.020", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid overflow from uint32_t to uint8_t\n\n[WHAT & HOW]\ndmub_rb_cmd's ramping_boundary has size of uint8_t and it is assigned\n0xFFFF. Fix it by changing it to uint8_t with value of 0xFF.\n\nThis fixes 2 INTEGER_OVERFLOW issues reported by Coverity." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: evitar el desbordamiento de uint32_t a uint8_t [QU\u00c9 Y C\u00d3MO] El tama\u00f1o de ramping_boundary de dmub_rb_cmd es uint8_t y se le asigna 0xFFFF. Solucione el problema cambi\u00e1ndolo a uint8_t con el valor 0xFF. Esto soluciona 2 problemas de INTEGER_OVERFLOW informados por Coverity." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json index a87933ddece..1bcaca1f6fe 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47662", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.080", - "lastModified": "2024-10-09T15:15:15.080", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Remove register from DCN35 DMCUB diagnostic collection\n\n[Why]\nThese registers should not be read from driver and triggering the\nsecurity violation when DMCUB work times out and diagnostics are\ncollected blocks Z8 entry.\n\n[How]\nRemove the register read from DCN35." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Eliminar registro de la recopilaci\u00f3n de diagn\u00f3sticos DMCUB de DCN35 [Por qu\u00e9] Estos registros no se deben leer desde el controlador y desencadenar la violaci\u00f3n de seguridad cuando el tiempo de trabajo de DMCUB se agota y se recopilan los diagn\u00f3sticos bloquea la entrada Z8. [C\u00f3mo] Eliminar la lectura del registro de DCN35." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json index 0fcda1240ba..b5d68dc5d70 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47663", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.150", - "lastModified": "2024-10-09T15:15:15.150", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: iio: frequency: ad9834: Validate frequency parameter value\n\nIn ad9834_write_frequency() clk_get_rate() can return 0. In such case\nad9834_calc_freqreg() call will lead to division by zero. Checking\n'if (fout > (clk_freq / 2))' doesn't protect in case of 'fout' is 0.\nad9834_write_frequency() is called from ad9834_write(), where fout is\ntaken from text buffer, which can contain any value.\n\nModify parameters checking.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: iio: frequency: ad9834: Validar el valor del par\u00e1metro de frecuencia En ad9834_write_frequency(), clk_get_rate() puede devolver 0. En tal caso, la llamada a ad9834_calc_freqreg() dar\u00e1 lugar a una divisi\u00f3n por cero. La comprobaci\u00f3n de 'if (fout > (clk_freq / 2))' no protege en caso de que 'fout' sea 0. ad9834_write_frequency() se llama desde ad9834_write(), donde fout se toma del b\u00fafer de texto, que puede contener cualquier valor. Comprobaci\u00f3n de modificaci\u00f3n de par\u00e1metros. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json index 7c239c79a62..1971484a490 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47664", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.223", - "lastModified": "2024-10-09T15:15:15.223", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware\n\nIf the value of max_speed_hz is 0, it may cause a division by zero\nerror in hisi_calc_effective_speed().\nThe value of max_speed_hz is provided by firmware.\nFirmware is generally considered as a trusted domain. However, as\ndivision by zero errors can cause system failure, for defense measure,\nthe value of max_speed is validated here. So 0 is regarded as invalid\nand an error code is returned." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: hisi-kunpeng: Agregar verificaci\u00f3n para max_frequency proporcionada por el firmware Si el valor de max_speed_hz es 0, puede causar un error de divisi\u00f3n por cero en hisi_calc_effective_speed(). El valor de max_speed_hz lo proporciona el firmware. El firmware generalmente se considera un dominio confiable. Sin embargo, como los errores de divisi\u00f3n por cero pueden causar fallas del sistema, como medida de defensa, el valor de max_speed se valida aqu\u00ed. Entonces, 0 se considera inv\u00e1lido y se devuelve un c\u00f3digo de error." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json index 5a526039fe3..973f5ffdb5c 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47665", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.290", - "lastModified": "2024-10-09T15:15:15.290", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup\n\nDefinitely condition dma_get_cache_alignment * defined value > 256\nduring driver initialization is not reason to BUG_ON(). Turn that to\ngraceful error out with -EINVAL." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: mipi-i3c-hci: Error en lugar de BUG_ON() en la configuraci\u00f3n de IBI DMA Definitivamente, la condici\u00f3n dma_get_cache_alignment * valor definido > 256 durante la inicializaci\u00f3n del controlador no es motivo para BUG_ON(). Convierta eso en un error elegante con -EINVAL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json index 6fe40368d53..442da0c6169 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47666", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.353", - "lastModified": "2024-10-09T15:15:15.353", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Set phy->enable_completion only when we wait for it\n\npm8001_phy_control() populates the enable_completion pointer with a stack\naddress, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and\nreturns. The problem arises when a phy control response comes late. After\n300 ms the pm8001_phy_control() function returns and the passed\nenable_completion stack address is no longer valid. Late phy control\nresponse invokes complete() on a dangling enable_completion pointer which\nleads to a kernel crash." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: pm80xx: Establecer phy->enable_completion solo cuando lo esperamos pm8001_phy_control() rellena el puntero enable_completion con una direcci\u00f3n de pila, env\u00eda un PHY_LINK_RESET / PHY_HARD_RESET, espera 300 ms y regresa. El problema surge cuando una respuesta de control phy llega tarde. Despu\u00e9s de 300 ms, la funci\u00f3n pm8001_phy_control() regresa y la direcci\u00f3n de pila enable_completion pasada ya no es v\u00e1lida. La respuesta de control phy tard\u00eda invoca complete() en un puntero enable_completion colgante que conduce a un bloqueo del kernel." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json index ab3ab7aa396..6e2123b4b16 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47667", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.430", - "lastModified": "2024-10-09T15:15:15.430", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)\n\nErrata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0\n(SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an\ninbound PCIe TLP spans more than two internal AXI 128-byte bursts,\nthe bus may corrupt the packet payload and the corrupt data may\ncause associated applications or the processor to hang.\n\nThe workaround for Errata #i2037 is to limit the maximum read\nrequest size and maximum payload size to 128 bytes. Add workaround\nfor Errata #i2037 here.\n\nThe errata and workaround is applicable only to AM65x SR 1.0 and\nlater versions of the silicon will have this fixed.\n\n[1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: keystone: Agregar workaround para Errata #i2037 (AM65x SR 1.0) Errata #i2037 en procesadores AM65x/DRA80xM Silicon Revision 1.0 (SPRZ452D_julio de 2018_revisado en diciembre de 2019 [1]) menciona que cuando un TLP PCIe entrante abarca m\u00e1s de dos r\u00e1fagas internas AXI de 128 bytes, el bus puede da\u00f1ar el payload del paquete y los datos da\u00f1ados pueden hacer que las aplicaciones asociadas o el procesador se cuelguen. El workaround para Errata #i2037 es limitar el tama\u00f1o m\u00e1ximo de solicitud de lectura y el tama\u00f1o m\u00e1ximo de payloas a 128 bytes. Agregar workaround para Errata #i2037 aqu\u00ed. La errata y el workaround a son aplicables solo a AM65x SR 1.0 y las versiones posteriores del silicio tendr\u00e1n esto corregido. [1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47668.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47668.json index d127ad92f6f..b1a0e3e18d6 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47668.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47668.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47668", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.513", - "lastModified": "2024-10-09T15:15:15.513", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()\n\nIf we need to increase the tree depth, allocate a new node, and then\nrace with another thread that increased the tree depth before us, we'll\nstill have a preallocated node that might be used later.\n\nIf we then use that node for a new non-root node, it'll still have a\npointer to the old root instead of being zeroed - fix this by zeroing it\nin the cmpxchg failure path." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: lib/generic-radix-tree.c: Se corrige una ejecuci\u00f3n poco frecuente en __genradix_ptr_alloc() Si necesitamos aumentar la profundidad del \u00e1rbol, asignar un nuevo nodo y luego competir con otro hilo que aument\u00f3 la profundidad del \u00e1rbol antes que nosotros, a\u00fan tendremos un nodo preasignado que podr\u00eda usarse m\u00e1s adelante. Si luego usamos ese nodo para un nuevo nodo que no sea ra\u00edz, a\u00fan tendr\u00e1 un puntero a la ra\u00edz anterior en lugar de estar a cero: solucione esto poni\u00e9ndolo a cero en la ruta de falla cmpxchg." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json index 3e498c710fc..ca396eb0b4f 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47669", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.590", - "lastModified": "2024-10-09T15:15:15.590", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix state management in error path of log writing function\n\nAfter commit a694291a6211 (\"nilfs2: separate wait function from\nnilfs_segctor_write\") was applied, the log writing function\nnilfs_segctor_do_construct() was able to issue I/O requests continuously\neven if user data blocks were split into multiple logs across segments,\nbut two potential flaws were introduced in its error handling.\n\nFirst, if nilfs_segctor_begin_construction() fails while creating the\nsecond or subsequent logs, the log writing function returns without\ncalling nilfs_segctor_abort_construction(), so the writeback flag set on\npages/folios will remain uncleared. This causes page cache operations to\nhang waiting for the writeback flag. For example,\ntruncate_inode_pages_final(), which is called via nilfs_evict_inode() when\nan inode is evicted from memory, will hang.\n\nSecond, the NILFS_I_COLLECTED flag set on normal inodes remain uncleared. \nAs a result, if the next log write involves checkpoint creation, that's\nfine, but if a partial log write is performed that does not, inodes with\nNILFS_I_COLLECTED set are erroneously removed from the \"sc_dirty_files\"\nlist, and their data and b-tree blocks may not be written to the device,\ncorrupting the block mapping.\n\nFix these issues by uniformly calling nilfs_segctor_abort_construction()\non failure of each step in the loop in nilfs_segctor_do_construct(),\nhaving it clean up logs and segment usages according to progress, and\ncorrecting the conditions for calling nilfs_redirty_inodes() to ensure\nthat the NILFS_I_COLLECTED flag is cleared." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: fix state management in error path of log writing function Despu\u00e9s de aplicar el commit a694291a6211 (\"nilfs2: separate wait function from nilfs_segctor_write\"), la funci\u00f3n de escritura de registros nilfs_segctor_do_construct() pudo emitir solicitudes de E/S de forma continua incluso si los bloques de datos del usuario se divid\u00edan en varios registros en todos los segmentos, pero se introdujeron dos posibles fallos en su gesti\u00f3n de errores. En primer lugar, si nilfs_segctor_begin_construction() falla al crear el segundo registro o los siguientes, la funci\u00f3n de escritura de registros vuelve sin llamar a nilfs_segctor_abort_construction(), por lo que el indicador de escritura diferida establecido en p\u00e1ginas/folios permanecer\u00e1 sin borrar. Esto hace que las operaciones de cach\u00e9 de p\u00e1gina se cuelguen esperando el indicador de escritura diferida. Por ejemplo, truncate_inode_pages_final(), que se llama a trav\u00e9s de nilfs_evict_inode() cuando se expulsa un inodo de la memoria, se bloquear\u00e1. En segundo lugar, el indicador NILFS_I_COLLECTED establecido en inodos normales permanece sin borrar. Como resultado, si la siguiente escritura de registro implica la creaci\u00f3n de un punto de control, eso est\u00e1 bien, pero si se realiza una escritura de registro parcial que no lo hace, los inodos con NILFS_I_COLLECTED establecido se eliminan por error de la lista \"sc_dirty_files\", y sus bloques de datos y de \u00e1rbol b pueden no escribirse en el dispositivo, lo que corrompe la asignaci\u00f3n de bloques. Solucione estos problemas llamando uniformemente a nilfs_segctor_abort_construction() en caso de falla de cada paso en el bucle en nilfs_segctor_do_construct(), haciendo que limpie los registros y los usos de segmentos seg\u00fan el progreso y corrigiendo las condiciones para llamar a nilfs_redirty_inodes() para garantizar que se borre el indicador NILFS_I_COLLECTED." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47670.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47670.json index 2da48e6055d..5ebfb9327ed 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47670.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47670.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47670", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.673", - "lastModified": "2024-10-09T15:15:15.673", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: add bounds checking to ocfs2_xattr_find_entry()\n\nAdd a paranoia check to make sure it doesn't stray beyond valid memory\nregion containing ocfs2 xattr entries when scanning for a match. It will\nprevent out-of-bound access in case of crafted images." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: agregar comprobaci\u00f3n de los l\u00edmites a ocfs2_xattr_find_entry() Agregue una comprobaci\u00f3n de paranoia para asegurarse de que no se desv\u00ede m\u00e1s all\u00e1 de la regi\u00f3n de memoria v\u00e1lida que contiene entradas xattr de ocfs2 al escanear en busca de una coincidencia. Esto evitar\u00e1 el acceso fuera de los l\u00edmites en caso de im\u00e1genes manipuladas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47671.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47671.json index 4b586daea76..38e2a95abad 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47671.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47671.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47671", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.753", - "lastModified": "2024-10-09T15:15:15.753", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usbtmc: prevent kernel-usb-infoleak\n\nThe syzbot reported a kernel-usb-infoleak in usbtmc_write,\nwe need to clear the structure before filling fields." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: usbtmc: prevent kernel-usb-infoleak El syzbot inform\u00f3 una kernel-usb-infoleak en usbtmc_write, debemos borrar la estructura antes de completar los campos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47672.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47672.json index 2d6fc8efe7d..65e56a60bfb 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47672.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47672.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47672", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.827", - "lastModified": "2024-10-09T15:15:15.827", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead\n\nThere is a WARNING in iwl_trans_wait_tx_queues_empty() (that was\nrecently converted from just a message), that can be hit if we\nwait for TX queues to become empty after firmware died. Clearly,\nwe can't expect anything from the firmware after it's declared dead.\n\nDon't call iwl_trans_wait_tx_queues_empty() in this case. While it could\nbe a good idea to stop the flow earlier, the flush functions do some\nmaintenance work that is not related to the firmware, so keep that part\nof the code running even when the firmware is not running.\n\n[edit commit message]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: no espere colas de transmisi\u00f3n si el firmware est\u00e1 muerto Hay una ADVERTENCIA en iwl_trans_wait_tx_queues_empty() (que se convirti\u00f3 recientemente de solo un mensaje), que puede verse afectada si esperamos a que las colas de transmisi\u00f3n se vac\u00eden despu\u00e9s de que el firmware haya muerto. Claramente, no podemos esperar nada del firmware despu\u00e9s de que se declare muerto. No llame a iwl_trans_wait_tx_queues_empty() en este caso. Si bien podr\u00eda ser una buena idea detener el flujo antes, las funciones de vaciado realizan un trabajo de mantenimiento que no est\u00e1 relacionado con el firmware, as\u00ed que mantenga esa parte del c\u00f3digo en ejecuci\u00f3n incluso cuando el firmware no se est\u00e9 ejecutando. [editar mensaje de confirmaci\u00f3n]" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47673.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47673.json index 07764b09613..4cfa0b921f4 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47673.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47673.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47673", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.900", - "lastModified": "2024-10-09T15:15:15.900", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: pause TCM when the firmware is stopped\n\nNot doing so will make us send a host command to the transport while the\nfirmware is not alive, which will trigger a WARNING.\n\nbad state = 0\nWARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]\nRIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]\nCall Trace:\n \n iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm]\n iwl_mvm_config_scan+0x198/0x260 [iwlmvm]\n iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm]\n iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm]\n process_one_work+0x29e/0x640\n worker_thread+0x2df/0x690\n ? rescuer_thread+0x540/0x540\n kthread+0x192/0x1e0\n ? set_kthread_struct+0x90/0x90\n ret_from_fork+0x22/0x30" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: pausar TCM cuando el firmware est\u00e1 detenido. No hacerlo har\u00e1 que enviemos un comando de host al transporte mientras el firmware no est\u00e9 vivo, lo que activar\u00e1 una ADVERTENCIA. estado incorrecto = 0 WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] Call Trace: iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm] iwl_mvm_config_scan+0x198/0x260 [iwlmvm] iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm] iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm] process_one_work+0x29e/0x640 worker_thread+0x2df/0x690 ? rescuer_thread+0x540/0x540 kthread+0x192/0x1e0 ? set_kthread_struct+0x90/0x90 ret_from_fork+0x22/0x30 " } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47763.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47763.json index 9b228a80415..3036f26aec4 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47763.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47763.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47763", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T18:15:08.863", - "lastModified": "2024-10-09T18:15:08.863", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime was compiled with Rust 1.80 or prior. The runtime crash is a deterministic process abort when Wasmtime is compiled with Rust 1.81 and later. WebAssembly tail calls are a proposal which relatively recently reached stage 4 in the standardization process. Wasmtime first enabled support for tail calls by default in Wasmtime 21.0.0, although that release contained a bug where it was only on-by-default for some configurations. In Wasmtime 22.0.0 tail calls were enabled by default for all configurations. The specific crash happens when an exported function in a WebAssembly module (or component) performs a `return_call` (or `return_call_indirect` or `return_call_ref`) to an imported host function which captures a stack trace (for example, the host function raises a trap). In this situation, the stack-walking code previously assumed there was always at least one WebAssembly frame on the stack but with tail calls that is no longer true. With the tail-call proposal it's possible to have an entry trampoline appear as if it directly called the exit trampoline. This situation triggers an internal assert in the stack-walking code which raises a Rust `panic!()`. When Wasmtime is compiled with Rust versions 1.80 and prior this means that an `extern \"C\"` function in Rust is raising a `panic!()`. This is technically undefined behavior and typically manifests as a process abort when the unwinder fails to unwind Cranelift-generated frames. When Wasmtime is compiled with Rust versions 1.81 and later this panic becomes a deterministic process abort. Overall the impact of this issue is that this is a denial-of-service vector where a malicious WebAssembly module or component can cause the host to crash. There is no other impact at this time other than availability of a service as the result of the crash is always a crash and no more. This issue was discovered by routine fuzzing performed by the Wasmtime project via Google's OSS-Fuzz infrastructure. We have no evidence that it has ever been exploited by an attacker in the wild. All versions of Wasmtime which have tail calls enabled by default have been patched: * 21.0.x - patched in 21.0.2 * 22.0.x - patched in 22.0.1 * 23.0.x - patched in 23.0.3 * 24.0.x - patched in 24.0.1 * 25.0.x - patched in 25.0.2. Wasmtime versions from 12.0.x (the first release with experimental tail call support) to 20.0.x (the last release with tail-calls off-by-default) have support for tail calls but the support is disabled by default. These versions are not affected in their default configurations, but users who explicitly enabled tail call support will need to either disable tail call support or upgrade to a patched version of Wasmtime. The main workaround for this issue is to disable tail support for tail calls in Wasmtime, for example with `Config::wasm_tail_call(false)`. Users are otherwise encouraged to upgrade to patched versions." + }, + { + "lang": "es", + "value": "Wasmtime es un entorno de ejecuci\u00f3n de c\u00f3digo abierto para WebAssembly. La implementaci\u00f3n de Wasmtime de las llamadas finales de WebAssembly combinadas con los seguimientos de pila puede provocar un bloqueo del entorno de ejecuci\u00f3n en determinados m\u00f3dulos de WebAssembly. El bloqueo del entorno de ejecuci\u00f3n puede ser un comportamiento indefinido si Wasmtime se compil\u00f3 con Rust 1.80 o una versi\u00f3n anterior. El bloqueo del entorno de ejecuci\u00f3n es una interrupci\u00f3n determinista del proceso cuando Wasmtime se compila con Rust 1.81 y versiones posteriores. Las llamadas finales de WebAssembly son una propuesta que hace relativamente poco tiempo lleg\u00f3 a la etapa 4 del proceso de estandarizaci\u00f3n. Wasmtime habilit\u00f3 por primera vez el soporte para llamadas finales de forma predeterminada en Wasmtime 21.0.0, aunque esa versi\u00f3n conten\u00eda un error en el que solo estaba activado de forma predeterminada para algunas configuraciones. En Wasmtime 22.0.0, las llamadas finales estaban habilitadas de forma predeterminada para todas las configuraciones. El fallo espec\u00edfico ocurre cuando una funci\u00f3n exportada en un m\u00f3dulo (o componente) WebAssembly realiza una `return_call` (o `return_call_indirect` o `return_call_ref`) a una funci\u00f3n host importada que captura un seguimiento de la pila (por ejemplo, la funci\u00f3n host genera una trampa). En esta situaci\u00f3n, el c\u00f3digo de recorrido de pila asum\u00eda anteriormente que siempre hab\u00eda al menos un framework WebAssembly en la pila, pero con las llamadas de cola eso ya no es cierto. Con la propuesta de llamada de cola es posible que aparezca un trampol\u00edn de entrada como si llamara directamente al trampol\u00edn de salida. Esta situaci\u00f3n activa una aserci\u00f3n interna en el c\u00f3digo de recorrido de pila que genera un `panic!()` de Rust. Cuando Wasmtime se compila con las versiones 1.80 y anteriores de Rust, esto significa que una funci\u00f3n `extern \"C\"` en Rust est\u00e1 generando un `panic!()`. Este es un comportamiento t\u00e9cnicamente indefinido y normalmente se manifiesta como un aborto del proceso cuando el desenrollador no puede desenrollar los frameworks generados por Cranelift. Cuando Wasmtime se compila con las versiones 1.81 y posteriores de Rust, este p\u00e1nico se convierte en un aborto determinista del proceso. En general, el impacto de este problema es que se trata de un vector de denegaci\u00f3n de servicio en el que un m\u00f3dulo o componente WebAssembly malintencionado puede provocar que el host se bloquee. No hay otro impacto en este momento que no sea la disponibilidad de un servicio, ya que el resultado del bloqueo es siempre un bloqueo y nada m\u00e1s. Este problema fue descubierto por un fuzzing de rutina realizado por el proyecto Wasmtime a trav\u00e9s de la infraestructura OSS-Fuzz de Google. No tenemos evidencia de que un atacante lo haya explotado alguna vez. Todas las versiones de Wasmtime que tienen llamadas de cola habilitadas de manera predeterminada han sido parcheadas: * 21.0.x - parcheado en 21.0.2 * 22.0.x - parcheado en 22.0.1 * 23.0.x - parcheado en 23.0.3 * 24.0.x - parcheado en 24.0.1 * 25.0.x - parcheado en 25.0.2. Las versiones de Wasmtime desde 12.0.x (la primera versi\u00f3n con soporte experimental para llamadas de cola) hasta 20.0.x (la \u00faltima versi\u00f3n con llamadas de cola desactivadas de manera predeterminada) tienen soporte para llamadas de cola, pero el soporte est\u00e1 deshabilitado de manera predeterminada. Estas versiones no se ven afectadas en sus configuraciones predeterminadas, pero los usuarios que habilitaron expl\u00edcitamente el soporte para llamadas de cola deber\u00e1n deshabilitar el soporte para llamadas de cola o actualizar a una versi\u00f3n parcheada de Wasmtime. La principal soluci\u00f3n alternativa para este problema es deshabilitar la compatibilidad con las llamadas de cola en Wasmtime, por ejemplo con `Config::wasm_tail_call(false)`. De lo contrario, se recomienda a los usuarios que actualicen a versiones parcheadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47772.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47772.json index aa2edfc9619..ee14fa4ab17 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47772.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47772.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47772", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:18.383", - "lastModified": "2024-10-07T21:15:18.383", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure." + }, + { + "lang": "es", + "value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. Un atacante puede ejecutar c\u00f3digo JavaScript arbitrario en los navegadores de los usuarios enviando un mensaje de chat manipulado con fines malintencionados y respondi\u00e9ndolo. Este problema solo afecta a los sitios que tienen el CSP deshabilitado. Este problema est\u00e1 corregido en la \u00faltima versi\u00f3n de Discourse. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. Los usuarios que no puedan actualizar la versi\u00f3n deben asegurarse de que el CSP est\u00e9 habilitado en el foro. Los usuarios que actualicen la versi\u00f3n tambi\u00e9n deben considerar habilitar un CSP, as\u00ed como una medida proactiva." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47773.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47773.json index 0781e67eef9..5da746508b4 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47773.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47773.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47773", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:30.720", - "lastModified": "2024-10-08T18:15:30.720", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value." + }, + { + "lang": "es", + "value": "Discourse es una plataforma de c\u00f3digo abierto para debates comunitarios. Un atacante puede realizar varias solicitudes XHR hasta que la cach\u00e9 se envenene con una respuesta sin ning\u00fan dato precargado. Este problema solo afecta a los visitantes an\u00f3nimos del sitio. Este problema se ha solucionado en la \u00faltima versi\u00f3n de Discourse. Se recomienda a los usuarios que actualicen la versi\u00f3n. Los usuarios que no puedan actualizar la versi\u00f3n deben desactivar la cach\u00e9 an\u00f3nima configurando la variable de entorno `DISCOURSE_DISABLE_ANON_CACHE` con un valor que no est\u00e9 vac\u00edo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47780.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47780.json index f3d2e3ad3e9..03521c3670d 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47780.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47780.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47780", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:30.950", - "lastModified": "2024-10-08T18:15:30.950", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. Backend users could see items in the backend page tree without having access if the mounts pointed to pages restricted for their user/group, or if no mounts were configured but the pages allowed access to \"everybody.\" However, affected users could not manipulate these pages. Users are advised to update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework de gesti\u00f3n de contenido gratuito y de c\u00f3digo abierto. Los usuarios del backend pod\u00edan ver elementos en el \u00e1rbol de p\u00e1ginas del backend sin tener acceso si los montajes apuntaban a p\u00e1ginas restringidas para su usuario/grupo, o si no se configuraban montajes pero las p\u00e1ginas permit\u00edan el acceso a \"todos\". Sin embargo, los usuarios afectados no pod\u00edan manipular estas p\u00e1ginas. Se recomienda a los usuarios que actualicen a las versiones 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 de TYPO3 que solucionan el problema descrito. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47781.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47781.json index f144bb82e5e..1fe92b6a0ca 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47781.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47781.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47781", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T22:15:03.133", - "lastModified": "2024-10-07T22:15:03.133", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CreateWiki is an extension used at Miraheze for requesting & creating wikis. The name of requested wikis is not escaped on Special:RequestWikiQueue, so a user can insert arbitrary HTML that is displayed in the request wiki queue when requesting a wiki. If a wiki creator comes across the XSS payload, their user session can be abused to retrieve deleted wiki requests, which typically contains private information. Likewise, this can also be abused on those with the ability to suppress requests to view sensitive information. This issue has been patched with commit `693a220` and all users are advised to apply the patch. Users unable to upgrade should disable Javascript and/or prevent access to the vulnerable page (Special:RequestWikiQueue)." + }, + { + "lang": "es", + "value": "CreateWiki es una extensi\u00f3n que se utiliza en Miraheze para solicitar y crear wikis. El nombre de los wikis solicitados no se escapa en Special:RequestWikiQueue, por lo que un usuario puede insertar HTML arbitrario que se muestra en la cola de solicitudes de wikis cuando solicita una wiki. Si un creador de wiki se encuentra con el payload XSS, su sesi\u00f3n de usuario puede ser utilizada de forma abusiva para recuperar solicitudes de wiki eliminadas, que normalmente contienen informaci\u00f3n privada. Del mismo modo, esto tambi\u00e9n puede ser utilizado de forma abusiva por aquellos que tienen la capacidad de suprimir solicitudes para ver informaci\u00f3n confidencial. Este problema se ha corregido con el commit `693a220` y se recomienda a todos los usuarios que apliquen el parche. Los usuarios que no puedan actualizar deben desactivar Javascript y/o evitar el acceso a la p\u00e1gina vulnerable (Special:RequestWikiQueue)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47782.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47782.json index aa1c133de83..45deecbdf74 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47782.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47782.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47782", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T22:15:03.257", - "lastModified": "2024-10-07T22:15:03.257", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WikiDiscover is an extension designed for use with a CreateWiki managed farm to display wikis. Special:WikiDiscover is a special page that lists all wikis on the wiki farm. However, the special page does not make any effort to escape the wiki name or description. Therefore, if a wiki sets its name and/or description to an XSS payload, the XSS will execute whenever the wiki is shown on Special:WikiDiscover. This issue has been patched with commit `2ce846dd93` and all users are advised to apply that patch. User unable to upgrade should block access to `Special:WikiDiscover`." + }, + { + "lang": "es", + "value": "WikiDiscover es una extensi\u00f3n dise\u00f1ada para usarse con una granja administrada por CreateWiki para mostrar wikis. Special:WikiDiscover es una p\u00e1gina especial que enumera todas las wikis de la granja de wikis. Sin embargo, la p\u00e1gina especial no hace ning\u00fan esfuerzo por escapar del nombre o la descripci\u00f3n de la wiki. Por lo tanto, si una wiki establece su nombre y/o descripci\u00f3n en una carga XSS, el XSS se ejecutar\u00e1 siempre que la wiki se muestre en Special:WikiDiscover. Este problema se ha corregido con el commit `2ce846dd93` y se recomienda a todos los usuarios que apliquen ese parche. Los usuarios que no puedan actualizar deben bloquear el acceso a `Special:WikiDiscover`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json index 73f40c2aca5..99388c90515 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47812", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:13.803", - "lastModified": "2024-10-09T19:15:13.803", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ImportDump is an extension for mediawiki designed to automate user import requests. Anyone who can edit the interface strings of a wiki (typically administrators and interface admins) can embed XSS payloads in the messages for dates, and thus XSS anyone who views Special:RequestImportQueue. This issue has been patched in commit `d054b95` and all users are advised to apply this commit to their branch. Users unable to upgrade may either Prevent access to Special:RequestImportQueue on all wikis, except for the global wiki; and If an interface administrator (or equivalent) level protection is available (which is not provided by default) on the global wiki, protect the affected messages up to that level. This causes the XSS to be virtually useless as users with those rights can already edit Javascript pages. Or Prevent access to Special:RequestImportQueue altogether." + }, + { + "lang": "es", + "value": "ImportDump es una extensi\u00f3n para mediawiki dise\u00f1ada para automatizar las solicitudes de importaci\u00f3n de los usuarios. Cualquiera que pueda editar las cadenas de interfaz de una wiki (normalmente administradores y administradores de interfaz) puede incrustar payloads XSS en los mensajes de fechas y, por tanto, enviar XSS a cualquiera que vea Special:RequestImportQueue. Este problema se ha corregido en el commit `d054b95` y se recomienda a todos los usuarios que apliquen esta confirmaci\u00f3n a su rama. Los usuarios que no puedan actualizar pueden impedir el acceso a Special:RequestImportQueue en todas las wikis, excepto en la wiki global; y si hay disponible una protecci\u00f3n de nivel de administrador de interfaz (o equivalente) (que no se proporciona de forma predeterminada) en la wiki global, proteger los mensajes afectados hasta ese nivel. Esto hace que el XSS sea pr\u00e1cticamente in\u00fatil, ya que los usuarios con esos derechos ya pueden editar p\u00e1ginas de Javascript. O impedir el acceso a Special:RequestImportQueue por completo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47813.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47813.json index 1933c61d079..9200afa87c1 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47813.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47813.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47813", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T18:15:09.120", - "lastModified": "2024-10-09T18:15:09.120", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a `wasmtime::Engine`'s internal type registry was susceptible to double-unregistration bugs due to a race condition, leading to panics and potentially type registry corruption. That registry corruption could, following an additional and particular sequence of concurrent events, lead to violations of WebAssembly's control-flow integrity (CFI) and type safety. Users that do not use `wasmtime::Engine` across multiple threads are not affected. Users that only create new modules across threads over time are additionally not affected. Reproducing this bug requires creating and dropping multiple type instances (such as `wasmtime::FuncType` or `wasmtime::ArrayType`) concurrently on multiple threads, where all types are associated with the same `wasmtime::Engine`. **Wasm guests cannot trigger this bug.** See the \"References\" section below for a list of Wasmtime types-related APIs that are affected. Wasmtime maintains an internal registry of types within a `wasmtime::Engine` and an engine is shareable across threads. Types can be created and referenced through creation of a `wasmtime::Module`, creation of `wasmtime::FuncType`, or a number of other APIs where the host creates a function (see \"References\" below). Each of these cases interacts with an engine to deduplicate type information and manage type indices that are used to implement type checks in WebAssembly's `call_indirect` function, for example. This bug is a race condition in this management where the internal type registry could be corrupted to trigger an assert or contain invalid state. Wasmtime's internal representation of a type has individual types (e.g. one-per-host-function) maintain a registration count of how many time it's been used. Types additionally have state within an engine behind a read-write lock such as lookup/deduplication information. The race here is a time-of-check versus time-of-use (TOCTOU) bug where one thread atomically decrements a type entry's registration count, observes zero registrations, and then acquires a lock in order to unregister that entry. However, between when this first thread observed the zero-registration count and when it acquires that lock, another thread could perform the following sequence of events: re-register another copy of the type, which deduplicates to that same entry, resurrecting it and incrementing its registration count; then drop the type and decrement its registration count; observe that the registration count is now zero; acquire the type registry lock; and finally unregister the type. Now, when the original thread finally acquires the lock and unregisters the entry, it is the second time this entry has been unregistered. This bug was originally introduced in Wasmtime 19's development of the WebAssembly GC proposal. This bug affects users who are not using the GC proposal, however, and affects Wasmtime in its default configuration even when the GC proposal is disabled. Wasmtime users using 19.0.0 and after are all affected by this issue. We have released the following Wasmtime versions, all of which have a fix for this bug: * 21.0.2 * 22.0.1 * 23.0.3 * 24.0.1 * 25.0.2. If your application creates and drops Wasmtime types on multiple threads concurrently, there are no known workarounds. Users are encouraged to upgrade to a patched release." + }, + { + "lang": "es", + "value": "Wasmtime es un entorno de ejecuci\u00f3n de c\u00f3digo abierto para WebAssembly. Bajo ciertas \u00f3rdenes de eventos concurrentes, el registro de tipos interno de `wasmtime::Engine` era susceptible a errores de doble anulaci\u00f3n de registro debido a una condici\u00f3n de ejecuci\u00f3n, lo que provocaba p\u00e1nicos y, potencialmente, corrupci\u00f3n del registro de tipos. Esa corrupci\u00f3n del registro podr\u00eda, despu\u00e9s de una secuencia adicional y particular de eventos concurrentes, provocar violaciones de la integridad del flujo de control (CFI) y la seguridad de tipos de WebAssembly. Los usuarios que no usan `wasmtime::Engine` en varios subprocesos no se ven afectados. Los usuarios que solo crean nuevos m\u00f3dulos en varios subprocesos a lo largo del tiempo tampoco se ven afectados. Para reproducir este error es necesario crear y eliminar varias instancias de tipo (como `wasmtime::FuncType` o `wasmtime::ArrayType`) simult\u00e1neamente en varios subprocesos, donde todos los tipos est\u00e1n asociados con el mismo `wasmtime::Engine`. **Los invitados de Wasm no pueden activar este error.** Consulte la secci\u00f3n \"Referencias\" a continuaci\u00f3n para obtener una lista de las API relacionadas con los tipos de Wasmtime que se ven afectadas. Wasmtime mantiene un registro interno de tipos dentro de un `wasmtime::Engine` y un motor se puede compartir entre subprocesos. Los tipos se pueden crear y referenciar mediante la creaci\u00f3n de un `wasmtime::Module`, la creaci\u00f3n de `wasmtime::FuncType` o una serie de otras API donde el host crea una funci\u00f3n (consulte \"Referencias\" a continuaci\u00f3n). Cada uno de estos casos interact\u00faa con un motor para deduplicar la informaci\u00f3n de tipo y administrar los \u00edndices de tipo que se utilizan para implementar las comprobaciones de tipo en la funci\u00f3n `call_indirect` de WebAssembly, por ejemplo. Este error es una condici\u00f3n de ejecuci\u00f3n en esta gesti\u00f3n donde el registro de tipo interno podr\u00eda estar da\u00f1ado para activar una aserci\u00f3n o contener un estado no v\u00e1lido. La representaci\u00f3n interna de Wasmtime de un tipo tiene tipos individuales (por ejemplo, uno por funci\u00f3n de host) que mantienen un recuento de registro de cu\u00e1ntas veces se ha utilizado. Los tipos tambi\u00e9n tienen un estado dentro de un motor detr\u00e1s de un bloqueo de lectura y escritura, como informaci\u00f3n de b\u00fasqueda o deduplicaci\u00f3n. La ejecuci\u00f3n aqu\u00ed es un error de tiempo de verificaci\u00f3n versus tiempo de uso (TOCTOU) donde un hilo disminuye at\u00f3micamente el recuento de registros de una entrada de tipo, observa cero registros y luego adquiere un bloqueo para anular el registro de esa entrada. Sin embargo, entre el momento en que este primer hilo observ\u00f3 el recuento de registros cero y el momento en que adquiere ese bloqueo, otro hilo podr\u00eda realizar la siguiente secuencia de eventos: volver a registrar otra copia del tipo, que deduplica esa misma entrada, resucit\u00e1ndola e incrementando su recuento de registros; luego, descartar el tipo y disminuir su recuento de registros; observar que el recuento de registros ahora es cero; adquirir el bloqueo de registro de tipo; y finalmente anular el registro del tipo. Ahora, cuando el hilo original finalmente adquiere el bloqueo y anula el registro de la entrada, es la segunda vez que se anula el registro de esta entrada. Este error se introdujo originalmente en el desarrollo de la propuesta de recolecci\u00f3n de elementos no utilizados de WebAssembly en Wasmtime 19. Sin embargo, este error afecta a los usuarios que no utilizan la propuesta de recolecci\u00f3n de elementos no utilizados y afecta a Wasmtime en su configuraci\u00f3n predeterminada incluso cuando la propuesta de recolecci\u00f3n de elementos no utilizados est\u00e1 deshabilitada. Los usuarios de Wasmtime que utilizan la versi\u00f3n 19.0.0 y posteriores se ven afectados por este problema. Hemos publicado las siguientes versiones de Wasmtime, todas las cuales tienen una soluci\u00f3n para este error: * 21.0.2 * 22.0.1 * 23.0.3 * 24.0.1 * 25.0.2. --- truncada ---" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47814.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47814.json index 64ff322da38..d53bfeae027 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47814.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47814.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47814", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T22:15:03.657", - "lastModified": "2024-10-07T22:15:03.657", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Se encontr\u00f3 un Use After Free en Vim anterior a la versi\u00f3n 9.1.0764. Al cerrar un b\u00fafer (visible en una ventana), un comando autom\u00e1tico BufWinLeave puede provocar un Use After Free si este comando autom\u00e1tico vuelve a abrir el mismo b\u00fafer en una nueva ventana dividida. El impacto es bajo, ya que el usuario debe haber configurado intencionalmente un comando autom\u00e1tico tan extra\u00f1o y haber ejecutado algunos comandos de descarga de b\u00fafer. Sin embargo, esto puede provocar un bloqueo. Este problema se ha solucionado en la versi\u00f3n 9.1.0764 y se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json index 58326fdda1a..af7bc0258cf 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47815", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.023", - "lastModified": "2024-10-09T19:15:14.023", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IncidentReporting is a MediaWiki extension for moving incident reports from wikitext to database tables. There are a variety of Cross-site Scripting issues, though all of them require elevated permissions. Some are available to anyone who has the `editincidents` right, some are available to those who can edit interface messages (typically administrators and interface admins), and one is available to those who can edit LocalSettings.php. These issues have been addressed in commit `43896a4` and all users are advised to upgrade. Users unable to upgrade should prevent access to the Special:IncidentReports page." + }, + { + "lang": "es", + "value": "IncidentReporting es una extensi\u00f3n de MediaWiki para mover informes de incidentes desde el wikitexto a las tablas de la base de datos. Hay una variedad de problemas de Cross-site Scripting, aunque todos ellos requieren permisos elevados. Algunos est\u00e1n disponibles para cualquiera que tenga el derecho `editincidents`, algunos est\u00e1n disponibles para aquellos que pueden editar mensajes de interfaz (normalmente administradores y administradores de interfaz), y uno est\u00e1 disponible para aquellos que pueden editar LocalSettings.php. Estos problemas se han solucionado en el commit `43896a4` y se recomienda a todos los usuarios que actualicen. Los usuarios que no puedan actualizar deben impedir el acceso a la p\u00e1gina Special:IncidentReports." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json index 61109b10f50..46307c091ed 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47816", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.227", - "lastModified": "2024-10-09T19:15:14.227", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ImportDump is a mediawiki extension designed to automate user import requests. A user's local actor ID is stored in the database to tell who made what requests. Therefore, if a user on another wiki happens to have the same actor ID as someone on the central wiki, the user on the other wiki can act as if they're the original wiki requester. This can be abused to create new comments, edit the request, and view the request if it's marked private. This issue has been addressed in commit `5c91dfc` and all users are advised to update. Users unable to update may disable the special page outside of their global wiki. See `miraheze/mw-config@e566499` for details on that." + }, + { + "lang": "es", + "value": "ImportDump es una extensi\u00f3n de MediaWiki dise\u00f1ada para automatizar las solicitudes de importaci\u00f3n de los usuarios. El ID de actor local de un usuario se almacena en la base de datos para indicar qui\u00e9n realiz\u00f3 qu\u00e9 solicitudes. Por lo tanto, si un usuario de otra wiki tiene el mismo ID de actor que alguien de la wiki central, el usuario de la otra wiki puede actuar como si fuera el solicitante original de la wiki. Esto se puede aprovechar para crear nuevos comentarios, editar la solicitud y ver la solicitud si est\u00e1 marcada como privada. Este problema se ha solucionado en el commit `5c91dfc` y se recomienda a todos los usuarios que actualicen. Los usuarios que no puedan actualizar pueden deshabilitar la p\u00e1gina especial fuera de su wiki global. Consulte `miraheze/mw-config@e566499` para obtener m\u00e1s detalles al respecto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47817.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47817.json index dece0bfde28..8195bb60b2e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47817.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47817", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T22:15:03.913", - "lastModified": "2024-10-08T15:35:24.303", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47818.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47818.json index 6ea8201bcd9..77888685224 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47818.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47818.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47818", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T22:15:04.037", - "lastModified": "2024-10-07T22:15:04.037", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Saltcorn is an extensible, open source, no-code database application builder. A logged-in user with any role can delete arbitrary files on the filesystem by calling the `sync/clean_sync_dir` endpoint. The `dir_name` POST parameter is not validated/sanitized and is used to construct the `syncDir` that is deleted by calling `fs.rm`. This issue has been addressed in release version 1.0.0-beta16 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Saltcorn es un generador de aplicaciones de base de datos extensible, de c\u00f3digo abierto y sin c\u00f3digo. Un usuario conectado con cualquier funci\u00f3n puede eliminar archivos arbitrarios en el sistema de archivos llamando al punto de conexi\u00f3n `sync/clean_sync_dir`. El par\u00e1metro POST `dir_name` no se valida ni se desinfecta y se utiliza para construir el `syncDir` que se elimina llamando a `fs.rm`. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 1.0.0-beta16 y se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json index 12498dfdbd3..000be3a3203 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47822", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:31.170", - "lastModified": "2024-10-08T18:15:31.170", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. Access tokens from query strings are not redacted and are potentially exposed in system logs which may be persisted. The access token in `req.query` is not redacted when the `LOG_STYLE` is set to `raw`. If these logs are not properly sanitized or protected, an attacker with access to it can potentially gain administrative control, leading to unauthorized data access and manipulation. This impacts systems where the `LOG_STYLE` is set to `raw`. The `access_token` in the query could potentially be a long-lived static token. Users with impacted systems should rotate their static tokens if they were provided using query string. This vulnerability has been patched in release version 10.13.2 and subsequent releases as well. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Directus es una API en tiempo real y un panel de control de aplicaciones para administrar el contenido de bases de datos SQL. Los tokens de acceso de las cadenas de consulta no se eliminan y pueden quedar expuestos en registros del sistema que pueden persistir. El token de acceso en `req.query` no se elimina cuando `LOG_STYLE` se establece en `raw`. Si estos registros no se desinfectan o protegen adecuadamente, un atacante con acceso a ellos puede potencialmente obtener control administrativo, lo que lleva al acceso y manipulaci\u00f3n de datos no autorizados. Esto afecta a los sistemas donde `LOG_STYLE` se establece en `raw`. El `access_token` en la consulta podr\u00eda ser potencialmente un token est\u00e1tico de larga duraci\u00f3n. Los usuarios con sistemas afectados deben rotar sus tokens est\u00e1ticos si se les proporcionaron mediante una cadena de consulta. Esta vulnerabilidad se ha corregido en la versi\u00f3n de lanzamiento 10.13.2 y versiones posteriores tambi\u00e9n. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json index 50dacb01b76..999957aafd2 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47823.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47823", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:31.370", - "lastModified": "2024-10-10T00:15:02.553", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json index c225f1fc4c8..7a48af37982 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47828", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.423", - "lastModified": "2024-10-09T19:15:14.423", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ampache is a web based audio/video streaming application and file manager. A CSRF attack can be performed in order to delete objects (Playlist, smartlist etc.). Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. This vulnerability can be exploited by creating a malicious script with an arbitrary playlist ID belonging to another user. When the user submits the request, their playlist will be deleted. Any User with active sessions who are tricked into submitting a malicious request are impacted, as their playlists or other objects could be deleted without their consent." + }, + { + "lang": "es", + "value": "Ampache es una aplicaci\u00f3n de transmisi\u00f3n de audio y video basada en la Web y un administrador de archivos. Se puede realizar un ataque CSRF para eliminar objetos (listas de reproducci\u00f3n, listas inteligentes, etc.). Cross-Site Request Forgery (CSRF) es un ataque que obliga a los usuarios autenticados a enviar una solicitud a una aplicaci\u00f3n Web en la que est\u00e1n autenticados actualmente. Esta vulnerabilidad se puede explotar mediante la creaci\u00f3n de un script malicioso con una ID de lista de reproducci\u00f3n arbitraria que pertenece a otro usuario. Cuando el usuario env\u00eda la solicitud, se eliminar\u00e1 su lista de reproducci\u00f3n. Cualquier usuario con sesiones activas que sea enga\u00f1ado para enviar una solicitud maliciosa se ver\u00e1 afectado, ya que sus listas de reproducci\u00f3n u otros objetos podr\u00edan eliminarse sin su consentimiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json index 46685f5c99f..3500de3a965 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47832", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.647", - "lastModified": "2024-10-09T19:15:14.647", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "ssoready es un proveedor de inicio de sesi\u00f3n \u00fanico implementado a trav\u00e9s de Docker. Las versiones afectadas son vulnerables a ataques de omisi\u00f3n de firma XML. Un atacante puede llevar a cabo una omisi\u00f3n de firma si tiene acceso a ciertos mensajes firmados por IDP. El mecanismo subyacente explota el comportamiento diferencial entre analizadores XML. Los usuarios de https://ssoready.com, la instancia p\u00fablica alojada de SSOReady, no se ven afectados. Recomendamos a las personas que alojan SSOReady por s\u00ed mismas que actualicen a 7f92a06 o posterior. H\u00e1galo actualizando sus im\u00e1genes Docker de SSOReady de sha-... a sha-7f92a06. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json index 9b119cbef47..9aac6960826 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47833", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.793", - "lastModified": "2024-10-09T19:15:14.793", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Taipy es una librer\u00eda Python de c\u00f3digo abierto que permite el desarrollo de aplicaciones de extremo a extremo para cient\u00edficos de datos e ingenieros de aprendizaje autom\u00e1tico. En las versiones afectadas, las cookies de sesi\u00f3n se env\u00edan sin los indicadores Secure y HTTPOnly. Este problema se ha solucionado en la versi\u00f3n 4.0.0 y se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json index ff862e29c06..16999677832 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47948.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47948", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-08T16:15:12.453", - "lastModified": "2024-10-08T16:15:12.453", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.07.3, el path traversal que conduc\u00eda a la divulgaci\u00f3n de informaci\u00f3n era posible a trav\u00e9s de copias de seguridad del servidor" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json index df6d3b30dc8..659312a6b03 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47949.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47949", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-08T16:15:12.673", - "lastModified": "2024-10-08T16:15:12.673", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.07.3, path traversal permit\u00eda escribir archivos de respaldo en una ubicaci\u00f3n arbitraria" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json index 64994046362..c2f8253d363 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47950.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47950", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-08T16:15:12.963", - "lastModified": "2024-10-08T16:15:12.963", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07.3 stored XSS was possible in Backup configuration settings" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.07.3 era posible XSS almacenado en la configuraci\u00f3n de copia de seguridad" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json index 5f8bf52cb0d..0f5e6a16945 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47951.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47951", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-08T16:15:13.190", - "lastModified": "2024-10-08T16:15:13.190", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07.3 stored XSS was possible via server global settings" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.07.3, el XSS almacenado era posible a trav\u00e9s de la configuraci\u00f3n global del servidor" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47967.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47967.json index 695b0252e00..3e11e80ec7a 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47967.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47967.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47967", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T21:15:18.617", - "lastModified": "2024-10-07T22:15:04.300", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service." + }, + { + "lang": "es", + "value": "El manejo inadecuado de la inicializaci\u00f3n de recursos en el firmware de algunos productos Solidigm DC puede permitir que un atacante habilite potencialmente la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47968.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47968.json index d2f2cb6b1b5..8f684d264ad 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47968.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47968.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47968", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T22:15:04.480", - "lastModified": "2024-10-07T22:15:04.480", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service." + }, + { + "lang": "es", + "value": "El cierre inadecuado de recursos en medio de ciertas operaciones en algunos productos de Solidigm DC puede permitir que un atacante habilite potencialmente la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47969.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47969.json index 1c2596b7eae..e1e1092d255 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47969.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47969.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47969", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T22:15:04.667", - "lastModified": "2024-10-07T22:15:04.667", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de recursos en el firmware de algunos productos Solidigm DC puede permitir que un atacante habilite potencialmente la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47971.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47971.json index 9b34103506c..e812be194ce 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47971.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47971.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47971", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T20:15:06.607", - "lastModified": "2024-10-07T20:15:06.607", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service." + }, + { + "lang": "es", + "value": "El manejo inadecuado de errores en el firmware de algunos productos SSD DC puede permitir que un atacante habilite la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47972.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47972.json index 65aeee304f6..7b26c3062cb 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47972.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47972.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47972", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T20:15:06.797", - "lastModified": "2024-10-07T20:15:06.797", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially control the performance of the resource." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de recursos en el firmware de algunos productos Solidigm DC puede permitir que un atacante controle potencialmente el rendimiento del recurso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47973.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47973.json index b0249b29441..b3b64bd7a54 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47973.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47973.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47973", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T21:15:18.727", - "lastModified": "2024-10-07T21:15:18.727", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In some Solidigm DC Products, a defect in device overprovisioning may provide information disclosure to an attacker." + }, + { + "lang": "es", + "value": "En algunos productos Solidigm DC, un defecto en el sobreaprovisionamiento del dispositivo puede permitir la divulgaci\u00f3n de informaci\u00f3n a un atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47974.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47974.json index 7716549b718..5f024c648f7 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47974.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47974.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47974", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T21:15:18.927", - "lastModified": "2024-10-07T21:15:18.927", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service." + }, + { + "lang": "es", + "value": "La condici\u00f3n de ejecuci\u00f3n durante el cierre de recursos en algunos productos Solidigm DC puede permitir que un atacante habilite potencialmente la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47975.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47975.json index 03574702a00..6ed5fb2a4ef 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47975.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47975.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47975", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T19:15:10.877", - "lastModified": "2024-10-07T19:15:10.877", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service." + }, + { + "lang": "es", + "value": "La validaci\u00f3n incorrecta del control de acceso en el firmware de algunos productos Solidigm DC puede permitir que un atacante con acceso f\u00edsico obtenga acceso no autorizado o que un atacante con acceso local habilite potencialmente la denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47976.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47976.json index b85c6530055..250c97ed9b4 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47976.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47976.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47976", "sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f", "published": "2024-10-07T20:15:06.977", - "lastModified": "2024-10-07T20:15:06.977", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access." + }, + { + "lang": "es", + "value": "El manejo inadecuado de la eliminaci\u00f3n de acceso en el firmware de algunos productos Solidigm DC puede permitir que un atacante con acceso f\u00edsico obtenga acceso no autorizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json index b23154de92b..7ade361753b 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48902", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-10T11:15:13.540", - "lastModified": "2024-10-10T11:15:13.540", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json index 1961ea1530c..bde8d103cc7 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48933", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T23:15:11.017", - "lastModified": "2024-10-09T23:15:11.017", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in LemonLDAP::NG before 2.19.3 allows remote attackers to inject arbitrary web script or HTML into the login page via a username if userControl has been set to a non-default value that allows special HTML characters." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en LemonLDAP::NG anterior a 2.19.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios en la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s de un nombre de usuario si userControl se ha configurado con un valor no predeterminado que permite caracteres HTML especiales." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json index 9b45346e75f..588ccf131d7 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48941.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48941", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-10T00:15:02.673", - "lastModified": "2024-10-10T00:15:02.673", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to bypass 2FA by interacting with the /rest endpoint of Jira, Confluence, or Bitbucket. In the default configuration, /rest is allowlisted." + }, + { + "lang": "es", + "value": "El complemento Syracom Secure Login (2FA) para Jira, Confluence y Bitbucket hasta la versi\u00f3n 3.1.4.5 permite a atacantes remotos eludir la 2FA al interactuar con el endpoint /rest de Jira, Confluence o Bitbucket. En la configuraci\u00f3n predeterminada, /rest est\u00e1 en la lista de permitidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json index aab066cbfc6..4e26ea70a6d 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48942.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48942", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-10T00:15:02.737", - "lastModified": "2024-10-10T00:15:02.737", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Syracom Secure Login (2FA) plugin for Jira, Confluence, and Bitbucket through 3.1.4.5 allows remote attackers to easily brute-force the 2FA PIN via the plugins/servlet/twofactor/public/pinvalidation endpoint. The last 30 and the next 30 tokens are valid." + }, + { + "lang": "es", + "value": "El complemento Syracom Secure Login (2FA) para Jira, Confluence y Bitbucket hasta la versi\u00f3n 3.1.4.5 permite a atacantes remotos acceder f\u00e1cilmente por fuerza bruta al PIN de 2FA a trav\u00e9s del punto de conexi\u00f3n plugins/servlet/twofactor/public/pinvalidation. Los \u00faltimos 30 tokens y los siguientes 30 son v\u00e1lidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json index 77f5d05e438..72474a3c0f9 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48949.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48949", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-10T01:15:11.127", - "lastModified": "2024-10-10T01:15:11.127", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation." + }, + { + "lang": "es", + "value": "La funci\u00f3n de verificaci\u00f3n en lib/elliptic/eddsa/index.js en el paquete Elliptic anterior a 6.5.6 para Node.js omite la validaci\u00f3n \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\"." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48957.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48957.json index 93a37b53deb..d0cf4f3d3dc 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48957.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48957.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48957", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-10T02:15:02.990", - "lastModified": "2024-10-10T02:15:02.990", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst." + }, + { + "lang": "es", + "value": "execute_filter_audio en archive_read_support_format_rar.c en libarchive anterior a 3.7.5 permite acceso fuera de los l\u00edmites a trav\u00e9s de un archivo de almacenamiento manipulado espec\u00edficamente porque src puede moverse m\u00e1s all\u00e1 de dst." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48958.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48958.json index 1d276a5293d..7425450210a 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48958.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48958.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48958", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-10T02:15:03.057", - "lastModified": "2024-10-10T02:15:03.057", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst." + }, + { + "lang": "es", + "value": "execute_filter_delta en archive_read_support_format_rar.c en libarchive anterior a 3.7.5 permite acceso fuera de los l\u00edmites a trav\u00e9s de un archivo de almacenamiento manipulado espec\u00edficamente porque src puede moverse m\u00e1s all\u00e1 de dst." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5968.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5968.json index 992fddc68a4..5cc9bf1e188 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5968.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5968.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5968", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-09T06:15:13.563", - "lastModified": "2024-10-09T06:15:13.563", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photo Gallery by 10Web WordPress plugin before 1.8.28 does not properly sanitise and escape some of its Gallery settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Photo Gallery by 10Web de WordPress anterior a la versi\u00f3n 1.8.28 no desinfecta ni escapa adecuadamente algunas de las configuraciones de la galer\u00eda, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json new file mode 100644 index 00000000000..257396a2ce4 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6157", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2024-10-10T13:15:14.370", + "lastModified": "2024-10-10T13:15:14.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker who successfully exploited these vulnerabilities could cause the robot to stop.\n\n\n\nA vulnerability exists in the PROFINET stack included in the RobotWare versions listed below.\u00a0\n\nThis vulnerability arises under specific condition when specially crafted message is processed by the system.\n\nBelow are reported vulnerabilities in the Robot Ware versions. \n\n* IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=SI20337&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json new file mode 100644 index 00000000000..9c9647e5550 --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6530", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-10-10T12:15:04.500", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/471049", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2567533", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json index c4fcc0f8472..8701960476e 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6747", "sourceIdentifier": "security@checkmk.com", "published": "2024-10-10T08:15:03.630", - "lastModified": "2024-10-10T08:15:03.630", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information leakage in mknotifyd in Checkmk before 2.3.0p18, 2.2.0p36, 2.1.0p49 and in 2.0.0p39 (EOL) allows attacker to get potentially sensitive data" + }, + { + "lang": "es", + "value": "La fuga de informaci\u00f3n en mknotifyd en Checkmk anterior a 2.3.0p18, 2.2.0p36, 2.1.0p49 y en 2.0.0p39 (EOL) permite a un atacante obtener datos potencialmente confidenciales" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7037.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7037.json index 4d43621c9b4..75f6e13494f 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7037.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7037.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7037", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-09T20:15:09.477", - "lastModified": "2024-10-09T20:15:09.477", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.3.8 de open-webui/open-webui, el endpoint /api/pipelines/upload es vulnerable a la escritura y eliminaci\u00f3n arbitrarias de archivos debido a la concatenaci\u00f3n no saneada de file.filename con CACHE_DIR. Esta vulnerabilidad permite a los atacantes sobrescribir y eliminar archivos del sistema, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json index 49afb118f29..0a0a7867362 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7038", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-09T19:15:14.930", - "lastModified": "2024-10-09T19:15:14.930", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence and configuration of the file. This behavior allows an attacker to enumerate file names and traverse directories by observing the error messages, leading to potential exposure of sensitive information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la versi\u00f3n 0.3.8 de open-webui. La vulnerabilidad est\u00e1 relacionada con la funci\u00f3n de actualizaci\u00f3n del modelo de incrustaci\u00f3n en la configuraci\u00f3n de administrador. Cuando un usuario actualiza la ruta del modelo, el sistema verifica si el archivo existe y proporciona diferentes mensajes de error seg\u00fan la existencia y la configuraci\u00f3n del archivo. Este comportamiento permite a un atacante enumerar los nombres de los archivos y recorrer los directorios observando los mensajes de error, lo que puede provocar la exposici\u00f3n de informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7041.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7041.json index 7bcf4938e00..0b0bb12367e 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7041.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7041.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7041", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-09T20:15:09.683", - "lastModified": "2024-10-09T20:15:09.683", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allowing attackers to edit other users' memories without proper authorization." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de referencia directa a objetos inseguros (IDOR) en la versi\u00f3n v0.3.8 de open-webui/open-webui. La vulnerabilidad se produce en el endpoint de la API `http://0.0.0.0:3000/api/v1/memories/{id}/update`, donde el dise\u00f1o de descentralizaci\u00f3n es defectuoso, lo que permite a los atacantes editar las memorias de otros usuarios sin la autorizaci\u00f3n correspondiente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7048.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7048.json index bb7b271a10d..b2aaaef406c 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7048.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7048.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7048", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-10T02:15:03.113", - "lastModified": "2024-10-10T02:15:03.113", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.3.8 de open-webui, existe una vulnerabilidad de administraci\u00f3n de privilegios incorrecta en los endpoints de API GET /api/v1/documents/ y POST /rag/api/v1/doc. Esta vulnerabilidad permite que un usuario con menos privilegios acceda y sobrescriba archivos administrados por un administrador con m\u00e1s privilegios. Al explotar esta vulnerabilidad, un atacante puede ver los metadatos de los archivos cargados por un administrador y sobrescribirlos, lo que compromete la integridad y la disponibilidad de los modelos RAG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json index 47be9b490de..df5875f60a1 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7049", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-10T08:15:03.910", - "lastModified": "2024-10-10T08:15:03.910", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process." + }, + { + "lang": "es", + "value": "En la versi\u00f3n v0.3.8 de open-webui/open-webui, existe una vulnerabilidad en la que se devuelve un token cuando un usuario con un rol pendiente inicia sesi\u00f3n. Esto permite al usuario realizar acciones sin la confirmaci\u00f3n del administrador, omitiendo el proceso de aprobaci\u00f3n previsto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7206.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7206.json index c698144430d..a70b419dc31 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7206.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7206.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7206", "sourceIdentifier": "68870bb1-d075-4169-957d-e580b18692b9", "published": "2024-10-08T07:15:06.170", - "lastModified": "2024-10-08T07:15:06.170", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSL Pinning Bypass\u00a0in\u00a0eWeLink Some hardware products\u00a0allows local ATTACKER to Decrypt TLS communication and Extract secrets to clone the device\u00a0via Flash the modified firmware" + }, + { + "lang": "es", + "value": "Omisi\u00f3n de fijaci\u00f3n SSL en eWeLink Algunos productos de hardware permiten a un ATACANTE local descifrar la comunicaci\u00f3n TLS y extraer secretos para clonar el dispositivo a trav\u00e9s de Flash del firmware modificado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7292.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7292.json index 8dc4c44d439..075daea162c 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7292.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7292.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7292", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:15.970", - "lastModified": "2024-10-09T15:15:15.970", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts." + }, + { + "lang": "es", + "value": "En las versiones de Progress\u00ae Telerik\u00ae Report Server anteriores al tercer trimestre de 2024 (10.2.24.806), es posible un ataque de relleno de credenciales a trav\u00e9s de una restricci\u00f3n incorrecta de intentos de inicio de sesi\u00f3n excesivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7293.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7293.json index d9892f14f18..fd3859c2d9b 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7293.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7293.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7293", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:16.200", - "lastModified": "2024-10-09T15:15:16.200", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements." + }, + { + "lang": "es", + "value": "En las versiones de Progress\u00ae Telerik\u00ae Report Server anteriores al tercer trimestre de 2024 (10.2.24.806), es posible un ataque de fuerza bruta de contrase\u00f1as a trav\u00e9s de requisitos de contrase\u00f1as d\u00e9biles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7294.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7294.json index 4a3915f41a3..6ff80d8cc07 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7294.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7294.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7294", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:16.463", - "lastModified": "2024-10-09T15:15:16.463", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress\u00ae Telerik\u00ae Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting." + }, + { + "lang": "es", + "value": "En las versiones de In Progress\u00ae Telerik\u00ae Report Server anteriores al tercer trimestre de 2024 (10.2.24.806), es posible un ataque DoS HTTP en endpoints an\u00f3nimos sin limitaci\u00f3n de velocidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json index 1729a4cca76..6bf6f665ffb 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7612.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7612", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.870", - "lastModified": "2024-10-08T17:15:55.870", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in Ivanti EPMM before 12.1.0.4 allow a local authenticated attacker to access or modify sensitive configuration files without proper authorization." + }, + { + "lang": "es", + "value": "Los permisos inseguros en Ivanti EPMM anterior a 12.1.0.4 permiten que un atacante autenticado local acceda o modifique archivos de configuraci\u00f3n confidenciales sin la autorizaci\u00f3n adecuada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7840.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7840.json index 02c387cd399..73f3326f8c3 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7840.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7840.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7840", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:16.687", - "lastModified": "2024-10-09T15:15:16.687", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress Telerik Reporting versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements." + }, + { + "lang": "es", + "value": "En las versiones de informes de Telerik anteriores al tercer trimestre de 2024 (2024.3.924), es posible un ataque de inyecci\u00f3n de comandos a trav\u00e9s de la neutralizaci\u00f3n incorrecta de elementos de hiperv\u00ednculo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7963.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7963.json index 7f4a401e346..c190d033907 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7963.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7963.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7963", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-09T02:15:33.870", - "lastModified": "2024-10-09T02:15:33.870", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CMSMasters Content Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's multiple shortcodes in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento CMSMasters Content Composer para WordPress es vulnerable a Cross-site Scripting almacenado a trav\u00e9s de los m\u00faltiples c\u00f3digos cortos del complemento en todas las versiones hasta la 1.8.8 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8014.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8014.json index 0f25b335fba..aad122ae953 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8014.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8014.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8014", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:16.883", - "lastModified": "2024-10-09T15:15:16.883", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible through object injection via an insecure type resolution vulnerability." + }, + { + "lang": "es", + "value": "En las versiones de informes de Telerik anteriores al tercer trimestre de 2024 (18.2.24.924), es posible un ataque de ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de la inyecci\u00f3n de objetos mediante una vulnerabilidad de resoluci\u00f3n de tipos insegura." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8015.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8015.json index 79159bdaaf7..6bbefd64335 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8015.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8015.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8015", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:17.097", - "lastModified": "2024-10-09T15:15:17.097", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability." + }, + { + "lang": "es", + "value": "En las versiones de Telerik Report Server anteriores al tercer trimestre de 2024 (10.2.24.924), es posible un ataque de ejecuci\u00f3n remota de c\u00f3digo mediante la inyecci\u00f3n de objetos mediante una vulnerabilidad de resoluci\u00f3n de tipos insegura." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8048.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8048.json index 4fd61c6818d..83f6e14c9a2 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8048.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8048.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8048", "sourceIdentifier": "security@progress.com", "published": "2024-10-09T15:15:17.317", - "lastModified": "2024-10-09T15:15:17.317", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation." + }, + { + "lang": "es", + "value": "En las versiones de informes de Telerik anteriores al tercer trimestre de 2024 (18.2.24.924), es posible un ataque de ejecuci\u00f3n de c\u00f3digo mediante la inyecci\u00f3n de objetos a trav\u00e9s de la evaluaci\u00f3n de expresiones inseguras." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json index 436b2efea58..62c927b86c5 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8215", "sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", "published": "2024-10-08T16:15:13.380", - "lastModified": "2024-10-08T16:15:13.380", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Payara Platform Payara Server (m\u00f3dulos de la consola de administraci\u00f3n) permite la inclusi\u00f3n remota de c\u00f3digo. Este problema afecta a Payara Server: desde 5.20.0 hasta 5.68.0, desde 6.0.0 hasta 6.19.0, desde 6.2022.1 hasta 6.2024.10, desde 4.1.2.191.1 hasta 4.1.2.191.51." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8264.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8264.json index 699f1d50fe4..cc83e41ef69 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8264.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8264.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8264", "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-10-09T23:15:11.093", - "lastModified": "2024-10-09T23:15:11.093", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the agent log file when detailed logging is enabled." + }, + { + "lang": "es", + "value": "Fortra's Robot Schedule Enterprise Agent anterior a la versi\u00f3n 3.05 escribe la informaci\u00f3n de nombre de usuario y contrase\u00f1a de FTP en el archivo de registro del agente cuando est\u00e1 habilitado el registro detallado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json index 981411f947a..2f9940f21e7 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8422", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-10-08T10:15:04.880", - "lastModified": "2024-10-08T10:15:04.880", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial\nof service and loss of confidentiality & integrity when application user opens a malicious Zelio\nSoft 2 project file." + }, + { + "lang": "es", + "value": "CWE-416: Existe una vulnerabilidad de Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario, denegaci\u00f3n de servicio y p\u00e9rdida de confidencialidad e integridad cuando el usuario de la aplicaci\u00f3n abre un archivo de proyecto malicioso de Zelio Soft 2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8431.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8431.json index 1c67ffb0a10..8198c5ef2f4 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8431.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8431.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8431", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T12:15:02.810", - "lastModified": "2024-10-08T12:15:02.810", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajaxGetGalleryJson() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve private post titles." + }, + { + "lang": "es", + "value": "El complemento Photo Gallery, Images, Slider in Rbs Image Gallery para WordPress son vulnerables al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ajaxGetGalleryJson() en todas las versiones hasta la 3.2.21 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, recuperen t\u00edtulos de publicaciones privadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8433.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8433.json index a3414ba9945..2be05f624d1 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8433.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8433.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8433", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T10:15:05.110", - "lastModified": "2024-10-08T10:15:05.110", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Mega Menu Plugin for WordPress \u2013 ThemeHunk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018themehunk_megamenu_bg_image' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Please note that this was partially fixed in 1.1.0 due to the missing authorization protection that was added." + }, + { + "lang": "es", + "value": "El complemento Easy Mega Menu Plugin for WordPress \u2013 ThemeHunk para WordPress, es vulnerable a cross-site scripting almacenado a trav\u00e9s del par\u00e1metro 'themehunk_megamenu_bg_image' en todas las versiones hasta la 1.1.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Tenga en cuenta que esto se solucion\u00f3 parcialmente en la versi\u00f3n 1.1.0 debido a la falta de protecci\u00f3n de autorizaci\u00f3n que se agreg\u00f3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json index 0a6efbab7a2..4e8af6b1d52 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8477", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.300", - "lastModified": "2024-10-10T03:15:02.300", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) de WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.1.87 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n Init(). Esto hace posible que atacantes no autenticados cierren sesi\u00f3n en una conexi\u00f3n de Brevo a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json index 9029d1f77f3..200a80276b1 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8482.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8482", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T12:15:03.043", - "lastModified": "2024-10-08T12:15:03.043", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in all versions up to, and including, 1.3.982 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-site Scripting almacenado a trav\u00e9s del par\u00e1metro 'url' en todas las versiones hasta la 1.3.982 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json index 034de884d1c..48ebeebac21 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8488.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8488", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T11:15:13.233", - "lastModified": "2024-10-08T11:15:13.233", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Survey Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Survey fields in all versions up to, and including, 4.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Survey Maker para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de campos de encuesta en todas las versiones hasta la 4.9.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de administrador o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json index 8c792743186..d112bceb50d 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8513", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.323", - "lastModified": "2024-10-10T02:15:03.323", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The QA Analytics \u2013 Web Analytics Tool with Heatmaps & Session Replay Across All Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_save_plugin_config() function in all versions up to, and including, 4.1.0.0. This makes it possible for unauthenticated attackers to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento QA Analytics \u2013 Web Analytics Tool with Heatmaps & Session Replay Across All Pages para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n ajax_save_plugin_config() en todas las versiones hasta la 4.1.0.0 incluida. Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8518.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8518.json index f255a361a48..acc81f4103f 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8518.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8518.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8518", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-10-08T10:15:05.340", - "lastModified": "2024-10-08T10:15:05.340", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft\n2 application when a specially crafted project file is loaded by an application user." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar un bloqueo de la aplicaci\u00f3n Zelio Soft 2 cuando un usuario de la aplicaci\u00f3n carga un archivo de proyecto especialmente manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json index fd4a3313cfc..91662856843 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8626", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-10-08T17:15:56.240", - "lastModified": "2024-10-08T17:15:56.240", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected products to become fully unavailable and require a power cycle to recover." + }, + { + "lang": "es", + "value": "Debido a una fuga de memoria, existe una vulnerabilidad de denegaci\u00f3n de servicio en los productos afectados de Rockwell Automation. Un agente malintencionado podr\u00eda aprovechar esta vulnerabilidad realizando m\u00faltiples acciones en determinadas p\u00e1ginas web del producto, lo que provocar\u00eda que los productos afectados dejaran de estar disponibles por completo y fuera necesario apagar y encender para recuperarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8629.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8629.json index a39a01e6006..e08aceb7c40 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8629.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8629.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8629", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T10:15:05.550", - "lastModified": "2024-10-08T10:15:05.550", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Multilingual & Multicurrency with WPML plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.3.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Multilingual & Multicurrency con WPML para WordPress es vulnerable a ataques de cross-site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 5.3.7 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json index e6cb4bf9978..ec005de7330 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8729", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.550", - "lastModified": "2024-10-10T02:15:03.550", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Easy Social Share Buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Easy Social Share Buttons para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.4.5 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8884.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8884.json index 60df6c4dbd1..283cc65ec31 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8884.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8884.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8884", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-10-08T11:15:13.487", - "lastModified": "2024-10-08T11:15:13.487", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that\ncould cause exposure of credentials when attacker has access to application on network over\nhttp" + }, + { + "lang": "es", + "value": "CWE-200: Existe una vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado que podr\u00eda causar la exposici\u00f3n de credenciales cuando un atacante tiene acceso a una aplicaci\u00f3n en la red a trav\u00e9s de http." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json index f8d669158db..f5dc3e4141f 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8911", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:19.077", - "lastModified": "2024-10-08T09:15:19.077", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note that changing a WordPress user's password is only possible if the \"Use WordPress users as customers\" setting is enabled, which is disabled by default. Without this setting enabled, only the passwords of plugin customers, which are stored and managed in a separate database table, can be modified." + }, + { + "lang": "es", + "value": "El complemento LatePoint para WordPress es vulnerable al cambio arbitrario de contrase\u00f1as de usuarios mediante inyecci\u00f3n SQL en versiones hasta la 5.0.11 incluida. Esto se debe a un escape insuficiente en el par\u00e1metro suministrado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de los usuarios y potencialmente se apropien de las cuentas de administrador. Tenga en cuenta que cambiar la contrase\u00f1a de un usuario de WordPress solo es posible si est\u00e1 habilitada la configuraci\u00f3n \"Usar usuarios de WordPress como clientes\", que est\u00e1 deshabilitada de forma predeterminada. Sin esta configuraci\u00f3n habilitada, solo se pueden modificar las contrase\u00f1as de los clientes del complemento, que se almacenan y administran en una tabla de base de datos separada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json index 7d8345d76c4..05818d580f0 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8925", "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:09.450", - "lastModified": "2024-10-08T04:15:09.450", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PHP versions\u00a08.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior." + }, + { + "lang": "es", + "value": "En las versiones de PHP 8.1.* anteriores a 8.1.30, 8.2.* anteriores a 8.2.24, 8.3.* anteriores a 8.3.12, el an\u00e1lisis err\u00f3neo de los datos de un formulario de varias partes incluidos en una solicitud HTTP POST podr\u00eda provocar que no se procesen los datos leg\u00edtimos. Esto podr\u00eda provocar que un atacante malintencionado capaz de controlar parte de los datos enviados pudiera excluir parte de otros datos, lo que podr\u00eda provocar un comportamiento err\u00f3neo de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json index 97f427f7100..3fa251fc1cb 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8926", "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:10.637", - "lastModified": "2024-10-08T04:15:10.637", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12,\u00a0when using a certain non-standard configurations of Windows codepages, the fixes for\u00a0 CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 \u00a0may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This\u00a0may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc." + }, + { + "lang": "es", + "value": "En las versiones de PHP 8.1.* anteriores a 8.1.30, 8.2.* anteriores a 8.2.24, 8.3.* anteriores a 8.3.12, al utilizar ciertas configuraciones no est\u00e1ndar de p\u00e1ginas de c\u00f3digos de Windows, las correcciones para CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 a\u00fan se pueden omitir y se puede lograr la misma inyecci\u00f3n de comandos relacionada con el comportamiento de la p\u00e1gina de c\u00f3digos \"Best Fit\" de Windows. Esto puede permitir que un usuario malintencionado pase opciones al binario PHP que se est\u00e1 ejecutando y, por lo tanto, revele el c\u00f3digo fuente de los scripts, ejecute c\u00f3digo PHP arbitrario en el servidor, etc." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json index 73261ab1254..d4bae158f3d 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8927", "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:10.867", - "lastModified": "2024-10-08T04:15:10.867", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12,\u00a0HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to\u00a0cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP." + }, + { + "lang": "es", + "value": "En las versiones de PHP 8.1.* anteriores a 8.1.30, 8.2.* anteriores a 8.2.24, 8.3.* anteriores a 8.3.12, la variable HTTP_REDIRECT_STATUS se utiliza para comprobar si el servidor HTTP est\u00e1 ejecutando o no el binario CGI. Sin embargo, en determinados escenarios, el remitente de la solicitud puede controlar el contenido de esta variable a trav\u00e9s de los encabezados HTTP, lo que puede provocar que la opci\u00f3n cgi.force_redirect no se aplique correctamente. En determinadas configuraciones, esto puede provocar la inclusi\u00f3n arbitraria de archivos en PHP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json index 2bb544ccf87..936efe2bb68 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8943", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:19.343", - "lastModified": "2024-10-08T09:15:19.343", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. This is due to insufficient verification on the user being supplied during the booking customer step. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. Note that logging in as a WordPress user is only possible if the \"Use WordPress users as customers\" setting is enabled, which is disabled by default. The vulnerability is partially patched in version 5.0.12 and fully patched in version 5.0.13." + }, + { + "lang": "es", + "value": "El complemento LatePoint para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en versiones hasta la 5.0.12 incluida. Esto se debe a una verificaci\u00f3n insuficiente del usuario que se proporciona durante el paso de reserva del cliente. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al ID de usuario. Tenga en cuenta que iniciar sesi\u00f3n como usuario de WordPress solo es posible si est\u00e1 habilitada la configuraci\u00f3n \"Usar usuarios de WordPress como clientes\", que est\u00e1 deshabilitada de forma predeterminada. La vulnerabilidad est\u00e1 parcialmente corregida en la versi\u00f3n 5.0.12 y completamente corregida en la versi\u00f3n 5.0.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8964.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8964.json index 1c9b9c71060..b9fc6aeb46e 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8964.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8964.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8964", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T08:15:02.430", - "lastModified": "2024-10-08T08:15:02.430", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Image Optimizer, Resizer and CDN \u2013 Sirv plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 7.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Image Optimizer, Resizer and CDN \u2013 Sirv para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 7.2.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json index f40b48ff2a5..0b6405259c2 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8977", "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T10:15:08.367", - "lastModified": "2024-10-10T10:15:08.367", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json index a64182539c3..b9e1fc4b6bc 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8983", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-08T06:15:02.490", - "lastModified": "2024-10-09T16:35:09.290", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json index 4c164293bfd..b29041ff92c 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8987", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.757", - "lastModified": "2024-10-10T02:15:03.757", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Youzify \u2013 BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's youzify_media shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Youzify \u2013 BuddyPress Community, User Profile, Social Network & Membership Plugin para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto youzify_media del complemento en todas las versiones hasta la 1.3.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9005.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9005.json index 975ad1890e8..56cda815946 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9005.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9005.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9005", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-10-08T11:15:13.673", - "lastModified": "2024-10-08T11:15:13.673", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-502: Deserialization of Untrusted Data vulnerability exists that could allow code to be\nremotely executed on the server when unsafely deserialized data is posted to the web server." + }, + { + "lang": "es", + "value": "CWE-502: Existe una vulnerabilidad de deserializaci\u00f3n de datos no confiables que podr\u00eda permitir que se ejecute c\u00f3digo de forma remota en el servidor cuando se publican datos deserializados de forma no segura en el servidor web." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json index 2bbe541225d..a93709e9584 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9021", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-08T06:15:02.693", - "lastModified": "2024-10-09T16:35:09.457", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json index e215a88f557..3e7f5d2ee68 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9022", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.523", - "lastModified": "2024-10-10T03:15:02.523", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TS Poll \u2013 Survey, Versus Poll, Image Poll, Video Poll plugin for WordPress is vulnerable to SQL Injection via the \u2018orderby\u2019 parameter in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento TS Poll \u2013 Survey, Versus Poll, Image Poll, Video Poll para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'orderby' en todas las versiones hasta la 2.3.9 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de administrador o superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json index 7e409e3f0e0..2538d6e8fd6 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9026", "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:11.060", - "lastModified": "2024-10-08T04:15:11.060", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is\u00a0configured to catch workers output through catch_workers_output = yes,\u00a0it may be possible to pollute the final log or\u00a0remove up to 4 characters from the log messages by manipulating log message content. Additionally, if\u00a0PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability." + }, + { + "lang": "es", + "value": "En las versiones de PHP 8.1.* anteriores a 8.1.30, 8.2.* anteriores a 8.2.24, 8.3.* anteriores a 8.3.12, cuando se utiliza PHP-FPM SAPI y est\u00e1 configurado para capturar la salida de los trabajadores mediante catch_workers_output = yes, es posible contaminar el registro final o eliminar hasta 4 caracteres de los mensajes de registro manipulando el contenido de los mensajes de registro. Adem\u00e1s, si PHP-FPM est\u00e1 configurado para utilizar la salida de syslog, es posible eliminar m\u00e1s datos de registro utilizando la misma vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json index 217727301c1..c17ea5fcd02 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9057", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.960", - "lastModified": "2024-10-10T02:15:03.960", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Curator.io: Show all your social media posts in a beautiful feed. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018feed_id\u2019 attribute in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Curator.io: Show all your social media posts in a beautiful feed. para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del atributo 'feed_id' en todas las versiones hasta la 1.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json index 24783f774cc..2fcb51d7ac3 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9064", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.163", - "lastModified": "2024-10-10T02:15:04.163", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Elementor Inline SVG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Elementor Inline SVG para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.2.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json index 8eb9bb17237..18553d446cc 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9065", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.363", - "lastModified": "2024-10-10T02:15:04.363", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Helper Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'whp_smtp_send_mail_test' function in all versions up to, and including, 4.6.1. This makes it possible for unauthenticated attackers to send emails containing any content and originating from the vulnerable WordPress instance to any recipient." + }, + { + "lang": "es", + "value": "El complemento WP Helper Premium para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'whp_smtp_send_mail_test' en todas las versiones hasta la 4.6.1 incluida. Esto permite que atacantes no autenticados env\u00eden correos electr\u00f3nicos que contengan cualquier contenido y que se originen en la instancia vulnerable de WordPress a cualquier destinatario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json index b41de6f88d2..0e1046558e7 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9066", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.567", - "lastModified": "2024-10-10T02:15:04.567", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Marketing and SEO Booster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.9.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Marketing and SEO Booster para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.9.10 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json index e2535980849..787890c759b 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9067", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.740", - "lastModified": "2024-10-10T03:15:02.740", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Youzify \u2013 BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'delete_attachment' function in all versions up to, and including, 1.3.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary attachments." + }, + { + "lang": "es", + "value": "El complemento Youzify \u2013 BuddyPress Community, User Profile, Social Network & Membership Plugin para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'delete_attachment' en todas las versiones hasta la 1.3.0 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos adjuntos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json index f58ccb7f061..58ab0e38542 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9072", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.773", - "lastModified": "2024-10-10T02:15:04.773", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GDPR-Extensions-com \u2013 Consent Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento GDPR-Extensions-com \u2013 Consent Manager para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.0.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json index 985892d887f..4660c77ebce 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9074", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.963", - "lastModified": "2024-10-10T03:15:02.963", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced Blocks Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Advanced Blocks Pro para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la carga de archivos SVG en todas las versiones hasta la 1.0.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json index dbe9d13d68e..a5ff18f2224 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9124.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9124", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-10-08T17:15:56.390", - "lastModified": "2024-10-08T19:35:21.487", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex\u00ae 600T. If the device is overloaded with requests, it will become unavailable. The device may require a power cycle to recover it if it does not re-establish a connection after it stops receiving requests." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en el PowerFlex\u00ae 600T de Rockwell Automation. Si el dispositivo se sobrecarga con solicitudes, dejar\u00e1 de estar disponible. Es posible que sea necesario apagar y encender el dispositivo para recuperarlo si no restablece una conexi\u00f3n despu\u00e9s de dejar de recibir solicitudes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json index 631cb5b818d..48f1f32a254 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9156", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-10T06:15:11.290", - "lastModified": "2024-10-10T06:15:11.290", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TI WooCommerce Wishlist WordPress plugin through 2.8.2 is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento TI WooCommerce Wishlist de WordPress hasta la versi\u00f3n 2.8.2 es vulnerable a la inyecci\u00f3n SQL debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json index f1b4159476e..df956e29f5a 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9167.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9167", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:56.517", - "lastModified": "2024-10-08T17:15:56.517", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under specific circumstances, insecure permissions in Ivanti Velocity License Server before version 5.2 allows a local authenticated attacker to achieve local privilege escalation." + }, + { + "lang": "es", + "value": "En circunstancias espec\u00edficas, los permisos inseguros en Ivanti Velocity License Server anterior a la versi\u00f3n 5.2 permiten que un atacante autenticado local logre una escalada de privilegios locales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json index f99f671d760..02a4081e20d 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9201", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-10-10T11:15:13.760", - "lastModified": "2024-10-10T11:15:13.760", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json index 802bd40f689..9a57f8e29ac 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9205", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.980", - "lastModified": "2024-10-10T02:15:04.980", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Maximum Products per User for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Maximum Products per User for WooCommerce para WordPress es vulnerable a ataques Cross-Site Scripting debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 4.2.8 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9207.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9207.json index 0729f8590d6..154476a607a 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9207.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9207", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T11:15:13.870", - "lastModified": "2024-10-08T11:15:13.870", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9286.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9286.json index 3f941e6caa1..d1ee0638711 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9286.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9286.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9286", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-10-09T14:15:07.823", - "lastModified": "2024-10-09T14:35:12.913", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), Improper Input Validation vulnerability in TRtek Software Distant Education Platform allows SQL Injection, Parameter Injection.This issue affects Distant Education Platform: before 3.2024.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') y validaci\u00f3n de entrada incorrecta en TRtek Software Distant Education Platform permite inyecci\u00f3n SQL e inyecci\u00f3n de par\u00e1metros. Este problema afecta a la plataforma de educaci\u00f3n a distancia: antes de 3.2024.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9292.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9292.json index 87af11f2eba..4205f37cb89 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9292.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9292.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9292", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T06:15:02.773", - "lastModified": "2024-10-08T06:15:02.773", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:57:21.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bridge Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formforall' shortcode in versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bridge Core para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s del c\u00f3digo corto 'formforall' en versiones hasta la 3.2.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en atributos proporcionados por el usuario. Esto permite que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json index ff0470e67c7..9fac6f3b3db 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9377", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.183", - "lastModified": "2024-10-10T02:15:05.183", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Products, Order & Customers Export for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Products, Order & Customers Export for WooCommerce para WordPress es vulnerable a Cross-Site Scripting reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.0.15 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json index 8599485b7df..0605dfbfa64 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9379.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9379", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:56.727", - "lastModified": "2024-10-10T01:00:01.433", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "cisaExploitAdd": "2024-10-09", "cisaActionDue": "2024-10-30", diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json index d7eb5210712..ac127c885c9 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9380.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9380", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:56.970", - "lastModified": "2024-10-10T01:00:01.433", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "cisaExploitAdd": "2024-10-09", "cisaActionDue": "2024-10-30", diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json index 89a6613759a..b1170779b5c 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9381", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:57.183", - "lastModified": "2024-10-08T17:15:57.183", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal in Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to bypass restrictions." + }, + { + "lang": "es", + "value": "El path traversal en Ivanti CSA anterior a la versi\u00f3n 5.0.2 permite que un atacante remoto autenticado con privilegios de administrador eluda las restricciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9412.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9412.json index db108100f1f..a8a360d8408 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9412.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9412.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9412", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-10-08T20:15:05.543", - "lastModified": "2024-10-08T20:15:05.543", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper authorization vulnerability exists in the Rockwell Automation affected products that could allow an unauthorized user to sign in. While removal of all role mappings is unlikely, it could occur in the case of unexpected or accidental removal by the administrator. If exploited, an unauthorized user could access data they previously but should no longer have access to." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de autorizaci\u00f3n indebida en los productos afectados de Rockwell Automation que podr\u00eda permitir que un usuario no autorizado inicie sesi\u00f3n. Si bien es poco probable que se eliminen todas las asignaciones de roles, podr\u00eda ocurrir en caso de que el administrador elimine datos de forma inesperada o accidental. Si se explota, un usuario no autorizado podr\u00eda acceder a datos a los que antes no deber\u00eda tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9449.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9449.json index 3a94dcfe436..df882f3ab4d 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9449.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9449.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9449", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-09T07:15:09.833", - "lastModified": "2024-10-09T07:15:09.833", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Auto iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' parameter in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Auto iFrame para WordPress es vulnerable a Cross-site Scripting almacenado a trav\u00e9s del par\u00e1metro 'tag' en todas las versiones hasta la 1.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json index 47b1497e725..d1b412574db 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9451", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-09T08:15:05.160", - "lastModified": "2024-10-09T08:15:05.160", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Embed PDF Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'height' and 'width' parameters in all versions up to, and including, 2.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Embed PDF Viewer para WordPress es vulnerable a Cross-site Scripting almacenado a trav\u00e9s de los par\u00e1metros \"height\" y \"width\" en todas las versiones hasta la 2.4.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json index 0b397e98954..f9518167a7e 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9457", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.390", - "lastModified": "2024-10-10T02:15:05.390", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento WP Builder para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la carga de archivos SVG en todas las versiones hasta la 3.0.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json index 64f76fd25c1..5e2bba92a4b 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9463", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:19.973", - "lastModified": "2024-10-09T23:15:11.290", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en Palo Alto Networks Expedition permite a un atacante no autenticado ejecutar comandos arbitrarios del sistema operativo como root en Expedition, lo que resulta en la divulgaci\u00f3n de nombres de usuario, contrase\u00f1as de texto plano, configuraciones de dispositivos y claves API de dispositivos de firewalls PAN-OS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json index 81891092e1a..e6b2946766f 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9464.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9464", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.170", - "lastModified": "2024-10-09T23:15:11.457", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en Palo Alto Networks Expedition permite a un atacante autenticado ejecutar comandos del sistema operativo arbitrarios como root en Expedition, lo que resulta en la divulgaci\u00f3n de nombres de usuario, contrase\u00f1as de texto plano, configuraciones de dispositivos y claves API de dispositivos de firewalls PAN-OS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json index 34a02eeeb42..77bbbb97a71 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9465", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.287", - "lastModified": "2024-10-09T23:15:11.577", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en Expedition de Palo Alto Networks permite a un atacante no autenticado revelar el contenido de la base de datos de Expedition, como hashes de contrase\u00f1as, nombres de usuario, configuraciones de dispositivos y claves API de dispositivos. Con esto, los atacantes tambi\u00e9n pueden crear y leer archivos arbitrarios en el sistema Expedition." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json index 29c18171a43..559f034a420 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9466.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9466", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.400", - "lastModified": "2024-10-09T23:15:11.677", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de almacenamiento de texto plano de informaci\u00f3n confidencial en Palo Alto Networks Expedition permite a un atacante autenticado revelar nombres de usuario, contrase\u00f1as y claves API del firewall generadas con esas credenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json index 89af0e98ea2..12545c2c5a1 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9467.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9467", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.517", - "lastModified": "2024-10-09T23:15:11.783", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Expedition browser session theft." + }, + { + "lang": "es", + "value": "Una vulnerabilidad XSS reflejado en Palo Alto Networks Expedition permite la ejecuci\u00f3n de JavaScript malicioso en el contexto del navegador de un usuario autenticado de Expedition si ese usuario hace clic en un enlace malicioso, lo que permite ataques de phishing que podr\u00edan conducir al robo de sesiones del navegador de Expedition." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json index e323def02e9..d77fa0498ea 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9468", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.637", - "lastModified": "2024-10-09T17:15:20.637", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de corrupci\u00f3n de memoria en el software PAN-OS de Palo Alto Networks permite que un atacante no autenticado bloquee PAN-OS debido a un paquete creado a trav\u00e9s del plano de datos, lo que genera una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n har\u00e1n que PAN-OS entre en modo de mantenimiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json index 8abde3cfa1b..c29fff6c8fa 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9469", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.770", - "lastModified": "2024-10-09T17:15:20.770", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." + }, + { + "lang": "es", + "value": "Un problema con un mecanismo de detecci\u00f3n en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite que un usuario con privilegios no administrativos de Windows deshabilite el agente. Este problema puede ser aprovechado por malware para deshabilitar el agente Cortex XDR y luego realizar una actividad maliciosa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json index a7c4015da7b..48869f54826 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9470.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9470", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.907", - "lastModified": "2024-10-09T17:15:20.907", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cortex XSOAR allows the disclosure of incident data to users who do not have the privilege to view the data." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en Cortex XSOAR permite la divulgaci\u00f3n de datos de incidentes a usuarios que no tienen el privilegio de ver los datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json index 71b1ee2f9de..00c43a81eb9 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9471.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9471", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:21.090", - "lastModified": "2024-10-09T17:15:21.090", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de escalada de privilegios (PE) en la API XML del software PAN-OS de Palo Alto Networks permite que un administrador de PAN-OS autenticado con privilegios restringidos utilice una clave API XML comprometida para realizar acciones como administrador de PAN-OS con privilegios superiores. Por ejemplo, un administrador con acceso de \"Administrador de sistema virtual (solo lectura)\" podr\u00eda utilizar una clave API XML de un \"Administrador de sistema virtual\" para realizar operaciones de escritura en la configuraci\u00f3n del sistema virtual, aunque deber\u00edan estar limitadas a operaciones de solo lectura." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json index 5c779cb2150..ae718404bff 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9473", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:21.230", - "lastModified": "2024-10-09T17:15:21.230", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de escalada de privilegios en la aplicaci\u00f3n Palo Alto Networks GlobalProtect en Windows permite que un usuario de Windows no administrativo autenticado localmente escale sus privilegios a NT AUTHORITY/SYSTEM mediante el uso de la funcionalidad de reparaci\u00f3n ofrecida por el archivo .msi utilizado para instalar GlobalProtect." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json index 717cfc6d81a..a0409e33d33 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9518", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.590", - "lastModified": "2024-10-10T02:15:05.590", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UserPlus plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0 due to insufficient restriction on the 'form_actions' and 'userplus_update_user_profile' functions. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration." + }, + { + "lang": "es", + "value": "El complemento UserPlus para WordPress es vulnerable a la escalada de privilegios en versiones hasta la 2.0 incluida debido a una restricci\u00f3n insuficiente en las funciones 'form_actions' y 'userplus_update_user_profile'. Esto permite que atacantes no autenticados especifiquen su rol de usuario proporcionando el par\u00e1metro 'role' durante un registro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json index 7360b1c4840..5ad7fe48572 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9519", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.787", - "lastModified": "2024-10-10T02:15:05.787", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UserPlus plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'save_metabox_form' function in versions up to, and including, 2.0. This makes it possible for authenticated attackers, with editor-level permissions or above, to update the registration form role to administrator, which leads to privilege escalation." + }, + { + "lang": "es", + "value": "El complemento UserPlus para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una comprobaci\u00f3n incorrecta de la capacidad de la funci\u00f3n 'save_metabox_form' en versiones hasta la 2.0 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de editor o superior, actualicen el rol del formulario de registro a administrador, lo que conduce a una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json index 854e68e9d4b..f67918962d2 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9520", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:03.177", - "lastModified": "2024-10-10T03:15:03.177", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UserPlus plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.0. This makes it possible for authenticated attackers with subscriber-level permissions or above, to add, modify, or delete user meta and plugin options." + }, + { + "lang": "es", + "value": "El complemento UserPlus para WordPress es vulnerable al acceso no autorizado, la modificaci\u00f3n y la p\u00e9rdida de datos debido a la falta de comprobaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 2.0 incluida. Esto permite que atacantes autenticados con permisos de nivel de suscriptor o superior agreguen, modifiquen o eliminen metadatos de usuario y opciones del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json index bcbccf61fe7..7a2b6f13655 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9522", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:06.013", - "lastModified": "2024-10-10T02:15:06.013", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. This is due to incorrect authentication and capability checking in the 'ajax_masq_login' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator." + }, + { + "lang": "es", + "value": "El complemento WP Users Masquerade para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 2.0.0 incluida. Esto se debe a una verificaci\u00f3n de autenticaci\u00f3n y capacidad incorrecta en la funci\u00f3n 'ajax_masq_login'. Esto hace posible que atacantes autenticados, con permisos de nivel de suscriptor y superiores, inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9549.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9549.json index c6a6c61ce17..7887c469f1a 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9549.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9549", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-06T04:15:10.533", - "lastModified": "2024-10-09T11:16:03.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T13:14:51.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -152,6 +152,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -163,6 +164,17 @@ "matchCriteriaId": "47A17995-9117-42E4-938E-D18F605DD0FE" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD4E3AA2-EC1C-4219-8E13-B52D30A7FA06" + } + ] } ] } diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json index 9ab25084f2b..9f6878b9c8a 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9575", "sourceIdentifier": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "published": "2024-10-09T10:15:06.853", - "lastModified": "2024-10-09T14:35:13.220", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local File Inclusion vulnerability in pretix Widget WordPress plugin pretix-widget on Windows allows PHP Local File Inclusion. This issue affects pretix Widget WordPress plugin: from 1.0.0 through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en el complemento pretix Widget de WordPress pretix-widget en Windows permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta al complemento pretix Widget de WordPress: desde la versi\u00f3n 1.0.0 hasta la 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json index 05ff1ec7f5e..aa88d308654 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9581", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:06.227", - "lastModified": "2024-10-10T02:15:06.227", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shortcodes AnyWhere plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento Shortcodes AnyWhere para WordPress es vulnerable a la ejecuci\u00f3n arbitraria de c\u00f3digos cortos en todas las versiones hasta la 1.0.1 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json index 18f26be13c8..52de852e94a 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9596", "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T10:15:08.563", - "lastModified": "2024-10-10T10:15:08.563", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json index fdb909e2c64..3570fbd31c2 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9602", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-08T23:15:12.947", - "lastModified": "2024-10-09T17:35:16.980", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json index 5a6c92c95ba..4dc25cb1515 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9603", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-08T23:15:13.040", - "lastModified": "2024-10-09T16:35:09.623", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json index 35bf092b952..b8cff72e27e 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9620.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9620", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-08T17:15:57.357", - "lastModified": "2024-10-08T17:15:57.357", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. An attacker with network access could exploit this vulnerability by sniffing the plaintext data transmitted between the EDA and AAP. An attacker with system access could exploit this vulnerability by reading the plaintext data stored in EDA and AAP databases." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en la automatizaci\u00f3n basada en eventos (EDA) en Ansible Automation Platform (AAP), que carece de cifrado de informaci\u00f3n confidencial. Un atacante con acceso a la red podr\u00eda aprovechar esta vulnerabilidad al rastrear los datos de texto sin formato transmitidos entre EDA y AAP. Un atacante con acceso al sistema podr\u00eda aprovechar esta vulnerabilidad al leer los datos de texto sin formato almacenados en las bases de datos de EDA y AAP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json index d69e379d1d4..f87362df4d1 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9621.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9621", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-08T17:15:57.573", - "lastModified": "2024-10-08T17:15:57.573", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Quarkus CXF. Passwords and other secrets may appear in the application log in spite of the user configuring them to be hidden. This issue requires some special configuration to be vulnerable, such as SOAP logging enabled, application set client, and endpoint logging properties, and the attacker must have access to the application log." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Quarkus CXF. Las contrase\u00f1as y otros secretos pueden aparecer en el registro de la aplicaci\u00f3n a pesar de que el usuario los haya configurado para que est\u00e9n ocultos. Este problema requiere una configuraci\u00f3n especial para ser vulnerable, como el registro SOAP habilitado, la aplicaci\u00f3n configurada como cliente y las propiedades de registro de endpoint, y el atacante debe tener acceso al registro de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json index e485d6f8bbc..7fc3f910134 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9622.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9622", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-08T17:15:57.790", - "lastModified": "2024-10-08T17:15:57.790", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:56:30.817", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en la librer\u00eda resteasy-netty4 que surge del manejo inadecuado de solicitudes HTTP mediante t\u00e9cnicas de contrabando. Cuando se env\u00eda una solicitud de contrabando HTTP con un car\u00e1cter de control ASCII, hace que Netty HttpObjectDecoder pase a un estado BAD_MESSAGE. Como resultado, se ignoran todas las solicitudes leg\u00edtimas posteriores en la misma conexi\u00f3n, lo que provoca tiempos de espera del cliente, lo que puede afectar a los sistemas que utilizan balanceadores de carga y exponerlos a riesgos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json index 7e822001c68..4ba9157ecb1 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9623", "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T10:15:08.770", - "lastModified": "2024-10-10T10:15:08.770", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json index ac2c78f2566..d666c502d1c 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9671.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9671", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-09T15:15:17.513", - "lastModified": "2024-10-09T15:15:17.513", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in 3Scale. There is no auth mechanism to see a PDF invoice of a Developer user if the URL is known. Anyone can see the invoice if the URL is known or guessed." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en 3Scale. No existe un mecanismo de autenticaci\u00f3n para ver una factura en PDF de un usuario desarrollador si se conoce la URL. Cualquiera puede ver la factura si se conoce o se adivina la URL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json index 5ee2eb925b2..3586f6cb64e 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9675", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-09T15:15:17.837", - "lastModified": "2024-10-09T15:15:17.837", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Buildah. Los montajes de cach\u00e9 no validan correctamente que las rutas especificadas por el usuario para el cach\u00e9 est\u00e9n dentro de nuestro directorio de cach\u00e9, lo que permite que una instrucci\u00f3n `RUN` en un archivo de contenedor monte un directorio arbitrario desde el host (lectura/escritura) en el contenedor siempre que el usuario que ejecuta Buildah pueda acceder a esos archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json index 12fc2d94bae..11712c408d2 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9680", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-09T13:15:12.090", - "lastModified": "2024-10-09T16:35:10.390", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1." + }, + { + "lang": "es", + "value": "Un atacante pudo ejecutar c\u00f3digo en el proceso de contenido aprovechando un use-after-free en las l\u00edneas de tiempo de animaci\u00f3n. Hemos recibido informes de que esta vulnerabilidad se ha explotado de forma activa. Esta vulnerabilidad afecta a Firefox < 131.0.2, Firefox ESR < 128.3.1 y Firefox ESR < 115.16.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json index 401b8b2f1f3..d8d05959926 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9685", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:06.440", - "lastModified": "2024-10-10T02:15:06.440", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Notification for Telegram plugin for WordPress is vulnerable to unauthorized test message sending due to a missing capability check on the 'nftb_test_action' function in versions up to, and including, 3.3.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to send a test message via the Telegram Bot API to all users configured in the settings." + }, + { + "lang": "es", + "value": "El complemento Notification for Telegram para WordPress es vulnerable al env\u00edo no autorizado de mensajes de prueba debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'nftb_test_action' en versiones hasta la 3.3.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, env\u00eden un mensaje de prueba a trav\u00e9s de la API de bots de Telegram a todos los usuarios configurados en los ajustes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json index 3c6fc5ce9aa..71a9bf61315 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9780", "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T07:15:03.727", - "lastModified": "2024-10-10T07:15:03.727", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file" + }, + { + "lang": "es", + "value": "La falla del disector ITS en Wireshark 4.4.0 permite la denegaci\u00f3n de servicio a trav\u00e9s de la inyecci\u00f3n de paquetes o un archivo de captura manipulado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json index 24d8d567641..2500def5359 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9781", "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T07:15:04.100", - "lastModified": "2024-10-10T07:15:04.100", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file" + }, + { + "lang": "es", + "value": "El fallo del disector de AppleTalk y RELOAD Framing en Wireshark 4.4.0 y 4.2.0 a 4.2.7 permite la denegaci\u00f3n de servicio a trav\u00e9s de la inyecci\u00f3n de paquetes o un archivo de captura manipulado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json new file mode 100644 index 00000000000..0456829a3b8 --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9782", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T12:15:04.810", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formEasySetupWWConfig.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279934", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279934", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.414549", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json new file mode 100644 index 00000000000..666dc2a7bab --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9783", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T12:15:05.353", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formLogDnsquery.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279935", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279935", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.414550", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json new file mode 100644 index 00000000000..bc76371c1f5 --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9784", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T12:15:05.623", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.06. Affected is the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formResetStatistic.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279936", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279936", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.414552", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json new file mode 100644 index 00000000000..391e885a24b --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9785", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T13:15:14.583", + "lastModified": "2024-10-10T13:15:14.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. Affected by this vulnerability is the function formSetDDNS of the file /goform/formSetDDNS. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetDDNS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279937", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279937", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.414553", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json new file mode 100644 index 00000000000..436aa702f28 --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9786", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T13:15:14.860", + "lastModified": "2024-10-10T13:15:14.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. Affected by this issue is the function formSetLog of the file /goform/formSetLog. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetLog.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279938", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279938", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.414554", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json index 64ad6e5fb78..a96fd370260 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9796", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-10T08:15:04.140", - "lastModified": "2024-10-10T08:15:04.140", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks" + }, + { + "lang": "es", + "value": "El complemento WP-Advanced-Search para WordPress anterior a la versi\u00f3n 3.3.9.2 no desinfecta ni escapa el par\u00e1metro t antes de usarlo en una declaraci\u00f3n SQL, lo que permite que usuarios no autenticados realicen ataques de inyecci\u00f3n SQL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json index 4d78e7bf8a4..1da574e2403 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9798", "sourceIdentifier": "zowe-security@lists.openmainframeproject.org", "published": "2024-10-10T08:15:04.207", - "lastModified": "2024-10-10T08:15:04.207", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers." + }, + { + "lang": "es", + "value": "El endpoint de salud es p\u00fablico, por lo que todos pueden ver una lista de todos los servicios. Es informaci\u00f3n potencialmente valiosa para los atacantes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json index 3ef776a71e2..56e3c8388e0 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9802", "sourceIdentifier": "zowe-security@lists.openmainframeproject.org", "published": "2024-10-10T08:15:04.387", - "lastModified": "2024-10-10T08:15:04.387", - "vulnStatus": "Received", + "lastModified": "2024-10-10T12:51:56.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running." + }, + { + "lang": "es", + "value": "El endpoint de validaci\u00f3n de conformidad es p\u00fablico, por lo que todos pueden verificar la conformidad de los servicios incorporados. La respuesta podr\u00eda contener informaci\u00f3n espec\u00edfica sobre el servicio, incluidos los endpoints disponibles y swagger. Podr\u00eda informar a un atacante sobre la versi\u00f3n en ejecuci\u00f3n de un servicio. El atacante tambi\u00e9n podr\u00eda verificar si un servicio est\u00e1 en ejecuci\u00f3n." } ], "metrics": { diff --git a/README.md b/README.md index c0172f55c35..2cc0aa36ce2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-10T12:00:19.320087+00:00 +2024-10-10T14:00:21.253206+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-10T11:58:28.630000+00:00 +2024-10-10T13:55:20.437000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265227 +265236 ``` ### CVEs added in the last Commit -Recently added CVEs: `27` +Recently added CVEs: `9` -- [CVE-2024-45117](CVE-2024/CVE-2024-451xx/CVE-2024-45117.json) (`2024-10-10T10:15:04.150`) -- [CVE-2024-45118](CVE-2024/CVE-2024-451xx/CVE-2024-45118.json) (`2024-10-10T10:15:04.357`) -- [CVE-2024-45119](CVE-2024/CVE-2024-451xx/CVE-2024-45119.json) (`2024-10-10T10:15:04.563`) -- [CVE-2024-45120](CVE-2024/CVE-2024-451xx/CVE-2024-45120.json) (`2024-10-10T10:15:04.787`) -- [CVE-2024-45121](CVE-2024/CVE-2024-451xx/CVE-2024-45121.json) (`2024-10-10T10:15:04.997`) -- [CVE-2024-45122](CVE-2024/CVE-2024-451xx/CVE-2024-45122.json) (`2024-10-10T10:15:05.200`) -- [CVE-2024-45123](CVE-2024/CVE-2024-451xx/CVE-2024-45123.json) (`2024-10-10T10:15:05.400`) -- [CVE-2024-45124](CVE-2024/CVE-2024-451xx/CVE-2024-45124.json) (`2024-10-10T10:15:05.607`) -- [CVE-2024-45125](CVE-2024/CVE-2024-451xx/CVE-2024-45125.json) (`2024-10-10T10:15:05.797`) -- [CVE-2024-45127](CVE-2024/CVE-2024-451xx/CVE-2024-45127.json) (`2024-10-10T10:15:06.027`) -- [CVE-2024-45128](CVE-2024/CVE-2024-451xx/CVE-2024-45128.json) (`2024-10-10T10:15:06.230`) -- [CVE-2024-45129](CVE-2024/CVE-2024-451xx/CVE-2024-45129.json) (`2024-10-10T10:15:06.423`) -- [CVE-2024-45130](CVE-2024/CVE-2024-451xx/CVE-2024-45130.json) (`2024-10-10T10:15:06.700`) -- [CVE-2024-45131](CVE-2024/CVE-2024-451xx/CVE-2024-45131.json) (`2024-10-10T10:15:06.913`) -- [CVE-2024-45132](CVE-2024/CVE-2024-451xx/CVE-2024-45132.json) (`2024-10-10T10:15:07.140`) -- [CVE-2024-45133](CVE-2024/CVE-2024-451xx/CVE-2024-45133.json) (`2024-10-10T10:15:07.340`) -- [CVE-2024-45134](CVE-2024/CVE-2024-451xx/CVE-2024-45134.json) (`2024-10-10T10:15:07.540`) -- [CVE-2024-45135](CVE-2024/CVE-2024-451xx/CVE-2024-45135.json) (`2024-10-10T10:15:07.757`) -- [CVE-2024-45148](CVE-2024/CVE-2024-451xx/CVE-2024-45148.json) (`2024-10-10T10:15:07.963`) -- [CVE-2024-45149](CVE-2024/CVE-2024-451xx/CVE-2024-45149.json) (`2024-10-10T10:15:08.170`) -- [CVE-2024-48902](CVE-2024/CVE-2024-489xx/CVE-2024-48902.json) (`2024-10-10T11:15:13.540`) -- [CVE-2024-8977](CVE-2024/CVE-2024-89xx/CVE-2024-8977.json) (`2024-10-10T10:15:08.367`) -- [CVE-2024-9201](CVE-2024/CVE-2024-92xx/CVE-2024-9201.json) (`2024-10-10T11:15:13.760`) -- [CVE-2024-9596](CVE-2024/CVE-2024-95xx/CVE-2024-9596.json) (`2024-10-10T10:15:08.563`) -- [CVE-2024-9623](CVE-2024/CVE-2024-96xx/CVE-2024-9623.json) (`2024-10-10T10:15:08.770`) +- [CVE-2024-35202](CVE-2024/CVE-2024-352xx/CVE-2024-35202.json) (`2024-10-10T13:15:14.077`) +- [CVE-2024-36051](CVE-2024/CVE-2024-360xx/CVE-2024-36051.json) (`2024-10-10T13:15:14.187`) +- [CVE-2024-6157](CVE-2024/CVE-2024-61xx/CVE-2024-6157.json) (`2024-10-10T13:15:14.370`) +- [CVE-2024-6530](CVE-2024/CVE-2024-65xx/CVE-2024-6530.json) (`2024-10-10T12:15:04.500`) +- [CVE-2024-9782](CVE-2024/CVE-2024-97xx/CVE-2024-9782.json) (`2024-10-10T12:15:04.810`) +- [CVE-2024-9783](CVE-2024/CVE-2024-97xx/CVE-2024-9783.json) (`2024-10-10T12:15:05.353`) +- [CVE-2024-9784](CVE-2024/CVE-2024-97xx/CVE-2024-9784.json) (`2024-10-10T12:15:05.623`) +- [CVE-2024-9785](CVE-2024/CVE-2024-97xx/CVE-2024-9785.json) (`2024-10-10T13:15:14.583`) +- [CVE-2024-9786](CVE-2024/CVE-2024-97xx/CVE-2024-9786.json) (`2024-10-10T13:15:14.860`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `511` -- [CVE-2024-22068](CVE-2024/CVE-2024-220xx/CVE-2024-22068.json) (`2024-10-10T09:15:03.190`) -- [CVE-2024-36989](CVE-2024/CVE-2024-369xx/CVE-2024-36989.json) (`2024-10-10T11:58:28.630`) -- [CVE-2024-38348](CVE-2024/CVE-2024-383xx/CVE-2024-38348.json) (`2024-10-10T10:32:15.330`) -- [CVE-2024-4639](CVE-2024/CVE-2024-46xx/CVE-2024-4639.json) (`2024-10-10T10:39:06.410`) +- [CVE-2024-9471](CVE-2024/CVE-2024-94xx/CVE-2024-9471.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9473](CVE-2024/CVE-2024-94xx/CVE-2024-9473.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9518](CVE-2024/CVE-2024-95xx/CVE-2024-9518.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9519](CVE-2024/CVE-2024-95xx/CVE-2024-9519.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9520](CVE-2024/CVE-2024-95xx/CVE-2024-9520.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9522](CVE-2024/CVE-2024-95xx/CVE-2024-9522.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9549](CVE-2024/CVE-2024-95xx/CVE-2024-9549.json) (`2024-10-10T13:14:51.793`) +- [CVE-2024-9575](CVE-2024/CVE-2024-95xx/CVE-2024-9575.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9581](CVE-2024/CVE-2024-95xx/CVE-2024-9581.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9596](CVE-2024/CVE-2024-95xx/CVE-2024-9596.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9602](CVE-2024/CVE-2024-96xx/CVE-2024-9602.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9603](CVE-2024/CVE-2024-96xx/CVE-2024-9603.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9620](CVE-2024/CVE-2024-96xx/CVE-2024-9620.json) (`2024-10-10T12:56:30.817`) +- [CVE-2024-9621](CVE-2024/CVE-2024-96xx/CVE-2024-9621.json) (`2024-10-10T12:56:30.817`) +- [CVE-2024-9622](CVE-2024/CVE-2024-96xx/CVE-2024-9622.json) (`2024-10-10T12:56:30.817`) +- [CVE-2024-9623](CVE-2024/CVE-2024-96xx/CVE-2024-9623.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9671](CVE-2024/CVE-2024-96xx/CVE-2024-9671.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9685](CVE-2024/CVE-2024-96xx/CVE-2024-9685.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9780](CVE-2024/CVE-2024-97xx/CVE-2024-9780.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9781](CVE-2024/CVE-2024-97xx/CVE-2024-9781.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9798](CVE-2024/CVE-2024-97xx/CVE-2024-9798.json) (`2024-10-10T12:51:56.987`) +- [CVE-2024-9802](CVE-2024/CVE-2024-98xx/CVE-2024-9802.json) (`2024-10-10T12:51:56.987`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3b7e8025d23..3a08b2974b8 100644 --- a/_state.csv +++ b/_state.csv @@ -209926,7 +209926,7 @@ CVE-2022-45331,0,0,d56f749377ee32baee9704d453f5cd7e14fbd7458db161db1deffebffb365 CVE-2022-45332,0,0,94e4da01e7f2e9d6ba2c8e99622553188f4f4167cbc35169367dcc156794dbb9,2022-12-02T16:00:13.253000 CVE-2022-45337,0,0,830eb8f9f5adeb6c6998db938ed05d61122b66828a8f1ab6eeac86e2a3a672e9,2022-12-02T16:02:46.090000 CVE-2022-45338,0,0,db1e020348022570d7195413db7fcda6e9a2a1a6fd517d6e5e1f9a26657625c1,2022-12-21T14:20:14.273000 -CVE-2022-4534,0,0,2bb406e0fc52b7db4f61b8152412d6c659d5c0e00270df609baeae3e3d515f25,2024-10-08T09:15:07.773000 +CVE-2022-4534,0,1,4812d351db6e41c320cd995d1d60db0e0b45c340b23bb3df2f1636c908464b2b,2024-10-10T12:56:30.817000 CVE-2022-45343,0,0,5d1eedc5ac96b36b5cac78d0ad63fbfaf79649ad176111ac6e98fd0014b02356,2023-05-27T04:15:22.513000 CVE-2022-45347,0,0,aa840505d505f8cfa34c393e60695382d9a7dc0e3a08e26dd265dd2e128ee0a3,2022-12-29T20:05:34.053000 CVE-2022-45348,0,0,601a6349d6b996a0ea4f19d771a9774f413bffbd95ae45426ab597a152ee65c0,2023-11-15T02:22:44.767000 @@ -227285,7 +227285,7 @@ CVE-2023-36317,0,0,c079cfb22cefab3f68143c585133ce4a69cf059be109844f051d6b5cfe343 CVE-2023-36319,0,0,4f2f9b43de4f619c1ecd79d747be40d5cfa224891e28131a7aa2b697e390ee2c,2023-09-21T13:20:09.453000 CVE-2023-3632,0,0,c0b2e40cbda3f2ee6107fd6d29665ee1a2dc274485d787cec90bc7cd79e0d9ec,2023-08-16T08:15:41.550000 CVE-2023-36321,0,0,3a757d1927b56aa55826750e72e53ed68bd81a53376818344594d48da7b7b82d,2024-08-01T13:44:06.490000 -CVE-2023-36325,0,0,26805ae4e49d080824a665a699cf47af838a4d6c7b1b0d4738480f9a968f0b13,2024-10-09T06:15:11.303000 +CVE-2023-36325,0,1,34adff3c3e012e8498345f808977d87a66a8a4c562ffe7dfed842240789cc82b,2024-10-10T12:51:56.987000 CVE-2023-36326,0,0,ded9eb90a8ff10548777c4348acf8633173a5fdf3caf961f9c4181c6b713fc5e,2023-09-06T00:04:24.377000 CVE-2023-36327,0,0,7eeaf1acc33373866f4ef20f13e035096e985e7a884ec7a542b5579b42a728cc,2023-09-06T00:05:15.863000 CVE-2023-36328,0,0,2bcddcad90867d8da646da5264dfa03e8941e4a150d5759638d15ecb3a68202e,2024-03-07T17:46:02.277000 @@ -227916,7 +227916,7 @@ CVE-2023-37150,0,0,d05a1b0d875f1cfb8b8d9baa69f7e4346989eabceeace7d843178ad656fb1 CVE-2023-37151,0,0,bf6cf332b567d32eaeddc623f5bf07af51d14964109f0e2dfbc5db2d182aa204,2023-11-07T04:16:52.113000 CVE-2023-37152,0,0,ca65ebed26c8101f159b0151dd7fe9e9ce43a5c3219a1e852d7fdfcb325ca20e,2024-08-02T17:16:30.650000 CVE-2023-37153,0,0,e122d0bcc21e8639e43c4bbd1c9b0bf614aae545f65b9ad3f17a6efcd01c6868,2023-08-02T15:15:10.610000 -CVE-2023-37154,0,0,f7388c9c1b0a13dd9a4162a07b0de01d36de30f3455addbd0ab05525cbf3e76f,2024-10-09T22:35:00.577000 +CVE-2023-37154,0,1,65034132634397b2b626a2b07d04b93d69c32d51344e4ce738b4c6d25adf6abd,2024-10-10T12:51:56.987000 CVE-2023-3716,0,0,d0f060c388db946191575a3899e743906999df63f1f15865bc69aad089789ee5,2023-08-10T03:51:39.830000 CVE-2023-37164,0,0,d248be9d35f9c17bada918addf9d6a2fca4a0b9702928afff3b86ead659d9f15,2023-07-31T17:00:03.897000 CVE-2023-37165,0,0,3e398869f80e6f16e25a43e3872dd9d5deaede02c385be5baa88b538c80bdf72,2023-07-31T18:22:59.597000 @@ -234022,10 +234022,10 @@ CVE-2023-45355,0,0,b59e8a5c262fc336755665d3f82901992de366c3cd37580ce157b1da22017 CVE-2023-45356,0,0,a62df74c374cf7bacfa1e71cb2f8f490477edf6944efd6c2b790f8110ba45b0d,2023-10-12T18:35:22.260000 CVE-2023-45357,0,0,b61bb0f6d334abf3f7461d24dfe821b0ca5f9b0dea69f41511f89389f2f4b422,2023-10-24T19:56:37.377000 CVE-2023-45358,0,0,7f96189ec3a479246b13a2926c14e3d2144a7c985302246d9c9c0ec1db4dda0d,2023-10-24T19:19:29.867000 -CVE-2023-45359,0,0,20af715e0cd0fe912da0d73640c5551a126a76573b17e54f71c2a2dfd7d2c35d,2024-10-09T22:35:01.493000 +CVE-2023-45359,0,1,29056f35a51f9add098a82746f86ff460b13b62f7b8e3767548a8977eabc69f2,2024-10-10T12:51:56.987000 CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5b0,2024-01-23T19:38:31.160000 CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 -CVE-2023-45361,0,0,10253df39112f65e66d43e0903fa429df40e36757d111a4a45028ed4d1d94cf5,2024-10-09T14:35:07.353000 +CVE-2023-45361,0,1,cbe1837117bae77cfa7c8113ef4bff14da0fe193bd049419020e7f971bbde8da,2024-10-10T12:51:56.987000 CVE-2023-45362,0,0,6a324f41b6301bc393e4e53b7fe2d3c213070e5c36f11f2203dcccfc20038a9d,2024-06-10T17:16:14.220000 CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694240,2023-11-28T13:15:07.313000 CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000 @@ -234373,7 +234373,7 @@ CVE-2023-45868,0,0,df1b586624033c287b172839b213cbc8ec979ba18d71fde3b01da0f77fe96 CVE-2023-45869,0,0,ae0033b8875e66831bd0fa49aa37f059d0cc638339d10a85f589d8c5031628cb,2023-11-14T17:40:53.637000 CVE-2023-4587,0,0,2d9161b0ba4b4b9f51444521be9ee96176e07c56f44d6bd3c1d677910159fe30,2024-08-02T08:15:22.973000 CVE-2023-45871,0,0,cf2c19d8d9a1ab8bca7df10be3896fb36b75b63207dd8eecbb49b88c6aec0739,2024-08-27T19:35:21.703000 -CVE-2023-45872,0,0,52b4cbdd20e6c6108754c68484eee0be31ee049b031a05adb9e290bb7b38d918,2024-10-09T06:15:13.323000 +CVE-2023-45872,0,1,c368ffc64d5b1561b0b53517b3e43e83e521e9be8cf068267b382cd9bbc7eaed,2024-10-10T12:51:56.987000 CVE-2023-45873,0,0,a568e54c26b58817453d7ca833079f4de460e9bdaf499179488e9f031ae443eb,2024-02-29T13:49:47.277000 CVE-2023-45874,0,0,15b94d1156a65969baf5a063838eca4cde85c5739f0df1171f246a13f786bc4d,2024-02-29T13:49:47.277000 CVE-2023-45875,0,0,038bbc1a2170768a377d8f1365d66fe112fd5a90d392e5c1931cf0dbd0bf9463,2024-09-04T16:35:03.760000 @@ -234899,7 +234899,7 @@ CVE-2023-46581,0,0,ddbe9f76840b22f517942a1f34726a719d3e36386b213c605802508e5583c CVE-2023-46582,0,0,0894f8ba201a6b65eace2e6bd10d8ff5cca6b5c7fb29301efb138b31a43d6fbc,2023-11-20T20:35:04.477000 CVE-2023-46583,0,0,969c355d7cfec10c8a1f9b16324cc93d129ae26776b599d85f02e6163d12b61d,2023-11-03T17:39:21.597000 CVE-2023-46584,0,0,d277677c561a6e9506409f2c4808eaaedaa00cb068832fa603cd3e156430cbdd,2023-11-03T17:46:20.620000 -CVE-2023-46586,0,0,9fce462d3e786bb62be16e1ae969156b04ea74a6323cc6f390031a8a163010e2,2024-10-09T14:35:07.683000 +CVE-2023-46586,0,1,4095f14b6ca92db0cc92ad98714345abe0b85a904851ef18c9ee1900fa1b58da,2024-10-10T12:51:56.987000 CVE-2023-46587,0,0,7c66d76999c5f4a7223ba40fb9aee5bec7036799264d9bd6a20cfabf7a6dedd7,2023-11-07T15:09:23.127000 CVE-2023-46589,0,0,bd780c2dad93b0e2d205a58b4dbad854e66abc28d93ba51e26c0cbc208e26540,2024-07-12T16:11:18.710000 CVE-2023-4659,0,0,734dc6182932d6aedbbb6f226cde06492d58ea9196ddbf2e6087df9402266726,2023-10-04T17:01:28.217000 @@ -234913,7 +234913,7 @@ CVE-2023-46604,0,0,d1e17921b01fd33d108fab2f64dba0dc2288f89b2a4a9034578176c625d2e CVE-2023-4661,0,0,98d2a0a1a775ec3ad63d452f96f15499cb98b8db94bb52acdc90acfb5980d232,2023-09-20T15:09:24.373000 CVE-2023-46613,0,0,b6af521f7ebc19f77f2ce5714819dc83e3c08e967b43f946a2e764fcf9ad8cc7,2023-11-15T03:37:23.457000 CVE-2023-46614,0,0,d619b5937e29641f4030512056156b72f91f06f0312e6712a2467ec9e507e231,2023-11-15T02:26:24.490000 -CVE-2023-46615,0,0,e35cb394a564c6b399e3008a4d1524a4400ade667d7918cd3796d85901fe63d7,2024-02-12T14:19:54.330000 +CVE-2023-46615,0,1,3ce65aca27d86599d61b4257dc53923b997be1ebcbc4521ecf243d635d44615f,2024-10-10T13:24:23.423000 CVE-2023-46617,0,0,61a4ff8e8840e94d1989554db2bff21b33a6d02c389996d1f54be5e0e829a543,2023-12-20T04:16:54.720000 CVE-2023-46618,0,0,4e10b86c26d7691c369365eaf3b99317ee503d346e2223d9ad50e258e736ae3f,2023-11-17T00:48:36.687000 CVE-2023-46619,0,0,2f5e4c20ae73a1191dd13f372435ae95e6c5be8e07895d7b10a6c4a1351fc714,2023-11-17T00:47:22.077000 @@ -238106,7 +238106,7 @@ CVE-2023-51367,0,0,13b08a852d09d8daf57b0e20f60b8fc85ad6b982827c91530f85477131fd5 CVE-2023-51368,0,0,1f0ffb08dd881989ff3b55d03503deb5ea351f39f777f97943993d6ba81a24b0,2024-09-11T13:33:30.853000 CVE-2023-51369,0,0,8f265df3d4e40621d656fb0071a5c62084dc6119e0f3ed735a9b7c50f66b4c96,2024-03-15T16:26:49.320000 CVE-2023-5137,0,0,f4d50157363ee87d922395d6d0725c0ab84d476da7eb0900b229c1c7873d5b05,2023-12-07T20:19:29.557000 -CVE-2023-51370,0,0,17685d32add518430562912949933d9a42b2e70c6fbd55da2123a8002edd78ac,2024-02-12T14:20:03.287000 +CVE-2023-51370,0,1,6e6b5b56007c8db394c24055b9b02396fb8c72cbeed1cbdd563182be18b17f4c,2024-10-10T12:46:36.377000 CVE-2023-51371,0,0,6fc6cfff5efd510bfe565bfd71837dcd3a396b9cdaa4c11f70c269e7153fae75,2024-01-05T04:52:43.767000 CVE-2023-51372,0,0,f1acbf37f7ee8dc789954d63180d2a87833e0abc434fd9bb8ceb7f3fa8ae236e,2024-01-05T04:53:29.053000 CVE-2023-51373,0,0,b699256bffda18b48a2fa9c65a0d974a60f132fc74dac2aabf14ed3ac782bb13,2024-01-05T04:53:36.090000 @@ -239476,7 +239476,7 @@ CVE-2023-52948,0,0,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db54 CVE-2023-52949,0,0,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000 CVE-2023-5295,0,0,41c6baf71065d9210a6020c54df01a479effe3ab43eb4f6a24f246bdbfb6c99e,2023-11-07T04:23:49.733000 CVE-2023-52950,0,0,8f3573aeaa08ecbde7fa2e7d1621b857fef69d5f70409675af871fb9ea9d77f3,2024-10-02T15:26:33.837000 -CVE-2023-52952,0,0,8062ec4a56491efd39fec21d68c9e134f915959fdc68c2325eb2dcd8149ebfb7,2024-10-08T09:15:10.097000 +CVE-2023-52952,0,1,62afc61f0161caf38bbaea2ee3a5be4c0ec386bafda7e8673aea780790651eef,2024-10-10T12:56:30.817000 CVE-2023-5296,0,0,476d33b024be332ac896dbf35bcf9a4f784c8ee1e5e045f6783134e6c34f6d9c,2024-05-17T02:32:59.083000 CVE-2023-5297,0,0,ae358353c2ceed16fa9e9e76c2608b86123b91774a8853eb6bb1140ab0dca019,2024-05-17T02:32:59.190000 CVE-2023-5298,0,0,b737514e302eee8d165af79674626b1e30c9fc6b7145814e6b6dce9deaaa8577,2024-05-17T02:32:59.290000 @@ -242561,7 +242561,7 @@ CVE-2024-1435,0,0,fbebcdb94898a9ad3a34bddb8b900855d9e93e435e1b0c1e93fc82b26df0f7 CVE-2024-1436,0,0,8d8b4f87f68e8ffd37df5a69f50b66808f1e1dec30f5aea12f028a89c8c9184a,2024-02-26T16:32:25.577000 CVE-2024-1437,0,0,110c68d5f65a5ded07ade3a9c0d43a1a3c6c15b5489b6823f2cffbc456317f8e,2024-02-29T13:49:29.390000 CVE-2024-1438,0,0,dea869d8ac39fd06da54961268c68a5b510ed1a2026d29b9d220b34114030b90,2024-05-08T13:15:17.563000 -CVE-2024-1439,0,0,12c036c2ac9e642a458cff56607c7ffc84f906a6f899b2f7a403b972224b30ae,2024-02-12T14:19:54.330000 +CVE-2024-1439,0,1,43ce5982342493c0faa3dc550ee9325d2d5943ee4fa27d635790e0b438fd8ca0,2024-10-10T13:55:20.437000 CVE-2024-1441,0,0,09f257f1503a1ee26e7e54f8f6ff52cf8604c0a6cf93580e6fda4bb463991e67,2024-09-14T00:15:16.957000 CVE-2024-1442,0,0,892292fcf842b1c6deccf97908762ab6962edcfd37b90ef0840ffe7805d083f1,2024-03-08T14:02:57.420000 CVE-2024-1443,0,0,57a986c0b6d1b97ca8aaa911f38554fde859c4e2f90ed2bafc348ffd4917fbd5,2024-03-07T13:52:27.110000 @@ -243435,7 +243435,7 @@ CVE-2024-20655,0,0,cae1d357f29bef6d233c9c76ce924ccc959225ca2ce420e7af9529ffd06ba CVE-2024-20656,0,0,c9ebae89c8902302848e2868c5b6fb90e0fca65d0a1fec5269681adfdb66d7bc,2024-05-29T00:15:11.990000 CVE-2024-20657,0,0,b466234516f418950a092b52e55b58fa323327a940e6b72dd18cb7ba197307f5,2024-05-29T00:15:12.113000 CVE-2024-20658,0,0,e556e49701859306ad325c4312f9d48a6d5b37398959a8cfc236bb3bea867e48,2024-05-29T00:15:12.253000 -CVE-2024-20659,0,0,beab5c335634d8b67623acbbdece1c2b2557ea0f6e95ea27da8461d136f15257,2024-10-08T18:15:05.220000 +CVE-2024-20659,0,1,6b35b5cd5d8b535cc0feca6f746d3d33808504e41cb44acae592aa31206b6960,2024-10-10T12:56:30.817000 CVE-2024-2066,0,0,0497c7b857cb8916f2413ad9bb3decfe261b5e76886adae725181fe2166b5d8c,2024-05-17T02:38:01.397000 CVE-2024-20660,0,0,0e49450f4fdc00da7d2ee302953459078b588f5dc1a1fa53995d69d2b45a0623,2024-05-29T00:15:12.457000 CVE-2024-20661,0,0,f2742113a6ea57b429537a3f83c13946595eead13454f9548023f5311693d1f4,2024-05-29T00:15:12.607000 @@ -243560,7 +243560,7 @@ CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697e CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000 CVE-2024-20784,0,0,c6884bc627ed39cae939efd566f5b968239c6eaef242b82fbe3791e77cdfc6fc,2024-06-14T19:30:15.503000 CVE-2024-20785,0,0,2013df6eaaf2d2be10850161c767601a113a3dcbc6d19bf74fca25fa02ef32fb,2024-08-02T20:17:44.283000 -CVE-2024-20787,0,0,5ef36d22b394e964f675917df17f3cb817954d74d1660e1c20e2f82ba1977afb,2024-10-09T09:15:05 +CVE-2024-20787,0,1,4cc9588a3bb359db9ee6123ebb04758953f680e244104f9acc8268bc1640c1b1,2024-10-10T12:51:56.987000 CVE-2024-20789,0,0,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000 CVE-2024-2079,0,0,f10772ba31d142dba517b938901fc1b75b6b0e63ac1ac474e47c5b00d72243ad,2024-03-14T12:52:16.723000 CVE-2024-20790,0,0,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000 @@ -244199,7 +244199,7 @@ CVE-2024-21485,0,0,5dac3ea1a637c42101b33e62955da26f7c5ea3ebfcf697d6c5d1918b66c86 CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad095a,2024-02-08T13:15:09.700000 CVE-2024-21489,0,0,6e86fec7408d381a4d3031befda9d6c352fa47e8cee94c50201daa0dfff4032f,2024-10-04T13:51:25.567000 CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000 -CVE-2024-21490,0,0,e17a653e77f03eb73e8c36ea364bdcd13a9ebc47ed80c4249ba6d2a59b83412c,2024-05-14T14:54:54.393000 +CVE-2024-21490,0,1,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000 CVE-2024-21491,0,0,1769048d774ec4b234c998b8669c71a35a58efdc743d738c18d816115ffbebfb,2024-03-06T14:15:48.020000 CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3fc49,2024-02-20T19:50:53.960000 CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000 @@ -244244,8 +244244,8 @@ CVE-2024-21529,0,0,664e585ecfec877dc16e4d09f63918fa2af81f0c56860c291a634c3448dac CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957324,2024-10-04T13:50:43.727000 CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000 -CVE-2024-21532,0,0,92d820bffe745b853ea7bc0867f78565ed04403bb753f19bd9796f9764c035e3,2024-10-08T05:15:13.920000 -CVE-2024-21533,0,0,c34539e5039e6d9b0369fa18fde90c79f00ce520597b9e1d7193444781c2d83b,2024-10-08T16:35:04.437000 +CVE-2024-21532,0,1,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000 +CVE-2024-21533,0,1,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -244609,7 +244609,7 @@ CVE-2024-22060,0,0,7f79d2875f5a614fca219746c1bbf5a9acd1ca84384af60f4f2ea354a4c82 CVE-2024-22061,0,0,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11ac3,2024-07-09T18:19:14.047000 CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000 -CVE-2024-22068,0,1,30a068a37c8f86c60c5f8722c7b135885c78bee8435bb094db05945fff9e8805,2024-10-10T09:15:03.190000 +CVE-2024-22068,0,1,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 CVE-2024-22074,0,0,a1a776748154594eabd5bedbe0254430e590ea44ffb88bfb446bfd71a59f69e3,2024-06-07T14:56:05.647000 CVE-2024-22075,0,0,a5af4a36684a159511579f89d3ce85206e57c3558ab3a4b37d02f2a846a5e5f1,2024-01-10T15:06:42.563000 @@ -244960,7 +244960,7 @@ CVE-2024-22439,0,0,d7a7b572beee53b66512fc19be17c3d6cb68344acbd1d99f9e2956209263c CVE-2024-2244,0,0,41aec355f079deb3c815718a9277f010e5e21c50317c0cc2fa902ffd2d6d5133,2024-03-27T12:29:30.307000 CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d915,2024-04-17T12:48:07.510000 CVE-2024-22441,0,0,b624581828dca72606ce8eda6c6382b6dd6de672924291674c98df7718b61e7b,2024-09-05T17:42:43.337000 -CVE-2024-22442,0,0,466e9dae5de9dd0d6abffd7401018ab4afc624390239247802cfe4eb99ae2e28,2024-09-05T17:12:12.433000 +CVE-2024-22442,0,1,09f1aad386bca964633fe45829e3e2647a8676953c84351b0d815875d34ce2a8,2024-10-10T12:47:22.213000 CVE-2024-22443,0,0,27a67673b7c0ae8982f980390674c80990ca93968fa9f3b73c7d5ad9ff61d8d2,2024-08-01T13:46:57.173000 CVE-2024-22444,0,0,1378366e0b636efd3e2101cecabd93b96114212b319eff1d0d59da40fea2e792,2024-08-01T13:46:57.887000 CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000 @@ -246466,7 +246466,7 @@ CVE-2024-24871,0,0,ee5134ef54fd356500bb48a0a11b3c836e7dc245bea6efc98de0fe9204a42 CVE-2024-24872,0,0,ad338b69a69d86fa61a70aeb5793d41075a12d4cbae0ff1d0d4273a5c16238a3,2024-02-22T19:07:27.197000 CVE-2024-24873,0,0,149bb28e0bccc5e8c3b4f93b4180e41e9f95d5d4231541e097ad7f80ccd56295,2024-05-17T18:36:05.263000 CVE-2024-24874,0,0,3df268010bc5bf2a018bb73189c1ad4a63f93d30714fd6915c88f6b314b6cf7f,2024-05-17T18:36:05.263000 -CVE-2024-24875,0,0,7b56bca4175d0049042b5873976238e30bc114d44edd2790ce2f6ea51395605a,2024-02-12T14:19:54.330000 +CVE-2024-24875,0,1,d4175d9d145d2e6aa042e46e11e97f48819e638c38138d0ec209148e9f744599,2024-10-10T13:27:56.887000 CVE-2024-24876,0,0,fd2b02565d60f44ad7f12138fcc8688af9116be3df3cfc2409498788186c00a9,2024-02-22T19:07:27.197000 CVE-2024-24877,0,0,9d2f0e7fc46543edf49748fb4f8f8be67b4fb86dc6a0325358bf368765aade7c,2024-02-15T02:53:41.823000 CVE-2024-24878,0,0,298a08ab82a5bf3a5e1905d2bd2b0b3a16b15c92c4d573ce5c55312b22ff7afa,2024-02-15T03:01:50.883000 @@ -246476,7 +246476,7 @@ CVE-2024-24880,0,0,d33c65d2cd8280ebaa686b2fcc8fd218b13ad4aa68609a2777547b3bf6ac3 CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 -CVE-2024-24884,0,0,9cc0b3ec8c7734d1deb101b539045a2699ea3341a31f17e51491360af063871c,2024-02-12T14:19:54.330000 +CVE-2024-24884,0,1,bcd4b281833f0f167349202509856504a1d7c51e6c1ab7a941bd77337e58f0a9,2024-10-10T13:37:34.213000 CVE-2024-24885,0,0,7a43d600d033d18ff5a631d3c78e01918ca77dcf41ffa14f3f93f7c9b4bb4ad4,2024-08-02T00:15:23.523000 CVE-2024-24886,0,0,07792f7aa43278f631451e24100471b838930227e2960a56c45baad7e36474f5,2024-02-15T05:03:32.117000 CVE-2024-24887,0,0,b91ba2c15170dd37eb83644d09105b152fe9fce4832e88e978eca355fc6a4e64,2024-10-08T16:48:35.663000 @@ -246756,11 +246756,11 @@ CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f CVE-2024-25270,0,0,5f30998f0581b52564ffa879dfe70f343d5031848a9545cbe5dd55b89d561500,2024-09-13T16:01:01.810000 CVE-2024-25274,0,0,6d61d530dc49a931412656c8f607fd75a29229348fb483cac927de396452465f,2024-08-29T20:36:19.120000 CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000 -CVE-2024-25282,0,0,ad5adefec4b2ae9cd7b70c0e4074c0b23e21283c69ae293bb4cc15205e2cd08b,2024-10-09T15:35:11.880000 -CVE-2024-25283,0,0,ea1f7eb37df199b0742031837ffdff119422945944224010744062a42e8efeae,2024-10-09T15:35:12.690000 -CVE-2024-25284,0,0,8ad66d77cb887221e3b9656f8ee65f3a3250afcd8618a6d71142a8325a902290,2024-10-09T15:35:13.433000 -CVE-2024-25285,0,0,9581b2f9e5d37d9f97582be2bb7a9aa5c565114f6c3384e0ddaa9465b667913f,2024-10-09T16:35:07.700000 -CVE-2024-25286,0,0,d2996e9acfac66431ee3ce4b29371ebca19246d1b18aa3ce8d9bc306e453b53c,2024-10-09T15:35:14.180000 +CVE-2024-25282,0,1,a9e6855cd7f9a8cf7c2eac16f5c1f55f984a5fce2b55c4fb2f547f4e69a858e4,2024-10-10T12:51:56.987000 +CVE-2024-25283,0,1,c96c25aa1c3d5ee48e3248f0333f28d4afcec073368f5634a98840b6b5e83126,2024-10-10T12:51:56.987000 +CVE-2024-25284,0,1,ebf7377bc52ac0b94b0d40b9d861bb5b12dcb8ca2dc2caec6a4352f477913f13,2024-10-10T12:51:56.987000 +CVE-2024-25285,0,1,1e3d0485481e2cac6d3fab7ee2f59a7fc90ce15faeef05ed597b38ff1139c59e,2024-10-10T12:51:56.987000 +CVE-2024-25286,0,1,97d1657746f6ccd62d0cb4e5dbf5d1be9a21dd0de6b511e69936e1dee1a9a2cb,2024-10-10T12:51:56.987000 CVE-2024-25288,0,0,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000 CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000 CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000 @@ -247032,11 +247032,11 @@ CVE-2024-25701,0,0,fb0acc04edd8e6129d7e18302257d0475b8cc46294099a9f7b2a28d5e4af7 CVE-2024-25702,0,0,f3e8de2c8081bd58ef3e73b671dc2c1b9812e9004fd627e4151ed8957347dac4,2024-10-07T17:48:28.117000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 -CVE-2024-25705,0,0,c9fa71f2e3b4d60b760a7a0fbd06a7695a831b2f4ed1a8ae028fd9d80b77afff,2024-10-08T17:15:30.027000 -CVE-2024-25706,0,0,76cd46bef97f68be46879fc697c19397ad5a3588f032936cbf1c2ccf6233df59,2024-10-08T17:15:30.303000 +CVE-2024-25705,0,1,70404f8be55e7f45193785fe1a9f191f8bf3c87c1846c3ded06f2c02ee5cc19f,2024-10-10T12:57:21.987000 +CVE-2024-25706,0,1,add44ad3e9f5590ddacd6c67344f87aad7254e9f59742e2356fd47eb73c7d906,2024-10-10T12:57:21.987000 CVE-2024-25707,0,0,3bb0ddd1c56cea2a265f7e18aa1195f02551815bae9729435bea1e331186d842,2024-10-07T17:48:28.117000 CVE-2024-25708,0,0,b995ea56334b971dfe3d8608dc1ee58bae4d9dee517e37442e06f48d1ac62cd2,2024-04-19T23:15:10.237000 -CVE-2024-25709,0,0,6187278f353e68f2e97f0f71714f293249b03a10e9b00415a06f8bd5449339e9,2024-10-08T17:15:30.607000 +CVE-2024-25709,0,1,0d5968e8aa771b1d68be8b34b983543f2d0d3a449ed1422c1a453702a3d8ef22,2024-10-10T12:57:21.987000 CVE-2024-2571,0,0,944818011263aece939e20c7251816424f7831487c7b65e2eb2d8bf532c69b9f,2024-05-17T02:38:20.267000 CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af70611b1,2024-03-07T17:15:12.940000 CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000 @@ -247089,7 +247089,7 @@ CVE-2024-25808,0,0,c8b3842916e7c06900b08f9fd62594e0f61e1918f91fddba1f15f9656576b CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000 CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000 CVE-2024-25817,0,0,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000 -CVE-2024-25825,0,0,5ca1e4ad60487a4bc79feabb10baec168b6bbb3135ea1a857f949b04337b1ae1,2024-10-09T16:15:04.277000 +CVE-2024-25825,0,1,d8471d9f859d921205640c4475c10e3c70e3ce8e50306ca5fe30ffebb185a757,2024-10-10T12:51:56.987000 CVE-2024-25828,0,0,bb5f11d12010040c46347f1b01567677eceaf6416fc48feec74112280779705c,2024-08-19T21:35:05.027000 CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000 CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000 @@ -247129,7 +247129,7 @@ CVE-2024-25874,0,0,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653 CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000 CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000 CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000 -CVE-2024-25885,0,0,c4c35b30ecdc096cf80c648aec8f0c937c1e4c435d03b7a8f2c1b020d59586fe,2024-10-09T15:35:14.920000 +CVE-2024-25885,0,1,d7b45ca9946efade56286fe216db0d8d419d93e37f8064c8e12d635de4b291aa,2024-10-10T12:56:30.817000 CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000 CVE-2024-25891,0,0,e93779192ae2b53bc940c8dc86dbc0a2aabc2f496df349ea80435884b9f989b3,2024-08-29T20:36:23.993000 CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000 @@ -247658,7 +247658,7 @@ CVE-2024-26592,0,0,918f5c467e1a2d783dfdce08bbf11395643ada4c163274488d6a9fdec073f CVE-2024-26593,0,0,54b53ee93c92dedcf04b4ae324bf5b755d7c944df0f43f1bec441c0daed5c72f,2024-06-25T23:15:24.260000 CVE-2024-26594,0,0,dad03aada11e4c84f5ce999bb3d6fbaa8ac08117884246f49c61d689ab3164c3,2024-05-29T06:16:36.423000 CVE-2024-26595,0,0,b42513cc313bb8606b1586c4189fc0db79930dd6ddb603f1fb221f36ccadccd0,2024-04-17T19:55:31.323000 -CVE-2024-26596,0,0,a95c365bb8aa86f65ccf48ab078f1b584d1d4007c2aa74b6e9891b14dbdc0efe,2024-04-17T19:54:59.240000 +CVE-2024-26596,0,1,9f6eba399b7843bb3565fee0f354f3b872e78bb2526ed15a898ad13d407abf0f,2024-10-10T12:15:02.790000 CVE-2024-26597,0,0,ab528d9508a4a43c1bd633754ae26c95fecf70fa3f069dcff05111c73d87ff04,2024-06-27T12:15:18.200000 CVE-2024-26598,0,0,1e518e82505097e7b8cfcdf7448800a539eb76e006eac697ca8f89d65bc9d900,2024-08-27T14:34:41.740000 CVE-2024-26599,0,0,6aea73e570b1bfdda9488cab227d897f6bf1c7ed921862f42cf866fbae061ada,2024-04-17T19:34:01.837000 @@ -247866,7 +247866,7 @@ CVE-2024-26781,0,0,cb4869762a952b7234f947ba718a2d7f18787da6b69e4e64491d2b0c356e5 CVE-2024-26782,0,0,a8f0edf206263b3c9eba58e0fb3861d3e660f94765ec36c7016ad2ad149976c3,2024-06-25T22:15:22.560000 CVE-2024-26783,0,0,2af6ae94e0862d9e4c8fd1dd01e9d9533df487005b3632bcc9e5cde226324207,2024-04-04T12:48:41.700000 CVE-2024-26784,0,0,3a3f9b64e77aea2ce61d08fe6ae8aad422b3d40e30ce83138a1e05ab32d7f913,2024-04-04T12:48:41.700000 -CVE-2024-26785,0,0,0d5940fc4053774311d4d4f3fb46acb9b6ddb8d12dae585a479e8fff8c045aa2,2024-04-04T12:48:41.700000 +CVE-2024-26785,0,1,492d91066ad796fd42a81d8353bd8f9a1d6609491204ab2e4afcd38caad744f6,2024-10-10T12:15:03.027000 CVE-2024-26786,0,0,29f52e2c0a0f5b7aecb70f0756ea16c51e362ca0c8e31235a1f9a3735487e914,2024-04-04T12:48:41.700000 CVE-2024-26787,0,0,f985833eabc0b397db214dacc58c7e104cc79adde180c68c036e584aadedd282,2024-06-25T22:15:22.630000 CVE-2024-26788,0,0,50c90a7eb339f42da123055401cf03e57c42ac2878a6117d1ce68ecb98eebf96,2024-06-25T22:15:22.697000 @@ -247922,7 +247922,7 @@ CVE-2024-26832,0,0,8fbeb8710f90c02063ecf75784b256b9f13ddee2ee47d746360243803a6de CVE-2024-26833,0,0,ae2901c2447f72326344eeefa5cddd7be6a8f2ac3dacebf09ca5eb62e2f5b764,2024-06-25T23:15:26.220000 CVE-2024-26834,0,0,4623c1bca296578f478584e5f56aabbb87da7d659f9e84ccba63db6a6f18c42c,2024-04-17T12:48:07.510000 CVE-2024-26835,0,0,e44a007db6ab342dc34e3f76c541959d84f77c3172ce6ea1d234b4fcf811331e,2024-06-25T23:15:26.347000 -CVE-2024-26836,0,0,bb88f6bbf55da0ce72f77e29f949b1f6d1fe39a04f9d5386f68ceb019f415441,2024-04-17T12:48:07.510000 +CVE-2024-26836,0,1,1e06c1a5136cdc2a0851d79f38cc7826dff54a85a36c4574358b6d319470c5af,2024-10-10T12:15:03.120000 CVE-2024-26837,0,0,cebe5dd8561236d0e159e32823116dbacdb7004835bca4f91e5e2efe44156f3b,2024-04-17T12:48:07.510000 CVE-2024-26838,0,0,d0f2f04624a42c6863ed3ad7790e807967f2532a3e46377b8420b63379f278cf,2024-04-17T12:48:07.510000 CVE-2024-26839,0,0,eaf028ae28b3d357ad3a5591a46cfd54101db5e7fac4538de26e2eb649ad0e75,2024-06-27T12:15:21.357000 @@ -247966,7 +247966,7 @@ CVE-2024-26872,0,0,e1be30e0f1b63fecb16069be5a8c042987bcba62c1848ca23e7ab104e4ef6 CVE-2024-26873,0,0,3a3877364dd5fcf82056d7626734c3d2cb4100f26dd0fb338b1cc2ce0a4b26cc,2024-04-17T12:48:07.510000 CVE-2024-26874,0,0,d4a2e66139b6c5571ffb5ddc01a62942368f4cbaf11ad33866910988dca15e98,2024-06-27T13:15:56.957000 CVE-2024-26875,0,0,776f032242ac1e7add152fd2be17e01c5c12995fa4d824d950364492e82d131a,2024-08-08T19:35:13.037000 -CVE-2024-26876,0,0,87a49be69760f9088fe2bba4db9cde6d323af69b323688fc0bb6fc1e935e16b5,2024-04-17T12:48:07.510000 +CVE-2024-26876,0,1,630b5bd3e4d9200b83019a149b2208ccbbd1d927bf3c4c4a4b250f3e6b2ea05b,2024-10-10T12:15:03.210000 CVE-2024-26877,0,0,7b5237ee65908468f328c7475b98e7a4207eb826410a8157a34c13278e5cb653,2024-06-25T23:15:26.897000 CVE-2024-26878,0,0,138eb74473aa6d1d3b5705c5c5f6c3f05d9798e9a389f668cd4f717014b9b6e0,2024-06-27T12:15:21.783000 CVE-2024-26879,0,0,3fd22544232f4c91c7cb46a20464e4ad9dadfc6d6a065b330ecc177a0dfe366e,2024-04-17T12:48:07.510000 @@ -248072,7 +248072,7 @@ CVE-2024-26969,0,0,5b4e948015b4b27228b22d0df7bc0c89284f89e02d5d477c2db1aa6c25740 CVE-2024-2697,0,0,f8c842b96914534995a7f6c1541ce43d05eddbe65424b582cf5dfaf951722d70,2024-07-03T01:53:28.700000 CVE-2024-26970,0,0,3c35fe8319cb49f9fc9255264025a882fc92fbc6a7b0648c8516887eea16225d,2024-07-03T01:50:09.343000 CVE-2024-26971,0,0,35420d34db3bd64f8132da4ec0e9cbad3feb36804f1c532974b1fed05bb1fd28,2024-05-01T13:02:20.750000 -CVE-2024-26972,0,0,43cbc99219172abd5764f4ef1a73b67a4bd0d61b7f77392c215c2caba5c7a501,2024-05-01T13:02:20.750000 +CVE-2024-26972,0,1,86d1bb1c6870a043fb5606a3ef810dad044c11f9f0168ed0fd7c4be691537509,2024-10-10T12:15:03.297000 CVE-2024-26973,0,0,1ffa32874ac86674616b9c65a4998dafa3aee878a6c16633653d638380497980,2024-06-27T12:15:23.210000 CVE-2024-26974,0,0,b9b8313a9c7305b8fa4ea7035db32db837845fb5fe59e7dea6581e5e181c765a,2024-06-27T12:15:23.293000 CVE-2024-26975,0,0,b8948d8dc751bf63cba89aee9d9698bacb5649b366a3d8268da651c48a46e852,2024-05-01T13:02:20.750000 @@ -248113,8 +248113,8 @@ CVE-2024-27007,0,0,17306cb543de67e822877e1e1e6a628d516d4e06974ed7d4269ab1ea92207 CVE-2024-27008,0,0,48d5d2635543170f726f0fb4ec2915c4cf0328fa50039ef2a32cd8312219590c,2024-06-27T13:15:57.753000 CVE-2024-27009,0,0,e7eb09a61efaef1519f182f900c22970684f64342de15b32253122297277ee66,2024-05-13T08:15:11.870000 CVE-2024-27010,0,0,1115c166098b0664ed6fb6bf6defde9ab0768aa7abc65600a965e0392f22a097,2024-05-13T08:15:11.933000 -CVE-2024-27011,0,0,597a500b56b7d444d2b876cd142aa5c351a6b2d2c1544713c4bd8fc812d15bfd,2024-05-13T08:15:11.983000 -CVE-2024-27012,0,0,c2896248d10201863c3b394f6086398b44b7d71384da470dde446ca84e7bc0c2,2024-05-23T19:15:29.050000 +CVE-2024-27011,0,1,777e26a65b03fdee7c294829e45adfb4abeb783713cf776e5da66cf9c6e806ee,2024-10-10T12:15:03.390000 +CVE-2024-27012,0,1,0d27660f1fdafc588e44a1782aaccab1876dd865b63fdb2ed6e61b49b7114872,2024-10-10T12:15:03.490000 CVE-2024-27013,0,0,b97595fefe29173e41a127abcd15bb6483ab86801ff611a9666f15b5ed000330,2024-06-27T12:15:23.747000 CVE-2024-27014,0,0,27b57556d43e7b6b7b0b3ef5a9086a73fbee533a742b997967317e019320cc94,2024-05-23T19:15:45.993000 CVE-2024-27015,0,0,f493cb18025a3f43fbe73e85f939389258bc5c4b0291a7e5b9f43de91549b5ab,2024-05-23T19:15:51.047000 @@ -248180,7 +248180,7 @@ CVE-2024-27069,0,0,a22027ac3b10d55994fd9ee439f06fab2d3cfb6ef2219ded791dee150a4b9 CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd3649,2024-05-17T02:38:26.230000 CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000 CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000 -CVE-2024-27072,0,0,fcbd9faa7efa2e6b53acf06484dffa6f424eff2cceb1f2c4521263d84e033e6c,2024-05-01T19:50:25.633000 +CVE-2024-27072,0,1,13a0f1e0568be4ddeb1a63894dab1887da803feacbdef286d8a4db7088f46efb,2024-10-10T12:15:03.603000 CVE-2024-27073,0,0,aa56aa24ed3402425b89f05f26a164f223361d7a41c480cd79d50873842fdafb,2024-06-25T23:15:29.397000 CVE-2024-27074,0,0,072997e51d8edffff051f12b48b4b43375560402b726f9e882d033665b9beae3,2024-06-27T12:15:24.360000 CVE-2024-27075,0,0,c2d1c4caa012ebbe4b9cc25a1abce424572ea3928a347ee6dda4b1356be42ff1,2024-06-27T12:15:24.443000 @@ -248561,7 +248561,7 @@ CVE-2024-27453,0,0,9ef05cf790c264dc788e980768a5a6a3cb502900f86edeb2c3cbde013355c CVE-2024-27454,0,0,779bdca194b0fd7e15d4fb614a41a54cce3a22c81a400a54914ce77bfe4d7130,2024-08-02T18:35:26.947000 CVE-2024-27455,0,0,c38321d72349de04fccc31003825775edb49050b2ce63013697a3990ecbe9fab,2024-08-14T15:35:07.223000 CVE-2024-27456,0,0,f0d8fb5a803e9956fe6ec256a4dcc4781b2e19a5009cb66a9854d4478f56dbb5,2024-08-02T19:35:26.123000 -CVE-2024-27457,0,0,ffb855562ab27ab5e096aaa888d48729d6d1215ba0b020b8ceb4dba5efd4e6b2,2024-10-08T19:15:13.420000 +CVE-2024-27457,0,1,3335316d080a16a52a88af6dd3720987e9bfebc8964b0f14bd58e8d281e3f00e,2024-10-10T12:56:30.817000 CVE-2024-27458,0,0,bf38046b4be81120c299c6f9a408d8707f8d7a936fbf5cd96ec4e4751299b5ee,2024-10-07T17:47:48.410000 CVE-2024-27459,0,0,bce97f3eb834dcc00c74dfb6abf98ffc5071ac70577037f22e6e9d74d3163f62,2024-08-23T15:35:05.310000 CVE-2024-2746,0,0,35843c152725b889a25545af99dfcef9305aac3bf18b4d5c5f191a6ec8073990,2024-07-12T19:15:10.640000 @@ -248786,7 +248786,7 @@ CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9 CVE-2024-27858,0,0,3faede3942350a3693df13af74a4e5d2e9238d23ab2568766082e7421f38d015,2024-09-23T19:56:28.840000 CVE-2024-2786,0,0,8ed89c394db0a4298af6ad355228ba4ef878fdf7e45e835968fbe7eb06ba76d1,2024-04-10T13:23:38.787000 CVE-2024-27860,0,0,d2ada260a0f416b8135571c1e45d10be69427322f3131e7a10c0d5033233ce3a,2024-09-23T19:10:07.350000 -CVE-2024-27861,0,0,66412094571ba43337e7f49bf9b082f3c582670d5a9d4d913bbfda3c61d406da,2024-09-23T18:56:59.510000 +CVE-2024-27861,0,1,cca63a4409c0dfb6463d7594f0d5aa4410a9cfaf92d1700fbbea8e32f52422f8,2024-10-10T13:13:53.450000 CVE-2024-27862,0,0,6a1c629c4e6507b4b49035253caa6ee93e62b8be69739e75e90d1bcc9a884e42,2024-08-01T14:35:05.210000 CVE-2024-27863,0,0,508019dee070d0b71d963cf0aca914f810083800bc171b0f57fa8f39de1cbc93,2024-08-12T15:07:03.157000 CVE-2024-27867,0,0,c8c0bef10450917c014bb0f5b8c10be2f4bd90c5c93e6cf14274f5f577a33a76,2024-07-04T05:15:15.540000 @@ -249062,7 +249062,7 @@ CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000 -CVE-2024-28168,0,0,141529afec7243a7559a211caee03d8711a42d9364bbb9fa6e10f69aae8e2f7f,2024-10-09T14:35:10.237000 +CVE-2024-28168,0,1,e243987a138484b576941798683716902af5bc81ad25b67661951597f2bf3e0e,2024-10-10T12:51:56.987000 CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000 CVE-2024-28170,0,0,b651a495621059669c19c3fdc9d2ee84d87fc5f846a93fbe1c30394bd5ddd768,2024-09-23T14:49:17.057000 CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000 @@ -249718,7 +249718,7 @@ CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e1 CVE-2024-29173,0,0,b62456de8f4690ce00618be7c34a0b2cf8be7a1ae45ec9583315adfc494ef33d,2024-06-26T12:44:29.693000 CVE-2024-29174,0,0,2f89576d93360494ca2cc2b277086c2a427003cf8ac672efbf66eb7d6dd29f29,2024-09-23T21:00:33.127000 CVE-2024-29175,0,0,bf3d75b78a3d0440ae4550a31f6e6795d080c83a26a8a4e7e6b90f2099187102,2024-09-23T21:13:13.247000 -CVE-2024-29176,0,0,9bb9fc9a997c8ced6f942799a8062b3dd4eb5bd750cbf43b5cc48cdf020c157c,2024-09-23T21:11:39.197000 +CVE-2024-29176,0,1,f857cacad022ece6d03d389ceec83c6cc2c1b4d48ed347248985e6df05d38b21,2024-10-10T12:04:03.843000 CVE-2024-29177,0,0,00eb12a74167d5e48c93933c842de7dd3acad16859a229b4f4b9f9dbf8ef1749,2024-09-23T21:10:31.890000 CVE-2024-29178,0,0,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000 CVE-2024-29179,0,0,fe840eaf09e7a8e7dd10821c2db25070488ae9547e1cdb2c88feef71c243f949,2024-03-26T12:55:05.010000 @@ -250309,7 +250309,7 @@ CVE-2024-30089,0,0,4e43134615c92032b0bcfe7d8f16028651d0419f3008bbba71b76be12059c CVE-2024-3009,0,0,8b899c397ecfd00f1ee3f51dbae8d515d2e3bb4c62eb0c1196641a4d91245267,2024-05-17T02:39:40.367000 CVE-2024-30090,0,0,96ebf0a7f0985ae46a2d723452a41ed657ba6b4ce79af153544cf75f0eac0ea5,2024-06-20T18:29:05.917000 CVE-2024-30091,0,0,21a0e947bdf14d286a7c46899dff1f304e8bcf9f4c625f7e995a8132eb9884bc,2024-06-21T18:51:39.607000 -CVE-2024-30092,0,0,4830d6e0c0257a61584c85704e58cc0330c15a9fd0b985f2470a9f1d3d7df375,2024-10-08T18:15:05.513000 +CVE-2024-30092,0,1,ec04d5a5000c5dab81d27a526e73ca065f1163d1be1169c5f05cfa8fe0ea26d1,2024-10-10T12:56:30.817000 CVE-2024-30093,0,0,a6c083177bfba4bbe2bed1c94ce3d4cd6ded1b4bef38859cf22dd43795fe86f2,2024-06-20T18:28:55.697000 CVE-2024-30094,0,0,514619b1cab4b16ee2b8cc0a712a19212d3722a46e562ecc92a699aeb81d9edb,2024-06-21T18:52:15.960000 CVE-2024-30095,0,0,3ca723811cbcc22a7cbe54c86ce8532c877297a00e3a867feee4bb18679188e3,2024-06-20T18:07:39 @@ -250330,7 +250330,7 @@ CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf548246 CVE-2024-30110,0,0,a07e687d8cc25234136155156054fc7c4d3e910119afb02b600c596b9dc2e496,2024-06-28T10:27:00.920000 CVE-2024-30111,0,0,2d23b069061a9f03f5bbdc50f3bb24e02ba7cc17cb7c96642572c4ddb7c10c61,2024-06-28T10:27:00.920000 CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1b94,2024-06-26T12:44:29.693000 -CVE-2024-30118,0,0,397dcc92d80fb664945fd2a2b605b9e63c659c3ab00a6aabd12d062f1ba45832,2024-10-09T20:15:07.570000 +CVE-2024-30118,0,1,d75f0d74d06c8e3868a6471e6d2e944efbd02635e86e9265337e7bf5cb305cb6,2024-10-10T12:51:56.987000 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 @@ -250754,7 +250754,7 @@ CVE-2024-30565,0,0,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000 CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000 CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000 -CVE-2024-3057,0,0,b76a848e2e1b33420a96bdbc36f6b0d0dfad3c1f6745e3b5e1b0377d1018c41b,2024-10-08T17:15:53.770000 +CVE-2024-3057,0,1,6a15405bc62dca0ea3aecc5ecd5216f5fd4600b28f6fd340ae996c5bc8273ac0,2024-10-10T12:56:30.817000 CVE-2024-30570,0,0,caed104332716a7853dfa2ec0af0a5363e33ead1c7830017a6995784a2222c35,2024-08-19T20:35:12.990000 CVE-2024-30571,0,0,d0b0ce739c22bcaf56190db28e9a8c1e2be7759ce3e5fac8f0fae70b3abe2c6e,2024-04-03T17:24:18.150000 CVE-2024-30572,0,0,04b75791693e289b4034f3fd29a8b35bcf61baa8fe2d36e853f3fe35bb0c8981,2024-04-03T17:24:18.150000 @@ -251155,8 +251155,8 @@ CVE-2024-31223,0,0,da8b7db674a5b8b4745a1872c3cbfe408755adbfaefe98ef2680aad7e2808 CVE-2024-31224,0,0,0432a73b1915a648a3c35da3c67b8758780a4401e840046c01833adc58de3474,2024-04-08T18:48:40.217000 CVE-2024-31225,0,0,ce14513b001a8a7b918f745dcb44f6af0a091036441a11613ef986e43e641718,2024-06-10T18:15:31.123000 CVE-2024-31226,0,0,c76e53f6d070dead12939f950b4bbbffd5069b68c423dafb037776c54655fef9,2024-05-17T18:36:31.297000 -CVE-2024-31227,0,0,4f147efe839aba1ba15a310ffbb98a1b7667e31db91c671665354a786b30c5b4,2024-10-07T20:15:05.050000 -CVE-2024-31228,0,0,cc9066a3fe0c0b9ff135d42f3cbbacda0d82426475c93414303881fac3295154,2024-10-07T20:15:05.277000 +CVE-2024-31227,0,1,76e8695a313225bb426234417ab01f16452270262da2fd1fc3a3ffe285222a3c,2024-10-10T12:57:21.987000 +CVE-2024-31228,0,1,b2f0f3065a2dc8e49198495610b46fe6416c64a6298c17a47fd8f9436cf17f24,2024-10-10T12:57:21.987000 CVE-2024-31229,0,0,7703b510137ceabc5c3af41e8c1539d1ef1860221aca398c46e0db27c88316b8,2024-04-18T13:04:28.900000 CVE-2024-3123,0,0,7969034960d8468f2e42c9820543aa0d78630ff8823b9e15099413e2773c7cfb,2024-07-01T12:37:24.220000 CVE-2024-31230,0,0,488a28b56279e1f8fab10ed7cd43847eb05f6be01cdda9553584d94f8a1a86ea,2024-04-10T19:49:51.183000 @@ -251380,7 +251380,7 @@ CVE-2024-31444,0,0,2b583a6a275e0a983bbebac5216edfacb732dc16a37d3f15cde47373ee16d CVE-2024-31445,0,0,1604b599d9536c57c531cce60053ad45df054d57149c0036714972b15538613e,2024-06-10T17:16:26.097000 CVE-2024-31446,0,0,373eeef72a0a9c99dbd4ccd220f1667bb1c1a5f0b64e2b8d303c3d0e34eb6da6,2024-04-17T12:48:31.863000 CVE-2024-31447,0,0,e739a8fffd9f497d895f96e5d958e90722f45e9f390061e76a7ad752c9634400,2024-04-08T18:48:40.217000 -CVE-2024-31449,0,0,0ea9b4191da708b1437f019351928343ba1e32498345662446ae51e7efc8ae06,2024-10-07T20:15:05.507000 +CVE-2024-31449,0,1,6e4665430092cd3a38c7f968c5e4cd78352ce1f6e160f934606d38ec1f765ad5,2024-10-10T12:57:21.987000 CVE-2024-3145,0,0,21fbcfc8d4b596ded088fde63ea9f1f1353c43d1f912006c785433adb5bef364,2024-05-17T02:39:44.947000 CVE-2024-31450,0,0,ab5f0ef1f93c0f0e56281a7055daaa2ff51bdf34c67fe22e312d60de3e8693fa,2024-04-22T13:28:50.310000 CVE-2024-31451,0,0,e7b3531cab279fa6341cc41f68cb3e9f10f5eeefcd2ad3f3986952e9bf0fa65c,2024-04-19T17:15:54.780000 @@ -252130,7 +252130,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000 CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000 -CVE-2024-32608,0,0,f61b1ecd9e349ea4d9f810177cd2158930661d343cfa90a4aafaf3ba7c5237f0,2024-10-09T05:15:13.110000 +CVE-2024-32608,0,1,cf33d63475826dfb7ea57de89219ad623b8cd08dc6fa4282535d285e964710e2,2024-10-10T12:51:56.987000 CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000 @@ -252755,7 +252755,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000 -CVE-2024-33506,0,0,72b74996bfe2d45f9f7b275001eb973d1722cd3f9f0e9e3042ae3b21f6a8aa4a,2024-10-08T15:15:14.717000 +CVE-2024-33506,0,1,7e135c0eb9d1832d58c1d4c41fb8dd62c0e9db3a03b33180973e0c8b868cc823,2024-10-10T12:56:30.817000 CVE-2024-33508,0,0,d23a8b5401a28ba62ac0963d4eaed374c04d8dedc9f220c45a2db9dd2382c9ce,2024-09-20T19:48:06.197000 CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 @@ -253036,7 +253036,7 @@ CVE-2024-33893,0,0,9523a63f2160daa4396893e9738a838b95fb9bca89b2f42f5488b77682503 CVE-2024-33894,0,0,2185bbeec74aacc0192ac4c0f14cc0154df27885b0566a150aabe2fcb3f08630,2024-08-12T16:15:14.917000 CVE-2024-33895,0,0,04ba0b007ee4b02eaf9ac803d97de9384b439a729983817e69ee63aaf5768dba,2024-09-03T19:02:31.517000 CVE-2024-33896,0,0,8d1d8374b6336dd7da119946080ba4c57ec39623b8d4b7ec76ee16ffac44a26f,2024-09-03T19:02:37.870000 -CVE-2024-33897,0,0,8a8a172680ac98e18643f4d535b5abb781914b254874a2245882fdb125976505,2024-08-12T16:15:15.177000 +CVE-2024-33897,0,1,5d7a03e146af861404c7a7c6c6ab907bf79dfa17bf7b0f45f835d86998016793,2024-10-10T13:00:37.257000 CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363225,2024-08-01T13:52:11.823000 CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000 @@ -253662,18 +253662,18 @@ CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000 CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000 -CVE-2024-34662,0,0,574bcc52a06b80a184db55e39e42f577f3eb2ac2c9e56990a9056ed9978a5fa3,2024-10-08T07:15:03.037000 -CVE-2024-34663,0,0,a6d6d89b597b071425d4775658bca7740fdc4ccb904435f31e03a35b8e084c44,2024-10-08T07:15:03.497000 -CVE-2024-34664,0,0,b0af6d2fc1effb7b63974ab8e8a92e961cf04539a6c86c6964eaa2d7a5090b66,2024-10-08T07:15:03.750000 -CVE-2024-34665,0,0,2d53a80469076a1546e02c704527cccd1c32ff6a09c90b24270125015344ba02,2024-10-08T07:15:04.053000 -CVE-2024-34666,0,0,c9ac7b71efa68743532de986da23df68a4fcb4b6c34a9d5da7e8f87c3190bd6c,2024-10-08T07:15:04.363000 -CVE-2024-34667,0,0,0d57a5c5f557dd6a961615a2dd140274be92d154455088a467a06b9482035a70,2024-10-08T07:15:04.643000 -CVE-2024-34668,0,0,6052d389156dfea6a5f5227a2b21ac0bf6fdcd812b2273c21c8b009aab64124c,2024-10-08T07:15:04.897000 -CVE-2024-34669,0,0,dd5bef890e33b20a163fb8f5195212c70ad93f1a6de94397e5b8247bd53ca307,2024-10-08T07:15:05.137000 +CVE-2024-34662,0,1,a6658413d6b88b3373ec5926587f6541001b2a48e07597ea624b92716d312cdd,2024-10-10T12:57:21.987000 +CVE-2024-34663,0,1,bc7e792d3bf9cb19b3bac7de5e5f393eda73c48981c29bad44b4305bf7709bc5,2024-10-10T12:57:21.987000 +CVE-2024-34664,0,1,b864c4351ccbb106aca6a04f609ab07081f58539736f6b0a259450595fc32b90,2024-10-10T12:57:21.987000 +CVE-2024-34665,0,1,12e0cc31b370537cc3f7fdcd076879b846836bd02dbab6954563ed344f01b157,2024-10-10T12:57:21.987000 +CVE-2024-34666,0,1,1294afde334f11bd18cabc952db7757947b34e4d67d7a0c7e9beb016b7d7872f,2024-10-10T12:57:21.987000 +CVE-2024-34667,0,1,8b7581c108fabc20111f41e98996f06bd484f78ebe4f87a12bb4c0865bbca08d,2024-10-10T12:57:21.987000 +CVE-2024-34668,0,1,53b9af4c6e99304f3d1e2a3fa2a88bc95b32eed919d713edfefa4215958657cf,2024-10-10T12:57:21.987000 +CVE-2024-34669,0,1,8fe7cdacc8fb0f1a70915dab3c3b90ec6375dfb9113140ddf9748d9f0b7d8e3b,2024-10-10T12:57:21.987000 CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e429,2024-10-03T19:47:06.097000 -CVE-2024-34670,0,0,9a9e2ea710b373c9ee89fece9c4d6ebf7bcf07bbd7c768c7ac42b417644fa815,2024-10-08T07:15:05.390000 -CVE-2024-34671,0,0,fee5d12a716506c9dc2da2f269d419cc85082e626addf54f7e2de8560f43efb1,2024-10-08T07:15:05.640000 -CVE-2024-34672,0,0,65f2d64f7ec08214ffd88296e0fee3b1668bd3b30a800854d956c3f490a6effe,2024-10-08T07:15:05.880000 +CVE-2024-34670,0,1,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000 +CVE-2024-34671,0,1,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000 +CVE-2024-34672,0,1,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000 CVE-2024-3468,0,0,9cbc57c509ee4c447cef04d212cb9221d0311dbaa25def2d7e51d8a8ca44ea39,2024-06-13T18:36:09.010000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000 @@ -253893,7 +253893,7 @@ CVE-2024-35056,0,0,507b1f5d3b04ca2b67880aaf39ca16e0c980df047603aef4ddff0e60c7948 CVE-2024-35057,0,0,d8b1391320f9fe3f708b665b55b5674c28a9f0e4154226e928eddc897ac177b6,2024-07-17T16:15:04.577000 CVE-2024-35058,0,0,04c708d4f2b869ae5964d1930cfec2987e068cdd18122deca793d922c4c5f892,2024-07-17T16:15:04.673000 CVE-2024-35059,0,0,dfcf8d668815ccc0d32854da2c20a083e119b7332e8581c76bd10f4eac9a5fc5,2024-07-17T16:15:04.743000 -CVE-2024-3506,0,0,9ca096bcf90c5c921a8a39e1ebf7229678d3c376e4729c731b7ef5b57308d215,2024-10-08T10:15:04.417000 +CVE-2024-3506,0,1,13cee0838b5f7789e425deddb8aa9aeed66adfcb70623216f505b50d824da72d,2024-10-10T12:56:30.817000 CVE-2024-35060,0,0,afba2b727938592df1bdc4e63013255006d044a72a697f992c598613bec84c11,2024-07-17T16:15:04.813000 CVE-2024-35061,0,0,0df2890e20c38a1c44b9989903bccbfb46c27c7aacdaa254a5eaf724f2825eba,2024-07-17T16:15:04.877000 CVE-2024-3507,0,0,e1e1d417278f9c0917e2f747f1a5409d7cbe66638a172abe25b5d37d3cb7fea7,2024-05-09T09:15:09.623000 @@ -253974,6 +253974,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08 CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 +CVE-2024-35202,1,1,0c067622ccaeabdace30507435f4a38bb860d320794b69a4ccb0eae8d222a96e,2024-10-10T13:15:14.077000 CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000 CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000 CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000 @@ -253986,7 +253987,7 @@ CVE-2024-35211,0,0,19534889f081150f139415aeffdc66a9de4b652b6cde992612a0b71b906a3 CVE-2024-35212,0,0,053c3edc590a8c81ff407b4c0affd7ea52fd1601e9d265a6a1927307cc6f4b93,2024-08-06T15:11:27.243000 CVE-2024-35213,0,0,76339f3ccade6707f71873f12fb8a84bb7076efcedfad313066f61130756b80e,2024-06-13T18:36:09.013000 CVE-2024-35214,0,0,2b31910db550ae62dce0539566e4b97406294e5b4685a53cf976835083028ef5,2024-08-21T12:30:33.697000 -CVE-2024-35215,0,0,cd5d9dee1c12e1c5ad6b054a73c70c98287ffbf701c6d9ba0e8820455ea6627b,2024-10-08T18:15:05.717000 +CVE-2024-35215,0,1,9066a6543051ae890bb79217f8b2e4242de30ce42befc1fb83eb329ce420229f,2024-10-10T12:56:30.817000 CVE-2024-35218,0,0,e1184bfd50c39d7ccb9d3af67c83c225381571c141531e6e99c4b17efa5619ff,2024-05-21T16:54:26.047000 CVE-2024-35219,0,0,d38f1e7fcd795eac766ba6f65b3b8cde339bb119340da2573ee5da93c2c59a44,2024-05-28T12:39:28.377000 CVE-2024-3522,0,0,9fcd750541ca966e32ae6d2621df4edb4119f4023cb2690f2536e43db1908a7f,2024-06-26T18:15:15.547000 @@ -254039,7 +254040,7 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000 CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000 -CVE-2024-35288,0,0,fb6053731c7754be9169a91cdddabd7318e01e889afe95fd48138c595488663b,2024-10-09T21:35:09.590000 +CVE-2024-35288,0,1,5a7e419c5723f5855a10246582e4e92910b876efa85bd2048c10c45e071584c8,2024-10-10T12:51:56.987000 CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000 CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000 CVE-2024-35292,0,0,e3b3d736ef0c9425797f6a5a9790b2cb56e0a53578005725786d8a247ceee1f2,2024-06-11T13:54:12.057000 @@ -254554,9 +254555,9 @@ CVE-2024-3596,0,0,cb33925615133cc12f1d779362e2e2cf3367c987c4531f8ee95e198d5de65b CVE-2024-35960,0,0,11d604c76d60dfaa78f70c27cc242617c170ee1b403a8338bbdc80eef71892f9,2024-07-03T02:02:30.127000 CVE-2024-35961,0,0,ab8b5634b4fd57a716b21f414efc630229092d81a22f18d25247af536cced718,2024-05-20T13:00:04.957000 CVE-2024-35962,0,0,4b628f3f57455942301b439ab908f4e8ff039f128cecf651c9be39d0756f5760,2024-06-25T22:15:33.823000 -CVE-2024-35963,0,0,4b2be953857cf7766b285dd241b22e01e396b3d7d820828527a730e260b4992c,2024-05-20T13:00:04.957000 -CVE-2024-35964,0,0,f5d9d27ea8b6760773238ebfd515582b0f9cc759b00964f08a322ebd6015ec80,2024-05-20T13:00:04.957000 -CVE-2024-35965,0,0,5fc20a16adf1b5ba78e69e7408dfe0a43ea1642272fd65b91b585a26a2b5eafc,2024-05-20T13:00:04.957000 +CVE-2024-35963,0,1,4b72b5f1264af7b0a91bdeeb8196d09839a5b8cec66067e9341c9e2db008a70a,2024-10-10T12:15:03.703000 +CVE-2024-35964,0,1,f48aa3b73dc953ce147c84b3f8444a3ac2991697c809cdc04a9c9f0ec41763ec,2024-10-10T12:15:03.793000 +CVE-2024-35965,0,1,b7dab2dfd8a69cb3d2814e379161c7311dd15f9a3f86a83702b5d2e0eabcd3d8,2024-10-10T12:15:03.867000 CVE-2024-35966,0,0,e2dd13477fd97a555220d38dd72c0005b7eb675750212f81b146d8e838895b36,2024-08-29T17:15:07.763000 CVE-2024-35967,0,0,e3e23303b3dc5d4a65fe66a5f540e6a1db2b9194c0c160b04b3c6d8794f3528f,2024-06-25T22:15:33.880000 CVE-2024-35968,0,0,439ccc18325908cd4ef3a9bd891d3376dacc1d470b882c7bccea812445a8152e,2024-05-20T13:00:04.957000 @@ -254646,6 +254647,7 @@ CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534f CVE-2024-36049,0,0,16195e94e554c9cc2e1c5fb6b057cc3b79bc050cdc5b42034b6e0554be23efca,2024-08-26T16:35:09.153000 CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000 CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000 +CVE-2024-36051,1,1,5e2f599fa240a78163a70dc813cd791d8cbea53ca2a64bdc9b23f86599d83e21,2024-10-10T13:15:14.187000 CVE-2024-36052,0,0,083dfa6efec8c8b05eaad2f1b8dc2dc652acb748c2d4396b452843d815f40c28,2024-08-20T15:35:18.753000 CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000 CVE-2024-36054,0,0,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000 @@ -254963,7 +254965,7 @@ CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c CVE-2024-36474,0,0,7ad005bd9a04cbf097c2ce416fdaa71f889e9e92c15a3876dd5e047eb89637a9,2024-10-09T16:37:55.997000 CVE-2024-36475,0,0,3bfe32e61fee0f325d0a0c42cbb21fe74c2f37d1a00be99f11a322ba582b65cf,2024-09-27T17:50:00.430000 CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000 -CVE-2024-36478,0,0,d3d3e31a448c89c876d8752dd3d0a5ed214ab436e75114c562c846a5ae1724e2,2024-09-09T13:30:12.647000 +CVE-2024-36478,0,1,54fb884dfc4f7002f344693d031b49702152ff689326e4b5d97695161024b60c,2024-10-10T12:15:03.947000 CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c7c4,2024-06-24T19:26:47.037000 CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e8067,2024-05-24T01:15:30.977000 CVE-2024-36480,0,0,8cfe7316f6ef17d7594f0f48ea5faff4d266af61040753ef41d7dc8fbca2c04f,2024-08-01T13:52:55.747000 @@ -255016,7 +255018,7 @@ CVE-2024-36548,0,0,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd19682 CVE-2024-36549,0,0,55197a9eb0c500888bab7cc4a629fb75ed440d45a5f54f4b25e5199e4a6cc60a,2024-08-14T20:35:11.993000 CVE-2024-3655,0,0,e71ce96c12260fd20e30c34a37c891ab80d60d68f884fd271e3bd452e26ac6f3,2024-09-03T14:35:06.060000 CVE-2024-36550,0,0,d598c384dd8bbd4edfd1900743514ac3a937e6a8f9e3bb960c12f741aca4d680,2024-08-21T16:35:07.113000 -CVE-2024-3656,0,0,3cf21341afdfcf0802af6a58418b413ef5b7cffe0519efecb1c61299054e2681,2024-10-10T07:15:02.927000 +CVE-2024-3656,0,1,4a724c3920cb991b979dd4aa69585b2908da28bc3e111431b5df73633b6f4a32,2024-10-10T12:51:56.987000 CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000 CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000 CVE-2024-3657,0,0,83c06ed0f4ba7d4d8236ae3b34414da273019294423ac879c4a20b79f527b478,2024-10-01T19:15:07.647000 @@ -255116,7 +255118,7 @@ CVE-2024-36801,0,0,615520142931b66fde6db6951c58c2f4d595e9209406619dd298379a6ca83 CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000 CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000 CVE-2024-36811,0,0,815d4884a97aa7f3725308aaf483dcc964427c0f4f9f5a4bc76dffdbfa70bca4,2024-08-22T18:35:13.753000 -CVE-2024-36814,0,0,f18f553e092f84db768308bbe79784ee5a646ef50564f2d068674cecd6e0238e,2024-10-09T20:35:24.090000 +CVE-2024-36814,0,1,87fe97a9f5c72d69d694065d428c5c0fdc043099a59a60d96edb86d10d9d5355,2024-10-10T12:56:30.817000 CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000 CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000 CVE-2024-36821,0,0,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000 @@ -255177,7 +255179,7 @@ CVE-2024-36913,0,0,b5701a70b17faedcb86c05267b95e0568110660dd09bba586abfe504bf7e1 CVE-2024-36914,0,0,9d0a2a59a5979e599afc47c85619298d0dba44926c68bad3c42d98f4e86a1e53,2024-05-30T18:18:58.870000 CVE-2024-36915,0,0,59e6fc1291daca135761fa52e5fdb0439e9267cfc7e5c77dda28056758ddba27,2024-08-19T05:15:06.460000 CVE-2024-36916,0,0,36d478152b8897415c4b118bf935e513132999146096a1b52b71ec1c2fb671a6,2024-06-27T14:15:14.463000 -CVE-2024-36917,0,0,d221fb6047cf04d67c32f2b77b4eebe93f83abf692c9a6770ca0dcb646399bd3,2024-05-30T18:18:58.870000 +CVE-2024-36917,0,1,87ba592cc3ba4baa8d23c838419e7e78fb3196c8c68a279e35cd80ddf82e8648,2024-10-10T12:15:04.060000 CVE-2024-36918,0,0,f4c8fb45e44d9a145b3470164e7534e29337de61bbd3b9ef12d7c79463c4d087,2024-05-30T18:18:58.870000 CVE-2024-36919,0,0,99baaae9ef063c605b7a2ccf732530270475d8e1a1554e496c616adb6d6ac4e2,2024-06-27T14:15:14.533000 CVE-2024-3692,0,0,c87bb1437d7652f08ed7402d038573c505ad958722d15258ea4aff9491886a26,2024-08-01T13:56:38.743000 @@ -255197,7 +255199,7 @@ CVE-2024-36932,0,0,644ae7817be02b27dd249123854cc7c73be66e00bfcdff21edfd92565c4f2 CVE-2024-36933,0,0,b448d6fb3bd5187718dd32f18e24a53215892f68baf0b8dda49d68570d0f5fae,2024-06-27T14:15:14.717000 CVE-2024-36934,0,0,69c3127eb80f1c3d27222b7e8d459b701638abf40b50f92ff99862699bda2160,2024-06-27T13:16:00.213000 CVE-2024-36935,0,0,c956a025e647b997e271ce533b3229e1031e8431a54472f528946dfc3671394a,2024-05-30T18:18:58.870000 -CVE-2024-36936,0,0,8f5cc1028b2d46957993a0bef95c544f5440f0e6544e5c2e7784aef732d9e93a,2024-05-30T18:18:58.870000 +CVE-2024-36936,0,1,7342cc2c019a2135929df07f84085a5c6652a3f9e105c09ce0c4bc3ad2152990,2024-10-10T12:15:04.153000 CVE-2024-36937,0,0,587115a073ece738242335fb650146c6aa7d51a5138082890a3a8d657d2dddcf,2024-05-30T18:18:58.870000 CVE-2024-36938,0,0,5f996360f7a179b962f4e24c798747a3d10ac7a5a7d3f7e6a769b5d2f7e677d4,2024-07-29T07:15:03.883000 CVE-2024-36939,0,0,82d0833c24e3b117aa9c5869741c78835915247496909f88fa02d5cbb879e28d,2024-06-27T14:15:14.810000 @@ -255253,7 +255255,7 @@ CVE-2024-36984,0,0,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5 CVE-2024-36985,0,0,79ad0407ff845adba2267085ae08be5487982d62becef69388cf8c25525fe83e,2024-07-08T14:18:40.360000 CVE-2024-36986,0,0,19150827ddb5a5edfc4814b01ab21fdc0631b6b8b842914dd22329d1e779f69a,2024-08-02T15:24:42.677000 CVE-2024-36987,0,0,1d55b78de0429e0f9217425a916f7a81cae7e1ecd4aabcd3cf4385f4839c5aca,2024-08-02T15:21:54.573000 -CVE-2024-36989,0,1,e29df74fff69a124cbba202c433c463e6aee8ba4fb035b75e2a80ecf4b180960,2024-10-10T11:58:28.630000 +CVE-2024-36989,0,0,e29df74fff69a124cbba202c433c463e6aee8ba4fb035b75e2a80ecf4b180960,2024-10-10T11:58:28.630000 CVE-2024-3699,0,0,30b1531f872c88b7cbea0828fb395914bc791e58c332296f8abe3de89de3423a,2024-06-12T17:53:09.130000 CVE-2024-36990,0,0,c6ebb7eedce1b1630f254f51b2ec2bdff0ad362c70cf722357a5198ef0b015f1,2024-08-21T14:29:07.173000 CVE-2024-36991,0,0,170802115c918c2bd8567732564fe4924a4eadc0df36a7df6beeafa80b77c812,2024-07-22T15:00:45.110000 @@ -255261,7 +255263,7 @@ CVE-2024-36992,0,0,abecdc4ff7a886a1f65deead5ea9a8254937cde8f8bba6a6817f94c9cd835 CVE-2024-36993,0,0,7f59a560bfa90071fc78d38c16f79210d5ba47a0e83d9bb9c035ff8837c28bcc,2024-08-21T14:31:35.970000 CVE-2024-36994,0,0,5bcf467196c1b84a362932fda69af7a594fd1733711aa93db9e3192dd09151ba,2024-08-02T15:07:01.577000 CVE-2024-36995,0,0,001f01624b8476726d4d815467edb381482f5d309cf989b89173ce343b404752,2024-08-02T14:55:40.310000 -CVE-2024-36996,0,0,27a454f471e059b9034eb213c7435a94a3c4a3888f97de83d5b9e26473d4fbe6,2024-08-02T14:47:12.667000 +CVE-2024-36996,0,1,5b2b9df71831d71bb4824acd46b570122cc17e69d17ce334c08a5d79406aaa97,2024-10-10T12:30:29.247000 CVE-2024-36997,0,0,63b805e1c52b85e32c39913d47be0e81c2a81088ce95f6ee3da9b8a1cc881d60,2024-07-08T14:18:42.053000 CVE-2024-36999,0,0,734e0568d2623f6b7394de1b2c703cca096721b07c4ba47885bcabdc0e4abb78,2024-07-03T02:03:59.553000 CVE-2024-3700,0,0,1f63c1e7ae5862d8303d1df0f80fb7224c65b53b248ffd3fb3ee320fd320cf52,2024-06-12T17:51:52.710000 @@ -255408,7 +255410,7 @@ CVE-2024-37175,0,0,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95 CVE-2024-37176,0,0,3275b09004f17b6b89b755a43fa7e2802a78dd80261334da823124655666d26e,2024-08-09T18:42:31.847000 CVE-2024-37177,0,0,5c668d6fc8f89d275dab68dfc9c6e6aa2dda5828c4c067dd13278268042a6c87,2024-06-11T13:54:12.057000 CVE-2024-37178,0,0,ec0623af63b542a59bee4b0b0dc964702dff4ddb4fa5e9957a0a4c2999ed0559,2024-06-11T13:54:12.057000 -CVE-2024-37179,0,0,b1dbbbb83dd54cc93045fe95a8ff0a6578ef4f842de28d47bcd281022144b85d,2024-10-08T04:15:06.600000 +CVE-2024-37179,0,1,e3610ed53e177c4122873769af94b41d7f34b5f0c757065c9d316775e61f5fb6,2024-10-10T12:57:21.987000 CVE-2024-3718,0,0,8a153be0e904f8dfce7a1fd62411ff8bb9932d49f0ddf7963b849729d2d3feb2,2024-05-24T13:03:05.093000 CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862f7e,2024-07-09T18:19:14.047000 CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000 @@ -255678,7 +255680,7 @@ CVE-2024-37542,0,0,bba26476cf475fe85806aff54309233cf183f92b40d46295afa67c6a19bdd CVE-2024-37544,0,0,c719c1c3af32b89eea39aded8ae7c7dc53fe14beb2f1cdb62f4b853ccc4081c3,2024-07-12T16:34:58.687000 CVE-2024-37545,0,0,cc36312e33c5d9198888c13f423056b47603977e3d4e35cd4aaf41d9955c2036,2024-08-30T20:53:11.430000 CVE-2024-37546,0,0,15d2f69b9e243872883271a263f0f98a7cadf2d2b6330d1b0039775f8b820e1f,2024-07-16T15:15:53.790000 -CVE-2024-37547,0,0,596f05c244456fc1293d31288161c329ef0ad9c73f115fe7a6fb9d176c56d0bc,2024-07-19T11:15:02.250000 +CVE-2024-37547,0,1,a0036d197144796fff826c47c5c54fe696cb607b58ca02589fe400f683dee7c1,2024-10-10T12:37:34.043000 CVE-2024-37548,0,0,ca9df3e56c40705127835e3f8dd2df1f50dfece21c5b19f10bf1ff2831b4a0ba,2024-08-30T20:47:13.600000 CVE-2024-37549,0,0,21f3bf8023ef6ee94b53c0e93c4a47d2e5de951bcb545fdc68cce8fec6d5a6ec,2024-09-05T18:56:30.617000 CVE-2024-3755,0,0,8cafc79eaf2c3910650f08b14194d69f8220c0f69642a219963ba78d46519ab2,2024-05-06T12:44:56.377000 @@ -255910,15 +255912,15 @@ CVE-2024-37972,0,0,e8ed965e0e513f28789a8d5e80c69602e8253e60bf85460f2862b533ea63d CVE-2024-37973,0,0,3342f3f2dcfdfb878d17e2ff1e983db755e09cd797849ecd7545c62932c35d0c,2024-07-31T23:15:11.550000 CVE-2024-37974,0,0,b75b4e720fd064320f983be42ac5df37fd67ff02a66f86c056c7256c4c6e6ffa,2024-07-16T16:37:07.930000 CVE-2024-37975,0,0,925df989d2d4d0445eca6ca3ea362b8c1374aa4fbb4893990e3c6f823f9ed2b8,2024-07-16T15:19:58.980000 -CVE-2024-37976,0,0,c69fd96b05c532f5ec436972fdfd081d069311d16e3ff046e9387a4085874d79,2024-10-08T18:15:05.913000 +CVE-2024-37976,0,1,965f96e55bf31c61c824997722df6e8b17d9e78c6f0532519e7ab2f76831ad7e,2024-10-10T12:56:30.817000 CVE-2024-37977,0,0,fc6cdf1fcb13c0b297637d2640fd367e1afe7a1dfb5055043578b69faed9ff36,2024-07-16T16:37:44.987000 CVE-2024-37978,0,0,a3d0955f8e935b6424318b62f7dfa6459b27869862422e3f5ad0e3ba6b11fd8e,2024-07-16T16:39:11.783000 -CVE-2024-37979,0,0,88687c3fac55aedc6eddfdf195d8e140c47549e3dea33adc27e127c0def92008,2024-10-08T18:15:06.117000 +CVE-2024-37979,0,1,3786b3ba5efea150b5abf4fb9d6fb8a72d006d4a2c2a1a2832f1b66631393ecc,2024-10-10T12:56:30.817000 CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e752003573,2024-07-12T10:15:01.757000 CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000 CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000 -CVE-2024-37982,0,0,f909211203fcc8ea88c1f98ee639d0dd885031f6c796cd0f94bec17ce0ef97de,2024-10-08T18:15:06.313000 -CVE-2024-37983,0,0,d12e00428ffedbe9a40efb3a9192333bd431fdaf228633384fe4b6809875f3ec,2024-10-08T18:15:06.520000 +CVE-2024-37982,0,1,51e0fcada295379622ea1b394debce44ae61621e0195e8dd9f3c5bc4421826f2,2024-10-10T12:56:30.817000 +CVE-2024-37983,0,1,78b94523eead126ea99f595c67fe8252f2655886b365f2ae5a553eff28f12fe3,2024-10-10T12:56:30.817000 CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000 CVE-2024-37985,0,0,8e75e8ded91c606cf6f8a7951d4db59fbd2c888177e5eb0c4c7845eff08923bb,2024-09-29T00:26:19.423000 CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000 @@ -255956,7 +255958,7 @@ CVE-2024-38024,0,0,1797dacf114220c1e1049c00517f85420f4d0a240dbe89f86adea8256bc98 CVE-2024-38025,0,0,9f028b66722379a4d88b7ebae27bb9427c5009d1dce1299424f156ca72de7c23,2024-07-11T16:43:28.747000 CVE-2024-38027,0,0,4aa1cddeb9caa33aa67dad478e11bf6f705700b0330932b5452f221ae54ceffe,2024-07-11T16:42:49.083000 CVE-2024-38028,0,0,a1f99f145474526e61ea4a0e3c69bdb1c6e1b6da7efe7b6b1a875e09474817bf,2024-07-11T16:42:20.313000 -CVE-2024-38029,0,0,745e01e4eb0716c6de8ca1fad776a610f3af34273d7f6945bae5628b0cbc2adf,2024-10-08T18:15:06.730000 +CVE-2024-38029,0,1,aa0127f1293a11cbaf058d15217d2c786f6bb567bcdce7226bbeaf91cc4932b6,2024-10-10T12:56:30.817000 CVE-2024-3803,0,0,a90b9a8d430e9bd2f1e0e91bbe856922d83605aa62e95511f94f70d1134bb7f2,2024-05-17T02:40:08.240000 CVE-2024-38030,0,0,2692bbe3cc189a0b531f2e3918e547283f3aaa5462dbf0310bed7de364bbd2a0,2024-07-11T16:35:21.450000 CVE-2024-38031,0,0,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df51d0,2024-07-11T16:32:33.517000 @@ -256014,7 +256016,7 @@ CVE-2024-38081,0,0,92d8718f575e659d0dd3924100d79765bc9e84273def23dc74e822327be44 CVE-2024-38082,0,0,23c6f123e64a1a12cf5b02d5d58cddce4aac695b84d4f46ea5b094849b0d14e3,2024-08-07T16:21:22.157000 CVE-2024-38083,0,0,3c2469ed2c873a64c64841f8f046f5b40612bd2c08b8213d90aa91d1b11e6c5b,2024-08-07T16:39:28.940000 CVE-2024-38084,0,0,93b36fb5773c86aa7598a5e01d52bf9fb3b5fd024105ba9a2e726961c6b4e128,2024-08-16T20:54:25.520000 -CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000 +CVE-2024-38085,0,1,b7c3f3025461a97752dc23df389dc57ce8cbd148f7946bcd9e64cdbd1c3b2be8,2024-10-10T12:39:30.667000 CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000 CVE-2024-38087,0,0,66ba66a5be91550d8640e668ccc3211a4558879fd75dfcd6fa790c3d2a3cd705,2024-08-20T15:48:35.217000 CVE-2024-38088,0,0,0ced4da1fd4385bb9a0afe1792b7785a4a46f983252d987674ad9e20cbcb4784,2024-08-20T15:48:38.620000 @@ -256025,7 +256027,7 @@ CVE-2024-38092,0,0,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5 CVE-2024-38093,0,0,075dd9daa56a96b357ca4934063a6c16d1ea30c840caecea5eb303d11b987d24,2024-08-07T16:28:38.140000 CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000 CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000 -CVE-2024-38097,0,0,ec78191fd2bce819e12123baa32ff62d7c7aab00dac80e271221a33d83d16a90,2024-10-08T18:15:06.933000 +CVE-2024-38097,0,1,97852603ef5938e1b9e5d8a213befd97dffd086a1265625241c30c808417dace,2024-10-10T12:56:30.817000 CVE-2024-38098,0,0,ec97a6f3d3826e98c4bef4bf966b3f4e3463526409f9c97694a785720fc1ed54,2024-08-16T20:38:02.817000 CVE-2024-38099,0,0,7782db89a967b149d71a424fdb71c049e171d01d737658a72251691ef31a5e3e,2024-07-11T18:24:27.333000 CVE-2024-3810,0,0,4b9c7ead6ab7332e33f083e2f6cd125d9bb6a7d7cb025550c9e1df7b29084607,2024-05-20T13:00:34.807000 @@ -256052,12 +256054,12 @@ CVE-2024-38120,0,0,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088 CVE-2024-38121,0,0,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000 CVE-2024-38122,0,0,ccd40c698ac79bd5e6ffae27158140be83eb08e1e0ee4a0ffabbae2b5e3808c8,2024-08-16T17:16:41.717000 CVE-2024-38123,0,0,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000 -CVE-2024-38124,0,0,aae5aa9083b2e6e3f903bf0286d76c8159d0c9af9759c8f6fb009d06ba753673,2024-10-08T18:15:07.127000 +CVE-2024-38124,0,1,e81dbe34926676094ff4b7edfcc4c0178f810558519f2981ed2534567aa76deb,2024-10-10T12:56:30.817000 CVE-2024-38125,0,0,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000 CVE-2024-38126,0,0,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000 CVE-2024-38127,0,0,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000 CVE-2024-38128,0,0,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000 -CVE-2024-38129,0,0,48ee4ba54599aa7346c1fcc95e8c2f8e5f3f429f3f13b76544f8f3488cf7eed9,2024-10-08T18:15:07.323000 +CVE-2024-38129,0,1,db7e392d4d9149df6b3c23fa7eecee8a90b6322466f7d62718e061401c660a14,2024-10-10T12:56:30.817000 CVE-2024-3813,0,0,d80bc8b1e8c714a4f8827190dc103e9bc726aeafa665606cb93627ea2cb076a3,2024-08-07T15:45:23.793000 CVE-2024-38130,0,0,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000 CVE-2024-38131,0,0,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000 @@ -256078,7 +256080,7 @@ CVE-2024-38145,0,0,72c9bc7a9cbbace21fd58c0f66c1b12d49b8b73983e1005fb9919e2c1505f CVE-2024-38146,0,0,14c004f77fbe253ac61a74840b248deaa14d3a35225aac2efe9a43dd9dfd9585,2024-08-16T20:54:59.903000 CVE-2024-38147,0,0,c68874ce4b2880bc5978c705995a2bb81afc52dedd485ce2a1d724482b55c1de,2024-08-16T20:55:03.907000 CVE-2024-38148,0,0,102d9ade184ef2fcdc8a611228d487d3aefe8f36a5d6ba722a0bb780b2ae6597,2024-08-16T20:55:08.653000 -CVE-2024-38149,0,0,007497a8c81d573a39614864ae4a83d5c29388b8951883336538d7cb1d1731f9,2024-10-08T18:15:07.517000 +CVE-2024-38149,0,1,8c8f48c644766e1a3220de47273a483894e111cb1a5d6c4fe8d4fac322364dc9,2024-10-10T12:56:30.817000 CVE-2024-3815,0,0,55e2d42c0e61accee69ffa342efcde0fddef3a4ea430c0440620925be3cd147a,2024-07-26T13:36:59.737000 CVE-2024-38150,0,0,b99eca9453622b3fa45563f2073a2880bd2b153729b1bb5a8b9159bb362991ac,2024-08-14T18:16:13.757000 CVE-2024-38151,0,0,511eb1d4309ead57d93026e7343edbde047eb26f0b3b36416f5242dc362abcb8,2024-08-14T18:16:59.673000 @@ -256110,7 +256112,7 @@ CVE-2024-38175,0,0,7ee3e1fc94700b16d00a2f26c03cfea7234039ed3cfc64750501f773001a7 CVE-2024-38176,0,0,eed2e89f17fe817bf9272ecfba6f475a6989de8241f5fd94dcaa4efac999cc70,2024-09-05T22:06:43.513000 CVE-2024-38177,0,0,f6c4f1d43d7e38f03a6491693822f9b2a6b51e959022ad48764d85f77857b9bd,2024-08-16T19:20:08.750000 CVE-2024-38178,0,0,0718359cc65b3baa799d5e8ed6ced3acf1847c46f13cc5a862a0cd0e4acf46f7,2024-08-14T16:34:46.337000 -CVE-2024-38179,0,0,9438fef8636e8941849aa14655afd7c5bcc3cd9260506c75fca8cf33ecf7d55e,2024-10-08T18:15:07.717000 +CVE-2024-38179,0,1,ef981a46e9883ffeddf59c4cf244dac2a8b94702839dd8b894badca46d50b307,2024-10-10T12:56:30.817000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 CVE-2024-38180,0,0,c5dfb48533b21a7d3d27760cc36627a61099c548597a405684dc960c3bc70967,2024-08-16T19:20:22.853000 CVE-2024-38182,0,0,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000 @@ -256141,7 +256143,7 @@ CVE-2024-38209,0,0,a397cb1d020ff208f8c4852271e654420782ef1455eeb91732ec6921d5eae CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 CVE-2024-38210,0,0,8332ac0d8608fbcc4685b3dfa3d24d6c14729747793e3309dc0faa1b43d99b5d,2024-09-19T22:15:06.083000 CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000 -CVE-2024-38212,0,0,ab2c2c8bd714195bf21d8036ce7eccdab61f6610dab8d3920bc78e992ba672fa,2024-10-08T18:15:07.940000 +CVE-2024-38212,0,1,a42da62eebda0e9696a5d08660a1553e6c919bf6af71bf0c1684031d23bb3eb1,2024-10-10T12:56:30.817000 CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000 CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000 CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000 @@ -256158,7 +256160,7 @@ CVE-2024-38225,0,0,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2 CVE-2024-38226,0,0,4bf5fa6111be97c9b6ca9705aef4b23890b24164017bf51690e04459d4fe4310,2024-09-12T01:00:01.133000 CVE-2024-38227,0,0,e1166a8b3601198afaa0f36efd17412978a4ad369bdfa6dfc4ece85e44aa4ac2,2024-09-17T16:57:39.267000 CVE-2024-38228,0,0,df0f9c7bad92e403c53d10121c41c8156540867d96dcbabab24d783749d190e6,2024-09-17T16:57:54.950000 -CVE-2024-38229,0,0,8cae3310bfd9969512d94286768aa174222cbdf67b08e81e00b42f8f47b01879,2024-10-08T18:15:08.153000 +CVE-2024-38229,0,1,b29cdc7319e38ac003425d2b550380d75546094fc34711dd5f45904219c3b430,2024-10-10T12:56:30.817000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 CVE-2024-38230,0,0,436e1a3ea40688620e23f71172bd013c1c71331c5024bfa4d058c80198524f43,2024-09-17T16:56:15.420000 CVE-2024-38231,0,0,05ee79528b663f84aad9814eb88867e2019ce1f3aa0eab3c47c2ec9d53782579,2024-09-17T16:52:56.323000 @@ -256192,10 +256194,10 @@ CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad51232 CVE-2024-38259,0,0,2f0cfedb8167139ec174b7833291bf21a4d1e6cbb6b4c204bcfe70a7263f1f88,2024-09-13T14:56:28.637000 CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000 CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2431,2024-09-13T14:53:26.410000 -CVE-2024-38261,0,0,5b95c0c56753b854e2f8b9d326b535817b2e9b073ee56495010ba815ba7e0cfc,2024-10-08T18:15:08.367000 -CVE-2024-38262,0,0,41981c14be3169f640545ea63f4b845c505e3f5bae54f9c347b408c1069cbcc0,2024-10-08T18:15:08.593000 +CVE-2024-38261,0,1,ebfdb8837e9ec46b0c59a92ae543c8a1bf9ca753f5c0c9f66ff763b497d2dbac,2024-10-10T12:56:30.817000 +CVE-2024-38262,0,1,f4622b7cf132090051fd2fb969a4d59ec6bb4116cc728bf26a42d8c1d908ef14,2024-10-10T12:56:30.817000 CVE-2024-38263,0,0,f46aea6861be934017dd7285d8a02938dbd0902e0b8a60fe9326066622646e6c,2024-09-13T14:55:01.400000 -CVE-2024-38265,0,0,659e4aa6efa0e8d4e8029743e026233222bb096617b1d3cb1bbb20e9100a61e1,2024-10-08T18:15:08.797000 +CVE-2024-38265,0,1,62041cd5652bc8e71628ed0caa34ec3d785fdc43711c625b6a04ac27b427513d,2024-10-10T12:56:30.817000 CVE-2024-38266,0,0,24812493931b23eb9f9c734be2317a33135a030c22860333943c8effa1ea4408,2024-09-26T13:32:55.343000 CVE-2024-38267,0,0,e71850959c90aba1f66e5470156760ebdd22f551c837bdf538f552a253eba944,2024-09-30T15:52:52.787000 CVE-2024-38268,0,0,fc3e50bd4dbfc035f365112fb8a19ccb3d01fa7d152f5c8ee7b8579015795ce9,2024-09-30T15:52:29.977000 @@ -256249,7 +256251,7 @@ CVE-2024-38344,0,0,9ab5a9367a4478293ac2379112f78ca200a2cb316c550e5b0a6b06a397872 CVE-2024-38345,0,0,52f2293d17b88d6e356144e0e15c86a25194f7d79ea68829ed7fb7a553e8b4d2,2024-07-09T16:22:44.523000 CVE-2024-38346,0,0,689d401df5aa75c70def7483ddda9de7aa5563e129adce9d2b51b58b0f05d227,2024-07-08T15:48:17.710000 CVE-2024-38347,0,0,0d1068ef932ec6d98ae8718125de6f9e1999f5db75d75126f90312b4a6428d62,2024-08-01T13:54:48 -CVE-2024-38348,0,1,c68f29b8b54dbd080bd10c6b15e67607347944ca7ab996033605bdc92e34a190,2024-10-10T10:32:15.330000 +CVE-2024-38348,0,0,c68f29b8b54dbd080bd10c6b15e67607347944ca7ab996033605bdc92e34a190,2024-10-10T10:32:15.330000 CVE-2024-38351,0,0,aaba7fc1ee76a182696aae0d74ae2a9df7cc50ae99868ceebc0a7900d3128075,2024-06-20T12:44:01.637000 CVE-2024-38352,0,0,7f53bae2899f27af7757d718c996f6001cd5095044ca01f36a87e887235b42f5,2024-06-19T18:15:11.507000 CVE-2024-38353,0,0,c7fbc5157bea63c7f1f1bd15e83eaa811940abad1a21b06d85ae750a0936fa30,2024-07-11T13:05:54.930000 @@ -256459,7 +256461,7 @@ CVE-2024-38590,0,0,e86d866c4a784c218f3833027c6ac202a6fe2ae81492fa7703f76f725c607 CVE-2024-38591,0,0,9995c38906c89d4c26c4d73a9253c7dc172d1edb03657ec8d80bc3d1b50a2d04,2024-08-27T18:36:09.777000 CVE-2024-38592,0,0,37134037ea24ea3ecf9f937f4db71a7eaa477c8ce6aa02c104d4a8d758f347b0,2024-06-20T12:44:01.637000 CVE-2024-38593,0,0,5810f9929219cd255d4f41416ce4d085acded54a81aae5569c879799f8b25fb1,2024-06-20T12:44:01.637000 -CVE-2024-38594,0,0,7a5c19721e073a10649a5c50f88ac09eb2d8eab9e548a37238540908ab1b0b9e,2024-06-20T12:44:01.637000 +CVE-2024-38594,0,1,61f31c6a41b5aad2b3d7c37bc6281d847f99b83d56bc16594319e9d666befebf,2024-10-10T12:15:04.243000 CVE-2024-38595,0,0,832124134b5143ac4403d9ade527324b6e9e4e54c882604e73080b5bf34116c4,2024-06-20T12:44:01.637000 CVE-2024-38596,0,0,46720e55bcd9267a5978001cdabf468fbd47d88589f87bfbfc0df091a72949cf,2024-07-15T07:15:11.600000 CVE-2024-38597,0,0,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000 @@ -256635,10 +256637,10 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5 CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000 CVE-2024-38812,0,0,34d8657a2d86accb47b9e7e7219bd48126133821add77e5ea4911708e30f2104,2024-10-02T14:16:47.610000 CVE-2024-38813,0,0,3d08a10b622d3af5696a9ed2c2a45317011023f873f91120d4c5c5927c60a9b1,2024-10-02T13:59:52.887000 -CVE-2024-38815,0,0,c52fd8da3142c021b606c8728a62b21f9f99058f51b7269cc44cfebc965b0ea7,2024-10-09T20:15:07.820000 +CVE-2024-38815,0,1,3a4b59062178be01e22848b989a9a62de86c1bfb989586c3092abdaac97fd53c,2024-10-10T12:51:56.987000 CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000 -CVE-2024-38817,0,0,eac281247a6eb9c602e6725bbd5183b4d7f90c4f35e79b61a7471769e0187b43,2024-10-10T08:15:03.443000 -CVE-2024-38818,0,0,079453aabf40bf52c505c5cc3562c6294af68ca7630ca2a0ef4eab9539bf3138,2024-10-09T20:15:08.230000 +CVE-2024-38817,0,1,09723b24db0d6a084c268e07b58c10ca202cbe9290f0f8fec2db45f626cd7af3,2024-10-10T12:51:56.987000 +CVE-2024-38818,0,1,622849f8ff4dfc75febef96b69e498222845497635b94ea6c1bb47520700e61d,2024-10-10T12:51:56.987000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000 @@ -256803,7 +256805,7 @@ CVE-2024-39207,0,0,49494954d802f1c665c4a01f3343dfa603146f5c61e074b2d6ca53d110685 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000 CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000 -CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000 +CVE-2024-39210,0,1,a6968325552cf6cb6c7f302a071accd1facda0c07b9843340635e35e5b596a4a,2024-10-10T12:35:11.213000 CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 @@ -256964,12 +256966,12 @@ CVE-2024-39432,0,0,c5344327ea4e29569cde1ea8e7912a1f59909bf9a7631cccf2f5bb521ee73 CVE-2024-39433,0,0,b0007cb93af88c45dc6df70760e2e177a4763bcaa8d7c7eac293b0ba1aabdc2d,2024-09-30T18:14:45.443000 CVE-2024-39434,0,0,6fa311444443904695893d64c5957ccb50003fad05bc243c95fa5540678b4129,2024-09-30T18:14:03.557000 CVE-2024-39435,0,0,c1323c169e57e336d6df9d30a55825a6eb9bb6be1621f01964c9727171d73763,2024-09-30T18:13:33.387000 -CVE-2024-39436,0,0,19e4c9b13b51730120b45bf57788808c284eea9b5ba1a0fde87196641cd8ca0d,2024-10-09T07:15:06.550000 -CVE-2024-39437,0,0,8d4b732070d6eab3cfe9ea124b1989e29d56ffacbbead770786cd192fb9d0321,2024-10-09T07:15:08.313000 -CVE-2024-39438,0,0,e350a50fc54c09bf7980cca9c7fa497176076ae322a498308946e0859d20f2ef,2024-10-09T07:15:08.687000 -CVE-2024-39439,0,0,507815ec59354e56f63cafddeb0ee98060f66d456cbd868d703ff232c9e77d9f,2024-10-09T07:15:08.940000 +CVE-2024-39436,0,1,a73dbd1e435b1e48036cf6fc2586eb5e88288c06f4b04d386ae2b10dea1f862b,2024-10-10T12:51:56.987000 +CVE-2024-39437,0,1,6beb27e58db1b5e8742f340d6760c226f54f2c14e7d2ee491233305ccfe895cb,2024-10-10T12:51:56.987000 +CVE-2024-39438,0,1,69e6ebdabb88248bb7daad44720a2c4e417d1a1bd0e89603d1e9fcbb0ec9d21a,2024-10-10T12:51:56.987000 +CVE-2024-39439,0,1,d1e19241590e4ba293c945f1f0f291cc3ff27cd6796ac3dd61df404df7a9e537,2024-10-10T12:51:56.987000 CVE-2024-3944,0,0,0349dfe65519a62a84d722d8f6089c2204a2e4ad01321ea2bf2f048acc939172,2024-10-04T13:19:51.383000 -CVE-2024-39440,0,0,8f25321e297d08f87f8907a961a1aff4f0ab8a676c0307c6d1b132b4e606a6ef,2024-10-09T07:15:09.217000 +CVE-2024-39440,0,1,01c3146869b3956bf437057a3b2118986b3db3de18eee17888a301da4ae2c8d0,2024-10-10T12:51:56.987000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000 @@ -257033,8 +257035,8 @@ CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0 CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000 CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000 CVE-2024-39514,0,0,6867df5f52f908f491ae646c1df8207b42c79f3d12187b6cec6f6552286fc92f,2024-07-11T13:05:54.930000 -CVE-2024-39515,0,0,adf79af3690c58b01e16d5c3de5940b45d6b277ff64394ea058975d53796ee40,2024-10-09T20:15:08.430000 -CVE-2024-39516,0,0,18f2e5f5ee7e8a7ef3fd90f833ce65e9fb127395569d9892951018b768e963e0,2024-10-09T21:15:12.850000 +CVE-2024-39515,0,1,d1d8d5bdcf47661ac97ec3570a667be52f64c608cc281627625cf0d0d1aa5e4b,2024-10-10T12:51:56.987000 +CVE-2024-39516,0,1,ce268ff7ab4083a6c2b5a464b6ee971b6eba9ae7f73c99c373face821c3306d4,2024-10-10T12:51:56.987000 CVE-2024-39517,0,0,ed12fbdd5935917e9b7f1e56184a21b312ea157822adf531c0ee87bdb0d202c2,2024-07-11T13:05:54.930000 CVE-2024-39518,0,0,7f7ecf1dc91f43c4d2cd601e79a0cb63e34c06bbd9c6fdf0d6bfc073379626de,2024-07-11T13:05:54.930000 CVE-2024-39519,0,0,b09c0884d534dc98061004149d6068b37e31cbb0e027038485b511b9e279769b,2024-09-23T14:21:16.690000 @@ -257044,7 +257046,7 @@ CVE-2024-39521,0,0,e07db97b7d1a4f6ea0d1bc3a01783d19907e227d9bfbe59b2554fd9c613cd CVE-2024-39522,0,0,b66709e6535a7cdadc12e252ab229dc8e8aef04f48261d0268655457d17fa70a,2024-09-23T13:40:17.377000 CVE-2024-39523,0,0,a3811f47c02311cb1b3e9c779434ecc435f3ef774dbaecf23095150720747474,2024-09-23T13:41:41.567000 CVE-2024-39524,0,0,f81747ca72ff72ed34e537ded9b51c09a5f97f91401f1ade11ec10102c46443b,2024-09-23T13:42:49.947000 -CVE-2024-39525,0,0,3fe9e22e4d0920d10ccc1e2de6c679f041b83d96c0ec0cc6abe5d1fc480d0a48,2024-10-09T20:15:08.920000 +CVE-2024-39525,0,1,d775dd232fca82d89a27908f99c7ab9fcee2b3e4a09a48f8a86e162a59a4cd74,2024-10-10T12:51:56.987000 CVE-2024-39528,0,0,e38a4ee98e70571927c02a6972041282f229d4485e62ff8801fae59946fb79e3,2024-09-23T14:01:41.367000 CVE-2024-39529,0,0,00f43e2c27d890f4599c7f0b79b4f6e627b99f8bce970eddcf5a09f2b2c7a075,2024-09-23T14:08:47.240000 CVE-2024-39530,0,0,1c9b47723a95ee2e38c28a71dbdfbc0698029b0ae899f35456744c3d18947342,2024-09-23T14:13:14.507000 @@ -257100,7 +257102,7 @@ CVE-2024-39582,0,0,6ec9b04450f9c5ce2a1563682764e2f7b34da0f9eb482017ce73088ac186f CVE-2024-39583,0,0,ac1320c69e7204d43ee10370ec071062ec88b9a1106bd39584f09ed060befd2b,2024-09-16T15:42:06.347000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-39585,0,0,b162f39d96cc79baeee026e4bc649d0b5cf545dfb2bc7af993a786e27782c34f,2024-09-17T02:15:49.397000 -CVE-2024-39586,0,0,b1221986db4f2bf4752492e18b8aab10f4e640353c8a873e7f300ee53eff74ae,2024-10-09T07:15:09.473000 +CVE-2024-39586,0,1,3abb89efc44e70af20724f2c35ca4e0ae6f14a2a91f6b182d1d33c79125c6c68,2024-10-10T12:51:56.987000 CVE-2024-39589,0,0,87ea0a38612b14f1acbb61bd8a80c1616893c20e2d92c8b04a7963505253759b,2024-09-26T21:36:12.887000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39590,0,0,bd4d3aa82dbb5eb68f8bb048ad417554290f42943d5b38b21877158c391f9e01,2024-09-26T21:02:14.630000 @@ -257249,7 +257251,7 @@ CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b6 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 CVE-2024-3980,0,0,af7d02bc503a7625123fe3e6728981b9674a4164c60a7ca3f7e7e1561da1eb07,2024-08-30T16:15:09.517000 -CVE-2024-39806,0,0,1c969ffef19a7c933ca8ad184556fae73a8df5202aa2effb35a12e4959754eac,2024-10-08T04:15:07.183000 +CVE-2024-39806,0,1,a185a2331b6e6fbde4d3c00a6b68a548f5e2f758997dad7789d159f03eea63e3,2024-10-10T12:57:21.987000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 @@ -257271,7 +257273,7 @@ CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955c CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-3983,0,0,96266c916334fb5a02e4aa53ae15055a84c8153845733e53311fdb712a51a549,2024-08-01T14:35:11.540000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 -CVE-2024-39831,0,0,0b45873e455f83cd8a5286dfd1c0cd3a0b1be5016d8cc238f6d431cf31cffcb7,2024-10-08T04:15:07.447000 +CVE-2024-39831,0,1,c6c3cf8f41e065771567180096c93623752458a396a6352b1c80f8f30dfb5a20,2024-10-10T12:57:21.987000 CVE-2024-39832,0,0,4e3934d2762f9f7037c319199b04232a1818dd1ced3ad84be4d619c335cdb24b,2024-08-23T14:35:13.670000 CVE-2024-39836,0,0,0d5fe8c5e6b07786a6f137526c846390a0820f10bee6c12207bd00a1009c33ce,2024-08-23T16:16:18.757000 CVE-2024-39837,0,0,fd34189ff4b5cd3b0845da4fb511ed8c8acce338a2e176ead9f293558fa4e3cf,2024-09-04T17:38:42.297000 @@ -257431,7 +257433,7 @@ CVE-2024-4033,0,0,100a78a446daab2b380bdb2306f7e35c115de46018456d74b097346d037da0 CVE-2024-40331,0,0,a7e1077e622b76fb46adc2ebef3eac8337a90cea4e47e0edde2ba336f3b4112b,2024-07-12T16:11:59.747000 CVE-2024-40332,0,0,3469f713de9d5aeaac64a7e7ed3fed59c15cf2d86b8f673108465d3b92e122b0,2024-08-01T13:57:07.730000 CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e7fd,2024-07-11T15:06:21.320000 -CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000 +CVE-2024-40334,0,1,9d52c23bdade7afc3d7aeb2f5a35df3c298c086a71de7200b7393b9c19e3a05c,2024-10-10T12:40:06.460000 CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000 CVE-2024-40347,0,0,5083889b5d718c58eb8d1f1588f34f2acdc50ca81bdbf57436efa16a3a8ffc06,2024-08-22T18:37:49.850000 @@ -257984,7 +257986,7 @@ CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6c CVE-2024-41120,0,0,a70d4faa55c7ddaaf93976569e1c96bdce498cb1f9f22f75468c1ec57f8b4cef,2024-08-26T17:33:33.787000 CVE-2024-41121,0,0,bea21b08d051d8c42c463458d320e0eb696c2a382d886d5d5d09d5e1f0c107ea,2024-10-03T15:57:31.917000 CVE-2024-41122,0,0,db4a015145ff1fc63debc38645ec64fd0c8a278e5cdafdcde4b59bfb53ec7f9b,2024-10-03T01:23:07.177000 -CVE-2024-41123,0,0,1b9d0ba5e0ca489b31c9b708600ddad032ff5087a77d385d50002a73b3acee12,2024-09-05T16:12:21.557000 +CVE-2024-41123,0,1,e5c9227af2b887ccb9089a5ad2dc1eac1dac994eb9a8b3fb98a0a3f4b9e884f6,2024-10-10T12:56:29.837000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,cb656d719f797ab9b0f4b867a7e6012c2f45c355cda77a51db0501f209b4731d,2024-09-11T14:52:15.690000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 @@ -258246,7 +258248,7 @@ CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebe CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000 CVE-2024-41683,0,0,2192978dad4cafa54a3786123f676b5ba0a3720025ec3301b3e567e38520be74,2024-08-14T18:38:26.757000 CVE-2024-41684,0,0,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000 -CVE-2024-41685,0,0,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000 +CVE-2024-41685,0,1,a46b8628264712655e24c0142ebc4f63eedf80bd3d531cd9c686053dd0f08c12,2024-10-10T12:48:12.943000 CVE-2024-41686,0,0,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000 CVE-2024-41687,0,0,199fb127145ac44260897a6bcf0117750aa11faaae311cd3b70466837d9741d9,2024-08-05T21:05:30.230000 CVE-2024-41688,0,0,e43bf0a8b23358e8a5a87799b640ea50b62cd618df1c5997479a0ac424fb65f0,2024-08-05T21:05:46.433000 @@ -258305,7 +258307,7 @@ CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d83 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000 CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000 -CVE-2024-41798,0,0,45064c10f8f66685c2ca5eb5e6524b723fbfece171e686c7f4bf27f18de990ec,2024-10-08T09:15:11.177000 +CVE-2024-41798,0,1,0376144119ee906fa3756a5ffda1af85d3678e11ad2cbd0913fd4be38d98ecf1,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 CVE-2024-41800,0,0,8108ad4aec84b72160a0ba583493fdb39a6a8216c757ba571a1ca2a1589843b7,2024-08-26T16:33:17.150000 @@ -258394,7 +258396,7 @@ CVE-2024-41888,0,0,551a193b56683c8a955974406454da46e806e6e58f5cbc2dcb8dc5dd231b9 CVE-2024-41889,0,0,c2f8146a4c074f06a28a6e2235a6e3d92ccee3a8823a7bd377c0c9b959c16c5c,2024-08-30T17:53:40.897000 CVE-2024-41890,0,0,a90af16c8c7558e5227ebbc511a4c71519b3a4532e07b0a451c0d8da1663fee0,2024-08-29T12:56:47.413000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 -CVE-2024-41902,0,0,1af5dd71fb75c2a1e22474726778e298e8dc0e50797e6bc9a7e22f1558bae165,2024-10-08T09:15:11.453000 +CVE-2024-41902,0,1,43ae61ebce9a8b7d3996bceeab15083df998500c68f80ca3ea2bc52db86bbada,2024-10-10T12:56:30.817000 CVE-2024-41903,0,0,67dddda11208425a9dbc345fc58604fc5d7cb0caf7e9b81aadfd0fc331e40c63,2024-08-14T18:39:21.207000 CVE-2024-41904,0,0,2a16ff348e5db01cbd9004bb6da7c38aafbed87ec5d8a582eda1208aebd9a27c,2024-08-14T18:39:32.883000 CVE-2024-41905,0,0,ac139d9e01d82a616a25e6137ffc628fc7fb451519deab8e50230ba67daa3137,2024-08-14T18:03:07.660000 @@ -258458,7 +258460,7 @@ CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0 CVE-2024-41977,0,0,d5d8e1f89415d399848bf3d43d8f9a317c22096ecf54afde801686a9741da6f6,2024-08-23T18:39:13.990000 CVE-2024-41978,0,0,bd0d09a1a56dc8d7414c845b0662922159c0a17b71c017862473bb9d2c3c7ab8,2024-08-23T18:34:36.283000 CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000 -CVE-2024-41981,0,0,89dccb9a9b1a619fb921e09cbfe17d569e7ded13d8b2b873ee6df56a9287f000,2024-10-08T09:15:11.813000 +CVE-2024-41981,0,1,fa524d43c8746b3b1174f035bad786aacba2efd8bd162a9e3e8f305217f493ea,2024-10-10T12:56:30.817000 CVE-2024-41987,0,0,2f4f37771c64bca6e8bc71abc128fccafab15d1bd7c04aa54df908658ca64cbb,2024-10-04T13:50:43.727000 CVE-2024-41988,0,0,55a7396f021c4e6e2381c6c9dc94df55d597f6b964a5b9492a46da16c19f42d9,2024-10-04T13:50:43.727000 CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000 @@ -259069,7 +259071,7 @@ CVE-2024-42815,0,0,fa939825da2520b0805320da8ef3bf06e37d61d20e773887864a50a3aa224 CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 -CVE-2024-42831,0,0,e831042b8fb2fe24db7a5599852b7fcf4bb76b25c5c52e2a45d74612bb76ad94,2024-10-07T20:35:04.807000 +CVE-2024-42831,0,1,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 @@ -259099,7 +259101,7 @@ CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4 CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198ad98,2024-09-06T17:35:15.190000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 -CVE-2024-42934,0,0,6257c4dbf9db4adbffe7af024926ac3c73ee92d2d85502feb0fc8781baee2e23,2024-10-09T05:15:13.270000 +CVE-2024-42934,0,1,5b485bf0fdf98b0bf0cffd2e2fdf9041db2ed703f1341f5eedd90fef284d1734,2024-10-10T12:51:56.987000 CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 CVE-2024-42940,0,0,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000 @@ -259140,7 +259142,7 @@ CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b20 CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000 CVE-2024-42986,0,0,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000 CVE-2024-42987,0,0,78d20dcc8dedb262666f57c924ed05a38397e8611300fdadb69763919f535881,2024-09-03T18:35:13.793000 -CVE-2024-42988,0,0,3f16093180f911e5136d519c887e31cd87ab50274315abf8c9ce4b739afda740,2024-10-09T17:15:16.337000 +CVE-2024-42988,0,1,6aad3ac6d5993957fb72ff6f9df2be456bfc38550cbc776bedc5dee8b4a51ef7,2024-10-10T12:51:56.987000 CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000 CVE-2024-42991,0,0,d0804277ca8fdc9e2d163274c34d3a26e99fbaa9c60738b6b9568dd8b044fcf1,2024-09-03T19:40:46.783000 CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000 @@ -259365,10 +259367,10 @@ CVE-2024-43358,0,0,f13bf774ce7b4c63763f4e38f0e32b38260bf7ed8ec364046e3e65c356bf2 CVE-2024-43359,0,0,52133eb618029c9c6eb094064b83ba6c6a1a2658246d3d1db85edc0e06ef43d1,2024-09-04T21:43:09.613000 CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000 CVE-2024-43360,0,0,7806cb26815467de093fc97bcea332d20fcda51f3ce248e59da2d3fe25d63fb1,2024-09-04T21:42:20.023000 -CVE-2024-43362,0,0,9fe66e38764800304044dd6d38e5dcb2d50c3fac7d7c80a76bbdc06eea3742ad,2024-10-07T21:15:15.470000 -CVE-2024-43363,0,0,7d44af63b2526a73729115d59619a725d0e5b2ad7a0a4746b1051fdbc35cce0e,2024-10-07T21:15:15.743000 -CVE-2024-43364,0,0,512e51ed45cb2630653f39398e8256b766f9f68da8ec165e1a02ecb484486048,2024-10-07T21:15:16.017000 -CVE-2024-43365,0,0,b493d86154a1636e92f82d08004bb71f9fc0ddb4d61b3f5ae38c2a835fee15b0,2024-10-07T21:15:16.247000 +CVE-2024-43362,0,1,d5feff3f0dfa0bdfe36569e1b23b1d8d2a7f4c0a0f821e5156876156789f80c0,2024-10-10T12:57:21.987000 +CVE-2024-43363,0,1,0ff075120757feae88fffcf2d76821fd09fecb2bcd47bb6f49234a442520899f,2024-10-10T12:57:21.987000 +CVE-2024-43364,0,1,fedb7f9a44640115fc8844aeb31f3d22d4df0dc3934e9a0e3954b45d8af40d9c,2024-10-10T12:57:21.987000 +CVE-2024-43365,0,1,56fff720011519435cd0f053437ad7989952462746d2a51bbaa15c00fa1e9b28,2024-10-10T12:57:21.987000 CVE-2024-43366,0,0,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000 CVE-2024-43367,0,0,0f8409cf79e678cffdb4974928d567f1e40ad1650bdffb611ca3860d13e991c5,2024-08-19T13:00:23.117000 CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83219,2024-08-15T13:01:10.150000 @@ -259424,10 +259426,10 @@ CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec CVE-2024-43443,0,0,41bfb91b7f7c9bee48be0f5c8ffcdaa9039df695b92734c0f1b611ea064f9e04,2024-08-26T12:47:20.187000 CVE-2024-43444,0,0,869e12b3e86ded10c38d8795cc34fa22bd804c0b1d5e73f28a97d45f8e95ed59,2024-08-26T12:47:20.187000 CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000 -CVE-2024-43453,0,0,ccea9ebe8d4798577ed001f88279948932f560fbf420ca1bb4c93fa18fb8195a,2024-10-08T18:15:09.070000 +CVE-2024-43453,0,1,d5f0fce34b71279dc5f5e1404771fae1160f9bde4b1f542a074e1d18e3a1e586,2024-10-10T12:56:30.817000 CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000 CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000 -CVE-2024-43456,0,0,a004f8372df602b8345adf43d29c35bdb73d37eec83d28b1036e5126068c120e,2024-10-08T18:15:09.283000 +CVE-2024-43456,0,1,52cfe87e7df07e6312c61a71b69b91767d6e02250ae06c5c56bdd8b94d313ce7,2024-10-10T12:56:30.817000 CVE-2024-43457,0,0,2d39da1954a904290cdb655f8413466318bc2fb9e79e95d1239baead98599e5b,2024-09-17T16:25:03.037000 CVE-2024-43458,0,0,d510a08722ad4b01e3bd416a3ff1688485cee9b82fed026222465a1f7268669b,2024-09-17T16:24:06.837000 CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000 @@ -259438,7 +259440,7 @@ CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7 CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000 CVE-2024-43466,0,0,b946ecd1f88611673cbb3be558d8f8e03be741959edeb8309467094a9d78f0b9,2024-09-13T14:44:16.013000 CVE-2024-43467,0,0,06c9c5b2eced8d091ee4cd0089976d978adbc50aa9ed4a3fe075bf3facc90f85,2024-09-17T16:06:44.170000 -CVE-2024-43468,0,0,5457b6017eb22efc6dd4681935092b8dfdc0bb1e7a979614ac0cf8e80280d4c9,2024-10-08T18:15:09.537000 +CVE-2024-43468,0,1,296aeb867a6dce413819e9e6eab14b15d98d7d33591c90223495f52c30560722,2024-10-10T12:56:30.817000 CVE-2024-43469,0,0,e36b9f8f055a7485db37cb8b3b3c3e478802be4653464a62886fa61cd048c55e,2024-09-17T16:05:54.650000 CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000 CVE-2024-43470,0,0,fe528548c21195498b66ceb7663311572a15469603d70a62099c3f6f55f69948,2024-09-17T17:35:02.157000 @@ -259449,124 +259451,124 @@ CVE-2024-43476,0,0,91c0c8137c4b1b747f13b499f046afb02d7a7bef84fdde3fa148c5435a3aa CVE-2024-43477,0,0,d50cbeb6e00e9871b6577501fc388e557638d61c564a40e04e41a194af066632,2024-09-10T18:15:13.970000 CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c905,2024-09-13T14:38:13.873000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 -CVE-2024-43480,0,0,b189a1427052a73f6736a88febaa43a9f7a1826e824d30ffb58b7be1d31a0657,2024-10-08T18:15:09.833000 -CVE-2024-43481,0,0,a10c524305e6a6baa6ab4c757079f3b4a900e6ec241e7a4092950bc8d9c7836e,2024-10-08T18:15:10.147000 +CVE-2024-43480,0,1,ae10f040ee8f2f3ce1d342bef8f47f821195cc6c7c128504e1ca0e7d741f91e4,2024-10-10T12:56:30.817000 +CVE-2024-43481,0,1,90669774930bf046284de807d2daf1e6f04d370f1b099e845b7a13011ed32dde,2024-10-10T12:56:30.817000 CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000 -CVE-2024-43483,0,0,38983a9feb140e9e4503abd386fa7947381b116ffbd7441f975217c1dd398552,2024-10-08T18:15:10.367000 -CVE-2024-43484,0,0,4a4645e37c6a6fc8d62d06f8d8374389f260d5462892de0ba42d0aeedccc1fa6,2024-10-08T18:15:10.633000 -CVE-2024-43485,0,0,6c19114318b66b71b4f4c5d6e4447bcd0701d6ff7a38fec71e0731e3e0138a55,2024-10-08T18:15:10.840000 +CVE-2024-43483,0,1,a203f8e312e9e65d989c16262e1ab330707839bf3219ea38ec79e790d77dfd81,2024-10-10T12:56:30.817000 +CVE-2024-43484,0,1,dc5ab4eccb00bd13e6aff096efe58f743e9ff10113c77bca3a6931c756d701ee,2024-10-10T12:56:30.817000 +CVE-2024-43485,0,1,0ee1d54dd3356f7a60eb276dc3857b2eecbbf2e7dc19e187ce147a3c899cbcd4,2024-10-10T12:56:30.817000 CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000 -CVE-2024-43488,0,0,281613999de8e705062d53612ec76d7729aa0f92c34f5d62fbeb82e462123a67,2024-10-08T18:15:11.030000 +CVE-2024-43488,0,1,63512f10e091aa99654a79798f793d1e5206e4391a750986c0f054ff87bb5912,2024-10-10T12:56:30.817000 CVE-2024-43489,0,0,9f3663a5117643ca66490ff50d07401aac7a21947903cd82d777468b0669d10d,2024-09-23T17:33:25.633000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 CVE-2024-43491,0,0,d198019651bd96853897866c0609cb57460e36f90bdbdfaf53a9951b0099ab32,2024-09-26T01:00:01.267000 CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827c4a,2024-09-18T13:57:22.880000 CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca75e,2024-09-18T13:55:07.100000 CVE-2024-43496,0,0,1e4f277010291ea8388e3463633269924e9ec7b9c2f947668d81da4d3ef80c37,2024-09-23T17:32:54.663000 -CVE-2024-43497,0,0,956ecac9eed8aba8c1a788d4e0573996b137bab6ccf0ea33bcef441f5b6b3389,2024-10-08T18:15:11.293000 +CVE-2024-43497,0,1,2cec40d11e27fec6bed90eb1a9ae772401962b203e3fcb37bcfff9aca7655f89,2024-10-10T12:56:30.817000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 -CVE-2024-43500,0,0,5ea2b46ae7df07a27b0fdcd73fc9b2075861614267f0c30a570001a0da14baf9,2024-10-08T18:15:11.480000 -CVE-2024-43501,0,0,c4f446145c5740772075b542eba4cfadbcff78e869f57a4959241c974945ee47,2024-10-08T18:15:11.670000 -CVE-2024-43502,0,0,07424299f38506a7e0966f23249b06b8f874d009b0870b8ff25851fa2eafbb74,2024-10-08T18:15:11.863000 -CVE-2024-43503,0,0,93f10c58e8467a51535bad4ee3fb8772eff8335f2c24816014f5c3470999e659,2024-10-08T18:15:12.050000 -CVE-2024-43504,0,0,f5b84dcb5c101d3f10f42710370eee82b2fa4e933b9cd3c56485ffb328d84a8b,2024-10-08T18:15:12.240000 -CVE-2024-43505,0,0,0b2c934fec9824821c1d56ff17a897a5438ec3242c9d70f2aaa6d7fe8e913f4c,2024-10-08T18:15:12.433000 -CVE-2024-43506,0,0,0012f9030df73be921465afc25e34e9b008b9a1af50e593475e5ae52b77494c9,2024-10-08T18:15:12.620000 -CVE-2024-43508,0,0,1d40cffd8a5033c4a0eb19bb88ef0b46a0469aa52f90d57f1cffbb9669bac887,2024-10-08T18:15:12.823000 -CVE-2024-43509,0,0,bdcd4237ff37fa4314f7c680b2b40aeb9c9ad76e587623a377904b542df10603,2024-10-08T18:15:13.073000 +CVE-2024-43500,0,1,6d56010e316b4f91c6a7fd27a3598a24a500c072811e94a094cbc722d2a4c9ef,2024-10-10T12:56:30.817000 +CVE-2024-43501,0,1,6fb558fe60f4c24024a70c6f42305a57c04c8f57fba7e8f663851e325cd4b3c4,2024-10-10T12:56:30.817000 +CVE-2024-43502,0,1,fb78873eef645d04f4295dac203bac9f80544df7919280d5d556c751f74eb3b9,2024-10-10T12:56:30.817000 +CVE-2024-43503,0,1,a155640336c3569b5e7b5759d211edc72807d9e47fc1fb12f1706cc520e13e99,2024-10-10T12:56:30.817000 +CVE-2024-43504,0,1,0486daaa5f1c7f39f1581058aeec52a262c75145c123a16feba1f1dc69520843,2024-10-10T12:56:30.817000 +CVE-2024-43505,0,1,2d24011076aa7789718cf3a86dc54115269ac68ae0321b1d0ece11a60fd9846f,2024-10-10T12:56:30.817000 +CVE-2024-43506,0,1,ac2170e7c7f808942b68969707f1cdbe4e23d0c91f1a88e58065ba3a61c2972d,2024-10-10T12:56:30.817000 +CVE-2024-43508,0,1,307f55ad9bb141ad70eec3a94eec69d4ede439e767fabb858d2a1e2cc556f27c,2024-10-10T12:56:30.817000 +CVE-2024-43509,0,1,44ca234d98ba867a3699bfa9ad6526db7f46f3dcd93d80493c8a9fddbc988b03,2024-10-10T12:56:30.817000 CVE-2024-4351,0,0,1afa7cdd2b07ed7f6c7d4fd33431ae4e847e5055e80de2c2ff284dbdde180a83,2024-05-16T13:03:05.353000 -CVE-2024-43511,0,0,969895f1fb96b02d112250e9095386a883aaa50e4b9eec8bddce9860b8bc8100,2024-10-08T18:15:13.287000 -CVE-2024-43512,0,0,5c83278856d619e9f73031b6f5bf7633e4bd5ff6c48abd3ce7b32a55e5a44c86,2024-10-08T18:15:13.493000 -CVE-2024-43513,0,0,de631ec9e18b9518f7eef36cd259f39e5c463f4fe2e81b3540a4a6a9deaab657,2024-10-08T18:15:13.703000 -CVE-2024-43514,0,0,9688e7a5b1797f0d972975af5438e71f6ffd0dba157b7eb3ffa50b495c4904f6,2024-10-08T18:15:13.913000 -CVE-2024-43515,0,0,2ee72f9c02e777757886e5568c0e8fa00b756577faf1076fa8e47bb53c614789,2024-10-08T18:15:14.130000 -CVE-2024-43516,0,0,713fc8ac9d371ae262f2838d1832de389740114083eea2d0b3bc5831e0c62fc5,2024-10-08T18:15:14.343000 -CVE-2024-43517,0,0,3e21f5cc3b24832df92769db143749650056c7cb765f7715e55a1641674d34a9,2024-10-08T18:15:14.540000 -CVE-2024-43518,0,0,f7598351abd6623531b23a69f8775305bdbe9c38921b8920e709f9a1a507f50c,2024-10-08T18:15:14.770000 -CVE-2024-43519,0,0,c5c13a546416ab40317fa83c32f5b881be0df09a45c7d296475958b04315d3b5,2024-10-08T18:15:14.977000 +CVE-2024-43511,0,1,0f27a31265e3cb0ffc3ff5d319f1da4c93fc955ef8af40e796c0730290a50805,2024-10-10T12:56:30.817000 +CVE-2024-43512,0,1,c6d502733062d480ed219df9a72aa29a6d9773ce2e5921ea20149c03827709dd,2024-10-10T12:56:30.817000 +CVE-2024-43513,0,1,738c5ae24661689901fbc42863408a5e7994dc67f9316bbacac2a999dbbe0285,2024-10-10T12:56:30.817000 +CVE-2024-43514,0,1,69495650ad59857cf5c8120cbca4c1f84b539409e84ba13e99664ba18aa0398b,2024-10-10T12:56:30.817000 +CVE-2024-43515,0,1,340149c8d588f42e7a6efa25b3993f681e7b098a98c2325f75a0228739fca2d4,2024-10-10T12:56:30.817000 +CVE-2024-43516,0,1,0cbaf33c615e5b45fadda5625fac2701aa9d09535bdd09afbd1e759328698715,2024-10-10T12:56:30.817000 +CVE-2024-43517,0,1,644bb2f2e1161853e975d110a7c00bf58eea1cddd37a0b14c8577168cf0ef09f,2024-10-10T12:56:30.817000 +CVE-2024-43518,0,1,63923a995463b0bbbf34eb36e870d1c9f96d6af9b205cc78de8b65c9f3676ed6,2024-10-10T12:56:30.817000 +CVE-2024-43519,0,1,de39966b00d8dbc08af5b32d4292e6cfbdfe7743294bca2eba5399db2e071bd0,2024-10-10T12:56:30.817000 CVE-2024-4352,0,0,83fde2dc0fb70bd9398ce4f7dc00180654ce0fb46c0f63d8091186b07c4c5ecb,2024-05-16T13:03:05.353000 -CVE-2024-43520,0,0,cb659eb28977c2d410b27a4518da5483e1e66037dc25593455a3348ba2256709,2024-10-08T18:15:15.183000 -CVE-2024-43521,0,0,2ad0b4bb4fe55655c1d709fa72d8072acc41ddefb1b12f7f61780823afc1b90a,2024-10-08T18:15:15.393000 -CVE-2024-43522,0,0,60bb33288e42fbd0794b6bc4ef16043508c6090b50f14fdf8e7096276cc96d53,2024-10-08T18:15:15.600000 -CVE-2024-43523,0,0,30c3a38d25887b9f4002c844d93aa917e145a69ff68099dc04cdc8fcbfb9e4d6,2024-10-08T18:15:15.800000 -CVE-2024-43524,0,0,2b632184c648c1ceba089676e092824430cf32364d34f645667304953250b28c,2024-10-08T18:15:16 -CVE-2024-43525,0,0,a9e3415da207b47c87ba8264170871a9ef2a5d442eede14356cb813d8a808c11,2024-10-08T18:15:16.220000 -CVE-2024-43526,0,0,510cfdaf96f967eb60d0c3e1887e4aaf9f73520db5874b799ddfce1b392f4aab,2024-10-08T18:15:16.420000 -CVE-2024-43527,0,0,b2c20a127f432b0212425242b8e33ae400a9d6ba4408eb77a031457b1c01c993,2024-10-08T18:15:16.620000 -CVE-2024-43528,0,0,bf738531133855f1b96333f266df813ce7a10b8874e077cac8cbfc7f696c068b,2024-10-08T18:15:16.810000 -CVE-2024-43529,0,0,318031425c12f066a27f749899b8ae55e6279bf3144197970750ec610f46875f,2024-10-08T18:15:17.027000 +CVE-2024-43520,0,1,50c1f8fa3107ef35ae7a9e731daf73ee98a87962c259c53ca782788417fda342,2024-10-10T12:56:30.817000 +CVE-2024-43521,0,1,7571d715b407ce425d83b4095580e59f0849b0bf24bc5e965b0c626fd7da0e54,2024-10-10T12:56:30.817000 +CVE-2024-43522,0,1,bd38eff6f768e0bb8c778634c9dd831e5a264d950c8be21b20d6e5a1c9f2c99f,2024-10-10T12:56:30.817000 +CVE-2024-43523,0,1,4558c55e30f061b9c674d5b3abc74dc776fed7ab9f5b001a70ae1086a2f50f2b,2024-10-10T12:56:30.817000 +CVE-2024-43524,0,1,1724b2f16c6d23cc3984120392a815e76d36f338ecdbdf210ef2e4986d90174c,2024-10-10T12:56:30.817000 +CVE-2024-43525,0,1,840102d4e72691185278702ea3dd0de1ec11454fd26d0a8e517205b482892d44,2024-10-10T12:56:30.817000 +CVE-2024-43526,0,1,0061ba3601562593d0b94a790514398a1bfef8da02c84eb484880d4a22cdabfe,2024-10-10T12:56:30.817000 +CVE-2024-43527,0,1,a50ec8edde3cf97e5fa45e07d3a34efdf0cedc44dd4bb1030051d4b909ff488a,2024-10-10T12:56:30.817000 +CVE-2024-43528,0,1,a1828ed90f14854add887a9de03f43b3a538ffea82b80d8ef17d168a3bed99ab,2024-10-10T12:56:30.817000 +CVE-2024-43529,0,1,c5f90219f798da6c39288523905c8ceebfeaa7ccd7fbf9b23616c3b01099dd0a,2024-10-10T12:56:30.817000 CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 -CVE-2024-43532,0,0,e084e74947ce807d435889230da310bc2e56b88222b021105b4887a3a0036a2f,2024-10-08T18:15:17.230000 -CVE-2024-43533,0,0,6cf180d60bdd1b4239f5017e499d3e35cc63c8f5bb49ac748f44a48b54afa548,2024-10-08T18:15:17.437000 -CVE-2024-43534,0,0,68a9ee7f1d2e900dbe7db9270240e3905946cf4a4e4e689367097f8d48bf9687,2024-10-08T18:15:17.630000 -CVE-2024-43535,0,0,275f7222740991e68dddf422c19a4e02b990bc4668e7bb1776874ecd46524979,2024-10-08T18:15:17.830000 -CVE-2024-43536,0,0,1609efd6a80a49a56ef880a6ac6596b56df8db8636c4057b37d2816cc1a3225e,2024-10-08T18:15:18.030000 -CVE-2024-43537,0,0,965118328e3bef4e8c7d395387be17537415fb174c63d513312fa13d8f7edd8c,2024-10-08T18:15:18.263000 -CVE-2024-43538,0,0,ff3a9a881e6f15aa5cf6f54484d5a4e2c93df622eca8df2c5b6e429f066c33a6,2024-10-08T18:15:18.457000 +CVE-2024-43532,0,1,24636bc9d248f747d9cdb1ffb55c5cb5b6e7a075e729d6479e8ce644b6249f88,2024-10-10T12:56:30.817000 +CVE-2024-43533,0,1,6a97805797bc12363a585aaf212ce48b45741f816fbf6aabe8ea5c723dcc07d9,2024-10-10T12:56:30.817000 +CVE-2024-43534,0,1,97b1cd117a416f9f18bfdc87ae5c0101182cac6701a00b6e9f8ebdbaaeb7f5a0,2024-10-10T12:56:30.817000 +CVE-2024-43535,0,1,95a2701a57ae3dfd24abda1488967fb07937702097440f1c709c0c677658e9f4,2024-10-10T12:56:30.817000 +CVE-2024-43536,0,1,9b725e0fd5af8914732e4c0c29c421af61e1d7e0fa1e9ddd76f16ee73e9935e1,2024-10-10T12:56:30.817000 +CVE-2024-43537,0,1,de471b3600df3043e4b662c1de633c745e181f76adeb45a19405d79cba2c3e6d,2024-10-10T12:56:30.817000 +CVE-2024-43538,0,1,855e9da7e6b48f846fc157a254dd765bb9dc56f0d4d7f802def7c1a1aa2d4890,2024-10-10T12:56:30.817000 CVE-2024-4354,0,0,664e83e852799af34d5f786f17cdf52435e913db328cd710bdb953811fde5eb8,2024-07-18T16:14:41.387000 -CVE-2024-43540,0,0,9a104c48bb274461464b2de07b36962c8639bb5d70b22fa1e3d24ab555557b3b,2024-10-08T18:15:18.650000 -CVE-2024-43541,0,0,b18d4d2723221253a27414bccc8c54f8f149d50d8f4d33f0fab9536182fa3c6a,2024-10-08T18:15:18.857000 -CVE-2024-43542,0,0,6c0967cc7480e6bfb432cdd9f7bc55fce8c598cdf7f19986f822df67c693dcc8,2024-10-08T18:15:19.067000 -CVE-2024-43543,0,0,dc5a8f135edf5dc77069ab15288f10b555a7d2d85500cf94b88f25567ea5bc09,2024-10-08T18:15:19.270000 -CVE-2024-43544,0,0,376f878a9c74347a0e82ca313b1bc198c88284aa7cd7bbb80948499c3c1892c2,2024-10-08T18:15:19.487000 -CVE-2024-43545,0,0,a444b11b6c925dff546156ce094a22355797fdc673872926708bb86d9674caa3,2024-10-08T18:15:19.690000 -CVE-2024-43546,0,0,1d09c8e39da5bd789b90f38db91a4e1740ed8d23a297947a5f31cee568b87c3b,2024-10-08T18:15:19.893000 -CVE-2024-43547,0,0,4eb785d13809ed529817ac8b88cbc956be28b11dd1f2f3bdea413210d167d2b8,2024-10-08T18:15:20.160000 -CVE-2024-43549,0,0,be8c2bebc20394de87ab881c5de3899fda817018bfa716844bda20cfd112f7f9,2024-10-08T18:15:20.377000 +CVE-2024-43540,0,1,99421455f162a78e51726cf4d736fd07d0f8dd60e0a4fe07b8a115450debffe5,2024-10-10T12:56:30.817000 +CVE-2024-43541,0,1,33fe9a87b0567a48980f5058166629c4f4a1334c09f436323b1e1ad7fb6809c5,2024-10-10T12:56:30.817000 +CVE-2024-43542,0,1,ceb1302444f71b7c50179d0cfb6ba38ae6d0846a36cc5fb97264893036136eb2,2024-10-10T12:56:30.817000 +CVE-2024-43543,0,1,b8736e7d33761923e98d4236c8606b42822826fe95746e7ea328b46611f084d6,2024-10-10T12:56:30.817000 +CVE-2024-43544,0,1,a6be4efeb70db0bd05079257fa3315307d13880a25ab5feba0510f5b7eed7659,2024-10-10T12:56:30.817000 +CVE-2024-43545,0,1,3ad940bf5b5904b2cc992411cfb7f1c3176af1b1c40cbf59d16bc26badd30298,2024-10-10T12:56:30.817000 +CVE-2024-43546,0,1,da56efb2049bed78abe14ffae4fe9a1117398449af376f79f910d01d2558bfa4,2024-10-10T12:56:30.817000 +CVE-2024-43547,0,1,b3b2bac90555e80e0cc6a4fd714236707ed88093cdbb270254dc665445869b4b,2024-10-10T12:56:30.817000 +CVE-2024-43549,0,1,026d6c11fcae6670f2228b3b86bb04d4144806d97e0fce59bad6f119bf79bc16,2024-10-10T12:56:30.817000 CVE-2024-4355,0,0,44d760d2293a7a0b9f294a1ecb6d78b7ed5fc4a36b90344217d2adaa7ff81f7d,2024-05-30T13:15:41.297000 -CVE-2024-43550,0,0,98e71925ae450f74d3a406cc9e57fa9d5f49758c2d3fc865dec0c9670806d5db,2024-10-08T18:15:20.583000 -CVE-2024-43551,0,0,c95e08879b5498a45d8f2c69c2f32f1c6d27b667bc189a3ccc69e11761e114cf,2024-10-08T18:15:20.783000 -CVE-2024-43552,0,0,ba8cf4ae078bdafd1b8856b2b07a67cdd96eaaabe65bd49513b7680786388507,2024-10-08T18:15:20.987000 -CVE-2024-43553,0,0,8d5f7d4ac179207393e1c0c0a0f45e30f155f8a65ca13fc1753700f0684cfa1c,2024-10-08T18:15:21.183000 -CVE-2024-43554,0,0,1589ddf4fdefdbcb476e562b03212e9de5f6cf9df414f668531f2609dd6ebfca,2024-10-08T18:15:21.400000 -CVE-2024-43555,0,0,43515b2422c91ae3bfed15ac8ece2d3056f15a96ad511cd18f6d06297c3f11f3,2024-10-08T18:15:21.627000 -CVE-2024-43556,0,0,6a7d5fa02bff6e769f78779b51cfe617c25febff503a09ab1837bd0c8c6e430f,2024-10-08T18:15:21.840000 -CVE-2024-43557,0,0,cc9a273c4b2dd17660740119a36dd3e6bfa78458e108ef05add3d4d793a9392e,2024-10-08T18:15:22.063000 -CVE-2024-43558,0,0,71a118ab2ed7593019471ed5187e5c0d0f4f84bd36fd69ff44983c9979d91436,2024-10-08T18:15:22.260000 -CVE-2024-43559,0,0,9cf0bb93151b0ea1b9102beeb3367d37cd29aa4607b72f7fac5ea45d70160917,2024-10-08T18:15:22.450000 +CVE-2024-43550,0,1,d7ccfc6fb9ea56b9faa281ec035e0f6619b5a0df98dd6a3ad9ef8bc41015b668,2024-10-10T12:56:30.817000 +CVE-2024-43551,0,1,c34387dc3ab18b9c10ee75936a96c285c92c33f1cc768a218d2dda2c860c932d,2024-10-10T12:56:30.817000 +CVE-2024-43552,0,1,d26311e66e3dbc46c433afcdaf778e3226afcd0830233e9c2fa16001f63f1c63,2024-10-10T12:56:30.817000 +CVE-2024-43553,0,1,be4085301235d40e91d496887562a892cb2ac9acd5abfae283a9b8bf314e86ca,2024-10-10T12:56:30.817000 +CVE-2024-43554,0,1,bb63d28e05ce5050bc162460dbee0728a7bbbc1c0e6998056ea39ab8476a23ad,2024-10-10T12:56:30.817000 +CVE-2024-43555,0,1,3dca2d145af9e3df52924a3bb0a171f88de7724d682732242b8290bc62fe24e2,2024-10-10T12:56:30.817000 +CVE-2024-43556,0,1,1257a690ef120eacdd50c7d90529e42eb884704badc5ef7ffaee7894080a7c0f,2024-10-10T12:56:30.817000 +CVE-2024-43557,0,1,39ec5177018d7c898c695db8d0adc63a2987bce8be1176bc62821e52bc61a2e3,2024-10-10T12:56:30.817000 +CVE-2024-43558,0,1,cf5a52e5f73cea3137e8ab4fd3a3408bf135e5e46eb2641cdff3a5ae9bf03f47,2024-10-10T12:56:30.817000 +CVE-2024-43559,0,1,7936ed77077b60aabfbbd5ee22e2dc279ebc950a34c3b2b2bda4b260c44ffd9e,2024-10-10T12:56:30.817000 CVE-2024-4356,0,0,c314fe1608f5a3b59bb87f88c052e04f3d51ca5a5e09c7b63a9301a39fa91b0f,2024-05-30T13:15:41.297000 -CVE-2024-43560,0,0,c2de0ed3e2308f2802dcd76174a9314f554b604688a3c51d82883182e48364a9,2024-10-08T18:15:22.653000 -CVE-2024-43561,0,0,c8e7213d677c47020c8ab79095fbb5beffe8f200ec898e8ca1f8201904a0ae8a,2024-10-08T18:15:22.970000 -CVE-2024-43562,0,0,92313555c5bff695ceba91b24c2577923b5a345f2d98b779a7a836feaecebbd1,2024-10-08T18:15:23.167000 -CVE-2024-43563,0,0,878b9b04d2ee7f9afbaa39b3b4d242424596cb4ab3209fa9cebe7cbb1613bd35,2024-10-08T18:15:23.410000 -CVE-2024-43564,0,0,a091de7ef248d0799fe06ab4358e60d542f8b85fcc31180e4f21f1b88374c9a5,2024-10-08T18:15:23.613000 -CVE-2024-43565,0,0,1515d3c9cf30940f1e85dfc437a11c33d91f80c469fc9b0ba2f0f63569918e02,2024-10-08T18:15:23.810000 -CVE-2024-43567,0,0,dca2ed64951b773cb441fa0df76c09d4a6ffb9288788735af1e1694ac08fbf16,2024-10-08T18:15:24.010000 +CVE-2024-43560,0,1,bc69c825b8ed4022c0a791d0ea0f187a67b2728e5a8eeb6b7dc0905da189ae5a,2024-10-10T12:56:30.817000 +CVE-2024-43561,0,1,eac326be7f3c583f78f6a14846a707a9c45fee20c4f0656c560698a192bede5a,2024-10-10T12:56:30.817000 +CVE-2024-43562,0,1,83b09d4691b3f6a6c1e2096fbe19a00e90cfa898ec8ee3d9df0f9a699857a4cf,2024-10-10T12:56:30.817000 +CVE-2024-43563,0,1,69245fc39dd2eea7489c63774fe6981665b3985d85b7f54fac1599792787b5e4,2024-10-10T12:56:30.817000 +CVE-2024-43564,0,1,886ca69de72113b6dbaaa96694e01d78005a7b8e6e71316deb862bb438bab379,2024-10-10T12:56:30.817000 +CVE-2024-43565,0,1,c466c8aab3d31d3785b78ed81988bff14a09a9e44dcf3b51840fc9b63ca0d8c7,2024-10-10T12:56:30.817000 +CVE-2024-43567,0,1,5254211d003cb9dfab5d0a0274d50ed06371d19404c4e47d666432ca57706882,2024-10-10T12:56:30.817000 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 -CVE-2024-43570,0,0,c865077bca30bc411c801500867ac03cfd59313735d06cc54e40b763efdd85b3,2024-10-08T18:15:24.207000 -CVE-2024-43571,0,0,0541cb90a92aec766aef8dc533345697e7e87469ea5911e020c5fe9cab367e53,2024-10-08T18:15:24.400000 +CVE-2024-43570,0,1,016b6e94609b530b65d5100c09249d20ef14a15a752087ce1bb1b7159fb57dc2,2024-10-10T12:56:30.817000 +CVE-2024-43571,0,1,015df71595da42b0884946bd78c15bf74fc19709a1096441e42c8f5ef0b8f816,2024-10-10T12:56:30.817000 CVE-2024-43572,0,0,c5b6bd1c7b68b3e00edab28608ced1c7e955c66b71fc89c4003bd803ff137556,2024-10-09T16:16:45.687000 CVE-2024-43573,0,0,978bcc99424be07b6f0df6c5ac3b8b33f48ee9c2dd0c03b05e841251af30fbdf,2024-10-09T16:16:42.877000 -CVE-2024-43574,0,0,780ac4540971d435f138e8c561bf22e83d97229ce63df10bbd7e3e1d630f750e,2024-10-08T18:15:25.030000 -CVE-2024-43575,0,0,76037003cd8b64321af240a28da28ffc57467669144e86a45af480a1ae2deea5,2024-10-08T18:15:25.257000 -CVE-2024-43576,0,0,2165af1adc864de0f8da13303861fdda0fe9a0ee1d17c174d40ae96e64d63e3e,2024-10-08T18:15:25.450000 +CVE-2024-43574,0,1,30d4174ef4e94dde6f0aa7093742f8a5ba6bcc65556c31badec28200fce82b19,2024-10-10T12:56:30.817000 +CVE-2024-43575,0,1,eec07e542dee921a9f44a423761686ae2ce04f8b4b0745d9fd5ba52addccbd98,2024-10-10T12:56:30.817000 +CVE-2024-43576,0,1,d76a890bff782679827ca6165aa10af7abdcfc7817f90ed044c9e8a2ad69acdc,2024-10-10T12:56:30.817000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 -CVE-2024-43581,0,0,48fece808baa4a04995ae20c93f6d58640ce4e14ee4f69258af4c889103d4543,2024-10-08T18:15:25.647000 -CVE-2024-43582,0,0,6ed833d6e91507ad25f2dc4a146df639989d647cdd1cc4105187bc0f43900026,2024-10-08T18:15:25.850000 -CVE-2024-43583,0,0,c5de500c9e8796dd39ea675d24bdea0128510e9091e4064a0dfb4f3297539ffc,2024-10-08T18:15:26.063000 -CVE-2024-43584,0,0,2d81e0039d514091e452e8d98910a794b496fb72f532770dd67d911aa313d38b,2024-10-08T18:15:26.283000 -CVE-2024-43585,0,0,b521d45ea2e5b37c6c7e224d4f908112680775a20b248f194f85f5844f2e564b,2024-10-08T18:15:26.497000 -CVE-2024-43589,0,0,3c78ca101109ef16b4bb9be826b77fa866898cf1caa656bd6f62b63a0b26f352,2024-10-08T18:15:26.700000 +CVE-2024-43581,0,1,a80d93c6e7b0c024fe1b97d4e4deec65c6f1b75af5c2e2556fa59d3812bec056,2024-10-10T12:56:30.817000 +CVE-2024-43582,0,1,c174c728bb8cbf8ee0fe4a084b41624024851d93e790a9646ee163df3e34c072,2024-10-10T12:56:30.817000 +CVE-2024-43583,0,1,30248c1e5bb2b577d1370be438ebb2edd7fdb61cd665397de01a282c21157b09,2024-10-10T12:56:30.817000 +CVE-2024-43584,0,1,2e3cee08849cb8bdaecb50171cde03851673f8c0a8ee3f8c1fd5ebd59fedc20c,2024-10-10T12:56:30.817000 +CVE-2024-43585,0,1,14d891ce200ffef85bf5f5cc40410c2359442d013a746d88958cfe01ea95c884,2024-10-10T12:56:30.817000 +CVE-2024-43589,0,1,779309fa13b7a7232732770568e2e21b2e4ac6fd0e02562e2d37b264dca69d8c,2024-10-10T12:56:30.817000 CVE-2024-4359,0,0,14ae9b130c152b886b9b21ff0fc5d35432a1812b898a1bc13704faab705127c7,2024-08-12T13:41:36.517000 -CVE-2024-43590,0,0,6f06f33249f4c6974d0dbd88e6681560256944623de5707b4207a8fe41efec44,2024-10-08T18:15:26.913000 -CVE-2024-43591,0,0,bdf4b5e2e46b5e3ccd6c90a8f2213d2a4c481d12af395580355e41409a7c9afe,2024-10-08T18:15:27.127000 -CVE-2024-43592,0,0,edb03da842f2da852290e0493d6f7981e8d071505392edcc828b8b13c8caf537,2024-10-08T18:15:27.327000 -CVE-2024-43593,0,0,d149a970250fc4f41b32c148a78b3f858aa739837ad3a5a7eabdbdaca1ccf0d6,2024-10-08T18:15:27.553000 -CVE-2024-43599,0,0,4d2a2b64c496d3e93bea7085c5950a3ee1408e59d63f2a65bdc432eb1b9a1423,2024-10-08T18:15:27.753000 +CVE-2024-43590,0,1,08509536ff9c79abbfa486d83a5a0f57d76e099d60a2b112924226b227614228,2024-10-10T12:56:30.817000 +CVE-2024-43591,0,1,802f53ec865d08b330f0aabdc385ca597aeafc744bdb5c1774245109df75a259,2024-10-10T12:56:30.817000 +CVE-2024-43592,0,1,5efe44dec6337a2ded281d09757e36954051913e78a754a1098617de3a9c5e9a,2024-10-10T12:56:30.817000 +CVE-2024-43593,0,1,fb9a1062086381851e8f55dc14ef4411fbd20747277c189fc913d2e82cbeb351,2024-10-10T12:56:30.817000 +CVE-2024-43599,0,1,26a290d406e9ce427b10e2a846d84ad0be9637b6bdd980c6073be0166ee484c8,2024-10-10T12:56:30.817000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 -CVE-2024-43601,0,0,1a3def0156b0d0152db5d385b4e6fabc83f92fbca3ad892806b78866575f7a61,2024-10-08T18:15:27.953000 -CVE-2024-43603,0,0,9b52fb77fd7b1f0f5ec3864be127832e209535d943fcdace1a97c4e113afd227,2024-10-08T18:15:28.150000 -CVE-2024-43604,0,0,5424b610aca017d36027ec1372e14e99116033e72961caf94a7187e1e2d0f294,2024-10-08T18:15:28.347000 -CVE-2024-43607,0,0,5f458719313c536779b7f852a701e553937f5de101b9bde414db93c04a1d6f07,2024-10-08T18:15:28.597000 -CVE-2024-43608,0,0,6235a5e8784c2240d958b10c3d73e4530569bb747fbdf46aff0a30f02ca4282f,2024-10-08T18:15:28.813000 -CVE-2024-43609,0,0,377909def4af2ca1ef787f374a0182997c7bcd0c588abb0ffcfb16e7e7675548,2024-10-08T18:15:29.037000 +CVE-2024-43601,0,1,4fd40479d84eb3cbc3273eef176251527f8e84dc5b2eaf57b74c33022051f3d9,2024-10-10T12:56:30.817000 +CVE-2024-43603,0,1,85034b29f18156372c3e787868eb5c7ad577eed817ef23a2a38f999c40904d41,2024-10-10T12:56:30.817000 +CVE-2024-43604,0,1,214c2efa553982a39e2b926502d8bcac2b11edeafde5f8e1853172383d956764,2024-10-10T12:56:30.817000 +CVE-2024-43607,0,1,d412aefe600a0b488e44add13af4a57e79c4e2f5a56972470dc8534c4adb39e4,2024-10-10T12:56:30.817000 +CVE-2024-43608,0,1,bab908a900d46d7577c407ae87df76b78e33d439a2cbb3dba0a9228bb3a3aaac,2024-10-10T12:56:30.817000 +CVE-2024-43609,0,1,a14ec00e6fa5ab9fc5ca5c77d03e4a181d2eebe89d9aa3c62f0634a627b0c61c,2024-10-10T12:56:30.817000 CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000 -CVE-2024-43610,0,0,57f15db62878ca34a5f82fd02c58e21b929e38de2183435b5f20d3c1c29018c8,2024-10-09T17:15:19.397000 -CVE-2024-43611,0,0,f4185107e1249b2e85b5df0f7990610117f7d2f7f6f02a96001db70dae8e1bb1,2024-10-08T18:15:29.240000 -CVE-2024-43612,0,0,71751df9a78b297053fffaff531feed0fdde3b9adb3c0ace2eb30d06578caaa9,2024-10-08T18:15:29.437000 -CVE-2024-43614,0,0,645924067305a4dd4d40fc8e24630d2313c14b59a93aded31cb3537d38662a2a,2024-10-08T18:15:29.623000 -CVE-2024-43615,0,0,ba6e66d8f704a9fdc25f84dbc790a1b7495b280881d115babf74050f0540cfe8,2024-10-08T18:15:29.813000 -CVE-2024-43616,0,0,13d64463923dc5085bec2b75b56e378efcd4b201515dc9d64d4e0dcda2269ded,2024-10-08T18:15:30.020000 +CVE-2024-43610,0,1,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000 +CVE-2024-43611,0,1,1f65f9f6b93bab07f1e8a360ddfe4ea9068a79507e9c7647fc5f282f71fcda83,2024-10-10T12:56:30.817000 +CVE-2024-43612,0,1,b9ea91d6b08c52c6883db6221a334151cec119dead0146a20f693826f7d9dc11,2024-10-10T12:56:30.817000 +CVE-2024-43614,0,1,64f24c7c50685f9ad3276f24b2007419cd80a81ffb1ba1ac8841a0319981b25a,2024-10-10T12:56:30.817000 +CVE-2024-43615,0,1,cabf3193aedb7ad0d3ed1fcb4aa0f0c8ebffb232db4d6dbfe6508c2976a26840,2024-10-10T12:56:30.817000 +CVE-2024-43616,0,1,c49966d1ed4a84fd45db5f44fd4fe7216478a4fc5f76649e6a4ae4cc72f2492e,2024-10-10T12:56:30.817000 CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000 CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 @@ -259586,8 +259588,8 @@ CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd641 CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000 CVE-2024-43693,0,0,86a2418e4d1748f5ff1d2c010cf8ecb2f43f15c3955c5a628ff84ac9fa94c8a2,2024-10-01T17:17:16.107000 CVE-2024-43694,0,0,1f38ed43c98bb35b4ccdf138bc4e0fc802b17a5cb43658b2fe1564d43a70cd61,2024-10-07T19:40:04.147000 -CVE-2024-43696,0,0,836cbdd93481f79b0376c146c7b443dbf891e4bf0fab15650f321deba707f358,2024-10-08T04:15:07.680000 -CVE-2024-43697,0,0,e124d7e703440f5967c60e0f2f0a8b1b2278f58414864320362c8e94b9551b09,2024-10-08T04:15:07.913000 +CVE-2024-43696,0,1,e70497c05994055ea569891985eb035774fcd7cc91f0d688c71d29361793b1b6,2024-10-10T12:57:21.987000 +CVE-2024-43697,0,1,97b11ac730c9781ee6409235bc2b5bf189ea6a6de3d050aa0aa33e03b4f3e185,2024-10-10T12:57:21.987000 CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000 @@ -259616,7 +259618,7 @@ CVE-2024-43783,0,0,ddca1425623bacb4f350aa37099519b24871b2f03a1ef61a2ee233ff17935 CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000 CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000 CVE-2024-43788,0,0,a03aaa9704dba33d1000f4af935b205178542791785852dc4658122c86bef661,2024-09-03T15:15:15.937000 -CVE-2024-43789,0,0,d8c03dbd03b1da7f62ab6a5da638361365d8fd810a0a3994b1a49dd981037e34,2024-10-07T21:15:16.710000 +CVE-2024-43789,0,1,990c7005100401c0c2c4ea0d747aa403a06bc0f5cf93e443385f94c7450f4922,2024-10-10T12:57:21.987000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000 CVE-2024-43791,0,0,2bd2bc46ca8d9e06de5a015638de614e582ba6d4dc15a542dfa7ce0b054d116a,2024-09-12T18:26:31.783000 @@ -259730,7 +259732,7 @@ CVE-2024-43891,0,0,1c23f1bf42b54dadc6cc9129673e1e978162326fb473b5b49bcbd4f88fba9 CVE-2024-43892,0,0,812cea58111e66bfe7a639c7b3451759707a135ffec31209bf0fc6dafba8a03b,2024-09-12T12:15:49.593000 CVE-2024-43893,0,0,03380463385702f0b845516f8bceb11262b313ed31f3974a8fadd31a5948d88b,2024-09-10T18:13:21.920000 CVE-2024-43894,0,0,6a944d0f551c2b10307e4d0aa1c5b1c1d9cef2ca832a7a9679c07a82b1c23326,2024-09-10T18:09:41.230000 -CVE-2024-43895,0,0,79a9bdf0ce4aa3b39e8f96120c9bea0eceaefee25a6e31f739fb6d05e4c3cb57,2024-09-10T18:08:57.550000 +CVE-2024-43895,0,1,ea436b0c1f9ef6e524aca0e56514c0ba4d7c78b53b35eb8fe45bad10b4f80baf,2024-10-10T12:15:04.350000 CVE-2024-43896,0,0,9e528459b2e50d1f7ce6be809e552e51735f0b29caed43fdd44f11c615a94e16,2024-09-05T18:37:16.483000 CVE-2024-43897,0,0,a3720581779f061f902fffa02faf7be461be206432a41a755d03dce9fe694b90,2024-09-12T12:15:50.297000 CVE-2024-43898,0,0,b70a0322f8294223b16267a9061a592097cc320e64347a35bbaee6def942a528,2024-09-10T08:15:02.960000 @@ -259755,7 +259757,7 @@ CVE-2024-43914,0,0,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d2 CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,31042afa408fe94b440478a73ae72a8d0da3ebc3aa7dccb541b916eb98fd8b0e,2024-09-12T16:21:19.030000 CVE-2024-43917,0,0,acabaf456c8dfd741a78efbcd42603884b1ece437ab7a578f9853b1f227cbc3a,2024-09-19T21:46:19.713000 -CVE-2024-43918,0,0,ddd56bcf8df0ced2fd43f465099ef1734f47f7e198c9ebd8d1474897ffb0a07e,2024-09-06T15:51:25.957000 +CVE-2024-43918,0,1,c621e202cc81a6d6dbad623e8f3084e3f87e287c74f6e6ceb67128fdca645998,2024-10-10T13:01:57.573000 CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000 CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000 CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000 @@ -259767,8 +259769,8 @@ CVE-2024-43934,0,0,4e14707da9cba5c30b08d1fee5b95a63503f58541a5f170f7bdf2957916e0 CVE-2024-43935,0,0,507740bb6b2ff7008debdb7eb0a31d10ff2310284bc85a28c8516e97f01a540f,2024-09-03T15:19:13.313000 CVE-2024-43936,0,0,13ff2ee8ac37d656ed3cfb9bac7c332b5831e52f7ec68739f3804a7d224b4b07,2024-09-03T15:20:22.557000 CVE-2024-43938,0,0,5e9169e33c88931e03e9584f8dd6045106ac6535eb479b624633cc85c5233f81,2024-09-20T12:30:51.220000 -CVE-2024-43939,0,0,038f7625de6a8661e4d4e3d67a6a9205d36179299b716c94d45c48dbdde60e93,2024-08-30T16:29:15.177000 -CVE-2024-43940,0,0,e2807b5b7542484ae9ed35e04d622dfaaddf93a950c2f3af8ce19e39df4a53a6,2024-08-30T16:27:22.270000 +CVE-2024-43939,0,1,c1f7872d5f5e629b717113c2ebaedb8dd4eee36925cf12200a7a7b46b330bb5a,2024-10-10T13:09:09.860000 +CVE-2024-43940,0,1,e7b83174a343e1e8cc0f517e86d517df7226dcebad292bc52d9434cafd9fc810,2024-10-10T13:11:52.087000 CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2eb1,2024-09-04T13:40:41.620000 CVE-2024-43942,0,0,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000 CVE-2024-43943,0,0,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000 @@ -259880,7 +259882,7 @@ CVE-2024-44062,0,0,d6bef9112163640e773e122d40930de4ecec4777328c835263d4052bfb084 CVE-2024-44063,0,0,8ea7a84a37f53fc26574f2d48b688739bfe3dad8852d642a265a023b1a91cd34,2024-09-27T14:31:05.703000 CVE-2024-44064,0,0,4e74c010eb0f0db49dd4385b0641f0bed56c75cde28c530ba6b3d37d998a5b5d,2024-09-24T18:15:30.537000 CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000 -CVE-2024-44068,0,0,f3d910d30f7977af93e48b4a5ccd52089626c332db448e3b55c621d52e6e199a,2024-10-07T19:37:23.523000 +CVE-2024-44068,0,1,2ca7c19ac983e9f65de8eb797189f4f3f128fe92d460ffc66cd9b68f280d61a8,2024-10-10T12:57:21.987000 CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000 CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000 CVE-2024-44072,0,0,c15ddc9cbc2cc106650a31089cdfd669f16d12a8ad25609c42818d1d63e1458b,2024-09-10T20:35:09.990000 @@ -259988,7 +259990,7 @@ CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000 CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb76b2,2024-08-30T14:57:40.020000 -CVE-2024-44349,0,0,fc60d9e0f9b5aa7e9eb6465e9d56bc599b85597a9973580ce6614fb7ecc4bd8e,2024-10-08T19:35:17.550000 +CVE-2024-44349,0,1,8627355473cfd24203d7e53852a3239db192fac91ebb496b0b5e55d373f9597d,2024-10-10T13:15:14.273000 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 @@ -260065,7 +260067,7 @@ CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc19 CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000 CVE-2024-44667,0,0,67bc66d5934efb1ec507a459f00d72755f90d65f712e9b4a25f261f89a211afc,2024-09-10T20:35:11.007000 CVE-2024-4467,0,0,57c2229fa6c3e84bff363dc59d2c80befb785107da1c6be3c514b7e8bc55ed5c,2024-09-13T22:15:02.260000 -CVE-2024-44674,0,0,4ad99a743d996e1bb4ef3ff4d4c172729c8e85d48bef9b070dccf8df456d3f2d,2024-10-07T20:35:07.293000 +CVE-2024-44674,0,1,78532ab5feb22da158d1ca77bfa4a9481318fd90b7728fb7942741a2fe56392d,2024-10-10T12:57:21.987000 CVE-2024-44676,0,0,b0f0617031a60967a8b797cadadb8c5f870cf4ed39d40d10e892a55bec1fea8b,2024-09-25T19:20:25.073000 CVE-2024-44677,0,0,b3010270d0be534cbe0fd14032547bfe302a60106c2515252734805cedbdf65e,2024-09-25T19:19:24.007000 CVE-2024-44678,0,0,6e57560ccb7f7726a96b187fa0940b079eab34be5f5aa788f0964af3dd2ca471,2024-09-26T14:35:14.687000 @@ -260284,7 +260286,7 @@ CVE-2024-45048,0,0,6de5f8a7ac9319b7de3e5cce18cda2d98033e2568c0175c978881a510456c CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000 CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000 CVE-2024-45050,0,0,df9b4eec2db8faa9598e51ddf6755fc85d9bbe27148ae6e75c24afdc28423065,2024-09-05T12:53:21.110000 -CVE-2024-45051,0,0,2275bfcb302ab6ad04870504ad65ff661814943d5b86cede085b97a58586831c,2024-10-07T21:15:16.930000 +CVE-2024-45051,0,1,d1ced9fb932a4fa6e7752e60e1b30e608603cb6a4a59be6038376cb3a3e2fbdf,2024-10-10T12:57:21.987000 CVE-2024-45052,0,0,8b5354ce3732be9a4ec5c7e0d7652b2053216fa0d00ab80b71e08b5337152575,2024-09-06T18:18:59.710000 CVE-2024-45053,0,0,f91ffa38b1f1473a6604647a2be1fa377450e287db4b7cdb71eb6f698ce9f726,2024-09-06T18:20:35.430000 CVE-2024-45054,0,0,ff75628d00a407a70c7f6309d50fc58f4f9685e929e8ef8f6791dc204e0cadd5,2024-09-12T17:50:11.233000 @@ -260293,7 +260295,7 @@ CVE-2024-45057,0,0,7c7e007dde24f3da86cc84f473547374b667803e777d6426ec3a48fcd5cb8 CVE-2024-45058,0,0,0aeca269943a7129c0404dfb981723de5fb36265ba0866f96f3a12be3215eefc,2024-09-13T20:06:33.193000 CVE-2024-45059,0,0,c6a55ab336d1100130455a63f91aee20aa7bff7dc7cd1c935c7137c38d9b84ad,2024-09-13T20:09:19.523000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 -CVE-2024-45060,0,0,e57dc714bfdb69f7b240fb3e88416064545625507a639f64cd57e9904c9742f0,2024-10-07T21:15:17.170000 +CVE-2024-45060,0,1,7143d2d54a6021a987b539549896eeefcbac7eff25f332679ad991c9a771dab6,2024-10-10T12:57:21.987000 CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 CVE-2024-45066,0,0,a454e9ceebd31b55929c2c0a2d42869872cfc6fb29fa46b222f3049d82b952e2,2024-10-01T16:18:10.680000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 @@ -260318,51 +260320,51 @@ CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3 CVE-2024-45111,0,0,9fb0acaa2cfe1365ae260bae686a5d90e02d1dda50ec2516e7d6462b0987e021,2024-09-13T17:20:53.993000 CVE-2024-45112,0,0,fe220e89b9c90418cf9256ec0d1a61e1fb615761854b12c59226a9746bbe3106,2024-09-19T14:56:53.697000 CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186b6b,2024-09-13T16:56:53.673000 -CVE-2024-45115,1,1,9196f088541ce557fe770e6334d5d980d1e88bc25d23c810f69ae193266a9e9d,2024-10-10T10:15:03.127000 -CVE-2024-45116,1,1,81e480d9220c3494ee7a38f661c5a788882df12641e6f664c45ac18da59ece21,2024-10-10T10:15:03.930000 -CVE-2024-45117,1,1,a7f76cf6cead3665cdb1851f741d2bc2150727f01865c8cea22ef63825381938,2024-10-10T10:15:04.150000 -CVE-2024-45118,1,1,f8aca8a42f346c648cf13b9e598cd64dc98fdc761e968926d473e7e588e4815b,2024-10-10T10:15:04.357000 -CVE-2024-45119,1,1,4c636425b3d19f2f824200109033f154500868f589843bc5e35b9138bd5c095d,2024-10-10T10:15:04.563000 +CVE-2024-45115,0,1,9349055a51b4ab2d771e9a41d543a968d112a832663684147ee1928c5e34e47a,2024-10-10T12:51:56.987000 +CVE-2024-45116,0,1,9d95c4eebfa9dc5644cc8b95c8341f03a255fb8d4aabaf8279b2606e0cf3d1ec,2024-10-10T12:51:56.987000 +CVE-2024-45117,0,1,2bdc9c444f08a039d22f9a2291814b16825145c91e5254ef6b130acbfd961960,2024-10-10T12:51:56.987000 +CVE-2024-45118,0,1,aa17980a1fd525820d9f1c78cd6817f722c85c9d1d66483aad1b700f8b59b9c6,2024-10-10T12:51:56.987000 +CVE-2024-45119,0,1,6bd40264aba9fd80a3a07978973e1e91c2cfc7eb5afd5323aa3cfa4145689a56,2024-10-10T12:51:56.987000 CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000 -CVE-2024-45120,1,1,be04ce0e2054bb9c7a146a05f5b0423e8c560bf77887944cfa5bfdace25b8392,2024-10-10T10:15:04.787000 -CVE-2024-45121,1,1,cc04dc22e93e84635582d8d2c0d49e5943b1b8a3456c1d8f7dfadda6d2dfb969,2024-10-10T10:15:04.997000 -CVE-2024-45122,1,1,24ff7797cad61a0471cb3e602a709e7d323fbfa20611b33f6e6a80f3f1ef5de6,2024-10-10T10:15:05.200000 -CVE-2024-45123,1,1,c71ae568cab3c8105242b199224398a3a583b39dda0f3d151b5442bdb5ec5766,2024-10-10T10:15:05.400000 -CVE-2024-45124,1,1,5dd39d6753be17c004cf477f02238c2dba901025030cead11a18866ba1a78496,2024-10-10T10:15:05.607000 -CVE-2024-45125,1,1,4f30d26a2322c2cfcc77279d5c8b5604c54c9d1901cf77ff46fdcbde0b7da651,2024-10-10T10:15:05.797000 -CVE-2024-45127,1,1,4de42963c417f1a0951fa2a2ea11a61ab9195845174f226317af4e77bdaf6e23,2024-10-10T10:15:06.027000 -CVE-2024-45128,1,1,bd4580259aa9c2c766e33ccae4d679034fe7ae7bed897659d56b8581673d8a6c,2024-10-10T10:15:06.230000 -CVE-2024-45129,1,1,9dc38eb72dcf43b649f10c4d8fb02bbbbe1d61ec7baba13dd9a280cd6e2b1af9,2024-10-10T10:15:06.423000 +CVE-2024-45120,0,1,9c37a5b804c67a1ba3fa3554cd111678f23bce2e7307dc9d87c97c3b2e468153,2024-10-10T12:51:56.987000 +CVE-2024-45121,0,1,fb30aeba36c80fee0b03bfa773b2c57565f50e4554b142e3ef4c42de44b260c7,2024-10-10T12:51:56.987000 +CVE-2024-45122,0,1,727c57ddcfbdde55122229a562db8dc62ecaba680ac368a91d6ada79bdd146ef,2024-10-10T12:51:56.987000 +CVE-2024-45123,0,1,a6bae3db15d798157c75472af51e1ee67d65d73bb66d7e670282b0b9b535a3d3,2024-10-10T12:51:56.987000 +CVE-2024-45124,0,1,bec64ffcf043df0a92fcb7cc0c5b3c82830729882dc6bfcd467c53a8f38619b5,2024-10-10T12:51:56.987000 +CVE-2024-45125,0,1,ede6671d15a517794ae07074f4e9d649201a75139dfe0347b3a19346fb3aa93a,2024-10-10T12:51:56.987000 +CVE-2024-45127,0,1,e7d9a81ef8156b45b7d402ad5392b77bcc2bfd4622b7748e1ca5c53270a55e1a,2024-10-10T12:51:56.987000 +CVE-2024-45128,0,1,fdb0a7eb8c3f7fba8c2bf1d43050d939ae9a1aecf6ce40aee34aa0b53ec82acc,2024-10-10T12:51:56.987000 +CVE-2024-45129,0,1,744ed049198f17bd62882180161673cd37aa09677935b2c8df2bdecf5c269602,2024-10-10T12:51:56.987000 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 -CVE-2024-45130,1,1,cd0ea62d2b15ea75706653c32c9ed53e3799d88e9b199b78b7dc11015667f5ed,2024-10-10T10:15:06.700000 -CVE-2024-45131,1,1,b95273be31a9aee9e71912c7d9416cd960ce52a58fe21e99a7006555b131b0b1,2024-10-10T10:15:06.913000 -CVE-2024-45132,1,1,d26bb368309854a2bd219bbf8d3ebb74850ca9d9fbf5fa0550c406fece87968e,2024-10-10T10:15:07.140000 -CVE-2024-45133,1,1,bef12aa7338d389ef0f7e2ed47b0b0262a559d3813e78f05a524992836ee72c5,2024-10-10T10:15:07.340000 -CVE-2024-45134,1,1,14e941ef258a3bc7e2cff4325c2ec4f4d57912e4b2548922f98a62324e945dd0,2024-10-10T10:15:07.540000 -CVE-2024-45135,1,1,796ed1aa8964eeced568d5592530bf4041ffa42b206c01fe4c107b7c4d36b30a,2024-10-10T10:15:07.757000 -CVE-2024-45136,0,0,c9ad2ecb5aba03476e693f364218ac1e02907c0fc3349e68bd00e3e57272dbc9,2024-10-09T15:15:13.163000 -CVE-2024-45137,0,0,c532f6d28b470f19ed88150d3638d180f83be193ed8d709e9c53c69c0e6d2651,2024-10-09T15:15:13.373000 -CVE-2024-45138,0,0,9643d62ee569a15af59da4d4f77a741533114c7562d96218c0fbaa211e368315,2024-10-09T14:15:05.723000 -CVE-2024-45139,0,0,cbcf5efd84032046c32edff700f9e876f649b6cbfe5aa23904e94a43419fbfd1,2024-10-09T14:15:05.947000 +CVE-2024-45130,0,1,0cd87c187e9354dd40054c4e8decd62d3b4d546cadcd5785987a2b9343c39f51,2024-10-10T12:51:56.987000 +CVE-2024-45131,0,1,09760fb2d58050c999c1b0375cca39814c7baf93b2cc69631f16dcbdc07391f1,2024-10-10T12:51:56.987000 +CVE-2024-45132,0,1,4cb597e5e4ee1e3c296f575f47ddc69dd7921c898d6abe95dbdddf6b9f58fd47,2024-10-10T12:51:56.987000 +CVE-2024-45133,0,1,e2cebbf168eb6a10cd397a24218760578b7bfac96e0682dec23c345621097298,2024-10-10T12:51:56.987000 +CVE-2024-45134,0,1,4901444e1e5e3fd7c9af5e207b1024202ae3ae69233f25f4ea893cb366f735b9,2024-10-10T12:51:56.987000 +CVE-2024-45135,0,1,d68fb5c4159d400a7336e47008b6fda2c2f01f10b6ed36fa00b202ce94c9f639,2024-10-10T12:51:56.987000 +CVE-2024-45136,0,1,6d878b8fc19c1bbaa4211ae18c5528aaafebd03237826b2c504e0c238b7c9c3d,2024-10-10T12:51:56.987000 +CVE-2024-45137,0,1,ababe78ba9b8707d589a30ef25e9786587eb5690e3f605ad62718c447e4f0e2f,2024-10-10T12:51:56.987000 +CVE-2024-45138,0,1,ff26113f92d73f4e0243abadebc3cc88674170d4c50a5c390ae8bcee9b7e5f18,2024-10-10T12:51:56.987000 +CVE-2024-45139,0,1,bef568151e8877cf664c84451f75c608fb3433a929b7c602556fadbed55bbf1a,2024-10-10T12:51:56.987000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 -CVE-2024-45140,0,0,df4cd81f96f8444b21196a6bedce89f819ecd4b498ed204486540519a90dc290,2024-10-09T14:15:06.167000 -CVE-2024-45141,0,0,1fbf4d1f4e7cdfa6780ad6f5c4d7cc17bdfc9ca3d9f1200fb136b690aad804d9,2024-10-09T14:15:06.380000 -CVE-2024-45142,0,0,cca2a2d36f3a174f60fb893e7d834b5029d6fc31d6a5fea13111d6c379f3af88,2024-10-09T14:15:06.583000 -CVE-2024-45143,0,0,f53a00d9ea7fcf9e6680d47e9a33610e8a55c38027b5725cb1c2b87e282b756c,2024-10-09T14:15:06.783000 -CVE-2024-45144,0,0,c77cc8e3145c010c2698b406e4456870206bce15b9e6a16d5e1c20e3eeccc9b6,2024-10-09T14:15:06.973000 -CVE-2024-45145,0,0,b36d6bb4b4247eb059c115ad97c447cca0f70b08025fc2179ef91ba7e7a7f114,2024-10-09T10:15:03.283000 -CVE-2024-45146,0,0,2a5b5a0d648806ca5e54b8bd1a0a8e9a0eaa835e972130f7015e02de53d4b2a8,2024-10-09T09:15:05.693000 -CVE-2024-45148,1,1,9ec5ecbfbf981b12f5dc5c054b5a6d0e3992c82495e31da089859e5818ba562f,2024-10-10T10:15:07.963000 -CVE-2024-45149,1,1,2d023078254f7433642bf306066bc08777aa2bc32aeb55b1fee84a005a872cb7,2024-10-10T10:15:08.170000 +CVE-2024-45140,0,1,4e4e96dcb5f7974776961351c0dd64ece8de5b1264168bad3b1ca435596a3d13,2024-10-10T12:51:56.987000 +CVE-2024-45141,0,1,9f9cae352e6acdece86bd6c813b0a367416ac9c0a902515dcb6a491265c0f59e,2024-10-10T12:51:56.987000 +CVE-2024-45142,0,1,6dc72397caaba5c114abab9755e4241f84b203f38576b3ae8f818d2ea70e48b7,2024-10-10T12:51:56.987000 +CVE-2024-45143,0,1,a044f4c2e601b647a5a200d37a7cbb82f54800f1d75921780407b9f5c209af7a,2024-10-10T12:51:56.987000 +CVE-2024-45144,0,1,e0c90730fb1d310a9920d6d7253aed4376e3e2f4db4ef521210396cd355620eb,2024-10-10T12:51:56.987000 +CVE-2024-45145,0,1,64db84a3afb06c70040114eb4c29768ff0f4f0450893d0fd7c3be4dce996a99b,2024-10-10T12:51:56.987000 +CVE-2024-45146,0,1,3d3ac3cec43dc3d8a3ae36a2e22f9b1eb1c7d76488daae52e6b9e8c47b7fa9b4,2024-10-10T12:51:56.987000 +CVE-2024-45148,0,1,a459b0ee96093191356f73d74684d303981f6a206f81b02b3c3b1feb8cfe59f1,2024-10-10T12:51:56.987000 +CVE-2024-45149,0,1,1a1e58f3a33847c6cf5380d070bd8a34cdede3aaf6fffa8478deeea4fd7e2c1b,2024-10-10T12:51:56.987000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 -CVE-2024-45150,0,0,bd12df0ca2dd5e008526d6f546a4cd15e1f7b87d2c471afa5048e25665848888,2024-10-09T09:15:06.210000 -CVE-2024-45152,0,0,148ff5ca6e5b548257f7595f40141b53f137dc764010dfe2834f6689ff458988,2024-10-09T14:15:07.183000 +CVE-2024-45150,0,1,167a4191471f3fa946e58a55111d7addc1a05cf292397eebc010a5c52c665dd2,2024-10-10T12:51:56.987000 +CVE-2024-45152,0,1,277bf8061ad989d3fb02585b018bc50b7247f827e72814d05b3a0214c8b184fa,2024-10-10T12:51:56.987000 CVE-2024-45153,0,0,05c40a71199e1cd60b35af18f76fa03a1f83ce46a62e3e8f4fcd3f2716448b1e,2024-10-07T17:47:48.410000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 -CVE-2024-45160,0,0,9aa71f866a5bc2e153bf49d8cbf5d2611b16a3e00d1e41bb6732fa4312aaf5bb,2024-10-09T21:35:10.460000 +CVE-2024-45160,0,1,5448512f93e2c872a5532bb6e7925e6443ae5601b38aa00ad59c4de27ffce9e0,2024-10-10T12:51:56.987000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000 @@ -260379,7 +260381,7 @@ CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000 CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000 CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000 -CVE-2024-45179,0,0,b11e07ff02025f57194548ec28a9d4bc041b8822c6fcb2447bcedd8222dd668d,2024-10-09T14:35:11.783000 +CVE-2024-45179,0,1,6e27170ef2ca79dc290bcb2249dd9cf76c0e118b2c49c1f3f5cdbf3c4bf46f3b,2024-10-10T12:51:56.987000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000 CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 @@ -260402,8 +260404,8 @@ CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a8 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-45229,0,0,9c8c70fcda9c99c754f0fdd9cd19b64ab40d1023f96876f950167f9ed6ee6a43,2024-09-26T13:32:55.343000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 -CVE-2024-45230,0,0,aab5756a2529c0118a4a4c2eb6f22fe4b297d08a29a9b51a4b0b78115e637f22,2024-10-08T16:15:11.903000 -CVE-2024-45231,0,0,a4be396448b7bec21fad40e6758ec45d305867761240fcfecc83435700327f5b,2024-10-08T16:15:11.997000 +CVE-2024-45230,0,1,cfd6f88e132636b86ef28cd462995f01ff8f0fc51bc91ac5c0bbcf921d154682,2024-10-10T12:56:30.817000 +CVE-2024-45231,0,1,56c4f9c861c35c12319a30bfd9e6c0a940fc14196b8f8e29f7dc343c4e2c571f,2024-10-10T12:56:30.817000 CVE-2024-45232,0,0,d2eccd07147c0ab2f9f7e5560b5b1bac422f5ad79377d7ed727039bcaf25bbd4,2024-08-30T16:34:39.270000 CVE-2024-45233,0,0,5285670af66f459db0801c25719b83bc6fb78721d233b9411020bb578be83355,2024-08-30T16:33:56.720000 CVE-2024-45234,0,0,4b3eecbe75c64cf8d46066aeb4347cf8775538d743d35431815d363ef479920c,2024-08-27T15:45:44.560000 @@ -260433,13 +260435,13 @@ CVE-2024-45265,0,0,0bfdc3ea11a3a8b692c725170390e0ed5e5bfa861ba7586668c7c78868fd4 CVE-2024-45269,0,0,930c2dda66909b7393cc3daf8d8e0bcb8066c589d45124dd784354d0c2c32ffd,2024-09-04T11:49:36.950000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 CVE-2024-45270,0,0,c7af37af49333c30529c68858eecc171381f5cb95414149d25997e187a81c107,2024-09-04T11:51:30.887000 -CVE-2024-45277,0,0,c45912df8f0b1a79a0a4dfb41e92641903c06832d6fa2c966adf7af6ff2cc148,2024-10-08T10:15:04.770000 -CVE-2024-45278,0,0,3b6d3050cb3309d2eaba6bfdb764985313fa789671ace4bedc64a729f97e7653,2024-10-08T04:15:08.400000 +CVE-2024-45277,0,1,e59672aa770debbf38edd82e3007eefc83b77323731018a054ffb9ae4fa6db2c,2024-10-10T12:57:21.987000 +CVE-2024-45278,0,1,306a421217da69225ab7b4db93f5577ae95b1c3748beccda69beb75f2432361a,2024-10-10T12:57:21.987000 CVE-2024-45279,0,0,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 CVE-2024-45280,0,0,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000 CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000 -CVE-2024-45282,0,0,57e3ec0f9f0170d8254b12b4209aceb3aefee0fca5d88adcc8a682aef5867425,2024-10-08T04:15:08.633000 +CVE-2024-45282,0,1,b4d5f6cb555bc9da0672beb58aff1d2b216f5435ade907efa8bebd45466e7d96,2024-10-10T12:57:21.987000 CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000 CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000 CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000 @@ -260447,14 +260449,14 @@ CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e037 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 -CVE-2024-45290,0,0,1dbfa50d6afa688e584931f9f17f5b80cde32e7bf6d4a2b61aa4ac3d24449824,2024-10-07T21:15:17.397000 -CVE-2024-45291,0,0,e9fc6a3526c6edee81cfc26c01dff0e728fa587f6556e068826a74481dc51f94,2024-10-07T21:15:17.633000 -CVE-2024-45292,0,0,94aa69c3656217e3cd21bab555c81fe9bae5dc7c4f10784a739fccc128e04497,2024-10-07T20:15:05.857000 -CVE-2024-45293,0,0,413fd15cd292d6f5aefbf3866d59f48731ba2742196e23d36aa9a3be1deb35c8,2024-10-07T20:15:06.100000 +CVE-2024-45290,0,1,67c9f06afaf7c9000319aff979fdc964b30c95f99c630d23d3f12bf51b9f9421,2024-10-10T12:57:21.987000 +CVE-2024-45291,0,1,cd19076fb46af1755952b6946de43599535cf49f1e62ad582091cdc532a73c05,2024-10-10T12:57:21.987000 +CVE-2024-45292,0,1,e6e59897c6adcfbffa941572d5833988c8c05ede32b9058681f709f7731a274c,2024-10-10T12:57:21.987000 +CVE-2024-45293,0,1,430350ec91188531418760350e8f549756bfaa1ced9621751a07b456acea4484,2024-10-10T12:57:21.987000 CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ffc78,2024-09-06T17:15:16.977000 CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000 CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000 -CVE-2024-45297,0,0,8e2054409289c15660affaa688965429089f09676475ffc8342dbc2d596d3f59,2024-10-07T21:15:17.870000 +CVE-2024-45297,0,1,fc12042f3a3ea3ed1d8a0995be514c5b54ea860e58d9141b1b1b912a43efb3c1,2024-10-10T12:57:21.987000 CVE-2024-45298,0,0,3855d0d2f5eeba6af655c62306c41db8dfb0c660d64bc08f64547216bf276198,2024-09-20T12:30:17.483000 CVE-2024-45299,0,0,9c3c8396841ffa0041cd432be8da2038212f3a02e0878e8a646a9564573126e8,2024-09-30T12:48:22.930000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 @@ -260477,7 +260479,7 @@ CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000 CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 -CVE-2024-45330,0,0,6b509b82c72aeb53d4058cf040cfa8f4a1daa414ee8b4544b7dbe85ebddc83f7,2024-10-08T15:15:15.010000 +CVE-2024-45330,0,1,b998ec0a539acbe70a808afc95a74d4b1ef171865864a82ca08815575418f17f,2024-10-10T12:56:30.817000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 CVE-2024-45348,0,0,f8397568e636cad274a96a56fcdbc01af3feb6775d5986faa9442985588b0658,2024-09-26T13:32:55.343000 @@ -260491,7 +260493,7 @@ CVE-2024-45372,0,0,0a1d0605c681771c6729a3a683574f05f2ef151ec9ea8ead25b225094be60 CVE-2024-45373,0,0,f227d5262560442f4412f4d20983d9dae0586dd2cf3e8b0af32f7de8050a4907,2024-10-01T16:13:23.823000 CVE-2024-45374,0,0,244624a63c9f42692e6c43912de4c5a441e56ee9d5cc6c169c1c677cdda1781a,2024-10-07T19:27:17.363000 CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000 -CVE-2024-45382,0,0,92373bf9374d6c6fedc987cfed138d6b3daea8f5ef88bb7f270a6f10ac8b9bb0,2024-10-08T04:15:08.873000 +CVE-2024-45382,0,1,6f0e6c22e2361bdb3eeb90ff3c8ba010e94d7d59d2ef657152fdf477bafa1128,2024-10-10T12:57:21.987000 CVE-2024-45383,0,0,235a14ef262025a5c45e6e746df2b6dcf33186b99aef4d19b36fdcfc9676da5c,2024-09-18T20:24:29.247000 CVE-2024-45384,0,0,f2a07deadcaa2c60a6f6b273b6a0503965f9217a6b6f4dbdbe6211d5c2784b64,2024-10-02T13:57:30.280000 CVE-2024-45388,0,0,28676e6d1c1faf0a789ad4f826a6462261feef9ecff64b3588c21e46509a5b28,2024-09-19T15:18:32.007000 @@ -260550,21 +260552,21 @@ CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55 CVE-2024-45459,0,0,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 CVE-2024-45460,0,0,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000 -CVE-2024-45463,0,0,b14997d449296e3ed398a216c9426912006440d0f9f4e31a4f43d6c99b114476,2024-10-08T09:15:12.080000 -CVE-2024-45464,0,0,7259f44dad4ce5cac860aabc1d83bc5c6e96205277387d6a67190538c1464fe0,2024-10-08T09:15:12.370000 -CVE-2024-45465,0,0,dbeef31841d83ce51707353a4b6f0872824f7e29c8043778011ed6ba496a7cff,2024-10-08T09:15:12.640000 -CVE-2024-45466,0,0,6c8b2e0bcdf1d2386217ab64b855f51f733e5ad98db319a189aef00766206aa7,2024-10-08T09:15:12.903000 -CVE-2024-45467,0,0,d65e3a662794482ec0b77c0d06807c77eaa02478b39a7d61b66fce51c29add7b,2024-10-08T09:15:13.180000 -CVE-2024-45468,0,0,bf2b6b7f670672018c0f6567f697a4accb76014a11e2f39333e29ab1e78697eb,2024-10-08T09:15:13.443000 -CVE-2024-45469,0,0,e0ce23d1b6d06f90dc1f8ca0aa48ae9a283ad95132dea3f30f04989ad0da1214,2024-10-08T09:15:13.757000 +CVE-2024-45463,0,1,753a2389a036122d6afd81d46099783bd4cba38ebec2118ef305202bf8ea9ef0,2024-10-10T12:56:30.817000 +CVE-2024-45464,0,1,b399f2e174885175c54e656ea7877de1855a0a43afc304e50bb8a53cff6ac079,2024-10-10T12:56:30.817000 +CVE-2024-45465,0,1,1490cdde4e29e216e29bf5f0999d0b7831d1420e4546c3b7cb08da60ed215533,2024-10-10T12:56:30.817000 +CVE-2024-45466,0,1,f8ce8310b00501132b514b35045cf646b9c968bf8cf26af3117ba8cecf0045b7,2024-10-10T12:56:30.817000 +CVE-2024-45467,0,1,811e47e317463120d1ea2b0746e8d6d15ae036f53fb3562e99de1c093296a4e8,2024-10-10T12:56:30.817000 +CVE-2024-45468,0,1,34dffee908db119ed79de36ef0da8f86c086a031e0117e25e4c7820e1e63d6c1,2024-10-10T12:56:30.817000 +CVE-2024-45469,0,1,37d1a714141abedde88d425c477e8c35b9117cbef078d22fdceed1f04b83dc31,2024-10-10T12:56:30.817000 CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000 -CVE-2024-45470,0,0,01a9d102ecbff8f08ccb73c3b9a8930f23169a020e86011cb85ec54d992829cd,2024-10-08T09:15:13.973000 -CVE-2024-45471,0,0,4800f1364189684dbd9b18c0b398d617cf6777cfe119ac885036a9fc3d8fbc01,2024-10-08T09:15:14.293000 -CVE-2024-45472,0,0,f8047d33e93a4569f7f6a843af6cae5a0d7f4917354bc573fcef96b4e770859a,2024-10-08T09:15:14.557000 -CVE-2024-45473,0,0,ba3c30c121769807c1fc9863aebeac976220399633f968b9acf6e578fe02d277,2024-10-08T09:15:14.860000 -CVE-2024-45474,0,0,a5639db615285a7ce152d2ea92433fd211ded2724576794f170998abae7c5651,2024-10-08T09:15:15.090000 -CVE-2024-45475,0,0,895e9e97f34b4de04934f80d7ac3e3bf6ca6c7c1098c8c83ae37c14ef404d5e2,2024-10-08T09:15:15.457000 -CVE-2024-45476,0,0,6180ae47c143eeb96390b150ea217acb708589cb4a0a729802ffefd06fd1df4c,2024-10-08T09:15:15.830000 +CVE-2024-45470,0,1,e5910c5bcd21a264a2b2f8026637e65d1c0865d084fa77b784e5c6df0e63c667,2024-10-10T12:56:30.817000 +CVE-2024-45471,0,1,282ed1c2908fd3771eeca48c6e2725243a77a2dba33b8db2fac85d483a84d6c1,2024-10-10T12:56:30.817000 +CVE-2024-45472,0,1,047f66f4fc63b30dc3377e19fe7e1eaa41e050a1bff0df81ead54424dcaff80a,2024-10-10T12:56:30.817000 +CVE-2024-45473,0,1,bbe9e385a802ecae1d7a29aa8de7c550bd18fe558e57c958961dd9472995b64e,2024-10-10T12:56:30.817000 +CVE-2024-45474,0,1,a0ddaa197d0a6f18a3381fe25ddd46494e3063f494fcdf4958fe610a91345d1a,2024-10-10T12:56:30.817000 +CVE-2024-45475,0,1,2a8775948b19b259dc06b6ee74e0fffefe3d3a033d3847f123281a0e918745e4,2024-10-10T12:56:30.817000 +CVE-2024-45476,0,1,cea7e6bbd20316e6e5c72af2800f511d519622a660145fe2596e19e693c34849,2024-10-10T12:56:30.817000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000 @@ -260648,12 +260650,12 @@ CVE-2024-45698,0,0,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 -CVE-2024-45720,0,0,d41141572be612cef3d4dabfd94bebc08df7abc05793ddafb0664d5a1ebcc907,2024-10-09T13:15:11.337000 +CVE-2024-45720,0,1,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000 CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000 CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000 -CVE-2024-45746,0,0,456fa8e435589edaec5c98ccc07b1ad6d4a9741267c9f2e15a199bdc3721ab2d,2024-10-09T17:15:19.727000 +CVE-2024-45746,0,1,0480d752d9a964b227e21ac7d8461dc4b3c571e26c192948403806808a22adbc,2024-10-10T12:51:56.987000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 @@ -260729,16 +260731,16 @@ CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b CVE-2024-45870,0,0,f92d175154659b1ccfde1cb7d2443c500aaf2564bba36f9202b2dbe5a7292031,2024-10-04T13:50:43.727000 CVE-2024-45871,0,0,728c8e6e25f852a5194b96b816339c6dea2f278495c76d4d9d6d904a9357f28f,2024-10-04T13:50:43.727000 CVE-2024-45872,0,0,8e87b92fe22bbef6284d58a5e62493b4717b48305cf479255ef9a674e1d360d9,2024-10-04T13:50:43.727000 -CVE-2024-45873,0,0,e0117a2bb2b64d2b34ea5d363eeffff9da792173a59d3c86c557ce95c4ed4cea,2024-10-08T14:35:03.647000 -CVE-2024-45874,0,0,d4b19b90aa9b804fe8840615965a6df7afef07416e84bb9113973355b1bd8c7f,2024-10-08T14:35:04.530000 +CVE-2024-45873,0,1,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790169,2024-10-10T12:57:21.987000 +CVE-2024-45874,0,1,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 -CVE-2024-45880,0,0,b881799f37a96b816b0a8deb7b2a10a9843b0cd46f256e82ae05842fd90005ba,2024-10-08T16:35:06.407000 +CVE-2024-45880,0,1,cea99cab279728fefb1cf99178e03e8166f7f71fb61ca1ac6100aefdaeff9258,2024-10-10T12:56:30.817000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 -CVE-2024-45894,0,0,cc1b0068c433f6523cffdce49c1faf5c71294267a8da0701d851750ddd0859a0,2024-10-07T19:15:09.980000 +CVE-2024-45894,0,1,740550dc5a86649aa0fe59728cae8a43ea99cf049e7478afa6af433b67b6e7ff,2024-10-10T12:57:21.987000 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 -CVE-2024-45918,0,0,9660b8a20eea40312d170b39d7e7f27fe809c04fd14a81bbddd4a79a6189d7c7,2024-10-08T17:15:54.120000 -CVE-2024-45919,0,0,552b9322f64bef2610b09f931b72a22433f0955d738ffab82033309ab72bc0d0,2024-10-08T14:35:05.300000 +CVE-2024-45918,0,1,99f2f7bf30bde828e7941efeacb663e026510f82456a8cb61bb8950f79f21b73,2024-10-10T12:56:30.817000 +CVE-2024-45919,0,1,a4f6c3aaae803704b42db170e95e39ee4fc8065aa544a81df40b13b36d1e1bae,2024-10-10T12:57:21.987000 CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000 CVE-2024-45920,0,0,ea56e67e89fba77fab53ce0c18965669797ee29dd0e8472343575caa10980571,2024-10-04T13:51:25.567000 CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000 @@ -260782,7 +260784,7 @@ CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000 CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000 -CVE-2024-46076,0,0,1f5d8d6f9ee6a4000fdf7c0c00a2eb8294061c00b7db0bfa751046ad7c03ea76,2024-10-07T20:35:09.897000 +CVE-2024-46076,0,1,3fbd69f65c02bb3814cc49722b87c72edbd2a4b678c2a211eca1ecb2ed16e13e,2024-10-10T12:57:21.987000 CVE-2024-46077,0,0,ba0575ee5f9abbfdabe4c5b98f5d05b69bacbc50ec30115d4d1622727c5b1851,2024-10-07T19:37:26.967000 CVE-2024-46078,0,0,23100c624a483b7b5e096ff16b63021713bb42dc8fa296ef65edc5d72384abc1,2024-10-07T19:37:27.763000 CVE-2024-46079,0,0,21a745583a04ce8e53d78c79762844af650c3ee32ceb2470113c349418b02132,2024-10-04T13:51:25.567000 @@ -260811,7 +260813,7 @@ CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd7 CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 -CVE-2024-46237,0,0,05846efc047f2de6b417534734d2bcd13c80c1d7f999f8d8a5e5a6fc10c139f5,2024-10-09T14:15:07.393000 +CVE-2024-46237,0,1,feed7929a18595e09a4a774d6fced2d5d91ecf51e22b0c549b82335a7c6407dd,2024-10-10T12:51:56.987000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000 @@ -260829,15 +260831,15 @@ CVE-2024-46276,0,0,ba6c9d483af82dd2734a19e636bd58036683474d4934fc8937a305e4d99f4 CVE-2024-46278,0,0,7c449dca0e34520a80bfcea4a4b14e4c99ad837e71c1a2aabcd089bc8aa094e7,2024-10-07T20:35:10.653000 CVE-2024-46280,0,0,5a66b7ecdcd76d807c972a7ebea94a8133453c4877426c1300bbe2a7c6b81c87,2024-10-04T13:51:25.567000 CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000 -CVE-2024-46292,0,0,f668f35c9b3105a8ea4bc1a94ed9ac067bfb233c64e60de0b61e9f5339b6f0a3,2024-10-09T17:35:14.650000 +CVE-2024-46292,0,1,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a265,2024-10-10T12:51:56.987000 CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-46300,0,0,d1242a191b8ea8c2a0e9fbab7765f3d208830dd828d323e4edc4853d2473356e,2024-10-07T20:35:11.433000 -CVE-2024-46304,0,0,96095ed337116946e5acca0eb123cf46ee1e55f00555905587d08c10792565a6,2024-10-09T17:35:15.410000 -CVE-2024-46307,0,0,6ffb598605114a173ded49ed58aae98ef342192a18e7da411800d735c286818d,2024-10-09T17:15:19.813000 +CVE-2024-46304,0,1,f0490b4ae999ea5f9f22e3800e41e0f576da4ea8981d63c2971d9fd50318ffd3,2024-10-10T12:51:56.987000 +CVE-2024-46307,0,1,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000 -CVE-2024-46316,0,0,fc1d1016ec7a927026f3dbea4d1c8324b9dddc68fc3dfe0ee0a5e5cad9bea9b6,2024-10-09T19:35:08.177000 +CVE-2024-46316,0,1,54b9c1fe9acfe98423855e0709c0cdd187e74f76088027a762e1c19f14357911,2024-10-10T12:51:56.987000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 CVE-2024-46325,0,0,2552c217f6f2bafd1ae497da9a6104efc7773541d10c748bee2c01ded062ab22,2024-10-08T19:35:19.850000 CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000 @@ -260861,12 +260863,12 @@ CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406d CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000 CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000 CVE-2024-46382,0,0,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000 -CVE-2024-4639,0,1,f02b5c58ae5a71f4f7afea4e263ab89427639817f2fb26164569232dacb74959,2024-10-10T10:39:06.410000 +CVE-2024-4639,0,0,f02b5c58ae5a71f4f7afea4e263ab89427639817f2fb26164569232dacb74959,2024-10-10T10:39:06.410000 CVE-2024-46394,0,0,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000 CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000 CVE-2024-46409,0,0,aba2a412f8aa901356da8f12961372170796df83780b5d94df8dbeba2142d0ca,2024-10-07T19:37:28.597000 CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000 -CVE-2024-46410,0,0,e37b825c118d0badc3497db4099a453a8428aa68e6f305ea5a190a15df7a463d,2024-10-09T15:35:16.780000 +CVE-2024-46410,0,1,d78f8976a01ed1eadb4fc416a500696e86714986ba3cf9a8aa8723f114b32d0c,2024-10-10T12:56:30.817000 CVE-2024-46419,0,0,75fafdfe43d678734223982a9d05d92176b9e138ef313759af24f79de1b289e9,2024-09-17T14:35:29.797000 CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000 CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000 @@ -260897,7 +260899,7 @@ CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 -CVE-2024-46539,0,0,c62fe4a6bba70b84b37e66b1e30fb092cc13eaa18baa924b037aa794182a2534,2024-10-08T20:35:12.927000 +CVE-2024-46539,0,1,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000 CVE-2024-46544,0,0,7c690592f3c3aad53f638c9c118a2efde53f0542c00b3644e612a6801f3cf547,2024-09-26T13:32:55.343000 @@ -260933,7 +260935,7 @@ CVE-2024-46585,0,0,e7ad1ff8df7840bc670010c022032d2550a6e2180dabed1bd9cae33781225 CVE-2024-46586,0,0,833589886fc2c04bae2b847602220cea0488e52d6ba1bd422cdca799676b533c,2024-09-24T16:40:54.183000 CVE-2024-46588,0,0,7cc6766d0037114ad39936ae333d3937ff51c07ed14776be693cc7a6a6f4ccfb,2024-09-24T16:40:55.433000 CVE-2024-46589,0,0,a232d99c4f7a78659e1e7c4f240651f73f5dc2ccaa1ae924cea96528c6900ee9,2024-09-24T16:40:56.763000 -CVE-2024-46590,0,0,a6b25664b93f68894ffc206b74bc4224b8926e6d56d3d0e4f1fbd23ae41d0f56,2024-09-24T15:23:47.237000 +CVE-2024-46590,0,1,eb5f789b38d2c596ab28d3ee86667bec3f5e8cc3499038916b5fe2b7e7d0304a,2024-10-10T13:14:14.267000 CVE-2024-46591,0,0,9fee9cd4e22e56d7419ab5a0575e86c1f61adce0bbef224bb096f32b9d5e0cdb,2024-09-24T16:40:58.790000 CVE-2024-46592,0,0,7c172fcd5fb31284b05e2918a6ddae86232b5bf425db59a5b035a07950038cc1,2024-09-24T16:41:00.260000 CVE-2024-46593,0,0,e3da7c49a603ee2b0e2b1db240fcae5e0278eabbf2a77561a274557f4f79994d,2024-09-24T16:41:02.327000 @@ -261189,11 +261191,11 @@ CVE-2024-46867,0,0,8316d7997f273d3e067642701a8234592f3f2c26a3648af1f12dc5cbdd0c2 CVE-2024-46868,0,0,f9213706fab3b425fd6d7b9c70ceaf5cede666ff7057d8fa56ee82d754aa07ed,2024-10-01T17:09:12.247000 CVE-2024-46869,0,0,9ed81572871432f968131373b48d9116fc414e30c1ec7495d6906513924c285a,2024-10-04T13:51:25.567000 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 -CVE-2024-46870,0,0,90be454f5a67963fcb2bbabf3e103ed373cbdda5cfc2cdef366d8e6183adc0ee,2024-10-09T14:15:07.463000 -CVE-2024-46871,0,0,00f34a2352ea79ff1dec46c62c2c48b695bb8fa1ffe78878af3d5d1dc93c9cd4,2024-10-09T14:15:07.533000 +CVE-2024-46870,0,1,0637de163d838f36123cb06c095825d18ce9813cc33a2a70b7f0575bd9f2cdb5,2024-10-10T12:51:56.987000 +CVE-2024-46871,0,1,42cba4af988a3361fdd6b06fd16c88b02566969c525ca337e5a0e24979f190e2,2024-10-10T12:51:56.987000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 -CVE-2024-46886,0,0,8812d7e0ae6eb3236a15932b28dac95e2f77493c42909a76273589345ce9985c,2024-10-08T09:15:16.093000 -CVE-2024-46887,0,0,33dfbb906ebcdd01d3cef078ce0ea7a694b53a51dbcf757cb80c0210bf26b788,2024-10-08T09:15:16.447000 +CVE-2024-46886,0,1,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 +CVE-2024-46887,0,1,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000 CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000 @@ -261232,18 +261234,18 @@ CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000 CVE-2024-47001,0,0,2bb4bf673c202add583b3cb6aa8d87ad17a722980665125974c3d12c60f8fe21,2024-09-20T12:30:51.220000 CVE-2024-47003,0,0,c6454df65c14575f310d6ef1594423fd9063d7eb945a40e78647d22752216edb,2024-09-26T18:42:29.383000 -CVE-2024-47007,0,0,ebf24d9d5d7eb4e3627843cf34438622778e3d4cae2ddeb5b64896eb56804258,2024-10-08T17:15:54.210000 -CVE-2024-47008,0,0,e374d8539b2bbdc976e4bcf352e47a94f35b8b6ac8b0545bf758db2d64d641ab,2024-10-08T17:15:54.463000 -CVE-2024-47009,0,0,3fa8b403746a402f37cd1a74cd465554028e8b7557df4efcc337a63f89a833a6,2024-10-08T17:15:54.777000 +CVE-2024-47007,0,1,f1da32d778579c639d348d7932fe3a87cb4d13bb121a4b77fd3299fc99ade58c,2024-10-10T12:56:30.817000 +CVE-2024-47008,0,1,6304f3206a75f5edd1a501bc59033639c067f22c6a3e72e03fea16877401ff99,2024-10-10T12:56:30.817000 +CVE-2024-47009,0,1,9d79bd3ee18f19b3718cbcb7b1a90a41bdd9b6c0b697c58ccd23d81e91fa167c,2024-10-10T12:56:30.817000 CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 -CVE-2024-47010,0,0,f5ca0947571652c4cbc3d17408d6e1b5da6457940a27bf28da5217699db47ff5,2024-10-08T17:15:55.240000 -CVE-2024-47011,0,0,61f0ed66f562f21f262d488feed924a5c71897b5fe275ff8a68f6f036cc519f2,2024-10-08T17:15:55.533000 +CVE-2024-47010,0,1,cb4bd0dee6d0dcc3f138bf79d6d228aafb0e7a7a51f20b155114ee83f968ba1f,2024-10-10T12:56:30.817000 +CVE-2024-47011,0,1,d3a98b676003faf9763e18ead00360a4d335b1bed068aca9fc8f1abf2125edea,2024-10-10T12:56:30.817000 CVE-2024-4702,0,0,dd020b59844aa3c2b904a852a1e5f578b8784127317756ef97f595c083848ea0,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 CVE-2024-47044,0,0,404ff692afa802efbbfdf62c405c61d201fe4f2cebfdc0d42fd19c3d33c10bab,2024-09-26T19:35:23.043000 CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000 -CVE-2024-47046,0,0,03051d0cdca8055a851b3f6ea054f40b08eaddf7ffb9f809618fe899bc5fad1a,2024-10-08T09:15:16.757000 +CVE-2024-47046,0,1,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000 CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000 CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000 CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000 @@ -261268,7 +261270,7 @@ CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd80126 CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000 CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000 CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000 -CVE-2024-47079,0,0,73b91d6cae148824c38694704665631026bfe434383d986a00a376fd44906453,2024-10-07T20:15:06.400000 +CVE-2024-47079,0,1,d8ccb016ae09801690996b7754595e296560f1a65a763da55e97f54fd5c7b0dc,2024-10-10T12:57:21.987000 CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 CVE-2024-47082,0,0,1308a2a31af2cc56619224d4839a59b43bea81793244865a2d1ff9a5500281b8,2024-10-01T20:01:13.367000 CVE-2024-47083,0,0,9f0f8f8e78b5ed1a065825a55f34b3ef3e9db7af7ca41f6fc7c1cda9271f0e45,2024-10-03T15:11:29.913000 @@ -261278,7 +261280,7 @@ CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005 CVE-2024-47088,0,0,5bc4be26850bfb4e3e396fe3f1262b2500b1973a359f7076f289ec4b80ad5479,2024-09-26T19:12:58.083000 CVE-2024-47089,0,0,1aa118929a8fbaed8fa0c3349daa09104fd9f185af346e27a442cf4679169f72,2024-09-26T19:09:44.377000 CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99e9,2024-05-20T13:00:34.807000 -CVE-2024-47095,0,0,9a3cb4d5bbec813d8a0096b3e3cf7614d5bc8b1771956274db9a11b93c22c47e,2024-10-08T08:15:02.237000 +CVE-2024-47095,0,1,4c36448c484bc2fa6b9b6e1761e7a42a208bcb78aee06cf2f905f47ea2223412,2024-10-10T12:56:30.817000 CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000 CVE-2024-4711,0,0,d363465dc42b9acab3c0c0b87ab6c465a5fbabc481e6b69ff97f983a499169d2,2024-07-18T16:32:23.447000 CVE-2024-4712,0,0,3843a22d246b1dcd1f463ab35db131587d98590206b11784167b4cf4df51610c,2024-09-26T02:15:02.550000 @@ -261302,7 +261304,7 @@ CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000 CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000 CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000 -CVE-2024-47161,0,0,867b0a5fae8494b99f3973c72157b929d00578c60e0f73402201c424e3ddf7a9,2024-10-08T16:15:12.147000 +CVE-2024-47161,0,1,de6bba3702bf92ae2f58bf77de3cccf9472850d7f360e20d58c4fe881348c53d,2024-10-10T12:56:30.817000 CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000 CVE-2024-47169,0,0,3d7d577c82be13838843013d038c262ca65c719ce4179d733fb886eea7d8c747,2024-09-30T12:46:20.237000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 @@ -261322,10 +261324,10 @@ CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276d CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000 CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 -CVE-2024-47191,0,0,dbfbcb533fecc29cb43bc5db61b675517e2a4c9477b19f5b3a5157f1ec77e2a0,2024-10-09T21:35:12.200000 -CVE-2024-47194,0,0,316103eb084ec6217054a1fc514821ac3bc94a538674f22dc5653132cf19654c,2024-10-08T09:15:17.047000 -CVE-2024-47195,0,0,d795e93240c6c6fd0784c6074f3fd46e6fef6bc125756d49adbae58c747d0b95,2024-10-08T09:15:17.300000 -CVE-2024-47196,0,0,c92c48de2b3433b7a77f962c96686b397eabda030bf3e0714ea8f48a71e5e773,2024-10-08T09:15:17.563000 +CVE-2024-47191,0,1,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 +CVE-2024-47194,0,1,c5f98d4439348bb473c6d216269b0fd49d360b5225da715086cbe605901747f4,2024-10-10T12:56:30.817000 +CVE-2024-47195,0,1,ca3aa224767325d3d44360b555ce9c70dd8e3a39059440cf5e0115a0d842b4e7,2024-10-10T12:56:30.817000 +CVE-2024-47196,0,1,725bcc38d18674e40f1ec37ab58fdce33d9dca897569213d607aa8ff222974b1,2024-10-10T12:56:30.817000 CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000 @@ -261381,7 +261383,7 @@ CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf24 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000 CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000 -CVE-2024-47334,0,0,a461c0ff54441d9bc6ff24149dcc4c8001aeba025fc4345aeb144597045138d5,2024-10-09T11:15:13.157000 +CVE-2024-47334,0,1,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000 CVE-2024-47335,0,0,c59a2e5c398e4128a0999d908dfef31fc9740c09dff0fef290df7418059d3627,2024-10-07T17:47:48.410000 CVE-2024-47336,0,0,3b8a76de4b681d196e3baf6dcff1f288c7d757b771ce878db43b26bfb593064a,2024-10-07T17:47:48.410000 CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000 @@ -261442,23 +261444,23 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01 CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000 CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 -CVE-2024-47410,0,0,03c4646e3684ab4ffe24093ab7893889e6845badbdfd13a2aef051391d180b69,2024-10-09T10:15:04.540000 -CVE-2024-47411,0,0,0b009ea43721bf78dbe41692d21031f53829faf0731e26a2cf6a8049d24d992b,2024-10-09T10:15:04.793000 -CVE-2024-47412,0,0,ae08eb76fd03261eb1b35f2c905d400353a1266d7201451421507f3d79750795,2024-10-09T10:15:05.017000 -CVE-2024-47413,0,0,5065446cde4d05320ce1e145d50831bc32758c7feddba11467a1bf7007517702,2024-10-09T10:15:05.210000 -CVE-2024-47414,0,0,1df3eba42d0851203050b86fa1792526dcd9d131eaf80d7391f5232f50b07925,2024-10-09T10:15:05.417000 -CVE-2024-47415,0,0,66806e1b10c27fa75fb436771e6568cb5ffae54a04736652943cbbaf29b17d37,2024-10-09T10:15:05.627000 -CVE-2024-47416,0,0,1181afa98c2dace03b5a8e934f907d824f978de25a5aa3d171706d1f3b9948f4,2024-10-09T10:15:05.830000 -CVE-2024-47417,0,0,3d82a2124c0b4b2bd69e49cc3497e08dc48273a70597ef98e04a55edb8141df5,2024-10-09T10:15:06.060000 -CVE-2024-47418,0,0,081d746b22ffbdd8b799f4808bc76cae4e08fb9d14d385d0abe1cc0263249db6,2024-10-09T10:15:06.277000 -CVE-2024-47419,0,0,d0cdbf286fc8933dcd9ef23a66fbcd5cbbdaedc63b14e3dd36cddcd2ce86eaa5,2024-10-09T10:15:06.480000 +CVE-2024-47410,0,1,2b85065b3cc816e2e6894f4ae6f931ef6472a4a9b302dce9c53bfb573efb0017,2024-10-10T12:51:56.987000 +CVE-2024-47411,0,1,1d6e4d3969d08861473d57c5b16554b86f8a81f0484d410008e00804e5251930,2024-10-10T12:51:56.987000 +CVE-2024-47412,0,1,d79a02d1f4644268c1c69c3071d6d3ce53192d43f8632419aaa8746cc964ddf0,2024-10-10T12:51:56.987000 +CVE-2024-47413,0,1,bb02e382dd56e1508620412f0b964df099870bc38f898fec21d0ecb2225633fd,2024-10-10T12:51:56.987000 +CVE-2024-47414,0,1,b09b81cd598b82d2a9f212c2fdacf7e3739fbf5c004de4fd1c2e706bbd81b600,2024-10-10T12:51:56.987000 +CVE-2024-47415,0,1,327ea81d47c3c36536acf07bb1213820f9087ea124ee47313ac98538463d0fbd,2024-10-10T12:51:56.987000 +CVE-2024-47416,0,1,3616058ebfbbdf7abbde901ae18937d623c3700cc1dc8ef67948efac664217c7,2024-10-10T12:51:56.987000 +CVE-2024-47417,0,1,c089aa4778ac152ed305d4215c2a8f60791877b22e2d0ab62b0d5b692b7501a3,2024-10-10T12:51:56.987000 +CVE-2024-47418,0,1,24aafbb08a4cabfc7223ae23ef2abd05c864bf283f001c0cb5602a278270228c,2024-10-10T12:51:56.987000 +CVE-2024-47419,0,1,1fbe0741bc25a4665f681ec0731d85fac68fc75c4da90f369b7a56d7b0a2f152,2024-10-10T12:51:56.987000 CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 -CVE-2024-47420,0,0,afe9fbe4da6181dcdd330642f5b24efa9bc0934e4a84c41f7c49815b4e444f73,2024-10-09T10:15:06.660000 -CVE-2024-47421,0,0,6433718b22c64e45a15e357f80762897f0b97ca861801403a54dfd0a40c3b69b,2024-10-09T15:15:13.977000 -CVE-2024-47422,0,0,6c57ef28a033da5fb7d439dc1de859b5468b9b46b8d3e1c2003c1a7d038cbe94,2024-10-09T15:15:14.190000 -CVE-2024-47423,0,0,44d9e50eef595133c36acd765dc0a35bcdb6b783e5decebaf3b7ab2633a7eb9b,2024-10-09T15:15:14.393000 -CVE-2024-47424,0,0,ad14d22a114b20d100eebde077c3ae2b5c530cf19b46cde5bb4e2ff294d934e6,2024-10-09T15:15:14.600000 -CVE-2024-47425,0,0,b75ace915d3c0ef7facc3d9fae16195a7924da3b6b229bd755ff1d9daf6362b0,2024-10-09T15:15:14.800000 +CVE-2024-47420,0,1,7eaf2743e4253484617ee7cfdb1fd7edab0aa7aa062fd268430e44e44517e0bb,2024-10-10T12:51:56.987000 +CVE-2024-47421,0,1,102f8e332a29bbf3c4d5fb03ab9810391e67a628a1a147f11476861b16d4b605,2024-10-10T12:51:56.987000 +CVE-2024-47422,0,1,3952ccb617f0de75e022164e02292c15f6e11ca918ca4295a5ace8ee97dd98ab,2024-10-10T12:51:56.987000 +CVE-2024-47423,0,1,f17caf37955ec4ecc572648540e4cfbee61ac432f2927a7322d8623e06a593fd,2024-10-10T12:51:56.987000 +CVE-2024-47424,0,1,b1065552818ee3d76a7dfb093a54e32d2ed6acdb5049a855e0861b7712241711,2024-10-10T12:51:56.987000 +CVE-2024-47425,0,1,0727660882183f1790555d28a610d82bccf01dcb9973ef415c7fcc513e9991ef,2024-10-10T12:51:56.987000 CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 @@ -261484,29 +261486,29 @@ CVE-2024-47534,0,0,2c8638aa4776b453b12ca3480cb4741f7283b9b6a2cc41fc9eec726fcf451 CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 -CVE-2024-47553,0,0,b6d9db554fce6f044e8be48060d3d9a4ef7fb7e58b15d448b53b18a891358a75,2024-10-08T09:15:17.847000 +CVE-2024-47553,0,1,5b7f6e3db0c5d07beacc6c421807da839b923c13d5a21906db06fcdfdd277917,2024-10-10T12:56:30.817000 CVE-2024-47554,0,0,ed4aff6ea0e7ac69533e960f0592e4849edcc0303a79e4282ca0e96ec7b37a4c,2024-10-04T13:50:43.727000 -CVE-2024-47555,0,0,25008e1c4d455bb755601d59a5982dc6f6d6901f7829e23e2ded2370906eeda0,2024-10-07T18:15:04.787000 -CVE-2024-47556,0,0,ee1f258e3192821f118e0186a5cd74bbe18a76142b061f276b084fdd58b62009,2024-10-07T19:15:10.057000 -CVE-2024-47557,0,0,a2cea15b44da53aecb5f5fc4cba2355744afc39bfc641237f1c191954b371bac,2024-10-07T19:15:10.260000 -CVE-2024-47558,0,0,aa3e6bbbaddbb4145aa9ebaa153d42e43cd31a09e71f62b42ad623383386660b,2024-10-07T19:15:10.473000 -CVE-2024-47559,0,0,ef0edbe64ae39c4dd382182155779021d84952dcc76fb367b96637820eefc1e8,2024-10-07T19:15:10.677000 +CVE-2024-47555,0,1,fd6842fa8e3868552d886daf37839c899991f22ed0d1cbcbe8a1f0bc204570fe,2024-10-10T12:57:21.987000 +CVE-2024-47556,0,1,3777c77a7cfa512177d92b35ad1f5f20e21bfed49853fd196c2ebb401ca7bb5a,2024-10-10T12:57:21.987000 +CVE-2024-47557,0,1,c1226fc166f3f2b46508b58f20be486b7ca983d01baabccc08d932dec322637d,2024-10-10T12:57:21.987000 +CVE-2024-47558,0,1,72686dfa0c743bd969f5b1564a04d5f18c21af7ce456b0bbd518238d0ea74d96,2024-10-10T12:57:21.987000 +CVE-2024-47559,0,1,f2239e2603f21aec2e0f34acae5f93ddc2655aaa3a316e518b18ca1d3ff15e28,2024-10-10T12:57:21.987000 CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000 CVE-2024-47560,0,0,b8abd4241aae2bbcacde7e0c93543de13fb150a4040a68118a29f4e634e60873,2024-10-04T13:51:25.567000 CVE-2024-47561,0,0,1187d18aeddf57f3855631575eec8fc1684027bd65a7263241fe4e3f5d2788bc,2024-10-04T13:50:43.727000 -CVE-2024-47562,0,0,6c63165ac126d2f0908bb38552864bcb50ab49e7e1fa13c94e2f4cc0294e3418,2024-10-08T09:15:18.110000 -CVE-2024-47563,0,0,a781ef5f58a8206998c33ee523ce0e9efdb8bd6402c566a82015ace6f8a1e8f4,2024-10-08T09:15:18.403000 -CVE-2024-47565,0,0,0f8cdfa324157c1ceabf04deff2c7d0de9b900955c3adca4fa09db34510f7ecf,2024-10-08T09:15:18.730000 +CVE-2024-47562,0,1,7ec8f24091ef1db96111468cc50e2d1097289554971c4da35d5316ab458714a9,2024-10-10T12:56:30.817000 +CVE-2024-47563,0,1,bdbcbbb76e0636e15f56e3d6962c9c91dcec597d600bd2cdefb5a0a54f51e049,2024-10-10T12:56:30.817000 +CVE-2024-47565,0,1,5141e78676b5af5f42d5e451346796e73dcb18b535173c1b6643180d5ecdafc9,2024-10-10T12:56:30.817000 CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000 CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 -CVE-2024-47594,0,0,9088b863ac1b2ba81f77c1fd1e9cab4a76c580fe6dbe1b798bbd20afbd2ef21d,2024-10-08T04:15:09.087000 +CVE-2024-47594,0,1,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000 CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000 CVE-2024-47604,0,0,5221b4094b7a2bae2ba329933c1485a57bd9421ad0d112c374cd4d8ea378e664,2024-10-04T13:51:25.567000 CVE-2024-47608,0,0,6780a5cb01bdd639af89827da283834e6f19c572d8e127e2ec22fed13c61e1be,2024-10-07T18:51:05.650000 CVE-2024-47609,0,0,a40985fb9367be25d25953301cdaaaedb4fefdc923900e20947726055b93b1f1,2024-10-04T13:50:43.727000 CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000 -CVE-2024-47610,0,0,bda1a55cedcc1e9f99ea12aa9fb43eaafac6aff6e814f4a269042208b83404cc,2024-10-07T21:15:18.163000 +CVE-2024-47610,0,1,5cb609fd536f5e3034589850d202f3a9648a5dec4838a5f6cdd8f0939d72095e,2024-10-10T12:57:21.987000 CVE-2024-47611,0,0,0f71d2d3efa3e10b2943a85569330dc65bf1be2a06e9f4bba711a7ffd62c7ec4,2024-10-04T13:50:43.727000 CVE-2024-47612,0,0,d7d4b9bef3eb832e4635f62133a590b34d92b314497901a1cf4e0bce3640a5d9,2024-10-04T13:50:43.727000 CVE-2024-47614,0,0,5fe3af92e23232b8b36de76214704cdba0d6642b9d9b0303d25099dae284db0c,2024-10-04T13:50:43.727000 @@ -261546,24 +261548,24 @@ CVE-2024-47654,0,0,c063b2ef86115a996655e38ded9b00a5dbd609aea4e515001d1d61acc0e2d CVE-2024-47655,0,0,38268467637f3433ead865c4d53b98effdf5ad06b5c2f799470b492b88830a71,2024-10-04T13:50:43.727000 CVE-2024-47656,0,0,7a20585ec39bccdb1c36f63c7ddc6799bb573e47e81f7253c1057fbfa3e19cb8,2024-10-04T13:50:43.727000 CVE-2024-47657,0,0,fd6e9fac7740c0df68f13821033b31ca3440e5b3cb2262623db7046370d07e4d,2024-10-04T13:50:43.727000 -CVE-2024-47658,0,0,c7e7925d7623f0768c67ed5f8f020314ca2dcb81c77a7d845a862e4e1ad0d2a0,2024-10-09T14:15:07.603000 -CVE-2024-47659,0,0,381f593f3b1280f829daa31f9de252426c8f80a6ebf55c9d1f61889a94109836,2024-10-09T14:15:07.660000 +CVE-2024-47658,0,1,7d83d41550ee4896fe2089957fc970e4ffb8e6c30451f535c67b0cffeb69f047,2024-10-10T12:51:56.987000 +CVE-2024-47659,0,1,b7c74157edbbfcf6cc191fb9eb6c2e328a941e3c74433eed8f44bf21a8a12312,2024-10-10T12:51:56.987000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 -CVE-2024-47660,0,0,9f3e07e90c92a7cbb5ef6f85df2fd46e09c8a93ac4a27050d9830bd485257194,2024-10-09T14:15:07.730000 -CVE-2024-47661,0,0,589a3cd7eefd1bd48b7b590edb2e191028e38bad9c88da20865f4bee9c91e3ce,2024-10-09T15:15:15.020000 -CVE-2024-47662,0,0,56aab1a32d009dc785a60670614930b6b076a1f81d9fd782b6db102addff7ee1,2024-10-09T15:15:15.080000 -CVE-2024-47663,0,0,6374438e04ec6a4a2d038ae8bb709028960f71dc5c35b6eaa8d9498201c9b7c0,2024-10-09T15:15:15.150000 -CVE-2024-47664,0,0,b3371f5879bddc180255d808e4e8b3ebe53f62fdbec7442d8bfc651cac388fc7,2024-10-09T15:15:15.223000 -CVE-2024-47665,0,0,000f9f0d0ea35ebd91903a578c8aa6a224f3377cde860a2fbffaaacb0b3a24f4,2024-10-09T15:15:15.290000 -CVE-2024-47666,0,0,a1dccb6193925f591a887bc2ef23954e0e8d82af8c4a152a3fae5dad3ad4c229,2024-10-09T15:15:15.353000 -CVE-2024-47667,0,0,93fcd57a9e0833a47dd493be470518545169a4224f6cafb9c87bf70f91fb341d,2024-10-09T15:15:15.430000 -CVE-2024-47668,0,0,19b02ef43944d24db7bd00db3b9f4d4a0e446ab95bc898b4ee8d896d0bbea179,2024-10-09T15:15:15.513000 -CVE-2024-47669,0,0,a9a7f12e358926fcfce008f4f9e88f484b78dc546d08cf3c13bdf3549c6f3bf7,2024-10-09T15:15:15.590000 +CVE-2024-47660,0,1,accf7b6bc163d236ec224793cf44bab1e91316de88fa320bb4708923ce43fb79,2024-10-10T12:51:56.987000 +CVE-2024-47661,0,1,1ff30d8fde49751dd64f30df8e1b31f04a2c1291f7c9f3a7228e3fe40f63fd86,2024-10-10T12:51:56.987000 +CVE-2024-47662,0,1,9592ff301142fec228feda5f28aa5220c1e0fdd0719eedaab776fcd353ec2534,2024-10-10T12:51:56.987000 +CVE-2024-47663,0,1,38c847c85cb58f1bdc14b2643d340f12f21f2abeb9d0471d3efb10c92740f7a5,2024-10-10T12:51:56.987000 +CVE-2024-47664,0,1,1c2309f9d69bf8bb4cc3d6eb245972d5a50bf2b31179b3921c4437d37dadd6e5,2024-10-10T12:51:56.987000 +CVE-2024-47665,0,1,e8a6fa909a361ab6d7cc78d96e16742c4b3f809215ea5c8834927031949bb7a0,2024-10-10T12:51:56.987000 +CVE-2024-47666,0,1,a5a9f51120f3c9ddd4e33149f72ef447bc4c927097f5851c64b003de19643664,2024-10-10T12:51:56.987000 +CVE-2024-47667,0,1,38ec78121e570b51d421eb5ff7db3ba1ac7cdc0e7f949923732012891a8b3d78,2024-10-10T12:51:56.987000 +CVE-2024-47668,0,1,e001990644657b5cbf026f76d790a5eb95d1d99bc1acc218664334dad09f5059,2024-10-10T12:51:56.987000 +CVE-2024-47669,0,1,bbce7c909098acabb2c7686f50e22411725b6a0a91e8a4289aadb28a3eb88480,2024-10-10T12:51:56.987000 CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 -CVE-2024-47670,0,0,afd53e5823970a142ba903c187b1a50f79323fbb628d3d9ac580ae16795b4c1a,2024-10-09T15:15:15.673000 -CVE-2024-47671,0,0,3cc5a20734d8279f03afcc664859b0157c6bbaf02410c89dc2cba6c08808aa01,2024-10-09T15:15:15.753000 -CVE-2024-47672,0,0,41a31ad2a96d5ad8daffaee8965f85d768314e1c4f67e7960c1d777001786e00,2024-10-09T15:15:15.827000 -CVE-2024-47673,0,0,08e0694ce8ba590faa47f709e66b3e60d25c2585ef6f17beb774e4608af676cd,2024-10-09T15:15:15.900000 +CVE-2024-47670,0,1,3808be82d0985888c046ebc631823764190a0a3d7c8c54c521c26152a8636beb,2024-10-10T12:51:56.987000 +CVE-2024-47671,0,1,ef38c9ae9b57481091c31f7825ba62e74b63579bd2a15d0a85cfd70b484a4c68,2024-10-10T12:51:56.987000 +CVE-2024-47672,0,1,0061ac38e47ed590bc7042c04a07c964c3e5abf1b018d9949821a17c0890d14a,2024-10-10T12:51:56.987000 +CVE-2024-47673,0,1,674bb9b511fb55eb70aa196f390d2016971968e37ca3be330ea31912ee22077f,2024-10-10T12:51:56.987000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 CVE-2024-4769,0,0,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 CVE-2024-4770,0,0,9501f8bb52643b4bcadd7b11da17e463cda395ec382733177c6b60e7ef1c0b7b,2024-08-01T13:59:34.293000 @@ -261574,18 +261576,18 @@ CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f7 CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000 CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000 -CVE-2024-47763,0,0,a7859fe8b4cc9e84031b427316d44dcabdba7a84d6c20744e00f828191839a52,2024-10-09T18:15:08.863000 +CVE-2024-47763,0,1,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000 CVE-2024-47764,0,0,b7aba4870e1203663c4fa6abc120a30e41523fde8e72997d929896b167fbbd57,2024-10-07T17:48:28.117000 CVE-2024-47765,0,0,a65b089ee1fbe8158413dce3d4bb6a7a005d6b3f8045c2a8b0cf8a91ea4da578,2024-10-07T17:48:28.117000 CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000 CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000 CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000 -CVE-2024-47772,0,0,c524cc8670468be6db49342e4462445e1b67bd16fabcb7573b27ddff0b5f0187,2024-10-07T21:15:18.383000 -CVE-2024-47773,0,0,4e0169f4e2e7cfab9d15013b41d15a2b7c866f541d9c1f37cf766a0fd841a6b9,2024-10-08T18:15:30.720000 +CVE-2024-47772,0,1,cc6b812a8af17a97a7a1e7281e186f43a2e5e0166a885f7d8c94f126c3b51715,2024-10-10T12:57:21.987000 +CVE-2024-47773,0,1,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d58f,2024-10-10T12:56:30.817000 CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 -CVE-2024-47780,0,0,c73a481c618214df3811cd387c1925b003b7979bb96840908810b2a165b771a1,2024-10-08T18:15:30.950000 -CVE-2024-47781,0,0,e0b37dfb4137bb4dc054c4e29627d4ecf56bdee588a5fd5514f9fa60b364cc8f,2024-10-07T22:15:03.133000 -CVE-2024-47782,0,0,2133000ae3f2d0efd3ad59d8aeb51eefa4ef863074635b06e8d83bb10179e375,2024-10-07T22:15:03.257000 +CVE-2024-47780,0,1,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 +CVE-2024-47781,0,1,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000 +CVE-2024-47782,0,1,378aebd3accf9c3d67ee33eb38516895e49edcc53cea98d4b8c2ea1a1799fb1e,2024-10-10T12:57:21.987000 CVE-2024-47789,0,0,0349696d36cadc48041796d3cde8ea269da483b10c177364bf60fbf0c4fb2e71,2024-10-04T13:50:43.727000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 CVE-2024-47790,0,0,1f668faa23a91dd91f71cf06e76f1527f76bb8429eca10f034e0a28bf1b53cf7,2024-10-04T13:50:43.727000 @@ -261596,20 +261598,20 @@ CVE-2024-47805,0,0,22ba52af9df34d0a80a1165aace8dfa18730f593f709643a29e4cd8d37bff CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a85c,2024-10-04T13:50:43.727000 CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000 CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 -CVE-2024-47812,0,0,910d430e3bf546e478289e1ece79a10da7243757529911008da4440fdfc08ee7,2024-10-09T19:15:13.803000 -CVE-2024-47813,0,0,875b8688a32dd1ea8859a0b6f12ce74466b84ebdb5dcd8c19c5b3cbaa623a5c9,2024-10-09T18:15:09.120000 -CVE-2024-47814,0,0,f8dd235a57639bef21bfc7a4761f0e828d8ef79df395aec1e49ec750d206ccbf,2024-10-07T22:15:03.657000 -CVE-2024-47815,0,0,bed8fb174f3f8bbd9f621d29e087768776dbc6b8b59ee7d6cf498edcd951ae10,2024-10-09T19:15:14.023000 -CVE-2024-47816,0,0,ef78c08a2f68923bdd6a805d88ab8a7f3388cb9efe288981b3cdeceaed0b191a,2024-10-09T19:15:14.227000 -CVE-2024-47817,0,0,a8978e2cff17b63ee249f998983f4eff08d98ca0b11639ba8434d107030ba806,2024-10-08T15:35:24.303000 -CVE-2024-47818,0,0,598d35845d5c9531ef399cca4570ef2326935f542cd6df2c80239a96fe7c21e2,2024-10-07T22:15:04.037000 +CVE-2024-47812,0,1,397cf931cad747f9187f7df48c5f8098bd69901273af0ea8d48fb67c933d46b4,2024-10-10T12:51:56.987000 +CVE-2024-47813,0,1,48a41eb36e488d083cd1f60a29be681cee836eceff483fa252745c12924671c8,2024-10-10T12:51:56.987000 +CVE-2024-47814,0,1,c7cab541ca8df7a147747a1437099f1208747a6b637b4c4929d52961dcc18d9b,2024-10-10T12:57:21.987000 +CVE-2024-47815,0,1,81255b48d5277378beff1383e77e64aa261245477d97f4d0b1ea73e945f9424f,2024-10-10T12:51:56.987000 +CVE-2024-47816,0,1,1da39b970be1186c496f95f178fe995ed489c1ba7a2eb7cbd4306440a49cdeb6,2024-10-10T12:51:56.987000 +CVE-2024-47817,0,1,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000 +CVE-2024-47818,0,1,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 -CVE-2024-47822,0,0,1bb3c8fcad68cf5925eb2c4b3afc1ce650c6df3f807783d5dffddd106c4ce49b,2024-10-08T18:15:31.170000 -CVE-2024-47823,0,0,8320742a660378f6a01ad741722ead2a09f9e6be07616ac2e9eda6ddd367cc9a,2024-10-10T00:15:02.553000 -CVE-2024-47828,0,0,2ab43236050d709c1d1b37224db30aa1be8862c0e60a6ee5d60152971174cbfd,2024-10-09T19:15:14.423000 +CVE-2024-47822,0,1,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000 +CVE-2024-47823,0,1,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 +CVE-2024-47828,0,1,2a3f37a9071256a649791f70c6456109926a20b394ceabbba1acf5e3bcc75ff1,2024-10-10T12:51:56.987000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 -CVE-2024-47832,0,0,b7e56eeac131fe4fefd7e3116d02da42a2ff171d36975cc192ba07793c3dca42,2024-10-09T19:15:14.647000 -CVE-2024-47833,0,0,6c135a61ec5727697eb8d8b1bd7202222927fbf969e07ce50f7319778b038aaf,2024-10-09T19:15:14.793000 +CVE-2024-47832,0,1,6eaf4cba1d0f1ac09d634a837b942c4a4d31fbca5ff514618ce9cde402d23db0,2024-10-10T12:51:56.987000 +CVE-2024-47833,0,1,780bba6686a13dc95d3fa2e5d0a56f764e3e264192219eb33ec68032f867f21c,2024-10-10T12:51:56.987000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 CVE-2024-47840,0,0,b5ea555ef408ac20cbe46dfbf3d0edb1bb8eb4b89ca7622107e5cdb64a9762a5,2024-10-07T17:48:28.117000 CVE-2024-47841,0,0,c79c7a110b47e87995e5e866c83fd654f88967df290dad7b6bd517f415ec30b5,2024-10-07T17:48:28.117000 @@ -261634,22 +261636,22 @@ CVE-2024-47913,0,0,7dc94fcd4cdeeb6c0d9aba640aeb2f6806a34afc409a57e9cc79ea392fd74 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 -CVE-2024-47948,0,0,0c05ddd3543b0397550c17cf270ca66a44ee9d6571288cc34a60b0bbd6969554,2024-10-08T16:15:12.453000 -CVE-2024-47949,0,0,af6d353ede769578fd8823e05d2cacadbb08a06f092ba124906d5b8dff382e74,2024-10-08T16:15:12.673000 +CVE-2024-47948,0,1,22804f66c6f9ab275c179ec5f8e105f0642d633dda44683f36c7b86f6a1376eb,2024-10-10T12:56:30.817000 +CVE-2024-47949,0,1,e43462308f085b6b759cad854e3d1c28aaa801407e9db778208cd2503d64202b,2024-10-10T12:56:30.817000 CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000 -CVE-2024-47950,0,0,b25c6a91746a27976b0bed60386e445383e9361eb52bcf89751eaccce780302f,2024-10-08T16:15:12.963000 -CVE-2024-47951,0,0,c8abc81d85003b041925b96886e82fff95d64502ee85ad2aadfc035052064689,2024-10-08T16:15:13.190000 +CVE-2024-47950,0,1,051b7d62708c153f7aefabbe7d8cbca3b760e43438404853bb4e254aa1c32f1d,2024-10-10T12:56:30.817000 +CVE-2024-47951,0,1,dd0e5081c613ef6331152cf5f5a93ee02293e5a5a930e15d75080ba702abfea6,2024-10-10T12:56:30.817000 CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000 -CVE-2024-47967,0,0,553e2aa1f3371379fa110abe6002e03b2897c2b09916e75eedf48c33d0a0dd8c,2024-10-07T22:15:04.300000 -CVE-2024-47968,0,0,955d887e942404b2c819d11f2a644f3211758fa19b1f6da99f75535e28409af9,2024-10-07T22:15:04.480000 -CVE-2024-47969,0,0,e77002c876e0526ccfef3aac0a0468f40c157b43369a9dbc8de4f101860dac13,2024-10-07T22:15:04.667000 +CVE-2024-47967,0,1,a1330cc114fe2e48a56c50da9857d953b86ef030556f660ace8207b5a6ff6caf,2024-10-10T12:57:21.987000 +CVE-2024-47968,0,1,4fff8938b14b264b8114ea788e4702165e516bca6198626b64c35403b2d1f728,2024-10-10T12:57:21.987000 +CVE-2024-47969,0,1,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000 CVE-2024-4797,0,0,0e4696a184ba6dbc49929e4ce9c47a26c4e841b1ccb4a5975e3c36e38faab420,2024-05-17T02:40:37.683000 -CVE-2024-47971,0,0,cf702f8de3879a7ffd4857bc6d2143cf31664f98b7408bbdcc92d4eabddb9aaf,2024-10-07T20:15:06.607000 -CVE-2024-47972,0,0,ce12022d7d1dcc6059e5d4055d050e690513e190fec07f290beedc7a394914d3,2024-10-07T20:15:06.797000 -CVE-2024-47973,0,0,a06f32124390c3daca0b51eb6ca8a86633766c8d37fbe732b85d15048542e204,2024-10-07T21:15:18.727000 -CVE-2024-47974,0,0,3f2361190bdf91f114cbcabd88ec20af931fc4619e6d371efa16b61a42c5fcca,2024-10-07T21:15:18.927000 -CVE-2024-47975,0,0,4e61e8751eac7155d052a56a58a2e9550dc38c1995565b58c97aab18fc90547b,2024-10-07T19:15:10.877000 -CVE-2024-47976,0,0,cb1b7a2b82df4567d71dcef06b7c8c657bc1a518d39ba8cc139b86d1926a1423,2024-10-07T20:15:06.977000 +CVE-2024-47971,0,1,534d5d54d79d2918bba754e46b72e551e8a383f4547c31054409d42c679203f5,2024-10-10T12:57:21.987000 +CVE-2024-47972,0,1,f1d48d54249f69076bba9ceaeedc06de8049ec1414a8288f2e98e1dee9627b00,2024-10-10T12:57:21.987000 +CVE-2024-47973,0,1,3a0aa017e97ae06d1cf3d1bc086b0dc9ef048219777341e2d17989996ce6923a,2024-10-10T12:57:21.987000 +CVE-2024-47974,0,1,73b31df01d51a43c652bca2b8914e83bdb8e1c1870716321de5e5fac95abd7a7,2024-10-10T12:57:21.987000 +CVE-2024-47975,0,1,9ad4ace9a8d8e08788b5e254d7be9129666651b52b755d634ac88116293043c7,2024-10-10T12:57:21.987000 +CVE-2024-47976,0,1,f9e6b9471c3a11e91c53ef084005aa6ebe42f6aee5aa56fec962d9e8dbc63529,2024-10-10T12:57:21.987000 CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e0106e,2024-06-04T19:20:49.813000 CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20b3,2024-06-04T19:20:49.917000 CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000 @@ -261727,18 +261729,18 @@ CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e088495 CVE-2024-4888,0,0,fec1e03b9425eafa3abf9c794b417e5dd9f4ec5c0ccb57ecd621528833d262c0,2024-06-07T14:56:05.647000 CVE-2024-4889,0,0,e1db15d22cd014db7823bf12ffdd16045472c9266c0e44b11059f83de00383eb,2024-06-07T14:56:05.647000 CVE-2024-4890,0,0,53ca3d470669469343718a89aecd8ceb01b5d306faed13dac96d630215f97f2a,2024-06-07T14:56:05.647000 -CVE-2024-48902,1,1,c9c2f9bfe54ba56a23dbe681ae9aa1b390e0a0a9bf635821c08583074efb275b,2024-10-10T11:15:13.540000 +CVE-2024-48902,0,1,a199409fe89d504d5aac3fbfd93ec8ade919d8618d3b520517113fdc75e03121,2024-10-10T12:51:56.987000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 -CVE-2024-48933,0,0,7de0f4bfffca5deb1c74453cbef6b33cc0a48f7c75ec32bb2f0f5296d55482aa,2024-10-09T23:15:11.017000 +CVE-2024-48933,0,1,3003e039111af51a407eaa338f91e1930c9de8b7e22ff78450b42fc9a05e6cc7,2024-10-10T12:51:56.987000 CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000 -CVE-2024-48941,0,0,a478a010fad052d976d7fee743b5553216cec10ffc9e36f57c76bed30d76a955,2024-10-10T00:15:02.673000 -CVE-2024-48942,0,0,afe00b24b361f1a17ca816956fa863245c8abdb1171f93cd4cfff531d632fd84,2024-10-10T00:15:02.737000 -CVE-2024-48949,0,0,a1844289d41db918a877296bf4ef92d8aa4561ffb6581c981df85622e133061c,2024-10-10T01:15:11.127000 +CVE-2024-48941,0,1,80341bc59a5c1548e955560fb91fc5d95330f9c3b23059767833d93a51bbb213,2024-10-10T12:51:56.987000 +CVE-2024-48942,0,1,9d039548210cac47c3a85e5d8f6dbc444b18273e0fb45ad4348a0d24112b86eb,2024-10-10T12:51:56.987000 +CVE-2024-48949,0,1,7d55724ab06b8de7edf1f4b8a08def014420bedd09e2e171d24560c893af6404,2024-10-10T12:51:56.987000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 -CVE-2024-48957,0,0,73839f04a6a96165341d199482994aebc143de5e587bd601cbca83d8cc83ad7e,2024-10-10T02:15:02.990000 -CVE-2024-48958,0,0,22f78a57ccd420052c6be988d1a59561d6af96249b350c2e358e9eab60208ea4,2024-10-10T02:15:03.057000 +CVE-2024-48957,0,1,a00420b77e8558226b43cae88ff0c90c28a0044cfeb64ed8ab034cbc5161651f,2024-10-10T12:51:56.987000 +CVE-2024-48958,0,1,a8ea5041853fb7fcb2158a179eb96f8aef37701d1e6738c4d3b90b08bd95300f,2024-10-10T12:51:56.987000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 @@ -262675,7 +262677,7 @@ CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71 CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb82736a,2024-06-24T20:00:37.057000 CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000 CVE-2024-5967,0,0,2abd808298732cc4b1964c14eae7561fd71fe2ea4a15e03466adc54a1382b0dd,2024-09-09T19:15:13.920000 -CVE-2024-5968,0,0,a043adbd10e52333c94721bc3ca50b6dc16309dd080600c0494d1504f4baca57,2024-10-09T06:15:13.563000 +CVE-2024-5968,0,1,6654819d3a49d0e47cd9a1c05f2412311e7f38ecf31d39dd525859e14afb66d7,2024-10-10T12:51:56.987000 CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 CVE-2024-5971,0,0,b240fc2a76fc52f8e8a86abd78dd833d601e288ed9a23c68d806cff359ade316,2024-09-19T20:15:07.113000 @@ -262840,6 +262842,7 @@ CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d7 CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000 CVE-2024-6153,0,0,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000 CVE-2024-6154,0,0,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000 +CVE-2024-6157,1,1,daf1a8f52914a5c4db57e6e1e23221c4507cee42bfb6ada152da69163c634a36,2024-10-10T13:15:14.370000 CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000 CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000 CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 @@ -263160,6 +263163,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000 +CVE-2024-6530,1,1,e1744352671cbabdd1f5bc963e1180680638c909eaa8d9454144750cdb4b5589,2024-10-10T12:51:56.987000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6532,0,0,34d446197f804dcbdd8feccdfe721cd1c46fe7ee3b5e0da65e1be9d287c7b644,2024-08-14T13:00:37.107000 CVE-2024-6533,0,0,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 @@ -263339,7 +263343,7 @@ CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744 CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000 CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000 CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000 -CVE-2024-6747,0,0,5f5747258ea41f5ed1130e6dd9655be7ff3676d5f619a4f9ba4d2c75476c6c5a,2024-10-10T08:15:03.630000 +CVE-2024-6747,0,1,bf0d76edeeb22be154253a6e2097a6489109e71197029ea995eb3a393f5f735d,2024-10-10T12:51:56.987000 CVE-2024-6748,0,0,3165cdb659bfb317f070ab6b5ff0ffe08f8676c2d4210e086188fb527771a712,2024-07-30T13:33:30.653000 CVE-2024-6750,0,0,259befaacfd3ee023627d5e60a86696c98cc4bb58920e9f36a409d03ab7792d0,2024-09-03T21:40:22.460000 CVE-2024-6751,0,0,65709f0db2fc5964de358cedefb78e4090d836ca670fed7f74fbf34d4a07dbbd,2024-09-03T21:39:06.433000 @@ -263562,12 +263566,12 @@ CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6a CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000 CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca45054,2024-08-31T03:02:41.763000 -CVE-2024-7037,0,0,b73ec5870d03d8f66bb84fbbe932020abb08e6efb8f99dbf4e1f1ab7eaa2154f,2024-10-09T20:15:09.477000 -CVE-2024-7038,0,0,182f910a9ab2ef469a30f74b37ebb0cc91121622585133274525ddf4bf610a6c,2024-10-09T19:15:14.930000 -CVE-2024-7041,0,0,688ed132bbfb1befffc795f35ed82a14fecd87e0cf303674c9fedf4eb1b11763,2024-10-09T20:15:09.683000 +CVE-2024-7037,0,1,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 +CVE-2024-7038,0,1,f6026a1dbe3c125b255efbfe964a7d25a93c1643c9cf71b323ac917211c9f7e5,2024-10-10T12:51:56.987000 +CVE-2024-7041,0,1,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 -CVE-2024-7048,0,0,12f3403896e9a4059ff750f1971d744793a0e26cafaae7be39b178ed44bc9bc4,2024-10-10T02:15:03.113000 -CVE-2024-7049,0,0,f0ad5dbc7cefb074f37840f2b9434ba86926741ebb65b581c0afb8321da2fdd4,2024-10-10T08:15:03.910000 +CVE-2024-7048,0,1,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 +CVE-2024-7049,0,1,c8e98d99addb554a22cb9aed9502ec347f4e868295d0fa4515a9870e411b71e3,2024-10-10T12:51:56.987000 CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000 CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 @@ -263689,7 +263693,7 @@ CVE-2024-7202,0,0,cd873862dd9c581add7def3fb09e4d862139cb04eed28a9bf2f7047259aa2b CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000 CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 -CVE-2024-7206,0,0,1ab3cec5f08eddbac209a8cfbc80aba5607c4278c7ff611141bb49459659b662,2024-10-08T07:15:06.170000 +CVE-2024-7206,0,1,02a602b43f4540e21329531f0a0b4a806bf816792b4fb6675c407686a1ac2ab9,2024-10-10T12:56:30.817000 CVE-2024-7207,0,0,685939e6da39eea18941ae363d793c2135cdd34b1de02f3365cc55972f116f83,2024-09-30T19:15:04.540000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 @@ -263751,9 +263755,9 @@ CVE-2024-7288,0,0,ce128fba82f710d2fd0c96fce3ed58ae6ba7550cb19d04b8a2d7b8e427ff3a CVE-2024-7289,0,0,6b18fe26b5b26ad6475bd507b3c2a7b6582d96d6d346bf45be6ab6646e91fd65,2024-08-13T14:53:09.637000 CVE-2024-7290,0,0,b7cc572b30062b1b5d10bc08d69cddffa31fb5f05e0fc8c35fce33ff6506b95c,2024-08-13T14:53:34.777000 CVE-2024-7291,0,0,298cd3a818c66e9bf797d2d090f42649293656283b8daab213f19385b28931e8,2024-08-05T12:41:45.957000 -CVE-2024-7292,0,0,10e293cdee1e14c92b7e83a936b36346b8d213d5cae5479bf4063a49d757bc18,2024-10-09T15:15:15.970000 -CVE-2024-7293,0,0,830a171bb1269d079493f3fb1fe19f9bdadcafcb676ceb9ee2a6b1f12bb25407,2024-10-09T15:15:16.200000 -CVE-2024-7294,0,0,57635030dd3bfcb9bd930056db2f8844c562f10b822862ca673dbdcb1b7550dd,2024-10-09T15:15:16.463000 +CVE-2024-7292,0,1,b148da97cbba8a84fc0d5ced7d6b08eb405da0e75dee38018f8c043cf7b8c927,2024-10-10T12:51:56.987000 +CVE-2024-7293,0,1,944b1f749d56501d72cd643e2d34557078e9418e7c3ceb748d852f5f6f6d4f61,2024-10-10T12:51:56.987000 +CVE-2024-7294,0,1,a46dd292c3e38d012903ae47314a34f716ddcf04ce15ef4e6db6d710a56acae5,2024-10-10T12:51:56.987000 CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000 CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,ec5bc420e71b7c17438e33b04329f442535c8be80d5b4025cfe5a0c36aea8bb7,2024-08-19T14:15:23.360000 @@ -264009,7 +264013,7 @@ CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a CVE-2024-7609,0,0,dd287019708dc32756806d00da78ef364565c2b83873d7c121b6afe97b890f01,2024-09-23T09:15:03.473000 CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000 CVE-2024-7611,0,0,10540ac694e0cb733f0dd15b5e1be30ed97e53e896e1f9f9af3198a202850b56,2024-09-26T16:42:58.157000 -CVE-2024-7612,0,0,28a3c98f1e7809412d44cc84f3c395f7ba938aa6362f4d155133cefdf6a48ce7,2024-10-08T17:15:55.870000 +CVE-2024-7612,0,1,c5b5f09398159d700c955acd897a68daeca0e764d276f233bbe1150f499a0fa9,2024-10-10T12:56:30.817000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 @@ -264193,7 +264197,7 @@ CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277 CVE-2024-7836,0,0,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 -CVE-2024-7840,0,0,3d047537f440a51481e8ca0bc0fb1a7a2f8b60d7801b5e19f56ef246f0737240,2024-10-09T15:15:16.687000 +CVE-2024-7840,0,1,c86fe81e1e1d2c81ec78b5ec72a55ddbefcad495fec4b3dfe426afccd276f8dd,2024-10-10T12:51:56.987000 CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000 CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f95417689,2024-08-21T14:13:38.923000 CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000 @@ -264294,7 +264298,7 @@ CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 CVE-2024-7960,0,0,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000 CVE-2024-7961,0,0,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000 -CVE-2024-7963,0,0,286f726c648a627f7d68c90d704ebb470a6961491de7e9aa929f36bfd75962b5,2024-10-09T02:15:33.870000 +CVE-2024-7963,0,1,5d9d56257af0c8a46d80addfe5060ee179dc9f0bcbd8087ed3e38a0505c107e7,2024-10-10T12:51:56.987000 CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000 CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000 CVE-2024-7966,0,0,f366846d49db9477cb2ea061c491dcdaebf29f4e555fa7612b32a771fd61b7a0,2024-08-27T13:35:02.630000 @@ -264325,8 +264329,8 @@ CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db CVE-2024-8007,0,0,31efab1ff2bdd67996604f02ecd2084f262495a161d3f96e0300d65972c02a8d,2024-09-23T17:15:13.813000 CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000 CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000 -CVE-2024-8014,0,0,8010f34247a3098f4015e0db98ec51e47b6deee7f9f8eb01a840ccf2728becb9,2024-10-09T15:15:16.883000 -CVE-2024-8015,0,0,c8ddc6ab2a275b576a5d1df1610c5a2969775aa218269aeac45710287223b3a5,2024-10-09T15:15:17.097000 +CVE-2024-8014,0,1,74be6c7824304a6024c0b47979e2e5fc7a8bb440482aacb2b19872e7008bbba5,2024-10-10T12:51:56.987000 +CVE-2024-8015,0,1,7dbf1862e85785fef522eea1884e61d0cc1b4ec6404adebc13aa6b34dfc9a76f,2024-10-10T12:51:56.987000 CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 @@ -264344,7 +264348,7 @@ CVE-2024-8044,0,0,61e1bceca8faf5a6cfa821e4bfd7d9ccef26e7d775d42e669a954225ae8e5d CVE-2024-8045,0,0,4f33bec2129e516f0590350db62def0ffeb2e64cb03de1e46d8b3d52953002f0,2024-09-25T19:22:03.157000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 CVE-2024-8047,0,0,b09ff33da28d13c746e9dd8622cb16da9ea9a8911cc13c3fef8877b81efca550,2024-09-27T21:25:08.523000 -CVE-2024-8048,0,0,00054d1c6f6a9e6dd763dae957e150d3317721cb4154b6397664d36e193bf881,2024-10-09T15:15:17.317000 +CVE-2024-8048,0,1,825f46bc22da882e26bd63bb185bd4f629ace0fd8b5171f18b39ad779ee088d4,2024-10-10T12:51:56.987000 CVE-2024-8051,0,0,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000 CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000 CVE-2024-8054,0,0,f7372d07d80e2782b99a1ec78381d10ed3eddb2361d69efd0f5544951feb686d,2024-09-27T21:29:57.607000 @@ -264458,7 +264462,7 @@ CVE-2024-8211,0,0,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab CVE-2024-8212,0,0,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000 CVE-2024-8213,0,0,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000 CVE-2024-8214,0,0,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000 -CVE-2024-8215,0,0,fdd16ffe4344de21250db079917352fcb27228eef0176050e7e0917746ac7163,2024-10-08T16:15:13.380000 +CVE-2024-8215,0,1,59ce378db9c6c9d718534b4174572b40b1c57eca347e2dcb82504870264c7d30,2024-10-10T12:56:30.817000 CVE-2024-8216,0,0,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000 CVE-2024-8217,0,0,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000 CVE-2024-8218,0,0,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000 @@ -264491,7 +264495,7 @@ CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d CVE-2024-8258,0,0,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000 CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000 CVE-2024-8263,0,0,624497db0422cb1a205809ab52a2afed4f8032000058c309c8e30c3994bdbb10,2024-09-30T15:57:26.213000 -CVE-2024-8264,0,0,dae145d63df2475847f7054e6c3c247c216d09809d4eb2c06c74b36b60bd0aed,2024-10-09T23:15:11.093000 +CVE-2024-8264,0,1,977d3ed6a77a289d762175eb45944b7812a7c09079fab25995e55c91b621d33c,2024-10-10T12:51:56.987000 CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000 CVE-2024-8268,0,0,5be7ed43bc13c42d107f9505f0e50c5c3da78418e570e46eb634a6a34dba57c1,2024-09-26T16:15:31.053000 CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000 @@ -264605,13 +264609,13 @@ CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb84 CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 CVE-2024-8421,0,0,d73687c7a440fd8723ef6583db3c90a2a943a5b89a22a06b8eb401f91173afbd,2024-10-04T13:51:25.567000 -CVE-2024-8422,0,0,d68ef00b938d487b56e122f31bdfd52b0522be0b4b66f65b169f377743e31544,2024-10-08T10:15:04.880000 +CVE-2024-8422,0,1,da1dd556419670385038468e2107102610aa221c3a3eaee298a2f7cb26fadde1,2024-10-10T12:56:30.817000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000 CVE-2024-8430,0,0,55a9f0c318551ddd036fdf97a76cda9a73c7561d06c4df941f7c206a6547670b,2024-10-04T13:51:25.567000 -CVE-2024-8431,0,0,7baecc9e8e571af318f8cd87d02a90614d0fd988e01a43285ee3d4b0eaf0a5c8,2024-10-08T12:15:02.810000 +CVE-2024-8431,0,1,d69c80d38dea3f20003a1a2a6d11039cc4dfd88da40a61eed75cc6580dd75c16,2024-10-10T12:56:30.817000 CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000 -CVE-2024-8433,0,0,b410fce8b64e3c94f4a4ed487938b497d560f921639293b9c2ddd22885e8694f,2024-10-08T10:15:05.110000 +CVE-2024-8433,0,1,10afb8a6fa43c6f6fbfbb3257c4e815f1728fa33e9d5d7be923265592220fbdc,2024-10-10T12:56:30.817000 CVE-2024-8434,0,0,f17fd5eecfec4b6092d883a27ff9fa9dfcb00839b391edc337e18ff19734c460,2024-10-02T17:25:30.140000 CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000 CVE-2024-8437,0,0,e197ee77442bbe9c0c205a562fa2fee4cf9645f10acbb85445e512103cf01a70,2024-09-26T13:32:02.803000 @@ -264647,17 +264651,17 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 CVE-2024-8476,0,0,092ef960d66528d11d9417cebbf68782d16f414858b72459c24698ae73498ac1,2024-10-02T17:31:00.583000 -CVE-2024-8477,0,0,ff7de7984dd1ad3081b0134262dcabab579701effecde74fd9bcafce3cebade4,2024-10-10T03:15:02.300000 +CVE-2024-8477,0,1,560ff35aed3b9bd5544aad76af6fcb59dec1bfbf894f84166ea65d83ab0c9f01,2024-10-10T12:51:56.987000 CVE-2024-8478,0,0,175c7b9f94662d755813fa2228cd0539f44691d1180c4633af22a35129eb9a32,2024-09-26T15:53:44.297000 CVE-2024-8479,0,0,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000 CVE-2024-8480,0,0,73de76891190d432c360d36e1da93720f2abf11adbca08499bebf4ffb87eb2bd,2024-09-26T18:13:58.470000 CVE-2024-8481,0,0,f7ded0bc8510c8370341acc7cc1290a608973497f13c998f4c94b53ba9c9ee83,2024-10-02T17:59:52.013000 -CVE-2024-8482,0,0,fce7ebc9b1704c805b121acb7f0b84e2cc1df78a7e51c3c273833a7ea02373aa,2024-10-08T12:15:03.043000 +CVE-2024-8482,0,1,7f62f0d1a243ba448d81dc1e9f8e61d5af52a43134389c525974698cf1ec68cb,2024-10-10T12:56:30.817000 CVE-2024-8483,0,0,7b9d62ad2c15cc912981452040d1345e4ce933202d5b94754bb2f4a4c6c39a92,2024-10-02T16:42:30.347000 CVE-2024-8484,0,0,f455d9eda6cfa730254e6d1c54e42895291597af75d213a155b8f2778e2c53b8,2024-10-02T17:44:13.687000 CVE-2024-8485,0,0,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e39313163,2024-10-02T16:19:15.993000 CVE-2024-8486,0,0,142dddefdb024c37bf64990d5cdf075e89e34583809c3fe8fbc3ef75d078d000,2024-10-07T17:48:28.117000 -CVE-2024-8488,0,0,3f9897fc1dfc86f618d946219d30fbca1a9ae778e587bffb547996da33ec924e,2024-10-08T11:15:13.233000 +CVE-2024-8488,0,1,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f998b,2024-10-10T12:56:30.817000 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,551fc12eb8cb4caa4e9bbd5dc03a7956334337857e6a71f0d5ccb7ec4fa77572,2024-10-04T13:50:43.727000 @@ -264666,12 +264670,12 @@ CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80 CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53 CVE-2024-8508,0,0,095cff01fb00165e2108ed0a6b3f940edeffb7916515f1cc0f2ea48f2031a7c8,2024-10-04T13:50:43.727000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 -CVE-2024-8513,0,0,d98435b2706063c11b28bf88842139d7c4c98cc86f2c1c46faa85dba552c7ef6,2024-10-10T02:15:03.323000 +CVE-2024-8513,0,1,f2c9f0b23984b3fd254455cbfb09e4c8a0cb1b04789aa0ce90358c3617e7d185,2024-10-10T12:51:56.987000 CVE-2024-8514,0,0,c58a76f0057441ba23f8e2f32e326770fb9d4e75db425aee0ab9e343556d5997,2024-10-02T19:59:17.080000 CVE-2024-8515,0,0,2860d4fc2403ef731ebb5d2e3d51ef0155fe3387c99bac76ffcaa85980c8d253,2024-10-02T19:22:00.953000 CVE-2024-8516,0,0,4c7cc8475226568ec7dcbebdfbb30107ff8998ef4ef82c2cfacac984d895c7fe,2024-10-02T19:22:44.933000 CVE-2024-8517,0,0,ce937d4c0c27f8995dba93692196810f803407b9c7a2ce432d973aed0a5fc274,2024-09-18T18:05:03.553000 -CVE-2024-8518,0,0,0b5b19fd712778ffb62e501fcb10fba7506bbf32ae1a9d619c603c04e1b5166b,2024-10-08T10:15:05.340000 +CVE-2024-8518,0,1,759da2d37c4aaf02c69f2fbe6a6112ee2eb66d1b3bca228becbb2e86bb579cf2,2024-10-10T12:56:30.817000 CVE-2024-8519,0,0,1aacd88d58f1107be56cf91e3e76096c2b7c27f5621315c82a8d3461470ecab4,2024-10-04T13:50:43.727000 CVE-2024-8520,0,0,4bf9c9cd030963a8ce8142c1cbb513efd4813c3e4b2408a924afa68b32dfbdb2,2024-10-08T21:50:30.153000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 @@ -264733,9 +264737,9 @@ CVE-2024-8621,0,0,da11617ee187bea39361c3e736358efdd8e000970ca04e836eaac8c5eeb75d CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1e2,2024-09-26T14:59:27.770000 CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000 CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000 -CVE-2024-8626,0,0,864214a6153c9f26d9da12e37b92e3c077849aaa65999fc092f27a208345f840,2024-10-08T17:15:56.240000 +CVE-2024-8626,0,1,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 -CVE-2024-8629,0,0,261b663c7cfcd787ea083ff9c75f783b204a7baba7d6f01c8db0c578a0339b07,2024-10-08T10:15:05.550000 +CVE-2024-8629,0,1,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 CVE-2024-8630,0,0,171e223312e05c108be17689ae4f899562cfc4dd591123d96527e97a9f5e9c7e,2024-09-30T12:45:57.823000 CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000 CVE-2024-8632,0,0,e0cada97c6995cbb67fe42f80a349e37abe4361f782a8365fc38e88552a5da8f,2024-10-04T13:51:25.567000 @@ -264805,7 +264809,7 @@ CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c496 CVE-2024-8725,0,0,bda4a6515a704fa51f2d759f535270e57676d8c1b87d3a5cc5dc6f9e3d99ebf6,2024-10-01T14:16:42.727000 CVE-2024-8727,0,0,cb79e2fb4f4e8ddff2e3cdbb1cbb30b7c8fce0689b3d497e10ebbff2e74dd2da,2024-10-04T13:51:25.567000 CVE-2024-8728,0,0,d061a0a3e4a793bdc334c9b032908af2152405a24e9b06b2723d960e58ba5c92,2024-10-04T13:51:25.567000 -CVE-2024-8729,0,0,fc477b37b149e5719e375aedbd4c7c226e72d87402cf56cd4225e50bcacb4fe8,2024-10-10T02:15:03.550000 +CVE-2024-8729,0,1,502746e08b16d3182f31a62af04f64a7f4cb2cae01ba403524a1f6920b83c55c,2024-10-10T12:51:56.987000 CVE-2024-8730,0,0,ff380ede7d530472d7457d72280d0377e58fe499631b78029fd0dcbdd667a7f4,2024-09-26T19:58:33.353000 CVE-2024-8731,0,0,17c6adda5eb698d4c05886ce56b7c8d24eb85ac20af08445719f350b3f8c3e38,2024-09-26T19:43:33.110000 CVE-2024-8732,0,0,fdb5356750581bee2cd15ce9454648108e6d01424f144ebcf561e47c2245eaa8,2024-09-26T20:01:02.290000 @@ -264872,7 +264876,7 @@ CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f18 CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488d1,2024-09-30T15:21:31.693000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 CVE-2024-8883,0,0,d39bf3fdabe814eab7383cf7d0056d70749ac8a21f6ccaada9d165b73ef13b6c,2024-10-01T13:15:03.313000 -CVE-2024-8884,0,0,47b219a95e46d87833785ce74726d7b57fccb26d7c9afd3883e07cc76c42ccf9,2024-10-08T11:15:13.487000 +CVE-2024-8884,0,1,bbe657acd3b81809e4c38d289d4690d33ce15843f154a38b409847ce2483e4ec,2024-10-10T12:56:30.817000 CVE-2024-8885,0,0,3d17cd6b07f76e6b7b78ee39290572c27afe08953d025655a317633960052841,2024-10-04T13:50:43.727000 CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000 CVE-2024-8888,0,0,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000 @@ -264890,19 +264894,19 @@ CVE-2024-8907,0,0,3d86966b7711318d0ab27de85fd6280ec2e537a37979cfd99531e9b10f8d74 CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be6322728,2024-09-23T17:59:14.137000 CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,381e6285f77cbfcd68b12e9f3c36f92b4377fd4642413a4087debb4746eed093,2024-10-03T17:34:27.913000 -CVE-2024-8911,0,0,e7036e57a7b5079248b6d7c63c86a4c9d197ebc1e3176b6b0eb42ac038dad567,2024-10-08T09:15:19.077000 +CVE-2024-8911,0,1,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89dfe,2024-10-10T12:56:30.817000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 -CVE-2024-8925,0,0,eb1032180e69355308e7a650d38adcde3a07d852252bdcff91665928f460eeb5,2024-10-08T04:15:09.450000 -CVE-2024-8926,0,0,c1a9a20c339f3f09113b703aeab1f5f10535aa92830fd8a035d2dd9d3042fa4c,2024-10-08T04:15:10.637000 -CVE-2024-8927,0,0,e99efc9ed0e5f7905ca7f7c83aa01347b02d475ea956d1a595b74cb26d487962,2024-10-08T04:15:10.867000 +CVE-2024-8925,0,1,f7b67219b091a742390ec1bc7b7a23f6bee63991cff554b1b79c817328faf839,2024-10-10T12:57:21.987000 +CVE-2024-8926,0,1,f260becf66260bc88c518d40940feebbefa9dc7db11337c2d47039024806f87d,2024-10-10T12:57:21.987000 +CVE-2024-8927,0,1,c1e9a062d52462d6fe242810289c0eebebd710add8b342036c04255888aa68d4,2024-10-10T12:57:21.987000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 CVE-2024-8942,0,0,856856bd14b58b19668f9a36b8a793262f5091e96c724b4e90a8dd630a5aaf77,2024-09-30T17:39:28.417000 -CVE-2024-8943,0,0,a8ef9d8956fd67bae6a422d9d249ddb2456a2f806a7a8924b864d4b8bf5f6f41,2024-10-08T09:15:19.343000 +CVE-2024-8943,0,1,c16025dd6ff942dffbca74c384d38bc1376bf1e3ecaf8ebbc416d335b90c911c,2024-10-10T12:56:30.817000 CVE-2024-8944,0,0,163e8bd42c52d6cb1f3f0fdfff8b3db24acfd0dba8d50b29b1780d64b55bd42a,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,89d4e06764ee27ae462e66a2c760956f13440d7833b3b8093e505b1c71a9aac5,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,0afc0efb5414dac2f435cdc08456c904eb9a65ac4dd275170da7c9549741129d,2024-09-24T13:11:17.417000 @@ -264913,17 +264917,17 @@ CVE-2024-8951,0,0,888c97aa442d5e8c89ae77387b914cd3981839dfe932748e6b429d09cccb70 CVE-2024-8956,0,0,67fe3d1874df790c4fe403e5b4da2c61ceb691a22ee76441757b9e4b9f428f5d,2024-10-01T16:01:30.063000 CVE-2024-8957,0,0,7754fe7edeaccf469b1d2d0d834f9e662d3691f603f526c2d85ee83a7186072b,2024-10-01T17:49:25.573000 CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000 -CVE-2024-8964,0,0,6471d55da584f14cd02d928281d540ddaf0ca162f66bd689de5667e12abc5950,2024-10-08T08:15:02.430000 +CVE-2024-8964,0,1,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7d7,2024-10-10T12:56:30.817000 CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000 CVE-2024-8967,0,0,0e61388d89e65d4552c8513d8ec8c307c7a4bc14fde1f860df9e7663ba49f28c,2024-10-08T18:47:12.110000 CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 -CVE-2024-8977,1,1,71642f624dfd713de445adce2cbd559e2cd3fbf4d46242bc23afc3dd675a7c37,2024-10-10T10:15:08.367000 +CVE-2024-8977,0,1,1854c355a879a1753be7595f13bc9f67fdb20e00c1bb5266672eb0282e59a99d,2024-10-10T12:51:56.987000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 -CVE-2024-8983,0,0,b5ad10e9e9fe7aabd9cdc2054c7af15f8a7e59c36886f8fb214efeae5019cab1,2024-10-09T16:35:09.290000 +CVE-2024-8983,0,1,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 -CVE-2024-8987,0,0,20679c7ee3bd75b4c00ee0e75d48234984a160ba55ab32d39f91c1f49d4bcfe0,2024-10-10T02:15:03.757000 +CVE-2024-8987,0,1,131ba5dbb33e2e4795191d9e8dc13e7c10247826582eda8bd05234eb3009028f,2024-10-10T12:51:56.987000 CVE-2024-8989,0,0,caae46233d26ee2b67df93becf3adf518208e6bbacfb542b8b2dd6d9f605994c,2024-10-04T13:51:25.567000 CVE-2024-8990,0,0,ebe58ed4a084d59384bf44303a373b31562e7163a1320c584d218212811f287c,2024-10-04T13:51:25.567000 CVE-2024-8991,0,0,36ea31132f642cce3da65bf6a2c52220b14f1ba567442136b19c870ca92cc82c,2024-10-04T18:56:30.583000 @@ -264931,7 +264935,7 @@ CVE-2024-8996,0,0,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000 CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000 CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000 -CVE-2024-9005,0,0,1694c1db2f70f8ae21b48a63f62e2af69dfe28694a366b5d17cf3f3ddbe0eb61,2024-10-08T11:15:13.673000 +CVE-2024-9005,0,1,61099b22866a74984f444f0a6d108911a7f5d019e3cfe0c7b08ac38e148f742f,2024-10-10T12:56:30.817000 CVE-2024-9006,0,0,864da0fa7d7c8fc58df08f11d0d7cb76d85f9cca9108e9a017838d94feacf233,2024-09-25T18:44:48.940000 CVE-2024-9007,0,0,94453be097c0664da2e2bd7a65ce6264485cbe477d797250392dd5d060fed40d,2024-09-25T18:40:31.320000 CVE-2024-9008,0,0,52622a85f30c63eabac86e540eb777bb56ea4ab0b052ff445cc04b0bad1ec80c,2024-09-20T17:01:23.517000 @@ -264939,12 +264943,12 @@ CVE-2024-9009,0,0,8ca9aa7668c5d5c77c4f8dc75f965a1fc61562deadeb769eddb6e3d475ae86 CVE-2024-9011,0,0,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eeaab,2024-09-25T17:48:14.820000 CVE-2024-9014,0,0,a8e29b928e7c02e09a31b50dee33eaa8cea5cb50c9cc022c5089f67468915a88,2024-09-26T13:32:55.343000 CVE-2024-9018,0,0,e176c873e94bd3e2c4b29c05a28da23ed581266b7e7463040882baa285f3a6c4,2024-10-07T19:20:48.293000 -CVE-2024-9021,0,0,93698023032d4eb246e479be9f6d24aecd12130762d8d7646a36600ee90ad452,2024-10-09T16:35:09.457000 -CVE-2024-9022,0,0,6a59c8133caa2bc019becd023a05070174808d767645fdcdc68735523f5830ee,2024-10-10T03:15:02.523000 +CVE-2024-9021,0,1,de7e8d34046f42f6ccd1c1916e1a012bc3502bb49751a8fdf9bccfa914a129ac,2024-10-10T12:57:21.987000 +CVE-2024-9022,0,1,f150208aaae2eaed713359f400156181e6aa1a4f5d3c759fa153dc1651766601,2024-10-10T12:51:56.987000 CVE-2024-9023,0,0,8856d7ffdca739d2c0d1b85fb1ee05faeaf6947167077ac20feaa24f6c509db2,2024-10-01T14:39:38.370000 CVE-2024-9024,0,0,29f2f073ee82aef300cee3fd954ac6dc4243aa67d5082fca2a65737992da04c1,2024-10-02T18:02:59.683000 CVE-2024-9025,0,0,8c34a0621e4e149deefb96042ae2c7c0174789fb7b5db2c9c1ef1c4077be46cb,2024-10-01T13:44:23.667000 -CVE-2024-9026,0,0,210f86341141c8670c1488c53dae21063d3a90e190b0938ba222162fe8cb7f48,2024-10-08T04:15:11.060000 +CVE-2024-9026,0,1,1ed21598ecf1af4f167ed704808f588277119ba81d8cd1b51230bca1346530a5,2024-10-10T12:57:21.987000 CVE-2024-9027,0,0,f3828020bd9a05a5e8ccaf0c12e55b05c6a031d2d0b0e5c28efac160e51428ac,2024-10-02T19:42:31.563000 CVE-2024-9028,0,0,12ca3746b7fb03c9df5889561116f4fbc62436426375b30bf910f3c4d7d8403e,2024-10-02T19:45:00.813000 CVE-2024-9029,0,0,9076ca7374bbbeb2209faec4a2cd78108bb0db6f5ed66892cd6b13e6647405d7,2024-09-30T12:46:20.237000 @@ -264964,19 +264968,19 @@ CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82e CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000 CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 CVE-2024-9054,0,0,0d14c343d616ebc19e493649349714efeb90a8268a2c04aa86a752fc9f9af719,2024-10-07T17:48:28.117000 -CVE-2024-9057,0,0,169ed92c5ff8863dc5040febb079ff6f502559a8d506f1187777931e7a4f2cb8,2024-10-10T02:15:03.960000 +CVE-2024-9057,0,1,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000 CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000 CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000 -CVE-2024-9064,0,0,b57dbda2d8b6e6e2613e0a67e5e06b2eac08677d047933c3ac819b27eebfd0bc,2024-10-10T02:15:04.163000 -CVE-2024-9065,0,0,b8a922350a4a838c9e0d83d782af52166b937204fb0c86c038ebe16331853fbb,2024-10-10T02:15:04.363000 -CVE-2024-9066,0,0,7153219b99c051f0df9d026aca0db4258cfb089d3a5e6d69ce38a15936d134bf,2024-10-10T02:15:04.567000 -CVE-2024-9067,0,0,474e0176cbb3073b56ad556d89f71dcfb33318f7ce1c709c99fd2bbaaf9f7ac0,2024-10-10T03:15:02.740000 +CVE-2024-9064,0,1,ac473310ab43f9fb30dffa5d3f92bc818e294ac85215fde1a46fddd10d2a239a,2024-10-10T12:51:56.987000 +CVE-2024-9065,0,1,51931192660d148a6daaba8639621e38a6bb6429b22429d6e98cf1184291bace,2024-10-10T12:51:56.987000 +CVE-2024-9066,0,1,029e7fff882135723275436a7ffd016a916fb688dffa2aaaf8996414c0870f6e,2024-10-10T12:51:56.987000 +CVE-2024-9067,0,1,5af42da39a95d0404e86b69013242c48e33f22b626a24a9e144e4d7f8b3f310c,2024-10-10T12:51:56.987000 CVE-2024-9068,0,0,01b6ceee3583b3b207ab2eeaf4c2684cbe8e9990b1a6178aa8ad730654493f98,2024-10-02T19:55:50.547000 CVE-2024-9069,0,0,904bb0393747d55de1840c322bbad7ae9d27b3e14c3398a0999f4d003e7be886,2024-10-02T19:37:49.777000 CVE-2024-9071,0,0,6a3b91964e28255133515a40cea9164b7d6e82b1113f289183d17f39a22489d5,2024-10-08T16:21:04.180000 -CVE-2024-9072,0,0,890808fe8f9a61e1feaf10dbc487db17380ddfd871219ec1ad57e516b1a84eff,2024-10-10T02:15:04.773000 +CVE-2024-9072,0,1,005912146cf10a7c966374db1ea1dc59f890da6d2ffa46a4dcea37394ffdbfcf,2024-10-10T12:51:56.987000 CVE-2024-9073,0,0,e1a3718934b1c8aa8070be1e5efd6407ed841e421f9f505c84906bd05d8d4d7e,2024-10-02T19:32:43.047000 -CVE-2024-9074,0,0,ef714e4c7a3d893c1a0e98bda98af9ba77482a2249f9ee1796de6f1a797a3b67,2024-10-10T03:15:02.963000 +CVE-2024-9074,0,1,b84a28074c96047ae7f557521e1eda6a4f5c8269b5a9c56aa56cd8ffd0526908,2024-10-10T12:51:56.987000 CVE-2024-9075,0,0,3b33ab99769a9c852230df8e8b6083f862011911d6a5bcadbdc727ad6f83ab66,2024-09-30T15:27:39.313000 CVE-2024-9076,0,0,8c57021a64484b6edbf7ffabe5a971516c1732fccafbf97d4089a67e7015212f,2024-09-27T16:14:04.977000 CVE-2024-9077,0,0,b59a81d09978bed17f369329899086dd9d16ca13d3114e4823b03c2ad7c75c03,2024-09-27T16:31:52.923000 @@ -265008,7 +265012,7 @@ CVE-2024-9120,0,0,741803f92bc286dd2201245dc8ffb354e00af92f2ccee9f63963d21a0888db CVE-2024-9121,0,0,eed3fa8b5aa214ac1e28e4851470b90d1a58e721a279141f5883437250a9a8a8,2024-09-26T13:32:02.803000 CVE-2024-9122,0,0,8303a0c1b693e1f9637d76c62abb1e6e7e78f3941c479dc3e2dfaa8a5c17fa42,2024-09-26T13:32:02.803000 CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c661,2024-09-26T13:32:02.803000 -CVE-2024-9124,0,0,522c8c8e29a98fb03ad8ce4ef4809feb90dd370c94e26fae46271196ff6155ff,2024-10-08T19:35:21.487000 +CVE-2024-9124,0,1,ed784b79f60c57333454c5582ccee1e6855416a99a054b161105f40c65181fb5,2024-10-10T12:56:30.817000 CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000 CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000 CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000 @@ -265019,12 +265023,12 @@ CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f3 CVE-2024-9146,0,0,093a84e73722aaf94583ed37757bead7a369f935148ee5112a4de416d29a94d3,2024-10-07T17:48:28.117000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000 -CVE-2024-9156,0,0,b1ed43816f4d1f8f0793149888dd7c4a087e29d07d5434a72d1fcfac249ed839,2024-10-10T06:15:11.290000 +CVE-2024-9156,0,1,9c3370dc697c72864515c51e29e02c0eae88d682d3119e7cfa47aced55fe467f,2024-10-10T12:51:56.987000 CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 -CVE-2024-9167,0,0,3cd3df9e444eac441e63bb7b7e65eb1a8a0f7ca49796eef5bdab3caee0243adf,2024-10-08T17:15:56.517000 +CVE-2024-9167,0,1,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9172,0,0,061cdfe5504cd57ff23c615d7882c5ec428decc2bc25b474b7bdd44e1c6c93b4,2024-10-08T18:05:10.863000 @@ -265035,12 +265039,12 @@ CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000 CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000 -CVE-2024-9201,1,1,a3af60bbfa9488b65ace049793bf49981aef39b64686e629c589022ae66f2833,2024-10-10T11:15:13.760000 +CVE-2024-9201,0,1,a44c16e9977c247511fb39c6475f3e4e6f33a76dde5a9e09317a93a9497d37be,2024-10-10T12:51:56.987000 CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000 CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000 CVE-2024-9204,0,0,8709d8f31d12084fc2eba23d41169bb9ba345e1a3d3bed7d676463fdbec26c9b,2024-10-04T13:50:43.727000 -CVE-2024-9205,0,0,8f5042f553febf92ff6071e329e5e704407918673ce8e329d989f95eb94a9cfe,2024-10-10T02:15:04.980000 -CVE-2024-9207,0,0,5836b45f1e3b6f3c0b90cd0a57c81bf3d815110bb015ec2874126aceaef92c8b,2024-10-08T11:15:13.870000 +CVE-2024-9205,0,1,b718d7a20230ca5535d4a92f87ab8371c72ac9b0f2e1a0dacf1f87ee0d6efefa,2024-10-10T12:51:56.987000 +CVE-2024-9207,0,1,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 CVE-2024-9218,0,0,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000 @@ -265071,10 +265075,10 @@ CVE-2024-9281,0,0,c727181324f48d332ad9d5a9c59aeaca5ded3de24b59d196d37c8fad927c50 CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843fce,2024-10-04T18:33:38.293000 CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 -CVE-2024-9286,0,0,4420cd04b235e214121fb32ef8ac538bba1103645d2000de9ff6496dd6614897,2024-10-09T14:35:12.913000 +CVE-2024-9286,0,1,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 -CVE-2024-9292,0,0,1dc4c8842dee86f27be3f18468601778bd93091d71bf3712c664e494938097d8,2024-10-08T06:15:02.773000 +CVE-2024-9292,0,1,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000 CVE-2024-9293,0,0,7c1c60f5c414b30d6435e9f161e4e8c836a460c723feac3a8584d125df52da96,2024-10-07T15:37:33.670000 CVE-2024-9294,0,0,df4e8ca812056069ce686ccc519c918f454c6a35b9074b986ab12abfbd42a42d,2024-09-30T12:45:57.823000 CVE-2024-9295,0,0,826b99628d695cedf34bdd0860c517e32dcba53de662e82d7c90aebf0e6cdd79,2024-10-01T11:36:27.763000 @@ -265116,11 +265120,11 @@ CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a74 CVE-2024-9368,0,0,e7a9c605e0cbf9cdb1d319aa8ea22e93a6f5e80855432922ca5e53112d3a4bc4,2024-10-04T13:50:43.727000 CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044af6,2024-10-04T13:50:43.727000 CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000 -CVE-2024-9377,0,0,4a89ac4c83337a7a9ccaf558b0409650e99efa90268cc0ac164076d6155ed4f2,2024-10-10T02:15:05.183000 +CVE-2024-9377,0,1,7e92c94153a671db6e3bc46a35701812779a3ebf2498b474df31292a74a22a6c,2024-10-10T12:51:56.987000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 -CVE-2024-9379,0,0,703ba59f46c27b4c9a81634b7ffa6a16d24f7bdc67c63aab96b4a5148055591a,2024-10-10T01:00:01.433000 -CVE-2024-9380,0,0,2037d2a4a238cf512644b0219683af760fbe6f206c09635b8a946c319ea8a207,2024-10-10T01:00:01.433000 -CVE-2024-9381,0,0,cc48b0c94354735826bd90917d8a4f1bd25f02a01e3be77523bffb72c1d63efa,2024-10-08T17:15:57.183000 +CVE-2024-9379,0,1,7307211838f3e4eec0a78ff89b2913d240c27ba7b70931debb9de0355e26476e,2024-10-10T12:56:30.817000 +CVE-2024-9380,0,1,4644c9ec292c5b8378752bb7d545f649e1e14134892236ed0047b20a02af773c,2024-10-10T12:56:30.817000 +CVE-2024-9381,0,1,38dc7b42bfe6f81a683e774fe86ddcbec5bce97b381af2229d40d440156c5086,2024-10-10T12:56:30.817000 CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000 CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 @@ -265140,7 +265144,7 @@ CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bff CVE-2024-9407,0,0,c86f90b2fe6be22dec486d34b9c6e67b91a5945de93bcc27372041ed6a426800,2024-10-04T13:50:43.727000 CVE-2024-9410,0,0,90cffd2b402803b1ff7e6401238cb515c8bb4e7ed816fe3e9a33e1d435f92656,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 -CVE-2024-9412,0,0,508dd5e7b4a50ce6a515eecb514d86e0303ada7aac8cd12de26df6ccec97fbeb,2024-10-08T20:15:05.543000 +CVE-2024-9412,0,1,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 CVE-2024-9417,0,0,3a253693d9f258d17d8c6435732a7f997d65ff8389871880258fe316da3e8053,2024-10-07T17:48:28.117000 CVE-2024-9421,0,0,9a8bea0e59d0ab668a3cbf6b96506990581414c04a5ce69b672a275a746007d3,2024-10-04T13:50:43.727000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 @@ -265149,21 +265153,21 @@ CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40c CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000 -CVE-2024-9449,0,0,a97c6d10c8b04c0b2ba9306e37a8440eda5112028d07f60f30bea1d9431c3f84,2024-10-09T07:15:09.833000 -CVE-2024-9451,0,0,61aa4f71fe0ab792c97d101a7739a4f3bc5141915892cc9a79adc1735531429e,2024-10-09T08:15:05.160000 +CVE-2024-9449,0,1,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 +CVE-2024-9451,0,1,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 -CVE-2024-9457,0,0,a3f81fbef1dd7d1dbff3e68c1be3f38dbcfd9e33811950a5188886c9a9173cce,2024-10-10T02:15:05.390000 +CVE-2024-9457,0,1,2e5f1e076d316abdd9befa1bb632f71036f861a4d1c633e303e5e7de81c7f7b3,2024-10-10T12:51:56.987000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 -CVE-2024-9463,0,0,f13497b8f0b60e6e27c9901c2789e15050e4fdbc20807f021c8855b382953be1,2024-10-09T23:15:11.290000 -CVE-2024-9464,0,0,99a593d9b1195cd84d5c7e8c5dc3bbb5dc83cf53b5dd3defc462e16b4dd2a56e,2024-10-09T23:15:11.457000 -CVE-2024-9465,0,0,f4eeb8126b57a6a32266941e46984287d34afe79d4741d66fe56bdaf6a6cc7dc,2024-10-09T23:15:11.577000 -CVE-2024-9466,0,0,7c6ffb5c2daddefc09fa136fe3d0aa6b08ad91692d2ef7ce366c90d7334a52c7,2024-10-09T23:15:11.677000 -CVE-2024-9467,0,0,7092abacb621c6f56f774275f7135aa3234c3d257afa62d63975dd7e63387ab3,2024-10-09T23:15:11.783000 -CVE-2024-9468,0,0,8e6702e737f362c6fdcd36eca73fc028c9f11c62bfa56f22d75f735e050539c8,2024-10-09T17:15:20.637000 -CVE-2024-9469,0,0,d9b6f661b9e1322b3b093a5ae970d853aa8691c848e351552d3696e45e6311d1,2024-10-09T17:15:20.770000 -CVE-2024-9470,0,0,0797df17ec09d3f69674ab049b6f850a5388d56caf69a4c5de1caee228001ca0,2024-10-09T17:15:20.907000 -CVE-2024-9471,0,0,5c85e26a255195a2b8178ac9ccac4f652d703ef47327213ff2979210ae308091,2024-10-09T17:15:21.090000 -CVE-2024-9473,0,0,fb59c7f42b76f069513bc8197e933394d06e8e6b1a793f603483982a8fa6a0d6,2024-10-09T17:15:21.230000 +CVE-2024-9463,0,1,3d816240de9b00dd05613f74725c55702a05acf1893772c4b9bd28e230e084ba,2024-10-10T12:51:56.987000 +CVE-2024-9464,0,1,2b54d926b0cd6ec5f6ac2bd88515e583386fc5e04d484fd98bdb41892b6d5e79,2024-10-10T12:51:56.987000 +CVE-2024-9465,0,1,cfe5d6ca68cb5acf41db662703e8ec7b064db6a86490ab599bd64dcebc009e79,2024-10-10T12:51:56.987000 +CVE-2024-9466,0,1,0579487090fcba10000d94b1f5e22a64bb4642c7ed576e1c7bcc464791ee8c09,2024-10-10T12:51:56.987000 +CVE-2024-9467,0,1,03050e15364c5c594270c2e9ba115b3a00821c04109640eeeb50989db1e3de9d,2024-10-10T12:51:56.987000 +CVE-2024-9468,0,1,3a605e83184a40bd8285aed534f24a282040306539a1d55c82841777c5987c41,2024-10-10T12:51:56.987000 +CVE-2024-9469,0,1,8bb9a78228eb26b44d146abb8c36e4dccf96e88c6afa5a6a89dd30c8de19d781,2024-10-10T12:51:56.987000 +CVE-2024-9470,0,1,6d7d145d5ed6ae4ef4f33928573352f54839c5b9641b899af46f8b3aa4ed69d1,2024-10-10T12:51:56.987000 +CVE-2024-9471,0,1,5d0487dbafd6cbb46e2a69b9e8ad8abe4233710e742dfa2d6675320cfdfe3aea,2024-10-10T12:51:56.987000 +CVE-2024-9473,0,1,b488f190917a741efff9ce774060e2242f39c1fd009aabbb1ce12625032617b4,2024-10-10T12:51:56.987000 CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000 CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000 CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000 @@ -265171,17 +265175,17 @@ CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000 -CVE-2024-9518,0,0,12cf0bbbe97993dd60c18f4d19afa6b8cc84a5b6c06f21e0b53a100caa362576,2024-10-10T02:15:05.590000 -CVE-2024-9519,0,0,921de206056af820936bb74b3effaaf734fd6f653f2b085bcdfda79d009a0057,2024-10-10T02:15:05.787000 -CVE-2024-9520,0,0,c1c09f899eebf7c90772b78752ca6c33c9376395ddfcda172125a827cbf882b2,2024-10-10T03:15:03.177000 -CVE-2024-9522,0,0,900d9df82fccd7b2eaab46f9f611ccf58726137620e69b26363e3d18819e0003,2024-10-10T02:15:06.013000 +CVE-2024-9518,0,1,4a32dfec9f85550debe31d9ad64141f69bc5b7098b3e90d19e2b442fddd1c52c,2024-10-10T12:51:56.987000 +CVE-2024-9519,0,1,06bc737cd8f16b861f6662031cf3ca6afacb22149a4d55be6376ebb4e754bf7e,2024-10-10T12:51:56.987000 +CVE-2024-9520,0,1,56bd22220a43e38a1a043559d21b9ec0fef97ea6b7e33029e2e545b00832357f,2024-10-10T12:51:56.987000 +CVE-2024-9522,0,1,f201013f69195a1c8c1c750c825e6a62e2e00398dbdccc0dccff97a33026ecd1,2024-10-10T12:51:56.987000 CVE-2024-9528,0,0,d6fcaf4387a113a292c5be1e6315aa1024df0cc79a828aebf7bc2fe429a4bc75,2024-10-07T17:48:28.117000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000 CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000 -CVE-2024-9549,0,0,cb55acb0116148f78fe305f81d4a6eab492f380f42935c650b86596ed312ccf1,2024-10-09T11:16:03.970000 +CVE-2024-9549,0,1,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000 CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000 CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000 CVE-2024-9552,0,0,0089ba0b10cb8d31710138a22fd4a80a1adb8a11c547d7653c5c7c5a85ee8f50,2024-10-09T11:15:32.333000 @@ -265207,22 +265211,27 @@ CVE-2024-9571,0,0,875a4a44417fabed8eda23f7f9f70cde202fd7e807f9d44c2058c5256366a8 CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b96,2024-10-08T18:45:03.117000 CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000 -CVE-2024-9575,0,0,5319fb13c91be15843abb76d87e6d17457d37aebb68186f1a71e2b47b9eefe17,2024-10-09T14:35:13.220000 +CVE-2024-9575,0,1,f6b14427489147da51632087d3ce5422a9383e0d7bccf4cb35592eda1a1d7d41,2024-10-10T12:51:56.987000 CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000 -CVE-2024-9581,0,0,ef6b4fcb9791fefb373c8eb2076fff904758b37ce78821eb9f889a1bd5051ed7,2024-10-10T02:15:06.227000 -CVE-2024-9596,1,1,dc8c1387457a8e98db5f2a5a8eedfe6a78638893039c62d0a30c2544d623641d,2024-10-10T10:15:08.563000 -CVE-2024-9602,0,0,13c5133d85587ec02f04ab3df6b135286d0f9133ef132335e7faeadbfb7036e6,2024-10-09T17:35:16.980000 -CVE-2024-9603,0,0,5064a175167ae9dbaab5d5f0ba6b6e0d26b4de70a429a695addd7ebd760abbdf,2024-10-09T16:35:09.623000 -CVE-2024-9620,0,0,0379fb1d0864218f96bae79eafc674616cceed6a1d6b1c374718286d73008692,2024-10-08T17:15:57.357000 -CVE-2024-9621,0,0,93a648e082c2d430d057ddc9e3ada713aaa0a2bb50686998ccd1adc379bccdce,2024-10-08T17:15:57.573000 -CVE-2024-9622,0,0,c63b888866eff50e6fa5697d58bf1e64edc668dfb35cefc907fc3210c84ae5d9,2024-10-08T17:15:57.790000 -CVE-2024-9623,1,1,b27bd9bd0c476e42d5793aaaa4b30874b72637acdcc9c9d220688162fccd7f46,2024-10-10T10:15:08.770000 -CVE-2024-9671,0,0,f49c886ce75776b8468067e0383f68033c06188472cd5b55ea14fd7e423e32a2,2024-10-09T15:15:17.513000 -CVE-2024-9675,0,0,32e8840bd27965b8df5e5b7176aa0ce26bda0a9f22dcbac8c66cb0601f52b1b1,2024-10-09T15:15:17.837000 -CVE-2024-9680,0,0,1073a61fe81991e41ed256928cc5d8d5bc03a3ffd6b7dabd943fe9be59020a5c,2024-10-09T16:35:10.390000 -CVE-2024-9685,0,0,587a16c28fef49a7c446d42e2f8c2399f7acfb5c44d717d8aa46528c6e160880,2024-10-10T02:15:06.440000 -CVE-2024-9780,0,0,bcdc26cebf41023411248a54ca1298593aad5de98135e414a43471278624a0df,2024-10-10T07:15:03.727000 -CVE-2024-9781,0,0,c4c43c2fe5298eaa775adcc9f1acc016cd7959f1e1b149a4b1f5e918320967e5,2024-10-10T07:15:04.100000 -CVE-2024-9796,0,0,899ce6c3db81a82c7e5873c58310ea8e9092cff195c99edba907ddfafe6969eb,2024-10-10T08:15:04.140000 -CVE-2024-9798,0,0,e3f94feda8194e3e67a24aa2383dbfaa87f537350e2ae7e749d3032d5ec1a350,2024-10-10T08:15:04.207000 -CVE-2024-9802,0,0,74e669d15ae6598ed12c396496c8779e1b2ec0797d50945f4108f40ea2c373dd,2024-10-10T08:15:04.387000 +CVE-2024-9581,0,1,dcdedf39f55e8b175c72a20e72a1aed92038e920265594b4fc9925b7183ce1e6,2024-10-10T12:51:56.987000 +CVE-2024-9596,0,1,41f14771e651cbc1c37017cbe5a91040128a2c351e859a7b312163502a24a950,2024-10-10T12:51:56.987000 +CVE-2024-9602,0,1,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 +CVE-2024-9603,0,1,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 +CVE-2024-9620,0,1,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf728,2024-10-10T12:56:30.817000 +CVE-2024-9621,0,1,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000 +CVE-2024-9622,0,1,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 +CVE-2024-9623,0,1,05eef687418519373d15ec19a86683cd7648219a76f4b58bf6e516098fb1b885,2024-10-10T12:51:56.987000 +CVE-2024-9671,0,1,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 +CVE-2024-9675,0,1,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 +CVE-2024-9680,0,1,76b65a7173ef3401740fcdef48ce88c7dd29c53ba260a8245e27768c946b76e8,2024-10-10T12:51:56.987000 +CVE-2024-9685,0,1,0533577bd5534b2238dda3fc39c720d3ca57598c0c892e8a746063784dfa2119,2024-10-10T12:51:56.987000 +CVE-2024-9780,0,1,64cb4b42f9787f95c4bcb2f0ffb7a4034eca385e970ac2bedc9fcd69728d3075,2024-10-10T12:51:56.987000 +CVE-2024-9781,0,1,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000 +CVE-2024-9782,1,1,f6fdadb6173e6b1d6cefc02344a50956f97519ff0da6213ed752274ca4260d60,2024-10-10T12:51:56.987000 +CVE-2024-9783,1,1,712836b1436318ef30c4c9316757670b95113f358e845fe262e620150796b3c9,2024-10-10T12:51:56.987000 +CVE-2024-9784,1,1,64a6c68ed42050536e19b6453db5b3e132a6112e07a448f7da505723942301c6,2024-10-10T12:51:56.987000 +CVE-2024-9785,1,1,ee184b824fb4d6c43c3629feb69eb05004a7592fad511f98957566ebeb43d5af,2024-10-10T13:15:14.583000 +CVE-2024-9786,1,1,e7875c706b86134a4356de16f7f39d3d03c8ad5b5439952fad2634c3220ea97a,2024-10-10T13:15:14.860000 +CVE-2024-9796,0,1,fe0b08ff1ae9ebd510895ff30cb6177b330dcc712a6137cedd6907f51e4b3f39,2024-10-10T12:51:56.987000 +CVE-2024-9798,0,1,b14ba1eae058a3bd91c5dbacee5cfcb7c2e637a985b72d6c76b41174ca78f7ac,2024-10-10T12:51:56.987000 +CVE-2024-9802,0,1,4b94a47d6926791ba2b4c36fe54fd10dd96ddb6616518592cb6e604ea999aae7,2024-10-10T12:51:56.987000