From 2a24fd719acddb38dc39b6cd862d64ef1a0a04b4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 13 Oct 2024 02:03:17 +0000 Subject: [PATCH] Auto-Update: 2024-10-13T02:00:16.486465+00:00 --- CVE-2016/CVE-2016-62xx/CVE-2016-6298.json | 2 +- CVE-2021/CVE-2021-471xx/CVE-2021-47181.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47182.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47183.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47184.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47185.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47187.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47188.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47189.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47190.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47191.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47192.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47196.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47197.json | 4 + CVE-2021/CVE-2021-471xx/CVE-2021-47199.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47200.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47201.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47202.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47203.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47204.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47205.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47206.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47207.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47209.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47210.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47211.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47212.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47214.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47215.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47216.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47217.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47218.json | 4 + CVE-2021/CVE-2021-472xx/CVE-2021-47219.json | 4 + CVE-2023/CVE-2023-205xx/CVE-2023-20570.json | 2 +- CVE-2023/CVE-2023-251xx/CVE-2023-25189.json | 2 +- CVE-2023/CVE-2023-255xx/CVE-2023-25535.json | 2 +- CVE-2023/CVE-2023-255xx/CVE-2023-25581.json | 4 + CVE-2023/CVE-2023-265xx/CVE-2023-26562.json | 2 +- CVE-2023/CVE-2023-280xx/CVE-2023-28018.json | 2 +- CVE-2023/CVE-2023-392xx/CVE-2023-39249.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41703.json | 2 +- CVE-2023/CVE-2023-417xx/CVE-2023-41704.json | 2 +- CVE-2023/CVE-2023-442xx/CVE-2023-44283.json | 2 +- CVE-2023/CVE-2023-442xx/CVE-2023-44293.json | 2 +- CVE-2023/CVE-2023-442xx/CVE-2023-44294.json | 2 +- CVE-2023/CVE-2023-456xx/CVE-2023-45698.json | 2 +- CVE-2023/CVE-2023-468xx/CVE-2023-46842.json | 4 + CVE-2023/CVE-2023-484xx/CVE-2023-48432.json | 2 +- CVE-2023/CVE-2023-491xx/CVE-2023-49125.json | 2 +- CVE-2023/CVE-2023-502xx/CVE-2023-50236.json | 2 +- CVE-2023/CVE-2023-508xx/CVE-2023-50808.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52428.json | 2 +- CVE-2023/CVE-2023-524xx/CVE-2023-52430.json | 2 +- CVE-2023/CVE-2023-63xx/CVE-2023-6361.json | 4 + CVE-2023/CVE-2023-63xx/CVE-2023-6362.json | 4 + CVE-2023/CVE-2023-72xx/CVE-2023-7260.json | 2 +- CVE-2024/CVE-2024-02xx/CVE-2024-0229.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1082.json | 2 +- CVE-2024/CVE-2024-10xx/CVE-2024-1084.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1163.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1309.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1432.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1454.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1511.json | 4 + CVE-2024/CVE-2024-15xx/CVE-2024-1520.json | 4 + CVE-2024/CVE-2024-16xx/CVE-2024-1600.json | 4 + CVE-2024/CVE-2024-16xx/CVE-2024-1602.json | 4 + CVE-2024/CVE-2024-16xx/CVE-2024-1625.json | 4 + CVE-2024/CVE-2024-16xx/CVE-2024-1643.json | 4 + CVE-2024/CVE-2024-17xx/CVE-2024-1740.json | 4 + CVE-2024/CVE-2024-18xx/CVE-2024-1873.json | 2 +- CVE-2024/CVE-2024-200xx/CVE-2024-20090.json | 4 + CVE-2024/CVE-2024-200xx/CVE-2024-20092.json | 4 + CVE-2024/CVE-2024-200xx/CVE-2024-20094.json | 4 + CVE-2024/CVE-2024-200xx/CVE-2024-20098.json | 4 + CVE-2024/CVE-2024-200xx/CVE-2024-20099.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20100.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20101.json | 4 + CVE-2024/CVE-2024-201xx/CVE-2024-20103.json | 4 + CVE-2024/CVE-2024-202xx/CVE-2024-20284.json | 2 +- CVE-2024/CVE-2024-202xx/CVE-2024-20285.json | 2 +- CVE-2024/CVE-2024-202xx/CVE-2024-20286.json | 2 +- CVE-2024/CVE-2024-203xx/CVE-2024-20350.json | 2 +- CVE-2024/CVE-2024-203xx/CVE-2024-20389.json | 4 + CVE-2024/CVE-2024-204xx/CVE-2024-20496.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20787.json | 2 +- CVE-2024/CVE-2024-207xx/CVE-2024-20791.json | 4 + CVE-2024/CVE-2024-207xx/CVE-2024-20792.json | 4 + CVE-2024/CVE-2024-207xx/CVE-2024-20793.json | 4 + CVE-2024/CVE-2024-20xx/CVE-2024-2029.json | 4 + CVE-2024/CVE-2024-213xx/CVE-2024-21315.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21455.json | 6 +- CVE-2024/CVE-2024-214xx/CVE-2024-21491.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2195.json | 4 + CVE-2024/CVE-2024-21xx/CVE-2024-2196.json | 4 + CVE-2024/CVE-2024-220xx/CVE-2024-22074.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22128.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22129.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22130.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22131.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22132.json | 2 +- CVE-2024/CVE-2024-223xx/CVE-2024-22326.json | 2 +- CVE-2024/CVE-2024-224xx/CVE-2024-22455.json | 2 +- CVE-2024/CVE-2024-225xx/CVE-2024-22524.json | 2 +- CVE-2024/CVE-2024-225xx/CVE-2024-22525.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2288.json | 2 +- CVE-2024/CVE-2024-233xx/CVE-2024-23369.json | 6 +- CVE-2024/CVE-2024-233xx/CVE-2024-23370.json | 6 +- CVE-2024/CVE-2024-233xx/CVE-2024-23374.json | 6 +- CVE-2024/CVE-2024-233xx/CVE-2024-23375.json | 6 +- CVE-2024/CVE-2024-233xx/CVE-2024-23376.json | 6 +- CVE-2024/CVE-2024-233xx/CVE-2024-23378.json | 6 +- CVE-2024/CVE-2024-233xx/CVE-2024-23379.json | 6 +- CVE-2024/CVE-2024-234xx/CVE-2024-23439.json | 2 +- CVE-2024/CVE-2024-234xx/CVE-2024-23440.json | 2 +- CVE-2024/CVE-2024-237xx/CVE-2024-23783.json | 2 +- CVE-2024/CVE-2024-237xx/CVE-2024-23784.json | 2 +- CVE-2024/CVE-2024-237xx/CVE-2024-23785.json | 2 +- CVE-2024/CVE-2024-237xx/CVE-2024-23786.json | 2 +- CVE-2024/CVE-2024-238xx/CVE-2024-23833.json | 2 +- CVE-2024/CVE-2024-239xx/CVE-2024-23952.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2358.json | 4 + CVE-2024/CVE-2024-23xx/CVE-2024-2359.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2360.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2361.json | 4 + CVE-2024/CVE-2024-23xx/CVE-2024-2362.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2366.json | 4 + CVE-2024/CVE-2024-247xx/CVE-2024-24739.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24740.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24741.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24742.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24743.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24751.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24781.json | 2 +- CVE-2024/CVE-2024-247xx/CVE-2024-24782.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24814.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24826.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24879.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24880.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25112.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25118.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25119.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25120.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25121.json | 2 +- CVE-2024/CVE-2024-254xx/CVE-2024-25407.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25642.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25643.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25691.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25694.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25701.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25702.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25707.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2548.json | 2 +- CVE-2024/CVE-2024-261xx/CVE-2024-26158.json | 4 + CVE-2024/CVE-2024-26xx/CVE-2024-2624.json | 2 +- CVE-2024/CVE-2024-274xx/CVE-2024-27458.json | 4 + CVE-2024/CVE-2024-27xx/CVE-2024-2792.json | 4 + CVE-2024/CVE-2024-287xx/CVE-2024-28709.json | 6 +- CVE-2024/CVE-2024-287xx/CVE-2024-28710.json | 6 +- CVE-2024/CVE-2024-29xx/CVE-2024-2965.json | 2 +- CVE-2024/CVE-2024-302xx/CVE-2024-30274.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30275.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30281.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30282.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30283.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30286.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30287.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30288.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30289.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30290.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30291.json | 4 + CVE-2024/CVE-2024-302xx/CVE-2024-30292.json | 4 + CVE-2024/CVE-2024-303xx/CVE-2024-30373.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3033.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3095.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3098.json | 4 + CVE-2024/CVE-2024-311xx/CVE-2024-31142.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31214.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31230.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31240.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31242.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31245.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31247.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31249.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31253.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31254.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31259.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31278.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31282.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31287.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31297.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31298.json | 4 + CVE-2024/CVE-2024-312xx/CVE-2024-31299.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31342.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31343.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31355.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31356.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31358.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31368.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31369.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31370.json | 4 + CVE-2024/CVE-2024-313xx/CVE-2024-31386.json | 4 + CVE-2024/CVE-2024-314xx/CVE-2024-31464.json | 4 + CVE-2024/CVE-2024-318xx/CVE-2024-31871.json | 4 + CVE-2024/CVE-2024-318xx/CVE-2024-31873.json | 4 + CVE-2024/CVE-2024-318xx/CVE-2024-31874.json | 4 + CVE-2024/CVE-2024-319xx/CVE-2024-31943.json | 4 + CVE-2024/CVE-2024-319xx/CVE-2024-31944.json | 4 + CVE-2024/CVE-2024-319xx/CVE-2024-31978.json | 4 + CVE-2024/CVE-2024-31xx/CVE-2024-3101.json | 4 + CVE-2024/CVE-2024-31xx/CVE-2024-3102.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3104.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3110.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3150.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3152.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3166.json | 2 +- CVE-2024/CVE-2024-326xx/CVE-2024-32608.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32873.json | 2 +- CVE-2024/CVE-2024-329xx/CVE-2024-32992.json | 4 + CVE-2024/CVE-2024-32xx/CVE-2024-3283.json | 4 + CVE-2024/CVE-2024-330xx/CVE-2024-33049.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33064.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33065.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33066.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33069.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33070.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33071.json | 6 +- CVE-2024/CVE-2024-330xx/CVE-2024-33073.json | 6 +- CVE-2024/CVE-2024-332xx/CVE-2024-33209.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3317.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3318.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3319.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3322.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3382.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3383.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3384.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3385.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3386.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3387.json | 4 + CVE-2024/CVE-2024-33xx/CVE-2024-3388.json | 4 + CVE-2024/CVE-2024-340xx/CVE-2024-34094.json | 4 + CVE-2024/CVE-2024-340xx/CVE-2024-34095.json | 4 + CVE-2024/CVE-2024-340xx/CVE-2024-34096.json | 4 + CVE-2024/CVE-2024-340xx/CVE-2024-34097.json | 4 + CVE-2024/CVE-2024-340xx/CVE-2024-34098.json | 4 + CVE-2024/CVE-2024-340xx/CVE-2024-34099.json | 4 + CVE-2024/CVE-2024-341xx/CVE-2024-34100.json | 4 + CVE-2024/CVE-2024-341xx/CVE-2024-34101.json | 4 + CVE-2024/CVE-2024-34xx/CVE-2024-3408.json | 2 +- CVE-2024/CVE-2024-34xx/CVE-2024-3468.json | 2 +- CVE-2024/CVE-2024-351xx/CVE-2024-35178.json | 2 +- CVE-2024/CVE-2024-351xx/CVE-2024-35179.json | 4 + CVE-2024/CVE-2024-352xx/CVE-2024-35202.json | 4 + CVE-2024/CVE-2024-352xx/CVE-2024-35299.json | 4 + CVE-2024/CVE-2024-353xx/CVE-2024-35300.json | 4 + CVE-2024/CVE-2024-353xx/CVE-2024-35301.json | 4 + CVE-2024/CVE-2024-353xx/CVE-2024-35302.json | 4 + CVE-2024/CVE-2024-35xx/CVE-2024-3568.json | 4 + CVE-2024/CVE-2024-35xx/CVE-2024-3569.json | 4 + CVE-2024/CVE-2024-35xx/CVE-2024-3570.json | 4 + CVE-2024/CVE-2024-367xx/CVE-2024-36730.json | 2 +- CVE-2024/CVE-2024-367xx/CVE-2024-36735.json | 2 +- CVE-2024/CVE-2024-36xx/CVE-2024-3641.json | 4 + CVE-2024/CVE-2024-36xx/CVE-2024-3642.json | 4 + CVE-2024/CVE-2024-36xx/CVE-2024-3644.json | 4 + CVE-2024/CVE-2024-371xx/CVE-2024-37153.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37154.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37976.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37979.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37982.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37983.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3750.json | 4 + CVE-2024/CVE-2024-380xx/CVE-2024-38029.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38036.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38037.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38038.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38039.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38040.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38097.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38124.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38129.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38149.json | 2 +- CVE-2024/CVE-2024-381xx/CVE-2024-38179.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38212.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38229.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38261.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38262.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38265.json | 2 +- CVE-2024/CVE-2024-383xx/CVE-2024-38397.json | 6 +- CVE-2024/CVE-2024-383xx/CVE-2024-38399.json | 6 +- CVE-2024/CVE-2024-384xx/CVE-2024-38425.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39322.json | 2 +- CVE-2024/CVE-2024-393xx/CVE-2024-39324.json | 2 +- CVE-2024/CVE-2024-393xx/CVE-2024-39325.json | 2 +- CVE-2024/CVE-2024-394xx/CVE-2024-39436.json | 2 +- CVE-2024/CVE-2024-394xx/CVE-2024-39437.json | 2 +- CVE-2024/CVE-2024-394xx/CVE-2024-39438.json | 2 +- CVE-2024/CVE-2024-394xx/CVE-2024-39439.json | 2 +- CVE-2024/CVE-2024-394xx/CVE-2024-39440.json | 2 +- CVE-2024/CVE-2024-395xx/CVE-2024-39586.json | 2 +- CVE-2024/CVE-2024-398xx/CVE-2024-39806.json | 2 +- CVE-2024/CVE-2024-398xx/CVE-2024-39831.json | 2 +- CVE-2024/CVE-2024-415xx/CVE-2024-41585.json | 2 +- CVE-2024/CVE-2024-415xx/CVE-2024-41588.json | 2 +- CVE-2024/CVE-2024-415xx/CVE-2024-41590.json | 2 +- CVE-2024/CVE-2024-416xx/CVE-2024-41666.json | 2 +- CVE-2024/CVE-2024-416xx/CVE-2024-41667.json | 2 +- CVE-2024/CVE-2024-418xx/CVE-2024-41858.json | 2 +- CVE-2024/CVE-2024-420xx/CVE-2024-42020.json | 2 +- CVE-2024/CVE-2024-420xx/CVE-2024-42027.json | 4 + CVE-2024/CVE-2024-42xx/CVE-2024-4222.json | 4 + CVE-2024/CVE-2024-42xx/CVE-2024-4279.json | 4 + CVE-2024/CVE-2024-42xx/CVE-2024-4288.json | 4 + CVE-2024/CVE-2024-432xx/CVE-2024-43283.json | 2 +- CVE-2024/CVE-2024-432xx/CVE-2024-43289.json | 2 +- CVE-2024/CVE-2024-433xx/CVE-2024-43365.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43453.json | 2 +- CVE-2024/CVE-2024-434xx/CVE-2024-43481.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43505.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43527.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43528.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43529.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43532.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43533.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43534.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43535.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43536.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43537.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43563.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43570.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43571.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43574.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43575.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43576.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43581.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43582.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43583.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43584.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43585.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43589.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43590.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43591.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43592.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43593.json | 2 +- CVE-2024/CVE-2024-435xx/CVE-2024-43599.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43601.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43603.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43604.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43607.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43608.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43609.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43611.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43612.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43614.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43615.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43616.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43683.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43684.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43685.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43686.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43687.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43696.json | 2 +- CVE-2024/CVE-2024-436xx/CVE-2024-43697.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4318.json | 4 + CVE-2024/CVE-2024-43xx/CVE-2024-4320.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4351.json | 4 + CVE-2024/CVE-2024-43xx/CVE-2024-4352.json | 4 + CVE-2024/CVE-2024-43xx/CVE-2024-4385.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44010.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44011.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44012.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44013.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44014.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44015.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44016.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44018.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44022.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44023.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44024.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44025.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44026.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44027.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44028.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44029.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44032.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44033.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44034.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44035.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44036.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44037.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44039.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44040.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44041.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44042.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44043.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44045.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44046.json | 4 + CVE-2024/CVE-2024-44xx/CVE-2024-4400.json | 4 + CVE-2024/CVE-2024-44xx/CVE-2024-4478.json | 4 + CVE-2024/CVE-2024-450xx/CVE-2024-45060.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45115.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45116.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45117.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45118.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45119.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45120.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45121.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45122.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45123.json | 4 + CVE-2024/CVE-2024-451xx/CVE-2024-45136.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45137.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45138.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45139.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45140.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45141.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45142.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45143.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45144.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45145.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45146.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45150.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45152.json | 2 +- CVE-2024/CVE-2024-451xx/CVE-2024-45153.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45200.json | 2 +- CVE-2024/CVE-2024-452xx/CVE-2024-45245.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45246.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45247.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45248.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45249.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45250.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45251.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45252.json | 4 + CVE-2024/CVE-2024-452xx/CVE-2024-45290.json | 2 +- CVE-2024/CVE-2024-452xx/CVE-2024-45291.json | 2 +- CVE-2024/CVE-2024-453xx/CVE-2024-45382.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45454.json | 4 + CVE-2024/CVE-2024-454xx/CVE-2024-45463.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45464.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45465.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45466.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45467.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45468.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45469.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45470.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45471.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45472.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45473.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45474.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45475.json | 2 +- CVE-2024/CVE-2024-454xx/CVE-2024-45476.json | 2 +- CVE-2024/CVE-2024-458xx/CVE-2024-45806.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4546.json | 4 + CVE-2024/CVE-2024-45xx/CVE-2024-4580.json | 4 + CVE-2024/CVE-2024-460xx/CVE-2024-46040.json | 4 + CVE-2024/CVE-2024-460xx/CVE-2024-46041.json | 4 + CVE-2024/CVE-2024-462xx/CVE-2024-46237.json | 2 +- CVE-2024/CVE-2024-462xx/CVE-2024-46278.json | 4 + CVE-2024/CVE-2024-46xx/CVE-2024-4617.json | 4 + CVE-2024/CVE-2024-46xx/CVE-2024-4634.json | 4 + CVE-2024/CVE-2024-46xx/CVE-2024-4635.json | 4 + CVE-2024/CVE-2024-46xx/CVE-2024-4658.json | 4 + CVE-2024/CVE-2024-46xx/CVE-2024-4670.json | 4 + CVE-2024/CVE-2024-470xx/CVE-2024-47007.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47008.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47009.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47010.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47011.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47084.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47134.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47135.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47136.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47164.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47165.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47166.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47167.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47168.json | 4 + CVE-2024/CVE-2024-471xx/CVE-2024-47194.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47195.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47196.json | 2 +- CVE-2024/CVE-2024-472xx/CVE-2024-47297.json | 4 + CVE-2024/CVE-2024-472xx/CVE-2024-47298.json | 4 + CVE-2024/CVE-2024-472xx/CVE-2024-47299.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47300.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47301.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47306.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47307.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47309.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47310.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47313.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47316.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47319.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47320.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47322.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47323.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47324.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47326.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47327.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47329.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47332.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47333.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47335.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47336.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47338.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47339.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47340.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47341.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47342.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47343.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47344.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47345.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47346.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47347.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47348.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47349.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47350.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47352.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47354.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47355.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47356.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47357.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47360.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47363.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47364.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47365.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47366.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47367.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47368.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47373.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47378.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47379.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47380.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47381.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47382.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47383.json | 4 + CVE-2024/CVE-2024-473xx/CVE-2024-47384.json | 4 + CVE-2024/CVE-2024-474xx/CVE-2024-47421.json | 2 +- CVE-2024/CVE-2024-474xx/CVE-2024-47422.json | 2 +- CVE-2024/CVE-2024-474xx/CVE-2024-47423.json | 2 +- CVE-2024/CVE-2024-474xx/CVE-2024-47424.json | 2 +- CVE-2024/CVE-2024-474xx/CVE-2024-47425.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47524.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47526.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47556.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47557.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47558.json | 2 +- CVE-2024/CVE-2024-475xx/CVE-2024-47559.json | 2 +- CVE-2024/CVE-2024-476xx/CVE-2024-47625.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47626.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47627.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47628.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47629.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47630.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47631.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47632.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47633.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47635.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47636.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47638.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47639.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47642.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47643.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47644.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47646.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47647.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47648.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47650.json | 4 + CVE-2024/CVE-2024-476xx/CVE-2024-47652.json | 6 +- CVE-2024/CVE-2024-476xx/CVE-2024-47653.json | 6 +- CVE-2024/CVE-2024-476xx/CVE-2024-47654.json | 6 +- CVE-2024/CVE-2024-476xx/CVE-2024-47655.json | 6 +- CVE-2024/CVE-2024-476xx/CVE-2024-47656.json | 6 +- CVE-2024/CVE-2024-476xx/CVE-2024-47657.json | 6 +- CVE-2024/CVE-2024-476xx/CVE-2024-47661.json | 2 +- CVE-2024/CVE-2024-477xx/CVE-2024-47789.json | 4 + CVE-2024/CVE-2024-477xx/CVE-2024-47790.json | 4 + CVE-2024/CVE-2024-478xx/CVE-2024-47812.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47815.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47816.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47828.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47832.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47833.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47840.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47841.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47845.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47846.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47847.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47848.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47849.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47867.json | 4 + CVE-2024/CVE-2024-478xx/CVE-2024-47868.json | 4 + CVE-2024/CVE-2024-478xx/CVE-2024-47869.json | 4 + CVE-2024/CVE-2024-478xx/CVE-2024-47870.json | 4 + CVE-2024/CVE-2024-478xx/CVE-2024-47871.json | 4 + CVE-2024/CVE-2024-478xx/CVE-2024-47872.json | 4 + CVE-2024/CVE-2024-479xx/CVE-2024-47913.json | 6 +- CVE-2024/CVE-2024-479xx/CVE-2024-47962.json | 4 + CVE-2024/CVE-2024-479xx/CVE-2024-47963.json | 4 + CVE-2024/CVE-2024-479xx/CVE-2024-47964.json | 4 + CVE-2024/CVE-2024-479xx/CVE-2024-47965.json | 4 + CVE-2024/CVE-2024-479xx/CVE-2024-47966.json | 4 + CVE-2024/CVE-2024-47xx/CVE-2024-4702.json | 4 + CVE-2024/CVE-2024-47xx/CVE-2024-4760.json | 4 + CVE-2024/CVE-2024-489xx/CVE-2024-48902.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4826.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4838.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4843.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4844.json | 4 + CVE-2024/CVE-2024-48xx/CVE-2024-4851.json | 2 +- CVE-2024/CVE-2024-48xx/CVE-2024-4881.json | 2 +- CVE-2024/CVE-2024-48xx/CVE-2024-4888.json | 2 +- CVE-2024/CVE-2024-48xx/CVE-2024-4889.json | 2 +- CVE-2024/CVE-2024-49xx/CVE-2024-4984.json | 4 + CVE-2024/CVE-2024-49xx/CVE-2024-4991.json | 4 + CVE-2024/CVE-2024-49xx/CVE-2024-4992.json | 4 + CVE-2024/CVE-2024-49xx/CVE-2024-4993.json | 4 + CVE-2024/CVE-2024-49xx/CVE-2024-4999.json | 4 + CVE-2024/CVE-2024-51xx/CVE-2024-5124.json | 2 +- CVE-2024/CVE-2024-51xx/CVE-2024-5133.json | 2 +- CVE-2024/CVE-2024-51xx/CVE-2024-5187.json | 2 +- CVE-2024/CVE-2024-52xx/CVE-2024-5206.json | 2 +- CVE-2024/CVE-2024-52xx/CVE-2024-5248.json | 2 +- CVE-2024/CVE-2024-52xx/CVE-2024-5278.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5550.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6157.json | 4 + CVE-2024/CVE-2024-64xx/CVE-2024-6400.json | 4 + CVE-2024/CVE-2024-65xx/CVE-2024-6530.json | 4 + CVE-2024/CVE-2024-66xx/CVE-2024-6658.json | 2 +- CVE-2024/CVE-2024-67xx/CVE-2024-6747.json | 2 +- CVE-2024/CVE-2024-68xx/CVE-2024-6840.json | 2 +- CVE-2024/CVE-2024-70xx/CVE-2024-7038.json | 2 +- CVE-2024/CVE-2024-70xx/CVE-2024-7049.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7101.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7386.json | 2 +- CVE-2024/CVE-2024-74xx/CVE-2024-7491.json | 2 +- CVE-2024/CVE-2024-80xx/CVE-2024-8080.json | 2 +- CVE-2024/CVE-2024-82xx/CVE-2024-8215.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8422.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8437.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8477.json | 2 +- CVE-2024/CVE-2024-84xx/CVE-2024-8486.json | 4 + CVE-2024/CVE-2024-84xx/CVE-2024-8499.json | 4 + CVE-2024/CVE-2024-85xx/CVE-2024-8513.json | 2 +- CVE-2024/CVE-2024-85xx/CVE-2024-8519.json | 2 +- CVE-2024/CVE-2024-86xx/CVE-2024-8630.json | 2 +- CVE-2024/CVE-2024-87xx/CVE-2024-8729.json | 2 +- CVE-2024/CVE-2024-87xx/CVE-2024-8743.json | 4 + CVE-2024/CVE-2024-87xx/CVE-2024-8771.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8925.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8926.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8927.json | 2 +- CVE-2024/CVE-2024-89xx/CVE-2024-8977.json | 4 + CVE-2024/CVE-2024-89xx/CVE-2024-8987.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9022.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9026.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9057.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9064.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9065.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9066.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9067.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9072.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9074.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9146.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9156.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9161.json | 4 + CVE-2024/CVE-2024-91xx/CVE-2024-9180.json | 4 + CVE-2024/CVE-2024-92xx/CVE-2024-9201.json | 4 + CVE-2024/CVE-2024-92xx/CVE-2024-9204.json | 2 +- CVE-2024/CVE-2024-92xx/CVE-2024-9205.json | 2 +- CVE-2024/CVE-2024-92xx/CVE-2024-9237.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9312.json | 4 + CVE-2024/CVE-2024-93xx/CVE-2024-9314.json | 4 + CVE-2024/CVE-2024-93xx/CVE-2024-9377.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9381.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9385.json | 4 + CVE-2024/CVE-2024-93xx/CVE-2024-9399.json | 2 +- CVE-2024/CVE-2024-94xx/CVE-2024-9417.json | 4 + CVE-2024/CVE-2024-94xx/CVE-2024-9455.json | 4 + CVE-2024/CVE-2024-94xx/CVE-2024-9457.json | 2 +- CVE-2024/CVE-2024-94xx/CVE-2024-9468.json | 2 +- CVE-2024/CVE-2024-94xx/CVE-2024-9481.json | 4 + CVE-2024/CVE-2024-94xx/CVE-2024-9482.json | 4 + CVE-2024/CVE-2024-94xx/CVE-2024-9483.json | 4 + CVE-2024/CVE-2024-94xx/CVE-2024-9484.json | 4 + CVE-2024/CVE-2024-94xx/CVE-2024-9487.json | 4 + CVE-2024/CVE-2024-95xx/CVE-2024-9518.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9519.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9520.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9522.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9528.json | 4 + CVE-2024/CVE-2024-95xx/CVE-2024-9554.json | 4 + CVE-2024/CVE-2024-95xx/CVE-2024-9560.json | 6 +- CVE-2024/CVE-2024-95xx/CVE-2024-9576.json | 4 + CVE-2024/CVE-2024-95xx/CVE-2024-9581.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9596.json | 4 + CVE-2024/CVE-2024-96xx/CVE-2024-9623.json | 4 + CVE-2024/CVE-2024-96xx/CVE-2024-9685.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9780.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9781.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9782.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9783.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9784.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9785.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9786.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9787.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9788.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9789.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9790.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9792.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9793.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9794.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9796.json | 2 +- CVE-2024/CVE-2024-97xx/CVE-2024-9797.json | 4 + CVE-2024/CVE-2024-97xx/CVE-2024-9799.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9803.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9804.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9805.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9806.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9807.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9808.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9809.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9810.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9811.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9812.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9813.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9814.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9815.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9816.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9817.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9818.json | 4 + CVE-2024/CVE-2024-98xx/CVE-2024-9822.json | 4 + README.md | 34 +- _state.csv | 1462 +++++++++---------- 732 files changed, 2762 insertions(+), 1090 deletions(-) diff --git a/CVE-2016/CVE-2016-62xx/CVE-2016-6298.json b/CVE-2016/CVE-2016-62xx/CVE-2016-6298.json index 6930a5b04f1..b0065dcf0ab 100644 --- a/CVE-2016/CVE-2016-62xx/CVE-2016-6298.json +++ b/CVE-2016/CVE-2016-62xx/CVE-2016-6298.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-09-01T23:59:01.160", "lastModified": "2016-11-28T20:31:14.547", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47181.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47181.json index a8ecd7a04ba..4368dfaa2d4 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47181.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47181.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: tusb6010: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: musb: tusb6010: verificar el valor de retorno despu\u00e9s de llamar a platform_get_resource() Causar\u00e1 null-ptr-deref si platform_get_resource() devuelve NULL, necesitamos verificar el valor de retorno." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47182.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47182.json index c03c8882b0d..c3605921149 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47182.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47182.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix scsi_mode_sense() buffer length handling\n\nSeveral problems exist with scsi_mode_sense() buffer length handling:\n\n 1) The allocation length field of the MODE SENSE(10) command is 16-bits,\n occupying bytes 7 and 8 of the CDB. With this command, access to mode\n pages larger than 255 bytes is thus possible. However, the CDB\n allocation length field is set by assigning len to byte 8 only, thus\n truncating buffer length larger than 255.\n\n 2) If scsi_mode_sense() is called with len smaller than 8 with\n sdev->use_10_for_ms set, or smaller than 4 otherwise, the buffer length\n is increased to 8 and 4 respectively, and the buffer is zero filled\n with these increased values, thus corrupting the memory following the\n buffer.\n\nFix these 2 problems by using put_unaligned_be16() to set the allocation\nlength field of MODE SENSE(10) CDB and by returning an error when len is\ntoo small.\n\nFurthermore, if len is larger than 255B, always try MODE SENSE(10) first,\neven if the device driver did not set sdev->use_10_for_ms. In case of\ninvalid opcode error for MODE SENSE(10), access to mode pages larger than\n255 bytes are not retried using MODE SENSE(6). To avoid buffer length\noverflows for the MODE_SENSE(10) case, check that len is smaller than 65535\nbytes.\n\nWhile at it, also fix the folowing:\n\n * Use get_unaligned_be16() to retrieve the mode data length and block\n descriptor length fields of the mode sense reply header instead of using\n an open coded calculation.\n\n * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable\n Block Descriptor, which is the opposite of what the dbd argument\n description was." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: Fix scsi_mode_sense() buffer length management Existen varios problemas con el manejo de la longitud del b\u00fafer de scsi_mode_sense(): 1) El campo de longitud de asignaci\u00f3n del comando MODE SENSE(10) es de 16 bits y ocupa los bytes 7 y 8 del CDB. Con este comando, es posible acceder a p\u00e1ginas de modo mayores de 255 bytes. Sin embargo, el campo de longitud de asignaci\u00f3n del CDB se establece asignando len solo al byte 8, truncando as\u00ed la longitud del b\u00fafer mayor de 255. 2) Si se llama a scsi_mode_sense() con len menor que 8 con sdev->use_10_for_ms establecido, o menor que 4 en caso contrario, la longitud del b\u00fafer aumenta a 8 y 4 respectivamente, y el b\u00fafer se rellena con ceros con estos valores aumentados, corrompiendo as\u00ed la memoria que sigue al b\u00fafer. Solucione estos 2 problemas usando put_unaligned_be16() para configurar el campo de longitud de asignaci\u00f3n de MODE SENSE(10) CDB y devolviendo un error cuando len sea demasiado peque\u00f1o. Adem\u00e1s, si len es mayor que 255B, siempre intente MODE SENSE(10) primero, incluso si el controlador del dispositivo no configur\u00f3 sdev->use_10_for_ms. En caso de error de c\u00f3digo de operaci\u00f3n no v\u00e1lido para MODE SENSE(10), el acceso a p\u00e1ginas de modo mayores a 255 bytes no se vuelve a intentar usando MODE SENSE(6). Para evitar desbordamientos de longitud de b\u00fafer para el caso de MODE_SENSE(10), verifique que len sea menor a 65535 bytes. Mientras lo hace, tambi\u00e9n solucione lo siguiente: * Use get_unaligned_be16() para recuperar los campos de longitud de datos de modo y longitud de descriptor de bloque del encabezado de respuesta de sentido de modo en lugar de usar un c\u00e1lculo de c\u00f3digo abierto. * Corregir la explicaci\u00f3n del argumento dbd de kdoc: el bit DBD significa Deshabilitar descriptor de bloque, que es lo opuesto a lo que era la descripci\u00f3n del argumento dbd." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json index b85d3b0ad27..1dfdffe1ced 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix link down processing to address NULL pointer dereference\n\nIf an FC link down transition while PLOGIs are outstanding to fabric well\nknown addresses, outstanding ABTS requests may result in a NULL pointer\ndereference. Driver unload requests may hang with repeated \"2878\" log\nmessages.\n\nThe Link down processing results in ABTS requests for outstanding ELS\nrequests. The Abort WQEs are sent for the ELSs before the driver had set\nthe link state to down. Thus the driver is sending the Abort with the\nexpectation that an ABTS will be sent on the wire. The Abort request is\nstalled waiting for the link to come up. In some conditions the driver may\nauto-complete the ELSs thus if the link does come up, the Abort completions\nmay reference an invalid structure.\n\nFix by ensuring that Abort set the flag to avoid link traffic if issued due\nto conditions where the link failed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se soluciona el procesamiento de enlace inactivo para abordar la desreferencia de puntero NULL Si una transici\u00f3n de enlace inactivo FC mientras hay PLOGI pendientes para direcciones conocidas de Fabric, las solicitudes ABTS pendientes pueden resultar en una desreferencia de puntero NULL. Las solicitudes de descarga del controlador pueden bloquearse con mensajes de registro \"2878\" repetidos. El procesamiento de enlace inactivo da como resultado solicitudes ABTS para solicitudes ELS pendientes. Los WQE de cancelaci\u00f3n se env\u00edan para los ELS antes de que el controlador haya establecido el estado del enlace en inactivo. Por lo tanto, el controlador env\u00eda la cancelaci\u00f3n con la expectativa de que se env\u00ede una ABTS en el cable. La solicitud de cancelaci\u00f3n se detiene esperando que se active el enlace. En algunas condiciones, el controlador puede completar autom\u00e1ticamente los ELS, por lo que si el enlace se activa, las finalizaciones de cancelaci\u00f3n pueden hacer referencia a una estructura no v\u00e1lida. Se soluciona asegur\u00e1ndose de que la cancelaci\u00f3n establezca el indicador para evitar el tr\u00e1fico de enlace si se emite debido a condiciones en las que el enlace fall\u00f3." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47184.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47184.json index 98cbaa330cf..9efc10c75f1 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47184.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47184.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL ptr dereference on VSI filter sync\n\nRemove the reason of null pointer dereference in sync VSI filters.\nAdded new I40E_VSI_RELEASING flag to signalize deleting and releasing\nof VSI resources to sync this thread with sync filters subtask.\nWithout this patch it is possible to start update the VSI filter list\nafter VSI is removed, that's causing a kernel oops." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i40e: Corregir la desreferencia de puntero nulo en la sincronizaci\u00f3n de filtros VSI Eliminar el motivo de la desreferencia de puntero nulo en los filtros VSI de sincronizaci\u00f3n. Se ha a\u00f1adido el nuevo indicador I40E_VSI_RELEASING para se\u00f1alar la eliminaci\u00f3n y liberaci\u00f3n de recursos VSI para sincronizar este hilo con la subtarea de filtros de sincronizaci\u00f3n. Sin este parche, es posible comenzar a actualizar la lista de filtros VSI despu\u00e9s de que se elimine VSI, lo que provoca un error en el kernel." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47185.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47185.json index 9d020c49769..98b1ce31ce6 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47185.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47185.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n\nWhen running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,\nwhich look like this one:\n\n Workqueue: events_unbound flush_to_ldisc\n Call trace:\n dump_backtrace+0x0/0x1ec\n show_stack+0x24/0x30\n dump_stack+0xd0/0x128\n panic+0x15c/0x374\n watchdog_timer_fn+0x2b8/0x304\n __run_hrtimer+0x88/0x2c0\n __hrtimer_run_queues+0xa4/0x120\n hrtimer_interrupt+0xfc/0x270\n arch_timer_handler_phys+0x40/0x50\n handle_percpu_devid_irq+0x94/0x220\n __handle_domain_irq+0x88/0xf0\n gic_handle_irq+0x84/0xfc\n el1_irq+0xc8/0x180\n slip_unesc+0x80/0x214 [slip]\n tty_ldisc_receive_buf+0x64/0x80\n tty_port_default_receive_buf+0x50/0x90\n flush_to_ldisc+0xbc/0x110\n process_one_work+0x1d4/0x4b0\n worker_thread+0x180/0x430\n kthread+0x11c/0x120\n\nIn the testcase pty04, The first process call the write syscall to send\ndata to the pty master. At the same time, the workqueue will do the\nflush_to_ldisc to pop data in a loop until there is no more data left.\nWhen the sender and workqueue running in different core, the sender sends\ndata fastly in full time which will result in workqueue doing work in loop\nfor a long time and occuring softlockup in flush_to_ldisc with kernel\nconfigured without preempt. So I add need_resched check and cond_resched\nin the flush_to_ldisc loop to avoid it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: tty_buffer: soluciona el problema de bloqueo suave en flush_to_ldisc Al ejecutar ltp testcase(ltp/testcases/kernel/pty/pty04.c) con arm64, hay un bloqueo suave, que se parece a este: Workqueue: events_unbound flush_to_ldisc Rastreo de llamadas: dump_backtrace+0x0/0x1ec show_stack+0x24/0x30 dump_stack+0xd0/0x128 panic+0x15c/0x374 watchdog_timer_fn+0x2b8/0x304 __run_hrtimer+0x88/0x2c0 __hrtimer_run_queues+0xa4/0x120 hrtimer_interrupt+0xfc/0x270 arch_timer_handler_phys+0x40/0x50 handle_percpu_devid_irq+0x94/0x220 __handle_domain_irq+0x88/0xf0 gic_handle_irq+0x84/0xfc el1_irq+0xc8/0x180 slip_unesc+0x80/0x214 [slip] tty_ldisc_receive_buf+0x64/0x80 tty_port_default_receive_buf+0x50/0x90 flush_to_ldisc+0xbc/0x110 process_one_work+0x1d4/0x4b0 worker_thread+0x180/0x430 kthread+0x11c/0x120 En el caso de prueba pty04, el primer proceso llama a la escritura Llamada al sistema para enviar datos al maestro pty. Al mismo tiempo, la cola de trabajo ejecutar\u00e1 el comando flush_to_ldisc para extraer los datos en un bucle hasta que no queden m\u00e1s datos. Cuando el remitente y la cola de trabajo se ejecutan en n\u00facleos diferentes, el remitente env\u00eda datos r\u00e1pidamente en tiempo completo, lo que har\u00e1 que la cola de trabajo realice el trabajo en bucle durante mucho tiempo y se produzca un bloqueo suave en flush_to_ldisc con el n\u00facleo configurado sin interrupci\u00f3n. Por lo tanto, agrego la comprobaci\u00f3n need_resched y cond_resched en el bucle flush_to_ldisc para evitarlo." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47187.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47187.json index 8adc69abb1d..dc28b82dbd9 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47187.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47187.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency\n\nThe entry/exit latency and minimum residency in state for the idle\nstates of MSM8998 were ..bad: first of all, for all of them the\ntimings were written for CPU sleep but the min-residency-us param\nwas miscalculated (supposedly, while porting this from downstream);\nThen, the power collapse states are setting PC on both the CPU\ncluster *and* the L2 cache, which have different timings: in the\nspecific case of L2 the times are higher so these ones should be\ntaken into account instead of the CPU ones.\n\nThis parameter misconfiguration was not giving particular issues\nbecause on MSM8998 there was no CPU scaling at all, so cluster/L2\npower collapse was rarely (if ever) hit.\nWhen CPU scaling is enabled, though, the wrong timings will produce\nSoC unstability shown to the user as random, apparently error-less,\nsudden reboots and/or lockups.\n\nThis set of parameters are stabilizing the SoC when CPU scaling is\nON and when power collapse is frequently hit." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: dts: qcom: msm8998: Se corrige la latencia y residencia del estado inactivo de la CPU/L2 La latencia de entrada/salida y la residencia m\u00ednima en el estado para los estados inactivos de MSM8998 eran... malas: en primer lugar, para todos ellos, los tiempos se escribieron para el sue\u00f1o de la CPU, pero el par\u00e1metro min-residency-us se calcul\u00f3 mal (supuestamente, al portar esto desde el lado descendente); luego, los estados de colapso de energ\u00eda est\u00e1n configurando PC tanto en el cl\u00faster de la CPU *como* en el cach\u00e9 L2, que tienen diferentes tiempos: en el caso espec\u00edfico de L2, los tiempos son m\u00e1s altos, por lo que estos deben tenerse en cuenta en lugar de los de la CPU. Esta configuraci\u00f3n incorrecta de par\u00e1metros no estaba dando problemas particulares porque en MSM8998 no hab\u00eda escalamiento de la CPU en absoluto, por lo que el colapso de energ\u00eda del cl\u00faster/L2 rara vez (o nunca) se ve\u00eda afectado. Sin embargo, cuando el escalado de CPU est\u00e1 habilitado, los tiempos incorrectos producir\u00e1n inestabilidad del SoC, que se mostrar\u00e1 al usuario como reinicios y/o bloqueos repentinos aleatorios, aparentemente sin errores. Este conjunto de par\u00e1metros estabiliza el SoC cuando el escalado de CPU est\u00e1 activado y cuando se producen ca\u00eddas de energ\u00eda con frecuencia." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json index 9cf09426f4b..af6e36cd846 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47188.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Improve SCSI abort handling\n\nThe following has been observed on a test setup:\n\nWARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c\nCall trace:\n ufshcd_queuecommand+0x468/0x65c\n scsi_send_eh_cmnd+0x224/0x6a0\n scsi_eh_test_devices+0x248/0x418\n scsi_eh_ready_devs+0xc34/0xe58\n scsi_error_handler+0x204/0x80c\n kthread+0x150/0x1b4\n ret_from_fork+0x10/0x30\n\nThat warning is triggered by the following statement:\n\n\tWARN_ON(lrbp->cmd);\n\nFix this warning by clearing lrbp->cmd from the abort handler." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ufs: core: Mejorar el manejo de la interrupci\u00f3n de SCSI Se ha observado lo siguiente en una configuraci\u00f3n de prueba: ADVERTENCIA: CPU: 4 PID: 250 en drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c Rastreo de llamadas: ufshcd_queuecommand+0x468/0x65c scsi_send_eh_cmnd+0x224/0x6a0 scsi_eh_test_devices+0x248/0x418 scsi_eh_ready_devs+0xc34/0xe58 scsi_error_handler+0x204/0x80c kthread+0x150/0x1b4 ret_from_fork+0x10/0x30 Esa advertencia se activa por lo siguiente: declaraci\u00f3n: WARN_ON(lrbp->cmd); Corrija esta advertencia borrando lrbp->cmd del controlador de aborto." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47189.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47189.json index b342419c238..3c7662aaa8a 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47189.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47189.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory ordering between normal and ordered work functions\n\nOrdered work functions aren't guaranteed to be handled by the same thread\nwhich executed the normal work functions. The only way execution between\nnormal/ordered functions is synchronized is via the WORK_DONE_BIT,\nunfortunately the used bitops don't guarantee any ordering whatsoever.\n\nThis manifested as seemingly inexplicable crashes on ARM64, where\nasync_chunk::inode is seen as non-null in async_cow_submit which causes\nsubmit_compressed_extents to be called and crash occurs because\nasync_chunk::inode suddenly became NULL. The call trace was similar to:\n\n pc : submit_compressed_extents+0x38/0x3d0\n lr : async_cow_submit+0x50/0xd0\n sp : ffff800015d4bc20\n\n \n\n Call trace:\n submit_compressed_extents+0x38/0x3d0\n async_cow_submit+0x50/0xd0\n run_ordered_work+0xc8/0x280\n btrfs_work_helper+0x98/0x250\n process_one_work+0x1f0/0x4ac\n worker_thread+0x188/0x504\n kthread+0x110/0x114\n ret_from_fork+0x10/0x18\n\nFix this by adding respective barrier calls which ensure that all\naccesses preceding setting of WORK_DONE_BIT are strictly ordered before\nsetting the flag. At the same time add a read barrier after reading of\nWORK_DONE_BIT in run_ordered_work which ensures all subsequent loads\nwould be strictly ordered after reading the bit. This in turn ensures\nare all accesses before WORK_DONE_BIT are going to be strictly ordered\nbefore any access that can occur in ordered_func." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: arreglo del ordenamiento de memoria entre funciones de trabajo normales y ordenadas No se garantiza que las funciones de trabajo ordenadas sean manejadas por el mismo hilo que ejecut\u00f3 las funciones de trabajo normales. La \u00fanica forma de sincronizar la ejecuci\u00f3n entre funciones normales/ordenadas es a trav\u00e9s de WORK_DONE_BIT, desafortunadamente los bitops utilizados no garantizan ning\u00fan orden. Esto se manifest\u00f3 como fallas aparentemente inexplicables en ARM64, donde async_chunk::inode se ve como no nulo en async_cow_submit, lo que hace que se llame a submission_compressed_extents y se produce una falla porque async_chunk::inode de repente se volvi\u00f3 NULL. El seguimiento de llamadas fue similar a: pc : submission_compressed_extents+0x38/0x3d0 lr : async_cow_submit+0x50/0xd0 sp : ffff800015d4bc20 Seguimiento de llamadas: submission_compressed_extents+0x38/0x3d0 async_cow_submit+0x50/0xd0 run_ordered_work+0xc8/0x280 btrfs_work_helper+0x98/0x250 process_one_work+0x1f0/0x4ac worker_thread+0x188/0x504 kthread+0x110/0x114 ret_from_fork+0x10/0x18 Solucione esto agregando las llamadas de barrera respectivas que garantizan que todos los accesos anteriores a la configuraci\u00f3n de Los bits WORK_DONE_BIT se ordenan estrictamente antes de establecer la bandera. Al mismo tiempo, agregue una barrera de lectura despu\u00e9s de la lectura de WORK_DONE_BIT en run_ordered_work que garantiza que todas las cargas posteriores se ordenar\u00e1n estrictamente despu\u00e9s de leer el bit. Esto, a su vez, garantiza que todos los accesos antes de WORK_DONE_BIT se ordenar\u00e1n estrictamente antes de cualquier acceso que pueda ocurrir en ordered_func." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json index 0a0349ca7a8..311782fcc05 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47190.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf bpf: Avoid memory leak from perf_env__insert_btf()\n\nperf_env__insert_btf() doesn't insert if a duplicate BTF id is\nencountered and this causes a memory leak. Modify the function to return\na success/error value and then free the memory if insertion didn't\nhappen.\n\nv2. Adds a return -1 when the insertion error occurs in\n perf_env__fetch_btf. This doesn't affect anything as the result is\n never checked." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf bpf: Evitar p\u00e9rdida de memoria de perf_env__insert_btf() perf_env__insert_btf() no se inserta si se encuentra un ID de BTF duplicado y esto provoca una p\u00e9rdida de memoria. Modifique la funci\u00f3n para que devuelva un valor de \u00e9xito/error y luego libere la memoria si la inserci\u00f3n no ocurri\u00f3. v2. Agrega un retorno -1 cuando ocurre el error de inserci\u00f3n en perf_env__fetch_btf. Esto no afecta a nada ya que el resultado nunca se verifica." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47191.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47191.json index 532526c79dd..86f07824777 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47191.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47191.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724] program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995] dump_stack+0x108/0x15f\n[ 3813.847524] print_address_description+0xa5/0x372\n[ 3813.848243] kasan_report.cold+0x236/0x2a8\n[ 3813.849439] check_memory_region+0x240/0x270\n[ 3813.850094] memcpy+0x30/0x80\n[ 3813.850553] sg_copy_buffer+0x157/0x1e0\n[ 3813.853032] sg_copy_from_buffer+0x13/0x20\n[ 3813.853660] fill_from_dev_buffer+0x135/0x370\n[ 3813.854329] resp_readcap16+0x1ac/0x280\n[ 3813.856917] schedule_resp+0x41f/0x1630\n[ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699] scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329] scsi_request_fn+0xd8e/0x1710\n[ 3813.863946] __blk_run_queue+0x10b/0x230\n[ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220] sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637] sg_write+0x6c8/0xef0\n[ 3813.878853] __vfs_write+0xe4/0x800\n[ 3813.883487] vfs_write+0x17b/0x530\n[ 3813.884008] ksys_write+0x103/0x270\n[ 3813.886268] __x64_sys_write+0x77/0xc0\n[ 3813.886841] do_syscall_64+0x106/0x360\n[ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\\x00', 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\\x00')\nopen_by_handle_at(r1, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: scsi_debug: Se corrige la lectura fuera de los l\u00edmites en resp_readcap16(). Se observ\u00f3 la siguiente advertencia al ejecutar syzkaller: [ 3813.830724] sg_write: datos de entrada/salida 65466/242 bytes para el comando SCSI 0x9e-- adivinando datos de entrada; [ 3813.830724] El programa syz-executor no establece count y/o reply_len correctamente [ 3813.836956] ====================================================================== [ 3813.839465] ERROR: KASAN: pila fuera de los l\u00edmites en sg_copy_buffer+0x157/0x1e0 [ 3813.841773] Lectura de tama\u00f1o 4096 en la direcci\u00f3n ffff8883cf80f540 por la tarea syz-executor/1549 [ 3813.846612] Seguimiento de llamadas: [ 3813.846995] dump_stack+0x108/0x15f [ 3813.847524] print_address_description+0xa5/0x372 [ 3813.848243] kasan_report.cold+0x236/0x2a8 [ 3813.849439] check_memory_region+0x240/0x270 [ 3813.850094] memcpy+0x30/0x80 [ 3813.850553] sg_copy_buffer+0x157/0x1e0 [ 3813.853032] sg_copy_from_buffer+0x13/0x20 [ 3813.853660] llenar_desde_buffer_dev+0x135/0x370 [ 3813.854329] resp_readcap16+0x1ac/0x280 [ 3813.856917] schedule_resp+0x41f/0x1630 [ 3813.858203] comando_cola_de_depuraci\u00f3n_scsi+0xb32/0x17e0 [ 3813.862699] comando_env\u00edo_scsi+0x330/0x950 [ 3813.863329] funci\u00f3n_solicitud_scsi+0xd8e/0x1710 [ 3813.863946] cola_ejecuci\u00f3n_blk+0x10b/0x230 [ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400 [ 3813.865220] sg_common_write.isra.0+0xe61/0x2420 [ 3813.871637] sg_write+0x6c8/0xef0 [ 3813.878853] __vfs_write+0xe4/0x800 [ 3813.883487] vfs_write+0x17b/0x530 [ 3813.884008] ksys_write+0x103/0x270 [ 3813.886268] __x64_sys_write+0x77/0xc0 [ 3813.886841] do_syscall_64+0x106/0x360 [ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Este problema se puede reproducir con el siguiente registro de syzkaller: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\\x00', 0x26e1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\\x00') open_by_handle_at(r1, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40782) escribir$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126) En resp_readcap16() obtenemos el valor \"int alloc_len\" -1104926854, y luego pasamos la enorme arr_len se usa para fill_from_dev_buffer(), pero arr solo tiene 32 bytes. Esto genera OOB en sg_copy_buffer(). Para resolver este problema, defina alloc_len como u32." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json index cd761d9bfec..c1753cf9888 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: sysfs: Fix hang when device state is set via sysfs\n\nThis fixes a regression added with:\n\ncommit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after\nofflinining device\")\n\nThe problem is that after iSCSI recovery, iscsid will call into the kernel\nto set the dev's state to running, and with that patch we now call\nscsi_rescan_device() with the state_mutex held. If the SCSI error handler\nthread is just starting to test the device in scsi_send_eh_cmnd() then it's\ngoing to try to grab the state_mutex.\n\nWe are then stuck, because when scsi_rescan_device() tries to send its I/O\nscsi_queue_rq() calls -> scsi_host_queue_ready() -> scsi_host_in_recovery()\nwhich will return true (the host state is still in recovery) and I/O will\njust be requeued. scsi_send_eh_cmnd() will then never be able to grab the\nstate_mutex to finish error handling.\n\nTo prevent the deadlock move the rescan-related code to after we drop the\nstate_mutex.\n\nThis also adds a check for if we are already in the running state. This\nprevents extra scans and helps the iscsid case where if the transport class\nhas already onlined the device during its recovery process then we don't\nneed userspace to do it again plus possibly block that daemon." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: sysfs: Fix hang when device state is set via sysfs Esto corrige una regresi\u00f3n agregada con: commit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after offlinining device\") El problema es que despu\u00e9s de la recuperaci\u00f3n de iSCSI, iscsid llamar\u00e1 al kernel para establecer el estado del dev en running, y con ese parche ahora llamamos a scsi_rescan_device() con el state_mutex retenido. Si el hilo del controlador de errores SCSI est\u00e1 empezando a probar el dispositivo en scsi_send_eh_cmnd() entonces va a intentar capturar el state_mutex. Entonces estamos atascados, porque cuando scsi_rescan_device() intenta enviar su E/S, scsi_queue_rq() llama a -> scsi_host_queue_ready() -> scsi_host_in_recovery() que devolver\u00e1 verdadero (el estado del host todav\u00eda est\u00e1 en recuperaci\u00f3n) y la E/S simplemente se volver\u00e1 a poner en cola. scsi_send_eh_cmnd() nunca podr\u00e1 tomar el state_mutex para finalizar el manejo de errores. Para evitar el punto muerto, mueva el c\u00f3digo relacionado con el rescan a despu\u00e9s de que eliminemos el state_mutex. Esto tambi\u00e9n agrega una verificaci\u00f3n para ver si ya estamos en el estado de ejecuci\u00f3n. Esto evita escaneos adicionales y ayuda al caso iscsid donde si la clase de transporte ya ha puesto en l\u00ednea el dispositivo durante su proceso de recuperaci\u00f3n, entonces no necesitamos espacio de usuario para hacerlo nuevamente y posiblemente bloquear ese daemon." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json index da01a0c788a..e4190a0961c 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47196.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Set send and receive CQ before forwarding to the driver\n\nPreset both receive and send CQ pointers prior to call to the drivers and\noverwrite it later again till the mlx4 is going to be changed do not\noverwrite ibqp properties.\n\nThis change is needed for mlx5, because in case of QP creation failure, it\nwill go to the path of QP destroy which relies on proper CQ pointers.\n\n BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]\n Write of size 8 at addr ffff8880064c55c0 by task a.out/246\n\n CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Call Trace:\n dump_stack_lvl+0x45/0x59\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x83/0xdf\n create_qp.cold+0x164/0x16e [mlx5_ib]\n mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]\n create_qp.part.0+0x45b/0x6a0 [ib_core]\n ib_create_qp_user+0x97/0x150 [ib_core]\n ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n __x64_sys_ioctl+0x866/0x14d0\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Allocated by task 246:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0xa4/0xd0\n create_qp.part.0+0x92/0x6a0 [ib_core]\n ib_create_qp_user+0x97/0x150 [ib_core]\n ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n __x64_sys_ioctl+0x866/0x14d0\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n Freed by task 246:\n kasan_save_stack+0x1b/0x40\n kasan_set_track+0x1c/0x30\n kasan_set_free_info+0x20/0x30\n __kasan_slab_free+0x10c/0x150\n slab_free_freelist_hook+0xb4/0x1b0\n kfree+0xe7/0x2a0\n create_qp.part.0+0x52b/0x6a0 [ib_core]\n ib_create_qp_user+0x97/0x150 [ib_core]\n ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]\n ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]\n ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]\n __x64_sys_ioctl+0x866/0x14d0\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/core: Establecer el CQ de env\u00edo y recepci\u00f3n antes de reenviar al controlador Preestablecer los punteros CQ de env\u00edo y recepci\u00f3n antes de llamar a los controladores y sobrescribirlos m\u00e1s tarde nuevamente hasta que se vaya a cambiar mlx4 no sobrescribir las propiedades ibqp. Este cambio es necesario para mlx5, porque en caso de falla en la creaci\u00f3n de QP, ir\u00e1 a la ruta de destrucci\u00f3n de QP que depende de punteros CQ adecuados. BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib] Write of size 8 at addr ffff8880064c55c0 by task a.out/246 CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x45/0x59 print_address_description.constprop.0+0x1f/0x140 kasan_report.cold+0x83/0xdf create_qp.cold+0x164/0x16e [mlx5_ib] mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib] create_qp.part.0+0x45b/0x6a0 [ib_core] ib_create_qp_user+0x97/0x150 [ib_core] ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs] ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs] ib_uverbs_ioctl+0x169/0x260 [ib_uverbs] __x64_sys_ioctl+0x866/0x14d0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae Allocated by task 246: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0xa4/0xd0 create_qp.part.0+0x92/0x6a0 [ib_core] ib_create_qp_user+0x97/0x150 [ib_core] ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs] ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs] ib_uverbs_ioctl+0x169/0x260 [ib_uverbs] __x64_sys_ioctl+0x866/0x14d0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae Freed by task 246: kasan_save_stack+0x1b/0x40 kasan_set_track+0x1c/0x30 kasan_set_free_info+0x20/0x30 __kasan_slab_free+0x10c/0x150 slab_free_freelist_hook+0xb4/0x1b0 kfree+0xe7/0x2a0 create_qp.part.0+0x52b/0x6a0 [ib_core] ib_create_qp_user+0x97/0x150 [ib_core] ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs] ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs] ib_uverbs_ioctl+0x169/0x260 [ib_uverbs] __x64_sys_ioctl+0x866/0x14d0 do_syscall_64+0x3d/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae " } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47197.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47197.json index 90a45605f33..de89a835dd3 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47197.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47197.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it proceeds\nto rest of destroy operations. mlx5_core_destroy_cq() could be called again\nby user and cause additional call of mlx5_debug_cq_remove().\ncq->dbg was not nullify in previous call and cause the crash.\n\nFix it by nullify cq->dbg pointer after removal.\n\nAlso proceed to destroy operations only if FW return 0\nfor MLX5_CMD_OP_DESTROY_CQ command.\n\ngeneral protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI\nCPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:lockref_get+0x1/0x60\nCode: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02\n00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 <48> 8b 17\n48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48\nRSP: 0018:ffff888137dd7a38 EFLAGS: 00010206\nRAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe\nRDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058\nRBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88\nR10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000\nR13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0\nFS: 00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0\nCall Trace:\n simple_recursive_removal+0x33/0x2e0\n ? debugfs_remove+0x60/0x60\n debugfs_remove+0x40/0x60\n mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]\n mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]\n devx_obj_cleanup+0x151/0x330 [mlx5_ib]\n ? __pollwait+0xd0/0xd0\n ? xas_load+0x5/0x70\n ? xa_load+0x62/0xa0\n destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]\n uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]\n uobj_destroy+0x54/0xa0 [ib_uverbs]\n ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]\n ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]\n ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]\n __x64_sys_ioctl+0x3e4/0x8e0" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: anular el puntero cq->dbg en mlx5_debug_cq_remove() Antes de este parche, en caso de que mlx5_core_destroy_cq() fallara, se proced\u00eda al resto de las operaciones de destrucci\u00f3n. El usuario pod\u00eda volver a llamar a mlx5_core_destroy_cq() y provocar una llamada adicional de mlx5_debug_cq_remove(). cq->dbg no se anul\u00f3 en la llamada anterior y provoc\u00f3 el bloqueo. Arr\u00e9glelo anulando el puntero cq->dbg despu\u00e9s de la eliminaci\u00f3n. Tambi\u00e9n proceda a destruir las operaciones solo si el firmware devuelve 0 para el comando MLX5_CMD_OP_DESTROY_CQ. Fallo de protecci\u00f3n general, probablemente por direcci\u00f3n no can\u00f3nica 0x2000300004058:0000 [#1] SMP PTI CPU: 5 PID: 1228 Comm: python No contaminado 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 RIP: 0010:lockref_get+0x1/0x60 C\u00f3digo: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02 00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 <48> 8b 17 48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48 RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206 RAX: 000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe RDX: 00000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058 RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000 R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0 FS: 00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0 Seguimiento de llamadas: simple_recursive_removal+0x33/0x2e0 ? debugfs_remove+0x60/0x60 debugfs_remove+0x40/0x60 mlx5_debug_cq_remove+0x32/0x70 [mlx5_core] mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core] devx_obj_cleanup+0x151/0x330 [mlx5_ib] ? __pollwait+0xd0/0xd0 ? xas_load+0x5/0x70 ? uverbs_destruir_uobject+0x3b/0x360 [ib_uverbs] uobj_destruir+0x54/0xa0 [ib_uverbs] ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs] ? uverbs_finalizar_objeto+0xd0/0xd0 [ib_uverbs] ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs] __x64_sys_ioctl+0x3e4/0x8e0" } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47199.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47199.json index bafa366a185..809584381c1 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47199.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47199.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: CT, Fix multiple allocations and memleak of mod acts\n\nCT clear action offload adds additional mod hdr actions to the\nflow's original mod actions in order to clear the registers which\nhold ct_state.\nWhen such flow also includes encap action, a neigh update event\ncan cause the driver to unoffload the flow and then reoffload it.\n\nEach time this happens, the ct clear handling adds that same set\nof mod hdr actions to reset ct_state until the max of mod hdr\nactions is reached.\n\nAlso the driver never releases the allocated mod hdr actions and\ncausing a memleak.\n\nFix above two issues by moving CT clear mod acts allocation\ninto the parsing actions phase and only use it when offloading the rule.\nThe release of mod acts will be done in the normal flow_put().\n\n backtrace:\n [<000000007316e2f3>] krealloc+0x83/0xd0\n [<00000000ef157de1>] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]\n [<00000000970ce4ae>] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]\n [<0000000067c5fa17>] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]\n [<00000000d032eb98>] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]\n [<00000000fd23b869>] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]\n [<000000004fc24acc>] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]\n [<00000000dc741c17>] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]\n [<00000000e92e49d7>] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]\n [<00000000f60f5602>] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: CT, corrige asignaciones m\u00faltiples y fuga de memoria de actos mod La descarga de la acci\u00f3n CT clear agrega acciones mod hdr adicionales a las acciones mod originales del flujo para borrar los registros que contienen ct_state. Cuando dicho flujo tambi\u00e9n incluye la acci\u00f3n encap, un evento de actualizaci\u00f3n vecinal puede hacer que el controlador descargue el flujo y luego lo vuelva a descargar. Cada vez que esto sucede, el manejo de ct clear agrega ese mismo conjunto de acciones mod hdr para restablecer ct_state hasta que se alcanza el m\u00e1ximo de acciones mod hdr. Adem\u00e1s, el controlador nunca libera las acciones mod hdr asignadas y causa una fuga de memoria. Corrija los dos problemas anteriores moviendo la asignaci\u00f3n de actos mod de CT clear a la fase de acciones de an\u00e1lisis y solo \u00faselo al descargar la regla. La liberaci\u00f3n de actos mod se realizar\u00e1 en el flow_put() normal. seguimiento inverso: [<000000007316e2f3>] krealloc+0x83/0xd0 [<00000000ef157de1>] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core] [<00000000970ce4ae>] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core] [<0000000067c5fa17>] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core] [<00000000d032eb98>] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core] [<00000000fd23b869>] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core] [<000000004fc24acc>] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core] [<00000000dc741c17>] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core] [<00000000e92e49d7>] mlx5e_rep_actualizaci\u00f3n_flujos+0x6e4/0x9b0 [mlx5_core] [<00000000f60f5602>] mlx5e_rep_neigh_actualizaci\u00f3n+0x39a/0x5d0 [mlx5_core]" } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json index e090e7d084f..b68fe26e80d 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47200.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/prime: Fix use after free in mmap with drm_gem_ttm_mmap\n\ndrm_gem_ttm_mmap() drops a reference to the gem object on success. If\nthe gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that\ndrop will free the gem object, and the subsequent drm_gem_object_get()\nwill be a UAF. Fix by grabbing a reference before calling the mmap\nhelper.\n\nThis issue was forseen when the reference dropping was adding in\ncommit 9786b65bc61ac (\"drm/ttm: fix mmap refcounting\"):\n \"For that to work properly the drm_gem_object_get() call in\n drm_gem_ttm_mmap() must be moved so it happens before calling\n obj->funcs->mmap(), otherwise the gem refcount would go down\n to zero.\"" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/prime: Arreglar el use-after-free en mmap con drm_gem_ttm_mmap drm_gem_ttm_mmap() elimina una referencia al objeto gema en caso de \u00e9xito. Si el refcount del objeto gema == 1 en la entrada a drm_gem_prime_mmap(), esa eliminaci\u00f3n liberar\u00e1 el objeto gema y el drm_gem_object_get() posterior ser\u00e1 un UAF. Se soluciona tomando una referencia antes de llamar al ayudante mmap. Este problema se previ\u00f3 cuando se agreg\u00f3 la eliminaci\u00f3n de referencia en el commit 9786b65bc61ac (\"drm/ttm: corregir el recuento de referencias mmap\"): \"Para que eso funcione correctamente, la llamada drm_gem_object_get() en drm_gem_ttm_mmap() debe moverse para que suceda antes de llamar a obj->funcs->mmap(), de lo contrario, el recuento de referencias de la gema bajar\u00eda a cero\"." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json index 10dfefaca73..2ffa84905af 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47201.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter->num_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iavf: libera q_vectors antes de las colas en iavf_disable_vf iavf_free_queues() borra adaptador->num_active_queues, del que depende iavf_free_q_vectors(), por lo que se debe intercambiar el orden de estas dos llamadas de funci\u00f3n en iavf_disable_vf(). Esto resuelve un p\u00e1nico que se produce cuando se deshabilita la interfaz y luego se vuelve a activar despu\u00e9s de que se restablece la comunicaci\u00f3n PF." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47202.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47202.json index 271f908a57b..822c6b0d34d 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47202.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47202.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: Fix NULL pointer dereferences in of_thermal_ functions\n\nof_parse_thermal_zones() parses the thermal-zones node and registers a\nthermal_zone device for each subnode. However, if a thermal zone is\nconsuming a thermal sensor and that thermal sensor device hasn't probed\nyet, an attempt to set trip_point_*_temp for that thermal zone device\ncan cause a NULL pointer dereference. Fix it.\n\n console:/sys/class/thermal/thermal_zone87 # echo 120000 > trip_point_0_temp\n ...\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020\n ...\n Call trace:\n of_thermal_set_trip_temp+0x40/0xc4\n trip_point_temp_store+0xc0/0x1dc\n dev_attr_store+0x38/0x88\n sysfs_kf_write+0x64/0xc0\n kernfs_fop_write_iter+0x108/0x1d0\n vfs_write+0x2f4/0x368\n ksys_write+0x7c/0xec\n __arm64_sys_write+0x20/0x30\n el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc\n do_el0_svc+0x28/0xa0\n el0_svc+0x14/0x24\n el0_sync_handler+0x88/0xec\n el0_sync+0x1c0/0x200\n\nWhile at it, fix the possible NULL pointer dereference in other\nfunctions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),\nof_thermal_get_trend()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: thermal: Fix NULL pointer dereferences in of_thermal_ functions of_parse_thermal_zones() analiza el nodo thermal-zones y registra un dispositivo thermal_zone para cada subnodo. Sin embargo, si una zona t\u00e9rmica est\u00e1 consumiendo un sensor t\u00e9rmico y ese dispositivo de sensor t\u00e9rmico a\u00fan no ha realizado la prueba, un intento de establecer trip_point_*_temp para ese dispositivo de zona t\u00e9rmica puede provocar una desreferencia de puntero NULL. Arr\u00e9glelo. console:/sys/class/thermal/thermal_zone87 # echo 120000 > trip_point_0_temp ... No se puede manejar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000020 ... Seguimiento de llamadas: of_thermal_set_trip_temp+0x40/0xc4 trip_point_temp_store+0xc0/0x1dc dev_attr_store+0x38/0x88 sysfs_kf_write+0x64/0xc0 kernfs_fop_write_iter+0x108/0x1d0 vfs_write+0x2f4/0x368 ksys_write+0x7c/0xec __arm64_sys_write+0x20/0x30 el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc do_el0_svc+0x28/0xa0 el0_svc+0x14/0x24 el0_sync_handler+0x88/0xec el0_sync+0x1c0/0x200 Mientras tanto, corrija tambi\u00e9n la posible desreferencia del puntero NULL en otras funciones: of_thermal_get_temp(), of_thermal_set_emul_temp(), of_thermal_get_trend()." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json index d991487a676..23542170b99 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47203.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\nWhen parsing the txq list in lpfc_drain_txq(), the driver attempts to pass\nthe requests to the adapter. If such an attempt fails, a local \"fail_msg\"\nstring is set and a log message output. The job is then added to a\ncompletions list for cancellation.\n\nProcessing of any further jobs from the txq list continues, but since\n\"fail_msg\" remains set, jobs are added to the completions list regardless\nof whether a wqe was passed to the adapter. If successfully added to\ntxcmplq, jobs are added to both lists resulting in list corruption.\n\nFix by clearing the fail_msg string after adding a job to the completions\nlist. This stops the subsequent jobs from being added to the completions\nlist unless they had an appropriate failure." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se corrige la corrupci\u00f3n de list_add() en lpfc_drain_txq() Al analizar la lista txq en lpfc_drain_txq(), el controlador intenta pasar las solicitudes al adaptador. Si dicho intento falla, se establece una cadena \"fail_msg\" local y se genera un mensaje de registro. Luego, el trabajo se agrega a una lista de finalizaciones para su cancelaci\u00f3n. El procesamiento de cualquier otro trabajo de la lista txq contin\u00faa, pero como \"fail_msg\" permanece establecido, los trabajos se agregan a la lista de finalizaciones independientemente de si se pas\u00f3 un wqe al adaptador. Si se agrega correctamente a txcmplq, los trabajos se agregan a ambas listas, lo que da como resultado la corrupci\u00f3n de la lista. Se soluciona borrando la cadena fail_msg despu\u00e9s de agregar un trabajo a la lista de finalizaciones. Esto evita que los trabajos posteriores se agreguen a la lista de finalizaciones a menos que hayan tenido una falla apropiada." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json index 0c2f6095072..aea9f989c23 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47204.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dpaa2-eth: fix use-after-free in dpaa2_eth_remove\n\nAccess to netdev after free_netdev() will cause use-after-free bug.\nMove debug log before free_netdev() call to avoid it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dpaa2-eth: se ha corregido el error use-after-free en dpaa2_eth_remove. El acceso a netdev despu\u00e9s de free_netdev() provocar\u00e1 un error use-after-free. Mueva el registro de depuraci\u00f3n antes de la llamada free_netdev() para evitarlo." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json index b8b4a2e965d..ec2c7edfc03 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47205.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: Unregister clocks/resets when unbinding\n\nCurrently, unbinding a CCU driver unmaps the device's MMIO region, while\nleaving its clocks/resets and their providers registered. This can cause\na page fault later when some clock operation tries to perform MMIO. Fix\nthis by separating the CCU initialization from the memory allocation,\nand then using a devres callback to unregister the clocks and resets.\n\nThis also fixes a memory leak of the `struct ccu_reset`, and uses the\ncorrect owner (the specific platform driver) for the clocks and resets.\n\nEarly OF clock providers are never unregistered, and limited error\nhandling is possible, so they are mostly unchanged. The error reporting\nis made more consistent by moving the message inside of_sunxi_ccu_probe." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: sunxi-ng: Anular el registro de relojes/reinicios al desvincular Actualmente, desvincular un controlador CCU anula la asignaci\u00f3n de la regi\u00f3n MMIO del dispositivo, mientras que deja sus relojes/reinicios y sus proveedores registrados. Esto puede causar una falla de p\u00e1gina m\u00e1s adelante cuando alguna operaci\u00f3n de reloj intenta realizar MMIO. Solucione esto separando la inicializaci\u00f3n de CCU de la asignaci\u00f3n de memoria y luego usando una devoluci\u00f3n de llamada devres para anular el registro de los relojes y reinicios. Esto tambi\u00e9n corrige una p\u00e9rdida de memoria de `struct ccu_reset` y usa el propietario correcto (el controlador de plataforma espec\u00edfico) para los relojes y reinicios. Los primeros proveedores de reloj OF nunca se anulan del registro y es posible un manejo de errores limitado, por lo que en su mayor\u00eda no se modifican. El informe de errores se hace m\u00e1s consistente moviendo el mensaje dentro de of_sunxi_ccu_probe." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json index 653f6f6de75..af21ec9d68c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47206.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: host: ohci-tmio: verificar el valor de retorno despu\u00e9s de llamar a platform_get_resource() Causar\u00e1 null-ptr-deref si platform_get_resource() devuelve NULL, necesitamos verificar el valor de retorno." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json index d6714caae63..ca765e34e22 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47207.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: gus: fix null pointer dereference on pointer block\n\nThe pointer block return from snd_gf1_dma_next_block could be\nnull, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: gus: corrige la desreferencia de puntero nulo en el bloque de puntero El bloque de puntero devuelto por snd_gf1_dma_next_block podr\u00eda ser nulo, por lo que existe un posible problema de desreferencia de puntero nulo. Solucione esto agregando una verificaci\u00f3n nula antes de la desreferencia." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json index 129a14d564b..1297501cc06 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47209.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Prevent dead task groups from regaining cfs_rq's\n\nKevin is reporting crashes which point to a use-after-free of a cfs_rq\nin update_blocked_averages(). Initial debugging revealed that we've\nlive cfs_rq's (on_list=1) in an about to be kfree()'d task group in\nfree_fair_sched_group(). However, it was unclear how that can happen.\n\nHis kernel config happened to lead to a layout of struct sched_entity\nthat put the 'my_q' member directly into the middle of the object\nwhich makes it incidentally overlap with SLUB's freelist pointer.\nThat, in combination with SLAB_FREELIST_HARDENED's freelist pointer\nmangling, leads to a reliable access violation in form of a #GP which\nmade the UAF fail fast.\n\nMichal seems to have run into the same issue[1]. He already correctly\ndiagnosed that commit a7b359fc6a37 (\"sched/fair: Correctly insert\ncfs_rq's to list on unthrottle\") is causing the preconditions for the\nUAF to happen by re-adding cfs_rq's also to task groups that have no\nmore running tasks, i.e. also to dead ones. His analysis, however,\nmisses the real root cause and it cannot be seen from the crash\nbacktrace only, as the real offender is tg_unthrottle_up() getting\ncalled via sched_cfs_period_timer() via the timer interrupt at an\ninconvenient time.\n\nWhen unregister_fair_sched_group() unlinks all cfs_rq's from the dying\ntask group, it doesn't protect itself from getting interrupted. If the\ntimer interrupt triggers while we iterate over all CPUs or after\nunregister_fair_sched_group() has finished but prior to unlinking the\ntask group, sched_cfs_period_timer() will execute and walk the list of\ntask groups, trying to unthrottle cfs_rq's, i.e. re-add them to the\ndying task group. These will later -- in free_fair_sched_group() -- be\nkfree()'ed while still being linked, leading to the fireworks Kevin\nand Michal are seeing.\n\nTo fix this race, ensure the dying task group gets unlinked first.\nHowever, simply switching the order of unregistering and unlinking the\ntask group isn't sufficient, as concurrent RCU walkers might still see\nit, as can be seen below:\n\n CPU1: CPU2:\n : timer IRQ:\n : do_sched_cfs_period_timer():\n : :\n : distribute_cfs_runtime():\n : rcu_read_lock();\n : :\n : unthrottle_cfs_rq():\n sched_offline_group(): :\n : walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026):\n list_del_rcu(&tg->list); :\n (1) : list_for_each_entry_rcu(child, &parent->children, siblings)\n : :\n (2) list_del_rcu(&tg->siblings); :\n : tg_unthrottle_up():\n unregister_fair_sched_group(): struct cfs_rq *cfs_rq = tg->cfs_rq[cpu_of(rq)];\n : :\n list_del_leaf_cfs_rq(tg->cfs_rq[cpu]); :\n : :\n : if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq->nr_running)\n (3) : list_add_leaf_cfs_rq(cfs_rq);\n : :\n : :\n : :\n : :\n : \n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/fair: Evitar que los grupos de tareas inactivos recuperen cfs_rq Kevin informa fallos que apuntan a un use-after-free de un cfs_rq en update_blocked_averages(). La depuraci\u00f3n inicial revel\u00f3 que tenemos cfs_rq activos (on_list=1) en un grupo de tareas a punto de ser kfree() en free_fair_sched_group(). Sin embargo, no estaba claro c\u00f3mo puede suceder eso. Su configuraci\u00f3n del kernel result\u00f3 en un dise\u00f1o de struct sched_entity que coloca el miembro 'my_q' directamente en el medio del objeto, lo que hace que se superponga incidentalmente con el puntero de lista libre de SLUB. Eso, en combinaci\u00f3n con la manipulaci\u00f3n del puntero de lista libre de SLAB_FREELIST_HARDENED, conduce a una violaci\u00f3n de acceso confiable en forma de un #GP que hizo que el UAF fallara r\u00e1pidamente. Michal parece haberse topado con el mismo problema[1]. \u00c9l ya diagnostic\u00f3 correctamente que el commit a7b359fc6a37 (\"sched/fair: Insertar correctamente cfs_rq en la lista al desregular\") est\u00e1 causando que se cumplan las condiciones previas para que se produzca la UAF al volver a agregar cfs_rq tambi\u00e9n a los grupos de tareas que ya no tienen tareas en ejecuci\u00f3n, es decir, tambi\u00e9n a los que est\u00e1n inactivos. Sin embargo, su an\u00e1lisis no detecta la causa ra\u00edz real y no se puede ver solo desde el backtrace del bloqueo, ya que el verdadero infractor es tg_unthrottle_up() que se llama a trav\u00e9s de sched_cfs_period_timer() mediante la interrupci\u00f3n del temporizador en un momento inconveniente. Cuando unregister_fair_sched_group() desvincula todos los cfs_rq del grupo de tareas que est\u00e1 inactivo, no se protege a s\u00ed mismo de ser interrumpido. Si la interrupci\u00f3n del temporizador se activa mientras iteramos sobre todas las CPU o despu\u00e9s de que unregister_fair_sched_group() haya terminado pero antes de desvincular el grupo de tareas, sched_cfs_period_timer() se ejecutar\u00e1 y recorrer\u00e1 la lista de grupos de tareas, intentando liberar cfs_rq, es decir, volver a agregarlos al grupo de tareas moribundo. Estos ser\u00e1n posteriormente -- en free_fair_sched_group() -- kfree()'ed mientras siguen vinculados, lo que lleva a los fuegos artificiales que Kevin y Michal est\u00e1n viendo. Para solucionar esta ejecuci\u00f3n, aseg\u00farese de que el grupo de tareas moribundo se desvincule primero. Sin embargo, simplemente cambiar el orden de anulaci\u00f3n del registro y desvinculaci\u00f3n del grupo de tareas no es suficiente, ya que los caminantes de RCU concurrentes a\u00fan podr\u00edan verlo, como se puede ver a continuaci\u00f3n: CPU1: CPU2: : timer IRQ: : do_sched_cfs_period_timer(): : : : distributed_cfs_runtime(): : rcu_read_lock(); : : : unthrottle_cfs_rq(): sched_offline_group(): : : walk_tg_tree_from(\u2026,tg_unthrottle_up,\u2026): list_del_rcu(&tg->list); : (1) : list_for_each_entry_rcu(child, &parent->children, brothers) : : (2) list_del_rcu(&tg->siblings); : : tg_unthrottle_up(): anular_registro_justo_sched_group(): struct cfs_rq *cfs_rq = tg->cfs_rq[cpu_of(rq)]; : : list_del_leaf_cfs_rq(tg->cfs_rq[cpu]); : : : : si (!cfs_rq_est\u00e1_deca\u00eddo(cfs_rq) || cfs_rq->nr_en_ejecuci\u00f3n) (3) : lista_agregar_hoja_cfs_rq(cfs_rq); : : : : : : : : : ---truncado---" } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json index 0c23a629b31..a925933a366 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47210.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tipd: Remove WARN_ON in tps6598x_block_read\n\nCalling tps6598x_block_read with a higher than allowed len can be\nhandled by just returning an error. There's no need to crash systems\nwith panic-on-warn enabled." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: tipd: Eliminar WARN_ON en tps6598x_block_read Llamar a tps6598x_block_read con una longitud mayor que la permitida se puede solucionar simplemente devolviendo un error. No es necesario bloquear los sistemas con la funci\u00f3n de p\u00e1nico al advertir habilitada." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47211.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47211.json index 09d4103be95..92613907517 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47211.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47211.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: fix null pointer dereference on pointer cs_desc\n\nThe pointer cs_desc return from snd_usb_find_clock_source could\nbe null, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: usb-audio: se corrige la desreferencia de puntero nulo en el puntero cs_desc El puntero cs_desc devuelto por snd_usb_find_clock_source podr\u00eda ser nulo, por lo que existe un posible problema de desreferencia de puntero nulo. Solucione esto agregando una comprobaci\u00f3n de nulo antes de la desreferencia." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json index 92682cbb3a9..f2fc0b99381 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47212.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518] ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596] remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641] disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615] __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640] ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663] __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640] auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661] device_release_driver_internal+0x103/0x1f0\n[ 2633.545679] bus_remove_device+0xf7/0x170\n[ 2633.546640] device_del+0x181/0x410\n[ 2633.547606] mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777] mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841] mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864] remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819] pci_device_remove+0x3b/0xc0\n[ 2633.552731] device_release_driver_internal+0x103/0x1f0\n[ 2633.553746] unbind_store+0xf6/0x130\n[ 2633.554657] kernfs_fop_write+0x116/0x190\n[ 2633.555567] vfs_write+0xa5/0x1a0\n[ 2633.556407] ksys_write+0x4f/0xb0\n[ 2633.557233] do_syscall_64+0x5b/0x1a0\n[ 2633.558071] entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Actualizar el controlador de errores para UCTX y UMEM En el flujo de descarga r\u00e1pida, el estado del dispositivo se establece en error interno, lo que indica que el controlador inici\u00f3 el proceso de destrucci\u00f3n. En este caso, cuando se ejecuta un comando de destrucci\u00f3n, debe devolver MLX5_CMD_STAT_OK. Corrija MLX5_CMD_OP_DESTROY_UCTX y MLX5_CMD_OP_DESTROY_UMEM para que devuelvan OK en lugar de EIO. Esto corrige un seguimiento de llamadas en el proceso de lanzamiento de umem - [ 2633.536695] Seguimiento de llamadas: [ 2633.537518] ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs] [ 2633.538596] remove_client_context+0x8b/0xd0 [ib_core] [ 2633.539641] deshabilitar_device+0x8c/0x130 [ib_core] [ 2633.540615] __ib_unregister_device+0x35/0xa0 [ib_core] [ 2633.541640] ib_unregister_device+0x21/0x30 [ib_core] [ 2633.542663] __mlx5_ib_remove+0x38/0x90 [mlx5_ib] [ 2633.543640] bus_auxiliar_eliminar+0x1e/0x30 [auxiliar] [ 2633.544661] dispositivo_liberaci\u00f3n_controlador_interno+0x103/0x1f0 [ 2633.545679] bus_eliminar_dispositivo+0xf7/0x170 [ 2633.546640] dispositivo_del+0x181/0x410 [ 2633.547606] mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core] [ 2633.548777] mlx5_anular_registro_dispositivo+0x27/0x40 [mlx5_core] [ 2633.549841] mlx5_uninit_one+0x21/0xc0 [mlx5_core] [ 2633.550864] remove_one+0x69/0xe0 [mlx5_core] [ 2633.551819] pci_device_remove+0x3b/0xc0 [ 2633.552731] device_release_driver_internal+0x103/0x1f0 [ 2633.553746] unbind_store+0xf6/0x130 [ 2633.554657] kernfs_fop_write+0x116/0x190 [ 2633.555567] vfs_write+0xa5/0x1a0 [ 2633.556407] ksys_write+0x4f/0xb0 [ 2633.557233] do_syscall_64+0x5b/0x1a0 [ 2633.558071] entry_SYSCALL_64_after_hwframe+0x65/0xca [ 2633.559018] RIP: 0033:0x7f9977132648 [ 2633.559821] C\u00f3digo: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55 [ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648 [ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001 [ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740 [ 2633.566653] R10: 000000000000000 R11: 0000000000000246 R12: 00007f99774056e0 [ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c [ 2633.568725] ---[ fin de seguimiento 10b4fe52945e544d ]---" } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json index eacda6decc6..cfc507bf6f6 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47214.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhugetlb, userfaultfd: fix reservation restore on userfaultfd error\n\nCurrently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we\nbail out using \"goto out_release_unlock;\" in the cases where idx >=\nsize, or !huge_pte_none(), the code will detect that new_pagecache_page\n== false, and so call restore_reserve_on_error(). In this case I see\nrestore_reserve_on_error() delete the reservation, and the following\ncall to remove_inode_hugepages() will increment h->resv_hugepages\ncausing a 100% reproducible leak.\n\nWe should treat the is_continue case similar to adding a page into the\npagecache and set new_pagecache_page to true, to indicate that there is\nno reservation to restore on the error path, and we need not call\nrestore_reserve_on_error(). Rename new_pagecache_page to\npage_in_pagecache to make that clear." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hugetlb, userfaultfd: se corrige el error de restauraci\u00f3n de reserva en userfaultfd Actualmente, en el caso is_continue en hugetlb_mcopy_atomic_pte(), si salimos usando \"goto out_release_unlock;\" en los casos donde idx >= size, o !huge_pte_none(), el c\u00f3digo detectar\u00e1 que new_pagecache_page == false, y por lo tanto llamar\u00e1 a restore_reserve_on_error(). En este caso, veo que restore_reserve_on_error() elimina la reserva, y la siguiente llamada a remove_inode_hugepages() incrementar\u00e1 h->resv_hugepages causando una fuga 100% reproducible. Deber\u00edamos tratar el caso is_continue de forma similar a agregar una p\u00e1gina al pagecache y establecer new_pagecache_page en true, para indicar que no hay ninguna reserva para restaurar en la ruta del error, y no necesitamos llamar a restore_reserve_on_error(). Cambie el nombre new_pagecache_page a page_in_pagecache para que quede claro." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json index 34d94aa4fd5..5d5abab5823 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47215.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix crash in RX resync flow\n\nFor the TLS RX resync flow, we maintain a list of TLS contexts\nthat require some attention, to communicate their resync information\nto the HW.\nHere we fix list corruptions, by protecting the entries against\nmovements coming from resync_handle_seq_match(), until their resync\nhandling in napi is fully completed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: kTLS, se corrige un fallo en el flujo de resincronizaci\u00f3n RX Para el flujo de resincronizaci\u00f3n RX de TLS, mantenemos una lista de contextos TLS que requieren cierta atenci\u00f3n para comunicar su informaci\u00f3n de resincronizaci\u00f3n al hardware. Aqu\u00ed corregimos las corrupciones de la lista al proteger las entradas contra los movimientos provenientes de resync_handle_seq_match(), hasta que se complete por completo su manejo de resincronizaci\u00f3n en napi." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47216.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47216.json index 8244ae43b6e..45893add130 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47216.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47216.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: advansys: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to 'unsigned\nlong' and printed with %lx.\n\nChange %lx to %p to print the hashed pointer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: advansys: Fix kernel pointer leak Los punteros se deben imprimir con %p o %px en lugar de convertirse en 'unsigned long' e imprimirse con %lx. Cambie %lx a %p para imprimir el puntero con hash." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47217.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47217.json index 499cca75a60..2c3799a6bbc 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47217.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47217.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails\n\nCheck for a valid hv_vp_index array prior to derefencing hv_vp_index when\nsetting Hyper-V's TSC change callback. If Hyper-V setup failed in\nhyperv_init(), the kernel will still report that it's running under\nHyper-V, but will have silently disabled nearly all functionality.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP\n CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n RIP: 0010:set_hv_tscchange_cb+0x15/0xa0\n Code: <8b> 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08\n ...\n Call Trace:\n kvm_arch_init+0x17c/0x280\n kvm_init+0x31/0x330\n vmx_init+0xba/0x13a\n do_one_initcall+0x41/0x1c0\n kernel_init_freeable+0x1f2/0x23b\n kernel_init+0x16/0x120\n ret_from_fork+0x22/0x30" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/hyperv: Se corrige la desreferencia NULL en set_hv_tscchange_cb() si falla la configuraci\u00f3n de Hyper-V. Verifique si hay una matriz hv_vp_index v\u00e1lida antes de desreferenciar hv_vp_index al configurar la devoluci\u00f3n de llamada de cambio de TSC de Hyper-V. Si la configuraci\u00f3n de Hyper-V fall\u00f3 en hyperv_init(), el kernel a\u00fan informar\u00e1 que se est\u00e1 ejecutando bajo Hyper-V, pero habr\u00e1 deshabilitado silenciosamente casi todas las funciones. ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000010 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Oops: 0000 [#1] SMP CPU: 4 PID: 1 Comm: swapper/0 No contaminado 5.15.0-rc2+ #75 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:set_hv_tscchange_cb+0x15/0xa0 C\u00f3digo: <8b> 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08 ... Seguimiento de llamadas: kvm_arch_init+0x17c/0x280 kvm_init+0x31/0x330 vmx_init+0xba/0x13a do_one_initcall+0x41/0x1c0 kernel_init_freeable+0x1f2/0x23b kernel_init+0x16/0x120 ret_from_fork+0x22/0x30" } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47218.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47218.json index 691dc2863d2..c3df99beab3 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47218.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47218.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix NULL-pointer dereference when hashtab allocation fails\n\nWhen the hash table slot array allocation fails in hashtab_init(),\nh->size is left initialized with a non-zero value, but the h->htable\npointer is NULL. This may then cause a NULL pointer dereference, since\nthe policydb code relies on the assumption that even after a failed\nhashtab_init(), hashtab_map() and hashtab_destroy() can be safely called\non it. Yet, these detect an empty hashtab only by looking at the size.\n\nFix this by making sure that hashtab_init() always leaves behind a valid\nempty hashtab when the allocation fails." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: selinux: corregir la desreferencia de puntero NULL cuando falla la asignaci\u00f3n de hashtab Cuando la asignaci\u00f3n de la matriz de ranuras de la tabla hash falla en hashtab_init(), h->size se deja inicializado con un valor distinto de cero, pero el puntero h->htable es NULL. Esto puede causar una desreferencia de puntero NULL, ya que el c\u00f3digo policydb se basa en la suposici\u00f3n de que incluso despu\u00e9s de un hashtab_init() fallido, se pueden llamar hashtab_map() y hashtab_destroy() de forma segura. Sin embargo, estos detectan un hashtab vac\u00edo solo mirando el tama\u00f1o. Solucione esto asegur\u00e1ndose de que hashtab_init() siempre deje atr\u00e1s un hashtab vac\u00edo v\u00e1lido cuando falla la asignaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json index dd6ea6a15d2..e991efa0ef2 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47219.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get 'alen' from command its type is int. If userspace passes a large\nlength we will get a negative 'alen'.\n\nSwitch n, alen, and rlen to u32." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: scsi_debug: Corregir lectura fuera de los l\u00edmites en resp_report_tgtpgs() Se observ\u00f3 el siguiente problema al ejecutar syzkaller: ERROR: KASAN: slab-out-of-bounds en memcpy include/linux/string.h:377 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831 Lectura de tama\u00f1o 2132 en la direcci\u00f3n ffff8880aea95dc8 por la tarea syz-executor.0/9815 CPU: 0 PID: 9815 Comm: syz-executor.0 No contaminado 4.19.202-00874-gfc0fe04215a9 #2 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:77 [en l\u00ednea] dump_stack+0xe4/0x14a lib/dump_stack.c:118 print_address_description+0x73/0x280 mm/kasan/report.c:253 kasan_report_error mm/kasan/report.c:352 [en l\u00ednea] kasan_report+0x272/0x370 mm/kasan/report.c:410 memcpy+0x1f/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [en l\u00ednea] sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831 rellenar_desde_buffer_dev+0x14f/0x340 drivers/scsi/scsi_debug.c:1021 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034 __blk_run_queue_uncond bloque/blk-core.c:464 [en l\u00ednea] __blk_run_queue+0x1a4/0x380 bloque/blk-core.c:484 blk_execute_rq_nowait+0x1c2/0x2d0 bloque/blk-exec.c:78 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716 sg_write+0x64/0xa0 drivers/scsi/sg.c:622 __vfs_write+0xed/0x690 fs/read_write.c:485 kill_bdev:block_device:00000000e138492c vfs_write+0x184/0x4c0 fs/read_write.c:549 ksys_write+0x107/0x240 fs/read_write.c:599 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Obtenemos 'alen' del comando, su tipo es int. Si el espacio de usuario pasa una longitud grande, obtendremos un 'alen' negativo. Cambie n, alen y rlen a u32." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20570.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20570.json index 436d62ac791..4f056e2b760 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20570.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T18:15:47.233", "lastModified": "2024-02-13T18:23:02.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json index 350dbc70371..527c82f58c1 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T16:15:06.827", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json index 1911e4be30d..5082657d68c 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T08:15:08.597", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json index 3702e9290ad..38bfde9c0a2 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-core. It can be exploited by providing an attribute that contains a serialized Java object with a special prefix `{#sb64}` and Base64 encoding. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. pac4j versions 4.0.0 and greater are not affected by this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "pac4j es un framework de seguridad para Java. `pac4j-core` anterior a la versi\u00f3n 4.0.0 se ve afectado por una vulnerabilidad de deserializaci\u00f3n de Java. La vulnerabilidad afecta a los sistemas que almacenan valores controlados externamente en atributos de la clase `UserProfile` de pac4j-core. Se puede explotar proporcionando un atributo que contenga un objeto Java serializado con un prefijo especial `{#sb64}` y codificaci\u00f3n Base64. Este problema puede provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el peor de los casos. Aunque existe un `RestrictedObjectInputStream`, que impone algunas restricciones sobre qu\u00e9 clases se pueden deserializar, a\u00fan permite una amplia gama de paquetes de Java y es potencialmente explotable con diferentes cadenas de gadgets. Las versiones 4.0.0 y posteriores de pac4j no se ven afectadas por este problema. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26562.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26562.json index 9dcb97d5119..195387b3f18 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26562.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T16:15:08.187", "lastModified": "2024-02-13T18:23:02.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json index 458cbe3cbc1..60aeb80072a 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2024-02-12T23:15:08.100", "lastModified": "2024-02-13T14:01:49.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json index 2a832c74bb6..4ca836aa85f 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T08:15:09.013", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json index 27654874c69..926570bcfbd 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:10.480", "lastModified": "2024-02-16T14:15:07.827", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json index 68ae1adaae5..6da68339379 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:10.697", "lastModified": "2024-02-16T14:15:07.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json index 853a8a311ac..71c50c88781 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T08:15:09.347", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json index fe40f4ea243..8d5352d7d42 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T08:15:09.683", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json index 6ec692206ec..d474ed405c1 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T09:15:35.743", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45698.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45698.json index 49f527b4012..f8eae4e0bcb 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45698.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45698.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2024-02-10T04:15:07.280", "lastModified": "2024-02-11T22:29:15.837", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46842.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46842.json index 4d0b55a14cf..5d2438a04a5 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46842.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46842.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and\nother modes. This in particular means that they may set registers used\nto pass 32-bit-mode hypercall arguments to values outside of the range\n32-bit code would be able to set them to.\n\nWhen processing of hypercalls takes a considerable amount of time,\nthe hypervisor may choose to invoke a hypercall continuation. Doing so\ninvolves putting (perhaps updated) hypercall arguments in respective\nregisters. For guests not running in 64-bit mode this further involves\na certain amount of translation of the values.\n\nUnfortunately internal sanity checking of these translated values\nassumes high halves of registers to always be clear when invoking a\nhypercall. When this is found not to be the case, it triggers a\nconsistency check in the hypervisor and causes a crash.\n" + }, + { + "lang": "es", + "value": "A diferencia de los hu\u00e9spedes PV de 32 bits, los hu\u00e9spedes HVM pueden cambiar libremente entre 64 bits y otros modos. Esto significa en particular que pueden configurar los registros utilizados para pasar argumentos de hiperllamada en modo de 32 bits a valores fuera del rango en el que el c\u00f3digo de 32 bits podr\u00eda configurarlos. Cuando el procesamiento de hiperllamadas toma una cantidad considerable de tiempo, el hipervisor puede optar por invocar una continuaci\u00f3n de hiperllamada. Hacerlo implica colocar argumentos de hiperllamada (quiz\u00e1s actualizados) en los registros respectivos. Para los hu\u00e9spedes que no se ejecutan en modo de 64 bits, esto implica adem\u00e1s una cierta cantidad de traducci\u00f3n de los valores. Desafortunadamente, la comprobaci\u00f3n de cordura interna de estos valores traducidos supone que las mitades altas de los registros siempre est\u00e1n limpias al invocar una hiperllamada. Cuando se descubre que este no es el caso, se activa una comprobaci\u00f3n de coherencia en el hipervisor y se produce un bloqueo." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-484xx/CVE-2023-48432.json b/CVE-2023/CVE-2023-484xx/CVE-2023-48432.json index 64b02851d5a..d62459be655 100644 --- a/CVE-2023/CVE-2023-484xx/CVE-2023-48432.json +++ b/CVE-2023/CVE-2023-484xx/CVE-2023-48432.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T16:15:08.380", "lastModified": "2024-02-13T18:23:02.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49125.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49125.json index 16613ac1109..e1d0152dd13 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49125.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-02-13T09:15:46.173", "lastModified": "2024-05-14T16:15:47.657", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50236.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50236.json index dbab7b85a17..194775dacc2 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50236.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-02-13T09:15:46.633", "lastModified": "2024-05-15T08:15:08.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50808.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50808.json index cdae459d480..5512a7f6aa4 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50808.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T18:15:47.320", "lastModified": "2024-08-19T15:35:01.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json index 00dbfbd3eb9..b543279e1ff 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-11T05:15:08.383", "lastModified": "2024-02-11T22:29:15.837", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json index 800aa616dd2..698e3891c21 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-12T23:15:08.353", "lastModified": "2024-02-13T14:01:49.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6361.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6361.json index 4fb17d5cd0f..8fa09a48723 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6361.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6361.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been discovered in Winhex affecting version 16.1 SR-1 and 20.4. This vulnerability consists of a buffer overflow controlling the Structured Exception Handler (SEH) registers. This could allow attackers to execute arbitrary code via a long filename argument." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en Winhex que afecta a las versiones 16.1 SR-1 y 20.4. Esta vulnerabilidad consiste en un desbordamiento de b\u00fafer que controla los registros del controlador de excepciones estructurado (SEH). Esto podr\u00eda permitir a los atacantes ejecutar c\u00f3digo arbitrario mediante un argumento de nombre de archivo largo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6362.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6362.json index 49033164302..3126bcfadf2 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6362.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6362.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been discovered in Winhex affecting version 16.1 SR-1 and 20.4. This vulnerability consists of a buffer overflow controlling the Structured Exception Handler (SEH) registers. This could allow attackers to execute arbitrary code via a long filename argument." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en Winhex que afecta a las versiones 16.1 SR-1 y 20.4. Esta vulnerabilidad consiste en un desbordamiento de b\u00fafer que controla los registros del controlador de excepciones estructurado (SEH). Esto podr\u00eda permitir a los atacantes ejecutar c\u00f3digo arbitrario mediante un argumento de nombre de archivo largo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json index fea2e92d65d..e71b6b18ecf 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-08-22T21:15:16.107", "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json index a441f642273..835cee2ac8c 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-09T07:16:00.107", "lastModified": "2024-05-22T17:16:11.003", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1082.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1082.json index 4f9c68a039e..7327d530ad8 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1082.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-cna@github.com", "published": "2024-02-13T19:15:08.793", "lastModified": "2024-02-13T19:45:42.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1084.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1084.json index 6459740c956..0cbaace69ca 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1084.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1084.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-cna@github.com", "published": "2024-02-13T19:15:09.053", "lastModified": "2024-02-13T19:45:42.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1163.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1163.json index 2ae40ec3857..f3a016551d5 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1163.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-02-13T15:15:08.647", "lastModified": "2024-02-29T15:15:07.473", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1309.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1309.json index e170525844c..6ccb2580ffa 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1309.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1309.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@honeywell.com", "published": "2024-02-13T14:15:46.463", "lastModified": "2024-04-18T21:15:07.060", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json index 6472e20ec23..d1c3be9c2cb 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-11T03:15:08.930", "lastModified": "2024-08-01T19:15:36.183", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json index 042198df459..721c6c2e269 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-12T23:15:08.410", "lastModified": "2024-03-23T03:15:10.633", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json index cac61ba50a1..04c3a1c76f3 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1511.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The parisneo/lollms-webui repository is susceptible to a path traversal vulnerability due to inadequate validation of user-supplied file paths. This flaw allows an unauthenticated attacker to read, write, and in certain configurations execute arbitrary files on the server by exploiting various endpoints. The vulnerability can be exploited even when the service is bound to localhost, through cross-site requests facilitated by malicious HTML/JS pages." + }, + { + "lang": "es", + "value": "El repositorio parisneo/lollms-webui es susceptible a una vulnerabilidad de path traversal debido a una validaci\u00f3n inadecuada de las rutas de archivo proporcionadas por el usuario. Esta falla permite que un atacante no autenticado lea, escriba y, en ciertas configuraciones, ejecute archivos arbitrarios en el servidor mediante la explotaci\u00f3n de varios endpoints. La vulnerabilidad puede explotarse incluso cuando el servicio est\u00e1 vinculado a localhost, a trav\u00e9s de solicitudes entre sitios facilitadas por p\u00e1ginas HTML/JS maliciosas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json index 5dbb2f21bd4..21727030a21 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1520.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An OS Command Injection vulnerability exists in the '/open_code_folder' endpoint of the parisneo/lollms-webui application, due to improper validation of user-supplied input in the 'discussion_id' parameter. Attackers can exploit this vulnerability by injecting malicious OS commands, leading to unauthorized command execution on the underlying operating system. This could result in unauthorized access, data leakage, or complete system compromise." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el endpoint '/open_code_folder' de la aplicaci\u00f3n parisneo/lollms-webui, debido a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en el par\u00e1metro 'discussion_id'. Los atacantes pueden aprovechar esta vulnerabilidad inyectando comandos del sistema operativo maliciosos, lo que lleva a la ejecuci\u00f3n no autorizada de comandos en el sistema operativo subyacente. Esto podr\u00eda provocar acceso no autorizado, fuga de datos o la vulneraci\u00f3n total del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json index e6502ecd9b4..c5b009fec14 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1600.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Local File Inclusion (LFI) vulnerability exists in the parisneo/lollms-webui application, specifically within the `/personalities` route. An attacker can exploit this vulnerability by crafting a URL that includes directory traversal sequences (`../../`) followed by the desired system file path, URL encoded. Successful exploitation allows the attacker to read any file on the filesystem accessible by the web server. This issue arises due to improper control of filename for include/require statement in the application." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales (LFI) en la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro de la ruta `/personalities`. Un atacante puede explotar esta vulnerabilidad creando una URL que incluya secuencias de directory traversal (`../../`) seguidas de la ruta de archivo del sistema deseada, codificada en URL. Una explotaci\u00f3n exitosa permite al atacante leer cualquier archivo en el sistema de archivos al que pueda acceder el servidor web. Este problema surge debido a un control inadecuado del nombre de archivo para la declaraci\u00f3n include/require en la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json index fcef58692d6..c5a83ccdbaa 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1602.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output." + }, + { + "lang": "es", + "value": "parisneo/lollms-webui es vulnerable a Cross Site Scripting (XSS) almacenado que conducen a la ejecuci\u00f3n remota de c\u00f3digo (RCE). La vulnerabilidad surge debido a una desinfecci\u00f3n y validaci\u00f3n inadecuadas de los datos de salida del modelo, lo que permite a un atacante inyectar c\u00f3digo JavaScript malicioso. Este c\u00f3digo se puede ejecutar dentro del contexto del navegador del usuario, lo que permite al atacante enviar una solicitud al endpoint `/execute_code` y establecer un shell inverso al host del atacante. El problema afecta a varios componentes de la aplicaci\u00f3n, incluido el manejo de la entrada del usuario y la salida del modelo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json index 13cb34fcc72..bba314b532d 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary application version 0.3.0, allowing unauthorized deletion of any organization's project. The vulnerability is due to insufficient authorization checks in the project deletion endpoint, where the endpoint fails to verify if the project ID provided in the request belongs to the requesting user's organization. As a result, an attacker can delete projects belonging to any organization by sending a crafted DELETE request with the target project's ID. This issue affects the project deletion functionality implemented in the projects.delete route." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de referencia directa a objetos inseguros (IDOR) en la versi\u00f3n 0.3.0 de la aplicaci\u00f3n lunary-ai/lunary, que permite la eliminaci\u00f3n no autorizada de cualquier proyecto de una organizaci\u00f3n. La vulnerabilidad se debe a comprobaciones de autorizaci\u00f3n insuficientes en el punto de conexi\u00f3n de eliminaci\u00f3n de proyectos, donde el punto de conexi\u00f3n no verifica si el ID del proyecto proporcionado en la solicitud pertenece a la organizaci\u00f3n del usuario solicitante. Como resultado, un atacante puede eliminar proyectos que pertenecen a cualquier organizaci\u00f3n enviando una solicitud DELETE manipulada con el ID del proyecto de destino. Este problema afecta a la funcionalidad de eliminaci\u00f3n de proyectos implementada en la ruta projects.delete." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1643.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1643.json index b7f5821d7f6..184b076b3de 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1643.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1643.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "By knowing an organization's ID, an attacker can join the organization without permission and gain the ability to read and modify all data within that organization. This vulnerability allows unauthorized access and modification of sensitive information, posing a significant security risk. The flaw is due to insufficient verification of user permissions when joining an organization." + }, + { + "lang": "es", + "value": "Al conocer el ID de una organizaci\u00f3n, un atacante puede unirse a la organizaci\u00f3n sin permiso y obtener la capacidad de leer y modificar todos los datos dentro de esa organizaci\u00f3n. Esta vulnerabilidad permite el acceso no autorizado y la modificaci\u00f3n de informaci\u00f3n confidencial, lo que representa un riesgo de seguridad significativo. La falla se debe a una verificaci\u00f3n insuficiente de los permisos de los usuarios al unirse a una organizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1740.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1740.json index d59d1dbe6ad..378e25d8c96 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1740.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In lunary-ai/lunary version 1.0.1, a vulnerability exists where a user removed from an organization can still read, create, modify, and delete logs by re-using an old authorization token. The lunary web application communicates with the server using an 'Authorization' token in the browser, which does not properly invalidate upon the user's removal from the organization. This allows the removed user to perform unauthorized actions on logs and access project and external user details without valid permissions." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 1.0.1 de lunary-ai/lunary, existe una vulnerabilidad en la que un usuario eliminado de una organizaci\u00f3n a\u00fan puede leer, crear, modificar y eliminar registros reutilizando un token de autorizaci\u00f3n antiguo. La aplicaci\u00f3n web lunary se comunica con el servidor mediante un token de \"Autorizaci\u00f3n\" en el navegador, que no se invalida correctamente cuando se elimina al usuario de la organizaci\u00f3n. Esto permite que el usuario eliminado realice acciones no autorizadas en los registros y acceda a los detalles del proyecto y del usuario externo sin permisos v\u00e1lidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json index b5c170eee76..d9b7dec1ac4 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:51.460", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20090.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20090.json index ed1d0265cbc..6193a9364e1 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20090.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20090.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1703." + }, + { + "lang": "es", + "value": "En vdec, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1703." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20092.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20092.json index 22436566b9d..ff68bc2da0f 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20092.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20092.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1700." + }, + { + "lang": "es", + "value": "En vdec, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1700." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20094.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20094.json index 3d30e739b89..f11e0ed777c 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20094.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00843282; Issue ID: MSV-1535." + }, + { + "lang": "es", + "value": "En Modem, existe un posible bloqueo del sistema debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY00843282; ID de problema: MSV-1535." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20098.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20098.json index 70d90416714..48cafaee239 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20098.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996886; Issue ID: MSV-1626." + }, + { + "lang": "es", + "value": "En el estado de encendido, es posible que se produzca una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08996886; ID de problema: MSV-1626." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20099.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20099.json index 60b65970593..ea4492ec81f 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20099.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20099.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08997492; Issue ID: MSV-1625." + }, + { + "lang": "es", + "value": "En el estado de encendido, es posible que se produzca una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los permisos de ejecuci\u00f3n de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08997492; ID de problema: MSV-1625." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20100.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20100.json index 88d0c03104b..1be4c616a87 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20100.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20100.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998449; Issue ID: MSV-1603." + }, + { + "lang": "es", + "value": "En el controlador WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998449; ID de problema: MSV-1603." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20101.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20101.json index 3e1de6187b1..804fa444755 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20101.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20101.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998901; Issue ID: MSV-1602." + }, + { + "lang": "es", + "value": "En el controlador WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998901; ID de problema: MSV-1602." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20103.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20103.json index cf68b318c82..83ad6dd3514 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20103.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20103.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001358; Issue ID: MSV-1599." + }, + { + "lang": "es", + "value": "En el firmware de WLAN, existe la posibilidad de una escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09001358; ID de problema: MSV-1599." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json index 92f40e26b58..50daf654909 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20284.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-08-28T17:15:06.893", "lastModified": "2024-08-29T13:25:27.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json index b1e5d6e0c8d..89828d2427c 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-08-28T17:15:07.687", "lastModified": "2024-08-29T13:25:27.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json index b4603332a50..2de1f025ad7 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20286.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-08-28T17:15:08.400", "lastModified": "2024-08-29T13:25:27.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json index 40b61f84495..50eb332637c 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-25T17:15:15.000", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json index 0aab69609f0..47ce5eaa516 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20389.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the ConfD CLI and the Cisco Crosswork Network Services Orchestrator CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary files as root on the underlying operating system.\n\n\nThis vulnerability is due to improper authorization enforcement when specific CLI commands are used. An attacker could exploit this vulnerability by executing an affected CLI command with crafted arguments. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system with the privileges of the root user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la CLI de ConfD y la CLI de Cisco Crosswork Network Services Orchestrator podr\u00eda permitir que un atacante local autenticado y con pocos privilegios lea y escriba archivos arbitrarios como usuario root en el sistema operativo subyacente. Esta vulnerabilidad se debe a una aplicaci\u00f3n incorrecta de la autorizaci\u00f3n cuando se utilizan comandos CLI espec\u00edficos. Un atacante podr\u00eda aprovechar esta vulnerabilidad ejecutando un comando CLI afectado con argumentos creados. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer o escribir archivos arbitrarios en el sistema operativo subyacente con los privilegios del usuario root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json index 0a846b3c974..5ca73b5cf50 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-25T17:15:18.020", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json index 044cfc38728..dc0afcb9f8a 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T09:15:05.000", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json index b111c70baa2..3dc3a14b3a5 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Illustrator versions 28.4, 27.9.3 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 28.4, 27.9.3 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites al analizar un archivo manipulado, lo que podr\u00eda provocar una lectura m\u00e1s all\u00e1 del final de una estructura de memoria asignada. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json index 12893edf1e2..e42302290ee 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Illustrator versions 28.4, 27.9.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 28.4, 27.9.3 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json index 86dbe2c036f..42651a92d36 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Illustrator versions 28.4, 27.9.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 28.4, 27.9.3 y anteriores de Illustrator se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2029.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2029.json index 635000a589b..41d377efc6c 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2029.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A command injection vulnerability exists in the `TranscriptEndpoint` of mudler/localai, specifically within the `audioToWav` function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them to ffmpeg via a shell command, allowing an attacker to execute arbitrary commands on the host system. Successful exploitation could lead to unauthorized access, data breaches, or other detrimental impacts, depending on the privileges of the process executing the code." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el `TranscriptEndpoint` de mudler/localai, espec\u00edficamente dentro de la funci\u00f3n `audioToWav` utilizada para convertir archivos de audio al formato WAV para su transcripci\u00f3n. La vulnerabilidad surge debido a la falta de desinfecci\u00f3n de los nombres de archivo proporcionados por el usuario antes de pasarlos a ffmpeg a trav\u00e9s de un comando de shell, lo que permite a un atacante ejecutar comandos arbitrarios en el sistema host. Una explotaci\u00f3n exitosa podr\u00eda provocar acceso no autorizado, violaciones de datos u otros impactos perjudiciales, seg\u00fan los privilegios del proceso que ejecuta el c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21315.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21315.json index 2ccfddd9c49..d61a312b80c 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21315.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21315.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-13T18:15:48.403", "lastModified": "2024-05-29T00:15:17.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json index 476da4fc15e..aea1855354c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:10.360", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando una llamada IOCTL de compatibilidad es seguida por otra llamada IOCTL desde el espacio de usuario a un controlador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json index 00911bb3366..e3bd858e37c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-02-13T05:15:08.873", "lastModified": "2024-03-06T14:15:48.020", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2195.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2195.json index ad72f042f82..f1e5291b35c 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2195.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2195.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A critical Remote Code Execution (RCE) vulnerability was identified in the aimhubio/aim project, specifically within the `/api/runs/search/run/` endpoint, affecting versions >= 3.0.0. The vulnerability resides in the `run_search_api` function of the `aim/web/api/runs/views.py` file, where improper restriction of user access to the `RunView` object allows for the execution of arbitrary code via the `query` parameter. This issue enables attackers to execute arbitrary commands on the server, potentially leading to full system compromise." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (RCE) en el proyecto aimhubio/aim, espec\u00edficamente dentro del endpoint `/api/runs/search/run/`, que afecta a las versiones >= 3.0.0. La vulnerabilidad reside en la funci\u00f3n `run_search_api` del archivo `aim/web/api/runs/views.py`, donde la restricci\u00f3n indebida del acceso del usuario al objeto `RunView` permite la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro `query`. Este problema permite a los atacantes ejecutar comandos arbitrarios en el servidor, lo que potencialmente puede provocar un compromiso total del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2196.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2196.json index 0cc89432d55..5855b75f60f 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2196.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2196.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "aimhubio/aim is vulnerable to Cross-Site Request Forgery (CSRF), allowing attackers to perform actions such as deleting runs, updating data, and stealing data like log records and notes without the user's consent. The vulnerability stems from the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation." + }, + { + "lang": "es", + "value": "aimhubio/aim es vulnerable a Cross-Site Request Forgery (CSRF), lo que permite a los atacantes realizar acciones como eliminar ejecuciones, actualizar datos y robar datos como registros y notas sin el consentimiento del usuario. La vulnerabilidad se debe a la falta de protecci\u00f3n CSRF y CORS en el panel de control de AIM. Un atacante puede aprovechar esto enga\u00f1ando a un usuario para que ejecute un script malicioso que env\u00eda solicitudes no autorizadas al servidor de AIM, lo que provoca una posible p\u00e9rdida de datos y una manipulaci\u00f3n de datos no autorizada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json index c4a3716be2c..cc66c717f73 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T21:15:48.180", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json index 757432239b3..19a799f6e7b 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T02:15:08.323", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json index dabd1f8fcbc..82872105090 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T04:15:08.133", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json index b115833a909..d4595c26809 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.163", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json index 340292478bd..74a7deab001 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.363", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json index 85b43136895..7b111b53586 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.570", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json index d1849186ff3..37c36f55d77 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-06T19:15:52.137", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json index 466f691fbda..a1cb658f402 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T07:15:09.803", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json index 6c44ee7b30e..72f775e808e 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.043", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json index fbfca6a519e..eb59f7efb28 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.127", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json index dfb119ef551..9071b7fbe1d 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2288.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.137", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json index 4fa46a1f1cc..76d5ecfb50d 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:10.683", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption when invalid length is provided from HLOS for FRS/UDS request/response buffers." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando se proporciona una longitud no v\u00e1lida desde HLOS para los b\u00faferes de solicitud/respuesta FRS/UDS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json index b8139051e80..a5fbde2ab70 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:10.927", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria cuando un proceso invoca llamadas IOCTL desde el espacio de usuario para crear un canal virtual HAB y otro proceso invoca llamadas IOCTL para destruirlo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json index e67c487a951..52507c4fff0 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.173", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file." + }, + { + "lang": "es", + "value": "La corrupci\u00f3n de memoria es posible cuando se intenta desde el espacio de usuario o la consola escribir alg\u00fan patr\u00f3n de efectos h\u00e1pticos en el archivo debugfs de h\u00e1pticos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json index 4108070197f..f6680ba5676 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.400", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption during the network scan request." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante la solicitud de escaneo de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json index f52afe0515d..5c34a47993f 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.593", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al enviar el paquete de comando de b\u00fafer de persistencia desde el espacio del usuario al espacio del kernel a trav\u00e9s de la llamada IOCTL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json index 4d60c777aa6..ab8f8f46a1f 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.800", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while invoking IOCTL calls for MSM module from the user space during audio playback and record." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al invocar llamadas IOCTL para el m\u00f3dulo MSM desde el espacio del usuario durante la reproducci\u00f3n y grabaci\u00f3n de audio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json index 20103b1761e..dc425b1b217 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:12.003", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while unmapping the fastrpc map when two threads can free the same map in concurrent scenario." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al anular la asignaci\u00f3n del mapa fastrpc cuando dos subprocesos pueden liberar el mismo mapa en un escenario concurrente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23439.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23439.json index d9e0e73799d..221dc28897d 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23439.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23439.json @@ -3,7 +3,7 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2024-02-13T15:15:08.850", "lastModified": "2024-02-13T15:16:05.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23440.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23440.json index 6b8865de0e2..1b96e6f5f00 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23440.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23440.json @@ -3,7 +3,7 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2024-02-13T15:15:09.070", "lastModified": "2024-02-13T15:16:05.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json index 91f90532005..d9d360568db 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-14T10:15:08.540", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json index c431c8c5a38..687fed7e941 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-14T10:15:08.610", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json index b4d664c3b9a..9e5384fdd0f 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-14T10:15:08.663", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json index 4dcbc74a3fb..762b976d7a3 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-14T10:15:08.727", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23833.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23833.json index 80a2ea38077..11a9f12815b 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23833.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23833.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-12T21:15:08.760", "lastModified": "2024-02-13T14:01:49.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json index 4c108e91b10..e7a0407ff09 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-02-14T12:15:47.293", "lastModified": "2024-02-14T14:16:07.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json index f64189994c1..a273030687f 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A path traversal vulnerability in the '/apply_settings' endpoint of parisneo/lollms-webui allows attackers to execute arbitrary code. The vulnerability arises due to insufficient sanitization of user-supplied input in the configuration settings, specifically within the 'extensions' parameter. Attackers can exploit this by crafting a payload that includes relative path traversal sequences ('../../../'), enabling them to navigate to arbitrary directories. This flaw subsequently allows the server to load and execute a malicious '__init__.py' file, leading to remote code execution. The issue affects the latest version of parisneo/lollms-webui." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de path traversal en el endpoint '/apply_settings' de parisneo/lollms-webui permite a los atacantes ejecutar c\u00f3digo arbitrario. La vulnerabilidad surge debido a una desinfecci\u00f3n insuficiente de la entrada proporcionada por el usuario en los ajustes de configuraci\u00f3n, espec\u00edficamente dentro del par\u00e1metro 'extensions'. Los atacantes pueden aprovechar esto creando una carga \u00fatil que incluya secuencias de path traversal relativo ('../../../'), lo que les permite navegar a directorios arbitrarios. Esta falla posteriormente permite que el servidor cargue y ejecute un archivo '__init__.py' malicioso, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo. El problema afecta a la \u00faltima versi\u00f3n de parisneo/lollms-webui." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2359.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2359.json index 2bebf68e182..5ffa599dceb 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2359.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2359.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.353", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2360.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2360.json index b25bc7647eb..04cd97fda19 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2360.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2360.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.570", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json index b2af36fa4db..7b08a81b07d 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the parisneo/lollms-webui allows for arbitrary file upload and read due to insufficient sanitization of user-supplied input. Specifically, the issue resides in the `install_model()` function within `lollms_core/lollms/binding.py`, where the application fails to properly sanitize the `file://` protocol and other inputs, leading to arbitrary read and upload capabilities. Attackers can exploit this vulnerability by manipulating the `path` and `variant_name` parameters to achieve path traversal, allowing for the reading of arbitrary files and uploading files to arbitrary locations on the server. This vulnerability affects the latest version of parisneo/lollms-webui." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en parisneo/lollms-webui permite la carga y lectura de archivos arbitrarios debido a una desinfecci\u00f3n insuficiente de la entrada proporcionada por el usuario. Espec\u00edficamente, el problema reside en la funci\u00f3n `install_model()` dentro de `lollms_core/lollms/binding.py`, donde la aplicaci\u00f3n no puede limpiar correctamente el protocolo `file://` y otras entradas, lo que genera capacidades de carga y lectura arbitrarias. Los atacantes pueden explotar esta vulnerabilidad manipulando los par\u00e1metros `path` y `variant_name` para lograr path traversal, lo que permite la lectura de archivos arbitrarios y la carga de archivos a ubicaciones arbitrarias en el servidor. Esta vulnerabilidad afecta a la \u00faltima versi\u00f3n de parisneo/lollms-webui." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json index 4aa47dc12b8..2b72a8992fa 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.767", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json index 9b82ae5a96e..f9ff829d1db 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious __init__.py file, an attacker can execute arbitrary code on the server." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro de la funcionalidad reinstall_binding en lollms_core/lollms/server/endpoints/lollms_binding_infos.py de la \u00faltima versi\u00f3n. La vulnerabilidad surge debido a una desinfecci\u00f3n de ruta insuficiente, lo que permite a un atacante aprovechar el path traversal para navegar a directorios arbitrarios. Al manipular binding_path para que apunte a un directorio controlado y cargar un archivo __init__.py malicioso, un atacante puede ejecutar c\u00f3digo arbitrario en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json index f0beb668dd2..7e2ffc6ead0 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.780", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json index 7432f951d62..930b539f759 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.987", "lastModified": "2024-09-28T23:15:12.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json index afa6bcd0f3c..3d70a5623e2 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T04:15:08.340", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json index cf5ab5f571b..f8fded97dfc 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:09.187", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json index 81b7988bc9b..aa003c6ad94 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:09.393", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24751.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24751.json index b0570fbe822..aadb5c9336a 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24751.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T19:15:10.950", "lastModified": "2024-02-13T19:45:42.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24781.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24781.json index 676de9726c0..8ab2a5bd6bc 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24781.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24781.json @@ -3,7 +3,7 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2024-02-13T14:15:46.780", "lastModified": "2024-02-13T15:16:05.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24782.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24782.json index 168c302ed21..70952c8a461 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24782.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24782.json @@ -3,7 +3,7 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2024-02-13T14:15:47.053", "lastModified": "2024-02-13T15:16:05.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24814.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24814.json index d8e45e6aeb3..fa12fa026ef 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24814.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24814.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T19:15:11.153", "lastModified": "2024-03-21T02:52:11.957", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24826.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24826.json index 4a79ca8d20a..c12d4f96036 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24826.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24826.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-12T23:15:08.643", "lastModified": "2024-02-13T14:01:49.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json index 07f1a0cfcb4..2ebf5627c83 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-08T12:15:55.973", "lastModified": "2024-02-08T13:44:11.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json index 7c1307990f7..5acf171ba06 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-08T12:15:56.170", "lastModified": "2024-02-08T13:44:11.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25112.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25112.json index 3002f4a6de9..36b8582bfd7 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25112.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25112.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-12T23:15:08.853", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json index 1efe29e5a36..4ecaeda6f8c 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:08.417", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json index 2cad361ff4f..8f040e7fe67 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:08.640", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json index d4aeb3aa3cc..e3346ac7ebe 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:08.867", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json index a495a17b618..0fbabb700a5 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:09.080", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25407.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25407.json index b870e4c88ae..203a6fdced1 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25407.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T01:15:08.470", "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json index f6c70dc437e..1cdaf845ccd 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:09.613", "lastModified": "2024-06-10T17:16:21.947", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json index 96abf6f0271..4ae9774ade2 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T04:15:08.590", "lastModified": "2024-02-13T14:01:07.747", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25691.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25691.json index a89f4c00880..a9ba390de25 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25691.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25691.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:05.840", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json index d43589019e6..ee42b806e66 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.167", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json index ddf63657d57..f6a6cd2c9d4 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.390", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json index 521b4534c2e..ae96f5dd1f4 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.593", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json index 46b2f2f6445..5976528a4f0 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25707.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.790", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2548.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2548.json index 581897b6da1..728add4d566 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2548.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2548.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:55.217", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json index 14b2a74bd3d..93502965586 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26158.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Microsoft Install Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el servicio de instalaci\u00f3n de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json index b9f98ef449a..e31ff17fda2 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:55.437", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27458.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27458.json index 3bfa5f17870..46178ad7c2c 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27458.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27458.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A potential security vulnerability has been identified in the HP Hotkey Support software, which might allow local escalation of privilege. HP is releasing mitigation for the potential vulnerability. Customers using HP Programmable Key are recommended to update HP Hotkey Support." + }, + { + "lang": "es", + "value": "Se ha identificado una posible vulnerabilidad de seguridad en el software HP Hotkey Support, que podr\u00eda permitir la escalada local de privilegios. HP est\u00e1 lanzando una mitigaci\u00f3n para la posible vulnerabilidad. Se recomienda a los clientes que utilizan HP Programmable Key que actualicen HP Hotkey Support." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2792.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2792.json index 3161f8bfa8b..32098552146 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2792.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2792.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widgets in all versions up to, and including, 1.13.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addon Elements para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de widgets en todas las versiones hasta la 1.13.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28709.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28709.json index 1446a160d6f..4cbcc895036 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28709.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28709.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T16:15:05.117", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in LimeSurvey before 6.5.12+240611 allows a remote attacker to execute arbitrary code via a crafted script to the title and comment fields." + }, + { + "lang": "es", + "value": "La vulnerabilidad de cross-site scripting en LimeSurvey anterior a 6.5.12+240611 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una secuencia de comandos manipulado espec\u00edficamente para los campos de t\u00edtulo y comentarios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28710.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28710.json index ccc030a16e1..0c4b8fc2651 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28710.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28710.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T16:15:05.190", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in LimeSurvey before 6.5.0+240319 allows a remote attacker to execute arbitrary code via a lack of input validation and output encoding in the Alert Widget's message component." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting en LimeSurvey anterior a la versi\u00f3n 6.5.0+240319 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una falta de validaci\u00f3n de entrada y codificaci\u00f3n de salida en el componente de mensaje del widget de alerta." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json index b4dc9ec5643..fb8dbb49c5c 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:55.897", "lastModified": "2024-06-25T11:15:49.873", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json index 1ab411e0a67..24f1910dc44 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Substance3D - Painter versions 9.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 9.1.2 y anteriores de Substance3D - Painter se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json index f94f15cd8d4..93d6653ff2d 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Aero Desktop versions 23.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.4 y anteriores de Adobe Aero Desktop se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json index 9e7a2d4b154..486890be8ec 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Substance3D - Designer versions 13.1.1 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Respuesta: Las versiones 13.1.1 y anteriores de Substance3D - Designer se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json index 09e9c570c70..3c98886313c 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json index 0e31550f007..0b62182d32d 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker Respuesta: se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json index 50936250b51..9724cb3fcd1 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker Respuesta: se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json index 09f7fa4caf9..ec5109284ee 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker Respuesta: se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json index 36998269721..a1a84d9b573 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json index f13680f34d3..3eebcf6e917 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basada en pila que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json index d60ac29fa53..0c9714b8fb2 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json index 250c436dbc6..60c00f1d715 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json index 20a3d2e205d..b24036872a8 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.5, 2022.3 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json index 38c6798a6a5..bfeaff4de6f 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-06T19:15:56.167", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3033.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3033.json index 56cdf52045e..2d43c9a9feb 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3033.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3033.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:17.040", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3095.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3095.json index 5908245ed71..ad0447835f2 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3095.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3095.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:59.160", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3098.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3098.json index 36eca4ae0e6..ef7f76a82e9 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3098.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad en la clase `exec_utils` del paquete `llama_index`, espec\u00edficamente dentro de la funci\u00f3n `safe_eval`, que permite la inyecci\u00f3n r\u00e1pida que conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario. Este problema surge debido a una validaci\u00f3n insuficiente de la entrada, que puede explotarse para eludir las restricciones de m\u00e9todo y ejecutar c\u00f3digo no autorizado. La vulnerabilidad es una omisi\u00f3n de la CVE-2023-39662 abordada anteriormente, demostrada a trav\u00e9s de una prueba de concepto que crea un archivo en el sistema al explotar la falla." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json index bb3116babc9..405b9e9b21e 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31142.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Because of a logical error in XSA-407 (Branch Type Confusion), the\nmitigation is not applied properly when it is intended to be used.\nXSA-434 (Speculative Return Stack Overflow) uses the same\ninfrastructure, so is equally impacted.\n\nFor more details, see:\n https://xenbits.xen.org/xsa/advisory-407.html\n https://xenbits.xen.org/xsa/advisory-434.html\n" + }, + { + "lang": "es", + "value": "Debido a un error l\u00f3gico en XSA-407 (confusi\u00f3n de tipo de rama), la mitigaci\u00f3n no se aplica correctamente cuando se pretende utilizarla. XSA-434 (desbordamiento de pila de retorno especulativo) utiliza la misma infraestructura, por lo que se ve igualmente afectado. Para obtener m\u00e1s detalles, consulte: https://xenbits.xen.org/xsa/advisory-407.html https://xenbits.xen.org/xsa/advisory-434.html" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31214.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31214.json index 0ccf97f6080..196b5f79517 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31214.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31214.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Traccar is an open source GPS tracking system. Traccar versions 5.1 through 5.12 allow arbitrary files to be uploaded through the device image upload API. Attackers have full control over the file contents, full control over the directory where the file is stored, full control over the file extension, and partial control over the file name. While it's not for an attacker to overwrite an existing file, an attacker can create new files with certain names and attacker-controlled extensions anywhere on the file system. This can potentially lead to remote code execution, XSS, DOS, etc. The default install of Traccar makes this vulnerability more severe. Self-registration is enabled by default, allowing anyone to create an account to exploit this vulnerability. Traccar also runs by default with root/system privileges, allowing files to be placed anywhere on the file system. Version 6.0 contains a fix for the issue. One may also turn off self-registration by default, as that would make most vulnerabilities in the application much harder to exploit by default and reduce the severity considerably.\n" + }, + { + "lang": "es", + "value": "Traccar es un sistema de rastreo GPS de c\u00f3digo abierto. Las versiones 5.1 a 5.12 de Traccar permiten cargar archivos arbitrarios a trav\u00e9s de la API de carga de im\u00e1genes del dispositivo. Los atacantes tienen control total sobre el contenido del archivo, control total sobre el directorio donde se almacena el archivo, control total sobre la extensi\u00f3n del archivo y control parcial sobre el nombre del archivo. Si bien no le corresponde a un atacante sobrescribir un archivo existente, un atacante puede crear nuevos archivos con ciertos nombres y extensiones controladas por el atacante en cualquier parte del sistema de archivos. Esto puede conducir potencialmente a la ejecuci\u00f3n remota de c\u00f3digo, XSS, DOS, etc. La instalaci\u00f3n predeterminada de Traccar hace que esta vulnerabilidad sea m\u00e1s grave. El autorregistro est\u00e1 habilitado de forma predeterminada, lo que permite que cualquiera cree una cuenta para explotar esta vulnerabilidad. Traccar tambi\u00e9n se ejecuta de forma predeterminada con privilegios de root/sistema, lo que permite colocar archivos en cualquier parte del sistema de archivos. La versi\u00f3n 6.0 contiene una soluci\u00f3n para el problema. Tambi\u00e9n se puede desactivar el autorregistro de forma predeterminada, ya que eso har\u00eda que la mayor\u00eda de las vulnerabilidades de la aplicaci\u00f3n sean mucho m\u00e1s dif\u00edciles de explotar de forma predeterminada y reducir\u00eda considerablemente la gravedad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31230.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31230.json index b35aba0aabb..14689286cb7 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31230.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31230.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ShortPixel ShortPixel Adaptive Images.This issue affects ShortPixel Adaptive Images: from n/a through 3.8.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en ShortPixel ShortPixel Adaptive Images. Este problema afecta a ShortPixel Adaptive Images: desde n/a hasta 3.8.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json index 616a10b26de..1cc0f145bc6 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in InfoTheme WP Poll Maker.This issue affects WP Poll Maker: from n/a through 3.1.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en InfoTheme WP Poll Maker. Este problema afecta a WP Poll Maker: desde n/a hasta 3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31242.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31242.json index 26ae512d872..9402ed9e771 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31242.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31242.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Bricksforge.This issue affects Bricksforge: from n/a through 2.0.17.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Bricksforge. Este problema afecta a Bricksforge: desde n/a hasta 2.0.17." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json index d73a3fbd287..0a48652a8b0 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in ConvertKit.This issue affects ConvertKit: from n/a through 2.4.5.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en ConvertKit. Este problema afecta a ConvertKit: desde n/a hasta 2.4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json index 0e8dad3db04..87b6509695b 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in Fr\u00e9d\u00e9ric GILLES FG Drupal to WordPress.This issue affects FG Drupal to WordPress: from n/a through 3.70.3.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en Fr\u00e9d\u00e9ric GILLES FG Drupal a WordPress. Este problema afecta a FG Drupal a WordPress: desde n/a hasta 3.70.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json index 05073360873..762a5a3e5ae 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in WPKube Subscribe To Comments Reloaded.This issue affects Subscribe To Comments Reloaded: from n/a through 220725.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en WPKube Subscribe To Comments Reloaded.Este problema afecta a Subscribe To Comments Reloaded: desde n/a hasta 220725." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json index cdd26a1c5f7..0cdb243c838 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in WP OAuth Server OAuth Server.This issue affects OAuth Server: from n/a through 4.3.3.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en WP OAuth Server OAuth Server. Este problema afecta a OAuth Server: desde n/a hasta 4.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json index 3d375c48e00..f3c2f3c4c07 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in WebToffee WordPress Backup & Migration.This issue affects WordPress Backup & Migration: from n/a through 1.4.7.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en WebToffee WordPress Backup & Migration. Este problema afecta a WordPress Backup & Migration: desde n/a hasta 1.4.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31259.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31259.json index 4aad56a0202..6444a6c0cc0 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31259.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31259.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in Searchiq SearchIQ.This issue affects SearchIQ: from n/a through 4.5.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en SearchIQ SearchIQ. Este problema afecta a SearchIQ: desde n/a hasta 4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json index 11dd7dbc9fd..9992af98d9a 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premium Addons for Elementor.This issue affects Premium Addons for Elementor: from n/a through 4.10.22.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en los complementos Premium de Leap13 para Elementor. Este problema afecta a los complementos Premium de Elementor: desde n/a hasta 4.10.22." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31282.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31282.json index 812c350defe..28ca2d2091b 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31282.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31282.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Appcheap.Io App Builder.This issue affects App Builder: from n/a through 3.8.7.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en Appcheap.Io App Builder. Este problema afecta a App Builder: desde n/a hasta 3.8.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31287.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31287.json index e2f5af9cda4..359d24b7a5f 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31287.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31287.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Max Foundry Media Library Folders.This issue affects Media Library Folders: from n/a through 8.1.8.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Max Foundry Media Library Folders. Este problema afecta a Media Library Folders: desde n/a hasta 8.1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31297.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31297.json index aeef21037b8..2f506f73d08 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31297.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31297.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPExperts Wholesale For WooCommerce.This issue affects Wholesale For WooCommerce: from n/a through 2.3.0.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en WPExperts Wholesale For WooCommerce. Este problema afecta a Wholesale For WooCommerce: desde n/a hasta 2.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31298.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31298.json index 72cefd0dc7f..edb44f99343 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31298.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31298.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in Joel Hardi User Spam Remover.This issue affects User Spam Remover: from n/a through 1.0.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en Joel Hardi User Spam Remover. Este problema afecta a User Spam Remover: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31299.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31299.json index e3ab44151b0..0f30f27c9e0 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31299.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31299.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Reservation Diary ReDi Restaurant Reservation allows Cross-Site Scripting (XSS).This issue affects ReDi Restaurant Reservation: from n/a through 24.0128.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Reservation Diary ReDi Restaurant Reservation permite Cross Site Scripting (XSS). Este problema afecta a ReDi Restaurant Reservation: desde n/a hasta 24.0128." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31342.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31342.json index 3ad7a038bb3..5ab944a8a6d 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31342.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31342.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WPcloudgallery WordPress Gallery Exporter.This issue affects WordPress Gallery Exporter: from n/a through 1.3.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en WPcloudgallery WordPress Gallery Exporter. Este problema afecta al exportador de galer\u00edas de WordPress: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31343.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31343.json index 05fe61a2c0c..15c65ea6d1f 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31343.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31343.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 4.10.1.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Sonaar Music MP3 Audio Player for Music, Radio & Podcast by Sonaar. Este problema afecta a MP3 Audio Player para m\u00fasica, radio y podcasts de Sonaar: desde n/a hasta 4.10.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31355.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31355.json index 33d884b72dc..7fcfbee2bce 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31355.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31355.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Slideshow Gallery.This issue affects Slideshow Gallery: from n/a through 1.7.8.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Tribulant Slideshow Gallery. Este problema afecta a Tribulant Slideshow Gallery: desde n/a hasta 1.7.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31356.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31356.json index 8ac1e088fe2..34fb87d2967 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31356.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31356.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Solwin Infotech User Activity Log.This issue affects User Activity Log: from n/a through 1.8.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en el Solwin Infotech User Activity Log. Este problema afecta al registro de actividad del usuario: desde n/a hasta 1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31358.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31358.json index c440c42299d..37a5e8c0640 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31358.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31358.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Saleswonder.Biz 5 Stars Rating Funnel.This issue affects 5 Stars Rating Funnel: from n/a through 1.2.67.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Saleswonder.Biz 5 Stars Rating Funnel. Este problema afecta al embudo de calificaci\u00f3n de 5 estrellas: desde n/a hasta 1.2.67." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json index 4662a99e749..cdcfd98a656 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in PenciDesign Soledad.This issue affects Soledad: from n/a through 8.4.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en PenciDesign Soledad. Este problema afecta a Soledad: desde n/a hasta 8.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json index 9dae70ae59a..060cae743f8 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in PenciDesign Soledad.This issue affects Soledad: from n/a through 8.4.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en PenciDesign Soledad. Este problema afecta a Soledad: desde n/a hasta 8.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json index 8b92718fb1b..677ff5b8774 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CodeIsAwesome AIKit.This issue affects AIKit: from n/a through 4.14.1.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en CodeIsAwesome AIKit. Este problema afecta a AIKit: desde n/a hasta 4.14.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31386.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31386.json index 3b3743d431b..2ae284471e0 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31386.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31386.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Hidekazu Ishikawa X-T9, Hidekazu Ishikawa Lightning, themeinwp Default Mag, Out the Box Namaha, Out the Box CityLogic, Marsian i-max, Jetmonsters Emmet Lite, Macho Themes Decode, Wayneconnor Sliding Door, Out the Box Shopstar!, Modernthemesnet Gridsby, TT Themes HappenStance, Marsian i-excel, Out the Box Panoramic, Modernthemesnet Sensible WP.This issue affects X-T9: from n/a through 1.19.0; Lightning: from n/a through 15.18.0; Default Mag: from n/a through 1.3.5; Namaha: from n/a through 1.0.40; CityLogic: from n/a through 1.1.29; i-max: from n/a through 1.6.2; Emmet Lite: from n/a through 1.7.5; Decode: from n/a through 3.15.3; Sliding Door: from n/a through 3.3; Shopstar!: from n/a through 1.1.33; Gridsby: from n/a through 1.3.0; HappenStance: from n/a through 3.0.1; i-excel: from n/a through 1.7.9; Panoramic: from n/a through 1.1.56; Sensible WP: from n/a through 1.3.1.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Hidekazu Ishikawa X-T9, Hidekazu Ishikawa Lightning, themeinwp Default Mag, Out the Box Namaha, Out the Box CityLogic, Marsian i-max, Jetmonsters Emmet Lite, Macho Themes Decode, Wayneconnor Sliding Door, Out the Box Shopstar!, Modernthemesnet Gridsby, TT Themes HappenStance, Marsian i-excel, Out the Box Panoramic, Modernthemesnet Sensible WP. Este problema afecta a X-T9: desde n/d hasta 1.19.0; Lightning: desde n/d hasta 15.18.0; Default Mag: desde n/d hasta 1.3.5; Namaha: desde n/d hasta 1.0.40; CityLogic: desde n/d hasta 1.1.29; i-max: desde n/d hasta 1.6.2; Emmet Lite: desde n/d hasta 1.7.5; Decode: desde n/d hasta 3.15.3; Sliding Door: desde n/d hasta 3.3; Shopstar!: desde n/d hasta 1.1.33; Gridsby: desde n/d hasta 1.3.0; HappenStance: desde n/d hasta 3.0.1; i-excel: desde n/d hasta 1.7.9; Panoramic: desde n/d hasta 1.1.56; Sensible WP: desde n/d hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31464.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31464.json index 02e0af8befa..9c8dbab15a0 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31464.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31464.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.19, 15.5.4, and 15.9-rc-1, it is possible to access the hash of a password by using the diff feature of the history whenever the object storing the password is deleted. Using that vulnerability it's possible for an attacker to have access to the hash password of a user if they have rights to edit the users' page. With the default right scheme in XWiki this vulnerability is normally prevented on user profiles, except by users with Admin rights. Note that this vulnerability also impacts any extensions that might use passwords stored in xobjects: for those usecases it depends on the right of those pages. There is currently no way to be 100% sure that this vulnerability has been exploited, as an attacker with enough privilege could have deleted the revision where the xobject was deleted after rolling-back the deletion. But again, this operation requires high privileges on the target page (Admin right). A page with a user password xobject which have in its history a revision where the object has been deleted should be considered at risk and the password should be changed there. a diff, to ensure it's not coming from a password field. As another mitigation, admins should ensure that the user pages are properly protected: the edit right shouldn't be allowed for other users than Admin and owner of the profile (which is the default right). There is not much workaround possible for a privileged user other than upgrading XWiki." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 5.0-rc-1 y antes de las versiones 14.10.19, 15.5.4 y 15.9-rc-1, es posible acceder al hash de una contrase\u00f1a utilizando la funci\u00f3n diff del historial siempre que se elimine el objeto que almacena la contrase\u00f1a. Utilizando esa vulnerabilidad, es posible que un atacante tenga acceso al hash de la contrase\u00f1a de un usuario si tiene derechos para editar la p\u00e1gina del usuario. Con el esquema de derechos predeterminado en XWiki, esta vulnerabilidad normalmente se evita en los perfiles de usuario, excepto en el caso de los usuarios con derechos de administrador. Tenga en cuenta que esta vulnerabilidad tambi\u00e9n afecta a cualquier extensi\u00f3n que pueda utilizar contrase\u00f1as almacenadas en xobjects: para esos casos de uso, depende de los derechos de esas p\u00e1ginas. Actualmente no hay forma de estar 100% seguro de que esta vulnerabilidad haya sido explotada, ya que un atacante con suficientes privilegios podr\u00eda haber eliminado la revisi\u00f3n en la que se elimin\u00f3 el xobject despu\u00e9s de revertir la eliminaci\u00f3n. Pero, de nuevo, esta operaci\u00f3n requiere privilegios elevados en la p\u00e1gina de destino (derecho de administrador). Una p\u00e1gina con una contrase\u00f1a de usuario xobject que tenga en su historial una revisi\u00f3n en la que se haya eliminado el objeto debe considerarse en riesgo y la contrase\u00f1a debe cambiarse all\u00ed. un diff, para asegurarse de que no provenga de un campo de contrase\u00f1a. Como otra mitigaci\u00f3n, los administradores deben asegurarse de que las p\u00e1ginas de usuario est\u00e9n protegidas adecuadamente: el derecho de edici\u00f3n no debe permitirse a otros usuarios que no sean el administrador y el propietario del perfil (que es el derecho predeterminado). No hay muchas workarounds posibles para un usuario privilegiado aparte de actualizar XWiki." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json index 473e9d584ad..899a4435b8a 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor to conduct a man in the middle attack when deploying Python scripts due to improper certificate validation. IBM X-Force ID: 287306." + }, + { + "lang": "es", + "value": "IBM Security Verify Access Appliance 10.0.0 a 10.0.7 podr\u00eda permitir que un actor malintencionado lleve a cabo un ataque de intermediario al implementar scripts de Python debido a una validaci\u00f3n de certificado incorrecta. ID de IBM X-Force: 287306." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json index 9e27942b029..ccc7cee5dc6 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Verify Access Appliance 10.0.0 through 10.0.7 contains hard-coded credentials which it uses for its own inbound authentication that could be obtained by a malicious actor. IBM X-Force ID: 287317.\n\n" + }, + { + "lang": "es", + "value": "IBM Security Verify Access Appliance 10.0.0 a 10.0.7 contiene credenciales codificadas que utiliza para su propia autenticaci\u00f3n de entrada y que podr\u00edan ser obtenidas por un actor malintencionado. ID de IBM X-Force: 287317." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31874.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31874.json index 607e26e69bb..90d0a164c7b 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31874.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31874.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Verify Access Appliance 10.0.0 through 10.0.7 uses uninitialized variables when deploying that could allow a local user to cause a denial of service. IBM X-Force ID: 287318." + }, + { + "lang": "es", + "value": "IBM Security Verify Access Appliance 10.0.0 a 10.0.7 utiliza variables no inicializadas durante la implementaci\u00f3n que podr\u00edan permitir que un usuario local provoque una denegaci\u00f3n de servicio. ID de IBM X-Force: 287318." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31943.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31943.json index de4edac2937..ed5452c82fa 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31943.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31943.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Octolize USPS Shipping for WooCommerce \u2013 Live Rates.This issue affects USPS Shipping for WooCommerce \u2013 Live Rates: from n/a through 1.9.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Octolize USPS Shipping for WooCommerce \u2013 Live Rates. Este problema afecta a USPS Shipping for WooCommerce \u2013 Live Rates: desde n/d hasta 1.9.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31944.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31944.json index 0c7f7c61024..32b5cfd3e20 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31944.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31944.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Octolize WooCommerce UPS Shipping \u2013 Live Rates and Access Points.This issue affects WooCommerce UPS Shipping \u2013 Live Rates and Access Points: from n/a through 2.2.4.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Octolize WooCommerce UPS Shipping \u2013 Live Rates and Access Points. Este problema afecta a WooCommerce UPS Shipping \u2013 Tarifas en vivo y puntos de acceso: desde n/a hasta 2.2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json index d83649f2e4c..8391a41c0ae 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP2). Affected devices allow authenticated users to export monitoring data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download files from the file system. Under certain circumstances the downloaded files are deleted from the file system." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SINEC NMS (todas las versiones < V2.0 SP2). Los dispositivos afectados permiten a los usuarios autenticados exportar datos de monitoreo. El endpoint de la API correspondiente es susceptible a path traversal y podr\u00eda permitir que un atacante autenticado descargue archivos del sistema de archivos. En determinadas circunstancias, los archivos descargados se eliminan del sistema de archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3101.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3101.json index 9e1d8fa592a..0903a353870 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3101.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3101.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In mintplex-labs/anything-llm, an improper input validation vulnerability allows attackers to escalate privileges by deactivating 'Multi-User Mode'. By sending a specially crafted curl request with the 'multi_user_mode' parameter set to false, an attacker can deactivate 'Multi-User Mode'. This action permits the creation of a new admin user without requiring a password, leading to unauthorized administrative access." + }, + { + "lang": "es", + "value": "En mintplex-labs/anything-llm, una vulnerabilidad de validaci\u00f3n de entrada incorrecta permite a los atacantes aumentar los privilegios desactivando el \"Modo multiusuario\". Al enviar una solicitud curl especialmente manipulada con el par\u00e1metro \"multi_user_mode\" establecido en falso, un atacante puede desactivar el \"Modo multiusuario\". Esta acci\u00f3n permite la creaci\u00f3n de un nuevo usuario administrador sin necesidad de una contrase\u00f1a, lo que conduce a un acceso administrativo no autorizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3102.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3102.json index a0891d1876a..66fc2e0e0c3 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3102.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:59.667", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json index f938ab241f7..48098157296 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3104.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:17.260", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json index ea65e3a817d..b9ee1b35a4a 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3110.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:59.900", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json index 7fa81005a24..9b845bda297 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3150.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:00.350", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3152.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3152.json index c4565a3d966..43b0a47c176 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3152.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:17.490", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json index b1fc276eb59..81ae9188d4e 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:00.817", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json index c61e5d62138..b54d97020d2 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32608.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T05:15:13.110", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json index 3bb6b22d986..e36e879df51 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T19:15:56.390", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32992.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32992.json index d248709f527..d2686929bbb 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32992.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32992.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insufficient verification vulnerability in the baseband module\nImpact: Successful exploitation of this vulnerability will affect availability." + }, + { + "lang": "es", + "value": "Vulnerabilidad de verificaci\u00f3n insuficiente en el m\u00f3dulo de banda base Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3283.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3283.json index 42943ae5c43..4780c1229f6 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3283.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3283.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in mintplex-labs/anything-llm allows users with manager roles to escalate their privileges to admin roles through a mass assignment issue. The '/admin/system-preferences' API endpoint improperly authorizes manager-level users to modify the 'multi_user_mode' system variable, enabling them to access the '/api/system/enable-multi-user' endpoint and create a new admin user. This issue results from the endpoint accepting a full JSON object in the request body without proper validation of modifiable fields, leading to unauthorized modification of system settings and subsequent privilege escalation." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en mintplex-labs/anything-llm permite a los usuarios con funciones de administrador escalar sus privilegios a funciones de administrador a trav\u00e9s de un problema de asignaci\u00f3n masiva. El endpoint de la API '/admin/system-preferences' autoriza incorrectamente a los usuarios de nivel de administrador a modificar la variable del sistema 'multi_user_mode', lo que les permite acceder al endpoint '/api/system/enable-multi-user' y crear un nuevo usuario administrador. Este problema se produce cuando el endpoint acepta un objeto JSON completo en el cuerpo de la solicitud sin la validaci\u00f3n adecuada de los campos modificables, lo que lleva a la modificaci\u00f3n no autorizada de la configuraci\u00f3n del sistema y la posterior escalada de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json index 55a9f4e32dd..a4cb6fdd859 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:12.243", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame." + }, + { + "lang": "es", + "value": "DOS transitorio mientras se analiza un IE sin herencia del elemento de extensi\u00f3n cuando la longitud del IE es 2 del framework de baliza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json index a5d9fcd4cc3..47ab515e527 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:12.510", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure while parsing the multiple MBSSID IEs from the beacon." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n mientras se analizan los m\u00faltiples IE MBSSID de la baliza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json index 67b8aa7dcbb..d006613ce8c 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:12.710", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while taking snapshot when an offset variable is set by camera driver." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al tomar una instant\u00e1nea cuando el controlador de la c\u00e1mara establece una variable de desplazamiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json index 55f77eb418c..32075807c1f 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:12.917", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while redirecting log file to any file location with any file name." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al redirigir el archivo de registro a cualquier ubicaci\u00f3n de archivo con cualquier nombre de archivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json index 3a63d8d6cdc..ca7904d1fc8 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:13.117", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host." + }, + { + "lang": "es", + "value": "DOS transitorio cuando la transmisi\u00f3n del framework de administraci\u00f3n enviado por el host no es exitosa y se recibe un estado de error en el host." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json index 35e72be37b5..3613f859596 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:13.323", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS while parsing ESP IE from beacon/probe response frame." + }, + { + "lang": "es", + "value": "DOS transitorio al analizar ESP IE desde el framework de respuesta de sonda/baliza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json index 83db64ae6c0..493f5b198e4 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:13.510", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0." + }, + { + "lang": "es", + "value": "DOS transitorio al analizar el IE MBSSID de las balizas cuando la longitud de IE es 0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json index 710508ee250..0e997f9c08c 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:13.703", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n durante el an\u00e1lisis de los campos de recuento de cambios de par\u00e1metros BSS o de capacidades MLD del ML IE." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json index 30011260e16..d776f7d5d40 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-02T16:15:10.300", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3317.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3317.json index 3a5e4960fbe..663e7bd69ca 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3317.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3317.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper access control was identified in the Identity Security Cloud (ISC) message server API that allowed an authenticated user to exfiltrate job processing metadata (opaque messageIDs, work queue depth and counts) for other tenants." + }, + { + "lang": "es", + "value": "Se identific\u00f3 un control de acceso inadecuado en la API del servidor de mensajes de Identity Security Cloud (ISC) que permit\u00eda a un usuario autenticado filtrar metadatos de procesamiento de trabajos (ID de mensajes opacos, profundidad de la cola de trabajo y recuentos) para otros inquilinos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3318.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3318.json index 572a4047df7..1f96f70c60e 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3318.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3318.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the \u201cfile\u201c attribute, which in turn allowed the user to access files uploaded for other sources." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad de path traversal de archivo en el conector en la nube DelimitedFileConnector que permit\u00eda a un administrador autenticado establecer atributos de conector arbitrarios, incluido el atributo \u201carchivo\u201d, lo que a su vez permit\u00eda al usuario acceder a archivos cargados para otras fuentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3319.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3319.json index d992c29ecda..2b8d9d28138 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3319.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3319.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was identified in the Identity Security Cloud (ISC) Transform preview and IdentityProfile preview API endpoints that allowed an authenticated administrator to execute user-defined templates as part of attribute transforms which could allow remote code execution on the host." + }, + { + "lang": "es", + "value": "Se identific\u00f3 un problema en los endpoints de la API de vista previa de Transform de Identity Security Cloud (ISC) y de vista previa de IdentityProfile que permit\u00edan que un administrador autenticado ejecutara plantillas definidas por el usuario como parte de las transformaciones de atributos, lo que podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo en el host." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json index cc471f4ee8f..03e2e7a1ec1 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:01.247", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json index 8af9c483aba..ecb44231d2f 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3382.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled." + }, + { + "lang": "es", + "value": "Existe una fuga de memoria en el software PAN-OS de Palo Alto Networks que permite a un atacante enviar una r\u00e1faga de paquetes manipulados a trav\u00e9s del firewall que, en \u00faltima instancia, impide que el firewall procese el tr\u00e1fico. Este problema se aplica \u00fanicamente a los dispositivos de la serie PA-5400 que ejecutan el software PAN-OS con la funci\u00f3n SSL Forward Proxy habilitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json index a555cf6142d..abe21dbc47d 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la forma en que el software PAN-OS de Palo Alto Networks procesa los datos recibidos de los agentes de Cloud Identity Engine (CIE) permite la modificaci\u00f3n de los grupos de ID de usuario. Esto afecta el acceso de los usuarios a los recursos de la red, donde se les puede negar o permitir el acceso de manera inapropiada a los recursos seg\u00fan las reglas de la pol\u00edtica de seguridad existentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json index 2a24188d865..fd942a26b28 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el software PAN-OS de Palo Alto Networks permite a un atacante remoto reiniciar los firewalls PAN-OS cuando recibe paquetes de Windows New Technology LAN Manager (NTLM) de servidores Windows. Los ataques repetidos eventualmente hacen que el firewall entre en modo de mantenimiento, lo que requiere una intervenci\u00f3n manual para volver a ponerlo en l\u00ednea." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json index 2bc2ba406c1..1dcd878950c 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.\n\nThis affects the following hardware firewall models:\n- PA-5400 Series firewalls\n- PA-7000 Series firewalls" + }, + { + "lang": "es", + "value": "Un mecanismo de procesamiento de paquetes en el software PAN-OS de Palo Alto Networks permite a un atacante remoto reiniciar los firewalls basados en hardware. Los ataques repetidos eventualmente hacen que el firewall entre en modo de mantenimiento, lo que requiere una intervenci\u00f3n manual para volver a ponerlo en l\u00ednea. Esto afecta a los siguientes modelos de firewall de hardware: - Firewalls de la serie PA-5400 - Firewalls de la serie PA-7000" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json index 90ca81de95f..e082d6ce30b 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de comparaci\u00f3n de cadenas incorrecta en el software PAN-OS de Palo Alto Networks impide que las exclusiones de descifrado predefinidas funcionen como est\u00e1 previsto. Esto puede provocar que el tr\u00e1fico destinado a dominios que no est\u00e1n especificados en las exclusiones de descifrado predefinidas se excluya involuntariamente del descifrado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3387.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3387.json index f75400fd73b..9b8b57025a8 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3387.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3387.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient computing resources, the attacker could break encrypted communication and expose sensitive information that is shared between the management server and the firewalls." + }, + { + "lang": "es", + "value": "Un certificado de dispositivo d\u00e9bil (baja potencia de bits) en el software Panorama de Palo Alto Networks permite a un atacante realizar un ataque de intermediario (MitM) para capturar el tr\u00e1fico cifrado entre el servidor de administraci\u00f3n de Panorama y los firewalls que administra. Con suficientes recursos inform\u00e1ticos, el atacante podr\u00eda interrumpir la comunicaci\u00f3n cifrada y exponer informaci\u00f3n confidencial que se comparte entre el servidor de administraci\u00f3n y los firewalls." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json index 0f80fd13f29..b2c8c6d4dd0 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en GlobalProtect Gateway del software PAN-OS de Palo Alto Networks permite que un atacante autenticado se haga pasar por otro usuario y env\u00ede paquetes de red a recursos internos. Sin embargo, esta vulnerabilidad no permite que el atacante reciba paquetes de respuesta de esos recursos internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json index dfe26d97d05..05c13eb5b1b 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json index 1f166102e89..9f90bca2597 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json index 5f74520930c..90011d32c7c 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json index eafe7de5fda..b7781479322 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json index bb6494d467c..5254baaa72d 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json index 274b7e924a1..dea96e743c9 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json index f851248c667..2d39445da4f 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader se ven afectadas por una vulnerabilidad de tipo Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json index 9eefe73093f..39e1b59f5c3 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 20.005.30574, 24.002.20736 y anteriores de Acrobat Reader Respuesta: est\u00e1n afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json index 329938cd119..3a5dc9bf402 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:01.890", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json index dd4650c8d6d..ff638444d50 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-12T21:15:50.747", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35178.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35178.json index 75792a7b356..166f7bf834b 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35178.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35178.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T16:15:11.937", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35179.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35179.json index 564c78c896e..ecd73dbef69 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35179.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35179.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, when using `RUN_AS_USER`, the specified user (and therefore, web interface admins) can read arbitrary files as root. This issue affects admins who have set up to run stalwart with `RUN_AS_USER` who handed out admin credentials to the mail server but expect these to only grant access according to the `RUN_AS_USER` and are attacked where the attackers managed to achieve Arbitrary Code Execution using another vulnerability. Version 0.8.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Stalwart Mail Server es un servidor de correo de c\u00f3digo abierto. Antes de la versi\u00f3n 0.8.0, al usar `RUN_AS_USER`, el usuario especificado (y, por lo tanto, los administradores de la interfaz web) pueden leer archivos arbitrarios como root. Este problema afecta a los administradores que han configurado la ejecuci\u00f3n de stalwart con `RUN_AS_USER` y que han entregado credenciales de administrador al servidor de correo, pero esperan que estas solo otorguen acceso de acuerdo con `RUN_AS_USER` y son atacados cuando los atacantes lograron ejecutar c\u00f3digo arbitrario utilizando otra vulnerabilidad. La versi\u00f3n 0.8.0 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json index a869255424e..45ffbd619dc 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance." + }, + { + "lang": "es", + "value": "Las versiones anteriores a la 25.0 de Bitcoin Core permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (afirmaci\u00f3n de manejo de mensajes blocktxn y salida de nodo) mediante la inclusi\u00f3n de transacciones en un mensaje blocktxn que no est\u00e1n confirmadas en la ra\u00edz merkle de un bloque. FillBlock se puede llamar dos veces para una instancia de PartiallyDownloadedBlock." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json index 8a00393ce7a..d1327a7dd44 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In JetBrains YouTrack before 2024.1.29548 the SMTPS protocol communication lacked proper certificate hostname validation" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.1.29548, la comunicaci\u00f3n del protocolo SMTPS carec\u00eda de la validaci\u00f3n adecuada del nombre de host del certificado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json index 8848ad3e648..9c4a825447d 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In JetBrains TeamCity between 2024.03 and 2024.03.1 several stored XSS in the available updates page were possible" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity entre 2024.03 y 2024.03.1 fueron posibles varios XSS almacenado en la p\u00e1gina de actualizaciones disponibles" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json index 80d760a033f..d4dfdb56947 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In JetBrains TeamCity before 2024.03.1 commit status publisher didn't check project scope of the GitHub App token" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes del 1 de marzo de 2024, el publicador del estado de confirmaci\u00f3n no verificaba el alcance del proyecto del token de la aplicaci\u00f3n de GitHub" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json index dbc4ef7b779..e37ad215330 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In JetBrains TeamCity before 2023.11 stored XSS during restore from backup was possible" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2023.11 era posible XSS almacenado durante la restauraci\u00f3n desde una copia de seguridad" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3568.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3568.json index a932cba681e..70311b3b78d 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3568.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3568.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The huggingface/transformers library is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_repo_checkpoint()` function of the `TFPreTrainedModel()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine." + }, + { + "lang": "es", + "value": "La librer\u00eda huggingface/transformers es vulnerable a la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de la deserializaci\u00f3n de datos no confiables dentro de la funci\u00f3n `load_repo_checkpoint()` de la clase `TFPreTrainedModel()`. Los atacantes pueden ejecutar c\u00f3digo y comandos arbitrarios creando una carga serializada maliciosa, explotando el uso de `pickle.load()` en datos de fuentes potencialmente no confiables. Esta vulnerabilidad permite la ejecuci\u00f3n remota de c\u00f3digo (RCE) al enga\u00f1ar a las v\u00edctimas para que carguen un punto de control aparentemente inofensivo durante un proceso de entrenamiento normal, lo que permite a los atacantes ejecutar c\u00f3digo arbitrario en la m\u00e1quina de destino." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3569.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3569.json index ed31a83dbb8..8f9ee0abd39 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3569.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3569.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Denial of Service (DoS) vulnerability exists in the mintplex-labs/anything-llm repository when the application is running in 'just me' mode with a password. An attacker can exploit this vulnerability by making a request to the endpoint using the [validatedRequest] middleware with a specially crafted 'Authorization:' header. This vulnerability leads to uncontrolled resource consumption, causing a DoS condition." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el repositorio mintplex-labs/anything-llm cuando la aplicaci\u00f3n se ejecuta en modo \"solo yo\" con una contrase\u00f1a. Un atacante puede aprovechar esta vulnerabilidad al realizar una solicitud al endpoint mediante el middleware [validatedRequest] con un encabezado \"Authorization:\" especialmente manipulado. Esta vulnerabilidad conduce a un consumo descontrolado de recursos, lo que provoca una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3570.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3570.json index 0c5a7e73573..2df5aad7615 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3570.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3570.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross-Site Scripting (XSS) vulnerability exists in the chat functionality of the mintplex-labs/anything-llm repository, allowing attackers to execute arbitrary JavaScript in the context of a user's session. By manipulating the ChatBot responses, an attacker can inject malicious scripts to perform actions on behalf of the user, such as creating a new admin account or changing the user's password, leading to a complete takeover of the AnythingLLM application. The vulnerability stems from the improper sanitization of user and ChatBot input, specifically through the use of `dangerouslySetInnerHTML`. Successful exploitation requires convincing an admin to add a malicious LocalAI ChatBot to their AnythingLLM instance." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting (XSS) almacenado en la funcionalidad de chat del repositorio mintplex-labs/anything-llm, que permite a los atacantes ejecutar JavaScript arbitrario en el contexto de la sesi\u00f3n de un usuario. Al manipular las respuestas de ChatBot, un atacante puede inyectar secuencias de comandos maliciosas para realizar acciones en nombre del usuario, como crear una nueva cuenta de administrador o cambiar la contrase\u00f1a del usuario, lo que lleva a una toma de control completa de la aplicaci\u00f3n AnythingLLM. La vulnerabilidad se origina en la desinfecci\u00f3n incorrecta de la entrada del usuario y del ChatBot, espec\u00edficamente mediante el uso de `dangerouslySetInnerHTML`. Para explotarla con \u00e9xito, es necesario convencer a un administrador de que agregue un LocalAI ChatBot malicioso a su instancia de AnythingLLM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json index 9dafd15db48..8c29cba82fd 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:57.840", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json index 74fdf7d18b3..b60debd6ae6 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:58.117", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json index 1ac9fe2b482..4bb34331227 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some parameters, which could allow unauthenticated visitors to perform Cross-Site Scripting attacks against admins" + }, + { + "lang": "es", + "value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no desinfecta ni escapa algunos par\u00e1metros, lo que podr\u00eda permitir que visitantes no autenticados realicen ataques de Cross-Site Scripting contra administradores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json index 50fccd6c7cc..048a9bc3cc2 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Newsletter Popup WordPress plugin through 1.2 does not have CSRF check when deleting subscriber, which could allow attackers to make logged in admins perform such action via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no tiene verificaci\u00f3n CSRF al eliminar suscriptores, lo que podr\u00eda permitir a los atacantes hacer que los administradores registrados realicen dicha acci\u00f3n a trav\u00e9s de un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json index cc7fc1cb233..ecbe06d630e 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json index 071c1f183e7..15eb24ee0b8 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T19:15:58.403", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json index a0f8e85f5a4..c9e7af9a538 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T19:15:58.683", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json index 7d86352fbd2..a9fc91a5b7d 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37976.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:05.913", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json index 466a2ca200e..fb2bafb7f2f 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37979.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.117", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json index ac132001607..0549a959fbf 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37982.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.313", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json index 14633640f49..3946b4603cc 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.520", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json index 39d76b46655..fbd13835245 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on the getQueryData() function in all versions up to, and including, 3.10.15. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform arbitrary SQL queries that can be leveraged for privilege escalation among many other actions." + }, + { + "lang": "es", + "value": "El complemento Visualizer: Tables and Charts Manager for WordPress es vulnerable a modificaciones y recuperaciones de datos no autorizadas debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n getQueryData() en todas las versiones hasta la 3.10.15 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen consultas SQL arbitrarias que se pueden aprovechar para la escalada de privilegios, entre muchas otras acciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json index da9d048a3a8..e0ae739661e 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38029.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.730", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json index df46b5ae41d..9833f87f398 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.973", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38037.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38037.json index 870904f2745..545d4865f67 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38037.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38037.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:07.207", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38038.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38038.json index aa97262f159..e621debb049 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38038.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38038.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:07.413", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38039.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38039.json index e8ec9631fb1..da1992af605 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38039.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38039.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:07.633", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38040.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38040.json index 03fc5b93adc..7c4c82dbe95 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38040.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38040.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:07.897", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json index 3fbbab11a61..b3b27e4d4c1 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38097.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.933", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json index 608e260be1d..556bf162e8b 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38124.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.127", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json index 75d86632a24..7a70a61f23d 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38129.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.323", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json index aaf55043c1b..80dc25421f3 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38149.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.517", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json index e576ebad4fe..7e36fb53824 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38179.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.717", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json index cb22423a7c8..705212d0add 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38212.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:07.940", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json index 3139ef28577..5faa87371ef 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.153", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json index ca4004ee779..66163e37c4f 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.367", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json index 2b7df522980..36b85a08757 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38262.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.593", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json index 7471b78dbcc..8505dc28cb9 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38265.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.797", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json index aa6fa861ab9..44e7be17cc6 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:14.333", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS while parsing probe response and assoc response frame." + }, + { + "lang": "es", + "value": "DOS transitorio mientras se analiza la respuesta de la sonda y el framework de respuesta asociado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json index 00d7c031c02..57d6c018ebe 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:14.540", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing user packets to generate page faults." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante el procesamiento de paquetes de usuario para generar fallas de p\u00e1gina." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json index 8b2a8c3d51d..e0abf20a94e 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:14.730", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure while sending implicit broadcast containing APP launch information." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n durante el env\u00edo de una transmisi\u00f3n impl\u00edcita que contiene informaci\u00f3n sobre el lanzamiento de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json index 9880df02f85..b0812fd8de7 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-02T21:15:10.997", "lastModified": "2024-07-03T12:53:24.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json index dc009ea2d6a..776a9514971 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39324.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-02T21:15:11.213", "lastModified": "2024-07-03T12:53:24.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json index 551f91c8f4d..1ab3efb9332 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39325.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-02T21:15:11.433", "lastModified": "2024-07-03T12:53:24.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json index ef18bc2fd70..2e11eba6886 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39436.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:06.550", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json index 3d1614cbc0d..a1fdabd3db9 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39437.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:08.313", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json index c7caf8ccdb4..b297b86f6f8 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39438.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:08.687", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json index cb9877c31d6..42a4e499a75 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39439.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:08.940", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json index 1bba84d81d4..0ddf13d2053 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39440.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@unisoc.com", "published": "2024-10-09T07:15:09.217", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json index 1d36367a54c..c21f322e53e 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39586.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-09T07:15:09.473", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json index c81e25a4d29..ce1b8403a60 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39806.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.183", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json index 5c3149b3662..99d231191d7 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39831.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.447", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41585.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41585.json index 42bdb85dca4..d79593485c3 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41585.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41585.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-03T19:15:04.197", "lastModified": "2024-10-07T19:37:13.900", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41588.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41588.json index 6bb3b328879..8e4a20abf2a 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41588.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41588.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-03T19:15:04.363", "lastModified": "2024-10-07T19:37:15.063", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41590.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41590.json index e44fb058aee..a9e99678075 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41590.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41590.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-03T19:15:04.487", "lastModified": "2024-10-07T19:37:16.150", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json index a8ad9d84f7b..8e2f9543763 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41666.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.090", "lastModified": "2024-07-25T12:36:39.947", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json index 47e1ae151c4..3297b6e5bbe 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41667.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-24T18:15:05.310", "lastModified": "2024-08-06T20:15:39.877", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json index de1bab26978..eb8d7160c05 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41858.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T09:15:12.450", "lastModified": "2024-08-14T13:00:37.107", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json index 8d5ea6b2cb6..4d877339266 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:14.127", "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json index a071425d750..2609e9c655f 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources." + }, + { + "lang": "es", + "value": "La entrop\u00eda de contrase\u00f1a E2EE generada por Rocket.Chat Mobile antes de la versi\u00f3n 4.5.1 es insuficiente, lo que permite a los atacantes descifrarla si tienen el tiempo y los recursos adecuados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json index 8251740477f..ca4912ff11b 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS Pro para WordPress es vulnerable al acceso no autorizado a los datos, la modificaci\u00f3n de los datos y la p\u00e9rdida de datos debido a la falta de comprobaci\u00f3n de la capacidad en varias funciones en todas las versiones hasta la 2.7.0 incluida. Esto permite que atacantes no autenticados agreguen, modifiquen o eliminen metadatos de usuario y opciones del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json index af6dabd7910..0f73bdf2e4f 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Tutor LMS \u2013 eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference to Arbitrary Course Deletion in versions up to, and including, 2.7.0 via the 'tutor_course_delete' function due to missing validation on a user controlled key. This can allow authenticated attackers, with Instructor-level permissions and above, to delete any course." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS \u2013 eLearning and online course solution para WordPress es vulnerable a la Referencia directa insegura a objetos para la eliminaci\u00f3n arbitraria de cursos en versiones hasta la 2.7.0 incluida a trav\u00e9s de la funci\u00f3n 'tutor_course_delete' debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto puede permitir que atacantes autenticados, con permisos de nivel de Instructor y superiores, eliminen cualquier curso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json index 5d3fede7b2d..8707d01bafe 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link\u2019 parameter in versions up to, and including, 1.6.7.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'link' en versiones hasta la 1.6.7.14 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json index 8b8c5af5fa3..0312529c698 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T16:15:09.413", "lastModified": "2024-08-26T19:10:18.890", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43289.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43289.json index fa46dbd8713..32f20f073e4 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43289.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43289.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T16:15:09.640", "lastModified": "2024-08-26T19:10:18.890", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json index 9e0401be1de..79e82c9981a 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:16.247", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json index 3218e556f6e..47cd5831d53 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.070", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json index d2591e66885..fcc945e3b29 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.147", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json index e88bdf880bb..c874476cc0b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.433", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json index 0a9b37638b2..8d9c2bbfa87 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.620", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json index 480bf40afb9..128c8365ee0 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.810", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json index 8c18376b250..a10279d1b82 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.027", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json index 45947d67548..12ed1144685 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.230", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json index 2ecbfcbfce2..026d207c06e 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.437", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json index 5088328df21..f4144e385f6 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.630", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json index ffe9663cf69..2a91515caa4 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.830", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json index 805e36434ea..41d4ecb778c 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.030", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json index a70e23ec10b..c4c48094493 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.263", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json index b634f7dd476..a0be817e057 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:23.410", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json index 2e31b29f4e9..e66025c947a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.207", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json index a12fecd6e0e..a4e59b172f9 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.400", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json index eedb4a2d586..fa7772bb110 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.030", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json index 388a5f1e46b..60b97f42b07 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.257", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json index 48faf12e651..a4c0a4d63d7 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.450", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json index a000cc095da..6915106a5e0 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.647", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json index f81cd7badc3..33daf07eb14 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.850", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json index 63f20fad6ce..ce95d229474 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.063", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json index 1eee70db62b..16b780a9b68 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.283", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json index 7857bef1e25..af4ce1d46d4 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.497", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json index a9d606b999f..2b1d755ca5b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43589.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.700", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json index 5dd57e44f9b..ebc3ae50a94 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.913", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json index 33e5dd0ecfd..5a5173202b2 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.127", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json index 9e20b6344c3..70536149421 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.327", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json index 02497ae1a43..91d81d3c48a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.553", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json index e24479adbb6..c68c4005b8f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.753", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json index 5f00571b625..d278fd5db7d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43601.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.953", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json index 39e9f7aff89..212bead372f 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.150", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json index e56f3c649ba..f6d889147d3 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.347", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json index 833aefe998e..b7922590d03 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43607.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.597", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json index e09aa9f0f3e..263017392a2 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43608.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:28.813", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json index 0558ca3de28..a3d1d64fa06 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43609.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.037", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json index 08fbce34d60..84cf3b4935d 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43611.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.240", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json index b96d02ac2f7..b54745a39f5 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43612.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.437", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json index 14d111468e4..e1138c20b78 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43614.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.623", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json index b6f622148b9..2134d2e79aa 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43615.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:29.813", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json index f1210b81abd..1f1ee701232 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43616.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:30.020", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43683.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43683.json index 10ec7c23c0e..3d663d82743 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43683.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43683.json @@ -3,7 +3,7 @@ "sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "published": "2024-10-04T20:15:06.513", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43684.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43684.json index 37aae4d2e92..8dcbfd0809c 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43684.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43684.json @@ -3,7 +3,7 @@ "sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "published": "2024-10-04T20:15:06.710", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43685.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43685.json index 8cc6e8a044e..5172b151817 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43685.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43685.json @@ -3,7 +3,7 @@ "sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "published": "2024-10-04T20:15:06.830", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43686.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43686.json index ef351094698..4f300e71545 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43686.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43686.json @@ -3,7 +3,7 @@ "sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "published": "2024-10-04T20:15:06.960", "lastModified": "2024-10-07T21:15:16.470", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43687.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43687.json index a64bb19969b..da81df18f32 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43687.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "published": "2024-10-04T20:15:07.087", "lastModified": "2024-10-07T21:15:16.630", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json index 307465adcbd..ea22dcb7c6a 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43696.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.680", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json index 0ae941d9241..91c48d71463 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43697.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:07.913", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json index 9c22ae02050..1dd8e06b434 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Tutor LMS plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018question_id\u2019 parameter in versions up to, and including, 2.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Instructor-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'question_id' en versiones hasta la 2.7.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes autenticados, con permisos de nivel de instructor y superiores, agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4320.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4320.json index 5a62f9138df..67f4aec0a7d 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4320.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:02.453", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json index af77e67211d..feb16b6759f 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'authenticate' function in all versions up to, and including, 2.7.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain control of an existing administrator account." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS Pro para WordPress es vulnerable al acceso no autorizado a los datos, la modificaci\u00f3n de los datos y la p\u00e9rdida de datos debido a la falta de verificaci\u00f3n de la funci\u00f3n \"autenticaci\u00f3n\" en todas las versiones hasta la 2.7.0 incluida. Esto permite que atacantes autenticados, con permisos de nivel de suscriptor o superior, obtengan el control de una cuenta de administrador existente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json index 5716dc1aa27..a3df409e8ab 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Tutor LMS Pro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on the 'get_calendar_materials' function. The plugin is also vulnerable to SQL Injection via the \u2018year\u2019 parameter of that function due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS Pro para WordPress es vulnerable al acceso no autorizado a los datos, la modificaci\u00f3n de los datos y la p\u00e9rdida de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n 'get_calendar_materials'. El complemento tambi\u00e9n es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'year' de esa funci\u00f3n debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con permisos de nivel de suscriptor y superiores, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json index 82d7b5dfd89..c7eb3cb0e42 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Envo Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 1.8.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Envo Extra para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de m\u00faltiples par\u00e1metros en versiones hasta la 1.8.16 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44010.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44010.json index aa544a38ce6..27db129d4c9 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44010.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44010.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Full frame allows Stored XSS.This issue affects Full frame: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Catch Themes Full frame permite XSS almacenado. Este problema afecta a Full frame: desde n/a hasta 2.7.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44011.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44011.json index 20894cc9463..5acb041e3f0 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44011.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44011.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Ticket Ultra WP Ticket Ultra Help Desk & Support Plugin allows PHP Local File Inclusion.This issue affects WP Ticket Ultra Help Desk & Support Plugin: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en WP Ticket Ultra WP Ticket Ultra Help Desk & Support Plugin permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a WP Ticket Ultra Help Desk & Support Plugin: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44012.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44012.json index d5f36e87ee4..a25938d03f2 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44012.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44012.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wpdev33 WP Newsletter Subscription allows PHP Local File Inclusion.This issue affects WP Newsletter Subscription: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en wpdev33 WP Newsletter Subscription permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a WP Newsletter Subscription: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44013.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44013.json index 8701821d680..b4e2d0fecad 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44013.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Innate Images LLC VR Calendar allows PHP Local File Inclusion.This issue affects VR Calendar: from n/a through 2.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Innate Images LLC VR Calendar permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a VR Calendar: desde n/a hasta 2.4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44014.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44014.json index 4f436014c88..e14df7418e6 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44014.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44014.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Vmaxstudio Vmax Project Manager allows PHP Local File Inclusion, Code Injection.This issue affects Vmax Project Manager: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Vmaxstudio Vmax Project Manager permite la inclusi\u00f3n de archivos locales PHP y la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Vmax Project Manager: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44015.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44015.json index 7516b5b175a..007e7b962db 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44015.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44015.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Users Control allows PHP Local File Inclusion.This issue affects Users Control: from n/a through 1.0.16." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Users Control permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Users Control: desde n/a hasta 1.0.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44016.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44016.json index 6861b37fda0..3dc77a78f66 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44016.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mark Steadman Podiant allows PHP Local File Inclusion.This issue affects Podiant: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Mark Steadman Podiant permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Podiant: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44018.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44018.json index f75b3bee380..87454c69715 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44018.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44018.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Istmo Plugins Instant Chat Floating Button for WordPress Websites allows PHP Local File Inclusion.This issue affects Instant Chat Floating Button for WordPress Websites: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Istmo Plugins Instant Chat Floating Button for WordPress Websites permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta al bot\u00f3n flotante de chat instant\u00e1neo para sitios web de WordPress: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44022.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44022.json index 6180b5a10fb..92ade0674a8 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44022.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44022.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Trustmary Review & testimonial widgets allows Stored XSS.This issue affects Review & testimonial widgets: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Trustmary Review & testimonial widgets permite XSS almacenado. Este problema afecta a los widgets de rese\u00f1as y testimonios: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44023.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44023.json index 77182debad0..244d67b286e 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44023.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABCApp Creator allows PHP Local File Inclusion.This issue affects ABCApp Creator: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en ABCApp Creator permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a ABCApp Creator: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44024.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44024.json index 0fde9de1ba8..7457f7df38c 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44024.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Medical Addon for Elementor allows Stored XSS.This issue affects Medical Addon for Elementor: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NicheAddons Medical Addon for Elementor permite XSS almacenado. Este problema afecta al complemento m\u00e9dico NicheAddons para Elementor: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44025.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44025.json index 2c6a319f6b7..dbc19b25073 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44025.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44025.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nicejob NiceJob allows Stored XSS.This issue affects NiceJob: from n/a before 3.6.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Nicejob NiceJob permite XSS almacenado. Este problema afecta a NiceJob: desde n/a antes de 3.6.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44026.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44026.json index 81b5ca1cc6c..ad2db3592b2 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44026.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Charity Addon for Elementor allows Stored XSS.This issue affects Charity Addon for Elementor: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NicheAddons Charity Addon for Elementor permite XSS almacenado. Este problema afecta al complemento Charity para Elementor: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44027.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44027.json index d3781efaab8..64d4ac1e9cf 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44027.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44027.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TemeGUM Gum Elementor Addon allows Stored XSS.This issue affects Gum Elementor Addon: from n/a through 1.3.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en TemeGUM Gum Elementor Addon permite XSS almacenado. Este problema afecta al complemento Gum Elementor: desde n/a hasta 1.3.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44028.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44028.json index 6308169045e..2c495762680 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44028.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nicejob NiceJob allows Stored XSS.This issue affects NiceJob: from n/a before 3.6.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en NiceJob NiceJob permite XSS almacenado. Este problema afecta a NiceJob: desde n/a hasta 3.6.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44029.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44029.json index 5e914809e32..f81772b04c4 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44029.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in David Garlitz viala allows Reflected XSS.This issue affects viala: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en David Garlitz viala permite XSS reflejado. Este problema afecta a viala: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44032.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44032.json index c54b6fd9f19..dde5881591e 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44032.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Restaurant & Cafe Addon for Elementor allows Stored XSS.This issue affects Restaurant & Cafe Addon for Elementor: from n/a through 1.5.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NicheAddons Restaurant & Cafe Addon for Elementor permite XSS almacenado. Este problema afecta al complemento Restaurant & Cafe para Elementor: desde n/a hasta 1.5.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44033.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44033.json index 204414af81e..68687eb5d33 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44033.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Primary Addon for Elementor allows Stored XSS.This issue affects Primary Addon for Elementor: from n/a through 1.5.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NicheAddons Primary Addon for Elementor permite XSS almacenado. Este problema afecta al complemento principal de Elementor: desde n/a hasta 1.5.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44034.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44034.json index 45adbb166dc..2db35fe6a3a 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44034.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44034.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Martin Greenwood WPSPX allows PHP Local File Inclusion.This issue affects WPSPX: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Martin Greenwood WPSPX permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a WPSPX: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44035.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44035.json index 236dc2d9f2c..606339c3456 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44035.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TemeGUM Gum Elementor Addon allows Stored XSS.This issue affects Gum Elementor Addon: from n/a through 1.3.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en el complemento TemeGUM Gum Elementor permite XSS almacenado. Este problema afecta al complemento Gum Elementor: desde n/a hasta 1.3.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44036.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44036.json index 956f94765d4..f60b7e1292b 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44036.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Kodex Posts likes de Pierre Lebedel permite XSS almacenado. Este problema afecta a Kodex Posts likes: desde n/a hasta 2.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44037.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44037.json index c4ecffa73b5..4f828b0c682 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44037.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44037.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MagePeople Team Multipurpose Ticket Booking Manager allows Stored XSS.This issue affects Multipurpose Ticket Booking Manager: from n/a through 4.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en MagePeople Team Multipurpose Ticket Booking Manager permite XSS almacenado. Este problema afecta a Multipurpose Ticket Booking Manager: desde n/a hasta 4.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44039.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44039.json index 1241acb9f0a..10a49304a4a 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44039.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44039.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel allows Stored XSS.This issue affects WP Travel: from n/a through 9.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WP Travel permite XSS almacenado. Este problema afecta a WP Travel: desde n/a hasta 9.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44040.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44040.json index d99916207f3..31510bb42f5 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44040.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Plainware ShiftController Employee Shift Scheduling allows Stored XSS.This issue affects ShiftController Employee Shift Scheduling: from n/a through 4.9.64." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Plainware ShiftController Employee Shift Scheduling permite XSS almacenado. Este problema afecta a ShiftController Employee Shift Scheduling: desde n/a hasta 4.9.64." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44041.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44041.json index 5918406c283..4dd64292135 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44041.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44041.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Gibson IdeaPush allows Stored XSS.This issue affects IdeaPush: from n/a through 8.66." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Martin Gibson IdeaPush permite XSS almacenado. Este problema afecta a IdeaPush: desde n/a hasta 8.66." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44042.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44042.json index 26249b328ef..207d3a484fa 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44042.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fahad Mahmood WP Datepicker allows Stored XSS.This issue affects WP Datepicker: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WP Datepicker de Fahad Mahmood permite XSS almacenado. Este problema afecta a WP Datepicker: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json index b6dfd58d402..a7cc4500cda 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44043.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in 10Web Photo Gallery by 10Web allows Stored XSS.This issue affects Photo Gallery by 10Web: from n/a through 1.8.27." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en 10Web Photo Gallery de 10Web permite XSS almacenado. Este problema afecta a 10Web Photo Gallery: desde n/a hasta 1.8.27." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44045.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44045.json index 6c29190ea6f..925c7575a40 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44045.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44045.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kevon Adonis WP Abstracts allows Stored XSS.This issue affects WP Abstracts: from n/a through 2.6.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Kevon Adonis WP Abstracts permite XSS almacenado. Este problema afecta a WP Abstracts: desde n/a hasta 2.6.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44046.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44046.json index dbd48e1eb1e..a00a6d7e221 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44046.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44046.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themify Themify \u2013 WooCommerce Product Filter allows Stored XSS.This issue affects Themify \u2013 WooCommerce Product Filter: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Themify Themify \u2013 WooCommerce Product Filter permite XSS almacenado. Este problema afecta a Themify \u2013 WooCommerce Product Filter: desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json index 9c063862f7b..2a725a1463f 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Post and Page Builder by BoldGrid \u2013 Visual Drag and Drop Editor plguin for WordPress is vulnerable to Stored Cross-Site Scripting via an unknown parameter in versions up to, and including, 1.26.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Post and Page Builder de BoldGrid \u2013 Visual Drag and Drop Editor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de un par\u00e1metro desconocido en versiones hasta la 1.26.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json index a27322ba8df..e97f179a332 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Stack Group widget in all versions up to, and including, 3.10.7 due to insufficient input sanitization and output escaping on user supplied 'tooltip_position' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Image Stack Group en todas las versiones hasta la 3.10.7 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en el atributo 'tooltip_position' proporcionado por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json index f674bd29c3b..e0cbf459ca2 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45060.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.170", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json index 460f5d1f3d0..0a73f8ea7fe 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autenticaci\u00f3n incorrecta que podr\u00eda provocar una escalada de privilegios. Un atacante podr\u00eda aprovechar esta vulnerabilidad para obtener acceso no autorizado o privilegios elevados dentro de la aplicaci\u00f3n. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json index 1e53eec8dfe..07ec1ecea7b 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Cross-Site Scripting (XSS) vulnerability that could be exploited to execute arbitrary code. If an admin attacker can trick a user into clicking a specially crafted link or submitting a form, malicious scripts may be executed within the context of the victim's browser and have high impact on confidentiality and integrity. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de tipo Cross-Site Scripting (XSS) que podr\u00eda aprovecharse para ejecutar c\u00f3digo arbitrario. Si un atacante administrativo puede enga\u00f1ar a un usuario para que haga clic en un v\u00ednculo especialmente manipulado o env\u00ede un formulario, se pueden ejecutar scripts maliciosos dentro del contexto del navegador de la v\u00edctima y tener un gran impacto en la confidencialidad e integridad. Para aprovechar este problema es necesaria la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json index 4de9a6a43ab..69d1695288a 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system read. An admin attacker could exploit this vulnerability to read files from the system outside of the intended directories via PHP filter chain and also can have a low-availability impact on the service. Exploitation of this issue does not require user interaction and scope is changed." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar una lectura arbitraria del sistema de archivos. Un atacante administrador podr\u00eda aprovechar esta vulnerabilidad para leer archivos del sistema fuera de los directorios previstos a trav\u00e9s de la cadena de filtros PHP y tambi\u00e9n puede tener un impacto de baja disponibilidad en el servicio. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario y se modifica el alcance." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json index 6a7a0152fc7..b2a68430922 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have high impact on integrity. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para omitir las medidas de seguridad y tener un gran impacto en la integridad. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json index 5cdc7b87c02..500eadf8f0f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A low-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs and have a low impact on both confidentiality and integrity. Exploitation of this issue does not require user interaction and scope is changed." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Server-Side Request Forgery (SSRF) que podr\u00eda provocar la lectura arbitraria del sistema de archivos. Un atacante autenticado con pocos privilegios puede obligar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL arbitrarias y tener un impacto bajo tanto en la confidencialidad como en la integridad. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario y se modifica el alcance." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json index cfea8544ce4..2f761b953ab 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to alter a condition between the check and the use of a resource, having a low impact on integrity. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de verificaci\u00f3n y tiempo de uso (TOCTOU) que podr\u00eda provocar la omisi\u00f3n de una caracter\u00edstica de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para alterar una condici\u00f3n entre la verificaci\u00f3n y el uso de un recurso, lo que tendr\u00eda un impacto bajo en la integridad. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json index 2dab3897ca4..6664fe3ff2e 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on integrity. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para omitir las medidas de seguridad y tener un impacto bajo en la integridad. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json index a065d8c40ec..482193ce11e 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on confidentiality. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad para omitir las medidas de seguridad y tener un impacto bajo en la confidencialidad. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json index a1075fc53e1..d5bae8d388f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de tipo Cross-Site Scripting (XSS). Si un atacante logra convencer a una v\u00edctima de que visite una URL que haga referencia a una p\u00e1gina vulnerable, se puede ejecutar contenido JavaScript malicioso dentro del contexto del navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json index 8808da9aef4..93d11cf2c8c 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:13.163", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json index aa11b7cf638..76aaae17ff6 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45137.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:13.373", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json index 3a450776b04..ab9c1c6526a 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45138.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:05.723", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json index 371a4ea415f..f14e49f795d 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45139.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:05.947", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json index 6870fd9358d..5b6e475df5f 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45140.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.167", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json index d90db3b74bc..b26abc11746 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45141.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.380", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json index 608f0b745d4..2a64550a284 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45142.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.583", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json index 6f52b44300a..a8033b59627 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45143.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.783", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json index 41e55de8e20..9a3813366ee 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45144.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:06.973", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json index 5b08ab65fb3..149bd150f43 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45145.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T10:15:03.283", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json index 9f9d9dd0f86..5d4ec720bc2 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T09:15:05.693", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json index 40109b3d305..0d977f995d3 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T09:15:06.210", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json index 9022d8bfb9f..df30043bd60 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T14:15:07.183", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json index 5b65ebae374..5dc44f82675 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.20 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de cross-site scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar secuencias de comandos maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de una v\u00edctima cuando esta accede a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json index 9e7c709f67d..51cb8517ce9 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T08:15:03.760", "lastModified": "2024-09-30T18:35:06.983", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45245.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45245.json index de82cceab05..cfe5dbb658c 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45245.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45245.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Diebold Nixdorf \u2013 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" + }, + { + "lang": "es", + "value": "Diebold Nixdorf \u2013 CWE-200: Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45246.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45246.json index 80e3eb36fa7..d80354995a8 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45246.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45246.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Diebold Nixdorf \u2013 CWE-427: Uncontrolled Search Path Element" + }, + { + "lang": "es", + "value": "Diebold Nixdorf \u2013 CWE-427: Elemento de ruta de b\u00fasqueda no controlada" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45247.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45247.json index 7f6e8e66c0c..5cd05ec004f 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45247.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45247.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sonarr \u2013 CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" + }, + { + "lang": "es", + "value": "Sonarr \u2013 CWE-601: Redirecci\u00f3n de URL a un sitio no confiable (\u201cRedirecci\u00f3n abierta\u201d)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45248.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45248.json index 2134b544e7e..3fc6d087aa9 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45248.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45248.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Multi-DNC \u2013 CWE-35: Path Traversal: '.../...//'" + }, + { + "lang": "es", + "value": "Multi-DNC \u2013 CWE-35: Path Traversal: '.../...//'" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45249.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45249.json index 1b06350031c..0886c595bb3 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45249.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45249.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cavok \u2013 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + }, + { + "lang": "es", + "value": "Cavok \u2013 CWE-89: Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL')" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45250.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45250.json index 99afa308635..9819d86cdf6 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45250.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45250.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "ZKteco \u2013 CWE 200 Exposure of Sensitive Information to an Unauthorized Actor" + }, + { + "lang": "es", + "value": "ZKteco \u2013 CWE 200 Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45251.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45251.json index ffe79a5e781..2aa44c6b0bc 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45251.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45251.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Elsight \u2013 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + }, + { + "lang": "es", + "value": "Elsight \u2013 CWE-78: Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del SO ('Inyecci\u00f3n de comando del SO')" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45252.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45252.json index 05c60f546d6..e11caa506e6 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45252.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45252.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Elsight \u2013 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + }, + { + "lang": "es", + "value": "Elsight \u2013 CWE-78: Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del SO ('Inyecci\u00f3n de comando del SO')" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json index 7e58022f7cb..d7187907828 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45290.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.397", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json index 0983cc9f88a..01460f60c6d 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-07T21:15:17.633", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json index 03b5a701829..48547f872f8 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-10-08T04:15:08.873", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45454.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45454.json index 76fda0a5c43..28f221e1eb5 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45454.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45454.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows Reflected XSS.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.121." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) permite XSS reflejado. Este problema afecta a Unlimited Elements For Elementor (Free Widgets, Addons, Templates): desde n/a hasta 1.5.121." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json index 3619002a0e6..0147b6fe8c0 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.080", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json index 16a2988e3d4..f16ebcd53c9 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45464.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.370", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json index 13d47bc80a0..dab76d3c282 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45465.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.640", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json index 6fcf21563d7..7dc3a392a71 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45466.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:12.903", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json index 43e060aed46..8556af0d196 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.180", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json index 7315a1cfd9b..c3b6a713a7d 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.443", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json index a7ad72a4195..5331a7459fb 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.757", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json index 1ea7909d7bd..9507012d455 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:13.973", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json index 54415606e43..c54ff989548 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:14.293", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json index 1babe334642..c73a98c5c66 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:14.557", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json index c80c525326a..d14361e009c 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:14.860", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json index b588bd12b04..956d2709b19 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45474.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:15.090", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json index 2e23688a0f8..c7727d41f07 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45475.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:15.457", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json index 968698dd0c5..84a4b984786 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45476.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:15.830", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json index 2378cca04f8..8a76dc9b85d 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-20T00:15:02.293", "lastModified": "2024-10-03T15:36:55.557", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json index 18923a4e6a5..43a5858572f 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Custom Post Type Attachment plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pdf_attachment' shortcode in all versions up to, and including, 3.4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Custom Post Type Attachment para WordPress es vulnerable a la ejecuci\u00f3n de Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'pdf_attachment' del complemento en todas las versiones hasta la 3.4.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json index a348c8a9480..a30a1bb7a06 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Master Addons \u2013 Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in versions up to, and including, 2.0.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Addons \u2013 Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de varios par\u00e1metros en versiones hasta la 2.0.6.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json index 3e45f22759a..5f989038eed 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 suffers from Insufficient Session Expiration. The lack of validation of the authentication token at the IoT Haat during the Access Point Pairing mode leads the attacker to replay the Wi-Fi packets and forcefully turn off the access point after the authentication token has expired." + }, + { + "lang": "es", + "value": "IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 sufre un vencimiento de sesi\u00f3n insuficiente. La falta de validaci\u00f3n del token de autenticaci\u00f3n en IoT Haat durante el modo de emparejamiento del punto de acceso hace que el atacante repita los paquetes de Wi-Fi y apague a la fuerza el punto de acceso despu\u00e9s de que el token de autenticaci\u00f3n haya vencido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46041.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46041.json index 0e5cd9fdbc6..0ce7a206046 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46041.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46041.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IoT Haat Smart Plug IH-IN-16A-S v5.16.1 is vulnerable to Authentication Bypass by Capture-replay." + }, + { + "lang": "es", + "value": "IoT Haat Smart Plug IH-IN-16A-S v5.16.1 es vulnerable a la omisi\u00f3n de autenticaci\u00f3n por captura y repetici\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json index 298adf2804f..aca54ec26b1 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T14:15:07.393", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46278.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46278.json index 2c9448bb550..eaf9b2e6227 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46278.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46278.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Teedy 1.11 is vulnerable to Cross Site Scripting (XSS) via the management console." + }, + { + "lang": "es", + "value": "Teedy 1.11 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la consola de administraci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json index 23588f1cdae..99671f5a676 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Rank Math SEO with AI Best SEO Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in versions up to, and including, 1.0.218 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Rank Math SEO with AI Best SEO Tools para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'id' en versiones hasta la 1.0.218 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json index 50f1f4504a7..bd17c74703d 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018hfe_svg_mime_types\u2019 function in versions up to, and including, 1.6.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Header & Footer Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funci\u00f3n 'hfe_svg_mime_types' en versiones hasta la 1.6.28 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json index 820667a22b8..6c631d6da43 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018add_mime_type\u2019 function in versions up to, and including, 0.13.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Menu Icons de ThemeIsle para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funci\u00f3n 'add_mime_type' en versiones hasta la 0.13.13 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con permisos de nivel de autor y superiores, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4658.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4658.json index 16333679637..1ade92faf90 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4658.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4658.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL Injection: Hibernate vulnerability in TE Informatics Nova CMS allows SQL Injection.This issue affects Nova CMS: before 5.0." + }, + { + "lang": "es", + "value": "Inyecci\u00f3n SQL: la vulnerabilidad de Hibernate en TE Informatics Nova CMS permite la inyecci\u00f3n SQL. Este problema afecta a Nova CMS: antes de 5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json index fb33f7f12d9..7875e84efda 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The All-in-One Video Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.6.5 via the aiovg_search_form shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento All-in-One Video Gallery para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 3.6.5 incluida, a trav\u00e9s del c\u00f3digo corto aiovg_search_form. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json index 6ec0f6aedab..5e98c25b96c 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.210", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json index c7e9d49eb60..942a03afe3f 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.463", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json index 2a263f07afc..cd75b958de7 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.777", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json index 221b4eaaa2a..d129e028e72 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.240", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json index cce64e67887..4ffc131ea22 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.533", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47084.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47084.json index f30fff74e1a..d1430de9d88 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47084.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker\u2019s website to make unauthorized requests to a local Gradio server. Potentially, attackers can upload files, steal authentication tokens, and access user data if the victim visits a malicious website while logged into Gradio. This impacts users who have deployed Gradio locally and use basic authentication. Users are advised to upgrade to `gradio>4.44` to address this issue. As a workaround, users can manually enforce stricter CORS origin validation by modifying the `CustomCORSMiddleware` class in their local Gradio server code. Specifically, they can bypass the condition that skips CORS validation for requests containing cookies to prevent potential exploitation." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad est\u00e1 relacionada con la **validaci\u00f3n de origen CORS**, donde el servidor Gradio no puede validar el origen de la solicitud cuando hay una cookie presente. Esto permite que el sitio web de un atacante realice solicitudes no autorizadas a un servidor Gradio local. Potencialmente, los atacantes pueden cargar archivos, robar tokens de autenticaci\u00f3n y acceder a los datos del usuario si la v\u00edctima visita un sitio web malicioso mientras est\u00e1 conectado a Gradio. Esto afecta a los usuarios que han implementado Gradio localmente y usan autenticaci\u00f3n b\u00e1sica. Se recomienda a los usuarios que actualicen a `gradio>4.44` para solucionar este problema. Como workaround, los usuarios pueden aplicar manualmente una validaci\u00f3n de origen CORS m\u00e1s estricta modificando la clase `CustomCORSMiddleware` en su c\u00f3digo de servidor Gradio local. Espec\u00edficamente, pueden omitir la condici\u00f3n que omite la validaci\u00f3n CORS para las solicitudes que contienen cookies para evitar una posible explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json index ed144bfe490..db16a0ba297 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-03T03:15:02.443", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json index 1eac98a49b8..0862b67f798 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-03T03:15:02.697", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json index 883f870f9e3..a1d6be13cda 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-03T03:15:02.903", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47164.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47164.json index f2affe19240..37cfc07bf05 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47164.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47164.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to the **bypass of directory traversal checks** within the `is_in_or_equal` function. This function, intended to check if a file resides within a given directory, can be bypassed with certain payloads that manipulate file paths using `..` (parent directory) sequences. Attackers could potentially access restricted files if they are able to exploit this flaw, although the difficulty is high. This primarily impacts users relying on Gradio\u2019s blocklist or directory access validation, particularly when handling file uploads. Users are advised to upgrade to `gradio>=5.0` to address this issue. As a workaround, users can manually sanitize and normalize file paths in their Gradio deployment before passing them to the `is_in_or_equal` function. Ensuring that all file paths are properly resolved and absolute can help mitigate the bypass vulnerabilities caused by the improper handling of `..` sequences or malformed paths." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad se relaciona con la **omisi\u00f3n de comprobaciones de recorrido de directorio** dentro de la funci\u00f3n `is_in_or_equal`. Esta funci\u00f3n, destinada a comprobar si un archivo reside dentro de un directorio determinado, se puede omitir con ciertas cargas \u00fatiles que manipulan las rutas de archivo mediante secuencias `..` (directorio principal). Los atacantes podr\u00edan acceder potencialmente a archivos restringidos si pueden explotar esta falla, aunque la dificultad es alta. Esto afecta principalmente a los usuarios que dependen de la lista de bloqueo de Gradio o la validaci\u00f3n de acceso al directorio, en particular al manejar cargas de archivos. Se recomienda a los usuarios que actualicen a `gradio>=5.0` para solucionar este problema. Como workaround, los usuarios pueden desinfectar y normalizar manualmente las rutas de archivo en su implementaci\u00f3n de Gradio antes de pasarlas a la funci\u00f3n `is_in_or_equal`. Asegurarse de que todas las rutas de archivo se resuelvan correctamente y sean absolutas puede ayudar a mitigar las vulnerabilidades de omisi\u00f3n causadas por el manejo inadecuado de secuencias `..` o rutas malformadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47165.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47165.json index fb298b8fe61..af5417f677a 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47165.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47165.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **CORS origin validation accepting a null origin**. When a Gradio server is deployed locally, the `localhost_aliases` variable includes \"null\" as a valid origin. This allows attackers to make unauthorized requests from sandboxed iframes or other sources with a null origin, potentially leading to data theft, such as user authentication tokens or uploaded files. This impacts users running Gradio locally, especially those using basic authentication. Users are advised to upgrade to `gradio>=5.0` to address this issue. As a workaround, users can manually modify the `localhost_aliases` list in their local Gradio deployment to exclude \"null\" as a valid origin. By removing this value, the Gradio server will no longer accept requests from sandboxed iframes or sources with a null origin, mitigating the potential for exploitation." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad se relaciona con la **validaci\u00f3n de origen CORS que acepta un origen nulo**. Cuando se implementa un servidor Gradio localmente, la variable `localhost_aliases` incluye \"null\" como un origen v\u00e1lido. Esto permite a los atacantes realizar solicitudes no autorizadas desde iframes aislados u otras fuentes con un origen nulo, lo que puede provocar el robo de datos, como tokens de autenticaci\u00f3n de usuario o archivos cargados. Esto afecta a los usuarios que ejecutan Gradio localmente, especialmente a los que usan autenticaci\u00f3n b\u00e1sica. Se recomienda a los usuarios que actualicen a `gradio>=5.0` para solucionar este problema. Como workaround, los usuarios pueden modificar manualmente la lista `localhost_aliases` en su implementaci\u00f3n local de Gradio para excluir \"null\" como un origen v\u00e1lido. Al eliminar este valor, el servidor Gradio ya no aceptar\u00e1 solicitudes de iframes aislados o fuentes con un origen nulo, lo que mitiga el potencial de explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47166.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47166.json index 58ebf5e7406..26d952f0c6c 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47166.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47166.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **one-level read path traversal** in the `/custom_component` endpoint. Attackers can exploit this flaw to access and leak source code from custom Gradio components by manipulating the file path in the request. Although the traversal is limited to a single directory level, it could expose proprietary or sensitive code that developers intended to keep private. This impacts users who have developed custom Gradio components and are hosting them on publicly accessible servers. Users are advised to upgrade to `gradio>=4.44` to address this issue. As a workaround, developers can sanitize the file paths and ensure that components are not stored in publicly accessible directories." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad implica un **path traversal de lectura de un nivel** en el punto de conexi\u00f3n `/custom_component`. Los atacantes pueden explotar esta falla para acceder y filtrar el c\u00f3digo fuente de los componentes Gradio personalizados manipulando la ruta del archivo en la solicitud. Aunque el recorrido est\u00e1 limitado a un solo nivel de directorio, podr\u00eda exponer c\u00f3digo propietario o confidencial que los desarrolladores pretend\u00edan mantener privado. Esto afecta a los usuarios que han desarrollado componentes Gradio personalizados y los alojan en servidores de acceso p\u00fablico. Se recomienda a los usuarios que actualicen a `gradio>=4.44` para solucionar este problema. Como workaround, los desarrolladores pueden desinfectar las rutas de archivo y asegurarse de que los componentes no se almacenen en directorios de acceso p\u00fablico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47167.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47167.json index cc7059c0a27..553a570f0eb 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47167.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47167.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability relates to **Server-Side Request Forgery (SSRF)** in the `/queue/join` endpoint. Gradio\u2019s `async_save_url_to_cache` function allows attackers to force the Gradio server to send HTTP requests to user-controlled URLs. This could enable attackers to target internal servers or services within a local network and possibly exfiltrate data or cause unwanted internal requests. Additionally, the content from these URLs is stored locally, making it easier for attackers to upload potentially malicious files to the server. This impacts users deploying Gradio servers that use components like the Video component which involve URL fetching. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can disable or heavily restrict URL-based inputs in their Gradio applications to trusted domains only. Additionally, implementing stricter URL validation (such as allowinglist-based validation) and ensuring that local or internal network addresses cannot be requested via the `/queue/join` endpoint can help mitigate the risk of SSRF attacks." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad est\u00e1 relacionada con Server-Side Request Forgery (SSRF) en el endpoint `/queue/join`. La funci\u00f3n `async_save_url_to_cache` de Gradio permite a los atacantes obligar al servidor Gradio a enviar solicitudes HTTP a URL controladas por el usuario. Esto podr\u00eda permitir a los atacantes apuntar a servidores o servicios internos dentro de una red local y posiblemente exfiltrar datos o causar solicitudes internas no deseadas. Adem\u00e1s, el contenido de estas URL se almacena localmente, lo que facilita que los atacantes carguen archivos potencialmente maliciosos al servidor. Esto afecta a los usuarios que implementan servidores Gradio que usan componentes como el componente Video que implica la obtenci\u00f3n de URL. Se recomienda a los usuarios que actualicen a `gradio>=5` para solucionar este problema. Como workaround, los usuarios pueden deshabilitar o restringir en gran medida las entradas basadas en URL en sus aplicaciones Gradio solo a dominios confiables. Adem\u00e1s, implementar una validaci\u00f3n de URL m\u00e1s estricta (como una validaci\u00f3n basada en listas de permisos) y garantizar que no se puedan solicitar direcciones de red locales o internas a trav\u00e9s del endpoint `/queue/join` puede ayudar a mitigar el riesgo de ataques SSRF." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47168.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47168.json index b77511d7823..78a187ebfb8 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47168.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47168.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves data exposure due to the enable_monitoring flag not properly disabling monitoring when set to False. Even when monitoring is supposedly disabled, an attacker or unauthorized user can still access the monitoring dashboard by directly requesting the /monitoring endpoint. This means that sensitive application analytics may still be exposed, particularly in environments where monitoring is expected to be disabled. Users who set enable_monitoring=False to prevent unauthorized access to monitoring data are impacted. Users are advised to upgrade to gradio>=4.44 to address this issue. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad implica la exposici\u00f3n de datos debido a que el indicador enable_monitoring no desactiva correctamente la monitorizaci\u00f3n cuando se establece en Falso. Incluso cuando la monitorizaci\u00f3n est\u00e1 supuestamente deshabilitada, un atacante o un usuario no autorizado a\u00fan puede acceder al panel de control de monitorizaci\u00f3n solicitando directamente el endpoint /monitoring. Esto significa que los an\u00e1lisis de aplicaciones confidenciales a\u00fan pueden estar expuestos, en particular en entornos donde se espera que la monitorizaci\u00f3n est\u00e9 deshabilitada. Los usuarios que configuran enable_monitoring=False para evitar el acceso no autorizado a los datos de monitorizaci\u00f3n se ven afectados. Se recomienda a los usuarios que actualicen a gradio>=4.44 para solucionar este problema. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json index cd6f89384fc..dee38df836e 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.047", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json index 4a9dbe3aad1..27e46020895 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.300", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json index 9a230f70960..9e5602dd4b1 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47196.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:17.563", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47297.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47297.json index b3f68ee9edb..2d9b7083d36 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47297.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47297.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodePeople CP Polls allows Reflected XSS.This issue affects CP Polls: from n/a through 1.0.74." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CodePeople CP Polls permite XSS reflejado. Este problema afecta a CP Polls: desde n/a hasta 1.0.74." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47298.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47298.json index 4ceaf253947..d757b4b4867 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47298.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47298.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 5.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en BoldThemes Bold Page Builder permite XSS almacenado. Este problema afecta a Bold Page Builder: desde n/a hasta 5.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47299.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47299.json index 72e423fe32f..3b53c9e8a60 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47299.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47299.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd allows Stored XSS.This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through 6.17.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd permite XSS almacenado. Este problema afecta a la p\u00e1gina Pr\u00f3ximamente, en construcci\u00f3n y modo de mantenimiento de SeedProd: desde n/a hasta 6.17.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47300.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47300.json index 70b7fea9959..ca9af403202 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47300.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47300.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CubeWP CubeWP Forms \u2013 All-in-One Form Builder allows Stored XSS.This issue affects CubeWP Forms \u2013 All-in-One Form Builder: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CubeWP CubeWP Forms \u2013 All-in-One Form Builder permite XSS almacenado. Este problema afecta a CubeWP Forms \u2013 All-in-One Form Builder: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47301.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47301.json index bcdacef6ac3..535979de75e 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47301.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47301.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bit Form Bit Form \u2013 Contact Form Plugin allows Stored XSS.This issue affects Bit Form \u2013 Contact Form Plugin: from n/a through 2.13.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Bit Form Bit Form \u2013 Contact Form Plugin permite XSS almacenado. Este problema afecta a Bit Form \u2013 Contact Form Plugin: desde n/a hasta 2.13.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47306.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47306.json index 2031be2dfc7..035402c3380 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47306.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47306.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Copy Content Protection Team Secure Copy Content Protection and Content Locking allows Stored XSS.This issue affects Secure Copy Content Protection and Content Locking: from n/a through 4.2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Copy Content Protection Team Secure Copy Content Protection y Content Locking permite XSS almacenado. Este problema afecta a Secure Copy Content Protection y Content Locking: desde n/a hasta 4.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47307.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47307.json index 5e93430ba01..78c1135513a 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47307.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47307.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Essential Plugin Meta slider and carousel with lightbox allows Stored XSS.This issue affects Meta slider and carousel with lightbox: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Essential Plugin Meta slider and carousel with lightbox permite XSS almacenado. Este problema afecta al control deslizante Meta y al carrusel con lightbox: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47309.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47309.json index 49e10d92bac..372ba6f9c26 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47309.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47309.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Condless Cities Shipping Zones for WooCommerce allows PHP Local File Inclusion.This issue affects Cities Shipping Zones for WooCommerce: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Condless Cities Shipping Zones para WooCommerce permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Cities Shipping Zones para WooCommerce: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47310.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47310.json index d0be6f6c804..c49fc851ba8 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47310.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47310.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ARI Soft ARI Fancy Lightbox allows Stored XSS.This issue affects ARI Fancy Lightbox: from n/a through 1.3.17." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en ARI Soft ARI Fancy Lightbox permite XSS almacenado. Este problema afecta a ARI Fancy Lightbox: desde n/a hasta 1.3.17." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47313.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47313.json index d2545d76baf..064952e02b6 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47313.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47313.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Catch Base allows Stored XSS.This issue affects Catch Base: from n/a through 3.4.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Catch Themes Catch Base permite XSS almacenado. Este problema afecta a Catch Base: desde n/a hasta 3.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47316.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47316.json index b60146cf563..14962c55318 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47316.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47316.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authorization Bypass Through User-Controlled Key vulnerability in Salon Booking System Salon booking system.This issue affects Salon booking system: from n/a through 10.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una clave controlada por el usuario en Salon Booking System Salon booking system. Este problema afecta al sistema de reservas de salones: desde n/a hasta 10.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47319.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47319.json index 7507a762d2f..429cb2b313f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47319.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47319.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Bit Apps Bit Form \u2013 Contact Form Plugin allows Code Injection.This issue affects Bit Form \u2013 Contact Form Plugin: from n/a through 2.13.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en Bit Apps Bit Form \u2013 Contact Form Plugin permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Bit Form \u2013 Contact Form Plugin: desde n/a hasta 2.13.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47320.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47320.json index a74cdedf79e..23905bb9582 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47320.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47320.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WS Form WS Form LITE allows Stored XSS.This issue affects WS Form LITE: from n/a through 1.9.238." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WS Form WS Form LITE permite XSS almacenado. Este problema afecta a WS Form LITE: desde n/a hasta 1.9.238." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47322.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47322.json index 157b5f94940..d0399ecdbf6 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47322.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47322.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ex-Themes WP Timeline \u2013 Vertical and Horizontal timeline plugin allows Reflected XSS.This issue affects WP Timeline \u2013 Vertical and Horizontal timeline plugin: from n/a through 3.6.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en el complemento Ex-Themes WP Timeline \u2013 Vertical and Horizontal timeline permite XSS reflejado. Este problema afecta al complemento WP Timeline \u2013 Vertical and Horizontal timeline: desde n/a hasta 3.6.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47323.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47323.json index 808ad217b3d..bcda806c7f8 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47323.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47323.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ex-Themes WP Timeline \u2013 Vertical and Horizontal timeline plugin allows PHP Local File Inclusion.This issue affects WP Timeline \u2013 Vertical and Horizontal timeline plugin: from n/a through 3.6.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en el complemento Ex-Themes WP Timeline \u2013 Vertical and Horizontal timeline permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta al complemento WP Timeline \u2013 Vertical and Horizontal timeline: desde n/a hasta 3.6.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47324.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47324.json index b921eda2612..d10ca3ccbdc 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47324.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47324.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ex-Themes WP Timeline \u2013 Vertical and Horizontal timeline plugin allows PHP Local File Inclusion.This issue affects WP Timeline \u2013 Vertical and Horizontal timeline plugin: from n/a through 3.6.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en el complemento Ex-Themes WP Timeline \u2013 Vertical and Horizontal timeline permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta al complemento WP Timeline \u2013 Vertical and Horizontal timeline: desde n/a hasta 3.6.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47326.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47326.json index 20260383048..5cad6f1ec5a 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47326.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47326.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Share This Image allows Reflected XSS.This issue affects Share This Image: from n/a through 2.01." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en ILLID Share This Image permite XSS reflejado. Este problema afecta a Share This Image: desde n/a hasta 2.01." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47327.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47327.json index 346b54356a6..abe2250d6ec 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47327.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47327.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Eyal Fitoussi GEO my WordPress allows Reflected XSS.This issue affects GEO my WordPress: from n/a through 4.5.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Eyal Fitoussi GEO my WordPress permite XSS reflejado. Este problema afecta a GEO my WordPress: desde n/a hasta 4.5.0.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json index be62cd8c225..e16050aac3c 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47329.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in QuomodoSoft ElementsReady Addons for Elementor allows Stored XSS.This issue affects ElementsReady Addons for Elementor: from n/a through 6.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en QuomodoSoft ElementsReady Addons for Elementor permite XSS almacenado. Este problema afecta a los complementos ElementsReady para Elementor: desde n/a hasta 6.4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47332.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47332.json index f54eb595463..2a340fa0b93 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47332.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47332.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wowDevs Sky Addons for Elementor allows Stored XSS.This issue affects Sky Addons for Elementor: from n/a through 2.5.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en wowDevs Sky Addons for Elementor permite XSS almacenado. Este problema afecta a Sky Addons for Elementor: desde n/a hasta 2.5.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47333.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47333.json index ef63561daab..f474f58ac65 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47333.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47333.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Tangible Loops & Logic allows Reflected XSS.This issue affects Loops & Logic: from n/a through 4.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Team Tangible Loops & Logic permite XSS reflejado. Este problema afecta a Loops & Logic: desde n/a hasta 4.1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47335.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47335.json index 7ca0efd3b6f..be1a14d4128 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47335.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47335.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bit Form Bit Form \u2013 Contact Form Plugin allows SQL Injection.This issue affects Bit Form \u2013 Contact Form Plugin: from n/a through 2.13.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Bit Form Bit Form \u2013 Contact Form Plugin permite la inyecci\u00f3n SQL. Este problema afecta a Bit Form \u2013 Contact Form Plugin: desde n/a hasta 2.13.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47336.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47336.json index 6d670f85770..1ab82f08e60 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47336.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47336.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Vladimir Statsenko Terms descriptions allows Stored XSS.This issue affects Terms descriptions: from n/a through 3.4.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Vladimir Statsenko Terms descriptions permite XSS almacenado. Este problema afecta a las descripciones de t\u00e9rminos: desde n/a hasta 3.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47338.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47338.json index dec25b06ffa..a935e5df081 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47338.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47338.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPExpertsio WPExperts Square For GiveWP allows SQL Injection.This issue affects WPExperts Square For GiveWP: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPExpertsio WPExperts Square For GiveWP permite la inyecci\u00f3n SQL. Este problema afecta a WPExperts Square For GiveWP: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47339.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47339.json index 98d28d5f5d6..fce8f4da141 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47339.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47339.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in James Ward WP Mail Catcher allows Reflected XSS.This issue affects WP Mail Catcher: from n/a through 2.1.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en James Ward WP Mail Catcher permite XSS reflejado. Este problema afecta a WP Mail Catcher: desde n/a hasta 2.1.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47340.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47340.json index b9b2effb7e4..9a3384a2a8b 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47340.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47340.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Post Grid and Gutenberg Blocks allows Stored XSS.This issue affects Post Grid and Gutenberg Blocks: from n/a through 2.2.89." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en PickPlugins Post Grid y Gutenberg Blocks permite XSS almacenado. Este problema afecta a Post Grid y Gutenberg Blocks: desde n/a hasta 2.2.89." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47341.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47341.json index 57c0566c198..aa6c38ae259 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47341.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47341.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Lester \u2018GaMerZ\u2019 Chan WP-DownloadManager allows Reflected XSS.This issue affects WP-DownloadManager: from n/a through 1.68.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Lester \u2018GaMerZ\u2019 Chan WP-DownloadManager permite XSS reflejado. Este problema afecta a WP-DownloadManager: desde n/a hasta 1.68.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47342.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47342.json index a1a06aafd10..01e163360a7 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47342.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47342.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Accordion accordions allows Stored XSS.This issue affects Accordion: from n/a through 2.2.99." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en PickPlugins Accordion accordions permite XSS almacenado. Este problema afecta a Accordion: desde n/a hasta 2.2.99." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47343.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47343.json index 6a7678e6af0..c19df15ae7f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47343.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47343.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kraftplugins Mega Elements allows Stored XSS.This issue affects Mega Elements: from n/a through 1.2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Kraftplugins Mega Elements permite XSS almacenado. Este problema afecta a Mega Elements: desde n/a hasta 1.2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47344.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47344.json index c333be54de0..7271bd5023e 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47344.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47344.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StylemixThemes uListing.This issue affects uListing: from n/a through 2.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en StylemixThemes uListing. Este problema afecta a uListing: desde n/a hasta 2.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47345.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47345.json index 3c1b33d5779..a2e7aadd709 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47345.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47345.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Starter Templates allows Stored XSS.This issue affects Starter Templates: from n/a through 4.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Brainstorm Force Starter Templates permite XSS almacenado. Este problema afecta a las plantillas de inicio: desde n/a hasta 4.4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47346.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47346.json index 3b5ec544acd..d46ae240da3 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47346.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47346.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tribulant Newsletters allows Reflected XSS.This issue affects Newsletters: from n/a through 4.9.9.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Tribulant Newsletters permite XSS reflejado. Este problema afecta a los boletines informativos: desde n/a hasta 4.9.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47347.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47347.json index e32953776f3..2479c48e1db 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47347.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47347.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chart Builder Team Chartify allows Reflected XSS.This issue affects Chartify: from n/a through 2.7.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Chart Builder Team Chartify permite XSS reflejado. Este problema afecta a Chartify: desde n/a hasta 2.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47348.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47348.json index 7ecc596405c..2c9a30cb749 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47348.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47348.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WaspThemes YellowPencil Visual CSS Style Editor allows Reflected XSS.This issue affects YellowPencil Visual CSS Style Editor: from n/a through 7.6.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WaspThemes YellowPencil Visual CSS Style Editor permite XSS reflejado. Este problema afecta al editor de estilos CSS visual YellowPencil: desde n/a hasta 7.6.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47349.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47349.json index 0e3d4b03b5f..38e90b08449 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47349.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47349.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMobile.App allows Reflected XSS.This issue affects WPMobile.App: from n/a through 11.50." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WPMobile.App permite XSS reflejado. Este problema afecta a WPMobile.App: desde n/a hasta 11.50." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47350.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47350.json index f582c4e3fa3..5833f7cf523 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47350.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47350.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YITH YITH WooCommerce Ajax Search allows SQL Injection.This issue affects YITH WooCommerce Ajax Search: from n/a through 2.8.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en YITH YITH WooCommerce Ajax Search permite la inyecci\u00f3n SQL. Este problema afecta a YITH WooCommerce Ajax Search: desde n/a hasta 2.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47352.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47352.json index b7ecb8c3969..077dce39aad 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47352.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47352.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Xylus Themes WP Bulk Delete allows Reflected XSS.This issue affects WP Bulk Delete: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Xylus Themes WP Bulk Delete permite XSS reflejado. Este problema afecta a WP Bulk Delete: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47354.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47354.json index ce783df779e..6b0adc53c6a 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47354.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47354.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in smp7, wp.Insider Simple Membership After Login Redirection.This issue affects Simple Membership After Login Redirection: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en smp7, wp.Insider Simple Membership After Login Redirection. Este problema afecta a Simple Membership After Login Redirection: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47355.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47355.json index c9c207bb78b..5e9b5f613ce 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47355.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47355.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CozyThemes Cozy Blocks allows Stored XSS.This issue affects Cozy Blocks: from n/a through 2.0.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CozyThemes Cozy Blocks permite XSS almacenado. Este problema afecta a Cozy Blocks: desde n/a hasta 2.0.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47356.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47356.json index 72bc27b0fde..2ff1524919d 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47356.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47356.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Catch Themes Create allows Stored XSS.This issue affects Create: from n/a through 2.9.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Catch Themes Create permite XSS almacenado. Este problema afecta a Create: desde n/a hasta 2.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47357.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47357.json index 8d9b5aa908e..be883acd38a 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47357.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47357.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Leevio Happy Addons for Elementor allows Stored XSS.This issue affects Happy Addons for Elementor: from n/a through 3.12.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Leevio Happy Addons para Elementor permite XSS almacenado. Este problema afecta a Happy Addons para Elementor: desde n/a hasta 3.12.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47360.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47360.json index e5171aa026e..186f2b67449 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47360.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47360.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Booking Algorithms BA Book Everything allows Reflected XSS.This issue affects BA Book Everything: from n/a through 1.6.20." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Booking Algorithms BA Book Everything permite XSS reflejado. Este problema afecta a BA Book Everything: desde n/a hasta 1.6.20." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47363.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47363.json index 1f1158f6396..de98f36f8f8 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47363.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47363.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Blockspare allows Stored XSS.This issue affects Blockspare: from n/a through 3.2.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Blockspare permite XSS almacenado. Este problema afecta a Blockspare: desde n/a hasta 3.2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json index aebfe848c19..76fb789fa72 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Move addons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en los complementos Move Addons para Elementor permite XSS almacenado. Este problema afecta a Move Addons para Elementor: desde n/a hasta 1.3.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47365.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47365.json index 823ae15d1c8..153c8facf0b 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47365.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47365.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Atakan Au Automatically Hierarchic Categories in Menu allows Stored XSS.This issue affects Automatically Hierarchic Categories in Menu: from n/a through 2.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en Atakan Au Automatically Hierarchic Categories in Menu permite XSS almacenado. Este problema afecta a Automatically Hierarchic Categories in Menu: desde n/a hasta 2.0.5" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json index 542dece120f..0f93f92cc09 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPVibes Elementor Addon Elements allows Stored XSS.This issue affects Elementor Addon Elements: from n/a through 1.13.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WPVibes Elementor Addon Elements permite XSS almacenado. Este problema afecta a los elementos del complemento Elementor: desde n/a hasta 1.13.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47367.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47367.json index 2db9cd27398..6121e891e4c 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47367.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47367.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.13.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en YITH YITH WooCommerce Product Add-Ons permite XSS reflejado. Este problema afecta a YITH WooCommerce Product Add-Ons: desde n/a hasta 4.13.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47368.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47368.json index a95ebcbd762..1827613f1ef 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47368.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47368.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Leap13 Premium Blocks \u2013 Gutenberg Blocks for WordPress allows Stored XSS.This issue affects Premium Blocks \u2013 Gutenberg Blocks for WordPress: from n/a through 2.1.33." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Leap13 Premium Blocks \u2013 Gutenberg Blocks for WordPress permite XSS almacenado. Este problema afecta a Premium Blocks \u2013 Gutenberg Blocks for WordPress: desde n/a hasta 2.1.33." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json index ab01535de93..227c461864f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47373.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 6.5.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en LiteSpeed Technologies LiteSpeed Cache permite XSS almacenado. Este problema afecta a LiteSpeed Cache: desde n/a hasta 6.5.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47378.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47378.json index d105edf4657..8e2156f3988 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47378.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47378.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPCOM WPCOM Member allows Reflected XSS.This issue affects WPCOM Member: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WPCOM WPCOM Member permite XSS reflejado. Este problema afecta a WPCOM Member: desde n/a hasta 1.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47379.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47379.json index c201e626f66..8359e7b567f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47379.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47379.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sale php scripts Web Directory Free allows Reflected XSS.This issue affects Web Directory Free: from n/a through 1.7.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en scripts php de Sale. Web Directory Free permite XSS reflejado. Este problema afecta a Web Directory Free: desde n/a hasta 1.7.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47380.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47380.json index 65176204cc1..216042f4870 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47380.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47380.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for eBay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WP Lab WP-Lister Lite para eBay permite XSS reflejado. Este problema afecta a WP-Lister Lite para eBay: desde n/a hasta 3.6.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47381.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47381.json index 6c59afc2179..a56ddfa4f31 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47381.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47381.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Averta Depicter Slider allows Stored XSS.This issue affects Depicter Slider: from n/a through 3.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Averta Depicter Slider permite XSS almacenado. Este problema afecta a Depicter Slider: desde n/a hasta 3.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47382.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47382.json index a62bfbd985d..98ea4ebfd42 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47382.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47382.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webvitaly Page-list allows Stored XSS.This issue affects Page-list: from n/a through 5.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Webvitaly Page-list permite XSS almacenado. Este problema afecta a Page-list: desde n/a hasta 5.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json index 3bcef8b131a..ecfabbf7526 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webangon The Pack Elementor addons allows Stored XSS.This issue affects The Pack Elementor addons: from n/a through 2.0.8.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en los complementos Webangon The Pack Elementor permite XSS almacenado. Este problema afecta a los complementos The Pack Elementor: desde n/a hasta 2.0.8.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47384.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47384.json index e8ef7d8ed62..04bedf0219e 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47384.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47384.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Compress WP Compress \u2013 Image Optimizer [All-In-One] allows Reflected XSS.This issue affects WP Compress \u2013 Image Optimizer [All-In-One]: from n/a through 6.20.13." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WP Compress WP Compress \u2013 Image Optimizer [All-In-One] permite XSS reflejado. Este problema afecta a WP Compress \u2013 Image Optimizer [All-In-One]: desde n/a hasta 6.20.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json index 64f316655e4..2c7401a6ffd 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:13.977", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json index e7abc37b338..48048246d17 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47422.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.190", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json index 605232c31ef..174abd1622c 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47423.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.393", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json index bac5da8646d..f4507845578 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47424.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.600", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json index 7fed04d8481..325a4396084 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47425.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-09T15:15:14.800", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47524.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47524.json index 87b3f36efda..77a5a8fb044 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47524.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47524.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-01T21:15:07.297", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json index da2fcc4620a..b2bd047d41c 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47526.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-01T21:15:07.740", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json index d0747a1c0cf..7edd7cff431 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47556.json @@ -3,7 +3,7 @@ "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.057", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json index d1fffe0c30d..ef6a435f33d 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47557.json @@ -3,7 +3,7 @@ "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.260", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json index 5d7247b07c9..e78db6cf190 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47558.json @@ -3,7 +3,7 @@ "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.473", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json index cc35b369084..bad922fbbdc 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47559.json @@ -3,7 +3,7 @@ "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-07T19:15:10.677", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47625.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47625.json index c54650dc4bc..92952ca03b4 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47625.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47625.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeLooks Enter Addons allows Stored XSS.This issue affects Enter Addons: from n/a through 2.1.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en ThemeLooks Enter Addons permite XSS almacenado. Este problema afecta a Enter Addons: desde n/a hasta 2.1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47626.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47626.json index bfe8628aa5f..ec58bc661e7 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47626.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47626.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Rometheme RomethemeKit For Elementor allows Stored XSS.This issue affects RomethemeKit For Elementor: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Rometheme RomethemeKit For Elementor permite XSS almacenado. Este problema afecta a RomethemeKit For Elementor: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47627.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47627.json index 2e09f398feb..1d095951ec1 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47627.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47627.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel WP Travel Gutenberg Blocks allows Stored XSS.This issue affects WP Travel Gutenberg Blocks: from n/a through 3.6.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WP Travel. WP Travel Gutenberg Blocks permite XSS almacenado. Este problema afecta a WP Travel Gutenberg Blocks: desde n/a hasta 3.6.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47628.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47628.json index bae34eb53ef..f426844f68a 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47628.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47628.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Stored XSS.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.9.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en LA-Studio LA-Studio Element Kit para Elementor permite XSS almacenado. Este problema afecta a LA-Studio Element Kit para Elementor: desde n/a hasta 1.3.9.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47629.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47629.json index 50272fad14e..e1bcb0b36c8 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47629.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47629.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Ultimate Store Kit Elementor Addons allows Stored XSS.This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en BdThemes Ultimate Store Kit Elementor Addons permite XSS almacenado. Este problema afecta a Ultimate Store Kit Elementor Addons: desde n/a hasta 2.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json index 9aa1b29ae57..7d13b9729fd 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47630.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows Stored XSS.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en ElementInvader ElementInvader Addons for Elementor permite XSS almacenado. Este problema afecta a ElementInvader Addons for Elementor: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47631.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47631.json index 33c36309d8a..e11920539d6 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47631.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47631.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in bPlugins LLC Logo Carousel \u2013 Clients logo carousel for WP allows Stored XSS.This issue affects Logo Carousel \u2013 Clients logo carousel for WP: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en bPlugins LLC Logo Carousel \u2013 Clients logo carousel for WP permite XSS almacenado. Este problema afecta a Logo Carousel \u2013 Clients logo carousel for WP: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47632.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47632.json index db0ea48ee20..9a268940ed9 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47632.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47632.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in deTheme DethemeKit For Elementor allows Stored XSS.This issue affects DethemeKit For Elementor: from n/a through 2.1.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en deTheme DethemeKit For Elementor permite XSS almacenado. Este problema afecta a DethemeKit For Elementor: desde n/a hasta 2.1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47633.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47633.json index 55294b0bedd..cff62e5ae33 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47633.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47633.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Zoho Forms allows Stored XSS.This issue affects Zoho Forms: from n/a through 4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Zoho Forms permite XSS almacenado. Este problema afecta a Zoho Forms: desde n/a hasta 4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47635.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47635.json index 3d6098c4b88..ca6f9996f5b 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47635.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47635.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in TinyPNG.This issue affects TinyPNG: from n/a through 3.4.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en TinyPNG. Este problema afecta a TinyPNG: desde n/a hasta 3.4.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json index 978bdf1663e..ea15d1fd85d 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Eyecix JobSearch permite la inyecci\u00f3n de objetos. Este problema afecta a JobSearch: desde n/a hasta 2.5.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47638.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47638.json index 3092a8458c3..e90f7459a4b 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47638.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47638.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in vCita Online Booking & Scheduling Calendar for WordPress by vcita allows Reflected XSS.This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.4.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en vCita Online Booking & Scheduling Calendar for WordPress de vcita permite XSS reflejado. Este problema afecta a Online Booking & Scheduling Calendar for WordPress de vcita: desde n/a hasta 4.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47639.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47639.json index 5f9a370eeb8..8c39544774e 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47639.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47639.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VdoCipher allows Stored XSS.This issue affects VdoCipher: from n/a through 1.29." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en VdoCipher permite XSS almacenado. Este problema afecta a VdoCipher: desde n/a hasta 1.29." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47642.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47642.json index 2970489b1ed..ed9e6f13da1 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47642.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47642.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Keap Keap Official Opt-in Forms allows Stored XSS.This issue affects Keap Official Opt-in Forms: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Keap Keap Official Opt-in Forms permite XSS almacenado. Este problema afecta a Keap Official Opt-in Forms: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47643.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47643.json index fa2023b6906..06ae5491814 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47643.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47643.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Alexander B\u00f6hm Include Fussball.De Widgets allows Stored XSS.This issue affects Include Fussball.De Widgets: from n/a through 4.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Alexander B\u00f6hm Include Fussball.De Widgets permite XSS almacenado. Este problema afecta a los widgets Include Fussball.De: desde n/a hasta 4.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47644.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47644.json index 5be81061906..fda2780bcb3 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47644.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47644.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Copyscape / Indigo Stream Technologies Copyscape Premium allows Stored XSS.This issue affects Copyscape Premium: from n/a through 1.3.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Copyscape / Indigo Stream Technologies Copyscape Premium permite XSS almacenado. Este problema afecta a Copyscape Premium: desde n/a hasta 1.3.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47646.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47646.json index de26c9f245d..e2ae0ccc251 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47646.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47646.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payflex Payflex Payment Gateway.This issue affects Payflex Payment Gateway: from n/a through 2.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en Payflex Payflex Payment Gateway. Este problema afecta a Payflex Payment Gateway: desde n/a hasta 2.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47647.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47647.json index 8223f092b19..40f0c5eec3f 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47647.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47647.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HelpieWP Accordion & FAQ \u2013 Helpie WordPress Accordion FAQ Plugin allows Stored XSS.This issue affects Accordion & FAQ \u2013 Helpie WordPress Accordion FAQ Plugin: from n/a through 1.27." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HelpieWP Accordion & FAQ \u2013 Helpie WordPress Accordion FAQ Plugin permite XSS almacenado. Este problema afecta a Accordion & FAQ \u2013 Helpie WordPress Accordion FAQ Plugin: desde n/a hasta 1.27." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47648.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47648.json index cfc858f7dad..4e7f177171b 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47648.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47648.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in EventPrime Events EventPrime.This issue affects EventPrime: from n/a through 4.0.4.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en EventPrime Events EventPrime. Este problema afecta a EventPrime: desde n/a hasta 4.0.4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47650.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47650.json index 33e7eb22611..24f47551224 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47650.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Axton WP-WebAuthn allows Stored XSS.This issue affects WP-WebAuthn: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Axton WP-WebAuthn permite XSS almacenado. Este problema afecta a WP-WebAuthn: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json index a25e1b235b2..c54dc4fc638 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.417", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in Shilpi Client Dashboard due to implementation of inadequate authentication mechanism in the login module wherein access to any users account is granted with just their corresponding mobile number. A remote attacker could exploit this vulnerability by providing mobile number of targeted user, to obtain complete access to the targeted user account." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Client Dashboard debido a la implementaci\u00f3n de un mecanismo de autenticaci\u00f3n inadecuado en el m\u00f3dulo de inicio de sesi\u00f3n, en el que se otorga acceso a cualquier cuenta de usuario \u00fanicamente con su n\u00famero de tel\u00e9fono m\u00f3vil correspondiente. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad proporcionando el n\u00famero de tel\u00e9fono m\u00f3vil del usuario objetivo para obtener acceso completo a la cuenta del usuario objetivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json index b14879859db..766c8cb0a24 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.563", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in Shilpi Client Dashboard due to lack of authorization for modification and cancellation requests through certain API endpoints. An authenticated remote attacker could exploit this vulnerability by placing or cancelling requests through API request body leading to unauthorized modification of requests belonging to the other users." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Client Dashboard debido a la falta de autorizaci\u00f3n para solicitudes de modificaci\u00f3n y cancelaci\u00f3n a trav\u00e9s de determinados endpoints de API. Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad al realizar o cancelar solicitudes a trav\u00e9s del cuerpo de la solicitud de API, lo que provocar\u00eda una modificaci\u00f3n no autorizada de las solicitudes pertenecientes a otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json index ea60623cfc3..9f3ed3803eb 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.680", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in Shilpi Client Dashboard due to lack of rate limiting and Captcha protection for OTP requests in certain API endpoint. An unauthenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints, which could lead to the OTP bombing on the targeted system." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Client Dashboard debido a la falta de limitaci\u00f3n de velocidad y protecci\u00f3n Captcha para solicitudes OTP en ciertos endpoints de API. Un atacante remoto no autenticado podr\u00eda aprovechar esta vulnerabilidad enviando m\u00faltiples solicitudes OTP a trav\u00e9s de endpoints de API vulnerables, lo que podr\u00eda provocar el bombardeo de OTP en el sistema objetivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json index a8e8c6f8f0e..44f8ca44c93 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.797", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in the Shilpi Client Dashboard due to improper validation of files being uploaded other than the specified extension. An authenticated remote attacker could exploit this vulnerability by uploading malicious file, which could lead to remote code execution on targeted application." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Client Dashboard debido a la validaci\u00f3n incorrecta de archivos que se cargan con una extensi\u00f3n distinta a la especificada. Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad cargando un archivo malicioso, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo en la aplicaci\u00f3n de destino." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json index 602993e874c..b441c99e109 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.910", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in Shilpi Client Dashboard due to missing restrictions for incorrect login attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack on password, which could lead to gain unauthorized access to other user accounts." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Client Dashboard debido a la falta de restricciones para intentos de inicio de sesi\u00f3n incorrectos en su inicio de sesi\u00f3n basado en API. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad realizando un ataque de fuerza bruta a la contrase\u00f1a, lo que podr\u00eda dar lugar a un acceso no autorizado a otras cuentas de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json index 3085ddb9223..37110d846b3 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:12.023", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in the Shilpi Net Back Office due to improper access controls on certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating a parameter dfclientid through API request URLs which could lead to unauthorized access to sensitive information belonging to other users." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Net Back Office debido a controles de acceso inadecuados en determinados endpoints de API. Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad manipulando un par\u00e1metro dfclientid a trav\u00e9s de las URL de solicitud de API, lo que podr\u00eda provocar un acceso no autorizado a informaci\u00f3n confidencial perteneciente a otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json index 3025665efd0..b1f0fd4eb04 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47661.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.020", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47789.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47789.json index 1827e8e779c..6659eea9f47 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47789.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47789.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** This vulnerability exists in D3D Security IP Camera due to usage of weak authentication scheme of the HTTP header protocol where authorization tag contain a Base-64 encoded username and password. A remote attacker could exploit this vulnerability by crafting a HTTP packet leading to exposure of user credentials of the targeted device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Esta vulnerabilidad existe en D3D Security IP Camera debido al uso de un esquema de autenticaci\u00f3n d\u00e9bil del protocolo de encabezado HTTP, donde la etiqueta de autorizaci\u00f3n contiene un nombre de usuario y una contrase\u00f1a codificados en Base-64. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad manipulando un paquete HTTP que conduzca a la exposici\u00f3n de las credenciales de usuario del dispositivo de destino. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47790.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47790.json index 9684fa48005..58953086d94 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47790.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47790.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** This vulnerability exists in D3D Security IP Camera due to usage of insecure Real-Time Streaming Protocol (RTSP) version for live video streaming. A remote attacker could exploit this vulnerability by crafting a RTSP packet leading to unauthorized access to live feed of the targeted device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Esta vulnerabilidad existe en D3D Security IP Camera debido al uso de una versi\u00f3n no segura del protocolo de transmisi\u00f3n en tiempo real (RTSP) para la transmisi\u00f3n de video en vivo. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad creando un paquete RTSP que conduzca al acceso no autorizado a la transmisi\u00f3n en vivo del dispositivo objetivo. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json index 99388c90515..805b67ef840 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47812.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:13.803", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json index af7bc0258cf..71ed32be338 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.023", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json index 46307c091ed..9912fb77aed 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.227", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json index 7a48af37982..0ed1b4623a6 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47828.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.423", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json index 3500de3a965..03698a4bd67 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47832.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.647", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json index 9aac6960826..dd47a5e9402 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47833.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-09T19:15:14.793", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47840.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47840.json index 68316da002a..d9270f9ba25 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47840.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47840.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T01:15:12.107", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - Apex skin allows Stored XSS.This issue affects Mediawiki - Apex skin: from 1.39.X before 1.39.9, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en The Wikimedia Foundation Mediawiki - Apex skin permite XSS almacenado. Este problema afecta a Mediawiki - Apex skin: desde 1.39.X antes de 1.39.9, desde 1.41.X antes de 1.41.3, desde 1.42.X antes de 1.42.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47841.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47841.json index 93586dd4a04..bdecf78ce9d 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47841.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47841.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T02:15:02.470", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Wikimedia Foundation Mediawiki - CSS Extension allows Path Traversal.This issue affects Mediawiki - CSS Extension: from 1.42.X before 1.42.2, from 1.41.X before 1.41.3, from 1.39.X before 1.39.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') vulnerabilidad en The Wikimedia Foundation Mediawiki - CSS Extension permite Path Traversal. Este problema afecta a Mediawiki - CSS Extension: desde 1.42.X antes de 1.42.2, desde 1.41.X antes de 1.41.3, desde 1.39.X antes de 1.39.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47845.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47845.json index 527cc09ca39..4e4a138280d 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47845.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47845.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T01:15:12.237", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki - CSS Extension allows Code Injection.This issue affects Mediawiki - CSS Extension: from 1.39.X before 1.39.9, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de codificaci\u00f3n incorrecta o escape de salida en The Wikimedia Foundation Mediawiki - CSS Extension permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Mediawiki - CSS Extension: desde 1.39.X antes de 1.39.9, desde 1.41.X antes de 1.41.3, desde 1.42.X antes de 1.42.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47846.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47846.json index 6a49efe7eab..0557e393982 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47846.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47846.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T01:15:12.360", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in The Wikimedia Foundation Mediawiki - Cargo allows Cross Site Request Forgery.This issue affects Mediawiki - Cargo: from 3.6.X before 3.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en The Wikimedia Foundation Mediawiki - Cargo permite la Cross-Site Request Forgery. Este problema afecta a Mediawiki - Cargo: desde 3.6.X hasta 3.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47847.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47847.json index 0853f9c6cf3..16642b209a5 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47847.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47847.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T01:15:12.493", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - Cargo allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Cargo: from 3.6.X before 3.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en The Wikimedia Foundation Mediawiki - Cargo permite Cross-Site Scripting (XSS). Este problema afecta a Mediawiki - Cargo: desde 3.6.X hasta 3.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json index 76c9416e76c..03d5fdc8ba3 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47848.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T00:15:02.800", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in The Wikimedia Foundation Mediawiki - PageTriage allows Authentication Bypass.This issue affects Mediawiki - PageTriage: from 1.39.X before 1.39.9, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en The Wikimedia Foundation Mediawiki - PageTriage permite la omisi\u00f3n de la autenticaci\u00f3n. Este problema afecta a Mediawiki - PageTriage: desde 1.39.X hasta 1.39.9, desde 1.41.X hasta 1.41.3, desde 1.42.X hasta 1.42.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47849.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47849.json index b54117a38ba..a98a2906604 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47849.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47849.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2024-10-05T01:15:12.610", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation Mediawiki - Cargo allows SQL Injection.This issue affects Mediawiki - Cargo: from 3.6.X before 3.6.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en The Wikimedia Foundation Mediawiki - Cargo permite la inyecci\u00f3n SQL. Este problema afecta a Mediawiki - Cargo: desde 3.6.X hasta 3.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json index 9e2318a757e..709be200b1d 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability is a **lack of integrity check** on the downloaded FRP client, which could potentially allow attackers to introduce malicious code. If an attacker gains access to the remote URL from which the FRP client is downloaded, they could modify the binary without detection, as the Gradio server does not verify the file's checksum or signature. Any users utilizing the Gradio server's sharing mechanism that downloads the FRP client could be affected by this vulnerability, especially those relying on the executable binary for secure data tunneling. There is no direct workaround for this issue without upgrading. However, users can manually validate the integrity of the downloaded FRP client by implementing checksum or signature verification in their own environment to ensure the binary hasn't been tampered with." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad es una **falta de comprobaci\u00f3n de integridad** en el cliente FRP descargado, lo que podr\u00eda permitir a los atacantes introducir c\u00f3digo malicioso. Si un atacante obtiene acceso a la URL remota desde la que se descarga el cliente FRP, podr\u00eda modificar el binario sin ser detectado, ya que el servidor Gradio no verifica la suma de comprobaci\u00f3n ni la firma del archivo. Cualquier usuario que utilice el mecanismo de uso compartido del servidor Gradio que descarga el cliente FRP podr\u00eda verse afectado por esta vulnerabilidad, especialmente aquellos que dependen del binario ejecutable para la tunelizaci\u00f3n segura de datos. No existe un workaround directo para este problema sin actualizar. Sin embargo, los usuarios pueden validar manualmente la integridad del cliente FRP descargado implementando la suma de comprobaci\u00f3n o la verificaci\u00f3n de la firma en su propio entorno para asegurarse de que el binario no haya sido alterado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47868.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47868.json index 5a042867852..794ac4207d6 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47868.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47868.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This is a **data validation vulnerability** affecting several Gradio components, which allows arbitrary file leaks through the post-processing step. Attackers can exploit these components by crafting requests that bypass expected input constraints. This issue could lead to sensitive files being exposed to unauthorized users, especially when combined with other vulnerabilities, such as issue TOB-GRADIO-15. The components most at risk are those that return or handle file data. Vulnerable Components: 1. **String to FileData:** DownloadButton, Audio, ImageEditor, Video, Model3D, File, UploadButton. 2. **Complex data to FileData:** Chatbot, MultimodalTextbox. 3. **Direct file read in preprocess:** Code. 4. **Dictionary converted to FileData:** ParamViewer, Dataset. Exploit Scenarios: 1. A developer creates a Dropdown list that passes values to a DownloadButton. An attacker bypasses the allowed inputs, sends an arbitrary file path (like `/etc/passwd`), and downloads sensitive files. 2. An attacker crafts a malicious payload in a ParamViewer component, leaking sensitive files from a server through the arbitrary file leak. This issue has been resolved in `gradio>5.0`. Upgrading to the latest version will mitigate this vulnerability. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Se trata de una **vulnerabilidad de validaci\u00f3n de datos** que afecta a varios componentes de Gradio y que permite fugas de archivos arbitrarios durante el paso de posprocesamiento. Los atacantes pueden explotar estos componentes creando solicitudes que eluden las restricciones de entrada esperadas. Este problema podr\u00eda provocar que los archivos confidenciales queden expuestos a usuarios no autorizados, especialmente cuando se combina con otras vulnerabilidades, como el problema TOB-GRADIO-15. Los componentes con mayor riesgo son los que devuelven o manejan datos de archivos. Componentes vulnerables: 1. **Cadena a FileData:** DownloadButton, Audio, ImageEditor, Video, Model3D, File, UploadButton. 2. **Datos complejos a FileData:** Chatbot, MultimodalTextbox. 3. **Lectura directa de archivos en preproceso:** Code. 4. **Diccionario convertido a FileData:** ParamViewer, Dataset. Escenarios de explotaci\u00f3n: 1. Un desarrollador crea una lista desplegable que pasa valores a un DownloadButton. Un atacante omite las entradas permitidas, env\u00eda una ruta de archivo arbitraria (como `/etc/passwd`) y descarga archivos confidenciales. 2. Un atacante crea un payload malicioso en un componente ParamViewer, filtrando archivos confidenciales de un servidor a trav\u00e9s de la fuga de archivos arbitraria. Este problema se ha resuelto en `gradio>5.0`. Actualizar a la \u00faltima versi\u00f3n mitigar\u00e1 esta vulnerabilidad. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47869.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47869.json index a1d50df7647..3a56f053ea1 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47869.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47869.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **timing attack** in the way Gradio compares hashes for the `analytics_dashboard` function. Since the comparison is not done in constant time, an attacker could exploit this by measuring the response time of different requests to infer the correct hash byte-by-byte. This can lead to unauthorized access to the analytics dashboard, especially if the attacker can repeatedly query the system with different keys. Users are advised to upgrade to `gradio>4.44` to mitigate this issue. To mitigate the risk before applying the patch, developers can manually patch the `analytics_dashboard` dashboard to use a **constant-time comparison** function for comparing sensitive values, such as hashes. Alternatively, access to the analytics dashboard can be disabled." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad implica un **ataque de tiempo** en la forma en que Gradio compara los hashes para la funci\u00f3n `analytics_dashboard`. Dado que la comparaci\u00f3n no se realiza en tiempo constante, un atacante podr\u00eda aprovechar esto midiendo el tiempo de respuesta de diferentes solicitudes para inferir el hash correcto byte a byte. Esto puede provocar un acceso no autorizado al panel de an\u00e1lisis, especialmente si el atacante puede consultar repetidamente el sistema con diferentes claves. Se recomienda a los usuarios que actualicen a `gradio>4.44` para mitigar este problema. Para mitigar el riesgo antes de aplicar el parche, los desarrolladores pueden parchear manualmente el panel `analytics_dashboard` para utilizar una funci\u00f3n de **comparaci\u00f3n en tiempo constante** para comparar valores sensibles, como los hashes. Alternativamente, se puede deshabilitar el acceso al panel de an\u00e1lisis." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47870.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47870.json index 27b82eeffb8..defae2ba31e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47870.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47870.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **race condition** in the `update_root_in_config` function, allowing an attacker to modify the `root` URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition. Users are advised to upgrade to `gradio>=5` to address this issue. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad implica una **condici\u00f3n de ejecuci\u00f3n** en la funci\u00f3n `update_root_in_config`, que permite a un atacante modificar la URL `root` utilizada por el frontend de Gradio para comunicarse con el backend. Al explotar esta falla, un atacante puede redirigir el tr\u00e1fico de usuarios a un servidor malicioso. Esto podr\u00eda llevar a la interceptaci\u00f3n de datos confidenciales, como credenciales de autenticaci\u00f3n o archivos cargados. Esto afecta a todos los usuarios que se conectan a un servidor Gradio, especialmente a aquellos expuestos a Internet, donde los actores maliciosos podr\u00edan explotar esta condici\u00f3n de ejecuci\u00f3n. Se recomienda a los usuarios que actualicen a `gradio>=5` para solucionar este problema. No existen soluciones workarounds para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47871.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47871.json index 2c47c5d4988..9701cc85f4e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47871.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47871.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves **insecure communication** between the FRP (Fast Reverse Proxy) client and server when Gradio's `share=True` option is used. HTTPS is not enforced on the connection, allowing attackers to intercept and read files uploaded to the Gradio server, as well as modify responses or data sent between the client and server. This impacts users who are sharing Gradio demos publicly over the internet using `share=True` without proper encryption, exposing sensitive data to potential eavesdroppers. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can avoid using `share=True` in production environments and instead host their Gradio applications on servers with HTTPS enabled to ensure secure communication." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad implica una **comunicaci\u00f3n insegura** entre el cliente y el servidor de FRP (Fast Reverse Proxy) cuando se utiliza la opci\u00f3n `share=True` de Gradio. No se aplica HTTPS en la conexi\u00f3n, lo que permite a los atacantes interceptar y leer archivos cargados en el servidor de Gradio, as\u00ed como modificar las respuestas o los datos enviados entre el cliente y el servidor. Esto afecta a los usuarios que comparten demostraciones de Gradio p\u00fablicamente a trav\u00e9s de Internet utilizando `share=True` sin el cifrado adecuado, lo que expone los datos confidenciales a posibles esp\u00edas. Se recomienda a los usuarios que actualicen a `gradio>=5` para solucionar este problema. Como workaround, los usuarios pueden evitar el uso de `share=True` en entornos de producci\u00f3n y, en su lugar, alojar sus aplicaciones Gradio en servidores con HTTPS habilitado para garantizar una comunicaci\u00f3n segura." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47872.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47872.json index 6c349ec70a5..c79f2e79e27 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47872.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47872.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves **Cross-Site Scripting (XSS)** on any Gradio server that allows file uploads. Authenticated users can upload files such as HTML, JavaScript, or SVG files containing malicious scripts. When other users download or view these files, the scripts will execute in their browser, allowing attackers to perform unauthorized actions or steal sensitive information from their sessions. This impacts any Gradio server that allows file uploads, particularly those using components that process or display user-uploaded files. Users are advised to upgrade to `gradio>=5` to address this issue. As a workaround, users can restrict the types of files that can be uploaded to the Gradio server by limiting uploads to non-executable file types such as images or text. Additionally, developers can implement server-side validation to sanitize uploaded files, ensuring that HTML, JavaScript, and SVG files are properly handled or rejected before being stored or displayed to users." + }, + { + "lang": "es", + "value": "Gradio es un paquete Python de c\u00f3digo abierto dise\u00f1ado para la creaci\u00f3n r\u00e1pida de prototipos. Esta vulnerabilidad implica **Cross-Site Scripting (XSS)** en cualquier servidor Gradio que permita la carga de archivos. Los usuarios autenticados pueden cargar archivos como HTML, JavaScript o SVG que contengan scripts maliciosos. Cuando otros usuarios descarguen o vean estos archivos, los scripts se ejecutar\u00e1n en su navegador, lo que permitir\u00e1 a los atacantes realizar acciones no autorizadas o robar informaci\u00f3n confidencial de sus sesiones. Esto afecta a cualquier servidor Gradio que permita la carga de archivos, en particular a aquellos que utilizan componentes que procesan o muestran archivos cargados por el usuario. Se recomienda a los usuarios que actualicen a `gradio>=5` para solucionar este problema. Como workaround, los usuarios pueden restringir los tipos de archivos que se pueden cargar en el servidor Gradio limitando las cargas a tipos de archivos no ejecutables, como im\u00e1genes o texto. Adem\u00e1s, los desarrolladores pueden implementar la validaci\u00f3n del lado del servidor para desinfectar los archivos cargados, lo que garantiza que los archivos HTML, JavaScript y SVG se gestionen o rechacen correctamente antes de almacenarse o mostrarse a los usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json index 270f0f7a415..0cd56094dfe 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47913.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T22:15:02.687", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki before 1.39.9, 1.40.x and 1.41.x before 1.41.3, and 1.42.x before 1.42.2. An API caller can match a filter condition against AbuseFilter logs even if the caller is not authorized to view the log details for the filter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en la extensi\u00f3n AbuseFilter para MediaWiki anterior a la versi\u00f3n 1.39.9, 1.40.x y 1.41.x anterior a la 1.41.3, y 1.42.x anterior a la 1.42.2. Un llamador de API puede hacer coincidir una condici\u00f3n de filtro con los registros de AbuseFilter incluso si el llamador no est\u00e1 autorizado a ver los detalles del registro del filtro." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47962.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47962.json index 4076b77d221..2ae9d2fa523 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47962.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47962.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de la longitud de los datos suministrados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede manipular a un usuario interno para que visite una p\u00e1gina o un archivo malicioso y aproveche esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47963.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47963.json index 6a459b35590..012cb1c42f7 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47963.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47963.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura despu\u00e9s del final de un objeto asignado. Un atacante puede manipular a los usuarios para que visiten una p\u00e1gina o un archivo malicioso y aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47964.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47964.json index 20478273b80..7f90458fb8d 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47964.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47964.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede manipular a los usuarios para que visiten una p\u00e1gina o un archivo malicioso y aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47965.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47965.json index f0cbb312525..8c235354a72 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47965.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47965.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de los datos suministrados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede manipular a los usuarios para que visiten una p\u00e1gina o un archivo malicioso y aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47966.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47966.json index 73101e0b2f1..0c6f45d16e8 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47966.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47966.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una inicializaci\u00f3n adecuada de la memoria antes de acceder a ella. Un atacante puede manipular a los usuarios para que visiten una p\u00e1gina o un archivo malicioso y aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json index 8da8ea87a8d..b3f7185d769 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Mega Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Mega Elements para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Button del complemento en todas las versiones hasta la 1.2.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json index dcf7fd21ac6..3525f18da8c 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A voltage glitch during the startup of EEFC NVM controllers on Microchip SAM E70/S70/V70/V71 microcontrollers allows access to the memory bus via the debug interface even if the security bit is set." + }, + { + "lang": "es", + "value": "Una falla de voltaje durante el inicio de los controladores EEFC NVM en los microcontroladores Microchip SAM E70/S70/V70/V71 permite el acceso al bus de memoria a trav\u00e9s de la interfaz de depuraci\u00f3n incluso si el bit de seguridad est\u00e1 configurado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json index 7ade361753b..c5560bb4e2f 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48902.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.46677 improper access control allowed users with project update permission to delete applications via API" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.46677, un control de acceso incorrecto permit\u00eda a los usuarios con permiso de actualizaci\u00f3n de proyectos eliminar aplicaciones a trav\u00e9s de API" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json index 4e72a020a10..6fccf489df3 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL injection vulnerability in Simple PHP Shopping Cart affecting version 0.9. This vulnerability could allow an attacker to retrieve all the information stored in the database by sending a specially crafted SQL query, due to the lack of proper sanitisation of the category_id parameter in the category.php file." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Simple PHP Shopping Cart que afecta a la versi\u00f3n 0.9. Esta vulnerabilidad podr\u00eda permitir a un atacante recuperar toda la informaci\u00f3n almacenada en la base de datos mediante el env\u00edo de una consulta SQL especialmente manipulada, debido a la falta de una correcta desinfecci\u00f3n del par\u00e1metro category_id en el archivo category.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json index d0a050202f4..029d8a3632e 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ConvertPlus plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.26 via deserialization of untrusted input from the 'settings_encoded' attribute of the 'smile_modal' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento ConvertPlus para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.5.26 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del atributo 'settings_encoded' del shortcode 'smile_modal'. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json index 6022038bf83..5e52ce900b9 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "ePO doesn't allow a regular privileged user to delete tasks or assignments. Insecure direct object references that allow a least privileged user to manipulate the client task and client task assignments, hence escalating his/her privilege." + }, + { + "lang": "es", + "value": "ePO no permite que un usuario privilegiado normal elimine tareas o asignaciones. Referencias a objetos directos inseguras que permiten que un usuario con menos privilegios manipule la tarea del cliente y las asignaciones de tareas del cliente, aumentando as\u00ed sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json index 96fbed87afe..dd9f0c6a719 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 Service Pack 1 Update 2 allows an attacker with admin privileges on the ePO server to read the contents of the orion.keystore file, allowing them to access the ePO database encryption key. This was possible through using a hard coded password for the keystore. Access Control restrictions on the file mean this would not be exploitable unless the user is the system admin for the server that ePO is running on." + }, + { + "lang": "es", + "value": "La vulnerabilidad de credenciales codificadas de forma r\u00edgida en Trellix ePolicy Orchestrator (ePO) on Premise anterior a la versi\u00f3n 5.10 Service Pack 1 Update 2 permite a un atacante con privilegios de administrador en el servidor ePO leer el contenido del archivo orion.keystore, lo que le permite acceder a la clave de cifrado de la base de datos de ePO. Esto era posible mediante el uso de una contrase\u00f1a codificada de forma r\u00edgida para el almac\u00e9n de claves. Las restricciones de control de acceso en el archivo significan que esto no ser\u00eda explotable a menos que el usuario sea el administrador del sistema del servidor en el que se ejecuta ePO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4851.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4851.json index 7be06931421..c9544ef3c9d 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4851.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4851.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:02.800", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4881.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4881.json index e786b66f26b..48503d86be1 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4881.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4881.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:03.063", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4888.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4888.json index 169836c81ff..4e6c86b53b0 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4888.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4888.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:03.397", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json index 3051cfbd270..5a9ed0daf87 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:18.577", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json index ae577d79a73..88cf9abe503 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Yoast SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018display_name\u2019 author meta in all versions up to, and including, 22.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Yoast SEO para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del metadato del autor 'display_name' en todas las versiones hasta la 22.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json index c6bc7fcaa44..17b176bb974 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_pass/aksi_pass.php parameter in nama_lengkap. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it." + }, + { + "lang": "es", + "value": "Vulnerabilidad en SiAdmin 1.1 que permite la inyecci\u00f3n de SQL a trav\u00e9s del par\u00e1metro /modul/mod_pass/aksi_pass.php en nama_lengkap. Esta vulnerabilidad podr\u00eda permitir a un atacante remoto enviar una consulta SQL especialmente manipulada al sistema y recuperar toda la informaci\u00f3n almacenada en \u00e9l." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json index f01cfe2f1ac..ccf9647203a 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_kuliah/aksi_kuliah.php parameter in nim. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it." + }, + { + "lang": "es", + "value": "Vulnerabilidad en SiAdmin 1.1 que permite la inyecci\u00f3n de SQL a trav\u00e9s del par\u00e1metro /modul/mod_kuliah/aksi_kuliah.php en nim. Esta vulnerabilidad podr\u00eda permitir a un atacante remoto enviar una consulta SQL especialmente manipulada al sistema y recuperar toda la informaci\u00f3n almacenada en \u00e9l." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json index f4da9c3b5a8..9017c88b0dc 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vulnerability in SiAdmin 1.1 that allows XSS via the /show.php query parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and thereby steal their cookie session credentials." + }, + { + "lang": "es", + "value": "Vulnerabilidad en SiAdmin 1.1 que permite XSS a trav\u00e9s del par\u00e1metro de consulta /show.php. Esta vulnerabilidad podr\u00eda permitir que un atacante remoto env\u00ede una URL especialmente manipulada a un usuario autenticado y, de ese modo, robe sus credenciales de sesi\u00f3n de cookies." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json index 2c3dd85056b..862b8a879a2 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of multiple Ligowave devices could allow an authenticated remote\u00a0attacker to execute arbitrary commands with elevated privileges.This issue affects UNITY: through 6.95-2; PRO: through 6.95-1.Rt3883; MIMO: through 6.95-1.Rt2880; APC Propeller: through 2-5.95-4.Rt3352." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de m\u00faltiples dispositivos Ligowave podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios con privilegios elevados. Este problema afecta a UNITY: hasta 6.95-2; PRO: hasta 6.95-1.Rt3883; MIMO: hasta 6.95-1.Rt2880; APC Propeller: hasta 2-5.95-4.Rt3352." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5124.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5124.json index 5f57b6f75f0..56a1b9c7fb0 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5124.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5124.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:03.863", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5133.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5133.json index d4268a9a1ce..3678c22c6d0 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5133.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:05.557", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5187.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5187.json index 0a42bdc6ac5..b01b03e08ab 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5187.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:06.100", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json index 36bcce7a6f3..a246a3efcd3 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:06.363", "lastModified": "2024-06-17T19:15:59.190", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5248.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5248.json index ba9b015c6d4..e304a5a6d78 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5248.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5248.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:06.917", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5278.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5278.json index a94c8fbb31e..f8a8cd0d018 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5278.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:07.310", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json index fdf830b5560..143c3f16bad 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:09.473", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json index 257396a2ce4..f85843dab13 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6157.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker who successfully exploited these vulnerabilities could cause the robot to stop.\n\n\n\nA vulnerability exists in the PROFINET stack included in the RobotWare versions listed below.\u00a0\n\nThis vulnerability arises under specific condition when specially crafted message is processed by the system.\n\nBelow are reported vulnerabilities in the Robot Ware versions. \n\n* IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07" + }, + { + "lang": "es", + "value": "Un atacante que aproveche con \u00e9xito estas vulnerabilidades podr\u00eda hacer que el robot se detenga. Existe una vulnerabilidad en la pila PROFINET incluida en las versiones de RobotWare que se enumeran a continuaci\u00f3n. Esta vulnerabilidad surge en condiciones espec\u00edficas cuando el sistema procesa un mensaje especialmente manipulado. A continuaci\u00f3n se indican las vulnerabilidades notificadas en las versiones de RobotWare. * IRC5- RobotWare 6 < 6.15.06 excepto 6.10.10 y 6.13.07" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json index 9b05d86ed15..1af655b0719 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cleartext Storage of Sensitive Information vulnerability in Finrota Netahsilat allows Retrieve Embedded Sensitive Data.This issue solved in versions 1.21.10,\u00a01.23.01,\u00a01.23.08, 1.23.11 and 1.24.03." + }, + { + "lang": "es", + "value": "La vulnerabilidad de almacenamiento de informaci\u00f3n confidencial en texto plano en Finrota Netahsilat permite recuperar datos confidenciales integrados. Este problema se resolvi\u00f3 en las versiones 1.21.10, 1.23.01, 1.23.08, 1.23.11 y 1.24.03." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json index 9c9647e5550..c258488c3c9 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6530.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema de cross site scripting en GitLab que afecta a todas las versiones a partir de la 17.1 anterior a la 17.2.9, a partir de la 17.3 anterior a la 17.3.5 y a partir de la 17.4 anterior a la 17.4.2. Al agregar una autorizaci\u00f3n a una aplicaci\u00f3n, se puede hacer que se represente como HTML en circunstancias espec\u00edficas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json index 0a61248fcab..672cb79ff48 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2024-09-12T15:18:26.543", "lastModified": "2024-09-23T20:15:05.560", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json index 8701960476e..44b606ebf47 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6747.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@checkmk.com", "published": "2024-10-10T08:15:03.630", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6840.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6840.json index 663ea8941f9..1b6073110e5 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6840.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6840.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-12T17:15:05.773", "lastModified": "2024-09-12T18:14:03.913", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json index 0a0a7867362..24461338e2a 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-10-09T19:15:14.930", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json index df5875f60a1..f113f5803a9 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7049.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-10-10T08:15:03.910", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json index 2a4a008b615..ab977d80213 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-25T16:15:04.720", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json index e400dfef4cb..c243a444fa3 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.040", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json index 8a6c5923ed9..6a7a01401a8 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7491.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.417", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json index a025aaf33f8..30cd52c1612 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8080.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T21:15:18.217", "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json index 62c927b86c5..777ceb25d15 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", "published": "2024-10-08T16:15:13.380", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json index 2f9940f21e7..36b6be8e648 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8422.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2024-10-08T10:15:04.880", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json index bc3c02b4c0f..c7a171262ec 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8437.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:46.500", "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json index 4e8af6b1d52..f2570fb98d3 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8477.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.300", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8486.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8486.json index ae38da5c12e..0c4c981f91b 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8486.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8486.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in the Modern Heading and Icon Picker widgets all versions up to, and including, 2.16.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Shortcodes and extra features for Phlox para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s del par\u00e1metro 'url' en los widgets de encabezado moderno y selector de \u00edconos de todas las versiones hasta la 2.16.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8499.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8499.json index 9d8f62f46db..437ec2fb54d 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8499.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8499.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018render_review_request_notice\u2019 function in all versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Checkout Field Editor (Administrador de pago) para WooCommerce para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s de la funci\u00f3n 'render_review_request_notice' en todas las versiones hasta la 2.0.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json index d112bceb50d..3bc612834c6 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8513.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.323", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json index ee340bb3893..0c9c1691059 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:11.433", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json index f30173dc954..ccb2e206bd1 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-27T17:15:14.180", "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json index ec005de7330..ddf986f3df9 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8729.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.550", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8743.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8743.json index c4aa120b269..048ca45772d 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8743.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8743.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Limited JavaScript File Upload in all versions up to, and including, 6.5.7. This is due to a lack of proper checks on allowed file types. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files, which could lead to Stored Cross-Site Scripting." + }, + { + "lang": "es", + "value": "El complemento Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor para WordPress es vulnerable a la carga limitada de archivos JavaScript en todas las versiones hasta la 6.5.7 incluida. Esto se debe a la falta de controles adecuados sobre los tipos de archivos permitidos. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor o superior, y con permisos otorgados por un administrador, carguen archivos .css y .js, lo que podr\u00eda provocar cross-site scripting almacenado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json index 8b60b81d7fb..b131f28b41d 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T16:15:09.293", "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json index 05818d580f0..a7d9a517672 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:09.450", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json index 3fa251fc1cb..82d72ad1434 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8926.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:10.637", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json index d4bae158f3d..48b434fab58 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8927.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:10.867", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json index 0b6405259c2..b4b93223455 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8977.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab EE que afecta a todas las versiones desde la 15.10 hasta la 17.2.9, desde la 17.3 hasta la 17.3.5 y desde la 17.4 hasta la 17.4.2. Las instancias con el Panel de an\u00e1lisis de productos configurado y habilitado podr\u00edan ser vulnerables a ataques SSRF." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json index b29041ff92c..babb6004d0c 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8987.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.757", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json index 3e7f5d2ee68..4349f7c1e37 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.523", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json index 2538d6e8fd6..9e4bc420e49 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9026.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@php.net", "published": "2024-10-08T04:15:11.060", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json index c17ea5fcd02..b32fabf6e3d 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9057.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:03.960", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json index 2fcb51d7ac3..d77d34de7e5 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.163", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json index 18553d446cc..d87cbb9ee7d 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.363", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json index 0e1046558e7..0fa4a08adc9 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.567", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json index 787890c759b..a2eb43b4df0 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.740", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json index 58ab0e38542..06e04d6885f 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9072.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.773", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json index 4660c77ebce..62b7c944dbb 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:02.963", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9146.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9146.json index bbc863c008a..ecb587f0792 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9146.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9146.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in James Low CSS JS Files allows Path Traversal.This issue affects CSS JS Files: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en James Low CSS JS Files permite el Path Traversal. Este problema afecta a los archivos CSS JS: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json index 2c39663b52b..926845781ed 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-10T06:15:11.290", "lastModified": "2024-10-10T15:35:15.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json index 1df91bc5a08..4aecb670551 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'update_metadata' function in all versions up to, and including, 1.0.228. This makes it possible for unauthenticated attackers to insert new and update existing metadata beginning with 'rank_math', and delete arbitrary existing user metadata and term metadata. Deleting existing usermeta can cause a loss of access to the administrator dashboard for any registered users, including Administrators." + }, + { + "lang": "es", + "value": "El complemento Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings para WordPress es vulnerable a modificaciones no autorizadas y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'update_metadata' en todas las versiones hasta la 1.0.228 incluida. Esto hace posible que atacantes no autenticados inserten metadatos nuevos y actualicen los existentes que comiencen con 'rank_math', y eliminen metadatos de usuario y metadatos de t\u00e9rminos existentes de forma arbitraria. Eliminar metadatos de usuario existentes puede provocar la p\u00e9rdida de acceso al panel de administrador para cualquier usuario registrado, incluidos los administradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json index 3e253fad386..5bfdea4b38e 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A privileged Vault operator with write permissions to the root namespace\u2019s identity endpoint could escalate their privileges to Vault\u2019s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16." + }, + { + "lang": "es", + "value": "Un operador de Vault privilegiado con permisos de escritura en el endpoint de identidad del espacio de nombres ra\u00edz podr\u00eda escalar sus privilegios a la pol\u00edtica ra\u00edz de Vault. Corregido en Vault Community Edition 1.18.0 y Vault Enterprise 1.18.0, 1.17.7, 1.16.11 y 1.15.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json index 02a4081e20d..d6d74786984 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9201.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The SEUR plugin, in its versions prior to 2.5.11, is vulnerable to time-based SQL injection through the use of the \u2018id_order\u2019 parameter of the \u2018/modules/seur/ajax/saveCodFee.php\u2019 endpoint." + }, + { + "lang": "es", + "value": "El complemento SEUR, en sus versiones anteriores a la 2.5.11, es vulnerable a la inyecci\u00f3n SQL basada en tiempo mediante el uso del par\u00e1metro 'id_order' del endpoint '/modules/seur/ajax/saveCodFee.php'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json index 7a1ecf30f64..df0fffb2ba2 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:12.180", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json index 9a57f8e29ac..8cff85b780f 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:04.980", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json index 254dc5cf201..00c67da066b 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:12.390", "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9312.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9312.json index a8915a3ca98..cc7ccc8de4d 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9312.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9312.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges." + }, + { + "lang": "es", + "value": "Authd, hasta la versi\u00f3n 0.3.6, no aleatorizaba lo suficiente los identificadores de usuario para evitar colisiones. Un atacante local que pudiera registrar nombres de usuario podr\u00eda falsificar el identificador de otro usuario y obtener sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json index 3262759da34..bda4b3dad96 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.228 via deserialization of untrusted input 'set_redirections' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.0.228 incluida, a trav\u00e9s de la deserializaci\u00f3n de la funci\u00f3n 'set_redirections' de entrada no confiable. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json index 9fac6f3b3db..105e7d88bbd 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9377.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.183", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json index b1170779b5c..2a26d2411ab 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json @@ -3,7 +3,7 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:57.183", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9385.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9385.json index eee60fde234..942d6d04f8a 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9385.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9385.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Themify Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Themify Builder para WordPress es vulnerable a ataques de cross-site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 7.6.2 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json index f1b6db5a296..d1eecaea63a 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.980", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9417.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9417.json index dfcecc16761..1d0ccfdabba 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9417.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9417.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Hash Form \u2013 Drag & Drop Form Builder plugin for WordPress is vulnerable to limited file uploads due to a misconfigured file type validation in the 'handleUpload' function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to upload files that are excluded from both the 'allowedExtensions' and 'unallowed_extensions' arrays on the affected site's server, including files that may contain cross-site scripting." + }, + { + "lang": "es", + "value": "El complemento Hash Form \u2013 Drag & Drop Form Builder para WordPress es vulnerable a la carga limitada de archivos debido a una validaci\u00f3n de tipo de archivo mal configurada en la funci\u00f3n 'handleUpload' en todas las versiones hasta la 1.1.9 incluida. Esto hace posible que atacantes no autenticados carguen archivos que est\u00e1n excluidos de las matrices 'allowedExtensions' y 'unallowed_extensions' en el servidor del sitio afectado, incluidos archivos que pueden contener cross-site scripting." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9455.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9455.json index f0b968fe2e5..def453b1b1e 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9455.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9455.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Cleanup and Basic Functions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento WP Cleanup and Basic Functions para WordPress es vulnerable a cross-site scripting almacenado mediante la carga de archivos SVG en todas las versiones hasta la 2.2.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json index f9518167a7e..bf272daf6c0 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9457.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.390", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json index d77fa0498ea..a6a5d79e407 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.637", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9481.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9481.json index 3534b13e928..6fdf02058a0 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9481.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9481.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed eml file to crash the application during file processing." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en el m\u00f3dulo del motor en la firma AVG/Avast Antivirus <24092400 publicada el 24/sep/2024 en MacOS permite que un archivo eml mal formado bloquee la aplicaci\u00f3n durante el procesamiento del archivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9482.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9482.json index 560dbc7e7ef..1856576e527 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9482.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9482.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An out-of-bounds write in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en el m\u00f3dulo del motor en la firma AVG/Avast Antivirus <24092400 publicada el 24/sep/2024 en MacOS permite que un archivo Mach-O malformado bloquee la aplicaci\u00f3n durante el procesamiento del archivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9483.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9483.json index 2eb72c1450d..48c6ee6a384 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9483.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing." + }, + { + "lang": "es", + "value": "Una desreferencia de puntero nulo en el m\u00f3dulo de verificaci\u00f3n de firma en la firma AVG/Avast Antivirus <24092400 publicada el 24/sep/2024 en MacOS puede permitir que un archivo xar mal formado bloquee la aplicaci\u00f3n durante el procesamiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9484.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9484.json index 375140944a2..fb4b93b0e7d 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9484.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9484.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing." + }, + { + "lang": "es", + "value": "Una eliminaci\u00f3n de referencia de puntero nulo en el m\u00f3dulo del motor en la firma AVG/Avast Antivirus <24092400 publicada el 24/sep/2024 en MacOS permite que un archivo xar mal formado bloquee la aplicaci\u00f3n durante el procesamiento del archivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json index 70269439453..16c57b2d59a 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or metadata document. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.15 and was fixed in versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2. This vulnerability was reported via the GitHub Bug Bounty program." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad de verificaci\u00f3n incorrecta de la firma criptogr\u00e1fica en GitHub Enterprise Server que permit\u00eda eludir la autenticaci\u00f3n SSO SAML, lo que daba como resultado el aprovisionamiento no autorizado de usuarios y el acceso a la instancia. Para explotarla, era necesario habilitar la funci\u00f3n de aserciones cifradas y el atacante necesitaba acceso directo a la red, as\u00ed como una respuesta SAML firmada o un documento de metadatos. Esta vulnerabilidad afect\u00f3 a todas las versiones de GitHub Enterprise Server anteriores a la 3.15 y se solucion\u00f3 en las versiones 3.11.16, 3.12.10, 3.13.5 y 3.14.2. Esta vulnerabilidad se inform\u00f3 a trav\u00e9s del programa de recompensas por errores de GitHub." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json index a0409e33d33..b7a65fdfc01 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9518.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.590", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json index 5ad7fe48572..d50d178ee0f 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9519.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:05.787", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json index f67918962d2..30222e56381 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9520.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T03:15:03.177", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json index 7a2b6f13655..f29125aa683 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9522.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:06.013", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json index 55ed07d89ee..05831e7c46e 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms (administrator by default), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s de campos de etiquetas de formulario en todas las versiones hasta la 5.1.19 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso para editar formularios (administrador por defecto), inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9554.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9554.json index 68993b78b71..cb1b649d949 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9554.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9554.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in Sovell Smart Canteen System up to 3.0.7303.30513. Affected by this vulnerability is the function Check_ET_CheckPwdz201 of the file suanfa.py of the component Password Reset Handler. The manipulation leads to authorization bypass. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "En Sovell Smart Canteen System hasta la versi\u00f3n 3.0.7303.30513 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica. La funci\u00f3n Check_ET_CheckPwdz201 del archivo suanfa.py del componente Password Reset Handler se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n permite eludir la autorizaci\u00f3n. El ataque puede ejecutarse de forma remota. La complejidad del ataque es bastante alta. La explotaci\u00f3n parece dif\u00edcil. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9560.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9560.json index 18f2bde28c5..27c4255680c 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9560.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9560.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-06T22:15:02.677", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG V5. It has been rated as critical. Affected by this issue is the function delCatelogs of the file /CDGServer3/document/Catelogs;logindojojs?command=DelCatelogs. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en ESAFENET CDG V5. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n delCatelogs del archivo /CDGServer3/document/Catelogs;logindojojs?command=DelCatelogs. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json index 695be8d3f2b..3ed6da604b5 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "Vulnerability in Distro Linux Workbooth v2.5 that allows to escalate privileges to the root user by manipulating the network configuration script." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Distro Linux Workbooth v2.5 que permite escalar privilegios al usuario root manipulando el script de configuraci\u00f3n de red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json index aa88d308654..7cb850e6bc8 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:06.227", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json index 52de852e94a..8331a49e8a4 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9596.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. It was possible for an unauthenticated attacker to determine the GitLab version number for a GitLab instance." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en GitLab EE que afecta a todas las versiones desde la 16.6 hasta la 17.2.9, desde la 17.3 hasta la 17.3.5 y desde la 17.4 hasta la 17.4.2. Un atacante no autenticado pod\u00eda determinar el n\u00famero de versi\u00f3n de GitLab para una instancia de GitLab." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json index 4ba9157ecb1..7d200747cdc 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9623.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 8.16 anterior a la 17.2.9, desde la 17.3 anterior a la 17.3.5 y desde la 17.4 anterior a la 17.4.2, que permite que las claves de implementaci\u00f3n se env\u00eden a un repositorio archivado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json index d8d05959926..cbfeec0d1be 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9685.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-10T02:15:06.440", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json index 71a9bf61315..5ee2432b3bc 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9780.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T07:15:03.727", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json index 2500def5359..5dfc1062496 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9781.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-10T07:15:04.100", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json index 0456829a3b8..568440858dc 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9782.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en D-Link DIR-619L B1 2.06. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formEasySetupWWConfig del archivo /goform/formEasySetupWWConfig. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json index 666dc2a7bab..9aa11c0b4d2 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9783.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en D-Link DIR-619L B1 2.06. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formLogDnsquery del archivo /goform/formLogDnsquery. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json index bc76371c1f5..78155ca1e05 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.06. Affected is the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L B1 2.06. La funci\u00f3n formResetStatistic del archivo /goform/formResetStatistic est\u00e1 afectada. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json index 391e885a24b..030a51932fd 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9785.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. Affected by this vulnerability is the function formSetDDNS of the file /goform/formSetDDNS. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L B1 2.06. La funci\u00f3n formSetDDNS del archivo /goform/formSetDDNS se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json index 436aa702f28..dcc011a050e 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9786.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. Affected by this issue is the function formSetLog of the file /goform/formSetLog. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L B1 2.06. La funci\u00f3n formSetLog del archivo /goform/formSetLog se ve afectada por este problema. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9787.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9787.json index e0d92378dd0..72c3e6e0eaa 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9787.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9787.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Contemporary Control System BASrouter BACnet BASRT-B 2.7.2. This affects an unknown part of the component UDP Packet Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad clasificada como problem\u00e1tica en el Contemporary Control System BASrouter BACnet BASRT-B 2.7.2. Afecta a una parte desconocida del componente UDP Packet Handler. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9788.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9788.json index 95d6265dd93..83382cc423e 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9788.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9788.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en LyLme_spage 1.9.5 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/tag.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9789.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9789.json index bfd5628fa68..faefc5f85eb 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9789.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9789.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en LyLme_spage 1.9.5 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/apply.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9790.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9790.json index 5cb205aaef2..6ff0fbaabc8 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9790.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9790.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in LyLme_spage 1.9.5. It has been classified as critical. Affected is an unknown function of the file /admin/sou.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en LyLme_spage 1.9.5. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/sou.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json index 89203a37f67..f41b7ac2f32 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in D-Link DSL-2750U R5B017. This affects an unknown part of the component Port Forwarding Page. The manipulation of the argument PortMappingDescription leads to cross site scripting. It is possible to initiate the attack remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en D-Link DSL-2750U R5B017. Afecta a una parte desconocida del componente Port Forwarding Page. La manipulaci\u00f3n del argumento PortMappingDescription provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json index 4c14f8071b6..abde996d668 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Tenda AC1206 up to 15.03.06.23. This vulnerability affects the function ate_iwpriv_set/ate_ifconfig_set of the file /goform/ate. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC1206 hasta la versi\u00f3n 15.03.06.23. Esta vulnerabilidad afecta a la funci\u00f3n ate_iwpriv_set/ate_ifconfig_set del archivo /goform/ate. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json index ba727a7176a..13ebce2f2cd 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. This issue affects some unknown processing of the file /update-image1.php. The manipulation of the argument productimage1 leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Online Shopping Portal 1.0. Este problema afecta a algunos procesos desconocidos del archivo /update-image1.php. La manipulaci\u00f3n del argumento productimage1 provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json index f8315feb0a5..833d1d3ad24 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-10T08:15:04.140", "lastModified": "2024-10-10T15:35:16.310", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json index cab1c311be3..2d757ad9223 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file register.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "En code-projects Blood Bank System 1.0 se ha encontrado una vulnerabilidad clasificada como cr\u00edtica. Se trata de una funci\u00f3n desconocida del archivo register.php. La manipulaci\u00f3n del argumento user provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json index 800fe8fe2ae..e4bdc3279f5 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Profile Registration without Reload Refresh 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file add.php. The manipulation of the argument email_address/address/company_name/job_title/jobDescriptionparameter leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Profile Registration without Reload Refresh 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo add.php. La manipulaci\u00f3n del par\u00e1metro email_address/address/company_name/job_title/jobDescription conduce a cross site scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json index 2f13cdd6e47..b00e4173494 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file blooddetails.php. The manipulation of the argument Availibility leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank Management System 1.0. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo blooddetails.php. La manipulaci\u00f3n del argumento Availibility provoca cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json index 080a1e4e2a9..8314bdfbc55 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/campsdetails.php. The manipulation of the argument hospital leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/campsdetails.php. La manipulaci\u00f3n del argumento hospital conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json index a2cf220a09c..ab7a6977d23 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/campsdetails.php. The manipulation of the argument hospital/address/city/contact leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"hospital\"." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /admin/campsdetails.php. La manipulaci\u00f3n del argumento hospital/address/city/contact conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores solo menciona el par\u00e1metro \"hospital\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9806.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9806.json index 2100dab6ce5..b0b437c53c5 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9806.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9806.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Craig Rodway Classroombookings up to 2.8.6 and classified as problematic. This vulnerability affects unknown code of the file /rooms/fields of the component Room Page. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.7 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Craig Rodway Classroombookings hasta la versi\u00f3n 2.8.6 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /rooms/fields del componente Room Page. La manipulaci\u00f3n del argumento Name provoca cross site scripting. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2.8.7 puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contact\u00f3 al responsable del proyecto con anticipaci\u00f3n sobre la divulgaci\u00f3n. Respondi\u00f3 muy r\u00e1pido, de manera amable y profesional." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9807.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9807.json index 0a2c5893ab5..bc94e7eb035 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9807.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9807.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Craig Rodway Classroombookings 2.8.7 and classified as problematic. This issue affects some unknown processing of the file /sessions of the component Session Page. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.8.8 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Craig Rodway Classroombookings 2.8.7 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /sesiones del componente Session Page. La manipulaci\u00f3n del argumento Name provoca cross site scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.8.8 puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contact\u00f3 al responsable del proyecto con anticipaci\u00f3n sobre la divulgaci\u00f3n. Respondi\u00f3 muy r\u00e1pido, de manera amable y profesional." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json index cc7eb0a9aab..d85d480c634 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=products/view_product. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Online Eyewear Shop 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/?page=products/view_product. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json index aa4f52826be..9483e26892c 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as critical. Affected by this vulnerability is the function delete_product of the file /classes/Master.php?f=delete_product. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Online Eyewear Shop 1.0. Se ha declarado como cr\u00edtica. La funci\u00f3n delete_product del archivo /classes/Master.php?f=delete_product se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json index 9bcd5e5c799..e51e0ba95dd 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in SourceCodester Record Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file sort2_user.php. The manipulation of the argument qualification leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Record Management System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo sort2_user.php. La manipulaci\u00f3n de la calificaci\u00f3n de argumentos conduce a cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json index 0bb3a21cee6..932c10d084a 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. This affects an unknown part of the file filter3.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Restaurant Reservation System 1.0. Afecta a una parte desconocida del archivo filter3.php. La manipulaci\u00f3n del argumento company provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json index 7a00e26acf6..0ad1c94bd87 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Crud Operation System 1.0. This vulnerability affects unknown code of the file delete.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Crud Operation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo delete.php. La manipulaci\u00f3n del argumento sid conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json index 808b47e8f3d..f011426d7a7 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. This issue affects some unknown processing of the file product/register.php. The manipulation of the argument category leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Pharmacy Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo product/register.php. La manipulaci\u00f3n del argumento category provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9814.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9814.json index 84f375e4b3f..654624f9373 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9814.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9814.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Codezips Pharmacy Management System 1.0. Affected is an unknown function of the file product/update.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Pharmacy Management System 1.0. Se trata de una funci\u00f3n desconocida del archivo product/update.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9815.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9815.json index 24aa0dbd783..93ef7ee2c63 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9815.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9815.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/create-package.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Tourist Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/create-package.php. La manipulaci\u00f3n del argumento packageimage permite la carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9816.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9816.json index 51fcb728a12..c6c95b4dc48 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9816.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9816.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/change-image.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Codezips Tourist Management System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /admin/change-image.php. La manipulaci\u00f3n del argumento packageimage permite la carga sin restricciones. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9817.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9817.json index 0a89ef89eb0..7dc69c1bb5f 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9817.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9817.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been classified as critical. This affects an unknown part of the file /update.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /update.php. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9818.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9818.json index ac7f1885666..f8054ad0639 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9818.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9818.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Online Veterinary Appointment System 1.0. Affected is an unknown function of the file /admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Online Veterinary Appointment System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/categories/manage_category.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json index a916cb5effa..16f5099748a 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Pedalo Connector plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.5. This is due to insufficient restriction on the 'login_admin_user' function. This makes it possible for unauthenticated attackers to log to the first user, who is usually the administrator, or if it does not exist, then to the first administrator." + }, + { + "lang": "es", + "value": "El complemento Pedalo Connector para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 2.0.5 incluida. Esto se debe a una restricci\u00f3n insuficiente en la funci\u00f3n 'login_admin_user'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n con el primer usuario, que normalmente es el administrador, o si no existe, con el primer administrador." } ], "metrics": { diff --git a/README.md b/README.md index 97f495bff67..3d2c3a3ef5e 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-12T23:55:17.366296+00:00 +2024-10-13T02:00:16.486465+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-10-12T00:00:08.665067+00:00 +2024-10-13T00:00:08.669048+00:00 ``` ### Total Number of included CVEs @@ -38,15 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -- [CVE-2024-9903](CVE-2024/CVE-2024-99xx/CVE-2024-9903.json) (`2024-10-12T23:15:11.027`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `730` +- [CVE-2024-9789](CVE-2024/CVE-2024-97xx/CVE-2024-9789.json) (`2024-10-10T14:15:06.803`) +- [CVE-2024-9790](CVE-2024/CVE-2024-97xx/CVE-2024-9790.json) (`2024-10-10T15:15:15.457`) +- [CVE-2024-9792](CVE-2024/CVE-2024-97xx/CVE-2024-9792.json) (`2024-10-10T15:15:15.710`) +- [CVE-2024-9793](CVE-2024/CVE-2024-97xx/CVE-2024-9793.json) (`2024-10-10T16:15:09.080`) +- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-10T16:15:09.350`) +- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-10T15:35:16.310`) +- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-10T17:15:16.063`) +- [CVE-2024-9799](CVE-2024/CVE-2024-97xx/CVE-2024-9799.json) (`2024-10-10T17:15:16.390`) +- [CVE-2024-9803](CVE-2024/CVE-2024-98xx/CVE-2024-9803.json) (`2024-10-10T17:15:16.730`) +- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-10T18:15:09.150`) +- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-10T18:15:09.440`) +- [CVE-2024-9806](CVE-2024/CVE-2024-98xx/CVE-2024-9806.json) (`2024-10-10T19:15:17.520`) +- [CVE-2024-9807](CVE-2024/CVE-2024-98xx/CVE-2024-9807.json) (`2024-10-10T19:15:17.797`) +- [CVE-2024-9808](CVE-2024/CVE-2024-98xx/CVE-2024-9808.json) (`2024-10-10T20:15:05.003`) +- [CVE-2024-9809](CVE-2024/CVE-2024-98xx/CVE-2024-9809.json) (`2024-10-10T20:15:05.267`) +- [CVE-2024-9810](CVE-2024/CVE-2024-98xx/CVE-2024-9810.json) (`2024-10-10T20:15:05.517`) +- [CVE-2024-9811](CVE-2024/CVE-2024-98xx/CVE-2024-9811.json) (`2024-10-10T21:15:05.383`) +- [CVE-2024-9812](CVE-2024/CVE-2024-98xx/CVE-2024-9812.json) (`2024-10-10T21:15:05.677`) +- [CVE-2024-9813](CVE-2024/CVE-2024-98xx/CVE-2024-9813.json) (`2024-10-10T21:15:05.963`) +- [CVE-2024-9814](CVE-2024/CVE-2024-98xx/CVE-2024-9814.json) (`2024-10-10T22:15:11.570`) +- [CVE-2024-9815](CVE-2024/CVE-2024-98xx/CVE-2024-9815.json) (`2024-10-10T22:15:11.917`) +- [CVE-2024-9816](CVE-2024/CVE-2024-98xx/CVE-2024-9816.json) (`2024-10-10T22:15:12.230`) +- [CVE-2024-9817](CVE-2024/CVE-2024-98xx/CVE-2024-9817.json) (`2024-10-10T23:15:03.410`) +- [CVE-2024-9818](CVE-2024/CVE-2024-98xx/CVE-2024-9818.json) (`2024-10-10T23:15:03.680`) +- [CVE-2024-9822](CVE-2024/CVE-2024-98xx/CVE-2024-9822.json) (`2024-10-11T03:15:10.967`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5b4824d2d9d..607fff4e1bc 100644 --- a/_state.csv +++ b/_state.csv @@ -89308,7 +89308,7 @@ CVE-2016-6294,0,0,c633455c38bdf3661a9efbbcfa71282fe3546610400661baa540fb9a60d3d8 CVE-2016-6295,0,0,a3c07518ce6cdc006b3ca15418facb49065e9a79da3fbb0da004f63920dabe15,2023-11-07T02:33:56.273000 CVE-2016-6296,0,0,a874a8a1fb7eeb9a4b0822f4d3461c1cdd0bfd464a4ff2e28a75c23470ad2c2f,2023-11-07T02:33:56.393000 CVE-2016-6297,0,0,4a368362d441b38d16c0439d91e2f7665018bbba7051613129c0b384e978b22c,2023-11-07T02:33:56.513000 -CVE-2016-6298,0,0,f8938bde1263106fee91082e12eb2dea7777763a3ccffeb9d92e3c857a70fe7e,2016-11-28T20:31:14.547000 +CVE-2016-6298,0,1,36da26e4d3714e654010fdff8ed36179eb39187237665a24bed1c01723669de8,2016-11-28T20:31:14.547000 CVE-2016-6299,0,0,d78ff0ad7f5ab56c294ddae414ab667ea488cf8a7f260756ed5c94bdd257d051,2023-02-13T04:50:10.140000 CVE-2016-6300,0,0,0aab8195c7b707d5e61fdc86a9c0c299625eafbed59fbbddca931fb5aeaa117d,2023-11-07T02:33:56.653000 CVE-2016-6301,0,0,fc4c5133c9496842f15f1f1cbde8d4779fbb81f8858d2e1c355aedfa400c59a9,2020-08-27T20:15:12.113000 @@ -187054,45 +187054,45 @@ CVE-2021-47177,0,0,346385bc2a4821a680b2563f330f128b2ec4ff3823dbee32989736fec45f8 CVE-2021-47178,0,0,fc0c027fc34efff73df81831f0d5d31b432675480f3805d145af5b02bc425ee9,2024-04-04T14:15:08.850000 CVE-2021-47179,0,0,0675f8c24239aa7ef8b289c75858aa6d78f0ae41788e4339287c5503a6dad8d3,2024-05-16T21:20:28.357000 CVE-2021-47180,0,0,9723aa1b4b7dd21b1f3bd405117386f0d50fa6a115cc268f18ca6132fe9a9eef,2024-03-25T13:47:14.087000 -CVE-2021-47181,0,0,cd0aa5dfabbdcb16d84afbbbca9196869f487ef26e16c67446e025e9d2a3f27d,2024-04-10T19:49:51.183000 -CVE-2021-47182,0,0,37a4bd7a7f3f4073f1715c660d51a62fabbfb475e71bfd99833b69a74225630a,2024-04-10T19:49:51.183000 -CVE-2021-47183,0,0,38745e49fc11e75a8f3590065bda01de78004913fc9b986c288afc64bb276d74,2024-04-10T19:49:51.183000 -CVE-2021-47184,0,0,ac5e7d294c27aa99009fe37faa260562c6fcd04005c3472e52d33be8a63ec0d5,2024-04-10T19:49:51.183000 -CVE-2021-47185,0,0,24325fc85ab870dbf09f6aee8d51786a7392fc01ddb11334c66392cbfd30775c,2024-04-10T19:49:51.183000 +CVE-2021-47181,0,1,95d25428fbfa17aa6aa6ee01531cde8c93425311015ae32fe3f79cb310a4fbd3,2024-04-10T19:49:51.183000 +CVE-2021-47182,0,1,4792574fc435813b9fe79656d9ae1b7ce4ea13700d0374312da1a218710fd582,2024-04-10T19:49:51.183000 +CVE-2021-47183,0,1,c3cb0e0486f5f686ecda65a2fda9249df9bb3f4d5a1798ce062f80865f2abfe4,2024-04-10T19:49:51.183000 +CVE-2021-47184,0,1,3f42298e4905c34b3210bf335497dbf2432375e4319a2816b52ee5375875e374,2024-04-10T19:49:51.183000 +CVE-2021-47185,0,1,56dc926780b6289da6fc2f2a2340d91dd02878b1bd14bdade4892fd547e1eee0,2024-04-10T19:49:51.183000 CVE-2021-47186,0,0,9764e05a7689b9378003acaabd27875ef603ca82bd0ab26e48001abefae64642,2024-07-08T14:16:15.150000 -CVE-2021-47187,0,0,a25997c623af69df30918655a0f7a309899765693bff9648f288e38444209c0d,2024-04-10T19:49:51.183000 -CVE-2021-47188,0,0,3caa44e464c6aa548db924d12a4879b8e592d36718ccde34e91f9b4979b9bd27,2024-04-10T19:49:51.183000 -CVE-2021-47189,0,0,af95d2d5a749c3ccf1c1ec085e2bc63456f770e49094aea0414dab001f1a0aa2,2024-04-10T19:49:51.183000 -CVE-2021-47190,0,0,778865431848c9464db136e0b05ad3122ddef403ea3193f37b7fc0e30d93a29d,2024-04-10T19:49:51.183000 -CVE-2021-47191,0,0,63e65039dc3666d71a05684993c26feff46e6b58fd319d5cd498775a0f518650,2024-04-10T19:49:51.183000 -CVE-2021-47192,0,0,ebc4b7f426dca1a508258048016211673926f2ed27ff0c93e95e313e199ca6a1,2024-04-10T19:49:51.183000 +CVE-2021-47187,0,1,9ca2d150ce799185dbf21da23c96757ea7a1a3f44902191e2cf2fa8367cf30e6,2024-04-10T19:49:51.183000 +CVE-2021-47188,0,1,e6a6f0a863fd0b932dc358db740d6fc5aa8627c048b64301dfe58213c8b68e44,2024-04-10T19:49:51.183000 +CVE-2021-47189,0,1,3f78a623d635f22e537d0c874c4443009d21b8f19705527f64445234dfc9969e,2024-04-10T19:49:51.183000 +CVE-2021-47190,0,1,a23b60385bed7997c530e4b41937eadabf6ba2e668fb03ecc615e4ad6df3d195,2024-04-10T19:49:51.183000 +CVE-2021-47191,0,1,baf35fc648eda6a3feb39f18a5c99fdd9a75e22cc9f519adf716e800ca27866f,2024-04-10T19:49:51.183000 +CVE-2021-47192,0,1,89d68fa7dca3f0424ebac488b35bd95de399854a2ef2e9961be289a4695f3819,2024-04-10T19:49:51.183000 CVE-2021-47193,0,0,b5bd1afd4c6a02ca2a2969198c95e4901234c965e7fe433c27281259074364d2,2024-04-19T19:20:07.550000 CVE-2021-47194,0,0,9d895c630c92e9f6689899bad26fd025e53d528730c464a535eea55402e84943,2024-04-19T19:19:16.967000 CVE-2021-47195,0,0,0abf3955e7599b2cc932554806394527386aebc638b6030e9df2f0d084775bcc,2024-04-19T19:16:08.537000 -CVE-2021-47196,0,0,88ecaaa83ee598bf7d99b71c1e30aa5983f20bec05ae70ba9deb37834e5732ce,2024-04-10T19:49:51.183000 -CVE-2021-47197,0,0,b6b5474b63344a4dca49eb9911af59866ecb779596e10ec13fba9c8ad52a08c1,2024-04-10T19:49:51.183000 +CVE-2021-47196,0,1,992bff4dcd967788527ea20fce8e909c423b7261704098fe84090f7e4fb97499,2024-04-10T19:49:51.183000 +CVE-2021-47197,0,1,7388e6b7bbf4aba0091537ee15476f604c56f946d42a3a492618c93965159614,2024-04-10T19:49:51.183000 CVE-2021-47198,0,0,675f38b3669e25ddd8ccd82b0d3176be93689e73552694ae6aa96f3e945e2233,2024-04-19T19:15:02.460000 -CVE-2021-47199,0,0,489a984e825a4cbb6a0051cabe11e9ee4ef02a6f405a20a7349d88b4998b493d,2024-04-10T19:49:51.183000 -CVE-2021-47200,0,0,9ab0479bac3333ac1cf38d05ccd6bb73f7a1f469bb03eaf40cc9004e055d1884,2024-04-10T19:49:51.183000 -CVE-2021-47201,0,0,156218e35377a26fc36d651f49a73fbb6a795b4ecd0c046936c21f3b012e911f,2024-04-10T19:49:51.183000 -CVE-2021-47202,0,0,fbb56c3aaa6c55477f0e61655d513a1f58462b85092625bf01d7fbabb27c781a,2024-04-10T19:49:51.183000 -CVE-2021-47203,0,0,a85404101a4d1476e594c63d11960a0756344be55c84e72f4777810e019c97e5,2024-04-10T19:49:51.183000 -CVE-2021-47204,0,0,13eccf5976df1e48bce66ca692147d4ad66704110d2da9e1ec00aaed504cf434,2024-04-10T19:49:51.183000 -CVE-2021-47205,0,0,c3d62c6b4444d3a52340827d557a6d4ba71fbfdfaef9b19f1cc598570912210f,2024-04-10T19:49:51.183000 -CVE-2021-47206,0,0,0e3ab7a6316ff1de4cc3cfe2e665426b6db1a0196e3f386a7386f97e4a6ca210,2024-04-10T19:49:51.183000 -CVE-2021-47207,0,0,ca01b0403893c71edc05ba5b9a679ce3305af3ffe312e562e7a3a79238663fe0,2024-04-10T19:49:51.183000 +CVE-2021-47199,0,1,250b7ff9f497fdafd1fc2ca557d8a52981dc362515e33d81655684c7e1c2ba04,2024-04-10T19:49:51.183000 +CVE-2021-47200,0,1,31bd112dee4d9b4d0a4cb1fff47214ada2164d2d8d6f24f642e7fbf095942317,2024-04-10T19:49:51.183000 +CVE-2021-47201,0,1,4ecb0323658df5410ee86f3465a1023de5d5665e82bc9ffb9eef05cd33a2af2c,2024-04-10T19:49:51.183000 +CVE-2021-47202,0,1,7e190d71611197dec80495749d11e529a7a6988961cb50acfd80f4687e6e55dc,2024-04-10T19:49:51.183000 +CVE-2021-47203,0,1,23c27c76334cd4c4b6cba85fe89a744ba238a3da47a2fe43c5178adf1d18019c,2024-04-10T19:49:51.183000 +CVE-2021-47204,0,1,e926148d5e172447f63aa098cc114a0fa79e16148df0dc996c83b4998288478f,2024-04-10T19:49:51.183000 +CVE-2021-47205,0,1,4a60f1f8fddc73c81ffb1673599dd68d3bc9925a273ae2005cf510651ed2f457,2024-04-10T19:49:51.183000 +CVE-2021-47206,0,1,8dcfa5eacf0d08af68569dd1967e16d6cf9958fc394fdbe4e6a11969918c66ac,2024-04-10T19:49:51.183000 +CVE-2021-47207,0,1,c4fc999e231cc6c7de2f67ba17acfe9a9a2e6e8475f43ced0f8201ba05c30bc0,2024-04-10T19:49:51.183000 CVE-2021-47208,0,0,681e8169d31fdacb18c0c582935470c91360716eba4055dcd00f7eb49b3f0da8,2024-08-16T20:35:03.110000 -CVE-2021-47209,0,0,e3847710c348396bd30a4d7cba82706bec93ca96ee19fc3abbb4fd7c71afef8c,2024-04-10T19:49:51.183000 -CVE-2021-47210,0,0,e88e4324585763cffbe3f0951982c47df03e5cc102b809d6911a274b3f46ae92,2024-04-10T19:49:51.183000 -CVE-2021-47211,0,0,2e57660448d747c535fbc1d311d2960bd10cc808deec79cd554152c15274a9ce,2024-04-10T19:49:51.183000 -CVE-2021-47212,0,0,3d0f0b779dd57603690674f95c63d46936055a4e53515921355bc30478c371c5,2024-04-10T19:49:51.183000 +CVE-2021-47209,0,1,93abed8eecf3345439e1176187bc021df8890332666237b5c165e8b5e848c954,2024-04-10T19:49:51.183000 +CVE-2021-47210,0,1,268dd79ce9baa6bef3ec896f2e2b2b683e7b93d831116c4a746cccc0af4f7b4f,2024-04-10T19:49:51.183000 +CVE-2021-47211,0,1,c7b92855ce9e8ccc72173b281adc509d125dd7f1e544ad10af7217b3ec291be4,2024-04-10T19:49:51.183000 +CVE-2021-47212,0,1,65a8aa2ad898613cf85edf69e8e4d18a7e629ca4ae68dd6d53ca97b03aa2a906,2024-04-10T19:49:51.183000 CVE-2021-47213,0,0,245ac7a9225a365f5c662ae6caf0adb8cd59aebebb5b4d7c789ce306b6d785a3,2024-04-15T09:15:07.570000 -CVE-2021-47214,0,0,a3a6a3645e61da070f6afea8645d5ffc5de8e480ba0ad65ca81550cde634c575,2024-04-10T19:49:51.183000 -CVE-2021-47215,0,0,c77c6875a82f0a02db4e09650d319a6d5f19c00e93d127c3800dc3febc33ceaf,2024-04-10T19:49:51.183000 -CVE-2021-47216,0,0,10dc3885d7ef5e71efae3373bef0ea2f284f16713172c07b2e1b33101ffff3bc,2024-04-10T19:49:51.183000 -CVE-2021-47217,0,0,f9117c57c5e1950e2d8542c8254f26cf579d6b03be469d87a167a35a80e0fddd,2024-04-10T19:49:51.183000 -CVE-2021-47218,0,0,22075cbb65309b9d698e1a98909423bf898efee62e8dc49312c690d61b734160,2024-04-10T19:49:51.183000 -CVE-2021-47219,0,0,19da26c857306867074db0db7c68658d1da8f13810e8ea48aed77d09a9210b4a,2024-04-10T19:49:51.183000 +CVE-2021-47214,0,1,9e4589d05eab775ca16de23d24bbe9bcf98316c40fabbc519d172e155fe0782c,2024-04-10T19:49:51.183000 +CVE-2021-47215,0,1,4d02f9e90f429377abd872a1d744cbe86a091bb972eefc517e267880b7d20551,2024-04-10T19:49:51.183000 +CVE-2021-47216,0,1,9840182ba003f4fc36b9f4d4b5400b4dfb447682bdb46eca63131177fb95afea,2024-04-10T19:49:51.183000 +CVE-2021-47217,0,1,c3112df9b13bd4724f9b64d4d051e4f00483fecb5607f0bc08c29ef9d004b4e1,2024-04-10T19:49:51.183000 +CVE-2021-47218,0,1,02169de421b5e436db75c943febbf3af7dc9721ce452c42877494d77c26bd7d2,2024-04-10T19:49:51.183000 +CVE-2021-47219,0,1,1dc0732aa4c074c43d7f28c548c37a13295e26adb7c39e8455f2a8294c9f99fe,2024-04-10T19:49:51.183000 CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd809,2024-10-03T15:15:13.703000 CVE-2021-47221,0,0,be4fba76a1b024c941c507f7c354bd8197d5a0317f4df6b315ba3d46d2ffbdb5,2024-05-21T16:54:26.047000 CVE-2021-47222,0,0,3f9a21db77caf7d70e1c4613a3e366cdfeb41cdf8308383b2302e318a16fa064,2024-05-21T16:54:26.047000 @@ -214844,7 +214844,7 @@ CVE-2023-20567,0,0,737f5161cf91a5add25eb0276003caf163e88c1199a1954d887ee5909b2f1 CVE-2023-20568,0,0,bb80f77183dbd7ce3176bf50451c82e5cd0373ba4bf2fefe8814bfaa061acf2c,2023-11-27T18:53:14.427000 CVE-2023-20569,0,0,71c8b6b9daeabc86316ac12c92b9b42c1e889906ccc8570b346ac27a8880e65a,2024-06-10T17:16:10.570000 CVE-2023-2057,0,0,165de0432b11bd80f63253d5d39a7d757e7675722f3efa39f94976905406f4df,2024-05-17T02:22:37.670000 -CVE-2023-20570,0,0,dfe48ab7be186e12e0df2907f1611ee83f54971ec11802e508a83413b0802d12,2024-02-13T18:23:02.393000 +CVE-2023-20570,0,1,f442264cde63ffdc6cdf396cbca136722e08b7f0ebb15dc96f1d9bf20e25e816,2024-02-13T18:23:02.393000 CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000 CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000 CVE-2023-20575,0,0,2e65bf0d5b77958c50a50d7734bf1302e45afedfe49795c175183e4bccf178d7,2023-07-19T18:32:04.807000 @@ -218855,7 +218855,7 @@ CVE-2023-25185,0,0,1135c662e57f51c34416e024b4987aa850e5741deacd604b74a870538bfd2 CVE-2023-25186,0,0,84fdf198fca54d82274bf23f7a19407034d6d7950ada02a9b488f31cf7adb57c,2023-07-05T15:48:07.843000 CVE-2023-25187,0,0,e89bd4fa4c1c86879c04daf0b42f122bc213686f65f5bd42b68cf2726238ff4f,2023-06-29T19:17:48.053000 CVE-2023-25188,0,0,99a89a05ad15ad65c3e7bcd487b49199dddb071e95c006fb1db1eae71d2117f6,2023-06-30T16:10:18.383000 -CVE-2023-25189,0,0,a6a0a0369b47aa6c0dc94f3935d0ef8a420315847bc80e1b5ff79edb997a40f0,2024-09-26T13:32:02.803000 +CVE-2023-25189,0,1,bd30d48be47051d80e37d6ea5536ff430181fb5ceea8f06deeb251856c5786e3,2024-09-26T13:32:02.803000 CVE-2023-2519,0,0,8cda41d4e7e8d661e9517bd8596373028e42458752588636e6f9350df8a49a49,2024-05-17T02:23:01.927000 CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11762,2023-02-24T17:51:34.277000 CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000 @@ -219070,7 +219070,7 @@ CVE-2023-25531,0,0,adaf242b30382edcd4491932befbcc0a8511791114df7e960da64404185e3 CVE-2023-25532,0,0,33ab694dc8355e47e89489cbdbef680e933720ff73c752da054ffbebfac651d1,2023-09-22T17:21:00.470000 CVE-2023-25533,0,0,b26caeb3a7aa5f46d26ba5bfe2c53dd401e7b6c2c9669a429b2365000ccef51f,2023-09-22T17:47:22.070000 CVE-2023-25534,0,0,b88d85d8006d2afee949894d15c39707e47c6499750ab9c2e1d2b0b619c94ab1,2023-09-22T17:25:04.093000 -CVE-2023-25535,0,0,ec1f7072d80ad51b1b04e39c26f5a3bd97e6982da33e2d95ef96711c78f4df53,2024-02-14T13:59:35.580000 +CVE-2023-25535,0,1,f4236f1d2d3c4e74982f6b6f4340ab8c48f22811bf33aa3ba8847a867be2d3e9,2024-02-14T13:59:35.580000 CVE-2023-25536,0,0,38d1534e069de29522843be431fa80c2fc34e0886af9c7615c81990a9d4d6eb4,2023-11-07T04:08:59.793000 CVE-2023-25537,0,0,14700aba072b299f7a43329f1c7fd7bcdf831bb513f3c512723748b0ce82b4c4,2023-05-30T21:32:57.250000 CVE-2023-25539,0,0,7fb5682ebb485b73b399119df65bab6f7088659520f641fc59322ddefaf09e49,2023-06-07T13:45:01.660000 @@ -219117,7 +219117,7 @@ CVE-2023-25577,0,0,5ee92e0558fbce9bd773a8afe897565bfdaa982c0f4ad7e71e954409a79ac CVE-2023-25578,0,0,a34c5a3bd74c9feff4c9c3173b48f4aebcbdb41926b496db508268725eb1d80a,2023-11-07T04:09:01.430000 CVE-2023-25579,0,0,a6c9e68a845dd568c2130b08183545a22df0a4df1e1473c0c5450b50e5f8d3f7,2023-03-03T15:09:20.680000 CVE-2023-2558,0,0,b36d9018fbad440af935b7a05f8181b9f5920728ee39953642c99c7cad89beda,2023-11-07T04:12:52.760000 -CVE-2023-25581,0,0,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000 +CVE-2023-25581,0,1,2f307ec38a4fd1b79324cc31396a449b2c79ac4aa94a91e410ac72b56607117d,2024-10-10T16:15:04.923000 CVE-2023-25582,0,0,232d943891f8f503b5ec3e85110e47e18b7fb6075027f0a7fcc0c9807f79fac9,2023-07-12T15:05:19.617000 CVE-2023-25583,0,0,90cb5ae4facc7427ba0ec7a3aba488de3ea49316450585c3a592993efe3ec3d7,2023-07-12T15:18:34.447000 CVE-2023-25584,0,0,28b5e4e1071105b09a7a0fe37c814dcf7b81d264417fa64df5b4f0851185a205,2024-02-23T18:51:09.787000 @@ -220004,7 +220004,7 @@ CVE-2023-26557,0,0,6ceb9df97f905e78eb0cf74c0dfac9c255477f8bcba9936e70c69834ef3d2 CVE-2023-26559,0,0,7144c7ce70a92362705b43611255593f6f4b7b693ca02c130d84d4711d779ed9,2023-04-22T02:05:06.593000 CVE-2023-2656,0,0,de6e3a629e1021beb21e62d6fd7b92d61e8ad49246395f3b1f420dbf028ab74a,2024-05-17T02:23:07.677000 CVE-2023-26560,0,0,f910a3ed247eff66581acc7099551245be65e2e039b8bd41738ed8e3904749c6,2023-05-08T14:16:07.847000 -CVE-2023-26562,0,0,a7c4e70c9b0e1b13a236cceca807f2ef16590e485e97c80614879f0368dc51ea,2024-02-13T18:23:02.393000 +CVE-2023-26562,0,1,e0dbfda6879c0ea22ce3c18d06e8bacad5463a94b9fdd98fef77bb7da6038737,2024-02-13T18:23:02.393000 CVE-2023-26563,0,0,4b577c215fc421399ece2edc739a6d2b39eea3dd1b5bf242b8decfa1d8fc9625,2023-07-26T16:23:15.603000 CVE-2023-26564,0,0,232d8f6ffea0c0586d38553e12a1d1e373276a81ac2b2be9b2eacbe21ab124e5,2023-07-26T13:58:32.947000 CVE-2023-26566,0,0,ae4ea3cf14a7d506042dd39ffbc958f2d012f8a28764a157d6db66e3943cac77,2024-07-03T01:39:39.010000 @@ -221048,7 +221048,7 @@ CVE-2023-28014,0,0,e9527285e1779684b7827d328d7b2a0939f2ce513889fe5afcff451f70169 CVE-2023-28015,0,0,fd2fa96d944cf7263a795762790ca20e9f0dfc22ff5dec06f6e24bfe3a45a540,2023-05-31T17:52:43.060000 CVE-2023-28016,0,0,5e771bf94a23ecc72dc9b17cbd4172aebdcb39e6635c7c46a54bb035f5898f33,2023-07-03T19:17:06.243000 CVE-2023-28017,0,0,e48baa44164852793de78a6b81bda626047ee252d2b4a469bf3ffd7338f36c44,2023-12-12T15:51:51.903000 -CVE-2023-28018,0,0,8cd0a6e250e58c066b55714508faf1bbc81b66ee427c91d1a386f3cdd31b7997,2024-02-13T14:01:49.147000 +CVE-2023-28018,0,1,8e1acb4b1d5a3ed2df449eed4bcddd1a71d3ceb718579368d1da48a821cc2d5f,2024-02-13T14:01:49.147000 CVE-2023-28019,0,0,f6bb18f349755ba3d2ab21159ab78ba8838dfd349cdbe3c031b1cba5f5dab00d,2023-07-27T03:53:40.647000 CVE-2023-2802,0,0,fb41bf1f479860f7a17bb7980c60b61d0bea28d539ad0c4c0cb9f621282175e8,2023-11-07T04:13:21.240000 CVE-2023-28020,0,0,f920894565f4ff367c9ed56f9854dd70650f462a0fc5d8ee1880cd04aa48d06f,2023-07-27T03:56:44.280000 @@ -229653,7 +229653,7 @@ CVE-2023-39244,0,0,3131de97faa088de2ddabd7b85f9da93f521862732a0436b91d2e04245a79 CVE-2023-39245,0,0,36f1f69d547c34b9aef1f539124bf8486b9d41c4052049a756f8b64cd10cd084,2024-02-15T14:28:26.433000 CVE-2023-39246,0,0,292fbfea1cad1b7e6a4efef722f3ce5bf7fec9bf30574fa1ce50e43322c2e100,2023-11-29T19:33:13.640000 CVE-2023-39248,0,0,4ea5e66683954e4c011c3f4bffa2cfdc7406cfc40c4ea683eba0b88db677fc23,2023-12-11T15:33:45.650000 -CVE-2023-39249,0,0,24b19767a0fdcfcb6f197620c37c346a2f1b1b5214128effd05b582d1b6ddd60,2024-02-14T13:59:35.580000 +CVE-2023-39249,0,1,a7c94daaaf4966045db45f2c8833c1c6d9db1dec3850dfb85e272293e3dd52a6,2024-02-14T13:59:35.580000 CVE-2023-39250,0,0,106418befde0944babc6689e43392189ef6bc9e0b641b1b4e0bfda573dde0f71,2023-11-03T19:00:17.957000 CVE-2023-39251,0,0,66904b44b3f2a6e4dba0dd04ddbccf26f5002eaa5cf68db505a42cfaefff57db,2024-02-20T18:50:54.943000 CVE-2023-39252,0,0,de7d8b659962b78ea0a1dbad6b23f4faabfbabf668a8e86ce584321a402c4360,2023-09-23T03:43:14.050000 @@ -231550,8 +231550,8 @@ CVE-2023-41696,0,0,b1483e037b7774d909dab3d5c306ece2791ce69fc99fc5520eb8421fed6cf CVE-2023-41697,0,0,6b60ca3abe4f561749961201385a2e17513e12c00fcae8384ccfa9e549017b89,2023-10-11T20:53:34.343000 CVE-2023-41699,0,0,81dd02c96f09ccdabe1bce021c629d4b14e66954804aa7c4fda2baf808443c28,2023-11-23T03:41:18.107000 CVE-2023-4170,0,0,0b7f6c6f55a44a37818b79e2cd942cea552dfcb31607d7cccb9c34874c3511bd,2024-05-17T02:31:23.517000 -CVE-2023-41703,0,0,d2d2b6009b249806f02e71bf24ba835f35d821e019e185fbb808f7514a0bbdca,2024-02-16T14:15:07.827000 -CVE-2023-41704,0,0,6f62ad9b114260f0698e3603e6eb94d0dec10a4dbee7222c6ff086cd452a8c74,2024-02-16T14:15:07.930000 +CVE-2023-41703,0,1,d6f6f8e27e7ffa448c11df77a03f4c1b2a019fd3a5abf3ca022dec0fa093afa6,2024-02-16T14:15:07.827000 +CVE-2023-41704,0,1,53451c6c5c00969c6dd4d2e640fa127d36cabb84fa1a34ddaa67f69590dbdc04,2024-02-16T14:15:07.930000 CVE-2023-41705,0,0,4858f48406fb22284cd35bb5a41aad100ef2e0e35a12970153ddfeb6343f8cde,2024-02-16T14:15:08.007000 CVE-2023-41706,0,0,6aca8745097a665d61b3002e8a2e6620c066dd24bd9559d556bed93a8c4d49f6,2024-02-16T14:15:08.103000 CVE-2023-41707,0,0,0015a41dc1ff005496fe79c1c2c29bd45ad78be68b7e237f6b5d9ef977f5f170,2024-10-08T20:30:06.967000 @@ -233401,7 +233401,7 @@ CVE-2023-44279,0,0,a06bfcffe8eabcf3cf947881cc23044fe090379b8984ea7066a67790bec67 CVE-2023-4428,0,0,b0093e0ff5d39c0985f7e73d42678910cfad3b639c18eb922a271e83a75f108b,2024-01-31T17:15:16.127000 CVE-2023-44281,0,0,797060be8178bdd0fada3373ae448e14be691ab17088468f1a3a88c978860335,2024-01-30T20:17:50.733000 CVE-2023-44282,0,0,eac2bb9c17b401940c1e0d099e0a855717e673e0d3b3dd9f0e896081506f80f6,2023-11-20T18:59:27.140000 -CVE-2023-44283,0,0,34cf05d1666cd483247f7cb6146c70b7afee8f9fcc66b04e92e79d6615889613,2024-02-14T13:59:35.580000 +CVE-2023-44283,0,1,e9241399c5e2107bd3c8069f97d1e723e5203a172eb589e3e9f6b0f653630a4d,2024-02-14T13:59:35.580000 CVE-2023-44284,0,0,f009b9a01acc612dbe2366a61ec3031c48a737b56400e845d981209d88b666d8,2023-12-27T19:31:19.403000 CVE-2023-44285,0,0,620cca2e845cac080ab97d450c76c7adde9cf1c203cfd348371e3992005d079c,2023-12-27T19:30:58.020000 CVE-2023-44286,0,0,a68128ac40fd6491bfd4c8bef115a267da274de5f55a8a147596f29f9850a464,2023-12-27T19:30:23.780000 @@ -233411,8 +233411,8 @@ CVE-2023-4429,0,0,65a1b5bb22d6c1d935e4bf567daffe62fdd3fd6cded0aa9e6461ca26e5114d CVE-2023-44290,0,0,dc9ba5ff09f70180d0f9553a7e83bcab00d90213abd9c110ec95ea2a59f8b0dd,2023-11-30T05:05:09.157000 CVE-2023-44291,0,0,755e91ad34ed0df611748f9a5d522bdc458dd2c367fa504cd236241e401550f8,2023-12-18T06:15:06.237000 CVE-2023-44292,0,0,fa7690f31e7bbf47a93c195b0408bba9927dd6b51a875c9cb8f2eeca78f44019,2023-11-20T18:48:44.950000 -CVE-2023-44293,0,0,749e908973d88430e381b91b5b641ba0f6b8721dcd177d4bf2832b9e30e2bf78,2024-02-14T13:59:35.580000 -CVE-2023-44294,0,0,2d190bf5f78c328c96182c0f1885ac111850eb96e5fefbba3e376bb9cc32133e,2024-02-14T13:59:35.580000 +CVE-2023-44293,0,1,6cd2b3aaf6c6df6c1e6cb88b36998a067c37fca3616e3d172a6dec77093bad53,2024-02-14T13:59:35.580000 +CVE-2023-44294,0,1,5f3de9d2b3ec65e9c28647892a6ae0192bc6b88790329c979d7de2b2b5d9ed5a,2024-02-14T13:59:35.580000 CVE-2023-44295,0,0,729d17b1485fe34797768efdcf6acbc35b81093d938868935c18f42a24a7fa19,2023-12-11T15:33:19.813000 CVE-2023-44296,0,0,6538936b5d36d1e591c857c1ef6ab045b895da1bedc3af0e4488aa2aed6bf682,2023-11-20T18:58:50.467000 CVE-2023-44297,0,0,ba0cba6ea5b64f6f43b9c420dca98377f46249558984a25f47175dc1df1feddc,2023-12-12T00:55:40.877000 @@ -234228,7 +234228,7 @@ CVE-2023-45689,0,0,9a5b9a98db22284970de2ff416e2cd1edad1e21d097d8ace4303b84796a44 CVE-2023-4569,0,0,13e9ae3e93013b9e6c636e661e6dff661ec6fadcb8975b604839831e7844dbef,2023-11-07T04:22:45.773000 CVE-2023-45690,0,0,d104c837f03f326a5dc9340d00f93c1f83708421d3862c6a386c41589f66c844,2023-10-24T16:45:38.280000 CVE-2023-45696,0,0,49a194b4f2d268a3c97667efd0856c7e293e3b4f2e3a96ae5ba558bf875f66ff,2024-09-05T13:23:21.547000 -CVE-2023-45698,0,0,9480ebb8c05b796b0b5f75bea24f6e57cf4d4e65c4dc1a3e3cf32e3fa8e458a9,2024-02-11T22:29:15.837000 +CVE-2023-45698,0,1,fb08f5a6b9f067e98a1fcef2a2f4216440e7f6044a9af3953ad3612e97324205,2024-02-11T22:29:15.837000 CVE-2023-4570,0,0,f2557c82c9282970bda5ed09f8a2708fcb8bbd71be459586ce4b5914e7684317,2023-10-12T18:38:41.030000 CVE-2023-45700,0,0,99127c98a0922d674dde3a3491990e29c4b23d2db9ad2fd841961a3cb902503e,2024-01-02T16:47:07.460000 CVE-2023-45701,0,0,26c6fbc11c3dcab3e67a2bcdc37fc362d82a66e1003da348e08ed46528afab2b,2024-01-04T20:25:30.933000 @@ -235123,7 +235123,7 @@ CVE-2023-46838,0,0,e55342ec982796174c93d42f4d3441b48151cf088d830e6cc56db632a8572 CVE-2023-46839,0,0,ade13f3f4236efdd37ffe784525b46e44d60393bacb2fa119614ea207b8ebc1e,2024-03-20T13:00:16.367000 CVE-2023-46840,0,0,e2c2a3f07287623c4942310cd62ca252a9987076f8c6ae079ee3034faa28627b,2024-03-20T13:00:16.367000 CVE-2023-46841,0,0,69de2292f7b0165df885056be3cdde071d60eea027dc1314d310f07d8d34f1e0,2024-03-23T03:15:09.740000 -CVE-2023-46842,0,0,a7d856266d9a36b10029e335a0bc5b6e719a96dd30f51cc150f3e46dd591f2ec,2024-05-16T15:44:44.683000 +CVE-2023-46842,0,1,146be54706ee3606fe0d577bb9f29c8faefa1499d8598a34577d5ae58ff57434,2024-05-16T15:44:44.683000 CVE-2023-46845,0,0,48a4a3963c5d9a1075438d9ede53ec2921256cff2ac8df6833bec0acc65592f9,2023-11-15T15:21:57.587000 CVE-2023-46846,0,0,69a664a6c6f758667799ffe9457f8d63a5c7afe1356244c05bfca1140da13c6e,2024-09-16T16:15:05.957000 CVE-2023-46847,0,0,1d30f40e16010cef8fdd91f645fa02270c2625f5e003bdd93f8a5c5cd1588e18,2024-09-16T16:15:06.180000 @@ -236189,7 +236189,7 @@ CVE-2023-48429,0,0,6045906d3e35c514059dfb061cebb55fb58524bc17b428c4078702aec8c2d CVE-2023-4843,0,0,6f57969f71a1b901b3b98016b48a9e1a78c7b65be5fdd7856c07562c0ff632ef,2023-09-12T17:46:21.607000 CVE-2023-48430,0,0,ecc17591bedae5fcefce99105633f0f35ec704b8a767a28bb2e5f85abfc67e48,2023-12-14T19:37:28.207000 CVE-2023-48431,0,0,71b98649d225badb9cdcde54b991593188fba44987feb8602ff9510357c31580,2023-12-14T19:37:00.257000 -CVE-2023-48432,0,0,a424c1b6ef060807b6a38855796972754becb279fb15001952ab0e176818b845,2024-02-13T18:23:02.393000 +CVE-2023-48432,0,1,58800a2ab4108742a79c5ff5343b65d5cd78a23179bb564a8aab5c43b1f76bc9,2024-02-13T18:23:02.393000 CVE-2023-48433,0,0,f07d2c026dcb20ae67c3744ef533725db409e2b1907c61a87ba739012fd5fd99,2023-12-22T20:26:56.720000 CVE-2023-48434,0,0,553f1aa9437f8bb5a37a61e644891bfb600f6909c9f3283706e6318fe806804a,2023-12-22T20:27:13.933000 CVE-2023-4844,0,0,7b1c49bc62aa9b33266f1fc331c2f464cc894eaf5642ebe7b56ed532fc7b16e2,2024-05-17T02:31:49.067000 @@ -236755,7 +236755,7 @@ CVE-2023-49121,0,0,7f6609dd39c89c89ae5c93e593cee1401f675e0572c157e23b6e7ced1e861 CVE-2023-49122,0,0,d8e734daeee48f28a6d99ecd6bca44ce5f00d713bb39e64254fdc30463c2875a,2024-01-10T20:31:25.807000 CVE-2023-49123,0,0,40451805bcb37782ad44f5c9e35423e33ec37ed53239cbde275fbd1c879908f4,2024-01-10T20:31:36.863000 CVE-2023-49124,0,0,3edff898aa85872cc210001996e93bd47e5660c41bcbd55d2bbde32a8b2a1128,2024-01-10T20:29:11.320000 -CVE-2023-49125,0,0,788060c25886d337d33f58be7ea43874f735b850a65a06584bbf6ed270cb6455,2024-05-14T16:15:47.657000 +CVE-2023-49125,0,1,c83725345845d3b2308f0854448d3698ef7cef91a7b36108dc6a0ec88fb58ff4,2024-05-14T16:15:47.657000 CVE-2023-49126,0,0,d5b25733cb5ee528965a91af6913566be6be6b1f67fab18a812c9fc11edeb3cc,2024-01-10T20:28:58.340000 CVE-2023-49127,0,0,b61118ba3a3cc7f71abce832acb3544df621c10a71793be0e501c01600ee5baf,2024-01-10T20:28:49.513000 CVE-2023-49128,0,0,90bf6c07efa71336bb34c7b81d0a12b971fec705ddb5a4d631425450a1b7be7b,2024-01-10T20:28:33.693000 @@ -237513,7 +237513,7 @@ CVE-2023-50232,0,0,66bdbef21a78a46497cb11f327a39805c95ee3f899076092821fa460707f5 CVE-2023-50233,0,0,3066ec04cb6b971806585131eb1136e9f85d144864afb093763730727f4847da,2024-05-03T12:48:41.067000 CVE-2023-50234,0,0,c0d902c28ddc222f75e18bcbb4439cf707d9ba2319b4e95766e810e6b910c204,2024-05-03T12:48:41.067000 CVE-2023-50235,0,0,d5ad21c646f9b3bd628d49412fb2e325aaedabe6f3b70a940505b2654e620a9a,2024-05-03T12:48:41.067000 -CVE-2023-50236,0,0,ded96d983e8e8b080a5fd071c3af159d25a6e9dbcd9c5111d3bdb1736c0bf9f5,2024-05-15T08:15:08.960000 +CVE-2023-50236,0,1,566158d15ce93e55725c4a3d768ebf5db5941e69cb3823a258da6fe22dc370cc,2024-05-15T08:15:08.960000 CVE-2023-50239,0,0,540930db115af7f87134e906befaa7ec7527e7dd0d86de2cbe4d18bccc8927c7,2024-07-11T15:59:15.867000 CVE-2023-5024,0,0,23cad5df56d7a421cc6ab68dd18083bc0c90dedd60d278fa13170416f7ce89bc,2024-05-17T02:32:47.150000 CVE-2023-50240,0,0,a391a9fb3e84952aa075f2a4fc0c9a3c3b63348e45bd3bdfe64f102893df5eb1,2024-07-11T16:05:06.447000 @@ -237805,7 +237805,7 @@ CVE-2023-50804,0,0,39f75e54eac34ee2309659a8b63ea3ce44f3663e0d436459f4acb23eb679f CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000 CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 -CVE-2023-50808,0,0,f28b2b346351a49c0ccf1d31776f56e7dc93352b8a5ef0a215db353f8073b16d,2024-08-19T15:35:01.787000 +CVE-2023-50808,0,1,4d6da3c4abd95d510954086302179e145e8bcbfb95e372a73e4cb5d3416eb83f,2024-08-19T15:35:01.787000 CVE-2023-50809,0,0,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000 CVE-2023-5081,0,0,0e732bce81b0acde4513851a952ca536476787a34e895e3dce2d7f429b7ac3bd,2024-09-16T15:15:15.767000 CVE-2023-50810,0,0,ee660c82097e8ab9c992185745b4404dffd149b82690962a0ed8a0cb829c0aef,2024-08-23T15:35:03.107000 @@ -238934,10 +238934,10 @@ CVE-2023-52424,0,0,dd00ce5bd5f0127edc0f085308e3c4c575aeaa945754c66a530759a6f3d06 CVE-2023-52425,0,0,3cdfdc314fa83fb5af809d9132a0994bcdd918d186b1c4985a8cb6aee50ffac5,2024-08-26T20:35:10.427000 CVE-2023-52426,0,0,5acfd7432cf1ea71a30546485e308068720bd35fb8a9c9072c82d0c9714337d5,2024-03-07T17:15:11.893000 CVE-2023-52427,0,0,0a54450b6cf413ae3e0cd14ca73a4997d322ba669f6ff28b106bdd9dadc652f1,2024-08-02T23:16:18.710000 -CVE-2023-52428,0,0,f485dd47223a937106c5120337f6b415d4ce17ae115e9ef151904330ec8e61b9,2024-02-11T22:29:15.837000 +CVE-2023-52428,0,1,780a20df5925e099c50682efa6b9b5b9a7581e992635addf027a9478a9c99948,2024-02-11T22:29:15.837000 CVE-2023-52429,0,0,bb71f6867b546918a32b40939aad4a54664a6e064966565e92e979c5b5823dd4,2024-06-27T12:15:13.797000 CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700c3,2023-11-08T18:40:41.847000 -CVE-2023-52430,0,0,a4e3e321821a6042ad492f5c6461a380630f4b1f657a8a739aae32c4c64a6de1,2024-02-13T14:01:49.147000 +CVE-2023-52430,0,1,b4d094e234634baccb6573b9549623bf267a56f0333e94c03e9a66a8c1ebd247,2024-02-13T14:01:49.147000 CVE-2023-52431,0,0,199f10747613e848b4be76ff988b9f76b50282c6e59f2e5da91f811ef18a5901,2024-08-01T18:35:05.050000 CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000 @@ -240456,8 +240456,8 @@ CVE-2023-6356,0,0,05e3330ba5f0acee35130946aa91e8883229df829af9d1b413f3ea04e00b8c CVE-2023-6357,0,0,922aa33d69dfb57ab51adf02ab0b79ba8972c33eecc3f54e7b4cba6ee2b4cf0a,2023-12-11T20:49:14.117000 CVE-2023-6359,0,0,dc4b31625771af30b850afd13facd80e96ad5b76727dda84977b54cd8dc4afd1,2023-11-30T20:36:00.537000 CVE-2023-6360,0,0,7ebf7a0996aa604ca0e37b1bb629610295b5e95328fe4cc64d0814601832e864,2023-12-06T00:38:20.297000 -CVE-2023-6361,0,0,59296c6bcef7fc1d55efba657746e90f73e464432627b8c6fe192c8dc76e9eba,2024-10-07T17:47:48.410000 -CVE-2023-6362,0,0,601377582c691823d9583aede7caf81e89af809eff57e5098fe9e4eb14fe68f9,2024-10-07T17:47:48.410000 +CVE-2023-6361,0,1,ee900d0ce76697bb59e695ff10ea4bef0771a3dfdb43509bf5623d1c20a8d15c,2024-10-07T17:47:48.410000 +CVE-2023-6362,0,1,952f92f7ee9c9218f22bb36f646b048cbe71b70d0278457c0315e26fc4a1ce45,2024-10-07T17:47:48.410000 CVE-2023-6363,0,0,280f7fd322588c4a8af5263265a4a7e3ed4a2ebc1337e66c7614bdfc34527529,2024-05-03T14:17:53.690000 CVE-2023-6364,0,0,fba4607731a6fbc78b4193d2d92ff3c3c10642250022df3b4c2b27e59e7cabbd,2023-12-19T15:25:57.190000 CVE-2023-6365,0,0,adfc971ce1542cf6b6b567819af477b3d1939f8ac3b728778258d524fc18b9de,2023-12-19T16:52:31.667000 @@ -241238,7 +241238,7 @@ CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d078 CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 -CVE-2023-7260,0,0,a283d80bfb35f6dd126dbb811c8254dc2cb2d619c2a0fdb098a89d48e2a7bedf,2024-08-23T16:18:28.547000 +CVE-2023-7260,0,1,35ca28d322ddb3cec2b6f685cf55f84e63f8dd8597ea20f0a701ece3d6e0c72d,2024-08-23T16:18:28.547000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000 @@ -241423,7 +241423,7 @@ CVE-2024-0225,0,0,0b77a69c95a19bcdfe05ed5df4808097a36664f7ca815d26c3857bfe772d94 CVE-2024-0226,0,0,e707d4aa495a869f79289c3f4b58fd576da35074608e712de021d3ce83f005b2,2024-08-30T19:15:15.420000 CVE-2024-0227,0,0,a4e84e1b9f9ff8bb72dc26c9ff00c9b99f09150a51fa56e523e138aad08ff049,2024-03-18T14:15:07.283000 CVE-2024-0228,0,0,fd96fc161d3d60477c711a5fbf3929339bbdfc61029c2327b7af9a111ceab709,2024-01-09T17:15:12.223000 -CVE-2024-0229,0,0,6602b8ec5feb6956074bc84551508bf34334ccf644b16f57e9c8158e1fe1529f,2024-05-22T17:16:11.003000 +CVE-2024-0229,0,1,0c4d94a509251e66deeacdbac20cc088953aeea4e819d0a5ae0635cf311dd51e,2024-05-22T17:16:11.003000 CVE-2024-0230,0,0,24d638afd0420bef6a46df36ab91db6a8f8e82d99d85e08e0b6837b09034d463,2024-01-19T18:35:52.493000 CVE-2024-0231,0,0,d80a1c6fdad986c34ca88f080ac6103160028c174e05f2a79da18342eb92dd35,2024-09-11T15:35:27.340000 CVE-2024-0232,0,0,5f864010f1c8ba6fc12320f87c6edea78c6f5462e03dddf03718f13c882876e3,2024-09-28T04:15:07.230000 @@ -242222,9 +242222,9 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000 CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000 -CVE-2024-1082,0,0,09a4989cf45c3df6361b6cf5b3b923f03dd7f9867b7a047bb2265d621ecc8405,2024-02-13T19:45:42.327000 +CVE-2024-1082,0,1,4cbe782077948b6c52d606b2b6331eda45e7e5a51605ac55ea9924a6b0daf41a,2024-02-13T19:45:42.327000 CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000 -CVE-2024-1084,0,0,1073fda5280ea4306b2338416404e3b8a1bde158fd7cb0081250693fc0ba6bfa,2024-02-13T19:45:42.327000 +CVE-2024-1084,0,1,2a72b6d4c72d3f1464d06f8dd64cdaa356e29b97910203b0257644ec23f38f49,2024-02-13T19:45:42.327000 CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000 CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 @@ -242297,7 +242297,7 @@ CVE-2024-1159,0,0,6093cf6c5c8fc4abf001ccc0f4d05ab0de1f6859d26926dcd40937cbf24b91 CVE-2024-1160,0,0,895b8a1484864a7446dc0dad2cc1b1d7457042a73872ab53e023b0e471ba9cb5,2024-10-09T13:30:12.563000 CVE-2024-1161,0,0,17300377fb9940d2e98cf1b56279a3b48a0607eeac56262a31a73cab7a59f6ad,2024-06-06T13:57:52.483000 CVE-2024-1162,0,0,6517ec14e6db831ee5a33abab5e0e4729a77c306548683589462e3183aa8cdb4,2024-02-08T14:22:37.180000 -CVE-2024-1163,0,0,d0a6d153d36541940bea220e9031817bbcaed2e39b0e0502d4dc42ede6371f01,2024-02-29T15:15:07.473000 +CVE-2024-1163,0,1,7e72fde483b78157ac77e6f04a0826983a36f135938723ebc4303a7c4689b660,2024-02-29T15:15:07.473000 CVE-2024-1164,0,0,ccdaeeda02ae302b7582e035c96145e342a579b2b0fb5245fe0e2c3517f4c5b6,2024-06-11T17:14:02.340000 CVE-2024-1165,0,0,4c65f8011ae90263b8016fe4b3c081ae16e06c35df8b6a0c8887bb2b34e5f4fb,2024-02-26T16:32:25.577000 CVE-2024-1166,0,0,e6f9663f509e717e386eabd295ead584e97c6f7c2909c3dbf464a147e80eca1c,2024-05-14T16:13:02.773000 @@ -242434,7 +242434,7 @@ CVE-2024-1305,0,0,65858d129fc4ee759c91a88e76f4584235168d0dbc78dc30f252eb16188817 CVE-2024-1306,0,0,5038dec5b2b173fda32e156dbbbc3ae1d9583b59a01ca29d58b469ec10627dfd,2024-08-09T20:35:02.627000 CVE-2024-1307,0,0,aef0ff1cfd8369bf21c4d4841fc06befe7d2ed62374aca7af4bc603f7fdf8c25,2024-08-09T19:35:03.493000 CVE-2024-1308,0,0,c14a9657c393471f82c6c22e0d4901de242d02818d63ca3e23260797d16563c6,2024-04-10T13:24:00.070000 -CVE-2024-1309,0,0,a8d45399ab4dce4f2124b0e68ecb3fd667933521fe9810bf835ac2b54af5b4f6,2024-04-18T21:15:07.060000 +CVE-2024-1309,0,1,1ff97c884fd33ed7b0eafdc39bbc06be7a9fbc1deeda8f495ac8f8ee77206a31,2024-04-18T21:15:07.060000 CVE-2024-1310,0,0,0f224a4363799495ea41f70cff3a28c33e1101424c9cbdf7731e2080a04d7f4e,2024-04-15T13:15:31.997000 CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15d2,2024-03-13T18:16:18.563000 CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000 @@ -242556,7 +242556,7 @@ CVE-2024-1428,0,0,3cc3b1a9efed5e9bd932f5f4b32240359ff16f5465557beabc74530c2a820d CVE-2024-1429,0,0,e6662f9b0f545f55c7ee8bcb23a23604a89d336e239381f2a1bde6ff8a245229,2024-04-18T13:04:28.900000 CVE-2024-1430,0,0,5f572c70d25522d061e4003dc5db707a19ced2389745e1d9c2e010c648602583,2024-08-25T06:15:03.247000 CVE-2024-1431,0,0,dffeae7ac141470af7be0b2328a469b677a187755a6f5b33a0e207b69e8951ff,2024-05-17T02:35:26.750000 -CVE-2024-1432,0,0,c5cced34d488ad6451a389f4ef94ad47e3a692cf248f0465497b6f18a4764cd4,2024-08-01T19:15:36.183000 +CVE-2024-1432,0,1,3c99b60b37af4556508bf6a1e692569e652b77b01969c8362ded8c4e7d9df07a,2024-08-01T19:15:36.183000 CVE-2024-1433,0,0,503a018f7e508b949fa5ae2c0e1e3e22da9064184ebb2ea7c4936c65441a3c5e,2024-09-05T14:00:21.660000 CVE-2024-1434,0,0,8f4b723cc8bcc253e7abca4c3ce372412b89e93a6da0e1178f0b19732a73b539,2024-02-29T13:49:29.390000 CVE-2024-1435,0,0,fbebcdb94898a9ad3a34bddb8b900855d9e93e435e1b0c1e93fc82b26df0f7eb,2024-02-29T13:49:29.390000 @@ -242577,7 +242577,7 @@ CVE-2024-1450,0,0,5c78ee7ecaa738b41245290c13db435007588e4f06193084183217b1157cb9 CVE-2024-1451,0,0,06be5f5604355f77fabf82dd57df1f8809446c587ecb10ad9e69cebf8ec03e7a,2024-03-04T20:12:59.223000 CVE-2024-1452,0,0,e53b6badbfb961b470f92bd813c19b81fa9530e5a4fab209b8360590eeab9b44,2024-03-13T18:15:58.530000 CVE-2024-1453,0,0,4c7fdd77bf9774c0b4902debd5fbb9a5a455811c9e20dd37093901421ad05d83,2024-03-01T22:22:25.913000 -CVE-2024-1454,0,0,de26dc8df40f576066c6c923b2efe16ed0450024c75c0ff05447756d8a8a1949,2024-03-23T03:15:10.633000 +CVE-2024-1454,0,1,9c1d9da7cb6e13542db5ad8fde7cf11a522dc964e325e6c58d4572b66e6a68c8,2024-03-23T03:15:10.633000 CVE-2024-1455,0,0,150cf04553026c6d927055f564987fc57df0c743f9421c15918b44f92d1a260f,2024-04-16T12:15:09.230000 CVE-2024-1456,0,0,5b0bf210be135d03b9e0f0aa4d44e1d74b665ecf3cd8074dce271769fca228b4,2024-04-16T13:24:07.103000 CVE-2024-1458,0,0,3592b3461bffe67c8c4bc63c3d6ff327fca1737b7c0b5caa3c39b57cb625a124,2024-04-10T13:24:00.070000 @@ -242630,13 +242630,13 @@ CVE-2024-1506,0,0,32c7970c1492f82f23cd4d2cfded2b513f6664ac7535652d046411dbd67977 CVE-2024-1507,0,0,08e2c1dac04ee8152ddd2f7c9ea5fef316ad0848b30c6b2b33f299d0385631ab,2024-03-13T14:28:45.217000 CVE-2024-1508,0,0,8f9902feebfd3973a9cd8cd00261aee82c04bcff511abc7a7b7dd24142ffb698,2024-03-13T14:28:45.217000 CVE-2024-1510,0,0,7c0789a50b3955293fa97e2b57967ae835af218b56dd119d6f90083bc4730575,2024-02-20T19:50:53.960000 -CVE-2024-1511,0,0,592b13d832a82c0a8619b281e09a4102a5e64c0d60939900549b991f3a1fa133,2024-04-10T19:49:51.183000 +CVE-2024-1511,0,1,c2781be4be5a59d692e4b5391019c8758a2623c9f8e9670f8ff672a499b13d9a,2024-04-10T19:49:51.183000 CVE-2024-1512,0,0,7be310bc5fec4ed549698fcc90c3bd0c0c8353285deffa779aa62c7479d2b7c4,2024-02-20T19:50:53.960000 CVE-2024-1514,0,0,37fb2c6cbdce13b88896a21c452caef80f4fcc7f0138cc62d78c79a6de8a5a22,2024-02-28T14:06:45.783000 CVE-2024-1515,0,0,a3add1da137a72880095a1615a74b53662a1751b21dec935a7c4b7d184dd4113,2024-02-16T18:15:07.820000 CVE-2024-1516,0,0,7af2d52467bbfc9083e8e8d459004298b8aa2b29c6f51f158ddd2f5d1c5fa851,2024-02-28T14:06:45.783000 CVE-2024-1519,0,0,d746e3d56133500e804a2cc0ba2f06a4d4d555cc25b35e386bd4e1e70e758488,2024-02-29T13:49:29.390000 -CVE-2024-1520,0,0,5a55c4260ac606cf600611d613bc265d38f5f81e86d0d5a4c702cc0557dacc1f,2024-04-10T19:49:51.183000 +CVE-2024-1520,0,1,b3b54642425c6e3cb832ea17b290b773139045c68deaa72ea8c1d13f5f9c80e9,2024-04-10T19:49:51.183000 CVE-2024-1521,0,0,f3ac5841a4f7af94c1814f598d4f8cd374fadf367e3de4c03c87f4e2c2dda538,2024-03-27T12:29:30.307000 CVE-2024-1522,0,0,17922a92a5922923ca4d9387b050df530da934a91fd324679759cb30a83cac28,2024-04-16T12:15:09.357000 CVE-2024-1523,0,0,dd67699c81a509129afe035509d12c377971c010cf3aebe3fc0eb68e6aef73aa,2024-02-15T06:23:39.303000 @@ -242711,9 +242711,9 @@ CVE-2024-1596,0,0,59205cd7351da2a043ce02723c8c392274bc7228294ac7f4eb315486a1d727 CVE-2024-1597,0,0,7fe085f18ee300977ad98b9e940c6bb1487dd3b68d0da4c638910b015bf97959,2024-06-10T17:16:17.200000 CVE-2024-1598,0,0,53d65181c5dfe1c31bf5402ab568020e4bee791aaf0f23781c0a55de69756e2c,2024-07-03T01:45:24.367000 CVE-2024-1599,0,0,105f658bdb5d4f55673b9a4a91d4766e7759683398ba430d2b081d80ef821d99,2024-06-07T11:15:53.177000 -CVE-2024-1600,0,0,361b3dac683b3a5ac546d616c21e4dc0f349290759dbe747906d2ebdb44b8fe2,2024-04-10T19:49:51.183000 +CVE-2024-1600,0,1,5f34f7f6c22a1982e69f24b8f44974e7c07d3492cddb6028e9008465fa2ed522,2024-04-10T19:49:51.183000 CVE-2024-1601,0,0,83cf4a8caabcc81e351705b7638f02b9b11f8845346f643cabf4d0eb108d61fe,2024-04-16T13:24:07.103000 -CVE-2024-1602,0,0,424c7946b86609c0593c4ee4eb3ca817d37faadfd2bd290c5bce24c66955d72e,2024-04-10T19:49:51.183000 +CVE-2024-1602,0,1,01210905beed596ca4235d43a7d42bf69fd05b8fc45dc15d0a7e8cb25d7c89d9,2024-04-10T19:49:51.183000 CVE-2024-1603,0,0,7560f4eb0fe2f104ec0cc7868f6032f1be714ae3fffcb6babc4d2b97acd948b5,2024-03-25T01:51:01.223000 CVE-2024-1604,0,0,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000 CVE-2024-1605,0,0,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000 @@ -242725,7 +242725,7 @@ CVE-2024-1621,0,0,f72fbaaec7e0e297032feb4455487f765c7a29f0ecb2e26a4420d588cf303e CVE-2024-1622,0,0,90a7ac12e644da856fef8a87eb083c29b5cbc6ef54024c4fa075b222ca54bc89,2024-03-23T03:15:10.947000 CVE-2024-1623,0,0,3ba11c4b97908f2b99dcf57078312ab0e09d7a907a83f42f8c58a9ed7ccc2585,2024-03-14T14:21:20.217000 CVE-2024-1624,0,0,be6a9a69a944e9dd61590c16d7893d842fe68943f296187e7945d7ce86481789,2024-03-01T22:22:25.913000 -CVE-2024-1625,0,0,04a4d1bb779d8bfe5829876d1a536554b2ed2b37480e5dcf37d4247b06901301,2024-04-10T19:49:51.183000 +CVE-2024-1625,0,1,d8f0b6105cfbaab3db0e91a73a6566c5cf5a9b940d1abf31b6ffb570f55b51b3,2024-04-10T19:49:51.183000 CVE-2024-1626,0,0,2847bf1602852584347edf9c459c79b40d0d6525d6ffd04982f80b99105fd926,2024-04-16T13:24:07.103000 CVE-2024-1628,0,0,5f601746221ed4a5b4a043fb35cc381813b6d71cd4c402c5ab5b14402c7a74cd,2024-05-14T19:18:31.490000 CVE-2024-1629,0,0,8e9af323f9c7776647de11f7788ea7f76cbbdde516b7f67e5f82ccf6bb181756,2024-05-14T19:17:55.627000 @@ -242742,7 +242742,7 @@ CVE-2024-1639,0,0,ae53f56bf768c7e12552c49e9afa22b76830227b0170cf2a4041d068c5be95 CVE-2024-1640,0,0,21fdc4eb3bb9bfbf09bd823a03935d7f51267eee8edd836e21635f9c6ad2fab9,2024-03-13T18:15:58.530000 CVE-2024-1641,0,0,c8f3c480394346b02cff4b49dcb275729e5eb5e37cce5c41459fa25d1813563f,2024-04-10T13:23:38.787000 CVE-2024-1642,0,0,986f4950fd67c663fce23e0e2dcb15dde8652ee505bc4b1f967672e35676c80c,2024-03-13T18:15:58.530000 -CVE-2024-1643,0,0,d332265ece18cb7fc4a9d6bbfe9f7faa4033488d14740bb6c31229c4c8297374,2024-04-10T19:49:51.183000 +CVE-2024-1643,0,1,08086867cadf043c1a27ea88a0637cc0ab6bb11f5190a6240443a7710674cf09,2024-04-10T19:49:51.183000 CVE-2024-1644,0,0,e51479763932be74c0a090909ce1c4ded2672894bab2120f703192d1844ce34b,2024-02-20T19:50:53.960000 CVE-2024-1645,0,0,1cdfff0aab01970ecc55564447dcb5589db1b3cb991002324cace185a88c23f6,2024-03-12T12:40:13.500000 CVE-2024-1646,0,0,768d20887204f5326a4324cc713da4ee7030c4eb8558ad43001691cede3f1ebe,2024-04-16T13:24:07.103000 @@ -242834,7 +242834,7 @@ CVE-2024-1736,0,0,0135c1eb1397a994768a81e9e9f4e835fac116fc8b4d5445ab136b9d3489cc CVE-2024-1737,0,0,431ef45da0f4b4670d42afc3c1240d1e4f77449968f30478ad5d3ddba17c5c7f,2024-08-01T13:46:11.850000 CVE-2024-1738,0,0,65086d20a025a8acdbd054263ca4cd14eb5b5ba61d808610c94ef2eec44edd2f,2024-05-15T16:15:09.807000 CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000 -CVE-2024-1740,0,0,974b4647e97273950b6a297affa420d08f59acef309aa37814c6598a456898d5,2024-04-10T19:49:51.183000 +CVE-2024-1740,0,1,4b55d38226d5ebd3f082acc38fe305e54f83be2ec67ba17cba277423f7c2c217,2024-04-10T19:49:51.183000 CVE-2024-1741,0,0,9b90ffeb3b03d37716707b75f2cc4dbd5a37dfb34e59e240c9be2fa85842dcc2,2024-04-15T18:15:09.937000 CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4d4,2024-03-22T12:45:36.130000 CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 @@ -242960,7 +242960,7 @@ CVE-2024-1869,0,0,3998fca9aba65da3032051bba49c4c7fbbed3ad27cf86d29260ce751b65a61 CVE-2024-1870,0,0,9043a976525f352aaa6c3d9729ba890eb6378250a18455d48857378e562c62f9,2024-03-11T01:32:29.610000 CVE-2024-1871,0,0,3febb3fff07b16e51c21f3b87748727e6cb83597ff7d412acb640471d56a308d,2024-05-17T02:35:39.620000 CVE-2024-1872,0,0,aa7a68ee0f5f23cfde15f81a4ee68e0aba9fc68928dc131f7d1904269d9689ce,2024-03-29T12:45:02.937000 -CVE-2024-1873,0,0,0848d663e76ed57fd70ac2152283de2450f8d2ba71699401fbb4b4cf190b20d2,2024-06-07T14:56:05.647000 +CVE-2024-1873,0,1,f263a4f5306a6c00e4089baff2ff7c677aae5fedd4deda225a2c446b8d585908,2024-06-07T14:56:05.647000 CVE-2024-1874,0,0,b3d82a78aae87d3aff2d8730cda3de5c4eb1ff6a7a168fbf4393adaad2eb2b3f,2024-06-13T04:15:16.157000 CVE-2024-1875,0,0,a69a70937681edd3d5184a4fd13b8b71713c44ac42ff9a8634ede759dab371d6,2024-05-17T02:35:39.780000 CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf7847,2024-05-17T02:35:39.867000 @@ -243174,21 +243174,21 @@ CVE-2024-20087,0,0,2f5d7a31aa34aa82f766600cc0380d879410c6c21363c39a9c898fbc9d48e CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac946fe,2024-09-05T14:27:24.840000 CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 -CVE-2024-20090,0,0,1cc27d2d83ce003b6470b40682a3b5da8b80eb4fa000f5267f5143b72241b340,2024-10-07T19:36:41.627000 +CVE-2024-20090,0,1,4e45497335993cbcb94e5c37edb23ae05ad9c55ab9c43e293472287f768ae4a9,2024-10-07T19:36:41.627000 CVE-2024-20091,0,0,95c1cc97fac75de79c119111dadc5f8d3a906b145632a8e99c237ca3d2d7644f,2024-10-10T18:06:38.370000 -CVE-2024-20092,0,0,65830fa876d29f654e9b40a795649bd4c4172565bc9f95b5dcdf288a40258ca8,2024-10-07T19:36:41.920000 +CVE-2024-20092,0,1,f1f97dbb928ed3d603b7de5c63520c3438f0163296077555ee89666a3da4b065,2024-10-07T19:36:41.920000 CVE-2024-20093,0,0,c7a8ea33b5c13e2cfd81c4913c1b2b72f026361290108826cf239c320fb41376,2024-10-10T18:06:57.333000 -CVE-2024-20094,0,0,641953c4feffbce745824ec3b9a68aa2647d59084bfd49f0a36c52974ebad7a5,2024-10-07T19:36:42.200000 +CVE-2024-20094,0,1,87929e09605e462d72382e253988cbb3995987a467386266ec8b464353947aec,2024-10-07T19:36:42.200000 CVE-2024-20095,0,0,d6b4f4b5ca0d1c0ca9fa6a164ccd3e736674879d2a4e467b2ce89e3ecdfc36f1,2024-10-10T18:07:22.267000 CVE-2024-20096,0,0,45d32d93a320f4f6a2e9db75ef5f199b17687f055d814228fc82875df2d4036b,2024-10-10T18:07:38.557000 CVE-2024-20097,0,0,3c6ef07555d661f8c358576e6e89719e982983707258f6bd5a4a5f4d4bf6603e,2024-10-10T18:07:52.507000 -CVE-2024-20098,0,0,ebf7f236d13e88b2602c1ec20190e8c7c5c76c45a773e147ba2db1178f899ee9,2024-10-07T19:36:42.660000 -CVE-2024-20099,0,0,8778aa965d312369cd80f285a091e79f4ec3ef9269eaa2482f6c232a39c7df59,2024-10-07T19:36:42.860000 +CVE-2024-20098,0,1,359ddc4093b04048f3bda94cada9dc84c3718203b0419b3310c6a12f2bfdebf1,2024-10-07T19:36:42.660000 +CVE-2024-20099,0,1,d92c534d3c7f1469286311d35446df24c876aa1a307afa7bc1d008199223ae40,2024-10-07T19:36:42.860000 CVE-2024-2010,0,0,b3d54c217418fe6eaac723aeeab2da7590ea8caf84d69dd0f5d6f2f7fff7952b,2024-10-02T13:52:09.270000 -CVE-2024-20100,0,0,00e7a4eaba0bfed9181372c6367bfb391a030c7a1acbb9963f83a3c62045a172,2024-10-07T19:36:43.050000 -CVE-2024-20101,0,0,ced475548a5bfbc53f04a0c2a5712a0c8bc4d7f836b6e8c5ac4a95d33c15bd60,2024-10-07T19:36:43.247000 +CVE-2024-20100,0,1,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e10a,2024-10-07T19:36:43.050000 +CVE-2024-20101,0,1,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000 CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 -CVE-2024-20103,0,0,ff6d2294295d0dd22c31cf32176b100a255e6abd1ceb31b42b3a8764be05646b,2024-10-07T19:36:43.530000 +CVE-2024-20103,0,1,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 @@ -243232,12 +243232,12 @@ CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000 CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000 CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000 -CVE-2024-20284,0,0,709f3cb69d09f3b634d846af0b80f59fd2c4aaa23e8c655f37fa93b0885ed376,2024-08-29T13:25:27.537000 -CVE-2024-20285,0,0,72fbbaafdb89aa3aff17a6a08109a599a5c5a36fc39ac02c13f5da21e82ffbcd,2024-08-29T13:25:27.537000 -CVE-2024-20286,0,0,14a3316f5238ceda4d300a7ebd223adf7dbdff97303cb3144e58d57417cf28f0,2024-08-29T13:25:27.537000 +CVE-2024-20284,0,1,033e7ff14149110970217453dd686649d89d5aefb2286c446029a9d43a0e5f8c,2024-08-29T13:25:27.537000 +CVE-2024-20285,0,1,fa2020144f661bed9ae9013b6b62c6d65aa439d2f9663a4a298678bee18412b7,2024-08-29T13:25:27.537000 +CVE-2024-20286,0,1,89bfe50e65738449d76a8ae155f254266c5046fef7e55f0644ac17a5ade63aba,2024-08-29T13:25:27.537000 CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000 CVE-2024-20289,0,0,67b207e27b4f7addc83d99ce2a16d9a68d81f19bcf8b318a5e667a8a27d96ef2,2024-08-29T13:25:27.537000 -CVE-2024-2029,0,0,354f931e93072109dced3bc73857c32e7a282fc5266016d20bde6f1070f10b9d,2024-04-10T19:49:51.183000 +CVE-2024-2029,0,1,a382b56e2d9764efda4b6d7c3b8e20dd18832e26c02b52a8a572702baca53793,2024-04-10T19:49:51.183000 CVE-2024-20290,0,0,95fa55047489b4a2ee370988084e137cebac8acab30010c47f69339f30b23cb9,2024-02-15T15:43:27.240000 CVE-2024-20291,0,0,c2ed04ab4eaaddf8b1bcc5dc083481f305536f5151be36cfe21c14f02472ee22,2024-02-29T13:49:29.390000 CVE-2024-20292,0,0,9fda1d46c19c90bac6f8d81c3a2ae5d97f0e489d0e9bdc7810f6ed453d2cc329,2024-03-07T13:52:27.110000 @@ -243291,7 +243291,7 @@ CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657 CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5809,2024-04-03T17:24:18.150000 CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000 CVE-2024-2035,0,0,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000 -CVE-2024-20350,0,0,ce1cacdaf13a845b8d98c0a6a0f4f6a156cfd7f19262d1a8cb538a5177cf3a48,2024-09-26T13:32:02.803000 +CVE-2024-20350,0,1,a12c7038f7859e98d5699951ee7006a12ff1675d76aabb6f00e8b49b9f735c1a,2024-09-26T13:32:02.803000 CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000 CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000 CVE-2024-20354,0,0,2b17296c0b4719e35a35904483c6c06073bfa6005008b3509f848c7bb9f4faf5,2024-03-27T17:48:21.140000 @@ -243318,7 +243318,7 @@ CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a7 CVE-2024-20381,0,0,5afd1f58e322b631892fd0b679ab12e22dc7593190ff9ffdf30dc24fabdc730b,2024-10-08T21:43:28.757000 CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000 CVE-2024-20385,0,0,acb41bb9b0e8de27149b5546043f469887d2173135754c6ef5f9970c450eec9d,2024-10-08T14:22:34.120000 -CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000 +CVE-2024-20389,0,1,9d9dfa82add773af2318fea3c227cdb315f4c8df4ee8e66f868a7095c866fa43,2024-05-16T15:44:44.683000 CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000 CVE-2024-20390,0,0,7596f8a252957b7a86b18b13b44a3f994e7e9bd3a3934d5a22e0cf6b5c4165f3,2024-10-07T17:51:37.197000 CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000 @@ -243390,7 +243390,7 @@ CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b CVE-2024-20490,0,0,35fe5d8ca4a68248677c43c34084b321931d0d2945ab4df4da8782f5e23eb605,2024-10-08T15:15:39.160000 CVE-2024-20491,0,0,a6a1b451f6dda658d800035b80719f5bd0d6502321ff1f094bbee2194c64d03b,2024-10-08T15:55:08.933000 CVE-2024-20492,0,0,2a16b24462714ef70d9e342f3dfc09a86ef4cf713f3ed6d37bd4c4f35d4f0135,2024-10-08T16:07:26.280000 -CVE-2024-20496,0,0,f5b0a0efe19b6b0db008e04fb71a9ea99e46afaadc250932e3e257a3123133bb,2024-09-26T13:32:02.803000 +CVE-2024-20496,0,1,127f60097f974f24aadc62900a388547cdf18c3a62d9e6416696d085e67625df,2024-09-26T13:32:02.803000 CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000 CVE-2024-20498,0,0,f163bbceccccd5135efcc240b318bf6f09c1a57795ce60620399b214d4e300ea,2024-10-08T18:32:54.457000 CVE-2024-20499,0,0,8df98cd44791414f1c8e92e112415d98372b97da89c0163c64b4a0163b39e269,2024-10-08T18:27:16.110000 @@ -243562,13 +243562,13 @@ CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697e CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000 CVE-2024-20784,0,0,c6884bc627ed39cae939efd566f5b968239c6eaef242b82fbe3791e77cdfc6fc,2024-06-14T19:30:15.503000 CVE-2024-20785,0,0,2013df6eaaf2d2be10850161c767601a113a3dcbc6d19bf74fca25fa02ef32fb,2024-08-02T20:17:44.283000 -CVE-2024-20787,0,0,4cc9588a3bb359db9ee6123ebb04758953f680e244104f9acc8268bc1640c1b1,2024-10-10T12:51:56.987000 +CVE-2024-20787,0,1,55a7b12653150fb9b00f96728e96bb1873d0c8904aa06ae99790dd77383702c7,2024-10-10T12:51:56.987000 CVE-2024-20789,0,0,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000 CVE-2024-2079,0,0,f10772ba31d142dba517b938901fc1b75b6b0e63ac1ac474e47c5b00d72243ad,2024-03-14T12:52:16.723000 CVE-2024-20790,0,0,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000 -CVE-2024-20791,0,0,92abf004621866415738accb490ffa897670b25d1da0d09c1386df503b25c235,2024-05-16T13:03:05.353000 -CVE-2024-20792,0,0,bbcbe3e347c35cdbd78689d4241ba7bbcaebaa332d073a09d58f18df55de2fb4,2024-05-16T13:03:05.353000 -CVE-2024-20793,0,0,af9be83b5ef185d84e14e7f39339429b5b48170bf7e6c7a259e576409d3e12ab,2024-05-16T13:03:05.353000 +CVE-2024-20791,0,1,30758adf0bc2f0f37a906cbf437cc58c73eb8c3385f894e41d9f4f5ef41f50b8,2024-05-16T13:03:05.353000 +CVE-2024-20792,0,1,f743a82f55d36974fd9055bf0c833f5b4f50402bf02427344d220e686fedd52f,2024-05-16T13:03:05.353000 +CVE-2024-20793,0,1,79df2b707e1cbc4e53b872f4870eee47d97e91541b8737f8089fe7049103b0ad,2024-05-16T13:03:05.353000 CVE-2024-20794,0,0,009cfcab48094bcf6aabe6ba2b455d8a62e38422e17ebb73b841667a8ce258e2,2024-04-11T12:47:44.137000 CVE-2024-20795,0,0,339aac1d5967def1721b9f2266bf58d280ddf20a2869a78a797eb0f1e5bbfaaf,2024-04-11T12:47:44.137000 CVE-2024-20796,0,0,00526c11ef10ac19e26f1b9fd4dbb5343656ad019ba0153210f3164b00fbb116,2024-04-11T12:47:44.137000 @@ -244013,7 +244013,7 @@ CVE-2024-21311,0,0,b85deee0147897dd9ebd5279d519a41b6e4963ac4ffbf57bda4c41eb441cb CVE-2024-21312,0,0,2058606a20a71dfde8d831c290e66d0b6931b1f62dffc7b40391ad92886d984f,2024-10-08T16:15:10.870000 CVE-2024-21313,0,0,84d74bba1d9df7b2f90f14577b9a3a7c58e931843118784d67b2917662697de8,2024-05-29T00:15:17.620000 CVE-2024-21314,0,0,6930b57ece6bc92a908dde5d5920ba925f7e2ed0150ccc58bef0688fccd61155,2024-05-29T00:15:17.750000 -CVE-2024-21315,0,0,67a5da33824ecd778f27844365bb36405f00090897685ced69c183058c104553,2024-05-29T00:15:17.893000 +CVE-2024-21315,0,1,14bcca16ab76227761cbfc2ed7ff7c5c380c193f78c8c7e46633f09ed2795333,2024-05-29T00:15:17.893000 CVE-2024-21316,0,0,69af01c31576e26bce13811f71d6458a4139371f21cabf6e3162568d3dc981cd,2024-05-29T00:15:18.863000 CVE-2024-21317,0,0,9a47457ab01fa8e1e2830e4f468779b9aa225518acb5c615f8e6b11aaf08f4fe,2024-07-09T18:18:38.713000 CVE-2024-21318,0,0,4af76d6077d85cc6ac1b2e5fbbea392e5599de7981dc9d0bbea11cee80660ef7,2024-05-29T00:15:18.993000 @@ -244165,7 +244165,7 @@ CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e679 CVE-2024-21452,0,0,9f708d763548b34c7c49c3f0348df362d48fec38e955d6efb9dc3104c88d6865,2024-04-12T09:15:09.877000 CVE-2024-21453,0,0,da605aa15089d99be623e883beeca2f93e21f8fdda0997652a458a217ea7b701,2024-04-12T09:15:09.977000 CVE-2024-21454,0,0,bb3c6f4e967eb55a8c57e103a3dd8be0b010cb457fa764651101d90478af9307,2024-04-12T09:15:10.083000 -CVE-2024-21455,0,0,c84397b82f59d9184ada1960497b1060b45508f814a2f52cd089cfd92ca2a019,2024-10-07T17:47:48.410000 +CVE-2024-21455,0,1,0cbcfb9d4379cf92169db795863490ebee0281e7743e931ccd226c6dd17fa6ac,2024-10-07T17:47:48.410000 CVE-2024-21456,0,0,febed50af5286757c8cac18d43d41c241de675306b4f7eab1cf3e42fd902eaa8,2024-08-21T14:25:32.873000 CVE-2024-21457,0,0,0397b493f3a90fa8856b8c3877d0f328b647dc8423fd236ad4c3272a6eecd90f,2024-07-02T17:49:35.410000 CVE-2024-21458,0,0,f9498022a3fab8a9690b0ccfe79640e4fd1995291accc416b68050d29e4c1e40,2024-07-02T17:57:05.057000 @@ -244202,7 +244202,7 @@ CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad0 CVE-2024-21489,0,0,6e86fec7408d381a4d3031befda9d6c352fa47e8cee94c50201daa0dfff4032f,2024-10-04T13:51:25.567000 CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000 CVE-2024-21490,0,0,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000 -CVE-2024-21491,0,0,1769048d774ec4b234c998b8669c71a35a58efdc743d738c18d816115ffbebfb,2024-03-06T14:15:48.020000 +CVE-2024-21491,0,1,63964727e1fdc972a64d38287aa6ef5a878b19c8b9971dfbb9cf22b94a0f689c,2024-03-06T14:15:48.020000 CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3fc49,2024-02-20T19:50:53.960000 CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000 CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000 @@ -244541,8 +244541,8 @@ CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eed CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000 CVE-2024-2193,0,0,e35708841989612ea53dfb73e293443b1951d4f238ca2a3ae9e5b26b07e3c0b0,2024-05-01T17:15:32.313000 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 -CVE-2024-2195,0,0,71b6416882493846f3b21e9c63773eff99388afd79dee1fd0fb4bb25f159084b,2024-04-10T19:49:51.183000 -CVE-2024-2196,0,0,b24862f05fba5af8d5787cfea966e2cdcdb7f9c1e21e08fde151c06462b0ac98,2024-04-10T19:49:51.183000 +CVE-2024-2195,0,1,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000 +CVE-2024-2196,0,1,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000 CVE-2024-2197,0,0,c0f73e1956ff9edc11d589212e34e54996b4c99f318ed5889f3320f37bab4ded,2024-06-05T23:15:33.943000 CVE-2024-21972,0,0,faeb67500b1dc4ef8f1b7649334b23a7c70f07a8990a8b6dfa5400e248a30e42,2024-04-24T13:39:42.883000 CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373aa9,2024-08-06T16:30:24.547000 @@ -244614,7 +244614,7 @@ CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11 CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000 CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 -CVE-2024-22074,0,0,a1a776748154594eabd5bedbe0254430e590ea44ffb88bfb446bfd71a59f69e3,2024-06-07T14:56:05.647000 +CVE-2024-22074,0,1,56771cd610dd31daee51ec58c4e8819920a60241dac3551d61392e3d2140ff10,2024-06-07T14:56:05.647000 CVE-2024-22075,0,0,a5af4a36684a159511579f89d3ce85206e57c3558ab3a4b37d02f2a846a5e5f1,2024-01-10T15:06:42.563000 CVE-2024-22076,0,0,ad579321d212e2fb374b8124959febe687d1d1197907430ed2ba5046da4cb421,2024-02-22T02:15:49.207000 CVE-2024-22077,0,0,0d574f900f6ba15af6753de47087b404e70b7e744d15c464a0473f8e5a0b02bf,2024-08-03T20:35:03.080000 @@ -244661,12 +244661,12 @@ CVE-2024-22124,0,0,ae727126e60d9cde8ef5e51668c38a883080195512277d1a80e4217d8781f CVE-2024-22125,0,0,45e3a9c2ec5632f05c6eeeb6aeaaf2c6d04ed3da2f62c2fdc1ffee6c0b199240,2024-01-12T19:42:36.637000 CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000 CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000 -CVE-2024-22128,0,0,867f07a0106f89603e780ece7b7a835f530d6c4dbff3b43b95585dfd576bd64e,2024-02-13T14:01:40.577000 -CVE-2024-22129,0,0,f98c249f22037a19179779366a2c80b4076872a899c468771d964e4af4fceb0b,2024-02-13T14:01:40.577000 +CVE-2024-22128,0,1,e822311a5166652c748d7f5c7454ac543482bc9dec92f05602ced23da2b71de6,2024-02-13T14:01:40.577000 +CVE-2024-22129,0,1,ba420a1c14bce7e28ead165e75ccb496644eaa485a531f02f34dbfc27059925d,2024-02-13T14:01:40.577000 CVE-2024-2213,0,0,f67e62c176cc50eea5691c81fd80a750d99ec2626a8cb82c5910f3ff3bb4b956,2024-10-11T15:34:13.917000 -CVE-2024-22130,0,0,5ed0ed7580c6b16e4b4d4465f7bd620f9bc720fd41b6a14f15023a4623d35141,2024-02-13T14:01:40.577000 -CVE-2024-22131,0,0,5d57fdc8574f410d9e8b9e92818f8dc89d84e4b8696d16ecf9571f3e333a1aa5,2024-02-13T14:01:40.577000 -CVE-2024-22132,0,0,54e54d90c1a6eccad4526c21ce60d5380b28635e494938ddcd8287edd9000207,2024-02-13T14:01:40.577000 +CVE-2024-22130,0,1,34095af75712555f9bec25279e5c72484148ae0825a4a0b5c9bc878eb827030f,2024-02-13T14:01:40.577000 +CVE-2024-22131,0,1,308a1550b622eccea8d6d4899fdaaf52b0a22364a168a2ca37daa3143d39a5f0,2024-02-13T14:01:40.577000 +CVE-2024-22132,0,1,125dcad5f4bb53ef2491b560d7ed3e56b9abd0e40721c1e4d5f044afddfb0e04,2024-02-13T14:01:40.577000 CVE-2024-22133,0,0,fd4030d865edb227e19d5ff6fd27e04a8ff5ff7dff516fbab20fe256c1779f6e,2024-03-12T12:40:13.500000 CVE-2024-22134,0,0,2b239bd82844ff03e74318982801c82d566b0fddf549b6e0f4f4282b4b5e0b1b,2024-01-30T17:07:24.310000 CVE-2024-22135,0,0,52831c791b2b0a5e282e425426b22008b4037e94f9edf766ed4cf5b5e07f0424,2024-01-30T17:34:58.917000 @@ -244854,7 +244854,7 @@ CVE-2024-22318,0,0,23961be1d55db1add7e5c07e52a10b572ea2445d12113c47c48e0f1ac8215 CVE-2024-22319,0,0,ea19cdf9e4072a8b9cfc9502b925f062e7b8a96ab088ba79c4019077bc3c20e6,2024-03-21T02:52:02.483000 CVE-2024-2232,0,0,eb55e6d1211c43c7498854b3b8820fe2f01b88d448661718d29c577fdabad9d6,2024-08-07T14:35:01.727000 CVE-2024-22320,0,0,ec85534fc104e628cf2f58dee5a98a0a436bfe75ddbc94f8841f4752e5e01ce2,2024-03-21T02:52:02.607000 -CVE-2024-22326,0,0,f9e48f4b4466a47ef8bf55d6a70dc9c7ddab23673284806d8522afb73292c45c,2024-06-07T14:56:05.647000 +CVE-2024-22326,0,1,b3eaceedec16b8a3de1cf940d604f1e18610d5b396997267a191f16e42ff711e,2024-06-07T14:56:05.647000 CVE-2024-22328,0,0,a39f02e34baf95d793f8f0fc19cf685bee17730011f4e69feb7fe01d897a8992,2024-04-08T18:48:40.217000 CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e28989d,2024-04-17T12:48:07.510000 CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 @@ -244974,7 +244974,7 @@ CVE-2024-22450,0,0,fe403e8a7fd8e390fc32bc73d33734a11d8d75e8e2adff855cffc5954c4b0 CVE-2024-22452,0,0,5a080959ec2d756b184e442711bbcbbb6cb0c52e3b6bc2f798e7179e3dcb554d,2024-03-04T13:58:23.447000 CVE-2024-22453,0,0,f9797fcda68051d8f971de586c04a2c106a15949c4e3d09d430cad58ebd8464f,2024-03-19T13:26:46 CVE-2024-22454,0,0,e9841476327230c5841a8929ea4ecb0ea65558a6dfa68436b83b2a2a5b045860,2024-02-27T17:10:16.097000 -CVE-2024-22455,0,0,e059e23229146c7bf7a0232ea8189cf45ddec45c5adcb89d2cd3ad03037d4af1,2024-02-14T13:59:35.580000 +CVE-2024-22455,0,1,49ee90aeb3441b9afa0da222fc2eb2ca81fc0a9b7d28f158139258f561f862ec,2024-02-14T13:59:35.580000 CVE-2024-22457,0,0,cb04de6dd02e8a0381ffeb293f9eb43c468f190969ea3471927cb046b6407271,2024-03-01T14:04:04.827000 CVE-2024-22458,0,0,a8f3b6bb3f7ce3a09f59dfbc4d2b0db5234bfeb3a6e52235fbee24c30c1d9fe2,2024-03-01T14:04:04.827000 CVE-2024-22459,0,0,cabd1003173ddb6b26c1189dde137f8a2e465bcd34b07ccffe332260e291ed8f,2024-02-28T14:06:45.783000 @@ -245004,8 +245004,8 @@ CVE-2024-22519,0,0,3e82e80c8979a8ae5042490d08d01b21bbb5d33aa5bea2753e8328a66ce7b CVE-2024-2252,0,0,c849364a795ce51dde181f33a6ec30b001d5bdfe5ebad19fe6de9bde29e509e7,2024-03-13T18:15:58.530000 CVE-2024-22520,0,0,57a4a0e95e01ac29a1644bc8dd95e1182aab0ee098645584e77b48608e2ef25f,2024-02-14T19:45:35.337000 CVE-2024-22523,0,0,4d1bedf12f65c21e553a2d1d3b166e89d2d1d69d220c5bbcba3c4d692b00d258,2024-02-05T18:45:22.323000 -CVE-2024-22524,0,0,22d2224dbe7a018b076b80f5c25d98b692b6e6d65af2682d82c9bfb230845a09,2024-06-07T14:56:05.647000 -CVE-2024-22525,0,0,c98d00e2df86bf18090655d340ad08b672b00445bc806eb15a6b726f34c71994,2024-06-07T14:56:05.647000 +CVE-2024-22524,0,1,c687ab2192652ce70e04de4ff70b5d388ad0e3c8527a706745b3a74687bdf98c,2024-06-07T14:56:05.647000 +CVE-2024-22525,0,1,67ade60009abd3eeebfbf6ba3b580fdcbfe57dc1028ca6bbfd14f30c5d89667f,2024-06-07T14:56:05.647000 CVE-2024-22526,0,0,218c7b0985406f5be9160a4eba34edfa9ea3d3e7eea50564dba9ab623f1f5014,2024-04-12T12:43:46.210000 CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba76ad,2024-01-31T18:42:44.573000 CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000 @@ -245149,7 +245149,7 @@ CVE-2024-22871,0,0,63ab5ea037d8258d975db22f8b209c07fd620fb9776c3d0a9a24c80139462 CVE-2024-22873,0,0,3e804664cc070ce55555c4a054f46b8aa2f31d8d94dcc162e42607997d87baae,2024-08-05T21:35:03.423000 CVE-2024-22876,0,0,2b681eac932c151f8b6d70661e354dac90a6846621aa7fbcc62aabd644cf5d8a,2024-01-25T18:19:25.647000 CVE-2024-22877,0,0,240f9475c4adad9f666e1dfbbc8f3731afeed11d7d0ecb60814db8666105f3c3,2024-01-25T17:45:50.770000 -CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88a1,2024-06-07T14:56:05.647000 +CVE-2024-2288,0,1,b4cf18d6ba32e4c36db7cf08af926b27a55ae2af26e8cbac63e8073de65ba6a9,2024-06-07T14:56:05.647000 CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000 CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000 CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000 @@ -245488,16 +245488,16 @@ CVE-2024-23363,0,0,f3bca7930119a168b01a4f3c6a543138a5f31bd5e8f14fd6e950dfaab71bf CVE-2024-23364,0,0,d335bfe8fa3d7a699b93e4031ef9a4b12c2c27a445d90d9a5a233dbae9b9707d,2024-09-03T12:59:02.453000 CVE-2024-23365,0,0,b549beaf46af95806279ede941b0b9df9f8e0ef8f9248b984c743f41e6969a1d,2024-09-03T12:59:02.453000 CVE-2024-23368,0,0,5726397ddc8ddada7ad85b481081c827980e0b31f00843d9c4a575a1cdcf7c17,2024-07-02T17:51:25.690000 -CVE-2024-23369,0,0,3a1f29c17c6d3b086f49c7ccffc85fb969ba906a9fd6ba5311756eb3290b0a84,2024-10-07T17:47:48.410000 +CVE-2024-23369,0,1,c0103c8a46c3acd4c0d6849fe40fd8c68164eefecb2bdeb66cbc7a05ddd77370,2024-10-07T17:47:48.410000 CVE-2024-2337,0,0,07544cbaaf25f2cf04c699ba032dfae130492c60bdcce260485571b3859c104c,2024-07-22T13:00:53.287000 -CVE-2024-23370,0,0,2dfd6c67b83f6b8d51831b74f566eb1473b49bf3ac79cb5ed30156f3db745234,2024-10-07T17:47:48.410000 +CVE-2024-23370,0,1,7073d4c33d21845c43d238d6e8c234015bd9b080f755227d2e54c421d67f87d0,2024-10-07T17:47:48.410000 CVE-2024-23372,0,0,23b270a28eac6f2e33d3cc96090d40d8bd34b2e6172d17ba5be5b87ce6bb3571,2024-07-02T17:51:04.530000 CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa906,2024-07-02T17:50:38.573000 -CVE-2024-23374,0,0,2c95700091974a335fa8134a3078c13b6aa8eb5c47b416d64c501ad79a9aaf87,2024-10-07T17:47:48.410000 -CVE-2024-23375,0,0,31558023ce8d5e26c2e01c90a8928d4f136374d6931990710b86f8ac868b81c0,2024-10-07T17:47:48.410000 -CVE-2024-23376,0,0,1643efa71e62d430d84703d865708ae538b6776cbdd81539aa9ca92b62f9e6a4,2024-10-07T17:47:48.410000 -CVE-2024-23378,0,0,0c1fe34cabe1e93f4c924f8cf0df6642717cdfd953855ad832054f35ba741dbe,2024-10-07T17:47:48.410000 -CVE-2024-23379,0,0,cefa97c5259185cfb3fbb12a93bbdf1ef1e0906361e678edcd02982acb85f7a6,2024-10-07T17:47:48.410000 +CVE-2024-23374,0,1,3b7f0594ca59e4e5a6ad050acea8133c1a6c14c22ef90f3df6934c92c794178e,2024-10-07T17:47:48.410000 +CVE-2024-23375,0,1,21ceeef02534e493a9020906ccab988c70c9a8ba438c31af4f4cbf4a0b3904c9,2024-10-07T17:47:48.410000 +CVE-2024-23376,0,1,209677926ddf6789b0356adf1f5414972576ffda1a3f48177480f90edecf7c1e,2024-10-07T17:47:48.410000 +CVE-2024-23378,0,1,074779fd36c0c374360ef032c239b4ec46fbf2a8aa6e7a5cf4230cc4665c7561,2024-10-07T17:47:48.410000 +CVE-2024-23379,0,1,159d42b25c35a30f04c9effffea4afd1393e6983a3f33ccd1d0177215f28fdd9,2024-10-07T17:47:48.410000 CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000 CVE-2024-23380,0,0,bf0ce83ac3185ab9d5bec787958ddc81b954eccc336ea58dd24a5df8b6433ba9,2024-07-02T17:50:17.873000 CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968126,2024-08-06T16:30:24.547000 @@ -245511,9 +245511,9 @@ CVE-2024-2340,0,0,cd3f970cae9a6915295872d443827f873fdefa8a2c4ea46f6c245b8f1d4974 CVE-2024-2341,0,0,989b52ef3b82d23e75e7667d6d7a338c3c9c5041a47284343ffbd63609dcbd9f,2024-04-10T13:23:38.787000 CVE-2024-2342,0,0,85b00ed3f556783fb258c434e5ca17ef34f0af72bc6f179dcd29ef51864e48ad,2024-04-10T13:23:38.787000 CVE-2024-2343,0,0,55d5bbf173e808ea5d96abe03a0aaa0cd1efc557e506aad4f9e8ae4b28638918,2024-04-10T13:23:38.787000 -CVE-2024-23439,0,0,a73ac33d78fd89c7de9bdcf7899410d8a90f09c3b2a4b57e9832f9ce47bda941,2024-02-13T15:16:05.223000 +CVE-2024-23439,0,1,1d249ee80acbdb4c807b501c6f25225fe8b853878a81431053c9dd355b76e4a3,2024-02-13T15:16:05.223000 CVE-2024-2344,0,0,11b204885a38ce76288439d7d97d1d84c5464a602f99eb484aa99b808d016d43,2024-04-10T13:23:38.787000 -CVE-2024-23440,0,0,888cd3d174129643abdafcbeddc64e6f21d5ae8e2b2e370f6f7b930a90b3e30a,2024-02-13T15:16:05.223000 +CVE-2024-23440,0,1,0ad8876b717d88535a29603e616e87c76b30b2f9608fb785e7b60b5c7d91d235,2024-02-13T15:16:05.223000 CVE-2024-23441,0,0,9c5dca83c16b9bb0dcc1e9e69acca607a575bb56eafd40d60d7d021ac0bb70d5,2024-09-05T23:15:11.830000 CVE-2024-23442,0,0,5f8a68032ea653fbe64c514e7b6426371d76626b34b59cc1abb65dea78329a83,2024-08-07T16:32:00.580000 CVE-2024-23443,0,0,ec52c90b1bdd9302a1feb9cf7a1a344bef4f50d5729b639a22d6f8e35b652893,2024-08-19T19:33:31.207000 @@ -245631,13 +245631,13 @@ CVE-2024-23562,0,0,2238e5f89ffb73e416454504866132c48ce1e441009ffdb7019bfd0c13124 CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000 CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 -CVE-2024-2358,0,0,0ca353146b040adce527451621b2de0180b82568eb0731d510f8a06110783133,2024-05-16T13:03:05.353000 +CVE-2024-2358,0,1,920e126eda2bb8b2a012a15e7d516375e75432456cb0a9df628376b7773b6f18,2024-05-16T13:03:05.353000 CVE-2024-23580,0,0,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000 CVE-2024-23583,0,0,f98c04f8a3f19a919e4cfb4d28d06a64ab798bebf069087ad8f6f94890d95eb5,2024-05-20T13:00:34.807000 CVE-2024-23584,0,0,25f43dde9216afa9143a8cf07755b8e095a8ff52fd4b037e0c34ead99c4a7c82,2024-04-11T01:24:48.327000 CVE-2024-23586,0,0,e4206382e7df5acbc3ee4909b5c9a721999892cd76df40fca8a357be2a4aa16c,2024-10-07T15:30:56.227000 CVE-2024-23588,0,0,616193c58804c0df33f02bbe918628fdff6c0cb92f6852ea08810ac3765e566c,2024-07-08T15:28:10.993000 -CVE-2024-2359,0,0,bea5a27f1890e6b98f8fc3b4cbe7c984687ed5b340caf950afed71935b795710,2024-06-07T14:56:05.647000 +CVE-2024-2359,0,1,da77dd1d1fb9e8186a26cf3b863526060722a22ff272f6fd99442249c5726db1,2024-06-07T14:56:05.647000 CVE-2024-23591,0,0,65ea9c151d9d7befc9470a956acb00d512d494f9281b48487341988483da52d2,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,f4db45b7df227186690b3d790e263099b74eb1bd23d5be604658bff5249e373d,2024-04-08T18:49:25.863000 CVE-2024-23593,0,0,b769409d07b1567757ec72b7cfa17a7cda228a62e52806c62239b600efd08769,2024-04-15T19:12:25.887000 @@ -245645,7 +245645,7 @@ CVE-2024-23594,0,0,ad4b1f64283c5e9378e2c0a3470f94bbd567f24feab77ccac81605c25d540 CVE-2024-23595,0,0,eb244ed27fdfe9d5f180eef50b9fcc5bd2c4254d4c7f82d08d700f503f0c3d15,2024-06-07T19:15:23.570000 CVE-2024-23597,0,0,1044f570b239ea97c7bd0709961e0bc23dacfc3e4d46ca11165f61566b85cd58,2024-07-03T01:47:57.317000 CVE-2024-23599,0,0,836bed461f1eaf1431030dae16d4901e81101826b7f5e3635aba5ab4152750ab,2024-09-16T18:03:16.707000 -CVE-2024-2360,0,0,de893c18178fb566d8af38f41adf3944ceb42b91c7ca132485a1e68a6c60ca3c,2024-06-07T14:56:05.647000 +CVE-2024-2360,0,1,25a042c83955172b4888de531cef2ba72fc498817ffe0173905767da49d44b40,2024-06-07T14:56:05.647000 CVE-2024-23600,0,0,4281e37fbd035293e9c6fcd43e6c5234fa722991aa3b52e2f1f7087ee3894b4e,2024-08-13T17:15:23.107000 CVE-2024-23601,0,0,f71facaf0a87c7e2133a8f4784a8b1538e15e419619de2fb2ecdd5dec5e4df11,2024-06-10T16:15:11.993000 CVE-2024-23603,0,0,4e2bedacaf86e6d28c6fcd5ebf1822683ea4289e242d61b0a3583e9e01c0baa2,2024-02-14T18:04:45.380000 @@ -245655,7 +245655,7 @@ CVE-2024-23606,0,0,c208009da6a506f2cb89bfd3fdf2f90ab6038e888471cbfef093e4e701130 CVE-2024-23607,0,0,d3e5b2cf0208dbd94423f33f1f1d830e5379284a1b054e1dac0f1142dda2bcdb,2024-02-14T18:04:45.380000 CVE-2024-23608,0,0,50dc0674b07e73ec8c46f1968864ab20402f5761f50f996f4b7f041b1d2be763,2024-03-12T12:40:13.500000 CVE-2024-23609,0,0,3b1abf752b3d423bc6f5438ce61f2cd61b2e2a95458e8a7d8eeff140a78cb160,2024-10-10T21:15:04.623000 -CVE-2024-2361,0,0,dcdcbdd2e2dfcbfc5e289c7242a337c223a46cf5b5f53777e6d8d9a1b7d862b7,2024-05-16T13:03:05.353000 +CVE-2024-2361,0,1,101b8b5f8d944b159952520d036ed539246db538f2b192e1296ed4fb3fe477c8,2024-05-16T13:03:05.353000 CVE-2024-23610,0,0,911507017e2d1adda1f4152b49b667ed899063fa3626c265dcd8fbea70e8b461,2024-03-12T12:40:13.500000 CVE-2024-23611,0,0,9602e165d5f6e778bafbe1412b34e6984b52aae9b91c33ef6488637f8a688ffa,2024-03-12T12:40:13.500000 CVE-2024-23612,0,0,235f707bf347b024f46132ff79e6c28397a7c61dd4cb5fc018efb1c522e5dc32,2024-10-10T21:15:04.753000 @@ -245666,7 +245666,7 @@ CVE-2024-23616,0,0,983af7d91112b21be8786ebce91004e2140c0aef8f2f53e6fc34d72cb936c CVE-2024-23617,0,0,3ff0b41d1ce6dc2f8f3bcd80b9598d95f8d7431cbd9bbeb8d399d5142a67309b,2024-01-31T20:29:19.920000 CVE-2024-23618,0,0,75bcfe34859e5b3ccf28dc3fda7ecc9be374bb6196fccf61f4b1db1d8b53ddb2,2024-01-31T21:05:01.817000 CVE-2024-23619,0,0,6eb856205a3ed95fb86523f982e84d4894899d6ba472ba3b42558a5b2aa097d8,2024-01-31T20:29:34.730000 -CVE-2024-2362,0,0,362e08383e1f7d814b24bd6723c3fbf933132f9bd2c6f2fe546bdd4ab13e67bd,2024-06-07T14:56:05.647000 +CVE-2024-2362,0,1,98a3e0d114da5e44dd4c939bb2c3d8518c985a7745b6d8d6fcf5d3df4717fb4a,2024-06-07T14:56:05.647000 CVE-2024-23620,0,0,019f2d75d3f68db56213233bc8d29f1435283796220533a271ce7208b430a2e8,2024-01-31T20:29:50.697000 CVE-2024-23621,0,0,7c8e45b8d6d13280fc22fc636b9c203d1668c6f2fb6bafd2c6fd6bd5a5215e22,2024-01-31T20:30:17.927000 CVE-2024-23622,0,0,6c7d4ed85199938b823700e214ab3f79222aa9d76496a624f2934cfd0e39a935,2024-01-31T20:30:40.207000 @@ -245707,7 +245707,7 @@ CVE-2024-23656,0,0,20fe993862b99786db71d598b727f6c1300b7f6f6562d1b1e5adc84696a35 CVE-2024-23657,0,0,3c3aa05887b7fe323f19a9fa638c5fbf359a00a778a239ba1721b064a63115ff,2024-09-20T12:49:35.743000 CVE-2024-23658,0,0,10beca2216f16f0be3e501bbd136f2857304d574c44e8f95ff0af4b783ec494c,2024-04-08T18:48:40.217000 CVE-2024-23659,0,0,00fc339e96cf90505d259821db8c42ecca98975cfcf7d7475d9e6c3b75152cbd,2024-01-25T14:58:22.470000 -CVE-2024-2366,0,0,490db5028d325a3e3270a4bc51ed933daf1eb90560331895c813986c8416aa30,2024-05-16T13:03:05.353000 +CVE-2024-2366,0,1,31049ec09cfa9dcd306d786caeaabfd24331e03bb5223e5c40fd9c968ff65a0b,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,f59390a3bdd92fda69048aa3822f1db7f5498b44103925e2d96259b145eb2ed1,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,0bd2fe423ff125cd6b426da805efebc9c554fb6e799e24e8d56e6d24f2b3b973,2024-04-10T13:24:22.187000 CVE-2024-23663,0,0,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000 @@ -245810,10 +245810,10 @@ CVE-2024-23774,0,0,96f1ad77f319c324f0206e952eb8a5e51b3f4050682ede7a1754b336a786d CVE-2024-23775,0,0,d05b289b06a7615af0b94026ddc5bf89a590dd9561a606d763b495db019ccae5,2024-02-22T03:15:08.370000 CVE-2024-2378,0,0,6a4e8fed2d7503197289cdafde99f9632548a70d2e9ba95241c6b7588fface73,2024-04-30T17:52:35.057000 CVE-2024-23782,0,0,b576df026e221c023f5fc9cb0cc9770b2deea25f58e953507a39220c06d20733,2024-02-02T15:38:55.017000 -CVE-2024-23783,0,0,2c0409c271891c8b08fc0b86218ac68ee6ac63f922ef98f9f9226ccdf7685fe6,2024-02-14T13:59:35.580000 -CVE-2024-23784,0,0,4ead0c5591846e9c87c142cd846bdd72001bf8674c58560c0ebdae712e566e4b,2024-02-14T13:59:35.580000 -CVE-2024-23785,0,0,b583a59740121c714014d2b1b574a387569e6a96d1cba1ed447b99f7aac2879a,2024-02-14T13:59:35.580000 -CVE-2024-23786,0,0,a4843821edc7301dc3896b1dc41942f9a7cad1c9811616d65b63499b1903e8f5,2024-02-14T13:59:35.580000 +CVE-2024-23783,0,1,a5a5142b10c892b4c0c9809dcf93914e45e84937e2ad9184c70aa5af7fab54ee,2024-02-14T13:59:35.580000 +CVE-2024-23784,0,1,082e434b1c9889dd122c31a178d9de7d645097c2066437cfba67d0640d1c6028,2024-02-14T13:59:35.580000 +CVE-2024-23785,0,1,71fb4c21a358e0e9245f62155a8398c1fe1a4536ef2751d69eff44f30a2602dd,2024-02-14T13:59:35.580000 +CVE-2024-23786,0,1,f233078b8d64bc1abf1bc4b7b4cfec2b06e8a450f8c7ad27c8603e7d79582163,2024-02-14T13:59:35.580000 CVE-2024-23787,0,0,7a8ddce6195bf931c799fcf4083a75cf1b9842febd9c3da44a75515daf822e08,2024-08-13T14:35:10.747000 CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000 CVE-2024-23789,0,0,ebe69de329ce3066ddae75bf202509726e55e928e26b7120b9a03b158a88c139,2024-08-14T19:35:20.280000 @@ -245863,7 +245863,7 @@ CVE-2024-2383,0,0,585ce3a48313228947e40f9e72b94221ce0a7d581a1242a34676aeed0a2812 CVE-2024-23830,0,0,baf51b255b1d611a2691efce00c0d171805679867f73d6b48c17ea5c48d6f748,2024-02-22T19:07:37.840000 CVE-2024-23831,0,0,85dc29d4c69ed89d07f94e734e98d7fea8d9a8dd87844133c4b3378b980f85af,2024-02-10T01:43:51.527000 CVE-2024-23832,0,0,2c53e6677810065a49b3c27a486b6f9b7ab7331e27ed402ea99d5e5d9c4aaa28,2024-02-09T20:21:45.317000 -CVE-2024-23833,0,0,ea75c07f019574eea28a7efb85a86a713873d5aa69b9abf6cf637d146306efca,2024-02-13T14:01:49.147000 +CVE-2024-23833,0,1,76e2eeec18b9a7efa941f339366e05bc007d3cc6ea30ce6bd15ac69bf0e1a3e3,2024-02-13T14:01:49.147000 CVE-2024-23834,0,0,7bcb78c769bf92e6385abfba80a8e69d4ce41b7ac12f11f1ba0cb9b9e44a7dd2,2024-02-08T16:39:31.963000 CVE-2024-23835,0,0,94c2d033bb4cfa04437e702465da1bc359431c2b2f8d4dedfd9b52b779747645,2024-03-07T03:15:06.900000 CVE-2024-23836,0,0,566c6b0dac3daf7d1215901c82bb006ba7d87180faba9e6f293d6e00e23b555f,2024-03-07T03:15:06.987000 @@ -245969,7 +245969,7 @@ CVE-2024-23949,0,0,d63be6e3e978c9edb6d1fe4bcad68dd0f79583cf7cbbc5ceac0568804423b CVE-2024-2395,0,0,37ecce73517ecefe68574d74e2265f3d2a49c15c536980e217743e28f1db87e3,2024-03-13T12:33:51.697000 CVE-2024-23950,0,0,25847234553a7a7aa3af838a477d7b6f4a5c35ccd2e774f811d68e8ce720445a,2024-06-10T17:16:19.833000 CVE-2024-23951,0,0,14a64f857e19fa20b9d905d154185c191d80e1c0b6ed53dd9050b70f076dc813,2024-06-10T17:16:19.930000 -CVE-2024-23952,0,0,34c7e2d5919ffb2785317596bbeb44591446a81e60ca69df2cdc3c3c37179a86,2024-02-14T14:16:07.460000 +CVE-2024-23952,0,1,c62bde987943d1383cebe4f0fdb0238d394e672284aa687375694da35dba4be3,2024-02-14T14:16:07.460000 CVE-2024-23957,0,0,7c4fd530cc0004100320d250894bd14ff813db694fb33bbac699afabb197a501,2024-10-03T17:37:47.743000 CVE-2024-23958,0,0,b21c91a91fedc0497d7c274a6c01d36bbd81b48012382682d2e1a315128b18ab,2024-10-03T17:42:05.553000 CVE-2024-23959,0,0,e94e6dffc2029485c710bb9dd81f9a426fb4fe1a17bb88597906614b867c6965,2024-10-03T17:42:03.650000 @@ -246328,19 +246328,19 @@ CVE-2024-24724,0,0,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9af CVE-2024-24725,0,0,abcdbf333e953117e91fbd719efd3f28f2197c31afd05d1b1f71cb089103575c,2024-08-27T18:35:04.830000 CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 -CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000 +CVE-2024-24739,0,1,fb61bf6f32281c36f8c1e74038a5cd6556a569506b03186f48e1a5e0ce1840cc,2024-02-13T14:01:40.577000 CVE-2024-2474,0,0,533d281c039392b1ada46a52c0b4f0bb4180f10c340d5f76f63e617b17e80e48,2024-03-20T13:00:16.367000 -CVE-2024-24740,0,0,5a0025656e10ede9df3e0999b52fcdfd5a23388b4b1c6503aed4b2448caac40f,2024-09-28T23:15:12.777000 -CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000 -CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000 -CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000 +CVE-2024-24740,0,1,f3833f90a0cfe994e2c22d2b554fc600ed244615ed325dad0c4f67c40477fb80,2024-09-28T23:15:12.777000 +CVE-2024-24741,0,1,4890ced4a403916077d16ba39c71c4b3c52ddd4da6d5e5236539cca3f1ca883a,2024-02-13T14:01:40.577000 +CVE-2024-24742,0,1,4a51b6d1bed538d124974674cc583afaa77815fce0387ecc7ba52420a7d28ffc,2024-02-13T14:01:40.577000 +CVE-2024-24743,0,1,08c0b66d4a5ca6ba5511a9ebb40a57d0d8b91a4309aed10a9cf2a85f1d29e871,2024-02-13T14:01:40.577000 CVE-2024-24746,0,0,40e7bceff1c25e6b9953ddd3810454050ac129de5e60f835bc00a18b7d10c7b8,2024-08-22T14:35:07.450000 CVE-2024-24747,0,0,c7102f6cbbbb54dbf174b4ec9b33188c1d6a88ca038e451e81aa538a223d6e72,2024-02-09T15:18:00.510000 CVE-2024-24748,0,0,5f49ffc2835721d9b1ffe4198862561f4a25b7f09882de4d4811a0ddce7110f1,2024-03-17T22:38:29.433000 CVE-2024-24749,0,0,38d4307753926d528fb1dee6ba588b6843344e7264e3e2eed6b33ca60b1a13c5,2024-07-01T16:37:39.040000 CVE-2024-2475,0,0,4f924b108be38f84eea851dde3df5075c20d33e51bec453dc9c5ba07f9241cb5,2024-03-29T12:45:02.937000 CVE-2024-24750,0,0,10ea1b78c9c505b8c8263974e08444782839fff89d7014d665d1bfbbdd56a566,2024-04-19T07:15:09.330000 -CVE-2024-24751,0,0,4bda98c577a47eda6b8784d1f5db440c4f4f9cb1c2d0d14d13e221c7b9f2361a,2024-02-13T19:45:42.327000 +CVE-2024-24751,0,1,fb13deb5ec034b695d555f186845ebeaddd82eb1fe18867ef0b4f3de01a4992f,2024-02-13T19:45:42.327000 CVE-2024-24752,0,0,22440f0fd970941fcfb830d7e514ea6901b6e7f6f9401a3ee86d723ef3bd0416,2024-02-09T01:45:17.263000 CVE-2024-24753,0,0,489da65cb89b5e2b3ac57a274dc7417eb396374e78719312a4b6b7f6d08a4cf4,2024-02-09T01:46:12.560000 CVE-2024-24754,0,0,d559687913b5c57e49208ab512881aa0ac0d7469309a6490c2dc3d22cfeccf20,2024-02-09T01:56:35.890000 @@ -246369,8 +246369,8 @@ CVE-2024-24775,0,0,e8a1117081dcecbda71bf879ea5f4cf7e64e228ee31031e5b59390d8bbf84 CVE-2024-24776,0,0,6c7703c27939b228b8c6f0a7ac349acff88924b8a443af347b795b4df5ebf2ac,2024-02-15T18:42:25.383000 CVE-2024-24779,0,0,0775cb0ef2c25af6aeb51ccc0386a7ab6a666e4b0e03b7de868da93b3496f60c,2024-02-28T15:15:09.250000 CVE-2024-2478,0,0,d4988a5fe437e33a0f9a93c3fcdccaa9b2b8ddd55cfc6854092fb1866b11274a,2024-05-17T02:38:14.540000 -CVE-2024-24781,0,0,9010663e1c0c6444d2887e82aae77601c836d06c32b3191b645c1a5bb2ddd3ff,2024-02-13T15:16:05.223000 -CVE-2024-24782,0,0,8387970b6cd9f9e3d07715685b413366a64f86252803126746ea31ea128315fc,2024-02-13T15:16:05.223000 +CVE-2024-24781,0,1,6135f813e9e5caf5b916b5c6b9eb02daa8443a8dfbd472a704fdb6581034236e,2024-02-13T15:16:05.223000 +CVE-2024-24782,0,1,2742ffe1e8f1235765ecdc2cc99ccfab3b487ef9af54814c0c42a315182ddaea,2024-02-13T15:16:05.223000 CVE-2024-24783,0,0,b741155a91dd0b1fdd28b7d2781143d5923e267a1d468398e2407cbc100ba9ca,2024-05-01T17:15:29.450000 CVE-2024-24784,0,0,c62f93b4c44015650b5ab232879230f801aee4f052aeb35f61a1e509443e2faa,2024-08-05T21:35:04.457000 CVE-2024-24785,0,0,ed4b40570d55c22332f8ae251f400ebe696def65e3ed727a4487c1851f76d8f1,2024-05-01T17:15:29.610000 @@ -246405,7 +246405,7 @@ CVE-2024-24810,0,0,ea6fdca62b7e00257691fd5291f58ce467dc80f8017a89bfa4b202bc0e1c6 CVE-2024-24811,0,0,7d5ff8ad0fe3f1f541d707926a7dd4068a8926ae5ea3a1008260caead5d642c5,2024-02-14T20:26:39.143000 CVE-2024-24812,0,0,0181c2c9ae6cc21c49aaebe92a03a31e9d8ba638d3713134fde53fa7f600c486,2024-02-14T20:22:02.537000 CVE-2024-24813,0,0,3e60f204ede1f8ef7119c7c5260c605cef5493853ea87c7a7b75d96c7ff426c4,2024-03-21T12:58:51.093000 -CVE-2024-24814,0,0,d126c0ecefaedd3cdbb409c79c6432559b4d44690d657e7f2c05787acecd860a,2024-03-21T02:52:11.957000 +CVE-2024-24814,0,1,12e51377f8e768cb098fc0e2e1507c3b7350536d0e5ed7e8030f7f36b0cf718f,2024-03-21T02:52:11.957000 CVE-2024-24815,0,0,1752b9f7001655d746800666b7851b33b09dfa9987a811bd752948dc8966243e,2024-03-06T10:15:45.293000 CVE-2024-24816,0,0,0917d7bd5dc6c3b76e09c38685bb57dd6e8e90e3381ae1bf2026646ec2c89195,2024-02-15T05:01:35.393000 CVE-2024-24817,0,0,4b6df4ebd7ab00bafdd25fd5b8b1be918f7061753988ac6e2409eafcc6345f20,2024-02-22T19:07:27.197000 @@ -246418,7 +246418,7 @@ CVE-2024-24822,0,0,f5c8cf448b16b286008df690b572e339c86d302ad1ca3f03ba6dc478ba62a CVE-2024-24823,0,0,ca387b9ca279544bc70a4924c2cae6ededf5b36798c51b4811775c8050c55d01,2024-02-15T15:41:48.550000 CVE-2024-24824,0,0,3cd8cb72af7a9d86f6447b6b741f0605f9e64f6f4be750a68ce4b077beee9862,2024-02-15T15:40:51.680000 CVE-2024-24825,0,0,44ab98b07f8e13f8b0c82f9421a9e43aec0d6c0ed033d2b04542ee6d71077af6,2024-02-16T21:37:47.923000 -CVE-2024-24826,0,0,af7b838ce9f1b8073c2280c6749f3a99de5c6fcee2eb5f012d82517cceb2c991,2024-02-13T14:01:49.147000 +CVE-2024-24826,0,1,507ddac8277df0420b4b2c89cc72b2967a8df7192518c4485fc3fc9be65cb244,2024-02-13T14:01:49.147000 CVE-2024-24827,0,0,8a3fb819168e70feabdebbadc33e7d5fb16a735b42b02da853323d07ee2f6102,2024-03-17T22:38:29.433000 CVE-2024-24828,0,0,5febe2126555754e7f75249112b510c6cf702ee8ea0e8f4efc1e398efc8df599,2024-02-16T13:43:33.407000 CVE-2024-24829,0,0,d5256308fc86c325573389b1557c0f4be2aa9472f94995eb3c78bbae5a267a9a,2024-02-16T21:37:59.497000 @@ -246473,9 +246473,9 @@ CVE-2024-24875,0,0,d4175d9d145d2e6aa042e46e11e97f48819e638c38138d0ec209148e9f744 CVE-2024-24876,0,0,fd2b02565d60f44ad7f12138fcc8688af9116be3df3cfc2409498788186c00a9,2024-02-22T19:07:27.197000 CVE-2024-24877,0,0,9d2f0e7fc46543edf49748fb4f8f8be67b4fb86dc6a0325358bf368765aade7c,2024-02-15T02:53:41.823000 CVE-2024-24878,0,0,298a08ab82a5bf3a5e1905d2bd2b0b3a16b15c92c4d573ce5c55312b22ff7afa,2024-02-15T03:01:50.883000 -CVE-2024-24879,0,0,62c521300bf2d7befb585371230a008740a177167b97c0e7bac4746447ed53c5,2024-02-08T13:44:11.750000 +CVE-2024-24879,0,1,bf6b13e3233057aaea0d59bba3f9d4b670c9c80198928f79e24fcebaa00a210e,2024-02-08T13:44:11.750000 CVE-2024-2488,0,0,9f9545c282e96006573210a989f186c5df3154a3513e0af714a0d9e2892e8aac,2024-05-17T02:38:15.413000 -CVE-2024-24880,0,0,d33c65d2cd8280ebaa686b2fcc8fd218b13ad4aa68609a2777547b3bf6ac3482,2024-02-08T13:44:11.750000 +CVE-2024-24880,0,1,70ad5aab83df57ce9217f3bc641d9386a6067eebf334b2d7ba7e24c2c6f354fb,2024-02-08T13:44:11.750000 CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 @@ -246650,16 +246650,16 @@ CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e CVE-2024-2511,0,0,e85e202ac0d96bf0165ada9b88f1fcf9a6fbf365413ed057ebdfaf286537c656,2024-05-03T13:15:21.930000 CVE-2024-25110,0,0,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000 CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000 -CVE-2024-25112,0,0,ffe546871aece44048a968db11eadb8d7bb7f19f007a9d8c711115c5f085f021,2024-02-13T14:01:40.577000 +CVE-2024-25112,0,1,62d81a6835c854cf3f1a6117c1e57e73e656e5f510894e971df29562320bde94,2024-02-13T14:01:40.577000 CVE-2024-25113,0,0,857a8a6c04923b8f13653e0c0fed4f0ffff75cf90412dfa840a70a6bc18a3ae7,2024-02-17T22:15:46.660000 CVE-2024-25114,0,0,3524254a4b7a3e50af9bc4f15e149e8b2a8070e77f38c1db0e166835208309e2,2024-03-12T12:40:13.500000 CVE-2024-25115,0,0,40d5efaae1e56dcbebba13c843b26cb154e67c37776585c4828884d73c024208,2024-04-10T13:24:00.070000 CVE-2024-25116,0,0,b47f7efdf4d6565b7b3fd4645528602e99c9b4231fab1e92d18723f0fa94556e,2024-04-10T13:24:00.070000 CVE-2024-25117,0,0,32e5de7686da307e1d085917e9ff819e3c6be925e6a22647ffaa56851c80b8c3,2024-02-22T19:07:27.197000 -CVE-2024-25118,0,0,5a5d87ec39b0263d610d121aff303a2a887b58fc2c2bb0cb82e45c6c39356933,2024-02-14T13:59:35.580000 -CVE-2024-25119,0,0,e00eb90c0e2b5f9ee441104e8a867af994d0038db78cdde9e1777dc983844f96,2024-02-14T13:59:35.580000 -CVE-2024-25120,0,0,22ab495202da9a816053ab6e8432de07c3fd99eeec113249a77e5d6da094b853,2024-02-14T13:59:35.580000 -CVE-2024-25121,0,0,b0d544a773d2eed790454c3855c0d500355e4c566f69865a021ff361b9749a9b,2024-02-14T13:59:35.580000 +CVE-2024-25118,0,1,d3764bd443a5be9a75f47c4309ef4ec166c7508398be9a3d42b7fcd459032d4e,2024-02-14T13:59:35.580000 +CVE-2024-25119,0,1,4fe5025f36ddfb1a7356a8f46af1a16fd61ce983613ca0c11b88338a6c82a713,2024-02-14T13:59:35.580000 +CVE-2024-25120,0,1,e11319618e5589810bcea8c47d4bfb7e2d9e9ce83724ebcb2ee3fed3014587f8,2024-02-14T13:59:35.580000 +CVE-2024-25121,0,1,3b500fa423197f2ae75e907e90a0f389e3aba5110c2076fb1a39475ec9ec0869,2024-02-14T13:59:35.580000 CVE-2024-25122,0,0,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000 CVE-2024-25123,0,0,d91338db3ed95b8913dc378067e1f32dfba4b3ec82603f1ac01d187651acb75a,2024-02-16T13:38:00.047000 CVE-2024-25124,0,0,d570849c8f0f5f2638ea1dc3ea0947e3bcb6425f6af78c4802a7a9fc8debac63,2024-02-22T19:07:27.197000 @@ -246829,7 +246829,7 @@ CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934 CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000 CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000 -CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000 +CVE-2024-25407,0,1,307f39b79f92e06e76b9fbcc3a47feb7c6b73a851bcc180a0e4a79c38d198429,2024-02-13T14:01:40.577000 CVE-2024-2541,0,0,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000 CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000 CVE-2024-25411,0,0,f9808b9c08c02274fff68dd7e5217db1355a6b403a57d6ed0599eb26f30420e4,2024-09-30T12:45:57.823000 @@ -246871,7 +246871,7 @@ CVE-2024-25466,0,0,2faf3b324b5dce58436df6bdaa090161fa7f0a0215834608518ab712a3442 CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000 CVE-2024-25469,0,0,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 -CVE-2024-2548,0,0,77bed2cbe868603341c5c4fe00286d759f5ff5a17e6112b21ff9565c6b1c1c8a,2024-06-07T14:56:05.647000 +CVE-2024-2548,0,1,28a8ff344f255c9f0c3282f1316d82920e9736873cac93ebf7e6b56dff4ac91f,2024-06-07T14:56:05.647000 CVE-2024-25501,0,0,53c57009bf13ac9e81165c240313efc6336b1030bc10f61986ac8903ee95ed6c,2024-08-27T20:35:14.160000 CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 @@ -246988,8 +246988,8 @@ CVE-2024-25639,0,0,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf56835347 CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000 CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000 CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000 -CVE-2024-25642,0,0,62b98db44a08196f7b7012c39faaf86e5ea68b1167c724b1b57391d731cd46b5,2024-06-10T17:16:21.947000 -CVE-2024-25643,0,0,531b402e512e75c4384caa610ae811e75e61e13fefc89fff8eb67c6e4dee7cdd,2024-02-13T14:01:07.747000 +CVE-2024-25642,0,1,638fd1308f3d8842eb533aa3108c9355f89cfd97e2e1ef98df198a0b000c5b3a,2024-06-10T17:16:21.947000 +CVE-2024-25643,0,1,7fd5012d58e0f26127820c0dfe85f7653ff3e82c349a6c9e79ae2a59ca03b868,2024-02-13T14:01:07.747000 CVE-2024-25644,0,0,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 CVE-2024-25645,0,0,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 CVE-2024-25646,0,0,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 @@ -247021,10 +247021,10 @@ CVE-2024-25679,0,0,336671d7a9b81f2d934eec43295d86632d4115fa00ebe07b3b7b7b64cbb71 CVE-2024-2568,0,0,a2a068ca4a50c4c677658d12d7be5164377aa99cb7437445628357e6ede295f5,2024-05-17T02:38:19.913000 CVE-2024-2569,0,0,b7de7e9a2f61cf384b67083c19edf1099e6f7ca3f4f9901116fc92aacb439fd2,2024-05-17T02:38:20.070000 CVE-2024-25690,0,0,87e489ac687df3386a5e24fd2776124e23b4b69824b5d876d66a887615116d95,2024-04-19T23:15:09.693000 -CVE-2024-25691,0,0,7ec82c426a97810c2dac8f98a74329d86609095ae2bf2d36940ffd5d27a0b121,2024-10-07T17:48:28.117000 +CVE-2024-25691,0,1,4b8b334c614ebed6dab7a36b59c1868c0ad937defa6d122b42300807ee75f759,2024-10-07T17:48:28.117000 CVE-2024-25692,0,0,d0dd15c1fd6afb16949febf43262c764c6cd4b54de8a2254593f0df169ca3486,2024-04-19T23:15:09.780000 CVE-2024-25693,0,0,ee3b1699756246429d08fcae77f5a3d1bf8999838fba0943d498908eefa0b3ea,2024-04-19T23:15:09.857000 -CVE-2024-25694,0,0,e86a73d2b4a4e9b29012ceae3010a136ff34878b536bcfb90a6d69290ce28fe7,2024-10-07T17:48:28.117000 +CVE-2024-25694,0,1,df973b9c2c97d997da6138526a86d0f0fa774d11a4a0dad8933c8a4014fb7bbb,2024-10-07T17:48:28.117000 CVE-2024-25695,0,0,ae0f9f8b4640bad4ef7d98bcee5a49c1f9e646c53c1fb5af299b3d59dbeeccbf,2024-04-04T19:24:50.670000 CVE-2024-25696,0,0,b9ac53149f8eb62bad5c1e7fe3f9f0b5771bd4ade8a07c59c93d14f596dac225,2024-04-19T23:15:09.930000 CVE-2024-25697,0,0,00e09b3a3d399949d344c4792642676acc05306dfb8c33dc1b47547a03399a73,2024-10-08T17:15:29.717000 @@ -247032,13 +247032,13 @@ CVE-2024-25698,0,0,2e4c293fce5511a49d5e47901a449b88216e166f1733cf134304a504814cc CVE-2024-25699,0,0,9d693017a1c9d09a675540e3ff57b587b5c9e0a64b03ba2e5a4505b921a75e06,2024-10-08T17:15:29.917000 CVE-2024-2570,0,0,62ba08b313dad98b50886ef335be346def1e9e22dc58f4ebc2c3039b966f349e,2024-05-17T02:38:20.170000 CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000 -CVE-2024-25701,0,0,fb0acc04edd8e6129d7e18302257d0475b8cc46294099a9f7b2a28d5e4af7884,2024-10-07T17:48:28.117000 -CVE-2024-25702,0,0,f3e8de2c8081bd58ef3e73b671dc2c1b9812e9004fd627e4151ed8957347dac4,2024-10-07T17:48:28.117000 +CVE-2024-25701,0,1,edcfc4602c5c7a86871da4bea4d4b5b1a7bb9b9065dc1c26073a215bc7af59fb,2024-10-07T17:48:28.117000 +CVE-2024-25702,0,1,e859ce563aeb48d8e92df453a4deb6f580b48ac6a6b244b21d2d46b882f73d7c,2024-10-07T17:48:28.117000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 CVE-2024-25705,0,0,70404f8be55e7f45193785fe1a9f191f8bf3c87c1846c3ded06f2c02ee5cc19f,2024-10-10T12:57:21.987000 CVE-2024-25706,0,0,add44ad3e9f5590ddacd6c67344f87aad7254e9f59742e2356fd47eb73c7d906,2024-10-10T12:57:21.987000 -CVE-2024-25707,0,0,3bb0ddd1c56cea2a265f7e18aa1195f02551815bae9729435bea1e331186d842,2024-10-07T17:48:28.117000 +CVE-2024-25707,0,1,4f68f16dbc3aa7d4a9c29dc396efbddb857d33feea795424ad508c314dd60fd5,2024-10-07T17:48:28.117000 CVE-2024-25708,0,0,b995ea56334b971dfe3d8608dc1ee58bae4d9dee517e37442e06f48d1ac62cd2,2024-04-19T23:15:10.237000 CVE-2024-25709,0,0,0d5968e8aa771b1d68be8b34b983543f2d0d3a449ed1422c1a453702a3d8ef22,2024-10-10T12:57:21.987000 CVE-2024-2571,0,0,944818011263aece939e20c7251816424f7831487c7b65e2eb2d8bf532c69b9f,2024-05-17T02:38:20.267000 @@ -247400,7 +247400,7 @@ CVE-2024-2615,0,0,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e263 CVE-2024-26150,0,0,724a23f6f5cd2b08e078faf9766b70ef43f45650f38390687bb0597c880332b3,2024-02-23T19:31:25.817000 CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639eb1,2024-02-23T02:42:54.547000 CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000 -CVE-2024-26158,0,0,9868bbaee1307f0e3fd89c87d99dd6c80dd12bfb7dff69024c37aebb923e3dcd,2024-04-10T13:24:00.070000 +CVE-2024-26158,0,1,e4eb67f7a9ef1e95f05f830527e292892249634485474776f5ca55a98fc6f945,2024-04-10T13:24:00.070000 CVE-2024-26159,0,0,56810e72f38b92040811a5204d542af9b722ff356135b225ffab76f56a28e7fb,2024-04-11T20:15:33.460000 CVE-2024-2616,0,0,1385cb9569594cd22733fda3d363fb5e951c88bf4d7a63b7528570c25b647921,2024-03-25T17:15:52.007000 CVE-2024-26160,0,0,a5ba5256c33bdbaacb3171d5280616afee8699c566f2ab3b8302aeb6de79cfee,2024-04-11T20:15:33.553000 @@ -247487,7 +247487,7 @@ CVE-2024-26236,0,0,19d5aae98ae95db4c4d70f418437d84d96fc7ffa6eb3fc6e960d1fb32f039 CVE-2024-26237,0,0,4a5a46dfbaa9ee757c266cb06f5bdd3b7c9c9212350e3b3f940b0f5aa28b1fa2,2024-04-10T13:24:00.070000 CVE-2024-26238,0,0,f51ff6c77a18790c6e3fbd5916b9e4339c1fbba58d3f9a7dc1403152bf549147,2024-05-14T19:17:55.627000 CVE-2024-26239,0,0,b6bef41140cc2fe190d67ae538417b420d577a7d3675c65900e55846e1dc5504,2024-04-10T13:24:00.070000 -CVE-2024-2624,0,0,3f8d6e2484feb5880b24caf8eb2bbbb992e36f9131595c06d1abdd8d3162c0e7,2024-06-07T14:56:05.647000 +CVE-2024-2624,0,1,9d29efc17e6364740a6798ed3ebc8be6debf3940cacd2e3ec7a7a0de154ad1a1,2024-06-07T14:56:05.647000 CVE-2024-26240,0,0,469d109d7f6dbe34081d9860472aff3b4e252c2c74e78521b270d4e97c1e526f,2024-04-10T13:24:00.070000 CVE-2024-26241,0,0,ad49425919c070a9631331db70a22ebb9d6d5ba3446192474b9ed36e91182f09,2024-04-10T13:24:00.070000 CVE-2024-26242,0,0,87be43bdf41cad376dd7ec9618b8c7069b8c8b4a0eda2f8823d78d95a17b33c7,2024-04-10T13:24:00.070000 @@ -248566,7 +248566,7 @@ CVE-2024-27454,0,0,779bdca194b0fd7e15d4fb614a41a54cce3a22c81a400a54914ce77bfe4d7 CVE-2024-27455,0,0,c38321d72349de04fccc31003825775edb49050b2ce63013697a3990ecbe9fab,2024-08-14T15:35:07.223000 CVE-2024-27456,0,0,f0d8fb5a803e9956fe6ec256a4dcc4781b2e19a5009cb66a9854d4478f56dbb5,2024-08-02T19:35:26.123000 CVE-2024-27457,0,0,3335316d080a16a52a88af6dd3720987e9bfebc8964b0f14bd58e8d281e3f00e,2024-10-10T12:56:30.817000 -CVE-2024-27458,0,0,bf38046b4be81120c299c6f9a408d8707f8d7a936fbf5cd96ec4e4751299b5ee,2024-10-07T17:47:48.410000 +CVE-2024-27458,0,1,eaab65410fe056d7aa154c2b25e2bd70fd560fb1d3903a0de27dc2ac9293125e,2024-10-07T17:47:48.410000 CVE-2024-27459,0,0,bce97f3eb834dcc00c74dfb6abf98ffc5071ac70577037f22e6e9d74d3163f62,2024-08-23T15:35:05.310000 CVE-2024-2746,0,0,35843c152725b889a25545af99dfcef9305aac3bf18b4d5c5f191a6ec8073990,2024-07-12T19:15:10.640000 CVE-2024-27460,0,0,f0b57ff5055bb6030ef4648bdd57a51aa01e0828deb080ab3b3797ea42309cf7,2024-08-27T15:35:11.743000 @@ -248844,7 +248844,7 @@ CVE-2024-27916,0,0,cae4c6e981b4f9783e68c62f24daef51835d173b829a20948cd7ac14d8c9c CVE-2024-27917,0,0,fb5169f63aaa413c4274f19f85a662a5fd53f03e3017f89724ea8ad98165b048,2024-03-06T21:42:48.053000 CVE-2024-27918,0,0,08bc88d68052b174f5a1479722a0b201e84a8d7a869da72670dd7f53b3060c2f,2024-03-21T12:58:51.093000 CVE-2024-27919,0,0,2e5d00a032f709c59a0f5d65e11304d9b2be25266ea97fa33d4906ffb4e99e9c,2024-05-01T18:15:16.463000 -CVE-2024-2792,0,0,b6f037d53939f21955ccf4a8a71bec9beb1f43627cc17084a140da00d85de4cc,2024-04-10T13:23:38.787000 +CVE-2024-2792,0,1,0d657200c541ad0210ec013aa7f8a4e6fee04ad3552cca25e90dcf70cd7bf5ef,2024-04-10T13:23:38.787000 CVE-2024-27920,0,0,549f106d575662e1f403da5f77970157a69c045671255268e802d256890b1b44,2024-03-17T22:38:29.433000 CVE-2024-27921,0,0,a6e22524183ebedb30d72e4d78876fdb6a2dc6d2a2f6ac39d513091ad37b5d8d,2024-03-22T12:45:36.130000 CVE-2024-27922,0,0,a990a47cfce1716ec80f3caf3c86e4ad3b7aad5360bad06affaac9825a7c4f7f,2024-03-21T12:58:51.093000 @@ -249326,9 +249326,9 @@ CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cb CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000 CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 CVE-2024-2870,0,0,c7537b0655353d8eeb90f5c17425f30e927a579834f6ada2ebebb0410684ac2c,2024-08-01T13:49:56.253000 -CVE-2024-28709,0,0,b646330b00ff749e62910560eb10cda906bad6c54ee88ad3ac66b67ea9679736,2024-10-07T17:47:48.410000 +CVE-2024-28709,0,1,3b618d4e76ec8bda51caf7210942d20675172504ac43b24e48363f42c62af724,2024-10-07T17:47:48.410000 CVE-2024-2871,0,0,a7a747cc7e44787061231b304b7fa297ab3e10c5c0c5d67f97a2b8176c2eaee9,2024-04-10T13:23:38.787000 -CVE-2024-28710,0,0,3ff6c9643d68b4856a9db7f03a51ca3385c2aed7fa5d0d7ca12bfaed7d3a462b,2024-10-07T17:47:48.410000 +CVE-2024-28710,0,1,d1cf98c15a366b3a62c4a416416372ec2ed33d8ae9e4b3434c4415330555edbd,2024-10-07T17:47:48.410000 CVE-2024-28713,0,0,60631bbe8556f08b6ffb1706b8163672bc95d30ca176d374b79cb9df294abe1f,2024-08-27T20:35:27.150000 CVE-2024-28714,0,0,18b853be5dc2833c618e4ddbd9bb373d963fc65628b928a515e70d080b0e0346,2024-08-01T13:49:13.347000 CVE-2024-28715,0,0,8a4e847dfd6a2992ee749163f8e2418cfe72ffb7ce2c517ef803a6aa5b491d0f,2024-03-20T13:00:16.367000 @@ -249911,7 +249911,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 -CVE-2024-2965,0,0,695a2f4a5898798fb311965c87e04355b559271ed2851691e85a6cb305dd485e,2024-06-25T11:15:49.873000 +CVE-2024-2965,0,1,e178a5677ff509b758e925bb6981e960414ae7e25d8c6ced56d5c9529602efc8,2024-06-25T11:15:49.873000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000 CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 @@ -250466,26 +250466,26 @@ CVE-2024-30270,0,0,efecb3f08ba92062dd267bd0c96f7f12cf461464043b62265b8f7d0e604df CVE-2024-30271,0,0,4f667ebf06641ee169a3ffa2348fd1053acc22044fe752e1f0db8c1957232f63,2024-04-12T12:44:04.930000 CVE-2024-30272,0,0,a408e080820ee91f9124f4e9a3caff1ca158aba4951c48fad2f31a3e9facd7d8,2024-04-12T12:44:04.930000 CVE-2024-30273,0,0,6b1d238c9e12ea2ba8fc60efb1a6f102260f96c472f5f331b760d3af4a0ceb07,2024-04-12T12:44:04.930000 -CVE-2024-30274,0,0,e625b227f4c1edcd8894c6840804c74e62ead535c97f2e8fc44830cae7c48db1,2024-05-16T13:03:05.353000 -CVE-2024-30275,0,0,1e933441e483f4fad62bd9e8a6a258edd1aaca4d5bb09d395e2677a6a5bd3120,2024-05-16T13:03:05.353000 +CVE-2024-30274,0,1,a2395c418161e6c596f5972c7c03ce0794aa86ba1471f6fa70be52e1a37f36af,2024-05-16T13:03:05.353000 +CVE-2024-30275,0,1,5c7fd7a6cf84690d33049db8d301fa3c3763a08fb307abbb2a39ddc9f47ba093,2024-05-16T13:03:05.353000 CVE-2024-30276,0,0,0bd4be9c7f10ca7d4fd2dfa1716549a7092cbd7f9a2adabf7913546d4cdfeadd,2024-07-09T15:50:56.480000 CVE-2024-30278,0,0,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000 CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940de58,2024-05-24T01:15:30.977000 CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000 CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000 -CVE-2024-30281,0,0,7dc54d36ea04f91f89ce8adfc47b9241d93f3920b80b2bcf90e636f206d668aa,2024-05-16T13:03:05.353000 -CVE-2024-30282,0,0,acbdd074052af128f5234f5af9c96100016a81f1899a6d38ce0f65c5eb787e08,2024-05-16T13:03:05.353000 -CVE-2024-30283,0,0,cc85c4ac8184bc57a3333e50d3b31ca0f185f4346dd42920d88e4a47c14e3bb3,2024-05-16T13:03:05.353000 +CVE-2024-30281,0,1,aa55f6f337f0eff14aaba79eadac42cf1fa69bcced5e256cfe63f794552ecdfc,2024-05-16T13:03:05.353000 +CVE-2024-30282,0,1,a990498a43a1ecddf22e7510bd46438fa6701708c2c184811f4ab5f2b9df43a6,2024-05-16T13:03:05.353000 +CVE-2024-30283,0,1,ba083c1bacb29a7f333eacd467f9eb4c19b7b166e16a58a9ca533c939d8d2cec,2024-05-16T13:03:05.353000 CVE-2024-30284,0,0,c3d8cfb90cbc04c8f8451d2b94550163ac2e92e833947aa8e3054cbfbcb5af6b,2024-05-15T16:40:19.330000 CVE-2024-30285,0,0,d5d0073a0c86623254404dea22df638b05a2d50f8dfa4429d0e1bb0ebc3d1cd8,2024-07-09T15:52:12.637000 -CVE-2024-30286,0,0,f075c62f6e56fcf1e308c406b74bf13a35c4db040bd93759e2ff07628c320f45,2024-05-16T13:03:05.353000 -CVE-2024-30287,0,0,03f32ed0fdba016a5d5a0b76991649202fd17ce361eef6861facb47f07ad04d0,2024-05-16T13:03:05.353000 -CVE-2024-30288,0,0,faa6b1574526d7016c0c4e525f8df99f1c705f77ef8e3b9b814dbfb0cbb17075,2024-05-16T13:03:05.353000 -CVE-2024-30289,0,0,db54d7e497b5327094ca94999798164bdad2110aba6f970e7f797e5a45da0744,2024-05-16T13:03:05.353000 +CVE-2024-30286,0,1,beef9934f7474ed3314782ff972bc64930801beb5207074639983af9565caf76,2024-05-16T13:03:05.353000 +CVE-2024-30287,0,1,6327776c7df1a6e18971678b18b3516cc6d8ff1ce7bdb0b19d9db717f92b4c8f,2024-05-16T13:03:05.353000 +CVE-2024-30288,0,1,225fdb5419e0a0230c2e4c0a2f327ebf5bd46f1fe156cb7feaea8b392bc87209,2024-05-16T13:03:05.353000 +CVE-2024-30289,0,1,5b7948a8da655d7b6a1a1f110dc3e8446cb3de6f8887af2aef80ca12b3dcea4a,2024-05-16T13:03:05.353000 CVE-2024-3029,0,0,497ffe4940c4ad919b0790a585fb5a1b548684ec5cdf0a9c9ccfacdc2ebdeebe,2024-04-16T13:24:07.103000 -CVE-2024-30290,0,0,4f6f523207dd67ff6ec084d41d4908619e6fac9ba017659b3536c214c224fb41,2024-05-16T13:03:05.353000 -CVE-2024-30291,0,0,0722d98ada968ac79eef82674572feebe5faadd1a0ee65aa58d4cff620c04d19,2024-05-16T13:03:05.353000 -CVE-2024-30292,0,0,28282386724dc95e14290b8b3075f370e365368f36fd0e5d381ce30c6efaeb02,2024-05-16T13:03:05.353000 +CVE-2024-30290,0,1,af063bdf169684f0cf2582493d5fce25edf961d5186b6e3519602a8f26adde74,2024-05-16T13:03:05.353000 +CVE-2024-30291,0,1,b1658e0e3d84e2ddcef9c516a7d0728d8dfd3880a614c6fbd47e964ae5d10abd,2024-05-16T13:03:05.353000 +CVE-2024-30292,0,1,b720742a0e521838fd188c1ef72d566e03ce789fd7f6d4efecb01f5d65521489,2024-05-16T13:03:05.353000 CVE-2024-30293,0,0,cb6d64f28c1d177af9d8787acdb5f1ba6610d7808ccf528bce800949c7d74b22,2024-05-16T13:03:05.353000 CVE-2024-30294,0,0,7166a81324ee6dd52833272914dc6f5ed70b0f6ae30e108fd1b216dad0523d9b,2024-05-16T13:03:05.353000 CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c960f2,2024-05-16T13:03:05.353000 @@ -250519,7 +250519,7 @@ CVE-2024-30326,0,0,bd045e601e5046ba3cea4a4cc12a38dac27a2747091f3250e22cdc1606d0f CVE-2024-30327,0,0,82d3ac0ec664eb28b5f029cdc49700b33dacc1ee03fc7b20129b78520100daef,2024-04-03T17:24:18.150000 CVE-2024-30328,0,0,7e6c0ef010b26d48783e5f59f8758fa62fbbb8b86cd1a0856afd9e3bd2bf63f5,2024-04-03T17:24:18.150000 CVE-2024-30329,0,0,725552f06238ff91cd810a056cd778e4bc0d33e18e1224478c66397fef3c0573,2024-04-03T17:24:18.150000 -CVE-2024-3033,0,0,e22814b91c222f9fe8bbecfe7e093116db813b94cee0a52ca2e4c8432136d5cd,2024-06-07T14:56:05.647000 +CVE-2024-3033,0,1,d98f06c738a004e7884cd819bdea6a68950b747ed8eb98bb5f4ece1cc3641a1f,2024-06-07T14:56:05.647000 CVE-2024-30330,0,0,38ab8d6901d987c9666b7129076ec1d38e135f293adbb8eea4c4e875401b2c74,2024-04-03T17:24:18.150000 CVE-2024-30331,0,0,fb3602d05ae904e4599bd2f536c90ab90d8fcadae28aaddd9775521408010be3,2024-04-03T17:24:18.150000 CVE-2024-30332,0,0,083748902200ffcae3e61fb7a56955a652fc3ba7f93a88d2acbde0b787bf0d67,2024-04-03T17:24:18.150000 @@ -250566,7 +250566,7 @@ CVE-2024-30369,0,0,084ebabb6bba6f65e3a665faf08cf2442ac42f59e1585ca47c68653967d4e CVE-2024-3037,0,0,5192283ef3f0b9026a4bd8ad8d1a7b79d0e8030dc3224136afdfcbc8af6dad6b,2024-09-26T02:15:02.277000 CVE-2024-30370,0,0,6207ecfb3ab83effd5b69f8ad0454d61dd1c4b620444f7bf5bed75b59a7e9bf2,2024-04-03T12:38:04.840000 CVE-2024-30371,0,0,5cb1f88df7d7d6dd29afc1f981808ff71d5fa01260db76282c78c8209c6570fc,2024-04-03T12:38:04.840000 -CVE-2024-30373,0,0,ac2231546cc34daa74c465f9a9fe35653c0122d2d53839e7bf0cd715536bd357,2024-06-07T14:56:05.647000 +CVE-2024-30373,0,1,d55376e4b21a73ffd899f3f3f278ea14c11108d98d740fdf1d6c4014999d9779,2024-06-07T14:56:05.647000 CVE-2024-30374,0,0,4a829013b3c1a4609a76f5790d534eb221b5942a8caf978bc6991bfee50c426e,2024-09-26T14:22:20.047000 CVE-2024-30375,0,0,e38288bbc33b00a1927d2243b199eacbf12e85c7f7703d097b6b791a059430e2,2024-09-26T14:24:26.730000 CVE-2024-30378,0,0,b80140413aed971e52d27ba98a46e8aa758cf76f2f094e7fb695d089c0e62074,2024-05-16T18:15:09.407000 @@ -250961,7 +250961,7 @@ CVE-2024-30939,0,0,4fde734a2c1073b7ace1dcb3955f64c312d3d3cb950014608581b57b7c19a CVE-2024-3094,0,0,98d623c51c3718f594d063257facb535556f13c6eb9aedf81f112b165abed8fb,2024-05-01T19:15:27.340000 CVE-2024-30946,0,0,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000 CVE-2024-30949,0,0,202e32279483c8a9ccf9bc2c69e9e5054a0d5627a3e5e9f84dfb1934bcd5644c,2024-08-21T15:48:31.937000 -CVE-2024-3095,0,0,1dc2be507d2862bd5ada87d1bae78a2793983ea84c525f6d54bb8610a95deb10,2024-06-07T14:56:05.647000 +CVE-2024-3095,0,1,eb29c6a81554258c714f149a01330fa3a3eda304c69d6142508ef4e80ad8581c,2024-06-07T14:56:05.647000 CVE-2024-30950,0,0,19fcf7a45168a789955b2198c0713f1a1ef707cd5bb1de038ced1b6154c32fe1,2024-07-03T01:54:25.763000 CVE-2024-30951,0,0,9b092a5976ea47ae9ce6ac6665423991363b55ee54764d7a78a3d2ce95cbd3aa,2024-07-03T01:54:26.557000 CVE-2024-30952,0,0,edae87d09e8bb170f6c6d48863e03910235bea663bae0b6cedc1cddd197d65c4,2024-04-17T15:31:50.160000 @@ -250973,7 +250973,7 @@ CVE-2024-30973,0,0,bbddf1428f657ee3dd8694d858bfeebf1e082677ce9eaa5b99522934461de CVE-2024-30974,0,0,58d798e5f49d558922aa7ff1fef01b969ff326cf30be128717719a7efa0d452a,2024-07-03T01:54:28.233000 CVE-2024-30977,0,0,9b376b5c5f8a7d223f02e67924cfe92b95db4973b1a024096b86e14bd3b11f55,2024-08-01T13:50:33.723000 CVE-2024-30979,0,0,24f82048641520e72e58ea7aed78bf2b0f6627b87f46428b11f3023d9bb8bc03,2024-08-01T13:50:34.503000 -CVE-2024-3098,0,0,0e21f9cbe7afa768b789166e91e9a473ccedf7863a96176e7422e53994c073cc,2024-04-10T19:49:51.183000 +CVE-2024-3098,0,1,bba72a7950460a196c24127bd1e6ef09f58a10e9ac2b0d03e444d0f3cd663280,2024-04-10T19:49:51.183000 CVE-2024-30980,0,0,2cb16367753d625e1712853c42e7c23eaa6ccda14875b936cec85c7a839172d9,2024-09-06T19:35:15.520000 CVE-2024-30981,0,0,81ff6a46243c7a5c52b0937ea3bee82cb4611dbc80eba5e29f640cdeee5e81ee,2024-07-03T01:54:29.020000 CVE-2024-30982,0,0,abb92dcf5227f0de2235f83151bb4c17ac247815f1c0f47d65a9b4e12810b860,2024-07-03T01:54:29.753000 @@ -250993,12 +250993,12 @@ CVE-2024-31004,0,0,4704ee13f9f534d8c7bace10a79d7d4280ca43ae0178f7a716eda9d0db56e CVE-2024-31005,0,0,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 CVE-2024-31008,0,0,a974f67fc051176587797d68bd7b8f7fe117012e84496a743cd76182b8fe18e1,2024-08-01T13:50:38.620000 CVE-2024-31009,0,0,3077bfb383403641b21b3b69eff09950c4c56bae68058cba13568ddd6189034f,2024-08-01T13:50:39.423000 -CVE-2024-3101,0,0,1fd5146e9cab2be40be9d13d1b212c0046155814cf3f9775411d080d25406f87,2024-04-10T19:49:51.183000 +CVE-2024-3101,0,1,437dbb9fcac4bacba400f2fa9de8c79fbcdd2c0866383f4a0cb42b039afb8d76,2024-04-10T19:49:51.183000 CVE-2024-31010,0,0,50d72a628a998ce24996b17a1abb2ea140f353a3cac2e0be5c534b2a597a6491,2024-08-14T20:35:10.347000 CVE-2024-31011,0,0,0c33284f804930c14c50cb008bf7c23c7b47af354b75abc23cf3e146495b5db3,2024-08-20T15:35:06.517000 CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000 CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000 -CVE-2024-3102,0,0,b23588dfddb3d82632a71207907da6ef98bd35bc4bfa522f8686e7f4473229c0,2024-06-07T14:56:05.647000 +CVE-2024-3102,0,1,e9df25ed3802f47bc29a687ca00cb3b2cb390d516c3dba134f34552a1a2ff2e9,2024-06-07T14:56:05.647000 CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000 CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 @@ -251006,7 +251006,7 @@ CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad3364253 CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 CVE-2024-31033,0,0,4d406f18763dd0b76dcad0c910670ccd39d0be934836d2f67e309de926070782,2024-08-27T18:35:09.280000 CVE-2024-31036,0,0,c1dc30371cbc232c45ce2a1ab5b75a9f53a1a706550cc27b167d070e5b7d7860,2024-07-03T01:54:35.980000 -CVE-2024-3104,0,0,e1dbcea3b82583c3a8bb219203e646c341fcc97755b89e1c83328a1d4d36d637,2024-06-07T14:56:05.647000 +CVE-2024-3104,0,1,41146c1247909754b7117b96d31ac0fa7400b130cc37088b720587f5c2469ae9,2024-06-07T14:56:05.647000 CVE-2024-31040,0,0,8cff83beadb4c661eae93230dc1b40189dfecbc2297bd60a6380f76952c5534c,2024-07-03T01:54:37.220000 CVE-2024-31041,0,0,a2e5f2c50616130ae69bb4600fa3df33defe16f317b87e21856a1ac474301f96,2024-08-22T18:35:06.980000 CVE-2024-31047,0,0,af5d8fcf98f981a9f813cc3db6d53189749ea7407eeff6f344af923836b4a452,2024-08-01T13:50:42.517000 @@ -251045,7 +251045,7 @@ CVE-2024-31096,0,0,4270e5e66128cdab91811a0ce591a6eb33a08f957387696602f581ae0ed51 CVE-2024-31097,0,0,af09d47b9da9890511e00b9cb33e81e18545423fcf604be15b4f56a0320067e6,2024-04-01T01:12:59.077000 CVE-2024-31098,0,0,e24dcc12ec80ae731570328b821bd8d0791f13fa285e0f7e54914b36600e2ab2,2024-10-09T17:02:55.033000 CVE-2024-31099,0,0,528ba98d88fb34d8f61e8485a4326c059785e996c72869ec228c224daf695f3d,2024-06-05T14:15:13.310000 -CVE-2024-3110,0,0,635900212764359abe4ce85d386db98d21740945c63dc9266eccccde33b65fe3,2024-06-07T14:56:05.647000 +CVE-2024-3110,0,1,941507510a5619916ccbf8393eac1eb041a63ac5c15ffb37aea9308c4b7a05d9,2024-06-07T14:56:05.647000 CVE-2024-31100,0,0,304afdd26a02a950739edd8b75999107f4a6aad6e328c60a5193227610b72d07,2024-04-01T01:12:59.077000 CVE-2024-31101,0,0,96305fcd171442dea8e11cd23a5a7bd2566c43ec2cc12a4af1219603bf179100,2024-04-01T01:12:59.077000 CVE-2024-31102,0,0,8e5e714e276b93e223db917c5ec9f49c14e344993e513bcb552ebc988ac0ee39,2024-04-01T01:12:59.077000 @@ -251079,7 +251079,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000 CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000 CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000 -CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000 +CVE-2024-31142,0,1,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000 CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000 CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000 CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb6ee,2024-09-26T13:32:02.803000 @@ -251146,7 +251146,7 @@ CVE-2024-31210,0,0,b0e46d5b4baa43f78987151df0e853b318beb24abd17e30ac568abf41e4eb CVE-2024-31211,0,0,5776f1d62896fbb2a110a1583426cf9acba943a145073941e180c72507cce23d,2024-04-05T12:40:52.763000 CVE-2024-31212,0,0,22e6bca1dbc65019c8cf21786db72bb6136b951b36f2bde4a0f192d24409339f,2024-04-05T12:40:52.763000 CVE-2024-31213,0,0,8c8f923654eac3d46e24bbd123ab2aa12e7c351140423b5ae596e56edeeb16b4,2024-04-08T18:49:25.863000 -CVE-2024-31214,0,0,b238f7e7706abe44b8ba49fc97d8a9f5f03fe5a996990c1c8df1f28f1f7940bd,2024-04-10T19:49:51.183000 +CVE-2024-31214,0,1,bc1792e2a94cd05e35a253e4859748c4e2eb5ed1ea6cf10b82372828cf9d8c83,2024-04-10T19:49:51.183000 CVE-2024-31215,0,0,d365377438b6e1b1c8b969d4aa3b823375e4184d9da735ccdf37f09d2d50a74c,2024-04-04T16:33:06.610000 CVE-2024-31216,0,0,c9c608d394552c59258462934c3e6e5d09fa340875a3cd1bb5d0164f77a85d3d,2024-05-15T16:40:19.330000 CVE-2024-31217,0,0,22ee763d6d5cf3db48c84e1af4fee6d5e827a8ec5cea65b8d742e4d3f8aba432,2024-09-26T14:53:07.187000 @@ -251163,7 +251163,7 @@ CVE-2024-31227,0,0,76e8695a313225bb426234417ab01f16452270262da2fd1fc3a3ffe285222 CVE-2024-31228,0,0,b2f0f3065a2dc8e49198495610b46fe6416c64a6298c17a47fd8f9436cf17f24,2024-10-10T12:57:21.987000 CVE-2024-31229,0,0,7703b510137ceabc5c3af41e8c1539d1ef1860221aca398c46e0db27c88316b8,2024-04-18T13:04:28.900000 CVE-2024-3123,0,0,7969034960d8468f2e42c9820543aa0d78630ff8823b9e15099413e2773c7cfb,2024-07-01T12:37:24.220000 -CVE-2024-31230,0,0,488a28b56279e1f8fab10ed7cd43847eb05f6be01cdda9553584d94f8a1a86ea,2024-04-10T19:49:51.183000 +CVE-2024-31230,0,1,21a76e424b1cc961d5ad8645748c31202309643bdda16854e4fc93db5573ddd1,2024-04-10T19:49:51.183000 CVE-2024-31231,0,0,d3b3e21359bd0e3668c9e755ffa5fd9e29f53f11ed6835442e511e28914e78d8,2024-05-17T18:36:05.263000 CVE-2024-31232,0,0,918890e3fc99df4d5882ceb83e99b6dfccbb0729d1be8c1740984ea91e29443d,2024-05-17T18:36:05.263000 CVE-2024-31233,0,0,02effa9dfae9b4a35724c3dd14eceee469175bec04049b5be94c252c6ad010bb,2024-04-08T18:48:40.217000 @@ -251174,27 +251174,27 @@ CVE-2024-31237,0,0,5dcbe5dd041385424bbb72c7955f0157a269d36b03f21f2538d74caf01e5a CVE-2024-31238,0,0,ec4116449239167102f4e4644b9f392b618b94e1da13f10d0fe0c2fdc99128df,2024-04-15T13:15:51.577000 CVE-2024-31239,0,0,ffb90ef804b9c62d211b5d99a10b7330377554fc6a0c8237b919d504ba64b8cc,2024-04-15T13:15:51.577000 CVE-2024-3124,0,0,97a2eef0e603c1c236d01fe5052ce5ef193f73b3e84c36accd562b940b1e07e4,2024-05-17T02:39:43.733000 -CVE-2024-31240,0,0,266d6444ac2b04350a1c2aa773d032fbe9395db17283fdce6bdd004be66782de,2024-04-10T19:49:51.183000 +CVE-2024-31240,0,1,74ce12fd2a4575da4050f14708981792a3c28a888c5ae3fea2b6a99f7507bf4f,2024-04-10T19:49:51.183000 CVE-2024-31241,0,0,10c0d685ff7ef4ab6f3952443a613cb49ec065f944c2e7e93b2c5e3c84456713,2024-04-08T18:48:40.217000 -CVE-2024-31242,0,0,49ba26a59af8bb409e1c950e0e8a73428d316a8783fd9c4ee1094d2fcb13b360,2024-04-10T19:49:51.183000 +CVE-2024-31242,0,1,6e01938104e264047beef35b2530b2433a28befd78c705f8eda178decf479f8c,2024-04-10T19:49:51.183000 CVE-2024-31243,0,0,a4770b09224b27878d600ef478159922afaf0a3de1b14e00591285cf5dc6a658,2024-06-10T02:52:08.267000 CVE-2024-31244,0,0,2a410b2d2c4d07b14eaa7d1888986f3a25d1884ed48a2e19354efa2b399cb171,2024-06-10T02:52:08.267000 -CVE-2024-31245,0,0,e736cfe43bcd49ca5935c9d24ad7bd155165a06905550503e09b0ab4d8406da2,2024-04-10T19:49:51.183000 +CVE-2024-31245,0,1,9494828f7ed62996db86d58f22c317374ab4a0f02ae2927fe6308bd197a09e99,2024-04-10T19:49:51.183000 CVE-2024-31246,0,0,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000 -CVE-2024-31247,0,0,8bbc99c43f8e3737633a522b3db9397b4348dbfc851d17e37569d7dfdbe18a5a,2024-04-10T19:49:51.183000 +CVE-2024-31247,0,1,ccecdcd4d60867cc44b0f68ee01066e569d6ebe211a4fbbc8c94f5280ede9aa6,2024-04-10T19:49:51.183000 CVE-2024-31248,0,0,366b0e0ab5cc0e63b32a3ade56db4e5e4ebc4a5173ee310ed0de32257133820f,2024-06-10T02:52:08.267000 -CVE-2024-31249,0,0,876c0987fa04efa87abc6f1e45d9e5e9801b02115d1bc7adc99a1b16136af95c,2024-04-10T19:49:51.183000 +CVE-2024-31249,0,1,c303e93c7d1feb8f0499ce4b625c2c8fc9dc44bc2e75c2bd338f7ab1fdea1fd4,2024-04-10T19:49:51.183000 CVE-2024-3125,0,0,78ae7b76247fdcfaa00f4d4fa57053e68edc10f0c2d0c800767afda822154b12,2024-05-17T02:39:43.820000 CVE-2024-31250,0,0,1e8c8f3e227e8fdf738c50120ff46f1a018556e80e43dea48ad17c321cb951db,2024-04-15T13:15:51.577000 CVE-2024-31251,0,0,233132df7bfeec86c6a991a1a4f57f849ec8651278d756574df9c3de72878393,2024-04-15T13:15:51.577000 CVE-2024-31252,0,0,965b52dc8d01f956c4857ee50cf6b3b92f6737405b3407484989d7c892ea2453,2024-06-10T02:52:08.267000 -CVE-2024-31253,0,0,6b52348131a9e7ce2b8adb370f161aea89893dd5813b25e5b983c7817d6ac107,2024-04-10T19:49:51.183000 -CVE-2024-31254,0,0,24e58592379c28c2b551c365b7fdafd63367ef14b8d6cb3c58c2da4489d2f728,2024-04-10T19:49:51.183000 +CVE-2024-31253,0,1,d19fd06e65287972a19ef762e1610028f2cba2ba89c9832fddc959e8860f9164,2024-04-10T19:49:51.183000 +CVE-2024-31254,0,1,9c6b76f7ebe9fc7b91b62b2443c440cc43d51263d03dc9a548d4e6fb14c9b4bb,2024-04-10T19:49:51.183000 CVE-2024-31255,0,0,3d2cddef3b8b1d7c7cedaa6144b1351d4eb43ef35c8288872fd1da87a081d72a,2024-04-08T18:48:40.217000 CVE-2024-31256,0,0,e1758c95ee995220aaa5f334cb79e4078a558a549efbe76d6b7a3b8e4344bc02,2024-08-22T09:15:03.997000 CVE-2024-31257,0,0,20f99d882001029b94e1842fc3bbe92fa8538a136cbc4a91cbbf537ebbc0576b,2024-04-08T18:48:40.217000 CVE-2024-31258,0,0,f3b3ccc050f0a5372a9d95262c9af956f11f22014fa072b8aeffe2091af63aaf,2024-04-08T18:48:40.217000 -CVE-2024-31259,0,0,ea1e7b6cc0bccf92e4ec2cdc20023a4d23e9147355aa9d0576fa5c4e5578d805,2024-04-10T19:49:51.183000 +CVE-2024-31259,0,1,77300ccaea66c2af0ae540afb7fd1b7baa08605889014d8605c3ead18de543d3,2024-04-10T19:49:51.183000 CVE-2024-3126,0,0,a253e0ab2b4817e7bf4cf706df9a1e50c116e3f9a6a8dc30ad7cc480b207a23d,2024-05-16T13:03:05.353000 CVE-2024-31260,0,0,9a5b9fa4b62810725db0750870350c9cb7bd73dcc8d34493221c1e9c356dc899,2024-04-08T18:48:40.217000 CVE-2024-31261,0,0,6640f4bce650cce5eaa279985d87d7d0fcc4c5338a90c29e44594e6216ab4de6,2024-06-10T02:52:08.267000 @@ -251215,17 +251215,17 @@ CVE-2024-31274,0,0,fa5d9f1ca662b0b1e464b530fcc0f03986e387111d22edde79c2c2f1b1a13 CVE-2024-31275,0,0,7682d6d5fd048a2bbc4bae818804fe795d1c5280447fd90bfd5ffcc192a88cdc,2024-06-12T13:34:15.820000 CVE-2024-31276,0,0,ae47b2cc35305fc760e0d527f8f55057b05d3bc88a298a4460a6b7006d20b125,2024-06-12T13:34:01.487000 CVE-2024-31277,0,0,90727e16ef5368fdc0d8e5ebc7cf41442d44e7bd41306fefeba6d1763f484c93,2024-04-08T18:48:40.217000 -CVE-2024-31278,0,0,99539fa4535061c4d2fda496ac3752ed0b4376138a1e7871f7fe0781b18e573f,2024-04-10T19:49:51.183000 +CVE-2024-31278,0,1,431d47e2186afb044bc3273a3c0504e596db155e2326104c84e0cc39f7ecd222,2024-04-10T19:49:51.183000 CVE-2024-31279,0,0,c67c9a1db24319f785f0f8252053037f6648055bdd80772370585ebf8697eaf8,2024-04-15T13:15:51.577000 CVE-2024-3128,0,0,19492008a6f79fbe6cac89656117001be587337c6c9d61aa2464541181847147,2024-08-01T20:15:24.257000 CVE-2024-31280,0,0,267439ec57ba5318f063cf3fcf829d447aeb111673f40107e1e828d21337428d,2024-04-08T18:48:40.217000 CVE-2024-31281,0,0,87d47628ab655ff1000f52cdfb416853921ecbae978ad1765b22d83b58507cb8,2024-05-17T18:36:05.263000 -CVE-2024-31282,0,0,aba65d08c4a185cfa2ff69f48b94ac195c5c9afb9ce05f3577c61d1d6a607d71,2024-04-10T19:49:51.183000 +CVE-2024-31282,0,1,6c6585301ec480ed9d66b4069ebf0edd518ed06a485fb55d7887e7a6d2e903c7,2024-04-10T19:49:51.183000 CVE-2024-31283,0,0,239a7653d6d014a537c2fe7a564387624b60e8cb87a6883b7c1e4928b7de4a1d,2024-06-12T13:33:44.433000 CVE-2024-31284,0,0,ee54bd1bcb02188aa73d6883de1bdfc4f2f0c4cd76c6cb53f92cf403f54f0b35,2024-06-12T13:33:29.180000 CVE-2024-31285,0,0,21965380d7ee469cd2ae502ca2f2d3b31ad1e83141caaaad1ff739a18331a94d,2024-04-11T13:30:38 CVE-2024-31286,0,0,837152fd76f9763490ec0ed953e437014267d62e0eff628ac5fe303114eb8615,2024-04-08T18:48:40.217000 -CVE-2024-31287,0,0,605620c731f5b7d18c4788e52de48e671c454ea1a25c71849e83c4984c689a3c,2024-04-10T19:49:51.183000 +CVE-2024-31287,0,1,bb12ebdb045c796114c916dd1e21767eb673f8ed9ade30aabef841daebd02211,2024-04-10T19:49:51.183000 CVE-2024-31288,0,0,da49fea2de0d4b66a1ef11d35e44476bda0c7a6e35d7302a74c5470397ed2c91,2024-04-08T18:48:40.217000 CVE-2024-31289,0,0,8b89b92278ffb48e149f388c8a087d810f316b30f681a543eb9752df490c3159,2024-04-15T13:15:51.577000 CVE-2024-3129,0,0,5a0ea6532df816d930310021f34ecafb1530c53895fbb136509fd891ccf625f8,2024-05-17T02:39:44.023000 @@ -251236,9 +251236,9 @@ CVE-2024-31293,0,0,d20d156a0f8c87d673a5cdec66f54fecd5aa8889f6ab87bd7bd7bf0942a82 CVE-2024-31294,0,0,d0a7d4843372e24e4cc04ee14520ab11080aa2c28445f84ac289e01a70efb681,2024-10-05T02:01:28.300000 CVE-2024-31295,0,0,37dba956c7cb8ce01666b5ea152d0441b7649235a44c66cce9a88302fababc75,2024-05-17T18:36:05.263000 CVE-2024-31296,0,0,dd2f2950324e5c8dc05ecfdeaf16703477baaedac80f2e8ee5c00844b0d341be,2024-04-08T18:48:40.217000 -CVE-2024-31297,0,0,f6e46aa48a8ed8a8a82c7ddf5442e06c8e41c73375e1b3244f5db8687886d057,2024-04-10T19:49:51.183000 -CVE-2024-31298,0,0,dda9f3f202e377e9f1761d11c2441db365c8693e4f6f745ba0f776d6e9c6f84a,2024-04-10T19:49:51.183000 -CVE-2024-31299,0,0,aca7ef0497fb40d78b35790d70fe9cbc610dc230abd0e2789d14b8d189e98c40,2024-04-10T19:49:51.183000 +CVE-2024-31297,0,1,b990e076d29eacf537d3013958d22e65a535f4b2ab2eb4e7c11a0361758f2575,2024-04-10T19:49:51.183000 +CVE-2024-31298,0,1,56d601d42fb43985883cac921bd45eabace2cda03e3ad82376596945a46dade5,2024-04-10T19:49:51.183000 +CVE-2024-31299,0,1,010f33fb5c82a9e733d1333a64068a1d48e7daac055c076e4535e7c0a3b664c8,2024-04-10T19:49:51.183000 CVE-2024-3130,0,0,75017a2df259369261e5a52c618809b829fc653fb8fa673a868eb49aa2bf74fc,2024-04-01T12:49:00.877000 CVE-2024-31300,0,0,f62697b3c3c47a51136a685acf11c7d17c40402554c85590b7830d54b2463e55,2024-05-17T18:36:05.263000 CVE-2024-31301,0,0,a75a3f67027eb146f6da26f272c8cbfacc8c2a370f7c13dcbe8d267c40f619e5,2024-04-15T13:15:51.577000 @@ -251279,8 +251279,8 @@ CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31341,0,0,5aaf78dffb15cd0596772f3b638cf1d75ed75c34c75d3c33851be56a88b68600,2024-05-17T18:36:05.263000 -CVE-2024-31342,0,0,7d44e37f1dd23852a46d36dd6ad34eed75a709edbd020f32294b61670b9d0fb3,2024-04-10T19:49:51.183000 -CVE-2024-31343,0,0,6b4c5e5ce940c5e1dbdd926f9c69f881a51eb2908a748b1cb7422ed3fd7faf36,2024-04-10T19:49:51.183000 +CVE-2024-31342,0,1,e78d73a875462533f6bef713ec44068bb0f2a7602015533a8956ad1d42b612a7,2024-04-10T19:49:51.183000 +CVE-2024-31343,0,1,ba1424ab0a5ffd8e01ded13433042481bc92636fa977513ab86d1dc04411cb25,2024-04-10T19:49:51.183000 CVE-2024-31344,0,0,f083ab5503604ef0d5ba6594dcab45931771fbbe52edb43395b24e9f769cc5c9,2024-04-08T18:48:40.217000 CVE-2024-31345,0,0,efd121fca2cf9e02ee469ee1f6da7e7cce6c643125ed75b1884f5da12c06d44f,2024-04-08T18:48:40.217000 CVE-2024-31346,0,0,cb7517b65583f3c2e63409a32bd28fe09e55056f872306da8388757174acfafb,2024-04-08T18:48:40.217000 @@ -251293,10 +251293,10 @@ CVE-2024-31351,0,0,bcbac2112f543a47a582400e16158e61b20d74c688ac093896e1aaf7d5155 CVE-2024-31352,0,0,1efeab1b8ac23352d588e7c493517298cb74ce4d73067ae81649c047f0e64e13,2024-09-25T14:37:38.550000 CVE-2024-31353,0,0,e50827540a58fe3cd0fcdfc9ae9a072f34f1953d48a4cc1bcabca911b7d42b59,2024-04-19T19:25:34.677000 CVE-2024-31354,0,0,2021071244b49d04bfdae8f1fde1b120ffd4deb5b549bedcae3ab4e58eda06ff,2024-04-15T13:15:51.577000 -CVE-2024-31355,0,0,44ccad3b09c334b6cae7bae0ef859237dbf5b126bcbd1960091f3a7b56f3bd0e,2024-04-10T19:49:51.183000 -CVE-2024-31356,0,0,bee06d8946d74c76b4318661aeada01092efb70dd585c55eea3d8c8631e328a2,2024-04-10T19:49:51.183000 +CVE-2024-31355,0,1,ba2a9bc315fa121ce8fbe7f107092ed49c7375dc30dbdd9b5b18bab425f8a558,2024-04-10T19:49:51.183000 +CVE-2024-31356,0,1,7ca311b860c0241d8a4a54c9647c5e70310450c6ea14127578040fe584fabe29,2024-04-10T19:49:51.183000 CVE-2024-31357,0,0,a77e0c0176f9725a3b051f02b62fdfcb85797d6c3a90336954fbd64fa16132be,2024-04-08T18:48:40.217000 -CVE-2024-31358,0,0,5fae889a2f1a4419a6bb0f77c303af70b1398d306d18a78a38d0756c900916c2,2024-04-10T19:49:51.183000 +CVE-2024-31358,0,1,defeb8d5bcfa1089e3e3090b1aaf47cb176792ec23677ade36cf7f72529729cc,2024-04-10T19:49:51.183000 CVE-2024-31359,0,0,a39d13effd78d51159f5d971ea730778f7213d54b1fae27bc153c7c5285fac98,2024-09-26T13:58:57.017000 CVE-2024-3136,0,0,9defb35d78a1ad846aade8d10ee0a03816fd2fe81154510e12e54e5093ce3870,2024-04-10T13:23:38.787000 CVE-2024-31360,0,0,5a852dc895bcd69b0ae2da72441e8c7cb6a1f2794d7c7c78ff137dad8c94ad5d,2024-04-15T13:15:51.577000 @@ -251307,10 +251307,10 @@ CVE-2024-31364,0,0,f4efab9cbf628e2effd99c654ce118399c3fdabba5a12755e4be1fcfca611 CVE-2024-31365,0,0,fac5d7858ae00c4198bda4d0db7d42b586225a93755fdca53b6e65ea3f2d2851,2024-07-12T08:15:10.953000 CVE-2024-31366,0,0,b47ce1e5944acc104b31261b1d2b0ef3612c0c4acf6a31e3548808a0fc514a58,2024-04-09T12:48:04.090000 CVE-2024-31367,0,0,b374f26cec20164236f7ec1fa5284965a058f8ebf6fda2280e2a43d72f72b8c7,2024-04-09T12:48:04.090000 -CVE-2024-31368,0,0,d81547e87f140317560d7c81218530c023944a9a1ef60ff3332509b292928641,2024-04-09T12:48:04.090000 -CVE-2024-31369,0,0,9f39b112955fe8362b783166dc1bca06abcb3806949e7ebf01ba6176f7eda876,2024-04-09T12:48:04.090000 +CVE-2024-31368,0,1,cb114db2500b493657a4382ef2c0b247a3cc79ec1fc4bd6f1d5bd8c77d6819e7,2024-04-09T12:48:04.090000 +CVE-2024-31369,0,1,6b2dfa7365f0a2a5b38e79e27644e579f0ab246cbd9d598b90a8d9ce784c7175,2024-04-09T12:48:04.090000 CVE-2024-3137,0,0,fa5a7213d994af8848011fd8855cef06f14f4f8cca16de250ca6b363a2911c4f,2024-04-02T12:50:42.233000 -CVE-2024-31370,0,0,ec3b7aff3d99da746f55f7ee0139579cfdd81d41aa5eb8e4f5e7016f4f90708a,2024-04-09T12:48:04.090000 +CVE-2024-31370,0,1,955c409c2001600f70bffc20897a73d135df4b598503ae506c6ec80ba8a33e3a,2024-04-09T12:48:04.090000 CVE-2024-31371,0,0,64967e4236805bdf6602df9cc2f80a3d56807b407361e3582a72119abc6fd5d1,2024-04-12T12:43:46.210000 CVE-2024-31372,0,0,b2a0806f3784199ebb8ca4ee6bdfa88231dafc1b014fcd9be21536f29b44f9c2,2024-04-12T12:43:46.210000 CVE-2024-31373,0,0,e93755fdae0b773836511ccaa2fb2b4f529340ebe5f2e86515ff9bfc4712e106,2024-04-15T13:15:31.997000 @@ -251327,7 +251327,7 @@ CVE-2024-31382,0,0,55e0620b5b0279ac0a2bb51ea72874c14f8516886940b297f7110d03f735a CVE-2024-31383,0,0,48340f427b746833cc0f7109feca4b8c2b4ef5e27f7db3904372a76af6fbd2dc,2024-04-15T13:15:31.997000 CVE-2024-31384,0,0,21b55e70242a0485f8096870fcf8cbf83f19ce29290380a04b082c35e0a1d65d,2024-04-15T13:15:31.997000 CVE-2024-31385,0,0,5aaaf4eee573f4d1c577921f23575d3f47968d5c800c9f45db9647ef572745bb,2024-04-15T13:15:31.997000 -CVE-2024-31386,0,0,41965183add145a10510ad1c8f7c69efc82d2ecba3068bfa4712332489bd3ca0,2024-04-10T19:49:51.183000 +CVE-2024-31386,0,1,8a7316de526f3a28a7dff381460c2225ddd3fd392a1bad901120281a02ee810c,2024-04-10T19:49:51.183000 CVE-2024-31387,0,0,798fe4733ef2a7983273fa73eaf6e68a211e41dec1cc183fcbf026aa5838ee93,2024-04-11T13:30:38 CVE-2024-31388,0,0,8a50a377c36d1f91d8a611e511b65b1870697e2d4b1dfde267896125615972de,2024-04-15T13:15:31.997000 CVE-2024-31389,0,0,82ed0284dd4429db7c8aa9d21d25225a2ef36c52331bf0f8fc976b267cc1babd,2024-04-15T13:15:31.997000 @@ -251401,7 +251401,7 @@ CVE-2024-31460,0,0,d0f87796e3480e782ee350f043bd76f13dba438ed1e4f86fc50430f69c655 CVE-2024-31461,0,0,89c0404e39ae043a5a2451fec00cae23e99dd702eb06025941a986e54ccea4f1,2024-04-19T16:15:10.293000 CVE-2024-31462,0,0,f88160a5b42ec3491b449422d78dba2a9d812a092e1789b6180cd2d0296f82a1,2024-04-15T13:15:31.997000 CVE-2024-31463,0,0,bca1ebcbdcf673b9729d2dd40fc8904b85736c9ef019e0645132086ce7dad499,2024-04-17T16:51:07.347000 -CVE-2024-31464,0,0,6162e7d05c889d226660855370d6104e01dc181bced7170d7d50e81e62aae354,2024-04-10T19:49:51.183000 +CVE-2024-31464,0,1,ce79820aea53a1ea50d54ee0e5f69a34d3fe57991a1ef4f9e5f3cc09d589d0f6,2024-04-10T19:49:51.183000 CVE-2024-31465,0,0,ee69308630c1abdd27683ea1cdf712038995cf12a5a5a27e338e410e1c764a6b,2024-04-11T12:47:44.137000 CVE-2024-31466,0,0,c7231c8c97f212df84a2794b95dae43c7f9a903f4e6427747b4c715d2041e517,2024-07-03T01:54:52.503000 CVE-2024-31467,0,0,10552dfb42cae2bbdcd31dc134265bd269d0213f334bd2ecd852194c6ce3e571,2024-07-03T01:54:53.180000 @@ -251437,7 +251437,7 @@ CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79a CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000 CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000 CVE-2024-31498,0,0,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000 -CVE-2024-3150,0,0,69195bb0268f0d9c44b64d544ae820662fe7bc6d09e60627c417b378085c3c15,2024-06-07T14:56:05.647000 +CVE-2024-3150,0,1,b97a8815b56839d2226aebb6cd7913d84c716ac8c4d2225d62974de2a6c38871,2024-06-07T14:56:05.647000 CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000 CVE-2024-31503,0,0,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000 CVE-2024-31504,0,0,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000 @@ -251445,7 +251445,7 @@ CVE-2024-31506,0,0,eb9d067c38ce54e37842aafb28e6ee16ef90a41330c8823e136a3a103ed0b CVE-2024-31507,0,0,11838ac73f4b8ea141494dda45bb54b02e15aae2460bddcbc7e30ae4080ffa17,2024-08-01T13:50:56.497000 CVE-2024-3151,0,0,fc3a1e9307fa41cbb3a17517dc43b84b5831b8d6ca8f41e4ebe4bed1f34c8048,2024-05-17T02:39:45.290000 CVE-2024-31510,0,0,2ab08923e55b765ff03b9ec06ce50479208e1bb469f6adf849509f8193855a50,2024-07-03T01:55:05.800000 -CVE-2024-3152,0,0,d2b4599c6af8d31eb382b97662107a83ad159f77d5188696950d6fb31b3dd36c,2024-06-07T14:56:05.647000 +CVE-2024-3152,0,1,cc0da0d6fd537b07c60e5feb3afca7646e06f3fe6e54f30d06b66fb077d4b83e,2024-06-07T14:56:05.647000 CVE-2024-3153,0,0,1ede64fb1f2e34455de0a666adfb2ce94ebfc12327391a56f67af2fd7f7aa971,2024-09-20T13:15:04.307000 CVE-2024-3154,0,0,87d31064f84d0b49c9b2bbb21741023fe7a0e7567d9fcfe0214d10223259ff02,2024-06-05T17:15:13.777000 CVE-2024-31544,0,0,2535e66e98db21a02bea52017d819e1d7e0893ffb53b2843edb9987a766eaf9f,2024-07-03T01:55:06.580000 @@ -251505,7 +251505,7 @@ CVE-2024-3165,0,0,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdace05,2024-08-20T16:35:08.810000 CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000 -CVE-2024-3166,0,0,2118d9d21001c971cc655ae0425738c34bcbaa36794043093e86cc4003bdc260,2024-06-07T14:56:05.647000 +CVE-2024-3166,0,1,04937860c731b46e9c6b95e68f13e5f7d601593cff28a841df90efccab79ba6d,2024-06-07T14:56:05.647000 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000 @@ -251603,10 +251603,10 @@ CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7 CVE-2024-31868,0,0,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000 CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000 CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000 -CVE-2024-31871,0,0,7b402a738ae8306e1005160b5cd3c0ef58a4e7f0d19a95a39021f1b2af76b2f4,2024-04-10T19:49:51.183000 +CVE-2024-31871,0,1,e284e485f6f33109f328b7bdefb50066e4ae8d799f85dfa5af29de93c8e9ffe1,2024-04-10T19:49:51.183000 CVE-2024-31872,0,0,3db97c936d679b09f7c0cbcf4407389ec3057292bdc2f2624578bc78bf289dfb,2024-09-20T20:15:05.120000 -CVE-2024-31873,0,0,24abe7baa992592d6db6d5399b8a686299aafff7ea0d5cb35804d3dfc3e91db4,2024-04-10T19:49:51.183000 -CVE-2024-31874,0,0,e7d8855c4e811764eef94dcfa7dca9ed011409e4b80758da69813345c8ab3557,2024-04-10T19:49:51.183000 +CVE-2024-31873,0,1,243392c4bb786066b763a36ee3e51d907c83ac391ce7b92963d2305e593579ae,2024-04-10T19:49:51.183000 +CVE-2024-31874,0,1,2aaf0dfaa6414e1f138855d0f6d75787313d073eca635397ca103ff7f6449a9f,2024-04-10T19:49:51.183000 CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000 CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 @@ -251659,8 +251659,8 @@ CVE-2024-3194,0,0,6b1470c417346e1a73bdfdb1cabcd38b4a212466600a549b76d8a9cff41c93 CVE-2024-31940,0,0,c7704ffd92424a494f09ba3055365e56646b7f0cde4fd45d589cbf5f939c07d5,2024-04-15T13:15:31.997000 CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58a1b,2024-04-15T13:15:31.997000 CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000 -CVE-2024-31943,0,0,a3c3177de375490a3bcbe7c4dc869c6dc98de8408de3c26e8167121dc5553a55,2024-04-10T19:49:51.183000 -CVE-2024-31944,0,0,9b7df1c1d68c7ba82d2a7e14fc250e4409e7410da01d69528d57b3dba1022b40,2024-04-10T19:49:51.183000 +CVE-2024-31943,0,1,56cdbf200aa11a32766ecc5507b8a2e7a0c7f3e429e59b24bdd1e94f41929256,2024-04-10T19:49:51.183000 +CVE-2024-31944,0,1,e69264ce6e3b6306dced0b00105f74916d6ed9b25ae35aaae2c1582b163be752,2024-04-10T19:49:51.183000 CVE-2024-31946,0,0,d96d722cb390b805e089cc7f5547ae66b90cd8ed2ef9c749ee5feb0215341870,2024-07-16T13:43:58.773000 CVE-2024-31947,0,0,e00380625c87db2df939d886c81bf82791ef4afaca372c3fd2b9b85dcad2f71b,2024-09-10T16:34:14.823000 CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 @@ -251688,7 +251688,7 @@ CVE-2024-31970,0,0,dc760428323022074304e6c9bb04a280cd725057b022c5a2ca8dd65247ed9 CVE-2024-31971,0,0,387ba33829419cec82187319e9faa2fa937d66440c18184b3edb83bc28249b00,2024-07-26T21:15:12.610000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 -CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000 +CVE-2024-31978,0,1,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000 CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000 @@ -252134,7 +252134,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000 CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000 -CVE-2024-32608,0,0,cf33d63475826dfb7ea57de89219ad623b8cd08dc6fa4282535d285e964710e2,2024-10-10T12:51:56.987000 +CVE-2024-32608,0,1,c0fd4562891715900c2f3bd98f362b2b8a1f5d72b4e3db8124bf92d027911151,2024-10-10T12:51:56.987000 CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000 @@ -252353,7 +252353,7 @@ CVE-2024-32826,0,0,11f05b3c83d6184cc96fd512c1769469b7cefd38c7f23415c4a08ef6c17a1 CVE-2024-32827,0,0,358dad019fd6297e7aa5ec7d05839f840023204e330b96f0efa589c0c28678a5,2024-05-17T18:35:35.070000 CVE-2024-32828,0,0,088fd637b4ce92646c80790f170bfe97c138a5522f7a065ad18b4b9987a8f01c,2024-04-26T12:58:17.720000 CVE-2024-32829,0,0,cc2f93f69a5a4bbf998cc1b0d258a659722214b53a5c71590aea7189890ce6e7,2024-04-26T12:58:17.720000 -CVE-2024-3283,0,0,4527e3b62e9ed93209c07e6b44e5354f667f773cdf226e52fd01fc547ab5a6e2,2024-04-10T19:49:51.183000 +CVE-2024-3283,0,1,2657d29f1560341e1c8ffe2b9ba62b8268d8a52ac9749d3033ea3055cb781e4b,2024-04-10T19:49:51.183000 CVE-2024-32830,0,0,7d0136a783c3f7436ea92a398cc8e0e0d1dbadd34d72ff5fdd0bbe8aac9ce7f5,2024-05-17T18:35:35.070000 CVE-2024-32831,0,0,dd34c02a4457d00f6b016e8508ff74cb646c9c29358d724cce0b51ba84413a7c,2024-05-03T12:48:41.067000 CVE-2024-32833,0,0,b251b4f8fe4dba495c950e90dbb25a178e9b5789b8f999b1d382e6170a624503,2024-04-24T13:39:42.883000 @@ -252391,7 +252391,7 @@ CVE-2024-32869,0,0,69becb8131b51a67986aa1e24b4ccea1d69cd7e659280280f6d26b43d75df CVE-2024-3287,0,0,81c3e92cb525adf74a229ae8f4dc096d97ad8021a63134e1a741f1327c99a33a,2024-05-02T18:00:37.360000 CVE-2024-32871,0,0,c0389a284947a3f025a08761a37fdb67fc665da6d219972d0c888cc5d32f0801,2024-06-10T21:07:12.030000 CVE-2024-32872,0,0,dd2fffea9672a216dbcdde4c4a274554beaeb36e5143b921e2a822ba0dc44c31,2024-04-24T17:16:50.397000 -CVE-2024-32873,0,0,1810b44d220bfe1042cbb8fe69f4633a819151f2765300799c800ad25460e3f1,2024-06-07T14:56:05.647000 +CVE-2024-32873,0,1,f3739c2039d9173c83006ce7450adea489a507dec59c17c0ec72c42eefc719dc,2024-06-07T14:56:05.647000 CVE-2024-32874,0,0,addb84ea881ea0feaefba19978b4f9ede845534ba6243cf8c5e6018bc364eb26,2024-05-14T16:12:23.490000 CVE-2024-32875,0,0,40aaa75f1201e42c5f0849be8614c0a4d622893733a69b13d08c130e0c9a1074,2024-04-24T13:39:42.883000 CVE-2024-32876,0,0,8a2a937b5bb789a06f1b910a6e7251f42791b60b4d46c3846bf785e13f1c5823,2024-04-24T19:58:40.710000 @@ -252509,7 +252509,7 @@ CVE-2024-32989,0,0,930c4066a7d7ffe138e3e94b521b0b534bff3256282035d886a74b2481f43 CVE-2024-3299,0,0,0bc35e84cd3916be2956d4a01095bdb7e2b9b6d734c61138badfae1815ded68d,2024-04-04T16:33:06.610000 CVE-2024-32990,0,0,607a844a443436b08aef466ece55b1538e8a6d0a1b28dbec933a97a59ccf5c62,2024-06-14T08:15:40.410000 CVE-2024-32991,0,0,271e43465218a9e731a0131d4b210058cf41277ab25b6e20eb7ba43f2853081e,2024-05-14T16:12:23.490000 -CVE-2024-32992,0,0,175c2df5fe8ef39f0066b69dcd68e6fa9c741d788514122a8fcba2031a5d9339,2024-05-14T16:12:23.490000 +CVE-2024-32992,0,1,36d054fd67caa35b4ca561f8000b21bd7928b3cb49f5ce17ef28a1a47c25dd74,2024-05-14T16:12:23.490000 CVE-2024-32993,0,0,b8a33162233b1b5747ab6e443f595c0be1a22146bffb2b55613980b1d7c59187,2024-05-14T16:12:23.490000 CVE-2024-32995,0,0,b8cd90d0c9cab41fb0b475e48104c7a9999e6a75de6dbec788fe6f99ae3fd950,2024-05-14T16:12:23.490000 CVE-2024-32996,0,0,6a6a4925b9da1cbf303f0982fcddc2dcb13b9c9c35d36d94c320eb75a9f86e71,2024-05-14T16:12:23.490000 @@ -252555,7 +252555,7 @@ CVE-2024-33043,0,0,e440b5c9b2a1727157025810ce1b92ddb45351842873f98e286f1378d612b CVE-2024-33045,0,0,c750be85f91783e59cd18e60c65725c2f8e2b0f2771fc29ca9f691ba1ec0dcfe,2024-09-04T17:20:55.297000 CVE-2024-33047,0,0,cb0eb88ac7f41a9c98cf0d3c8ebd2b1f66d8a5c56732d8ae21823446d39c74ab,2024-09-04T17:07:31.877000 CVE-2024-33048,0,0,f9f67875b847da24eb9cf137e9f097d769cd7f8f3d65d24eb4619818f972d900,2024-09-04T17:20:01.083000 -CVE-2024-33049,0,0,2e1babfebafedefddfd760c89a1996f1cbba6d77030dae6efa6469ddbfeeca56,2024-10-07T17:47:48.410000 +CVE-2024-33049,0,1,71da01c241f15add71d1a759ace84918d5eea4175d42f46d556182f0c8582df5,2024-10-07T17:47:48.410000 CVE-2024-3305,0,0,60cb4bdd6aab216e8dcee2531752f4a05622ff14e3e073fcab37d9212a2d0cdf,2024-09-19T14:44:28.980000 CVE-2024-33050,0,0,90923f1d1865d88057676c94e2b893aea7270f8731add142aed38ad6597070db,2024-09-04T17:07:13.930000 CVE-2024-33051,0,0,1fd409b2ba830a4d68baa6f497a6e4704a55e16bd6f855473d9753382be831b5,2024-09-04T17:18:10.950000 @@ -252564,14 +252564,14 @@ CVE-2024-33054,0,0,67fa57bf4b27f2520026aaaf6b13807e21cefd1307528e92c6c6a61d930ac CVE-2024-33057,0,0,fc38afeaa7486b0a5aebc4f1315319ab783e3abf0a4193027aaf853eaf32aed0,2024-09-04T17:06:24.843000 CVE-2024-3306,0,0,395196a450f14ac42a9c4c7d5b943f8723d96e3f07723d87dcdff36c939bae9a,2024-09-19T14:43:51.830000 CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b78e7,2024-09-04T17:06:08.407000 -CVE-2024-33064,0,0,228128f90963d46123df5a5b347351e11e02ada564091a98475b966cc3c6d223,2024-10-07T17:47:48.410000 -CVE-2024-33065,0,0,7cc922b8b1a1536a12feb68791c0192eb5a4983120ef1978a90a2b8fd31156d6,2024-10-07T17:47:48.410000 -CVE-2024-33066,0,0,500b4f07263ed26a673c94cfd0e292d68d478540a84d1cccf446d4ed947437cf,2024-10-07T17:47:48.410000 -CVE-2024-33069,0,0,9367a87106fa115b8f6225e09ff6355a2b518a5f660e44051bb9105cb38f6b2f,2024-10-07T17:47:48.410000 +CVE-2024-33064,0,1,921f5da91eed3091dbd586d1060b800ed6c9dddd45445ffc3eb913ac2685016f,2024-10-07T17:47:48.410000 +CVE-2024-33065,0,1,50b4af6b1d44ff423829cde512b5fce38cefbb43565c84602b50d819dfc1024b,2024-10-07T17:47:48.410000 +CVE-2024-33066,0,1,1498daa4b921b5d544c0b8f9075edcd0389cf0fb42d8f11d045946b476a13641,2024-10-07T17:47:48.410000 +CVE-2024-33069,0,1,1d7ebfdd2cffef492434c98b2f575069de571099d2261b7b1c1bc9ae2430600a,2024-10-07T17:47:48.410000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 -CVE-2024-33070,0,0,56ce988beab18b62f70a06c739c733690c352c16c0ee657ab282304c647b52bf,2024-10-07T17:47:48.410000 -CVE-2024-33071,0,0,44d91ab57f63a95cc678d1164e0d1ac8f223504ab76dca321fe1de00888e66d5,2024-10-07T17:47:48.410000 -CVE-2024-33073,0,0,3a5028839da63567c5aefdf658815640e1117880c3bfc29975a7a34861f16056,2024-10-07T17:47:48.410000 +CVE-2024-33070,0,1,8e57ad84e2b4ed780e184f25bbe1055d46f516edeac79e9dfe72500229e82f5a,2024-10-07T17:47:48.410000 +CVE-2024-33071,0,1,7f31f3f24b86fbdb95f03551e9778a5397debebf0b126b87c83ea1197649bee9,2024-10-07T17:47:48.410000 +CVE-2024-33073,0,1,e15e48d18a43ec80fee2a3244f3cd314569b64e31e44e6b7928225d0edcd38b1,2024-10-07T17:47:48.410000 CVE-2024-33078,0,0,32899b4391f10b7cbfcaee5abff907eff95c8894218149b7342d82053a7e337b,2024-08-01T13:51:41.723000 CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610fc,2024-05-02T18:00:37.360000 CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000 @@ -252605,14 +252605,14 @@ CVE-2024-33155,0,0,e4ad5d640ecdba746dd1a49f46932097b92ddfffac20cb1d78f4e9e96f338 CVE-2024-3316,0,0,568bd11f0bb7e649c75c74f18b2a1011d2a1719ec9cf7cb93a129817f052dd3c,2024-05-17T02:39:50.603000 CVE-2024-33161,0,0,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8aa28,2024-07-03T01:57:34.540000 CVE-2024-33164,0,0,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000 -CVE-2024-3317,0,0,15025142ba0ff8fc3f744db50ac9158b6bcb9b6d5a57142218ea92afecce54a1,2024-05-15T16:40:19.330000 -CVE-2024-3318,0,0,71502ae7f4475eb417a0f66428af131ecf9e20dfbae9cc78fb40285e74c55810,2024-05-15T16:40:19.330000 +CVE-2024-3317,0,1,eb8b8ab2d0a3288cd9b98a61d4c1991b74ba94e58f26c261ca7eb5b31f9e27ad,2024-05-15T16:40:19.330000 +CVE-2024-3318,0,1,7adf2382e18105f64b401f0b4507a4a5a0e15a5be5b44bc1b3b078cec2c84cbd,2024-05-15T16:40:19.330000 CVE-2024-33180,0,0,7143cd6c9ae742d835796e137ba7151af367770b1dea0fe456c6afd2e747d492,2024-08-01T13:51:44.097000 CVE-2024-33181,0,0,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbea01,2024-08-01T13:51:44.900000 CVE-2024-33182,0,0,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000 -CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000 +CVE-2024-3319,0,1,158d523f4b4278449eb505d443711326036725edee1f3bf66f060fea5f4e72ad,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000 -CVE-2024-33209,0,0,5e277af6b9d931ad6eabe363fa022e3e28565c9bdcab54cd28cbe12498341aad,2024-10-04T13:50:43.727000 +CVE-2024-33209,0,1,ac059f47fe6be1bb58ede6494b10e4f909701600addafff9d3b36e213f3ebc5d,2024-10-04T13:50:43.727000 CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000 CVE-2024-33210,0,0,a4330105a4d6b07d9316e6cba604bab6a3559db00469caeaea106e3e51ae6801,2024-10-04T13:50:43.727000 CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 @@ -252623,7 +252623,7 @@ CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979 CVE-2024-33217,0,0,931f6caed27deca16afe48992fe19ff3bc360241c91b6cd818528eeb486c2c41,2024-08-07T16:35:04.690000 CVE-2024-33218,0,0,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 CVE-2024-33219,0,0,88db41ff645af4eb9aa3c0f9c25ab5a9fdf513c3fdf3a77e4c6808a67dc97b30,2024-08-20T15:35:08.557000 -CVE-2024-3322,0,0,e55b514365f4edfd08d32461dca85dba678afa08e3277cfa12a38dc6ce7e86b6,2024-06-07T14:56:05.647000 +CVE-2024-3322,0,1,6147980d29bf80cf73d70b09724819aaaccafdb583bf7c36a80c60dc305d7ecc,2024-06-07T14:56:05.647000 CVE-2024-33220,0,0,94878fc1442fb742de617743986fbb0ae7d177efb074829742c5a4e187579f4f,2024-08-15T17:35:06.067000 CVE-2024-33221,0,0,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d630c8,2024-08-01T13:51:48.023000 @@ -252990,21 +252990,21 @@ CVE-2024-33809,0,0,edff1298649e2a5ae7152f9d6f3a259aa8604676595abb8c1afc89471f835 CVE-2024-3381,0,0,54f1490359f84b37b9085d1c2a64f460d8cc1a4d213b5755f1dd6de7bae13285,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,adcdeae3e10f55dde9495eab227d9025be9fe2ba917a78b853c52158eb7c3f74,2024-08-29T20:36:43.600000 CVE-2024-33819,0,0,19b18444fa7bef054ed44e8de2b65426fb809ecbd1d9e5fc73fb4cdf20d623c7,2024-08-01T13:52:08.333000 -CVE-2024-3382,0,0,25fab866f7d41fa7f3333e3c12ab26d2310ad4bfdd8a7474e8bad2594b14ae74,2024-04-10T19:49:51.183000 +CVE-2024-3382,0,1,38f2dfbf7a7afdf47aa4000bd2e48b18e37e74a1d54bf6b7641d569ca5945fe5,2024-04-10T19:49:51.183000 CVE-2024-33820,0,0,1f4676a068bf8eef81b801f6edfe98ebc1889872789d97021fd443221fe898b4,2024-07-03T01:58:53.933000 CVE-2024-33829,0,0,82376f1bb7b84688541c346599e7ab08e78978ce19e0fd4a8bd452996459b714,2024-07-03T01:58:54.750000 -CVE-2024-3383,0,0,b925d2ec87c40de8275aa49df372bafd6f622162d373f921659afbf38321adad,2024-04-10T19:49:51.183000 +CVE-2024-3383,0,1,3c46c35237b6b8da113011249edf6bdf09b3271ea4cf93d933abac640b1605d1,2024-04-10T19:49:51.183000 CVE-2024-33830,0,0,fc6fa18894467c83b0848443851c7e78f7eba7d19fa4f8b67e04a58cc8829d7e,2024-07-03T01:58:55.540000 CVE-2024-33831,0,0,91e2a95f17e19760b86b81244b402977c638bd6085319805d6a4540f23f9d8e6,2024-07-03T01:58:56.317000 CVE-2024-33832,0,0,7b3e27b34a81a08591742eaf0380d56875457acf0d341656accd4bb7693f1793,2024-07-03T01:58:57.087000 CVE-2024-33835,0,0,cffd31db3df6261e091005d9fb36253e75a61316a58e0e89b08946054d5f55ef,2024-07-03T01:58:57.853000 CVE-2024-33836,0,0,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd0584d,2024-07-03T01:58:58.623000 -CVE-2024-3384,0,0,e40494f4cc79f184423be7640904e779411ddd60482c02e316992b67bcd78eae,2024-04-10T19:49:51.183000 +CVE-2024-3384,0,1,33ed8a9b90c40e96b75f14fe8294eb711c952ea8cea04cbb80ac233e0827018c,2024-04-10T19:49:51.183000 CVE-2024-33844,0,0,5ec71d8512f2265bcb8f71bfb71499ff33cd9dfb829f2459bd57512bb7f17072,2024-08-06T15:35:14.480000 CVE-2024-33847,0,0,ae667fdb2032f21fdd40b0d89c1bf951a08b3c40e1bf80331cebce5a8e5c826d,2024-06-24T19:26:47.037000 CVE-2024-33848,0,0,69c0f4a8be4c8d5c0399959bef7d530406c623ab26c3f10eeeec98ba622818b1,2024-09-23T14:43:46.237000 CVE-2024-33849,0,0,711285af88da51034d770e4f7dba4f259d947b941ed83e4d1af2a2b96823faae,2024-08-01T13:52:09.410000 -CVE-2024-3385,0,0,327b76cedb073b60c4f8c3e90737eb0ba35715647736f9323adf15afbb307026,2024-04-10T19:49:51.183000 +CVE-2024-3385,0,1,03cc8ffda52ed4e2edaa3b64d6bdd7f374b9f551bbb95bbcd327b07dd9ef471a,2024-04-10T19:49:51.183000 CVE-2024-33850,0,0,95f27d9d9e057348262bcab0b02347c6a14020e669eb08e0851a75b104d83e3c,2024-06-11T13:54:12.057000 CVE-2024-33851,0,0,6fe0c9fc7bc19efc32ba623306eecc7b17efe8e6591ad62c2645cb513a9705c0,2024-04-29T12:42:03.667000 CVE-2024-33852,0,0,a5de2c209fb86af39aeec67eb4ad30a500b196fe1f95932bdf5d894564bf2750,2024-08-23T18:46:51.787000 @@ -253014,7 +253014,7 @@ CVE-2024-33856,0,0,e1bc615af0caf524dcab77cf6cf6563129862468d325102417ce19fd73712 CVE-2024-33857,0,0,b9573703f999cbfa64c65ad4975e76915087495646b59661c3236ffafa92c9ce,2024-07-03T01:59:00.423000 CVE-2024-33858,0,0,b8a7f820dff1964081294a7545b9b29623794842450790b9d58fdec268c8e9d7,2024-05-07T20:07:58.737000 CVE-2024-33859,0,0,a035f681e7f80f595f88b967d29a5f05dd1a79b5124b477a927d66df06ebb732,2024-05-07T20:07:58.737000 -CVE-2024-3386,0,0,55be8776c8d6ed25a999fbd1716d3ace4b9c58c2791eec3be5050a42a14547df,2024-04-10T19:49:51.183000 +CVE-2024-3386,0,1,78947fe11ea6414fb3fc000a49c712c3e38d8d150c279ab1b4251e791e79ef5c,2024-04-10T19:49:51.183000 CVE-2024-33860,0,0,4edc8dec2f427c2816a0216d7c9e23f7b50c2414633de446e641048438fa012d,2024-07-03T01:59:01.367000 CVE-2024-33862,0,0,f8e6fbde7d91036c44b60868b8695e843586dd830cfcecb85ff8e5cdfe99ca18,2024-07-09T16:22:35.020000 CVE-2024-33863,0,0,c260069bf74562524b59f29e5ae47ab85abe94da31d2a1859218017be058cb0f,2024-07-03T01:59:02.140000 @@ -253024,7 +253024,7 @@ CVE-2024-33866,0,0,d5c0ae9c1054b27c6d97a10401ff0b5290f4f00dd396ff666764314ce3a33 CVE-2024-33867,0,0,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000 CVE-2024-33868,0,0,a040237e401755b6e7cf08ea98d144311aa33b6e7bad9424eb98907745e6b269,2024-09-15T19:35:03.093000 CVE-2024-33869,0,0,4f0b8e6cca6f9d32a51fb68c703d08999317fde4e1158f2e4b634052839b13af,2024-07-05T12:55:51.367000 -CVE-2024-3387,0,0,b6c52fc8bd53ed03dce6ce87fb2e3918fe997bf17bb459dc0ae53a4015a8c210,2024-04-10T19:49:51.183000 +CVE-2024-3387,0,1,5fff34d5a94da2ef9e974ff962e10f544b17f2456fda9d5054eee7f811dd1ba7,2024-04-10T19:49:51.183000 CVE-2024-33870,0,0,6aab1c2dce9666081caef7bc83c709784103f6ae03f40bf6f9b61a08ab839221,2024-07-05T12:55:51.367000 CVE-2024-33871,0,0,6ef1078e0ab851992d6f76ec41fcc0f1160d67fe72b7159cf03aaec7c63364be,2024-07-08T14:18:32.130000 CVE-2024-33872,0,0,1d431ee562aada863536cfe9f8a510d77a4e7e9b56e0c5a0629ef96f2e0cb757,2024-08-20T18:35:05.357000 @@ -253035,7 +253035,7 @@ CVE-2024-33876,0,0,a3d9f2af701b9fefafa7b2161278e52edc6d2a1278c90424e3c359f2aed0d CVE-2024-33877,0,0,b4f1b95444f84dfcef907af7774009cf66d9af779662daf465f9739beafd3f6d,2024-07-03T01:59:06.870000 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,a2e90836d222ca0b4ef7793d35cdf806e54f0108df2e23c18454cd2727a93dd8,2024-08-01T13:52:10.267000 -CVE-2024-3388,0,0,f9348ead8a3a762ea5fd0f8418a8f813f393ecc8879c92bbb9d8bf44e11787c1,2024-04-10T19:49:51.183000 +CVE-2024-3388,0,1,4a843427750c1dcf903d48792a19dd7dc90c06c4102612421d30e5e651d1b664,2024-04-10T19:49:51.183000 CVE-2024-33880,0,0,bcb151ac36e10d12c5d5d00d4ca8fc6bf0944d42e8b79463d3142d311e3127f8,2024-06-26T14:42:00.533000 CVE-2024-33881,0,0,4e7f6b76944816df7111a0042ddc293fe80c7aa1e0d5cfbefd81cc009c78442f,2024-09-15T20:35:01.863000 CVE-2024-33883,0,0,17dc0e905e19f7ba35c55f2bf6a3e6826331627411f3c0ad10d5ffc69e46f693,2024-08-01T13:52:11.050000 @@ -253210,7 +253210,7 @@ CVE-2024-34075,0,0,5da4b38afe940e30356d7f8cfc346d6566a1ba741dea8ba465506ec525937 CVE-2024-34077,0,0,31442e851c955aa9945f0776918b7a4c11f8d38adcaf71b61df52b286a466749,2024-05-14T16:12:23.490000 CVE-2024-34078,0,0,9dfabba0f15cfcb159383479a7fa78dc12060b0d38698b03def607cb1411276a,2024-05-06T16:00:59.253000 CVE-2024-34079,0,0,047b20d453ed22b2c9238a036a318cfab2d6390422d9ac0a43a87d01bddd47f7,2024-05-14T16:12:23.490000 -CVE-2024-3408,0,0,067fa20c1c86a0b7e827afccfe5101f5439cb485c499f43c28b8bfc6d472715c,2024-06-07T14:56:05.647000 +CVE-2024-3408,0,1,324428315bee45d3aafd518b2834d944210598288988c14ae075750a99213d2d,2024-06-07T14:56:05.647000 CVE-2024-34080,0,0,04e7d157cb56563e9b6ae3413063ef4f7c8897fff39cfc6fef6ee0c59786b5d4,2024-05-14T16:12:23.490000 CVE-2024-34081,0,0,59bd3a052213b2000050e90eb97869fd7a5e0bfd844a1f6ce493f930af4d6add,2024-05-14T16:12:23.490000 CVE-2024-34082,0,0,72145cae379aff6a1272d937f8ee0caba928404f9d12f9c0fb3d88b23848000f,2024-05-15T18:35:11.453000 @@ -253225,15 +253225,15 @@ CVE-2024-34090,0,0,4dc7a0402f56619348ec9c3e24642b60cff8f706f450ee8cc2f0663fc31ed CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000 CVE-2024-34092,0,0,2bf58264e02a52c672b220e53b15e2c1d2f3b9a912fb11a120406afd90e13f81,2024-05-06T19:53:38.797000 CVE-2024-34093,0,0,a3683f2cbbe3f4d2616fb123bbb1ded4218b58d2ed8c82d304f478e8d6150d29,2024-07-03T01:59:22.817000 -CVE-2024-34094,0,0,e36849e9c358f8fd3ef88519518cafaaba13f9ccb2aa10be67643672a6c5d226,2024-05-15T16:40:19.330000 -CVE-2024-34095,0,0,082cb36223b5d411c7d1297dcbc8e932a00e301e69ac9b9b37eb30aafaa8d8e3,2024-05-15T16:40:19.330000 -CVE-2024-34096,0,0,bc23622b3a3d6ac248cfe7bbbceaba73fa27f1c093e2d8e6b2554593dafe7bae,2024-05-15T16:40:19.330000 -CVE-2024-34097,0,0,367e67bb1ecb0a6715810897b810a2f5cc8bbbcbbbf136f5f8b0908378f7c8ee,2024-05-15T16:40:19.330000 -CVE-2024-34098,0,0,0cc5e812bf8248fa23619222425cfde9c096dc29eeacaf158b343e6b6d1fbd2f,2024-05-15T16:40:19.330000 -CVE-2024-34099,0,0,348209bc0dad2be9d67513a23a3e024e95a59b4c00a0cf1f3dbd4d6fed8a4729,2024-05-15T16:40:19.330000 +CVE-2024-34094,0,1,e058c298956a4eefff483912d321ec6abface079166873be933a6f29ae488517,2024-05-15T16:40:19.330000 +CVE-2024-34095,0,1,718d8c96c08399e79a88559b2ca689071335463b3719b579b43d4a05eb67dddf,2024-05-15T16:40:19.330000 +CVE-2024-34096,0,1,8b7f18a2869ffd5297f15be40b06047024170baabba628f362c9230fc8b4d8c7,2024-05-15T16:40:19.330000 +CVE-2024-34097,0,1,eaa6791cf71199d1cde68116fa7fa3d819d3442889bde44f40a13e019eee1444,2024-05-15T16:40:19.330000 +CVE-2024-34098,0,1,0aa7360245689162ad79d8372a61fede4224dbd8d5b6d11839b3e7354d4d6583,2024-05-15T16:40:19.330000 +CVE-2024-34099,0,1,e726ec893da8bd1b2d593478012deb02081fb3ea5ef144a8f74b134b032b0f2a,2024-05-15T16:40:19.330000 CVE-2024-3410,0,0,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000 -CVE-2024-34100,0,0,16a99aff4b4caad000c1a0ba35879f8d0022c815a7936897694c2a34486071ff,2024-05-15T16:40:19.330000 -CVE-2024-34101,0,0,d241a941311347a3e02d5d35bda706d1089d6d6f767584d8dcfa622e3001e4e4,2024-05-15T16:40:19.330000 +CVE-2024-34100,0,1,d8828e50212ed74523ec3b065b2e3e4ed1a87a7eeaaf810d753c27d5c9b78bae,2024-05-15T16:40:19.330000 +CVE-2024-34101,0,1,57dc3c112be34ec8b6fa52914716368e3e0d45ef2055bcb7e2a377daf556b987,2024-05-15T16:40:19.330000 CVE-2024-34102,0,0,f536eb73d9ffa51de1c60d0da7cdbc91c1a0278d2ed255da17cedda31f00687f,2024-07-18T01:00:03.197000 CVE-2024-34103,0,0,8e858e6deebf3dd74486b084ebc01e723dadd4c1741289465f9eef03525519ca,2024-07-09T15:36:11.363000 CVE-2024-34104,0,0,0c3b9794948346667daf712c1fa8aea7e59869808e596eca4e201c3b2e06e87d,2024-07-09T15:36:40.730000 @@ -253683,7 +253683,7 @@ CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e4 CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000 CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000 CVE-2024-34672,0,0,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000 -CVE-2024-3468,0,0,9cbc57c509ee4c447cef04d212cb9221d0311dbaa25def2d7e51d8a8ca44ea39,2024-06-13T18:36:09.010000 +CVE-2024-3468,0,1,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000 CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9a4c,2024-08-29T19:29:14.440000 @@ -253959,8 +253959,8 @@ CVE-2024-35173,0,0,49a434371ec4a6229edf5da12202cfa5598a4af286c41c326bfe7f54ebc1c CVE-2024-35174,0,0,b1c7ded9fc748474b589a3a5bf1c3406f1a807641e59436d3b061c2f7ba5cdeb,2024-05-17T18:35:35.070000 CVE-2024-35175,0,0,c8c86729e26a3f8e4e543bcb56b2884e73c6c8c90917029f391628b680dfad69,2024-05-15T16:40:19.330000 CVE-2024-35176,0,0,6ca7e7edb5c74cc4529c2f1d06dd954facb0383c2589dae58213add18d8e2594,2024-05-17T18:36:31.297000 -CVE-2024-35178,0,0,ce17b3eec87addde65a845b1fe108d25ea77574c15178a2d3f7a11e56ed8071b,2024-06-07T14:56:05.647000 -CVE-2024-35179,0,0,3199bf5ef1075d613d5dec5d55a2fc96f62a3205aa030f0f7e1a24661e4b7a26,2024-05-15T16:40:19.330000 +CVE-2024-35178,0,1,0a2bb0c97b8e9160deedcd44db2c0b732a28e6fbad7b00036bf3272c18691974,2024-06-07T14:56:05.647000 +CVE-2024-35179,0,1,60884268b480220b0ed8e7d049c3aba7d13418af0d36f7c5bd91c29c2d5e7e96,2024-05-15T16:40:19.330000 CVE-2024-3518,0,0,7a83fec6c9edcb89d532948688bb01695519330d58da21735682b3ae91dffe67,2024-05-22T12:46:53.887000 CVE-2024-35180,0,0,190aa281c362464f8b05fe476a49394f7d0058a0dab615a9223a47f1581d0fb3,2024-05-21T16:54:35.880000 CVE-2024-35181,0,0,869723136b7f98da094219ecfff76c79b27bd642c8bcaee502e056449a0a4f1e,2024-05-28T12:39:28.377000 @@ -253983,7 +253983,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08 CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 -CVE-2024-35202,0,0,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000 +CVE-2024-35202,0,1,69990fb5aa1a56a354b12414319025d2c1a39f309f633ac5e271aae5c1a31f46,2024-10-10T16:35:11.390000 CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000 CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000 CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000 @@ -254058,11 +254058,11 @@ CVE-2024-35294,0,0,3f8358287ada7fd559cb815db60338426a64c989bdb4f60965ffc7de0da1d CVE-2024-35296,0,0,82c7767da6fa670c8aa66295178569bca6e87e99e7267708f981755194c6c0f5,2024-08-12T13:55:37.307000 CVE-2024-35297,0,0,a17fd925b730fd9803b93156d1a4f0f1baa604bce402fb65f95c09819b0a7763,2024-05-28T12:39:28.377000 CVE-2024-35298,0,0,767802677800ceed2390ec4b021eb4a1bb445bf1aba3154a6ba4d4e3eb13ec79,2024-07-03T02:01:32.613000 -CVE-2024-35299,0,0,243cc758e93ac683f2ab1068e78446f59938832d5b992bf674806bf0216e461c,2024-05-16T13:03:05.353000 +CVE-2024-35299,0,1,048bb9c6545183eae6d895d08a3690cd4698ded8d19befda0179e06469b214cb,2024-05-16T13:03:05.353000 CVE-2024-3530,0,0,70d172744f3b40a2967c3d7796e48304fb83190da72184f5f53456f7aa95636b,2024-05-17T02:39:59.340000 -CVE-2024-35300,0,0,3268863092baf8da5be7c2443aa8981ede3c7aaaf50c4665a2a11bc0d4b4d539,2024-05-16T13:03:05.353000 -CVE-2024-35301,0,0,839b59a4f925294586be47e2b5df0edd53d7871f659185321d986bd87073091e,2024-05-16T13:03:05.353000 -CVE-2024-35302,0,0,2a6043583f44f166f0319d360e6c9f1df1f925aaf4d44b7a3743467f4797e606,2024-05-16T13:03:05.353000 +CVE-2024-35300,0,1,712509ea6931ecc82a48c3e7dcf065c44b87543039b547a7b3feeb37855a7ccc,2024-05-16T13:03:05.353000 +CVE-2024-35301,0,1,36d5b9b41c16a9e3833ab8644de6032c2a4f32ca5711dc72f4aa378404011bfb,2024-05-16T13:03:05.353000 +CVE-2024-35302,0,1,07e61c3b2b14589e33f3c0a3440d6d822ce5dfb0fd8cc22dcc15745653b9d454,2024-05-16T13:03:05.353000 CVE-2024-35303,0,0,ea0c43df25cbeaf31119b7822c4f26466548562fbb49bbe6d308f2a6a606e05b,2024-06-11T13:54:12.057000 CVE-2024-35304,0,0,6034918ad52f93d1da2bc26a38d2a41af1cec6e4b2633afd9a4c11faed3e6adf,2024-06-10T18:06:22.600000 CVE-2024-35305,0,0,e31f5a2153df0748351b63d3b29145f978c7628ebc2659ea3282a1f078dca5e0,2024-06-10T18:06:22.600000 @@ -254259,7 +254259,7 @@ CVE-2024-35676,0,0,fda9e5ed5893dfcc6d6a0c0f36086c07bc6d67e3ab7f9c25304e192cdd75e CVE-2024-35677,0,0,f98a6eaa649b9586652a455c35c2622c36e27877eccc5d4794c931c030cc7c4e,2024-06-12T17:50:33.367000 CVE-2024-35678,0,0,a49a3a0edb77925263100e8918dd7c3a4194d80db9d5d482859871160f92d180,2024-06-10T02:52:08.267000 CVE-2024-35679,0,0,3e9f32205984648e1759f8a9745b5955cd59b2da5f7603e2d07752e86940f9a3,2024-08-29T21:17:13.213000 -CVE-2024-3568,0,0,2f548317b29c37ed58ca4217ab349f9e591fac213b693fb6a25d52bf2ee21f1c,2024-04-10T19:49:51.183000 +CVE-2024-3568,0,1,f6f2f9172b351b5224c1e39e126be88359e96989d4892a1de5aa750f005ce856,2024-04-10T19:49:51.183000 CVE-2024-35680,0,0,30b3a69a697953774910476dc31463038ad8b473ba7596113f1d83c92dbcc601,2024-06-12T17:49:56.670000 CVE-2024-35681,0,0,5816248594069c5b872a449cf953d1983d148a3e6df5e63b1c0a9449611baf05,2024-07-18T19:16:42.277000 CVE-2024-35682,0,0,e3065bea188f47617d60d5ec78ff5563173441e56553fbc4305bfb9f6b8b0f5f,2024-07-19T17:36:29.837000 @@ -254270,7 +254270,7 @@ CVE-2024-35686,0,0,32ff2e600a9d8926049897296d1d6fe8809b6a2e4221afcb5a5a74815a856 CVE-2024-35687,0,0,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000 CVE-2024-35688,0,0,3002fd4b3fe5cc02b7654ca7bf43c572c5d7c5d95678447c325fe6a4dfea431c,2024-07-18T19:11:38.683000 CVE-2024-35689,0,0,a84697d9194d9eaca216c47abe16f4656da4cd35d0aca0020ad4375947ea31e4,2024-07-18T19:11:09.873000 -CVE-2024-3569,0,0,9b80b9a87217b369759c7140d80dbd6082319d66e422964bf6b9aefb97f43369,2024-04-10T19:49:51.183000 +CVE-2024-3569,0,1,8fabce8023662d7cc098254e66b12af21012b1b02368f0005c614c206c554bbd,2024-04-10T19:49:51.183000 CVE-2024-35691,0,0,a45c844abd196a6ba65653d41b94d1157e1855d27cad2e114ae3de58bd98895e,2024-06-10T02:52:08.267000 CVE-2024-35692,0,0,c23d33c37503a8e8f25e1564013ecb45490977176b56ba09aed4252ab52c3487,2024-07-23T18:21:19.573000 CVE-2024-35693,0,0,472b85635f751bbb73374106d257ae5cae23d72b0e5b2e1e0e0ebb17ffd7f85e,2024-08-29T21:17:56.007000 @@ -254280,7 +254280,7 @@ CVE-2024-35696,0,0,f9216d277779898afaead63d25822320ecb0ebd5314813eeae6443a71f1a9 CVE-2024-35697,0,0,ed26483e03d41cbda2679aca1662298d32b2cfe43e2a2b534c7112e53fc75b2f,2024-08-29T17:13:49.557000 CVE-2024-35698,0,0,ce5805ea174c7d79028851b201d10370f7d8980a44f785817681e8858e08f43b,2024-08-29T17:11:36.290000 CVE-2024-35699,0,0,bb29147c315960e5ea1d6cdd4347723d85b9a10f4d38a78e1ce06e8ac950d004,2024-08-29T17:09:55.017000 -CVE-2024-3570,0,0,14d409ce8afc07e662d828a6ab25c728d3a76a8eb5212a6ebb12dbb35e62d13c,2024-04-10T19:49:51.183000 +CVE-2024-3570,0,1,cbdac6bd5136097255c2abbd5b2d952f76c5cc8fe11392de8f6ecdc6fcc925a5,2024-04-10T19:49:51.183000 CVE-2024-35700,0,0,2082b99df626f3c53a70be6652424ac88700e845ec65f8217af149e8e0e0187c,2024-06-05T19:50:49.063000 CVE-2024-35701,0,0,d5ea4cbe296186cbbbe13c0c1fec760c341a040f00a0104092e554251ceed7c9,2024-08-29T17:09:25.947000 CVE-2024-35702,0,0,efc0987310e7ee4022ef9f2c02fd77dca4c34d10c2575700fa4bcc69be53cbba,2024-08-29T17:08:38.977000 @@ -254917,7 +254917,7 @@ CVE-2024-36406,0,0,7289600dbe296bcae2729bc0a37d0f467cb743e2f5a7ddff63acd9d68aa5a CVE-2024-36407,0,0,7088773e29d067e0d50f8442879fdfd4f6168d805b4e11abfe855b3a9a4e607c,2024-06-12T18:17:38.777000 CVE-2024-36408,0,0,65e6222ed032535deddeee3c8538601bd7a0eb00ee62d5977e345f3a22ba19a3,2024-06-12T18:13:58.627000 CVE-2024-36409,0,0,6cca579e830b091afbb537e095e39545785296421402a769be0a0664b9e8baef,2024-06-12T18:09:19.450000 -CVE-2024-3641,0,0,96d4e8f735cd32a7f881c4146db8e093ef659c3722763a3025a6e1c44bf7fd27,2024-05-16T13:03:05.353000 +CVE-2024-3641,0,1,8888e7a34a6871d26a7b79be38b3b2047280b4f5236a90ebf232b29924485517,2024-05-16T13:03:05.353000 CVE-2024-36410,0,0,0ee775e055324eb421a066c74dc7247a156541736d91b9eceadf8e14b7572672,2024-06-12T18:09:04.930000 CVE-2024-36411,0,0,3bd833f99ab2a00e53a1912ec09dba4160707f17f989f4c92ed66584bbd830eb,2024-06-12T18:00:13.937000 CVE-2024-36412,0,0,7a67e1ad9308644d553f56c0e061d6ad72ce51839bd913f211a0e7a2c0433d59,2024-06-12T18:00:00.317000 @@ -254928,7 +254928,7 @@ CVE-2024-36416,0,0,d6ce7543acefc397e88a4e607f8e8cd9d6d7c5889aa1948b360b7ced938d6 CVE-2024-36417,0,0,1ea038de4e5acdad4256a27455220cbea49cafc564bda7423cce84beb58771db,2024-06-12T17:58:04.477000 CVE-2024-36418,0,0,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000 CVE-2024-36419,0,0,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000 -CVE-2024-3642,0,0,18761de76cd7cd0e44650c50bce43f4d6feb32d4cdbac8c295b7b13430f4f486,2024-05-16T13:03:05.353000 +CVE-2024-3642,0,1,cd83e60d931fe80c786353cff3300d512c68d81b5b687b66ffd144aed9d9fb44,2024-05-16T13:03:05.353000 CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000 CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000 CVE-2024-36422,0,0,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000 @@ -254944,7 +254944,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000 -CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 +CVE-2024-3644,0,1,5fcc1b95c80e82178a2887dd8939047d13c153da230d7e59629dcecf02b1012a,2024-05-16T13:03:05.353000 CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000 CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000 CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000 @@ -255092,10 +255092,10 @@ CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ff CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000 CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 CVE-2024-3673,0,0,793bfe64393173ca9d6fad84c98d57e0015832a693f798ed6c4f8a051964a6cc,2024-08-30T19:35:06.567000 -CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96c39,2024-06-07T14:56:05.647000 +CVE-2024-36730,0,1,bde34fb358bb97f482c42e2ac502de0d6a71608d72eee227c2d882aedb55a476,2024-06-07T14:56:05.647000 CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000 CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000 -CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb508f,2024-06-07T14:56:05.647000 +CVE-2024-36735,0,1,7e77c1c2f42a7160fedd9f29c2dec0ba326afbd11e438159f9b83ba055e05300,2024-06-07T14:56:05.647000 CVE-2024-36736,0,0,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000 CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000 CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000 @@ -255395,8 +255395,8 @@ CVE-2024-3715,0,0,a3f6e7a82320a6d7e6e6c69e7827898cea9e6e8692b09fe17381d67f1803ba CVE-2024-37150,0,0,ebe86994cf382db2f42db3a67da442aa16fa332cd6f1072a3ddf757a2ef9a966,2024-09-26T14:04:54.867000 CVE-2024-37151,0,0,8369ee3c4d467fa86763a95ad47c05c55ab1bf8ab2582315661b340a8d9a5c13,2024-07-12T18:46:55.207000 CVE-2024-37152,0,0,ac6f3acf11b3a1f516e05266cf8046e8001605f3fd121de5700d8dfd6dcff917,2024-09-18T12:51:04.430000 -CVE-2024-37153,0,0,3e601aadc0030e22b67cf5ecc50e8ccc456d76da476705d4602850de1d2ba895,2024-06-07T14:56:05.647000 -CVE-2024-37154,0,0,40ee9505a6683eeed6f3ae53fa200cad03875c0f73331677a172d9430e44e9a0,2024-06-07T14:56:05.647000 +CVE-2024-37153,0,1,85228309a9dbd3d5cc7023ad5c180dc01a5cb4c16fb418b8df38af81e23fe21d,2024-06-07T14:56:05.647000 +CVE-2024-37154,0,1,bde5aa6907ca2cb4c0ee9877af8bda5e0bca1361f6566d9f784624692130fad9,2024-06-07T14:56:05.647000 CVE-2024-37156,0,0,a4629359601329a252e33b03a4ccc833dd9e2ce7a4a6bb980b335d8342668158,2024-10-09T15:08:29.647000 CVE-2024-37157,0,0,a07622f963d285fd9e3dcfe8c8c66929285017ffcec83ca71975fa9dd7c880ca,2024-09-18T13:50:23.367000 CVE-2024-37158,0,0,d89015f3d5c7061659d9d0607cd8f932d19692ba0c53081aaf8195c4a3e4e008,2024-06-20T12:44:22.977000 @@ -255657,7 +255657,7 @@ CVE-2024-37495,0,0,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72 CVE-2024-37497,0,0,a5e078ff0e5f137ef0821d3799d044ca0d639a06d66db12953c2763c25fbc8d3,2024-07-09T18:19:14.047000 CVE-2024-37498,0,0,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000 CVE-2024-37499,0,0,33077733cf962ec7124fd968ab822e83cb89a629fa94472ef274e5c155a1765b,2024-07-09T18:19:14.047000 -CVE-2024-3750,0,0,efd622f326538dae191b06a5f79463da3c8ce4dd6062aaf01b384cc8ff80662f,2024-05-16T13:03:05.353000 +CVE-2024-3750,0,1,7f653c70769601e52a8ee276aa3944ac16f0c78d5455db74dc1a430ea93dbe37,2024-05-16T13:03:05.353000 CVE-2024-37500,0,0,af9a402301620aae5f482809384a634d075d13e1ff48e81edb8eaaa117db7e88,2024-07-22T13:00:31.330000 CVE-2024-37501,0,0,5ecb58b46cb9dfffffc738dc981f07d5bb389ccd62d90c017a24f4cdd2a17935,2024-07-09T18:19:14.047000 CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 @@ -255923,15 +255923,15 @@ CVE-2024-37972,0,0,e8ed965e0e513f28789a8d5e80c69602e8253e60bf85460f2862b533ea63d CVE-2024-37973,0,0,3342f3f2dcfdfb878d17e2ff1e983db755e09cd797849ecd7545c62932c35d0c,2024-07-31T23:15:11.550000 CVE-2024-37974,0,0,b75b4e720fd064320f983be42ac5df37fd67ff02a66f86c056c7256c4c6e6ffa,2024-07-16T16:37:07.930000 CVE-2024-37975,0,0,925df989d2d4d0445eca6ca3ea362b8c1374aa4fbb4893990e3c6f823f9ed2b8,2024-07-16T15:19:58.980000 -CVE-2024-37976,0,0,965f96e55bf31c61c824997722df6e8b17d9e78c6f0532519e7ab2f76831ad7e,2024-10-10T12:56:30.817000 +CVE-2024-37976,0,1,ab9bfa116101508010e669152b6b57cb1e906c8b84242c328d8a01cca7fae531,2024-10-10T12:56:30.817000 CVE-2024-37977,0,0,fc6cdf1fcb13c0b297637d2640fd367e1afe7a1dfb5055043578b69faed9ff36,2024-07-16T16:37:44.987000 CVE-2024-37978,0,0,a3d0955f8e935b6424318b62f7dfa6459b27869862422e3f5ad0e3ba6b11fd8e,2024-07-16T16:39:11.783000 -CVE-2024-37979,0,0,3786b3ba5efea150b5abf4fb9d6fb8a72d006d4a2c2a1a2832f1b66631393ecc,2024-10-10T12:56:30.817000 +CVE-2024-37979,0,1,d4e7d651d9dfa6397a33457179915e3698a3a5bb3ee18080362ad87430bf75fe,2024-10-10T12:56:30.817000 CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e752003573,2024-07-12T10:15:01.757000 CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000 CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000 -CVE-2024-37982,0,0,51e0fcada295379622ea1b394debce44ae61621e0195e8dd9f3c5bc4421826f2,2024-10-10T12:56:30.817000 -CVE-2024-37983,0,0,78b94523eead126ea99f595c67fe8252f2655886b365f2ae5a553eff28f12fe3,2024-10-10T12:56:30.817000 +CVE-2024-37982,0,1,1292ccc2fe03c8adf5b700bc537860b6176a2bf8245a83e69cdc6e18846029b1,2024-10-10T12:56:30.817000 +CVE-2024-37983,0,1,374c0a73ae0ebf72dddb80fd2ddbe206d85b4e03b510e4e97d6c59e2a0a9a119,2024-10-10T12:56:30.817000 CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000 CVE-2024-37985,0,0,8e75e8ded91c606cf6f8a7951d4db59fbd2c888177e5eb0c4c7845eff08923bb,2024-09-29T00:26:19.423000 CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000 @@ -255969,19 +255969,19 @@ CVE-2024-38024,0,0,1797dacf114220c1e1049c00517f85420f4d0a240dbe89f86adea8256bc98 CVE-2024-38025,0,0,9f028b66722379a4d88b7ebae27bb9427c5009d1dce1299424f156ca72de7c23,2024-07-11T16:43:28.747000 CVE-2024-38027,0,0,4aa1cddeb9caa33aa67dad478e11bf6f705700b0330932b5452f221ae54ceffe,2024-07-11T16:42:49.083000 CVE-2024-38028,0,0,a1f99f145474526e61ea4a0e3c69bdb1c6e1b6da7efe7b6b1a875e09474817bf,2024-07-11T16:42:20.313000 -CVE-2024-38029,0,0,aa0127f1293a11cbaf058d15217d2c786f6bb567bcdce7226bbeaf91cc4932b6,2024-10-10T12:56:30.817000 +CVE-2024-38029,0,1,2d5df98891c2738cc5248bba6ec2eb2ca46c38053d00104c8fc1925721c1fa2c,2024-10-10T12:56:30.817000 CVE-2024-3803,0,0,a90b9a8d430e9bd2f1e0e91bbe856922d83605aa62e95511f94f70d1134bb7f2,2024-05-17T02:40:08.240000 CVE-2024-38030,0,0,2692bbe3cc189a0b531f2e3918e547283f3aaa5462dbf0310bed7de364bbd2a0,2024-07-11T16:35:21.450000 CVE-2024-38031,0,0,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df51d0,2024-07-11T16:32:33.517000 CVE-2024-38032,0,0,41be2218ab416d77ec81c0853b207c29f9c64191f96c18dcd3b6e6f7560f90e5,2024-07-11T16:31:16.480000 CVE-2024-38033,0,0,1e81123daf9f99850b1ab7ee785cd263ed2b0b018942e514470897032a30503e,2024-07-11T16:27:21.303000 CVE-2024-38034,0,0,e720c7cb8e085ac1619fbec51b8ca1a9266a96c4740c9831ab3943b092aa8264,2024-07-11T16:26:19.257000 -CVE-2024-38036,0,0,440af929240a9329c8c73e313c79e5f3bb16069d2d76f8c2510adda256e61aa2,2024-10-07T17:48:28.117000 -CVE-2024-38037,0,0,cd05623680e53b63b906e3292e3e27fad10ba68b6be5faca8376e96fda70b88c,2024-10-07T17:48:28.117000 -CVE-2024-38038,0,0,6411be77de31032b7c1e678b60a619db6bdaf99ffb3cf22907eb4922f4525021,2024-10-07T17:48:28.117000 -CVE-2024-38039,0,0,eb639e5877caa803521392deba587a1a2769f2780af881a4e702901380842448,2024-10-07T17:48:28.117000 +CVE-2024-38036,0,1,7a8f2b3fb6a21cf5375688181f3fef0567ba03a951fe25f59b0894934393d005,2024-10-07T17:48:28.117000 +CVE-2024-38037,0,1,7bf65e1f8cb2478f1a5e6f0d1245891ef564be1ae099a0013740991220f519d9,2024-10-07T17:48:28.117000 +CVE-2024-38038,0,1,809bda85d87571e5cd8600b11b76b5286493d3b53580080684dbd36625ab6b75,2024-10-07T17:48:28.117000 +CVE-2024-38039,0,1,534806579b7d942a20c1b053a102ce621c9dc6968c1434afda05c7c75d6df82e,2024-10-07T17:48:28.117000 CVE-2024-3804,0,0,670259bb9deba1dd09e2fd5f21b522d9251378214c2f8d4e9a81f125a92ebbc4,2024-06-04T19:20:24.583000 -CVE-2024-38040,0,0,aeef04f7e5bc96c46bb30d112533da2361872b0682f9ebe3ecc3692d702537a1,2024-10-07T17:48:28.117000 +CVE-2024-38040,0,1,d65592e688e8133f234a71c29b72d8699861fc34bea083701ecd3ec8b4dd6b1b,2024-10-07T17:48:28.117000 CVE-2024-38041,0,0,f4a3a12f8b0083cabe34ce18f7650953aa9c869c7e1908b1e136d7159a58fbbc,2024-07-11T16:25:14.153000 CVE-2024-38043,0,0,678d7239712daaa20be0694f0d9a87623bf13f4e650f026e0e7dc828486931e4,2024-07-11T16:25:00.517000 CVE-2024-38044,0,0,c3503c93ef40bb7d47f5a9bf23be6e47e665166216973f3f0d25fcf29360c08f,2024-07-11T18:11:30.147000 @@ -256038,7 +256038,7 @@ CVE-2024-38092,0,0,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5 CVE-2024-38093,0,0,075dd9daa56a96b357ca4934063a6c16d1ea30c840caecea5eb303d11b987d24,2024-08-07T16:28:38.140000 CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000 CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000 -CVE-2024-38097,0,0,97852603ef5938e1b9e5d8a213befd97dffd086a1265625241c30c808417dace,2024-10-10T12:56:30.817000 +CVE-2024-38097,0,1,ac283e96d40f645cfaa790a9e83c8bcd98840904f7dc46ca187f085c7c4f370c,2024-10-10T12:56:30.817000 CVE-2024-38098,0,0,ec97a6f3d3826e98c4bef4bf966b3f4e3463526409f9c97694a785720fc1ed54,2024-08-16T20:38:02.817000 CVE-2024-38099,0,0,7782db89a967b149d71a424fdb71c049e171d01d737658a72251691ef31a5e3e,2024-07-11T18:24:27.333000 CVE-2024-3810,0,0,4b9c7ead6ab7332e33f083e2f6cd125d9bb6a7d7cb025550c9e1df7b29084607,2024-05-20T13:00:34.807000 @@ -256065,12 +256065,12 @@ CVE-2024-38120,0,0,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088 CVE-2024-38121,0,0,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000 CVE-2024-38122,0,0,ccd40c698ac79bd5e6ffae27158140be83eb08e1e0ee4a0ffabbae2b5e3808c8,2024-08-16T17:16:41.717000 CVE-2024-38123,0,0,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000 -CVE-2024-38124,0,0,e81dbe34926676094ff4b7edfcc4c0178f810558519f2981ed2534567aa76deb,2024-10-10T12:56:30.817000 +CVE-2024-38124,0,1,4bb09c561bb047392ac57ace0a7cc84a0aee89f05d00b08fe281608739e59975,2024-10-10T12:56:30.817000 CVE-2024-38125,0,0,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000 CVE-2024-38126,0,0,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000 CVE-2024-38127,0,0,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000 CVE-2024-38128,0,0,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000 -CVE-2024-38129,0,0,db7e392d4d9149df6b3c23fa7eecee8a90b6322466f7d62718e061401c660a14,2024-10-10T12:56:30.817000 +CVE-2024-38129,0,1,e74da9af8c992cb5ac006a1afb44aa76268368b46e9e54aeb7550477d33d4dd5,2024-10-10T12:56:30.817000 CVE-2024-3813,0,0,d80bc8b1e8c714a4f8827190dc103e9bc726aeafa665606cb93627ea2cb076a3,2024-08-07T15:45:23.793000 CVE-2024-38130,0,0,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000 CVE-2024-38131,0,0,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000 @@ -256091,7 +256091,7 @@ CVE-2024-38145,0,0,72c9bc7a9cbbace21fd58c0f66c1b12d49b8b73983e1005fb9919e2c1505f CVE-2024-38146,0,0,14c004f77fbe253ac61a74840b248deaa14d3a35225aac2efe9a43dd9dfd9585,2024-08-16T20:54:59.903000 CVE-2024-38147,0,0,c68874ce4b2880bc5978c705995a2bb81afc52dedd485ce2a1d724482b55c1de,2024-08-16T20:55:03.907000 CVE-2024-38148,0,0,102d9ade184ef2fcdc8a611228d487d3aefe8f36a5d6ba722a0bb780b2ae6597,2024-08-16T20:55:08.653000 -CVE-2024-38149,0,0,8c8f48c644766e1a3220de47273a483894e111cb1a5d6c4fe8d4fac322364dc9,2024-10-10T12:56:30.817000 +CVE-2024-38149,0,1,a7873255cac18c724fb415931d2d7c7e9e019d150ba099c534c57deb28dbbade,2024-10-10T12:56:30.817000 CVE-2024-3815,0,0,55e2d42c0e61accee69ffa342efcde0fddef3a4ea430c0440620925be3cd147a,2024-07-26T13:36:59.737000 CVE-2024-38150,0,0,b99eca9453622b3fa45563f2073a2880bd2b153729b1bb5a8b9159bb362991ac,2024-08-14T18:16:13.757000 CVE-2024-38151,0,0,511eb1d4309ead57d93026e7343edbde047eb26f0b3b36416f5242dc362abcb8,2024-08-14T18:16:59.673000 @@ -256123,7 +256123,7 @@ CVE-2024-38175,0,0,7ee3e1fc94700b16d00a2f26c03cfea7234039ed3cfc64750501f773001a7 CVE-2024-38176,0,0,eed2e89f17fe817bf9272ecfba6f475a6989de8241f5fd94dcaa4efac999cc70,2024-09-05T22:06:43.513000 CVE-2024-38177,0,0,f6c4f1d43d7e38f03a6491693822f9b2a6b51e959022ad48764d85f77857b9bd,2024-08-16T19:20:08.750000 CVE-2024-38178,0,0,0718359cc65b3baa799d5e8ed6ced3acf1847c46f13cc5a862a0cd0e4acf46f7,2024-08-14T16:34:46.337000 -CVE-2024-38179,0,0,ef981a46e9883ffeddf59c4cf244dac2a8b94702839dd8b894badca46d50b307,2024-10-10T12:56:30.817000 +CVE-2024-38179,0,1,8dc4cfe0d8accfaaaa016e0dff2c877c8d9bc89ce6e6c109eedcc54db49acc5e,2024-10-10T12:56:30.817000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 CVE-2024-38180,0,0,c5dfb48533b21a7d3d27760cc36627a61099c548597a405684dc960c3bc70967,2024-08-16T19:20:22.853000 CVE-2024-38182,0,0,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000 @@ -256154,7 +256154,7 @@ CVE-2024-38209,0,0,a397cb1d020ff208f8c4852271e654420782ef1455eeb91732ec6921d5eae CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 CVE-2024-38210,0,0,8332ac0d8608fbcc4685b3dfa3d24d6c14729747793e3309dc0faa1b43d99b5d,2024-09-19T22:15:06.083000 CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000 -CVE-2024-38212,0,0,a42da62eebda0e9696a5d08660a1553e6c919bf6af71bf0c1684031d23bb3eb1,2024-10-10T12:56:30.817000 +CVE-2024-38212,0,1,e2743d90ecb1de3e9edc5582e3843f1e5c3859dd20f5d976ddeb533adc51baef,2024-10-10T12:56:30.817000 CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000 CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000 CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000 @@ -256171,7 +256171,7 @@ CVE-2024-38225,0,0,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2 CVE-2024-38226,0,0,4bf5fa6111be97c9b6ca9705aef4b23890b24164017bf51690e04459d4fe4310,2024-09-12T01:00:01.133000 CVE-2024-38227,0,0,e1166a8b3601198afaa0f36efd17412978a4ad369bdfa6dfc4ece85e44aa4ac2,2024-09-17T16:57:39.267000 CVE-2024-38228,0,0,df0f9c7bad92e403c53d10121c41c8156540867d96dcbabab24d783749d190e6,2024-09-17T16:57:54.950000 -CVE-2024-38229,0,0,b29cdc7319e38ac003425d2b550380d75546094fc34711dd5f45904219c3b430,2024-10-10T12:56:30.817000 +CVE-2024-38229,0,1,f8b41813b09662cabaabd493c77c81148896b6ad8c49323440120c43f14a9db7,2024-10-10T12:56:30.817000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 CVE-2024-38230,0,0,436e1a3ea40688620e23f71172bd013c1c71331c5024bfa4d058c80198524f43,2024-09-17T16:56:15.420000 CVE-2024-38231,0,0,05ee79528b663f84aad9814eb88867e2019ce1f3aa0eab3c47c2ec9d53782579,2024-09-17T16:52:56.323000 @@ -256205,10 +256205,10 @@ CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad51232 CVE-2024-38259,0,0,d7a118fae4649d7f9bd788f71eb172724667e7ef52a1e02ea9ee9eac2db2ad0a,2024-10-10T14:02:28.917000 CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000 CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2431,2024-09-13T14:53:26.410000 -CVE-2024-38261,0,0,ebfdb8837e9ec46b0c59a92ae543c8a1bf9ca753f5c0c9f66ff763b497d2dbac,2024-10-10T12:56:30.817000 -CVE-2024-38262,0,0,f4622b7cf132090051fd2fb969a4d59ec6bb4116cc728bf26a42d8c1d908ef14,2024-10-10T12:56:30.817000 +CVE-2024-38261,0,1,9583da2bb40d90f8b2743959174a0c8a2ccf7bdda84091e0c2e368781f65f05d,2024-10-10T12:56:30.817000 +CVE-2024-38262,0,1,e9bb126a661223282da8c987001a6752a5246ca5da823a0db0be5e787d4cbf3c,2024-10-10T12:56:30.817000 CVE-2024-38263,0,0,f46aea6861be934017dd7285d8a02938dbd0902e0b8a60fe9326066622646e6c,2024-09-13T14:55:01.400000 -CVE-2024-38265,0,0,62041cd5652bc8e71628ed0caa34ec3d785fdc43711c625b6a04ac27b427513d,2024-10-10T12:56:30.817000 +CVE-2024-38265,0,1,5a6ac7682f195b57ffcf43454caf05a40e63455a4865ead8b64a30139a103b5a,2024-10-10T12:56:30.817000 CVE-2024-38266,0,0,24812493931b23eb9f9c734be2317a33135a030c22860333943c8effa1ea4408,2024-09-26T13:32:55.343000 CVE-2024-38267,0,0,e71850959c90aba1f66e5470156760ebdd22f551c837bdf538f552a253eba944,2024-09-30T15:52:52.787000 CVE-2024-38268,0,0,fc3e50bd4dbfc035f365112fb8a19ccb3d01fa7d152f5c8ee7b8579015795ce9,2024-09-30T15:52:29.977000 @@ -256302,13 +256302,13 @@ CVE-2024-38391,0,0,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b CVE-2024-38394,0,0,4144cb185c34fe25a28109cad04fb4f27c8fbde291d856b148c8ebd597877958,2024-08-02T04:17:26.447000 CVE-2024-38395,0,0,200f7eb17515a405ff37cc6fccc1c826c560846e0c0625cd687aedb08987a6c9,2024-07-03T02:04:58.833000 CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bfcdf,2024-07-03T02:04:59.670000 -CVE-2024-38397,0,0,5bf21bb4eaa62c7ffb949d3927bb397217db41fa7f2f3bedd9bbc6198319fdf2,2024-10-07T17:47:48.410000 -CVE-2024-38399,0,0,8f0fa9da328c6eb1c76f3f845578b8077618ddbbf102b41b2e92f61cadbe31a3,2024-10-07T17:47:48.410000 +CVE-2024-38397,0,1,889019516b7166ba25430ef514e5a671bf1b0d7ee5d98ca9fe6d7c467882ab2e,2024-10-07T17:47:48.410000 +CVE-2024-38399,0,1,46b51c7a4900b66ec54f7a6d7471f57064523aacf502231537d138e0cbe2b0b0,2024-10-07T17:47:48.410000 CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000 CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000 CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 -CVE-2024-38425,0,0,4b9f0551c944aec1eddd7b4b5d3fd1879aa1d3d13c4f8e39dfd9f4ccdb4d60e6,2024-10-07T17:47:48.410000 +CVE-2024-38425,0,1,5dbc983305455a30d6ffd87c0fcfc25ae8f2119b69c4b570cbde3373dc6e3327,2024-10-07T17:47:48.410000 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000 CVE-2024-38429,0,0,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000 @@ -256878,10 +256878,10 @@ CVE-2024-39319,0,0,fc55ad0d090f68867940d18aa2fde9c1bb5fedcab6c273e1d435217e3e041 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 -CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 +CVE-2024-39322,0,1,e1e5319d1d4fdaa7d690c7fd8d7c3451a17a0f4bfe4280d87c1770054fa25f84,2024-07-03T12:53:24.977000 CVE-2024-39323,0,0,f9bbda9de9065c504f42e389e0c785c3032548b9fca5a4349b55a818885c8e4d,2024-07-02T17:44:45.700000 -CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 -CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 +CVE-2024-39324,0,1,4cbf94f201bdf1b767f75611dc9de1159d4f1941a42a49671397b01e33936f2b,2024-07-03T12:53:24.977000 +CVE-2024-39325,0,1,6375f12fd798ec1a1e29e8faa63281a39f4ac300e370172cf24ad62eb3e8bdec,2024-07-03T12:53:24.977000 CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a3903f,2024-07-11T15:06:11.477000 CVE-2024-3933,0,0,92b73bce365e98fcc06e62daf24ff5ae07fa4b0e34a70b4d4c68931454994bbe,2024-05-28T12:39:28.377000 @@ -256978,12 +256978,12 @@ CVE-2024-39432,0,0,c5344327ea4e29569cde1ea8e7912a1f59909bf9a7631cccf2f5bb521ee73 CVE-2024-39433,0,0,b0007cb93af88c45dc6df70760e2e177a4763bcaa8d7c7eac293b0ba1aabdc2d,2024-09-30T18:14:45.443000 CVE-2024-39434,0,0,6fa311444443904695893d64c5957ccb50003fad05bc243c95fa5540678b4129,2024-09-30T18:14:03.557000 CVE-2024-39435,0,0,c1323c169e57e336d6df9d30a55825a6eb9bb6be1621f01964c9727171d73763,2024-09-30T18:13:33.387000 -CVE-2024-39436,0,0,a73dbd1e435b1e48036cf6fc2586eb5e88288c06f4b04d386ae2b10dea1f862b,2024-10-10T12:51:56.987000 -CVE-2024-39437,0,0,6beb27e58db1b5e8742f340d6760c226f54f2c14e7d2ee491233305ccfe895cb,2024-10-10T12:51:56.987000 -CVE-2024-39438,0,0,69e6ebdabb88248bb7daad44720a2c4e417d1a1bd0e89603d1e9fcbb0ec9d21a,2024-10-10T12:51:56.987000 -CVE-2024-39439,0,0,d1e19241590e4ba293c945f1f0f291cc3ff27cd6796ac3dd61df404df7a9e537,2024-10-10T12:51:56.987000 +CVE-2024-39436,0,1,2589477ede86564874e1c088d1e29ae3fe3d71cfeecc9379591614ad1701a0af,2024-10-10T12:51:56.987000 +CVE-2024-39437,0,1,c20fd2c311a19b8afe4ee3c6b191e4e72afe0cf9b799653cc43239ff6c41427f,2024-10-10T12:51:56.987000 +CVE-2024-39438,0,1,c31616fa07dcb57596256dad12ae4ff0ec8f8fc8ce0786f5207fb2140a156779,2024-10-10T12:51:56.987000 +CVE-2024-39439,0,1,1348d74e82ded4131d26097dcff59c3c642a11bb67748a2add2342afdd11b6bd,2024-10-10T12:51:56.987000 CVE-2024-3944,0,0,0349dfe65519a62a84d722d8f6089c2204a2e4ad01321ea2bf2f048acc939172,2024-10-04T13:19:51.383000 -CVE-2024-39440,0,0,01c3146869b3956bf437057a3b2118986b3db3de18eee17888a301da4ae2c8d0,2024-10-10T12:51:56.987000 +CVE-2024-39440,0,1,7ccac3b027c4c46b6b2da595614858a678d292cb2632892bdfff90a9a3b8c4b0,2024-10-10T12:51:56.987000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000 @@ -257120,7 +257120,7 @@ CVE-2024-39582,0,0,6ec9b04450f9c5ce2a1563682764e2f7b34da0f9eb482017ce73088ac186f CVE-2024-39583,0,0,ac1320c69e7204d43ee10370ec071062ec88b9a1106bd39584f09ed060befd2b,2024-09-16T15:42:06.347000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-39585,0,0,b162f39d96cc79baeee026e4bc649d0b5cf545dfb2bc7af993a786e27782c34f,2024-09-17T02:15:49.397000 -CVE-2024-39586,0,0,3abb89efc44e70af20724f2c35ca4e0ae6f14a2a91f6b182d1d33c79125c6c68,2024-10-10T12:51:56.987000 +CVE-2024-39586,0,1,4b3bbffcfff2c5388cc14656face765059cab03be221bb22ce050a030e9748fd,2024-10-10T12:51:56.987000 CVE-2024-39589,0,0,87ea0a38612b14f1acbb61bd8a80c1616893c20e2d92c8b04a7963505253759b,2024-09-26T21:36:12.887000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39590,0,0,bd4d3aa82dbb5eb68f8bb048ad417554290f42943d5b38b21877158c391f9e01,2024-09-26T21:02:14.630000 @@ -257269,7 +257269,7 @@ CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b6 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 CVE-2024-3980,0,0,af7d02bc503a7625123fe3e6728981b9674a4164c60a7ca3f7e7e1561da1eb07,2024-08-30T16:15:09.517000 -CVE-2024-39806,0,0,a185a2331b6e6fbde4d3c00a6b68a548f5e2f758997dad7789d159f03eea63e3,2024-10-10T12:57:21.987000 +CVE-2024-39806,0,1,02b9214a706122a4017cac796132bafe69cc273c9eabc904f7a18686465d2ac9,2024-10-10T12:57:21.987000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 @@ -257291,7 +257291,7 @@ CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955c CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-3983,0,0,96266c916334fb5a02e4aa53ae15055a84c8153845733e53311fdb712a51a549,2024-08-01T14:35:11.540000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 -CVE-2024-39831,0,0,c6c3cf8f41e065771567180096c93623752458a396a6352b1c80f8f30dfb5a20,2024-10-10T12:57:21.987000 +CVE-2024-39831,0,1,ead5da240d848389c01979a168e656837a9d3f328d9b74a54c28c248b81a3324,2024-10-10T12:57:21.987000 CVE-2024-39832,0,0,4e3934d2762f9f7037c319199b04232a1818dd1ced3ad84be4d619c335cdb24b,2024-08-23T14:35:13.670000 CVE-2024-39836,0,0,0d5fe8c5e6b07786a6f137526c846390a0820f10bee6c12207bd00a1009c33ce,2024-08-23T16:16:18.757000 CVE-2024-39837,0,0,fd34189ff4b5cd3b0845da4fb511ed8c8acce338a2e176ead9f293558fa4e3cf,2024-09-04T17:38:42.297000 @@ -258200,13 +258200,13 @@ CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-41583,0,0,1f005d1031fdcb8c9fbd4906210734632d6902f2542d73f974724022c9aa8ff3,2024-10-04T13:50:43.727000 CVE-2024-41584,0,0,68b94596ec41fb07148f3ccd64f3f267bab10beb49b58cefc1308a96f8b6488a,2024-10-04T13:50:43.727000 -CVE-2024-41585,0,0,eeea4c108dbb2dac54e81fd473e2f3e107b47c0414ed5a60775a9a2eb5295c17,2024-10-07T19:37:13.900000 +CVE-2024-41585,0,1,5eeede132577c9132aa2d8cf428c12289ee19cd8daef2d67616f8e0d30aedcf2,2024-10-07T19:37:13.900000 CVE-2024-41586,0,0,837f69300649f91553628210cc544eb3742b53056d8761afc7c78beb5b8a3c63,2024-10-04T13:50:43.727000 CVE-2024-41587,0,0,2117db0c5d43fb4969d619b3d399c1877698054ee611d4c38da346c9431235f9,2024-10-08T15:32:18.313000 -CVE-2024-41588,0,0,d3171451841d54cc8701d78143ba90f1e69577d24f358df37b30520acd50c7ae,2024-10-07T19:37:15.063000 +CVE-2024-41588,0,1,470197d50c204d20014657a7b02b129223423081ce70df8d734f90f22aa598b4,2024-10-07T19:37:15.063000 CVE-2024-41589,0,0,04f9923f1d234a8dd6e0bf13471b52d9382898606729d057bb8885e65bf1609d,2024-10-04T13:50:43.727000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 -CVE-2024-41590,0,0,d9e01f1710ca2fb6ae50a41d8a8ab885b0163706b9348a2a519cd117acbe24d1,2024-10-07T19:37:16.150000 +CVE-2024-41590,0,1,3ebb6232eccb91ae5f927ecb6b651d473ad4f51d3161b7d8545fc0aef29f0609,2024-10-07T19:37:16.150000 CVE-2024-41591,0,0,b601ac74fd37298e2fc5ed9a0bbbd65797d2e8f8115d8ad1b7cd224f9a1c6a69,2024-10-08T15:34:46.453000 CVE-2024-41592,0,0,f6de19b04cf0bb9aa23a631a0152acf3c16683ccba4ebd341bd77b629281497b,2024-10-04T13:50:43.727000 CVE-2024-41593,0,0,a189f5d55756489fda0fc936cd73dd6693efd45f78ff053d92f5617bf449bc53,2024-10-08T15:35:04.583000 @@ -258253,8 +258253,8 @@ CVE-2024-41662,0,0,be958e9f3b2e886e1b69f4551b5fedf37f97a71c3706739c630d56a180605 CVE-2024-41663,0,0,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000 CVE-2024-41664,0,0,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000 CVE-2024-41665,0,0,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000 -CVE-2024-41666,0,0,97748776272e01b2494212a2d299646d679c67ae0df6b983aeaaa5ae16baeb01,2024-07-25T12:36:39.947000 -CVE-2024-41667,0,0,bc9a6d3c474db0ae10d4a564cd6534bd78dc7f97a04fca90b0eea5c0263b70e0,2024-08-06T20:15:39.877000 +CVE-2024-41666,0,1,d22b112fe2cbc2407fbf0fec7671b189aa97ad937243b24a856fa8b3a89325a5,2024-07-25T12:36:39.947000 +CVE-2024-41667,0,1,1d3874261ae6f70622c8d1237be1f5353b32fe7e3793d7e1d8d660e8ce8bfc21,2024-08-06T20:15:39.877000 CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000 CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000 CVE-2024-41670,0,0,d4de1327e25e7abc39266a562cb92a3c058d45ff783401ce0a66d0266a4c8b41,2024-07-29T14:12:08.783000 @@ -258387,7 +258387,7 @@ CVE-2024-41853,0,0,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a0 CVE-2024-41854,0,0,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000 CVE-2024-41856,0,0,3ada3c844b80f59e9ae3d36b6d9ea2fc582aae7cd70642ad9bb38d1ef0f68cd7,2024-09-13T09:15:08.907000 CVE-2024-41857,0,0,18eb26e544512ac7a85d3a84aabcc5c6bdc719da2402fd3705a1c91e30e01499,2024-09-16T13:18:35.007000 -CVE-2024-41858,0,0,fc4155e173605a091bf114883179b8d0604e870052e7a0c7c1f11f2b340c3a75,2024-08-14T13:00:37.107000 +CVE-2024-41858,0,1,0b2aa1223d8b75ef4509a2c890063b1cbd2e1ef2deb50b762503d032e69fdb08,2024-08-14T13:00:37.107000 CVE-2024-41859,0,0,53bf4aeb143d9af2209be69a1a50fd4315b77e19bdf2dd5873464dd453800711,2024-09-13T16:53:51.707000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 CVE-2024-41860,0,0,a6ec640882508023af3d0255006bb74c8ca989e8b14eb4eb3a86ff4f7bf11942,2024-08-14T18:19:25.823000 @@ -258505,13 +258505,13 @@ CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655d CVE-2024-42018,0,0,ed031212f83e34a8c531eee2c5ca50b726abe310c71af7d547da2b7a4be172f5,2024-10-11T17:15:03.573000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 -CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000 +CVE-2024-42020,0,1,256c5ebd865730f43a9d1e31df527e38a101d62b918b1916a8bc092516adbeb9,2024-09-09T13:03:38.303000 CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000 CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000 CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000 CVE-2024-42024,0,0,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000 CVE-2024-42025,0,0,8c1d228ed90571100df9823974eb0ba9e627f86789cc232c3042885df4b8d2fe,2024-09-28T18:35:02.277000 -CVE-2024-42027,0,0,a7d0032b88d0aa6368c5d51fa144100e23adc777cc359f241816189847ac6abf,2024-10-07T19:37:18.967000 +CVE-2024-42027,0,1,9b88726482b48ccc583b18a00f310466c06f5dc176ed5d6222ca3def4192088b,2024-10-07T19:37:18.967000 CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000 CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000 CVE-2024-42030,0,0,59fa56f47f76e92b6c6c6a3fdcb37d68b092a6ac90822c136b288bb49e8250df,2024-08-20T16:55:16.100000 @@ -258662,7 +258662,7 @@ CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 CVE-2024-42218,0,0,331226ea49af1a2f92292f364b4fd8bc3c26a90f49d1b9421ad0db0c509189fd,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,6d72ad1f1e2233036625c33df60f051fc9699cbd96bd0caf5f28288f63cee194,2024-08-12T18:30:21.627000 -CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000 +CVE-2024-4222,0,1,41d176cf70c438a7eb3b6381acfdc29f92c880d7ed4b48e329b3cf0e4c2c04da,2024-05-16T13:03:05.353000 CVE-2024-42222,0,0,b89ef57d67246c59e7b320f402a614639a269bceaaa0c30be9cf5a9576c14c01,2024-08-29T16:43:59.923000 CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000 CVE-2024-42224,0,0,0865a03e98dd11ed105a5bc1eccb5a484aeb3ca4bb6400b3a913f08fe9d68aff,2024-09-25T15:55:09.027000 @@ -259077,7 +259077,7 @@ CVE-2024-42786,0,0,269c0db08da42ce37cbfedc070e044e520f6032104a5d57d0da7da98e8f4f CVE-2024-42787,0,0,4af700d7bde452d62154cd998686b308fae9b8f38e5940124ee331aa1fd0b067,2024-08-26T16:35:12.107000 CVE-2024-42788,0,0,50bf1b331ec01bc3e112d14f4087138167e675d20037791e3383c0fd42765356,2024-08-26T19:35:29.970000 CVE-2024-42789,0,0,ef16d9e3057430609782f812ca6eaebee9c0fab467795e1c42a75384a8ce22ea,2024-08-27T20:35:34.673000 -CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 +CVE-2024-4279,0,1,d5f13dd980dbf563f1bda372b8be0b0e922ede804330831d05218f291b7ca698,2024-05-16T13:03:05.353000 CVE-2024-42790,0,0,62118f0a801ee0dae7272364dcdda1568011ac510014c09979b48bfde8c76258,2024-09-05T18:36:04.237000 CVE-2024-42791,0,0,873fa7cb6896c8581c416ecabe3256bd4629f0e8a1bc57f85a270c46751d9e00,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,3d5171455e36c62db86c3f1d03eab38bfdac82c0ed4f595e590432a1180621b9,2024-09-05T18:35:24.220000 @@ -259106,7 +259106,7 @@ CVE-2024-42852,0,0,2344821754827259ef0e7a5b96c5bf6543f51312170a85eff0c415fda2be9 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-42861,0,0,ea0f837739db3748c937246e6f5cdcd94d8051062b95988ae5af1b8fbf8f807c,2024-09-30T17:35:11.653000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 -CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 +CVE-2024-4288,0,1,9c4d604200e8cc12f88dfbbec65f3935b7ecc643709eaa9cfa2791ac64a2c978,2024-05-16T13:03:05.353000 CVE-2024-42885,0,0,b6fbfe1a8ae448a95f4eb231b38e7555bf7772a19abe7daa4ac719d8268bede7,2024-09-05T18:35:07.060000 CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 @@ -259252,13 +259252,13 @@ CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9 CVE-2024-43167,0,0,4e0990bddf2f78bd7962e7fefd45b238c4cd5730031930510e72195ad3b2dc76,2024-08-12T13:41:36.517000 CVE-2024-43168,0,0,dda21c5c2e3bbeaf5d69baa1c2ddcb5d63c7d6cc03584943a831db0d376f97f0,2024-08-12T13:41:36.517000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 -CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097afb,2024-05-16T13:03:05.353000 +CVE-2024-4318,0,1,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000 CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 CVE-2024-43191,0,0,39f06d3c6ad8405bfc0c97c3e896524beacc5fba902e2cdc1730fdb616dc0623,2024-09-30T12:46:20.237000 CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 -CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 +CVE-2024-4320,0,1,773d2894068356e280571e8bba7d5fc09989da07888c9aa8efbd9f9099aa5a69,2024-06-07T14:56:05.647000 CVE-2024-43201,0,0,7e96b5c7a529af9864170f10f2d4ed0205422d478997957170bbef8405d06316,2024-09-30T13:55:38.390000 CVE-2024-43202,0,0,9ce3457395226f6b2d3e3ae28bae28adde4e9867d0df01a0022666c3aba587f5,2024-08-20T15:44:20.567000 CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000 @@ -259324,12 +259324,12 @@ CVE-2024-4328,0,0,243566e1cc6bca4cb71823d7b7f30591e3ccaa89bb4c9ba718cf8de1f025e8 CVE-2024-43280,0,0,8ec70be1b372202ae57d4195e09c801df844489ddf2fc1da5a62042b14977d1b,2024-08-19T18:36:07.297000 CVE-2024-43281,0,0,7ab1ca3ec60651be88171d7cc08689c4da1b6b9190bde15c636f0937ce762ed4,2024-08-19T18:36:07.297000 CVE-2024-43282,0,0,51a1b7b60973a964536d725b46eb7f27a1885c2e782a5c2cec51a4dab10a1bb5,2024-08-19T12:59:59.177000 -CVE-2024-43283,0,0,e744bfeac0f36c0850e62afc2be6d7c228ff00579a0cde5f0cbbd49b1af8b6a0,2024-08-26T19:10:18.890000 +CVE-2024-43283,0,1,dcec842bdd94f55475de15ef134249f9ae0edb11037a699786338e74816d0571,2024-08-26T19:10:18.890000 CVE-2024-43284,0,0,9ec27cbbaa1c9c776151f787875b1a5263af16803ae4108b77758144ff0ef781,2024-08-19T12:59:59.177000 CVE-2024-43286,0,0,8d445c08837bc0d69bb39f698d927b03a1da9d91e0d6c24aee947cb16e9db230,2024-08-19T12:59:59.177000 CVE-2024-43287,0,0,0f772c5e7015096b1b8986bee8890e23ad101e6c5c793ec59d98841278da0fe9,2024-09-12T21:19:51.183000 CVE-2024-43288,0,0,cb601481b4f7f99c135ef7b3e4ee49c8b3bc97950f1eeb07b9266e26ebe0290d,2024-08-19T12:59:59.177000 -CVE-2024-43289,0,0,0600acc050260b985b1f4df5b8d0003abb24a915face3ec5a35b6cfb02860fb1,2024-08-26T19:10:18.890000 +CVE-2024-43289,0,1,23852b8ba3878f496e75285825c5c6f357318473772187df9e2fcc50f8afe3a5,2024-08-26T19:10:18.890000 CVE-2024-4329,0,0,915fdd462793e35dddcb6a188ef6774a9ebc56a526b1b0698bddaf3c23ba3b77,2024-05-14T16:11:39.510000 CVE-2024-43291,0,0,fb50f3403a5239357eaa4233d35fbbdf0287b954bbd3c034bc45e3a17c6909ae,2024-08-19T12:59:59.177000 CVE-2024-43292,0,0,a73011f291a9642d1b2f2b537dc2970614132291a2af4b6cb40910bb0d866545,2024-08-19T12:59:59.177000 @@ -259394,7 +259394,7 @@ CVE-2024-43360,0,0,7806cb26815467de093fc97bcea332d20fcda51f3ce248e59da2d3fe25d63 CVE-2024-43362,0,0,d5feff3f0dfa0bdfe36569e1b23b1d8d2a7f4c0a0f821e5156876156789f80c0,2024-10-10T12:57:21.987000 CVE-2024-43363,0,0,0ff075120757feae88fffcf2d76821fd09fecb2bcd47bb6f49234a442520899f,2024-10-10T12:57:21.987000 CVE-2024-43364,0,0,fedb7f9a44640115fc8844aeb31f3d22d4df0dc3934e9a0e3954b45d8af40d9c,2024-10-10T12:57:21.987000 -CVE-2024-43365,0,0,56fff720011519435cd0f053437ad7989952462746d2a51bbaa15c00fa1e9b28,2024-10-10T12:57:21.987000 +CVE-2024-43365,0,1,e7fbca0b5aa0570b9d4aa913f9b4dddacc1b38057d4827b11c806b85c833706f,2024-10-10T12:57:21.987000 CVE-2024-43366,0,0,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000 CVE-2024-43367,0,0,0f8409cf79e678cffdb4974928d567f1e40ad1650bdffb611ca3860d13e991c5,2024-08-19T13:00:23.117000 CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83219,2024-08-15T13:01:10.150000 @@ -259450,7 +259450,7 @@ CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec CVE-2024-43443,0,0,41bfb91b7f7c9bee48be0f5c8ffcdaa9039df695b92734c0f1b611ea064f9e04,2024-08-26T12:47:20.187000 CVE-2024-43444,0,0,869e12b3e86ded10c38d8795cc34fa22bd804c0b1d5e73f28a97d45f8e95ed59,2024-08-26T12:47:20.187000 CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000 -CVE-2024-43453,0,0,d5f0fce34b71279dc5f5e1404771fae1160f9bde4b1f542a074e1d18e3a1e586,2024-10-10T12:56:30.817000 +CVE-2024-43453,0,1,c941563eee0035394ae37700c8a3b91a1f220c8f4da80c0f896f8a39e45a51a8,2024-10-10T12:56:30.817000 CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000 CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000 CVE-2024-43456,0,0,52cfe87e7df07e6312c61a71b69b91767d6e02250ae06c5c56bdd8b94d313ce7,2024-10-10T12:56:30.817000 @@ -259476,7 +259476,7 @@ CVE-2024-43477,0,0,d50cbeb6e00e9871b6577501fc388e557638d61c564a40e04e41a194af066 CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c905,2024-09-13T14:38:13.873000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-43480,0,0,ae10f040ee8f2f3ce1d342bef8f47f821195cc6c7c128504e1ca0e7d741f91e4,2024-10-10T12:56:30.817000 -CVE-2024-43481,0,0,90669774930bf046284de807d2daf1e6f04d370f1b099e845b7a13011ed32dde,2024-10-10T12:56:30.817000 +CVE-2024-43481,0,1,272199d4625d9189c414a789278b849a1e24cdea9c57d64ae469f172557b3ff9,2024-10-10T12:56:30.817000 CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000 CVE-2024-43483,0,0,a203f8e312e9e65d989c16262e1ab330707839bf3219ea38ec79e790d77dfd81,2024-10-10T12:56:30.817000 CVE-2024-43484,0,0,dc5ab4eccb00bd13e6aff096efe58f743e9ff10113c77bca3a6931c756d701ee,2024-10-10T12:56:30.817000 @@ -259496,11 +259496,11 @@ CVE-2024-43501,0,0,6fb558fe60f4c24024a70c6f42305a57c04c8f57fba7e8f663851e325cd4b CVE-2024-43502,0,0,fb78873eef645d04f4295dac203bac9f80544df7919280d5d556c751f74eb3b9,2024-10-10T12:56:30.817000 CVE-2024-43503,0,0,a155640336c3569b5e7b5759d211edc72807d9e47fc1fb12f1706cc520e13e99,2024-10-10T12:56:30.817000 CVE-2024-43504,0,0,0486daaa5f1c7f39f1581058aeec52a262c75145c123a16feba1f1dc69520843,2024-10-10T12:56:30.817000 -CVE-2024-43505,0,0,2d24011076aa7789718cf3a86dc54115269ac68ae0321b1d0ece11a60fd9846f,2024-10-10T12:56:30.817000 +CVE-2024-43505,0,1,9a6bb074fca63c96c5efd5fc8c991ddacf882c96e8dae3241bf0e98d49bbe2f1,2024-10-10T12:56:30.817000 CVE-2024-43506,0,0,ac2170e7c7f808942b68969707f1cdbe4e23d0c91f1a88e58065ba3a61c2972d,2024-10-10T12:56:30.817000 CVE-2024-43508,0,0,307f55ad9bb141ad70eec3a94eec69d4ede439e767fabb858d2a1e2cc556f27c,2024-10-10T12:56:30.817000 CVE-2024-43509,0,0,44ca234d98ba867a3699bfa9ad6526db7f46f3dcd93d80493c8a9fddbc988b03,2024-10-10T12:56:30.817000 -CVE-2024-4351,0,0,1afa7cdd2b07ed7f6c7d4fd33431ae4e847e5055e80de2c2ff284dbdde180a83,2024-05-16T13:03:05.353000 +CVE-2024-4351,0,1,91c73d5c0c31b8e52d6c5f8afbbcf99e053319b4d2f867e01072a9e2dc9454bf,2024-05-16T13:03:05.353000 CVE-2024-43511,0,0,0f27a31265e3cb0ffc3ff5d319f1da4c93fc955ef8af40e796c0730290a50805,2024-10-10T12:56:30.817000 CVE-2024-43512,0,0,c6d502733062d480ed219df9a72aa29a6d9773ce2e5921ea20149c03827709dd,2024-10-10T12:56:30.817000 CVE-2024-43513,0,0,738c5ae24661689901fbc42863408a5e7994dc67f9316bbacac2a999dbbe0285,2024-10-10T12:56:30.817000 @@ -259510,7 +259510,7 @@ CVE-2024-43516,0,0,0cbaf33c615e5b45fadda5625fac2701aa9d09535bdd09afbd1e759328698 CVE-2024-43517,0,0,644bb2f2e1161853e975d110a7c00bf58eea1cddd37a0b14c8577168cf0ef09f,2024-10-10T12:56:30.817000 CVE-2024-43518,0,0,63923a995463b0bbbf34eb36e870d1c9f96d6af9b205cc78de8b65c9f3676ed6,2024-10-10T12:56:30.817000 CVE-2024-43519,0,0,de39966b00d8dbc08af5b32d4292e6cfbdfe7743294bca2eba5399db2e071bd0,2024-10-10T12:56:30.817000 -CVE-2024-4352,0,0,83fde2dc0fb70bd9398ce4f7dc00180654ce0fb46c0f63d8091186b07c4c5ecb,2024-05-16T13:03:05.353000 +CVE-2024-4352,0,1,543678900b434ee8ba089ce9911d0a1e4a305b9d1c5fd39e5060621fa9021262,2024-05-16T13:03:05.353000 CVE-2024-43520,0,0,50c1f8fa3107ef35ae7a9e731daf73ee98a87962c259c53ca782788417fda342,2024-10-10T12:56:30.817000 CVE-2024-43521,0,0,7571d715b407ce425d83b4095580e59f0849b0bf24bc5e965b0c626fd7da0e54,2024-10-10T12:56:30.817000 CVE-2024-43522,0,0,bd38eff6f768e0bb8c778634c9dd831e5a264d950c8be21b20d6e5a1c9f2c99f,2024-10-10T12:56:30.817000 @@ -259518,16 +259518,16 @@ CVE-2024-43523,0,0,4558c55e30f061b9c674d5b3abc74dc776fed7ab9f5b001a70ae1086a2f50 CVE-2024-43524,0,0,1724b2f16c6d23cc3984120392a815e76d36f338ecdbdf210ef2e4986d90174c,2024-10-10T12:56:30.817000 CVE-2024-43525,0,0,840102d4e72691185278702ea3dd0de1ec11454fd26d0a8e517205b482892d44,2024-10-10T12:56:30.817000 CVE-2024-43526,0,0,0061ba3601562593d0b94a790514398a1bfef8da02c84eb484880d4a22cdabfe,2024-10-10T12:56:30.817000 -CVE-2024-43527,0,0,a50ec8edde3cf97e5fa45e07d3a34efdf0cedc44dd4bb1030051d4b909ff488a,2024-10-10T12:56:30.817000 -CVE-2024-43528,0,0,a1828ed90f14854add887a9de03f43b3a538ffea82b80d8ef17d168a3bed99ab,2024-10-10T12:56:30.817000 -CVE-2024-43529,0,0,c5f90219f798da6c39288523905c8ceebfeaa7ccd7fbf9b23616c3b01099dd0a,2024-10-10T12:56:30.817000 +CVE-2024-43527,0,1,030e0505556f9d785df237650d8a1e72e8588cd2d402f2b5947f8e847be8d6ba,2024-10-10T12:56:30.817000 +CVE-2024-43528,0,1,e238c6cd891da6085c25129b0aaf6e2f4c5131cffb55ce1ed67b8f5ed35abc15,2024-10-10T12:56:30.817000 +CVE-2024-43529,0,1,fdb4f7b351045f4507cce4316f949189e399a458ba9cad25ad624cdfb54d1a33,2024-10-10T12:56:30.817000 CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 -CVE-2024-43532,0,0,24636bc9d248f747d9cdb1ffb55c5cb5b6e7a075e729d6479e8ce644b6249f88,2024-10-10T12:56:30.817000 -CVE-2024-43533,0,0,6a97805797bc12363a585aaf212ce48b45741f816fbf6aabe8ea5c723dcc07d9,2024-10-10T12:56:30.817000 -CVE-2024-43534,0,0,97b1cd117a416f9f18bfdc87ae5c0101182cac6701a00b6e9f8ebdbaaeb7f5a0,2024-10-10T12:56:30.817000 -CVE-2024-43535,0,0,95a2701a57ae3dfd24abda1488967fb07937702097440f1c709c0c677658e9f4,2024-10-10T12:56:30.817000 -CVE-2024-43536,0,0,9b725e0fd5af8914732e4c0c29c421af61e1d7e0fa1e9ddd76f16ee73e9935e1,2024-10-10T12:56:30.817000 -CVE-2024-43537,0,0,de471b3600df3043e4b662c1de633c745e181f76adeb45a19405d79cba2c3e6d,2024-10-10T12:56:30.817000 +CVE-2024-43532,0,1,f49c75d060c30a2058bcff30c424d1c7222325f73e003dc86c70af996b81ad7e,2024-10-10T12:56:30.817000 +CVE-2024-43533,0,1,34dfc4a5e4f503750cb5e40d13f63ea6bf4b1de3dd9fbbd2d3ad8344d8c0ef61,2024-10-10T12:56:30.817000 +CVE-2024-43534,0,1,5827e3fb82c00baf3523732cf83c0fe7d21adca42cdca256f07369c2ba9eca7f,2024-10-10T12:56:30.817000 +CVE-2024-43535,0,1,b540b3e2f51c003b7539f34e3a5f87871168fc17a032fe1ee941b340ad452fed,2024-10-10T12:56:30.817000 +CVE-2024-43536,0,1,7a831e16a0173e7c67d4834a0ee81db4cf4830434756b4cb99b9d449153ef270,2024-10-10T12:56:30.817000 +CVE-2024-43537,0,1,d1a96b66f7cd0120a50427488c00f549e059e69fef39642c4fcfb2039cfb867a,2024-10-10T12:56:30.817000 CVE-2024-43538,0,0,855e9da7e6b48f846fc157a254dd765bb9dc56f0d4d7f802def7c1a1aa2d4890,2024-10-10T12:56:30.817000 CVE-2024-4354,0,0,664e83e852799af34d5f786f17cdf52435e913db328cd710bdb953811fde5eb8,2024-07-18T16:14:41.387000 CVE-2024-43540,0,0,99421455f162a78e51726cf4d736fd07d0f8dd60e0a4fe07b8a115450debffe5,2024-10-10T12:56:30.817000 @@ -259554,45 +259554,45 @@ CVE-2024-4356,0,0,c314fe1608f5a3b59bb87f88c052e04f3d51ca5a5e09c7b63a9301a39fa91b CVE-2024-43560,0,0,bc69c825b8ed4022c0a791d0ea0f187a67b2728e5a8eeb6b7dc0905da189ae5a,2024-10-10T12:56:30.817000 CVE-2024-43561,0,0,eac326be7f3c583f78f6a14846a707a9c45fee20c4f0656c560698a192bede5a,2024-10-10T12:56:30.817000 CVE-2024-43562,0,0,83b09d4691b3f6a6c1e2096fbe19a00e90cfa898ec8ee3d9df0f9a699857a4cf,2024-10-10T12:56:30.817000 -CVE-2024-43563,0,0,69245fc39dd2eea7489c63774fe6981665b3985d85b7f54fac1599792787b5e4,2024-10-10T12:56:30.817000 +CVE-2024-43563,0,1,c004761e68275571bed72c5a0e8766b1241a8ba5ccccb005f5d9271fb2e047f4,2024-10-10T12:56:30.817000 CVE-2024-43564,0,0,886ca69de72113b6dbaaa96694e01d78005a7b8e6e71316deb862bb438bab379,2024-10-10T12:56:30.817000 CVE-2024-43565,0,0,c466c8aab3d31d3785b78ed81988bff14a09a9e44dcf3b51840fc9b63ca0d8c7,2024-10-10T12:56:30.817000 CVE-2024-43567,0,0,5254211d003cb9dfab5d0a0274d50ed06371d19404c4e47d666432ca57706882,2024-10-10T12:56:30.817000 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 -CVE-2024-43570,0,0,016b6e94609b530b65d5100c09249d20ef14a15a752087ce1bb1b7159fb57dc2,2024-10-10T12:56:30.817000 -CVE-2024-43571,0,0,015df71595da42b0884946bd78c15bf74fc19709a1096441e42c8f5ef0b8f816,2024-10-10T12:56:30.817000 +CVE-2024-43570,0,1,88dda18dea5aab30a8b1636887b7cb6c4f34115391115ea688abc04bc8fde786,2024-10-10T12:56:30.817000 +CVE-2024-43571,0,1,f8edfb2787c1eab934cc303c5abe72e106c9e4b70ca9942d956c6f31636d811b,2024-10-10T12:56:30.817000 CVE-2024-43572,0,0,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000 CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000 -CVE-2024-43574,0,0,30d4174ef4e94dde6f0aa7093742f8a5ba6bcc65556c31badec28200fce82b19,2024-10-10T12:56:30.817000 -CVE-2024-43575,0,0,eec07e542dee921a9f44a423761686ae2ce04f8b4b0745d9fd5ba52addccbd98,2024-10-10T12:56:30.817000 -CVE-2024-43576,0,0,d76a890bff782679827ca6165aa10af7abdcfc7817f90ed044c9e8a2ad69acdc,2024-10-10T12:56:30.817000 +CVE-2024-43574,0,1,a0920743051db98a99f574b7bb3a6476f4b57fe6be6e46d01afab92a0b649720,2024-10-10T12:56:30.817000 +CVE-2024-43575,0,1,fc73d17bccf6876bf61418a511f9695f1568dd7cd1aee7d4081b5fdc8210cdd2,2024-10-10T12:56:30.817000 +CVE-2024-43576,0,1,249305b9082f7eb5aedef9d41c9795b63af1c113de502f00f8de95d1c40a4c57,2024-10-10T12:56:30.817000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 -CVE-2024-43581,0,0,a80d93c6e7b0c024fe1b97d4e4deec65c6f1b75af5c2e2556fa59d3812bec056,2024-10-10T12:56:30.817000 -CVE-2024-43582,0,0,c174c728bb8cbf8ee0fe4a084b41624024851d93e790a9646ee163df3e34c072,2024-10-10T12:56:30.817000 -CVE-2024-43583,0,0,30248c1e5bb2b577d1370be438ebb2edd7fdb61cd665397de01a282c21157b09,2024-10-10T12:56:30.817000 -CVE-2024-43584,0,0,2e3cee08849cb8bdaecb50171cde03851673f8c0a8ee3f8c1fd5ebd59fedc20c,2024-10-10T12:56:30.817000 -CVE-2024-43585,0,0,14d891ce200ffef85bf5f5cc40410c2359442d013a746d88958cfe01ea95c884,2024-10-10T12:56:30.817000 -CVE-2024-43589,0,0,779309fa13b7a7232732770568e2e21b2e4ac6fd0e02562e2d37b264dca69d8c,2024-10-10T12:56:30.817000 +CVE-2024-43581,0,1,3408ef9f09a181497b64dcc3dcedb4431383818f60869645b5385a9474d018ca,2024-10-10T12:56:30.817000 +CVE-2024-43582,0,1,ee8e800fc27c9a765c6886a0ec7b4692b4f30050ff2f30877dee298387f20fbf,2024-10-10T12:56:30.817000 +CVE-2024-43583,0,1,496910bf3a5c58d8d30ef71a00554324066e65d62a81e2f3f536622c84a6d993,2024-10-10T12:56:30.817000 +CVE-2024-43584,0,1,49e1f81db3c49141093c0d681d3dd19c231fcb9646ebc3b0e4093eb6d02e298a,2024-10-10T12:56:30.817000 +CVE-2024-43585,0,1,4898d1c3f1c624615e5f4d4242c682115f1089245ec144c969f207462924bdfa,2024-10-10T12:56:30.817000 +CVE-2024-43589,0,1,78d47cc785569b349dce95fb2e6d8a34e6eeefcc81296c73c51c2f00b5575977,2024-10-10T12:56:30.817000 CVE-2024-4359,0,0,14ae9b130c152b886b9b21ff0fc5d35432a1812b898a1bc13704faab705127c7,2024-08-12T13:41:36.517000 -CVE-2024-43590,0,0,08509536ff9c79abbfa486d83a5a0f57d76e099d60a2b112924226b227614228,2024-10-10T12:56:30.817000 -CVE-2024-43591,0,0,802f53ec865d08b330f0aabdc385ca597aeafc744bdb5c1774245109df75a259,2024-10-10T12:56:30.817000 -CVE-2024-43592,0,0,5efe44dec6337a2ded281d09757e36954051913e78a754a1098617de3a9c5e9a,2024-10-10T12:56:30.817000 -CVE-2024-43593,0,0,fb9a1062086381851e8f55dc14ef4411fbd20747277c189fc913d2e82cbeb351,2024-10-10T12:56:30.817000 -CVE-2024-43599,0,0,26a290d406e9ce427b10e2a846d84ad0be9637b6bdd980c6073be0166ee484c8,2024-10-10T12:56:30.817000 +CVE-2024-43590,0,1,540bda35bad73e0203e9d35af74fa8169ca2056d2d3a63e9c6136ec610c34bfd,2024-10-10T12:56:30.817000 +CVE-2024-43591,0,1,d517d7743c9db23b79fd0ac9627b8989785700423690d15f2471e2c28723a881,2024-10-10T12:56:30.817000 +CVE-2024-43592,0,1,7ecc81cf1723714fa4e3de1f15eac00751a7a7544d8b8c45c193cc8c2f235717,2024-10-10T12:56:30.817000 +CVE-2024-43593,0,1,bdb519a73d468c07de00793af221602ccf6b3af63b116f963a7af3f2dba9f29b,2024-10-10T12:56:30.817000 +CVE-2024-43599,0,1,436cb9624682226b2994331d8731c94def94e4601b3b8f7d3fac50357f2fe4b1,2024-10-10T12:56:30.817000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 -CVE-2024-43601,0,0,4fd40479d84eb3cbc3273eef176251527f8e84dc5b2eaf57b74c33022051f3d9,2024-10-10T12:56:30.817000 -CVE-2024-43603,0,0,85034b29f18156372c3e787868eb5c7ad577eed817ef23a2a38f999c40904d41,2024-10-10T12:56:30.817000 -CVE-2024-43604,0,0,214c2efa553982a39e2b926502d8bcac2b11edeafde5f8e1853172383d956764,2024-10-10T12:56:30.817000 -CVE-2024-43607,0,0,d412aefe600a0b488e44add13af4a57e79c4e2f5a56972470dc8534c4adb39e4,2024-10-10T12:56:30.817000 -CVE-2024-43608,0,0,bab908a900d46d7577c407ae87df76b78e33d439a2cbb3dba0a9228bb3a3aaac,2024-10-10T12:56:30.817000 -CVE-2024-43609,0,0,a14ec00e6fa5ab9fc5ca5c77d03e4a181d2eebe89d9aa3c62f0634a627b0c61c,2024-10-10T12:56:30.817000 +CVE-2024-43601,0,1,d057cbbf9202a18594afb2273e03b3efcff28aee8b3791dc87936a528f6e8597,2024-10-10T12:56:30.817000 +CVE-2024-43603,0,1,09c4a14a3271d61b821b77c919851086c88f6b67e4600a64b558589085b5b78b,2024-10-10T12:56:30.817000 +CVE-2024-43604,0,1,21fdb707b820b91300f68cbab3f50cadb0fe97575c3284b47491f1eea1104823,2024-10-10T12:56:30.817000 +CVE-2024-43607,0,1,bffc16c2b831151c6e6c2522ec8335ce79fa8805ad054a604abcb44a67081505,2024-10-10T12:56:30.817000 +CVE-2024-43608,0,1,d778a741c452756f08141283b44511b35f848f925ff9e901d81fdc04d7ed6c5c,2024-10-10T12:56:30.817000 +CVE-2024-43609,0,1,8dc689c27b827967e02446e1b669e992d94fb0083bd4a02da935341a66d8338c,2024-10-10T12:56:30.817000 CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000 CVE-2024-43610,0,0,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000 -CVE-2024-43611,0,0,1f65f9f6b93bab07f1e8a360ddfe4ea9068a79507e9c7647fc5f282f71fcda83,2024-10-10T12:56:30.817000 -CVE-2024-43612,0,0,b9ea91d6b08c52c6883db6221a334151cec119dead0146a20f693826f7d9dc11,2024-10-10T12:56:30.817000 -CVE-2024-43614,0,0,64f24c7c50685f9ad3276f24b2007419cd80a81ffb1ba1ac8841a0319981b25a,2024-10-10T12:56:30.817000 -CVE-2024-43615,0,0,cabf3193aedb7ad0d3ed1fcb4aa0f0c8ebffb232db4d6dbfe6508c2976a26840,2024-10-10T12:56:30.817000 -CVE-2024-43616,0,0,c49966d1ed4a84fd45db5f44fd4fe7216478a4fc5f76649e6a4ae4cc72f2492e,2024-10-10T12:56:30.817000 +CVE-2024-43611,0,1,e71bb37110cf57f4ebc98f5c779227b1c5e9d69f96a05916c17f38187ef51de9,2024-10-10T12:56:30.817000 +CVE-2024-43612,0,1,a1717cd48c81cec47c45368f6b873decb99f46de9cc6e458935374bf5887afeb,2024-10-10T12:56:30.817000 +CVE-2024-43614,0,1,bcf84428144b3872d54a9a85ccb5ab2c26a221d0495e0b319c5f3a39fffe8972,2024-10-10T12:56:30.817000 +CVE-2024-43615,0,1,6345b6b14ab68ce525dad82dcc27a751e8c9a4e4271dc87a8834b97b4a5c4d2c,2024-10-10T12:56:30.817000 +CVE-2024-43616,0,1,1043a77fe9a25238a70bbd8fab7132e35c29a9756cf9cae9a00fa99c3cacbabe,2024-10-10T12:56:30.817000 CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000 CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 @@ -259601,19 +259601,19 @@ CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f5 CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000 CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74ce6,2024-06-10T17:16:33.380000 CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000 -CVE-2024-43683,0,0,826172f3f4ed144f6017c1cfaf3f797a25db9fe331d83a9e2c93931c491d4e03,2024-10-07T17:48:28.117000 -CVE-2024-43684,0,0,ae1b369848537bec0900bed98e77ad8fbec25bf4654cb6f8d15c8fa5d4139e8d,2024-10-07T17:48:28.117000 -CVE-2024-43685,0,0,c42b94b2b0ef2c5171886df252afcbb3c287719dee1f52d0681c8594b974997a,2024-10-07T17:48:28.117000 -CVE-2024-43686,0,0,3faef2b9c4b13d0b2f87037d78d38ecf82de57344ae428307ee078a756c63d6a,2024-10-07T21:15:16.470000 -CVE-2024-43687,0,0,626344a81ff0359c507d8cf807dc0ea6fc4d9964aa687fab9cfd15352abd25fe,2024-10-07T21:15:16.630000 +CVE-2024-43683,0,1,0f9f8a2ac39398b763adf8e25ace8cf858024443d5ecf1e8eb4bebc0fe80affd,2024-10-07T17:48:28.117000 +CVE-2024-43684,0,1,6491e24ba014b0f520d195f5b702da5a47c176ffcdc61829b9dd6571eb836d53,2024-10-07T17:48:28.117000 +CVE-2024-43685,0,1,abe63f7aebdfc5ef80d105f6cdf8648153783ef6fae252047757e1cacc34f3bb,2024-10-07T17:48:28.117000 +CVE-2024-43686,0,1,c045dc05e9c3ecab693f37546fb3862ed332aae6c800c243345ec23f6e640775,2024-10-07T21:15:16.470000 +CVE-2024-43687,0,1,645b9d87d61e6e7a396de6d9a452af3cb9c2831df0e35154a40f51852d71359d,2024-10-07T21:15:16.630000 CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000 CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000 CVE-2024-43693,0,0,86a2418e4d1748f5ff1d2c010cf8ecb2f43f15c3955c5a628ff84ac9fa94c8a2,2024-10-01T17:17:16.107000 CVE-2024-43694,0,0,1f38ed43c98bb35b4ccdf138bc4e0fc802b17a5cb43658b2fe1564d43a70cd61,2024-10-07T19:40:04.147000 -CVE-2024-43696,0,0,e70497c05994055ea569891985eb035774fcd7cc91f0d688c71d29361793b1b6,2024-10-10T12:57:21.987000 -CVE-2024-43697,0,0,97b11ac730c9781ee6409235bc2b5bf189ea6a6de3d050aa0aa33e03b4f3e185,2024-10-10T12:57:21.987000 +CVE-2024-43696,0,1,604582f0eb96eadff5ad4e946bd964b27b215d02a8edf4f0619e32b20ee90303,2024-10-10T12:57:21.987000 +CVE-2024-43697,0,1,cfe52331ac6a90710fe2dc00d201bf0d4a824c6a2a13622442c0a8b269f0e12e,2024-10-10T12:57:21.987000 CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000 @@ -259706,7 +259706,7 @@ CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216 CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000 CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000 CVE-2024-43849,0,0,4e7441e23902fce37752729b14d7b654ff080b4dff9f1f8570b222a7a4400bc3,2024-08-19T12:59:59.177000 -CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ecd2,2024-05-16T13:03:05.353000 +CVE-2024-4385,0,1,218d1e7a4ca055c9cc2f26803db027cb337ddeafcf5f646e236db9e9e217180d,2024-05-16T13:03:05.353000 CVE-2024-43850,0,0,7e6dd9c8f88731d422517e091653519aa83f51a04dd873998a3ab4d290941bf3,2024-09-30T13:57:33.400000 CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000 CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000 @@ -259845,7 +259845,7 @@ CVE-2024-43994,0,0,e95fee6088b53dd53004a837f528725d2b5541f3917b446ee4145995cc446 CVE-2024-43995,0,0,2396672b42e203af10501efd673b9ceca7d42122b563141aea70581f2ca682b1,2024-09-25T20:01:53.380000 CVE-2024-43996,0,0,4ab5e67e8284ceee786b93aed8adbdd80e1748d0425e228e0426548655b0c3bc,2024-09-26T13:32:55.343000 CVE-2024-43999,0,0,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000 -CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000 +CVE-2024-4400,0,1,5b653bf54f7bd4284ff54a803a56c0860c5d3b2bf58a6f974ce1eac832bfafb8,2024-05-16T13:03:05.353000 CVE-2024-44001,0,0,346ae8bf0c871825527e18434529b8ae58c66d1360bf3ccc9a5ea96d6edee082,2024-09-25T20:13:04.160000 CVE-2024-44002,0,0,a9ee9907ad6f165092347fc84904c323e2fe7244eb403d6a142135718b9384c1,2024-09-25T20:06:13.100000 CVE-2024-44003,0,0,5349233fccc3b861a24f3e5f6be5454244be5973fb6ae966dc1e7b789f2be81b,2024-09-25T20:03:29.867000 @@ -259855,39 +259855,39 @@ CVE-2024-44007,0,0,d7d1930aeec9d62758ccc2ddf09e21d07c0b586fa0d9735f7d5dee1a37d78 CVE-2024-44008,0,0,c6d2b6687f1293a95753882058aa8ed47455c99d54b3161e64050d330a139582,2024-09-24T22:08:01.060000 CVE-2024-44009,0,0,5b0cf6c82d301fa9d5358bb5d9e7b1a016eed523b7e9c7d9c1329e61fba4852b,2024-09-24T22:06:15.843000 CVE-2024-4401,0,0,48f8e641129f81284635fb93c6fe88c5c5fc547b585fa75e650b46a3bc3c0b8f,2024-09-04T14:33:01.807000 -CVE-2024-44010,0,0,b1f2be7477da5b85653dc2990e2d9a528d1b4f615ecfd839db7be17b3de42e20,2024-10-07T17:47:48.410000 -CVE-2024-44011,0,0,1a6b8f488801d0b31cb188725c104ce0f1eb61d1e9eae4384c7841cb39f32bb0,2024-10-07T17:48:28.117000 -CVE-2024-44012,0,0,a40a27416ce21d494278dff630eba866e083b9f5e6b11fbe47af822fa603539e,2024-10-07T17:48:28.117000 -CVE-2024-44013,0,0,b2a4182abba875718a6f5f5c0f5f726fcc8fb7fedd4755c5fb2d52a93f49dc40,2024-10-07T17:48:28.117000 -CVE-2024-44014,0,0,e52ded23bd4d2be4f0623a991a003c7cd77afb7b83668049ff61031eb1771154,2024-10-07T17:48:28.117000 -CVE-2024-44015,0,0,016fe3eec9f3b9d9f78d5311560e31b7edb7edff823b74780148476dc1f2a988,2024-10-07T17:48:28.117000 -CVE-2024-44016,0,0,2ffacd77f00b3425c5ab0c526eed9a7beb1e8e0e1d9961952b269c2918e1285a,2024-10-07T17:48:28.117000 +CVE-2024-44010,0,1,db1955c26b18962fdc2eae7ccec3eb8abe446738f2bd740c36722c24b60a6270,2024-10-07T17:47:48.410000 +CVE-2024-44011,0,1,3680a8d6e6f0251778adeed77c3366a7da3e80607d8c2c998ef910b5ba3cc2e3,2024-10-07T17:48:28.117000 +CVE-2024-44012,0,1,3a44ba1af29d483dcab9f7311ad9f8c0eaf0955f51ae3d6cf84135913b50d64b,2024-10-07T17:48:28.117000 +CVE-2024-44013,0,1,064b9458906f0a48dc5db3d65fe6f47810f41deb1a11a1b521201a139b187a7a,2024-10-07T17:48:28.117000 +CVE-2024-44014,0,1,5f042b28e1b9291dc61d17b71bd93421b1e6499e3b9c26009c7621e948e4ad38,2024-10-07T17:48:28.117000 +CVE-2024-44015,0,1,f36fbc737da75f70014bedb6265074a31a36d5a77264694bab01102a740a3861,2024-10-07T17:48:28.117000 +CVE-2024-44016,0,1,f3e2c58f555a1d1a1d7477b87f6bd24fa372c7711091d19d773c5da95f569f2a,2024-10-07T17:48:28.117000 CVE-2024-44017,0,0,937994d70d4da29139a5025f31ebc224350831fd4a4cb0a9e48d092a036cb87d,2024-10-04T13:50:43.727000 -CVE-2024-44018,0,0,9383788858b348795808727a2d012c1119d38c2edb10f06f41bb92e404856580,2024-10-07T17:48:28.117000 -CVE-2024-44022,0,0,f167468f138624c305e954bd62476a644724ea8a57bffb98ea7f96750fb1bbeb,2024-10-07T17:47:48.410000 -CVE-2024-44023,0,0,2ac9f683e221565847154ff234e6b35a9251507039c1a772b12d34532b852b75,2024-10-07T17:48:28.117000 -CVE-2024-44024,0,0,aa48a7539568ae7857b468334d82ed9b4fe3bd47611456446cb2d22ccdee160a,2024-10-07T17:47:48.410000 -CVE-2024-44025,0,0,89e0a7a4275d60d5886738bfbaa1065ccd7b3c65244223a72c4ef82a527e5d35,2024-10-07T17:47:48.410000 -CVE-2024-44026,0,0,06fb2c1e0baaca0e1467252a517f748f3628400584b7c2f1d2b29674eebffd14,2024-10-07T17:47:48.410000 -CVE-2024-44027,0,0,f5f45f6cd2d9748a131a9c5f0cdeefa2f139c2890c43358d4700d8a3197ecea5,2024-10-07T17:47:48.410000 -CVE-2024-44028,0,0,a81ec59c959fc2e9d741ae180338a52d38461565c7558d6bb92a5deda35d752e,2024-10-07T17:47:48.410000 -CVE-2024-44029,0,0,c8628dd4eda314e68d83b76dbcd6ce32af67c98ee37979ca785dbceb96613ee2,2024-10-07T17:47:48.410000 +CVE-2024-44018,0,1,64519d9afffbe61a46011de2497f98ed982fa8a85c2ea580048eabc3b3e19ef2,2024-10-07T17:48:28.117000 +CVE-2024-44022,0,1,59da236ed6c592ba221e5bfdd98d795c1862ca0af7502e4412a57c79299b7351,2024-10-07T17:47:48.410000 +CVE-2024-44023,0,1,3e80afa2098335cbe5b44a29718d754f60f5a8c954788cb462e136ebab403f4b,2024-10-07T17:48:28.117000 +CVE-2024-44024,0,1,fafea404f1ee2736b346b0a9ff991a76b7ed3e8dfd6cf3838151dc0c33fe9ab6,2024-10-07T17:47:48.410000 +CVE-2024-44025,0,1,61882ed6a5024d053b9326e1c6ce7bd0bab746412be7045ce9679dd383ee659d,2024-10-07T17:47:48.410000 +CVE-2024-44026,0,1,26b5c972e271bddd9eaa4240ec93499b946b04c8e3b9dad68e38f0a8b29c0a9f,2024-10-07T17:47:48.410000 +CVE-2024-44027,0,1,501494c000786f943a6b83d9af7b60ff090ae4143ffa4a4b8865fb285e6ac440,2024-10-07T17:47:48.410000 +CVE-2024-44028,0,1,c71bda6fa904af71833819a1b8ffb8b91875c65358d24edcfc0e90b1de66a755,2024-10-07T17:47:48.410000 +CVE-2024-44029,0,1,58cb282b3d1843293f4450f92cd1e14680eb30ec8088fe46f74c30198b5ebf1f,2024-10-07T17:47:48.410000 CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000 CVE-2024-44030,0,0,41fbceaad62c353538fb2b5ae5687078c5e6d2c028ef1d6af6a3cc9832e431b1,2024-10-05T13:15:13.327000 -CVE-2024-44032,0,0,5690b2f6ff85c67ed5eac66857a19af626e07f08158706e8b939044e88fe49ac,2024-10-07T17:47:48.410000 -CVE-2024-44033,0,0,bbedc0766e5545a04ecea228a2eed55abb9570c42d5af639c925d13b0a9717f4,2024-10-07T17:47:48.410000 -CVE-2024-44034,0,0,f4598f8ddeeb33f46510c31c13c4f4165ac36cb4e1c34fe35e961f79ae7eaf1a,2024-10-07T17:48:28.117000 -CVE-2024-44035,0,0,88f2a41439008e9110f441c768f6cc153b5977980ea1090d1dd2dd66a7eb2529,2024-10-07T17:47:48.410000 -CVE-2024-44036,0,0,71ec89d6fe1f8c041be50ca3430bdd980de835ddf753e7e7cbbfb5e148191dd1,2024-10-07T17:47:48.410000 -CVE-2024-44037,0,0,7db1e0137451425e05ceae28a2e8eaddd602c8f6e9663b6703f74371c5d44686,2024-10-07T17:47:48.410000 -CVE-2024-44039,0,0,ef4e20b5670a2cf64a399b016a869cbd9c9494bfc3e9345be51e0809ae7f6975,2024-10-07T17:47:48.410000 +CVE-2024-44032,0,1,6f0d0460b72cc8e65e0f9793c09bf5f10d948d305a76e32731b274ae4cc2f0f1,2024-10-07T17:47:48.410000 +CVE-2024-44033,0,1,0ed1afc2a35c3cf252139b5756f2b1c244b57ae94e2f444838786bd479651b9c,2024-10-07T17:47:48.410000 +CVE-2024-44034,0,1,a2ff941b0bfd8d1a69269e6af4ccc2889702119f40832ddd15b174efd7d86369,2024-10-07T17:48:28.117000 +CVE-2024-44035,0,1,9186528054e7e17340d487305b52de7f771c8b7cec939b63e7cd911b00f8e604,2024-10-07T17:47:48.410000 +CVE-2024-44036,0,1,fe1812f710dd64c5d9983c76603ff18008e3c62764fd1a47c6f46af7473388da,2024-10-07T17:47:48.410000 +CVE-2024-44037,0,1,bb981444859a65648ce90c2331a76f2ad4f473f9d57c53e72f08d771e859fac0,2024-10-07T17:47:48.410000 +CVE-2024-44039,0,1,5b56749f4aa045a89b3ada42b423dae9d16c29222e70d131e9f49139d85ca868,2024-10-07T17:47:48.410000 CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000 -CVE-2024-44040,0,0,1bc39f3045bd4b1bb33af60d1af5e016ea01e5527fb69b1735755ae52f9ee56f,2024-10-07T17:47:48.410000 -CVE-2024-44041,0,0,ec549ab579671f6b8a976e657287fb70140fff812e93ddc26071524c01055d2f,2024-10-07T17:47:48.410000 -CVE-2024-44042,0,0,4ec71147a8e017e99d77842b1c8679a5973b80e6327afe81fdb63ee1dc82afc0,2024-10-07T17:47:48.410000 -CVE-2024-44043,0,0,766867ad7cb139037276921e56754b7917d8ad14e448d5931af4f835f312c05d,2024-10-07T17:47:48.410000 -CVE-2024-44045,0,0,482878000f799cfd9bd21d2f1fa0b7344cb1ad2089cd2954743ec84cbea14fc5,2024-10-07T17:47:48.410000 -CVE-2024-44046,0,0,964dacd68fd5d3140ff1c7942f7486b11c441d44b45aa0252d26f7038ea16423,2024-10-07T17:47:48.410000 +CVE-2024-44040,0,1,c5e022095977cf8d51b7091e012aa28fca667fc54dcc944cf13e882a4bc589a3,2024-10-07T17:47:48.410000 +CVE-2024-44041,0,1,44254df3d43fe376d777eacb938224c4c246c1e96a864988f665bdbd444144c1,2024-10-07T17:47:48.410000 +CVE-2024-44042,0,1,99f7d5c5553b777fdeaf530c1f61a89b5bb70415aa524527ab157b9c84757d45,2024-10-07T17:47:48.410000 +CVE-2024-44043,0,1,a5f04a6bf2db6a9b5cc5a8d325936400eb56b1538d7f59b13e2a55663a8979e3,2024-10-07T17:47:48.410000 +CVE-2024-44045,0,1,3978d84ee0fe921b639d838b212ef974602eb3ef5b6ac5c9d36ee737029ab909,2024-10-07T17:47:48.410000 +CVE-2024-44046,0,1,215c90b6e02764bd08e96f351aace9a7f2857e3ab373036c40f88ac743c8b437,2024-10-07T17:47:48.410000 CVE-2024-44047,0,0,dcb68301e676e70a82dc46628c9493a0293e3e08d4f537ef9633f5a0b67d56b5,2024-09-24T22:05:25.723000 CVE-2024-44048,0,0,e9b1cc8fc597060cfdd72752b827b4aa13d91f1cd6810edba590f679e79cd789,2024-09-26T13:32:55.343000 CVE-2024-44049,0,0,a80b61b599be073262e16b82147c50606bc71e3542625749162e1fa755b6bc7d,2024-09-24T22:04:50.837000 @@ -260133,7 +260133,7 @@ CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315 CVE-2024-44777,0,0,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93cf1a,2024-09-03T18:33:38.413000 CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000 CVE-2024-44779,0,0,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000 -CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000 +CVE-2024-4478,0,1,dc98d997f68b2645bb873c7bfe328abb5688a66731db128671fb26c7a0667c8b,2024-05-16T13:03:05.353000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000 CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000 @@ -260329,7 +260329,7 @@ CVE-2024-45057,0,0,7c7e007dde24f3da86cc84f473547374b667803e777d6426ec3a48fcd5cb8 CVE-2024-45058,0,0,0aeca269943a7129c0404dfb981723de5fb36265ba0866f96f3a12be3215eefc,2024-09-13T20:06:33.193000 CVE-2024-45059,0,0,c6a55ab336d1100130455a63f91aee20aa7bff7dc7cd1c935c7137c38d9b84ad,2024-09-13T20:09:19.523000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 -CVE-2024-45060,0,0,7143d2d54a6021a987b539549896eeefcbac7eff25f332679ad991c9a771dab6,2024-10-10T12:57:21.987000 +CVE-2024-45060,0,1,731ee686a30721ce2f60b8ae1e688447d76cfba70a63bec1d820733c35694ec5,2024-10-10T12:57:21.987000 CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 CVE-2024-45066,0,0,a454e9ceebd31b55929c2c0a2d42869872cfc6fb29fa46b222f3049d82b952e2,2024-10-01T16:18:10.680000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 @@ -260354,16 +260354,16 @@ CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3 CVE-2024-45111,0,0,9fb0acaa2cfe1365ae260bae686a5d90e02d1dda50ec2516e7d6462b0987e021,2024-09-13T17:20:53.993000 CVE-2024-45112,0,0,fe220e89b9c90418cf9256ec0d1a61e1fb615761854b12c59226a9746bbe3106,2024-09-19T14:56:53.697000 CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186b6b,2024-09-13T16:56:53.673000 -CVE-2024-45115,0,0,c0d15d25834ccb11679279795695c8759dc5ffb68b58ffd67cc86ab12fbd63c9,2024-10-10T21:51:56.040000 -CVE-2024-45116,0,0,2e8417cf57660c41680a54b516a33af6bfa2655d4dea438d8f60db1721185df0,2024-10-10T21:47:27.763000 -CVE-2024-45117,0,0,50d3dab3d642d911df75864a2ffed044ab39b8438579d9a2b5ce56b55f3a5bc7,2024-10-10T21:47:11.257000 -CVE-2024-45118,0,0,f90980a9912fa334efade6e42cedaace6acb3f9bd4c108202dbb504666d50155,2024-10-10T21:47:00.927000 -CVE-2024-45119,0,0,7aa5ebebfc5cff150936b3197a45a460050c652be9abff4e3934364bac4209e6,2024-10-10T21:37:39.153000 +CVE-2024-45115,0,1,44f3d3d7e6cbfb9716d2aeed4c6872f67380791fa0673db900d919e23d985787,2024-10-10T21:51:56.040000 +CVE-2024-45116,0,1,ba10c288fa12238b6e33057da35cf808f94ca4309d8804acd55bde0bef485b3d,2024-10-10T21:47:27.763000 +CVE-2024-45117,0,1,63140a3dbb3f93a46a50aeaca1736c76d20d9a07045b8eb34614ba33b13e95d9,2024-10-10T21:47:11.257000 +CVE-2024-45118,0,1,cd0d79c3801c8de5b6dcdec3f7d822beb11f9433ab50bcb5e0605a5ec0487b70,2024-10-10T21:47:00.927000 +CVE-2024-45119,0,1,e48daefd89c78e4391e55da8266587fe1594e9b0f87ab359c3126d2ce74952dc,2024-10-10T21:37:39.153000 CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000 -CVE-2024-45120,0,0,5f0561f7069ac7696eeae13e26e558a6f6aedeb818e919517eb26d4bc1abbd6e,2024-10-10T21:37:20.763000 -CVE-2024-45121,0,0,2cee5e70ae658dedd8711e83034e604c9000553a071e8889c7492bbfbaeaf164,2024-10-10T21:37:08.743000 -CVE-2024-45122,0,0,416d7bdef3f05aa6196af57a7e46b71f393ea5306a521a39da2e865d3196eec6,2024-10-10T21:35:53.717000 -CVE-2024-45123,0,0,ce142fe257e2af522fabc394413dafdbd35cd8a9472574877f35e8bbc986e8ea,2024-10-10T21:34:32.123000 +CVE-2024-45120,0,1,0b2b8862b78e0c4ab449cfbd39cdd1b422486385647b43140b1e8013058c89e6,2024-10-10T21:37:20.763000 +CVE-2024-45121,0,1,3c9647c383d4e1de2d49997954d9ef9eca6b38600e0148a5e57a2f38e52707b1,2024-10-10T21:37:08.743000 +CVE-2024-45122,0,1,7090311bc6a8a5e9441d372472defdde614bfed302b3300aaa8561df317856b6,2024-10-10T21:35:53.717000 +CVE-2024-45123,0,1,fe18bb93125f42f6feb1442d276349c48cc3d45f3fac219d62f3044fcde70efb,2024-10-10T21:34:32.123000 CVE-2024-45124,0,0,26f1b1e9ac566a375a325226d77f8101a4d8a21f40f56a1d1db3cd186bb5244a,2024-10-11T22:05:43.650000 CVE-2024-45125,0,0,d41ac0876a02a9a5885bb943ab78f24f24e81df9c6782167a74ade509969d6bd,2024-10-11T22:05:54.723000 CVE-2024-45127,0,0,2fb2b7b557c21b56035d07b249c92752fbd6332ca94c716d768de23d17ade7fc,2024-10-11T22:06:10.140000 @@ -260376,24 +260376,24 @@ CVE-2024-45132,0,0,397d3eb797dedd1dd3095e2fb6f7b31811ba52b3d752c9b6f44123a8f440a CVE-2024-45133,0,0,103d543ed5581d1dfc304ffab62b79435b24bed8e495cc4abcf906721143af93,2024-10-11T22:12:17.887000 CVE-2024-45134,0,0,550e4d2b38e543b69e1996387a380be574f3babac927c5f3f5f9789e55179cfb,2024-10-11T22:12:19.693000 CVE-2024-45135,0,0,0b557b0805a0697b0bf5971b4d4d6cdd801c6fc3dfc152778ad149fbd479323d,2024-10-11T22:12:21.470000 -CVE-2024-45136,0,0,6d878b8fc19c1bbaa4211ae18c5528aaafebd03237826b2c504e0c238b7c9c3d,2024-10-10T12:51:56.987000 -CVE-2024-45137,0,0,ababe78ba9b8707d589a30ef25e9786587eb5690e3f605ad62718c447e4f0e2f,2024-10-10T12:51:56.987000 -CVE-2024-45138,0,0,ff26113f92d73f4e0243abadebc3cc88674170d4c50a5c390ae8bcee9b7e5f18,2024-10-10T12:51:56.987000 -CVE-2024-45139,0,0,bef568151e8877cf664c84451f75c608fb3433a929b7c602556fadbed55bbf1a,2024-10-10T12:51:56.987000 +CVE-2024-45136,0,1,67fd2c17e357e2970c95a1549d132dc50fc3f54a87f1453d64925b25b0cb9c61,2024-10-10T12:51:56.987000 +CVE-2024-45137,0,1,e8f89bb48f8f071acb2cd8b222740307121204249297338d7ae2ef6a3e52f37f,2024-10-10T12:51:56.987000 +CVE-2024-45138,0,1,33fa6678bdcebfbd1b661d0853521885d8e55b68541417cf6cbca40b6a48c1cd,2024-10-10T12:51:56.987000 +CVE-2024-45139,0,1,3604f6955d97dc1db8658fc98ee7f823d38ff01b40cf79332727db5efbe0d6bc,2024-10-10T12:51:56.987000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 -CVE-2024-45140,0,0,4e4e96dcb5f7974776961351c0dd64ece8de5b1264168bad3b1ca435596a3d13,2024-10-10T12:51:56.987000 -CVE-2024-45141,0,0,9f9cae352e6acdece86bd6c813b0a367416ac9c0a902515dcb6a491265c0f59e,2024-10-10T12:51:56.987000 -CVE-2024-45142,0,0,6dc72397caaba5c114abab9755e4241f84b203f38576b3ae8f818d2ea70e48b7,2024-10-10T12:51:56.987000 -CVE-2024-45143,0,0,a044f4c2e601b647a5a200d37a7cbb82f54800f1d75921780407b9f5c209af7a,2024-10-10T12:51:56.987000 -CVE-2024-45144,0,0,e0c90730fb1d310a9920d6d7253aed4376e3e2f4db4ef521210396cd355620eb,2024-10-10T12:51:56.987000 -CVE-2024-45145,0,0,64db84a3afb06c70040114eb4c29768ff0f4f0450893d0fd7c3be4dce996a99b,2024-10-10T12:51:56.987000 -CVE-2024-45146,0,0,3d3ac3cec43dc3d8a3ae36a2e22f9b1eb1c7d76488daae52e6b9e8c47b7fa9b4,2024-10-10T12:51:56.987000 +CVE-2024-45140,0,1,961a899a54de924c727bc6fed1c678f91c6f5fc0fa5ea604c28687d9aea54ad1,2024-10-10T12:51:56.987000 +CVE-2024-45141,0,1,9ccd3b533719f990b67176433b244b41628ebc36443f59b6e48fa602885c7645,2024-10-10T12:51:56.987000 +CVE-2024-45142,0,1,b899a3c7b6d3239b9ee7761606b5017b1ac2a9fac3e8b7b793d8ee66cd346c3e,2024-10-10T12:51:56.987000 +CVE-2024-45143,0,1,c9b9a124829e0d2a7d474321709c5bbc931c06bd5326351ea6fa85f162eddf2e,2024-10-10T12:51:56.987000 +CVE-2024-45144,0,1,64621bb6d61564f88f9feaa7e344b2f13a0396399af28a792d7d3f4e26dc3d76,2024-10-10T12:51:56.987000 +CVE-2024-45145,0,1,c1818470b42fece224cd41c8bc05042642e8ea9d58b46cefbfb3b1af17d7185b,2024-10-10T12:51:56.987000 +CVE-2024-45146,0,1,17ec48bf33b117e07b098d9477fe575ec7fef6e8962360588be61205dc1d5909,2024-10-10T12:51:56.987000 CVE-2024-45148,0,0,9cb33460bbb35056f58ae317dd69784c25057b5c95ac53296d7214a24f478bc5,2024-10-11T22:12:23.237000 CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 -CVE-2024-45150,0,0,167a4191471f3fa946e58a55111d7addc1a05cf292397eebc010a5c52c665dd2,2024-10-10T12:51:56.987000 -CVE-2024-45152,0,0,277bf8061ad989d3fb02585b018bc50b7247f827e72814d05b3a0214c8b184fa,2024-10-10T12:51:56.987000 -CVE-2024-45153,0,0,05c40a71199e1cd60b35af18f76fa03a1f83ce46a62e3e8f4fcd3f2716448b1e,2024-10-07T17:47:48.410000 +CVE-2024-45150,0,1,dbe919e5c667b9926e7c591cb1e366017443e889755041e9c87b727b9667b713,2024-10-10T12:51:56.987000 +CVE-2024-45152,0,1,b3b62c8846bfd522c7d9ebe6fad9797b4f74b91dc910766aa20410b4a9d34d81,2024-10-10T12:51:56.987000 +CVE-2024-45153,0,1,c9b6f6f604be874c28a0b3df41268a7f7c06f363d60093be6656ca781e4d7ced,2024-10-07T17:47:48.410000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 @@ -260432,7 +260432,7 @@ CVE-2024-45192,0,0,7ebf90a7dd47be6e13a820a7a55bd25a33fd9e3b9dd577584cb0c6cebe711 CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96a08,2024-09-10T19:35:10.143000 CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 -CVE-2024-45200,0,0,c366d9883d94c4bb990e8ee28865fe7670083f54cd70d7b6cff8a507c8ac37cd,2024-09-30T18:35:06.983000 +CVE-2024-45200,0,1,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f2e5,2024-09-30T18:35:06.983000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 @@ -260453,15 +260453,15 @@ CVE-2024-4524,0,0,8e732eea1a281702bf1b965cf73e8243f70f2376e5e0521757bce661838200 CVE-2024-45240,0,0,71d060de9ce29049494d6966979673903641ebddefc965fc9df5c7a08f6ba1cb,2024-08-26T12:47:20.187000 CVE-2024-45241,0,0,db0315abb9e90395d374e44a8c98955e324445d54e9a189001fc6da18a250f14,2024-08-26T16:35:14.650000 CVE-2024-45244,0,0,a9f691efb65025129369bbba49bc88f6c172529b68c55b8214f47c2d49100aff,2024-09-12T16:07:49.530000 -CVE-2024-45245,0,0,80cd48331eea418056cb3a518d01564a63d2656469f495e67c01128bff43a44e,2024-10-07T17:47:48.410000 -CVE-2024-45246,0,0,879416b501e72449d76a12642fc995ddc20c2ad021c2e281ad9540a727577d65,2024-10-07T17:47:48.410000 -CVE-2024-45247,0,0,38e05d0b86df7143b53d7751d51a632ca9834ab72e7732be65d0a6f51aded22d,2024-10-07T17:47:48.410000 -CVE-2024-45248,0,0,ba84465066d9e2d065513dbbb8ad71ccdbe81da9373acaa18139c3941b8b4f0d,2024-10-07T17:47:48.410000 -CVE-2024-45249,0,0,d97e45715f0ded7f46ffd10b265ba30e30faf5cd0124911cca83bdd45c23ab94,2024-10-07T17:47:48.410000 +CVE-2024-45245,0,1,b25df5848e1262f8558faee75f4c21da809ef74bc3ff13bc7e48405a4a50dd95,2024-10-07T17:47:48.410000 +CVE-2024-45246,0,1,94be062f72d49f47aeb4b27d54c3f9016c0bc6c7db145a96e840fd34f148105c,2024-10-07T17:47:48.410000 +CVE-2024-45247,0,1,19da4af116ac676d62458d603db2c8ee1112c221c1035d5f38597ce8b9b05b32,2024-10-07T17:47:48.410000 +CVE-2024-45248,0,1,a457ccd81bd2d86372ffeb241f5522dbb33f586f30f76fa927cc63225b59dcbc,2024-10-07T17:47:48.410000 +CVE-2024-45249,0,1,6aa6cc3386b0cd02f2724abec8e14f9d4a6369e9108adb19cd2513cc33e55700,2024-10-07T17:47:48.410000 CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d43,2024-06-04T19:20:41.620000 -CVE-2024-45250,0,0,ba7fbf1ae960de717e22a8050d430c19adf5f14cad6ed1e0401bb4b75b589e9a,2024-10-07T17:47:48.410000 -CVE-2024-45251,0,0,fb8c7e1d143421b1ebf510c0d8c210805e05af7964c83ea401e9579c91bc1598,2024-10-07T17:47:48.410000 -CVE-2024-45252,0,0,057d2713666a06a7e78d20737cb6a37a1ac1c6ab8c492a9e891102ad19e9ecfe,2024-10-07T17:47:48.410000 +CVE-2024-45250,0,1,e9b56e111bbc8f345e771d0d97f6c666ffbfb94747161b5a547dc2214faeb00b,2024-10-07T17:47:48.410000 +CVE-2024-45251,0,1,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86ba8e,2024-10-07T17:47:48.410000 +CVE-2024-45252,0,1,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000 CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000 @@ -260484,8 +260484,8 @@ CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e037 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 -CVE-2024-45290,0,0,67c9f06afaf7c9000319aff979fdc964b30c95f99c630d23d3f12bf51b9f9421,2024-10-10T12:57:21.987000 -CVE-2024-45291,0,0,cd19076fb46af1755952b6946de43599535cf49f1e62ad582091cdc532a73c05,2024-10-10T12:57:21.987000 +CVE-2024-45290,0,1,32e2df66e8e3d531c736fa940290cc4cc5821dfa1e9fe65dabead90339bad7dc,2024-10-10T12:57:21.987000 +CVE-2024-45291,0,1,0e4eaa2309d5ed1749dc27efc57e52e67d0c8b53f6f8a8fb7f35a957580daa37,2024-10-10T12:57:21.987000 CVE-2024-45292,0,0,e6e59897c6adcfbffa941572d5833988c8c05ede32b9058681f709f7731a274c,2024-10-10T12:57:21.987000 CVE-2024-45293,0,0,430350ec91188531418760350e8f549756bfaa1ced9621751a07b456acea4484,2024-10-10T12:57:21.987000 CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ffc78,2024-09-06T17:15:16.977000 @@ -260531,7 +260531,7 @@ CVE-2024-45372,0,0,0a1d0605c681771c6729a3a683574f05f2ef151ec9ea8ead25b225094be60 CVE-2024-45373,0,0,f227d5262560442f4412f4d20983d9dae0586dd2cf3e8b0af32f7de8050a4907,2024-10-01T16:13:23.823000 CVE-2024-45374,0,0,244624a63c9f42692e6c43912de4c5a441e56ee9d5cc6c169c1c677cdda1781a,2024-10-07T19:27:17.363000 CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000 -CVE-2024-45382,0,0,6f0e6c22e2361bdb3eeb90ff3c8ba010e94d7d59d2ef657152fdf477bafa1128,2024-10-10T12:57:21.987000 +CVE-2024-45382,0,1,112b9cd91f96129e4ab636a083c0739f3d8ba8a24cd1e7a1e213734296c9442d,2024-10-10T12:57:21.987000 CVE-2024-45383,0,0,235a14ef262025a5c45e6e746df2b6dcf33186b99aef4d19b36fdcfc9676da5c,2024-09-18T20:24:29.247000 CVE-2024-45384,0,0,f2a07deadcaa2c60a6f6b273b6a0503965f9217a6b6f4dbdbe6211d5c2784b64,2024-10-02T13:57:30.280000 CVE-2024-45388,0,0,28676e6d1c1faf0a789ad4f826a6462261feef9ecff64b3588c21e46509a5b28,2024-09-19T15:18:32.007000 @@ -260586,29 +260586,29 @@ CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb CVE-2024-45451,0,0,48b512aae28f050030a3079457d4f6895fe3bb1928b27b88000e380a07e6de13,2024-09-24T22:02:48.057000 CVE-2024-45452,0,0,4047a805b68a8ced2844a8ca7ba17139f576bc1b78cfe202a5caf646808b8ca7,2024-09-25T14:19:17.113000 CVE-2024-45453,0,0,9e87320d9aece790508cb80c393458900d9a39ff4cb0035fefb7977f305b18b6,2024-09-26T13:32:55.343000 -CVE-2024-45454,0,0,877742faf1b58a604a36f2b45254e16a9a3b40340e5366c679c6d6226ccae209,2024-10-07T17:47:48.410000 +CVE-2024-45454,0,1,d5d4cfb0b2f31159a2a7694527d1acf57c2b08f2b92aaa165dcd0311b2c6e3c8,2024-10-07T17:47:48.410000 CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000 CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000 CVE-2024-45457,0,0,5900191db09039069fbddda66128c2809bcb929085a84aed28a0c8f708ed46f3,2024-09-19T20:53:46.313000 CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000 CVE-2024-45459,0,0,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000 -CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 +CVE-2024-4546,0,1,b54fd960b0f682682e91f5a439869fe44d7d9c83b2d79e063c1697b7441a9761,2024-05-16T13:03:05.353000 CVE-2024-45460,0,0,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000 -CVE-2024-45463,0,0,753a2389a036122d6afd81d46099783bd4cba38ebec2118ef305202bf8ea9ef0,2024-10-10T12:56:30.817000 -CVE-2024-45464,0,0,b399f2e174885175c54e656ea7877de1855a0a43afc304e50bb8a53cff6ac079,2024-10-10T12:56:30.817000 -CVE-2024-45465,0,0,1490cdde4e29e216e29bf5f0999d0b7831d1420e4546c3b7cb08da60ed215533,2024-10-10T12:56:30.817000 -CVE-2024-45466,0,0,f8ce8310b00501132b514b35045cf646b9c968bf8cf26af3117ba8cecf0045b7,2024-10-10T12:56:30.817000 -CVE-2024-45467,0,0,811e47e317463120d1ea2b0746e8d6d15ae036f53fb3562e99de1c093296a4e8,2024-10-10T12:56:30.817000 -CVE-2024-45468,0,0,34dffee908db119ed79de36ef0da8f86c086a031e0117e25e4c7820e1e63d6c1,2024-10-10T12:56:30.817000 -CVE-2024-45469,0,0,37d1a714141abedde88d425c477e8c35b9117cbef078d22fdceed1f04b83dc31,2024-10-10T12:56:30.817000 +CVE-2024-45463,0,1,cdcea86691a42bb3718c680a8aafd9c0372d5b2d85c200a8d0b6f6dfd4eb5a96,2024-10-10T12:56:30.817000 +CVE-2024-45464,0,1,af319a7ff3159a05ea219edbbab82c156f366142997d98c7b50eac419269c145,2024-10-10T12:56:30.817000 +CVE-2024-45465,0,1,7acd3962fe80b04ac6daa118302f0822dbfd71a46fda61089b8bf3aa1e60f9ff,2024-10-10T12:56:30.817000 +CVE-2024-45466,0,1,06de8d8c27710a29a7bf41bdc0f02fa7ab1da66ecc1f1d2c8e9b737429b7448c,2024-10-10T12:56:30.817000 +CVE-2024-45467,0,1,f1bfadae19da043ebcce84605b1203caf49f2aeb9bcf6afe38694b6f4ef978eb,2024-10-10T12:56:30.817000 +CVE-2024-45468,0,1,330330bd977b00ef8a15aae5eda5b62cb865f08921f37aede42594070486fe70,2024-10-10T12:56:30.817000 +CVE-2024-45469,0,1,a87cc701e25d5b29235b8d691ba301882ed8901aca1f67cad496e1de80c329cd,2024-10-10T12:56:30.817000 CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000 -CVE-2024-45470,0,0,e5910c5bcd21a264a2b2f8026637e65d1c0865d084fa77b784e5c6df0e63c667,2024-10-10T12:56:30.817000 -CVE-2024-45471,0,0,282ed1c2908fd3771eeca48c6e2725243a77a2dba33b8db2fac85d483a84d6c1,2024-10-10T12:56:30.817000 -CVE-2024-45472,0,0,047f66f4fc63b30dc3377e19fe7e1eaa41e050a1bff0df81ead54424dcaff80a,2024-10-10T12:56:30.817000 -CVE-2024-45473,0,0,bbe9e385a802ecae1d7a29aa8de7c550bd18fe558e57c958961dd9472995b64e,2024-10-10T12:56:30.817000 -CVE-2024-45474,0,0,a0ddaa197d0a6f18a3381fe25ddd46494e3063f494fcdf4958fe610a91345d1a,2024-10-10T12:56:30.817000 -CVE-2024-45475,0,0,2a8775948b19b259dc06b6ee74e0fffefe3d3a033d3847f123281a0e918745e4,2024-10-10T12:56:30.817000 -CVE-2024-45476,0,0,cea7e6bbd20316e6e5c72af2800f511d519622a660145fe2596e19e693c34849,2024-10-10T12:56:30.817000 +CVE-2024-45470,0,1,af7621058315273a9d9d80781d5a0123075b86433e73e88feb26bb75452bf51f,2024-10-10T12:56:30.817000 +CVE-2024-45471,0,1,819e9624c0a7d6b0b5fa236cbb7942ab21f0c2d601b124679620b077ad08e591,2024-10-10T12:56:30.817000 +CVE-2024-45472,0,1,f6f6a83d22a942279f9ea188b44ab67eafa95c391ae15f1b2414714ddc37d2ae,2024-10-10T12:56:30.817000 +CVE-2024-45473,0,1,fbb7c01df578940f65b11842ddc021d807e26592e7650070a8e3ecc45607a906,2024-10-10T12:56:30.817000 +CVE-2024-45474,0,1,625bdfa5349fed7435fd744e56e13c8ae80f81cf1a4d6b967682db8dabae5cde,2024-10-10T12:56:30.817000 +CVE-2024-45475,0,1,1ef890e6c1473a1092036737681b040eaef2f4fb9673db9633557fd1b12b190f,2024-10-10T12:56:30.817000 +CVE-2024-45476,0,1,143c5c8aa2c58aa41af47bd7aad0c638bcdd04171217d4f701f500727f114af2,2024-10-10T12:56:30.817000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000 @@ -260722,12 +260722,12 @@ CVE-2024-45792,0,0,5abb7de999f910eaa61796ecbea33f574a65653e2aa062ee4c5c2e229e356 CVE-2024-45793,0,0,9df195d476b9f18fe89dd15d9de75cbf87671a956c83113b39ce1c0cbc87094f,2024-09-26T13:32:55.343000 CVE-2024-45798,0,0,36d6c14bd6da02b6f563e24f34a8e0ae70f5e9226b87bf40201ee0b5fcb96dec,2024-09-20T12:30:51.220000 CVE-2024-45799,0,0,57236f37d51cb52dc4abff4e8ae9968f58089f5668de4fddcdb24ddcded04f03,2024-09-20T12:31:20.110000 -CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000 +CVE-2024-4580,0,1,f99138bfd0684bd0d747f9e33cce7b8336876269ba637f66c2865bb254a7b704,2024-05-16T13:03:05.353000 CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53849,2024-09-20T12:31:20.110000 CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000 CVE-2024-45803,0,0,a103e4b6ec153497af7929b1abcca6c81c3d6f7a709474f445551e656cc860a0,2024-10-07T17:05:16.440000 CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000 -CVE-2024-45806,0,0,1c3174f121e417f27357dc7dda16a1e2c4833f0b06507c11184f179d784c0a2b,2024-10-03T15:36:55.557000 +CVE-2024-45806,0,1,cdee278cbe777cda1a5efba3550bc0f115b848bc781ed49af34d1d2ebb5249f0,2024-10-03T15:36:55.557000 CVE-2024-45807,0,0,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000 CVE-2024-45808,0,0,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000 CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000 @@ -260816,8 +260816,8 @@ CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c6004188 CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000 CVE-2024-4603,0,0,9adeb744a04b6e7c726b04f4a24faa6c0957c052c2ef086f262a131e3ba07cc4,2024-08-13T16:35:05.013000 CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 -CVE-2024-46040,0,0,1a18942c1f8c8ac8780d7d5d5f427581e6b0e44cd30d4608cd11b5323c6eaf5f,2024-10-07T17:47:48.410000 -CVE-2024-46041,0,0,e8a6a63d3a3676f45689f7dbb6dde0960de388bde075b6ece0cc6ba7a6de5644,2024-10-07T20:35:09.113000 +CVE-2024-46040,0,1,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000 +CVE-2024-46041,0,1,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000 CVE-2024-46044,0,0,dfae0b580cc93a2984a53d2394c3390df5d1e1d5f2ece9d0c43f69417b5fcfde,2024-09-20T00:34:08.463000 CVE-2024-46045,0,0,108f9c8e4853797b63697d7af7af1a5b80dac707aa37dab43fbb03c33dc311af,2024-09-20T00:34:27.807000 CVE-2024-46046,0,0,d88e41f546963afb3c8dc4aa1f8705fa450756c1e5acb49fcc6b21c71c7a13ae,2024-09-20T00:35:21.287000 @@ -260850,7 +260850,7 @@ CVE-2024-4612,0,0,1b39fddfaef3a23e303b671a3f6128ef6409891969be34333717855158fe36 CVE-2024-4614,0,0,eca609b72f6d0dbdf3e2930a517382c618b783ca5f3bbd2f9a2c62afa1f7de10,2024-05-14T15:44:12.883000 CVE-2024-4615,0,0,7b5276905c165aa4f37a2a2e956283f0d8e2b47a85a8c0a930e4cc6ae0292a24,2024-07-02T14:51:50.013000 CVE-2024-4616,0,0,cb1145576a9fadb27b9b56693aa172c2cd4c0e400aa0e13b3db507a976467534,2024-08-09T19:35:10.193000 -CVE-2024-4617,0,0,4cd6bb51ace32360e3804527fc92732217bbbf6aabf2b520cf171a9821115ed3,2024-05-16T13:03:05.353000 +CVE-2024-4617,0,1,d8ccc0ac36e175f03834db71df208060ef347f90b906285f677d665a97a4d23e,2024-05-16T13:03:05.353000 CVE-2024-4618,0,0,c37ae26f2e1f44a703054cee4816ca3bf0ad845eefa4a632c5bbef4a4e755faf,2024-05-15T16:40:19.330000 CVE-2024-4619,0,0,4a40c989d02466215a13e8ebc90eedd665aa01db8dc0a625ac187e77f54f90ad,2024-05-21T12:37:59.687000 CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd702,2024-07-12T16:12:03.980000 @@ -260858,7 +260858,7 @@ CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa86982 CVE-2024-46215,0,0,0edb1c764d687d6040f8379d963624cdf40d57ffe4221c99522530dbb9fe9b8e,2024-10-11T17:15:04.260000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 -CVE-2024-46237,0,0,feed7929a18595e09a4a774d6fced2d5d91ecf51e22b0c549b82335a7c6407dd,2024-10-10T12:51:56.987000 +CVE-2024-46237,0,1,a0f64eb1e4641e71cda28150c6a7085b4f541a320eaa50e27b069ce565fe1cfc,2024-10-10T12:51:56.987000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000 @@ -260873,7 +260873,7 @@ CVE-2024-46267,0,0,6fade8b2c5e9766e61096b13d0b6f799e6c4ae66905a450c5bc7d1c105e2d CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 CVE-2024-46274,0,0,3020e86956e6843828a0a7677fbe114f8046bad441bd88011112339d98b58bab,2024-10-04T16:37:30.007000 CVE-2024-46276,0,0,ba6c9d483af82dd2734a19e636bd58036683474d4934fc8937a305e4d99f4254,2024-10-04T16:36:49.997000 -CVE-2024-46278,0,0,7c449dca0e34520a80bfcea4a4b14e4c99ad837e71c1a2aabcd089bc8aa094e7,2024-10-07T20:35:10.653000 +CVE-2024-46278,0,1,26e686335c244c5bd5f81ade12d0d629e0ff04f9013adaceccad091ba17407a5,2024-10-07T20:35:10.653000 CVE-2024-46280,0,0,5a66b7ecdcd76d807c972a7ebea94a8133453c4877426c1300bbe2a7c6b81c87,2024-10-04T13:51:25.567000 CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000 CVE-2024-46292,0,0,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a265,2024-10-10T12:51:56.987000 @@ -260893,8 +260893,8 @@ CVE-2024-46329,0,0,8c93b211ce727ef89bff0e17a07fc114c301812ff446c3d9b747d9a6ed124 CVE-2024-46330,0,0,694a83d49b52528846704b8ab10d96522c40f75c60f0196ff365133296a0aac0,2024-09-30T12:46:20.237000 CVE-2024-46331,0,0,bc972d3ed92383a2cca8ac982c2c605e5d48eb080cd2e18eef8c2744ad28678e,2024-09-30T12:45:57.823000 CVE-2024-46333,0,0,353a1745548fb23b6f535da18db20a292a6e09d70b0bb02da74b22f7aa66ca4f,2024-09-30T12:45:57.823000 -CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000 -CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000 +CVE-2024-4634,0,1,3e794bb82c9505da52f30f2299e13a1215d950f4b505eb167b75a0f8a0b6c0bf,2024-05-16T13:03:05.353000 +CVE-2024-4635,0,1,56d126271dfb3ca2b0f4bcf5e51353297d62bd05a8b252ca2c1a6de0da14b575,2024-05-16T13:03:05.353000 CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000 CVE-2024-46362,0,0,8cdb883bb64f25e58b7c696699971ee36778fa528121237250c7da4497ad58d6,2024-09-20T12:30:51.220000 CVE-2024-46366,0,0,9c4e72ca3b8720f0b622f88753a363ffad436d80b8652149c9eddfd50537b900,2024-09-30T12:45:57.823000 @@ -260973,7 +260973,7 @@ CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000 CVE-2024-4657,0,0,e4551eb50aadbad4e8d70da122e3e5b28a0bd348b1d5555c6dab0b92557cea7b,2024-09-26T13:32:02.803000 CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000 -CVE-2024-4658,0,0,6b27f4629a4709da9f5df818e618a578d6df916d8a407726ce5dd45b44432682,2024-10-10T14:15:05.587000 +CVE-2024-4658,0,1,fa00630875db0efccba13c0100e841db98c8129cccb6c452ad93d82f90c19c29,2024-10-10T14:15:05.587000 CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000 CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000 CVE-2024-46582,0,0,4dc729b9802e75f61b77ace705aeb5edeb4d2f366d0a6bce4afc576e2ee3fa8e,2024-09-24T16:41:29.377000 @@ -261051,7 +261051,7 @@ CVE-2024-46696,0,0,4daffe95396a7dfd0d7acd939b4305def2a9b7710efef4f9245a07291857d CVE-2024-46697,0,0,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000 CVE-2024-46698,0,0,dd18a350b42292bfa692742bfea20969ac387a40a6df6f50c4209832f6c49c3c,2024-09-13T16:53:03 CVE-2024-46699,0,0,06698b262190134bec89f3644bb256a03fde8105e3a035b81d99b56d18cdb050,2024-09-13T16:53:10.620000 -CVE-2024-4670,0,0,08919fb788216a4ef8fb408ade2563afef66ea572b0f16375f44123bc9f15eb1,2024-05-15T16:40:19.330000 +CVE-2024-4670,0,1,7df7329fa7587e343ac82c7cb2b6843b56bee2e69055442d48d73bf63e489701,2024-05-15T16:40:19.330000 CVE-2024-46700,0,0,0809b1417331de171a8f18673376ec956a74775c6cc5273be5d5fb524451bf9f,2024-09-13T16:53:25.383000 CVE-2024-46701,0,0,2b995ef47ed18687aeeb3049ab731c20fe24451709393a91f623b4847307d45c,2024-09-19T13:40:27.817000 CVE-2024-46702,0,0,5aad35e2d7d1ccbb97d6a3251704aac50eabfd028ebefa2b04bd88e7e42de7b1,2024-09-19T13:35:58.637000 @@ -261282,13 +261282,13 @@ CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000 CVE-2024-47001,0,0,2bb4bf673c202add583b3cb6aa8d87ad17a722980665125974c3d12c60f8fe21,2024-09-20T12:30:51.220000 CVE-2024-47003,0,0,c6454df65c14575f310d6ef1594423fd9063d7eb945a40e78647d22752216edb,2024-09-26T18:42:29.383000 -CVE-2024-47007,0,0,f1da32d778579c639d348d7932fe3a87cb4d13bb121a4b77fd3299fc99ade58c,2024-10-10T12:56:30.817000 -CVE-2024-47008,0,0,6304f3206a75f5edd1a501bc59033639c067f22c6a3e72e03fea16877401ff99,2024-10-10T12:56:30.817000 -CVE-2024-47009,0,0,9d79bd3ee18f19b3718cbcb7b1a90a41bdd9b6c0b697c58ccd23d81e91fa167c,2024-10-10T12:56:30.817000 +CVE-2024-47007,0,1,cba47909844ff89b52b01f81272aa442efa9cc08afffba46ab835ac00f34c395,2024-10-10T12:56:30.817000 +CVE-2024-47008,0,1,c7534a20215bd95be86d32b3decf7881bdda0e595865d4dc9e1ba9e11cb17454,2024-10-10T12:56:30.817000 +CVE-2024-47009,0,1,93c4d7fb83910ede64f8945a04f24d6d6aa42133537ea8449962473352058ce8,2024-10-10T12:56:30.817000 CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 -CVE-2024-47010,0,0,cb4bd0dee6d0dcc3f138bf79d6d228aafb0e7a7a51f20b155114ee83f968ba1f,2024-10-10T12:56:30.817000 -CVE-2024-47011,0,0,d3a98b676003faf9763e18ead00360a4d335b1bed068aca9fc8f1abf2125edea,2024-10-10T12:56:30.817000 -CVE-2024-4702,0,0,dd020b59844aa3c2b904a852a1e5f578b8784127317756ef97f595c083848ea0,2024-05-15T16:40:19.330000 +CVE-2024-47010,0,1,c332d13d6bc4c9de707b0b305984e8b800597de3eb03c505d94cd9509d8d2bf8,2024-10-10T12:56:30.817000 +CVE-2024-47011,0,1,63c77aaaecb38ba40258fc3df08e68da3c72085ea6c4b317b044afd49303d749,2024-10-10T12:56:30.817000 +CVE-2024-4702,0,1,bbb2ec3c513c4ef6cbdc2bf640b4bb7115c796c33db7b092e6fb7d12cf64fdd5,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 CVE-2024-47044,0,0,404ff692afa802efbbfdf62c405c61d201fe4f2cebfdc0d42fd19c3d33c10bab,2024-09-26T19:35:23.043000 @@ -261323,7 +261323,7 @@ CVE-2024-47079,0,0,d8ccb016ae09801690996b7754595e296560f1a65a763da55e97f54fd5c7b CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 CVE-2024-47082,0,0,1308a2a31af2cc56619224d4839a59b43bea81793244865a2d1ff9a5500281b8,2024-10-01T20:01:13.367000 CVE-2024-47083,0,0,9f0f8f8e78b5ed1a065825a55f34b3ef3e9db7af7ca41f6fc7c1cda9271f0e45,2024-10-03T15:11:29.913000 -CVE-2024-47084,0,0,55fcdb108250db28e47344f2b1475cbdfe5eb4e73c55ecad892e73789442299b,2024-10-10T22:15:10.263000 +CVE-2024-47084,0,1,c91f3788bc5087705813b85d003c13c63debf5f452a8a5262c26afca227c363c,2024-10-10T22:15:10.263000 CVE-2024-47085,0,0,52609fda0dd3268fb54a4c4835942301029b5f82b7a9256b81c2395928ebbe9b,2024-09-26T15:30:47.787000 CVE-2024-47086,0,0,170e19d2a5f94228d179fe1c43d4342418d894a17ee62d0745e0ba04130a0c3e,2024-09-26T15:29:47.233000 CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005e75,2024-09-26T15:25:51.467000 @@ -261345,9 +261345,9 @@ CVE-2024-47128,0,0,34ea8927e934499e78ad6fe6ea64ad0e07c8dfb2bcd2b9a4925f5334d6b08 CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b227c,2024-10-07T17:54:22.923000 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000 -CVE-2024-47134,0,0,db1bd8dea5a1002d8dfec480b066db5543f1d53fc35c00fd65d265b2fc8b9892,2024-10-04T13:50:43.727000 -CVE-2024-47135,0,0,c05096e6ed7a405a9acbfbe9f475ec9efb11146d1aa8527686e9a8773957d005,2024-10-04T13:50:43.727000 -CVE-2024-47136,0,0,2d48461c8309214652e5b017fc8af3a7ce4f5876e09ec811be8dc0866545aca3,2024-10-04T13:50:43.727000 +CVE-2024-47134,0,1,2dc8636e0ee5fd2f97b814bd39f5b4217906ea0a61e539db830c2896b6e052cf,2024-10-04T13:50:43.727000 +CVE-2024-47135,0,1,447f1b653dd0637b0975f8b2a0589bbfb6986fc90885b0d8c45ddd003e931ff4,2024-10-04T13:50:43.727000 +CVE-2024-47136,0,1,1a39bed452003009147d69bd8fa96ae4884f50ab47a258dae1ff6b5248f61085,2024-10-04T13:50:43.727000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 @@ -261356,11 +261356,11 @@ CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776 CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000 CVE-2024-47161,0,0,b4f14ace0eaf8823c777465f809d23f928c4c28c11d0aa00813c7f2bf032d71e,2024-10-11T19:54:07.317000 CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000 -CVE-2024-47164,0,0,5859bc42ffdd144898177fea7518c38f0b763cb9f31d761bb56378ffa2f03ff9,2024-10-10T22:15:10.437000 -CVE-2024-47165,0,0,6068da0b880a9925adbf77cd58fd288fd51574aa798be6053315e56aaf5343e3,2024-10-10T22:15:10.680000 -CVE-2024-47166,0,0,45dd77a5d784d42ac99f334f6e944f20835acee188dd734009ffff9f00441e48,2024-10-10T22:15:10.833000 -CVE-2024-47167,0,0,5377ac66e1da2ed4cfc0180d5eafdd7a42c84a72740b0a07f5f17e274bc46ea6,2024-10-10T22:15:11 -CVE-2024-47168,0,0,a2425ae1889cb373d5d81ba24b3402b237e1bb3b52a1f88187929aa1b1939e18,2024-10-10T22:15:11.173000 +CVE-2024-47164,0,1,a1ec447043bd1dddc74e93bb9e6c6b48e1f0868e56517262031fca74fde471e0,2024-10-10T22:15:10.437000 +CVE-2024-47165,0,1,98c6f117034019d1f7723263cfdc6b1a538da8f36b9f6b9f746611e2ba975e0d,2024-10-10T22:15:10.680000 +CVE-2024-47166,0,1,3e7db29af66e64a4932ab8b1cdd42ddbc6f7782210754f14f9d6c6e640b4e7ce,2024-10-10T22:15:10.833000 +CVE-2024-47167,0,1,f07c25cff4fad7154b4ecff7fd13aa8364de2905f0f9193f46e7d72c04a4cb3f,2024-10-10T22:15:11 +CVE-2024-47168,0,1,fc89e113267c2850c58d8a8e3babcecaca76ef967c8b509906151afd8ae9d7be,2024-10-10T22:15:11.173000 CVE-2024-47169,0,0,3d7d577c82be13838843013d038c262ca65c719ce4179d733fb886eea7d8c747,2024-09-30T12:46:20.237000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 CVE-2024-47170,0,0,5b51e77bbaf0aa4d73aaed7035aaf98c0f3c0e8a355756474eeb1aa8a1be9c4f,2024-09-30T12:46:20.237000 @@ -261380,9 +261380,9 @@ CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 -CVE-2024-47194,0,0,c5f98d4439348bb473c6d216269b0fd49d360b5225da715086cbe605901747f4,2024-10-10T12:56:30.817000 -CVE-2024-47195,0,0,ca3aa224767325d3d44360b555ce9c70dd8e3a39059440cf5e0115a0d842b4e7,2024-10-10T12:56:30.817000 -CVE-2024-47196,0,0,725bcc38d18674e40f1ec37ab58fdce33d9dca897569213d607aa8ff222974b1,2024-10-10T12:56:30.817000 +CVE-2024-47194,0,1,ff8d883e86588dbf0d1fa41fd84a50a45c2e361a2e1254e7aab551c4ae907195,2024-10-10T12:56:30.817000 +CVE-2024-47195,0,1,11524131aeaf72b864d6d312b95f36a97a5b9facccf89b3be3c5b302eb23f009,2024-10-10T12:56:30.817000 +CVE-2024-47196,0,1,f1401785dc9ee0b9f7a86c7ab9c561f96041a7a0473b0cc98601a26b55287997,2024-10-10T12:56:30.817000 CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000 @@ -261409,87 +261409,87 @@ CVE-2024-47292,0,0,50a5f55d1cd7f04a27961f6de324de9237d82ece0981e52bba9e38c14afb7 CVE-2024-47293,0,0,8066415ca7197eb9a32d1acacaf53d321554e5f9cb22e4a1be994c73edda7213,2024-10-01T14:25:31.430000 CVE-2024-47294,0,0,616aaa0c0c25f743060360eec6e57e8d54e0c598ed571a7197a1a165758173ad,2024-10-01T14:27:54.577000 CVE-2024-47295,0,0,e2e23f79bdc2d34fff41ad7b237b64b4377c53fc19d83ce80e380fdc2e18eb32,2024-10-04T13:51:25.567000 -CVE-2024-47297,0,0,7af6b018b9a92571bb14839e5dc3122d129fea613c9284617f069e0d877d98f4,2024-10-07T17:47:48.410000 -CVE-2024-47298,0,0,aff6bbdd4546999b0d1a2c131516205f2b77fe202864b589d11344363eebcd9d,2024-10-07T17:47:48.410000 -CVE-2024-47299,0,0,0ad10820b8cd56a23c92d9a4a37e4dbdb371e61bb2b3b1bafde680dbb3c81382,2024-10-07T17:47:48.410000 +CVE-2024-47297,0,1,15d553d29468050e1f2a6334078655d58f66ba424ad7f6feb79e743b75124a29,2024-10-07T17:47:48.410000 +CVE-2024-47298,0,1,5e0bf18d2c868a02c3648bb82b90ba712a7f3ace13e60223733e9f9b2a10b740,2024-10-07T17:47:48.410000 +CVE-2024-47299,0,1,69ddc217eb16e2f207164d9621a98f8efcecc43a8fd19b4abba37eee03e8ebfa,2024-10-07T17:47:48.410000 CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000 -CVE-2024-47300,0,0,159ceaccb61bff3d46a2c31d010732d7c5a16c4931f382153e426b6c28658c4e,2024-10-07T17:47:48.410000 -CVE-2024-47301,0,0,bf665952387d320daaab3ba865075a403b52372627b91fc80767baa7969263a3,2024-10-07T17:47:48.410000 +CVE-2024-47300,0,1,e5260e77ae485ce7444a2bca3985a3a48c649071ed7d73d1439a6a493c414714,2024-10-07T17:47:48.410000 +CVE-2024-47301,0,1,ac90c43742dd943ad9767aa191ce247a301b3e33f4d7e439daf4f0d3b09b6647,2024-10-07T17:47:48.410000 CVE-2024-47303,0,0,bf8d75e01dd1aa85338666dfdc484b4a62ecc62745a2e39a6913339b9fa92fed,2024-10-02T19:00:24.750000 CVE-2024-47305,0,0,7c018d03a71f28200e41a87d693293b1e365b3b52710d7dc9c8bc548afdcc447,2024-10-02T16:35:40.077000 -CVE-2024-47306,0,0,ec40aaa5ced5c7ee06f8b6d55a0e544e87bc472bf0ce401264a434d943d029ae,2024-10-07T17:47:48.410000 -CVE-2024-47307,0,0,96c86fe71b71484b060aadd8c916784a8c1e94c27c275e101edc47c0ab686e64,2024-10-07T17:47:48.410000 -CVE-2024-47309,0,0,ed8e90c7403b65dc170e7a3e1da37da010e540a5fdce80c30c2f9cd32375bd6d,2024-10-07T17:48:28.117000 +CVE-2024-47306,0,1,eaf32b36bbd3f14919162085488bb2ae7d4855fa0c613850748fc5c60d229a8c,2024-10-07T17:47:48.410000 +CVE-2024-47307,0,1,487f26513afaa1868dd378174c9d3f7237a2ae92bed0d1dfde1647ea1d3fe506,2024-10-07T17:47:48.410000 +CVE-2024-47309,0,1,21dcfe3c0636d6932b8735e4db0f75a20433cb361cb491f225d3cc92dcd30979,2024-10-07T17:48:28.117000 CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000 -CVE-2024-47310,0,0,457e971a7b01028591b3b1b5408da6b7196c2102d34faef4b82f0df0b6d83036,2024-10-07T17:47:48.410000 -CVE-2024-47313,0,0,b265f2ef271483391b771a3052d3a510a0cb5c0b57c7f0c6fc59dadc4f9b259c,2024-10-07T17:47:48.410000 +CVE-2024-47310,0,1,8663484ee2c5b72222f0e4f9365fdd142731c8f04d18b42bdd48041cae516b98,2024-10-07T17:47:48.410000 +CVE-2024-47313,0,1,bc2ecdde437531f392b35f4f3c15088fd858be1b53245b6e08dfe84901b6ce9a,2024-10-07T17:47:48.410000 CVE-2024-47315,0,0,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000 -CVE-2024-47316,0,0,6cb0eb7349f7c1745a3ddc7f4df942defc918574987d417a407885129e438ea1,2024-10-07T17:48:28.117000 -CVE-2024-47319,0,0,b71e1ec30438dcc0dac3945f02436d4a8910dafc47d506cf635762e69fd3595d,2024-10-07T17:48:28.117000 +CVE-2024-47316,0,1,4bb4520f5213b3c8bde177c73e6a9c0ba6ad3dd3b6425b0d46c411f50cc87fcb,2024-10-07T17:48:28.117000 +CVE-2024-47319,0,1,ec119580ae92baaeaa77fbe02b724f0292ddb7d31e4363cd49fd4eca14bb6e47,2024-10-07T17:48:28.117000 CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000 -CVE-2024-47320,0,0,433d5f42dd5e8d8ecc7b793bd1b34bcd17aa3dc392e13fdb9964e6e3e275ef7d,2024-10-07T17:47:48.410000 -CVE-2024-47322,0,0,150599f2ecf1e4fd35292f14595c0a62412bda8b1e83cc1730cda31f9e77dc63,2024-10-07T17:47:48.410000 -CVE-2024-47323,0,0,f052699e3dc152d7e30419d25dcef39d7abdc7b313b79e9a1c3d80008bf2e7e7,2024-10-07T17:48:28.117000 -CVE-2024-47324,0,0,e57bac16f377ea5899d892d440c01078b2f4af05b67c4a7de4a7c22eaca51fe3,2024-10-07T17:48:28.117000 -CVE-2024-47326,0,0,f2dc009b7d028d2a2893c6bf1ec9e5f64e2e8ceb82fc555e76844b90832e6aea,2024-10-07T17:47:48.410000 -CVE-2024-47327,0,0,e69cbc80f68558286d87724bfb3ff74a4556470fe4bba849a3f65a9c4a316982,2024-10-07T17:47:48.410000 -CVE-2024-47329,0,0,959fd16ce295ac73c7340682dfbc4f00abc97a1906e836a2239dfaf44a22cfd5,2024-10-07T17:47:48.410000 +CVE-2024-47320,0,1,34657895a2dc740604de3ed70971ec71840d6f541e4b1dab5738b65bfae578d8,2024-10-07T17:47:48.410000 +CVE-2024-47322,0,1,8b232be4cdc689515d55262ec30fa58411c26ba1e6f796e82a1afc447dc811dd,2024-10-07T17:47:48.410000 +CVE-2024-47323,0,1,9437c7effa68c712270b139ca11dd61e48e93b311d9f840ede69c45aa4843c11,2024-10-07T17:48:28.117000 +CVE-2024-47324,0,1,9d0a8be9058b908dcef652c569e8b2141d19736e2ee3f4e8dc4463e949bd1e2a,2024-10-07T17:48:28.117000 +CVE-2024-47326,0,1,becaddd8932d32a061dc10bf0f467953cb83f3406fc8da77294097e28e38b53b,2024-10-07T17:47:48.410000 +CVE-2024-47327,0,1,c538510929aaa1efef8590e5c0955bb05270eb6eca4d47152891a99d515cb043,2024-10-07T17:47:48.410000 +CVE-2024-47329,0,1,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 CVE-2024-47331,0,0,596c791ac8b0a95707c17084b5d3daf2eae269336f00917824d2d3797b89022e,2024-10-11T19:15:09.783000 -CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000 -CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000 +CVE-2024-47332,0,1,ac5ed213fd921095ee0b8be4048aa454f8ac7fdcdf6a18756d3c0921bb781874,2024-10-07T17:47:48.410000 +CVE-2024-47333,0,1,512f6769e7250dfb91a8929703f1237d3beaa36f2d8957fee001943383c80c30,2024-10-07T17:47:48.410000 CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000 -CVE-2024-47335,0,0,c59a2e5c398e4128a0999d908dfef31fc9740c09dff0fef290df7418059d3627,2024-10-07T17:47:48.410000 -CVE-2024-47336,0,0,3b8a76de4b681d196e3baf6dcff1f288c7d757b771ce878db43b26bfb593064a,2024-10-07T17:47:48.410000 +CVE-2024-47335,0,1,4e2fe6a77fedc3f0c10ab5fe49798f89208ee0d50f43f9f19e6974756b30a057,2024-10-07T17:47:48.410000 +CVE-2024-47336,0,1,e28bfe6e64a31e14b43141b646c2b2c811955291910553e42413ed2913872658,2024-10-07T17:47:48.410000 CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000 -CVE-2024-47338,0,0,0cb5eeced2053e9e9354acd3275c4f3b979ee7274327009561a8027c346a82df,2024-10-07T17:47:48.410000 -CVE-2024-47339,0,0,b8b48711f33525b18df1fbe9a8d4f763b03b38e1d951882e60f5f58ca087b53d,2024-10-07T17:47:48.410000 +CVE-2024-47338,0,1,8a16c80b0f717f63dd94fedd2c982434aa863ba7a029d1ebf6e54486518ca010,2024-10-07T17:47:48.410000 +CVE-2024-47339,0,1,8dc93d09ddbc6dcb833c5b4e44ff7db3400c5748f1a902f28f2272e46b1e2553,2024-10-07T17:47:48.410000 CVE-2024-4734,0,0,0eefea1299cd16be8adb4bc3a22d24ee524acae6c15e2191dca2420e7021d6ef,2024-05-15T16:40:19.330000 -CVE-2024-47340,0,0,cd367738be1ef5a0ba3b7d0f6640c280fe7fbdce0dd66fe9038ce7248bf8135c,2024-10-07T17:47:48.410000 -CVE-2024-47341,0,0,5a948de9f630a1ec3782aa92f16500f38a4ddb991ef7258682c56a6dc95ffb0b,2024-10-07T17:47:48.410000 -CVE-2024-47342,0,0,574ca056ccacda25e26693fce6b1d980e41ec1080fbb446341d2aa44152f4db8,2024-10-07T17:47:48.410000 -CVE-2024-47343,0,0,e9cd1d8eb674b04da5b96a84d0f2a15ea39e7fae306656f1855739c667e08cfb,2024-10-07T17:47:48.410000 -CVE-2024-47344,0,0,721b1251a01f3fd6f756c76d0f7c86a50b30223d0e4650deb67b77064d3ee634,2024-10-07T17:47:48.410000 -CVE-2024-47345,0,0,ac2c6809d6f51966711e14f381cfdde5c62524a097760b17983c2c1b309a1db4,2024-10-07T17:47:48.410000 -CVE-2024-47346,0,0,0d3d40dd0d2c7469e49700628db177289e5e745bb97dd28afd6edb8d32729d28,2024-10-07T17:47:48.410000 -CVE-2024-47347,0,0,a66dddb78441b80f9c23a109e46590046e7b12346116c2aafed5567c14bf031c,2024-10-07T17:47:48.410000 -CVE-2024-47348,0,0,e8d9f5c5ad85199ceaf5d5a964e603bff0d20c5ade9019734c87cdf1e7b95d24,2024-10-07T17:47:48.410000 -CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7207,2024-10-07T17:47:48.410000 +CVE-2024-47340,0,1,05e3d5b56b9ba5194d31bc8d5f1160611c3e201439407849fb4f3dbf3eeb711c,2024-10-07T17:47:48.410000 +CVE-2024-47341,0,1,a3d5a3d60b80479508542c951c19be0dec3ed9ac5ba669abe3bba052f4709fa6,2024-10-07T17:47:48.410000 +CVE-2024-47342,0,1,38e59b61b42751b49466d76845fe7eb9b835bf7a87515ac9b5dc67dc2936b031,2024-10-07T17:47:48.410000 +CVE-2024-47343,0,1,29fb82b4cea291bac3c494c36984ab3648e7a5d37e65b54a46dafdcbaceec486,2024-10-07T17:47:48.410000 +CVE-2024-47344,0,1,1763826246060382ebd9fe5e3d12bd438fcc5e3507c83e44a29f5038d0e707b8,2024-10-07T17:47:48.410000 +CVE-2024-47345,0,1,7722603128903172994627d58d2ae8fca8ce8a2c60e139a5cc68be85e080e9db,2024-10-07T17:47:48.410000 +CVE-2024-47346,0,1,f01a343a9e234c02de27b1bf8723c2558f1fdefa01bb8ade25e99465a44ee927,2024-10-07T17:47:48.410000 +CVE-2024-47347,0,1,c544b486c7179e8710bd8145414d52d8e4637f509603f76fe08287842a9dc13d,2024-10-07T17:47:48.410000 +CVE-2024-47348,0,1,3bc6c881793e0266cf0fa593a08e5c8f8f52f13453391a5ccac45ed88e737a3d,2024-10-07T17:47:48.410000 +CVE-2024-47349,0,1,6da76508c4a0edbacdd1aadc3d9c5ffadfd8b03541318b01a097fae87e059c7b,2024-10-07T17:47:48.410000 CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000 -CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000 -CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000 +CVE-2024-47350,0,1,4ec04dd8de1c81002acaaacdfa3f1b4c07e386a17889b06998ea063c2136e635,2024-10-07T17:47:48.410000 +CVE-2024-47352,0,1,45b79099f1ba5aa681217933df202e8d205195991ef3874185e6485b2240d914,2024-10-07T17:47:48.410000 CVE-2024-47353,0,0,46323252c46ba333ea4f36816ab9a80f2389e9d61296f8594ed082165cdc29c1,2024-10-11T19:15:10.003000 -CVE-2024-47354,0,0,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000 -CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000 -CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000 -CVE-2024-47357,0,0,149fcf46e7f27075eeb3f705ac9a4ebeb96a867a52767d71262e20ba7a053432,2024-10-07T17:47:48.410000 +CVE-2024-47354,0,1,33bc5db8ff7cce132ca8035946199c9320e0d22066d309b78b0ec6bd824d75c6,2024-10-10T19:15:16.837000 +CVE-2024-47355,0,1,12a7099a9d6cdd27b256bc5c48c3a41afec28615356ab2b2ea1493ea2e2ae12f,2024-10-07T17:47:48.410000 +CVE-2024-47356,0,1,ca86bef3a64488bb151757babe27aa9ffdd4ef292d24e939d9d6f108a98fd589,2024-10-07T17:47:48.410000 +CVE-2024-47357,0,1,ef34fc816e0519499aa111866aaf198aae04b83f86c74c4b0f6800883576b819,2024-10-07T17:47:48.410000 CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000 -CVE-2024-47360,0,0,eed96cf04bebf4062c2da67dc88a56a01c959a36b1de20dbb487143ac336b826,2024-10-07T17:47:48.410000 -CVE-2024-47363,0,0,c4c3967e457ca5f68126a56fadd217ca4da5fa91cc949d9fed064b71e04756d5,2024-10-07T17:47:48.410000 -CVE-2024-47364,0,0,06fb56f742e61575055f4f51d1ff49c662d25b259ededb30b71ea1382d1d4129,2024-10-07T17:47:48.410000 -CVE-2024-47365,0,0,7c98dbb902b9c7eab9692199956e66828249378114da3ad0b297b5f37ea5b565,2024-10-07T17:47:48.410000 -CVE-2024-47366,0,0,ad67294b0c051c38f2ffa4423a82d6315abbdaed4b369e81e2031312172ef332,2024-10-07T17:47:48.410000 -CVE-2024-47367,0,0,f7e136c45a590125e4300eb0cd4e1d96dfe928b98e272b3d81769f55cd4fd4f8,2024-10-07T17:47:48.410000 -CVE-2024-47368,0,0,87671c5909cec4c57542f1c2162009231652377f67529a2b43736468f8ea74c5,2024-10-07T17:47:48.410000 +CVE-2024-47360,0,1,1370af71473e797c73fb7a35ee179cd61bb339e10b621d15447efd016876e9dc,2024-10-07T17:47:48.410000 +CVE-2024-47363,0,1,18825c79d1c9c0244e45a7e0436baf5e08868c270732d6301d9ac1e64471bf85,2024-10-07T17:47:48.410000 +CVE-2024-47364,0,1,4910605e0fad6d4d34926b035fe4ababa3ed531d70996b5e931af1da39a2cb00,2024-10-07T17:47:48.410000 +CVE-2024-47365,0,1,107deb1508e60f4bda63f6b3e9ce1f86da7dfee50760a2994b92fb15bf52595b,2024-10-07T17:47:48.410000 +CVE-2024-47366,0,1,bb2cd6ea174715ea21af3f39eb3a2ee4b42b072692267f7197f542070fa362d8,2024-10-07T17:47:48.410000 +CVE-2024-47367,0,1,82fb84fd5c8566e27ea4665b9656ddc75083bd79ebeff203ea2c4556444b6571,2024-10-07T17:47:48.410000 +CVE-2024-47368,0,1,73d2fad8f01aed7701408004856060d85863e52c7b3995cf070cbd0133f83527,2024-10-07T17:47:48.410000 CVE-2024-47369,0,0,13453c3102ec6216bb5b77a40de51cddd937fab2334456234dd60fa95adb2897,2024-10-07T17:47:48.410000 CVE-2024-4737,0,0,bd8c1ff0c2bd0234c81e53807fa1f8ee5b80721a1ba19a06cab0ffcb77875865,2024-06-04T19:20:48.597000 CVE-2024-47370,0,0,ab8928ff97b1221790b9965dfc4874ac825bfef8a2f852a10ef851f1e2b7993b,2024-10-07T17:47:48.410000 CVE-2024-47371,0,0,1a0c159e76ab2e643df11c0965dd501e9fd2b3fc3779d5f33939ec11d85c096b,2024-10-07T17:47:48.410000 CVE-2024-47372,0,0,05cf79718f0dc96461a5c572db97d73683d51669e8e38c08853ffb8f0086a163,2024-10-07T17:47:48.410000 -CVE-2024-47373,0,0,48f334dc38f62b6b8fea805a770848ef4292b3d83d96ca978a6a64ac170233be,2024-10-07T17:47:48.410000 +CVE-2024-47373,0,1,1d50a8849879bfa10026160d3ea98ff07daf0ab9a4cc6526974710ee8f9c8402,2024-10-07T17:47:48.410000 CVE-2024-47374,0,0,889f39a279d97c5a1401dc1a2f459dad5aaf20e843dff9279b3ee61df6ca3884,2024-10-07T17:47:48.410000 CVE-2024-47375,0,0,53da628e44de15d34302b1e9e23951b050fcf561b927d080a33ac7f8e96d7bdc,2024-10-07T17:47:48.410000 CVE-2024-47376,0,0,15e89898c30344feea35dd14b6e6bf9404bb0c0a02f688c4e21e147468168a0c,2024-10-07T17:47:48.410000 CVE-2024-47377,0,0,318fd8dc55bc6158f7736a58fd44c906fdef543f417817839ed53059b3ac86df,2024-10-07T17:47:48.410000 -CVE-2024-47378,0,0,5305c089f6f913a98e3eaacd3137dc35847430b39d2c86804a986b384d0debf6,2024-10-07T17:47:48.410000 -CVE-2024-47379,0,0,6cb6e0b80741c322cadeed993b9e599b3593183edf1c9cb79df55bcdd4cb900b,2024-10-07T17:47:48.410000 +CVE-2024-47378,0,1,ba8cb7fdd36fb8f8549036b3bcc512408b1c38af941d413241be3d9d578266da,2024-10-07T17:47:48.410000 +CVE-2024-47379,0,1,8a658f21d58b20e966a06b4ddcce8d971826d1b7ed57eecb48d1d90820fe88c1,2024-10-07T17:47:48.410000 CVE-2024-4738,0,0,fc42ba0968ce2d3cd6a759727e85c03dbbce46854db0b2e928b2a8457ade2245,2024-06-04T19:20:48.783000 -CVE-2024-47380,0,0,aa9d56bfef614d5ff8d68725b89a99cdc318bac0cf753277385650af0455bbf9,2024-10-07T17:47:48.410000 -CVE-2024-47381,0,0,ac8718e5fd80119e6471ea53a3c8dd148a3b1e9eb8b4e3756ec614117204fc3f,2024-10-07T17:47:48.410000 -CVE-2024-47382,0,0,0815d6d389656c3020c3c4f642fed575f9bcd3000954d380efd12427a89cda65,2024-10-07T17:47:48.410000 -CVE-2024-47383,0,0,5986285e286e5acaf7eb23de3df951273d2c8e513ba589404a9647716c0fef84,2024-10-07T17:47:48.410000 -CVE-2024-47384,0,0,fbf8f50f2e9277c9d2fa622534d1d6260a2fecf0cdb84a20a2c6fce6d8c09eca,2024-10-07T17:47:48.410000 +CVE-2024-47380,0,1,fab0093079e35db7ca81841dae43cb3bfc47abd199fb45761d6be4949591d4f2,2024-10-07T17:47:48.410000 +CVE-2024-47381,0,1,1f3ea8f29a384e2bf64ee447d642f54795e20ada37c6a9d45f09b875f27457a0,2024-10-07T17:47:48.410000 +CVE-2024-47382,0,1,dcdde427892ff651023c197056259ab0c72115825b6341d15e2e4d4165825b78,2024-10-07T17:47:48.410000 +CVE-2024-47383,0,1,d469dd45fa796e7525fafd3d2ce417180f474545e5b17227f3f413f6bd46f801,2024-10-07T17:47:48.410000 +CVE-2024-47384,0,1,ebcf64d70ba519a35157abecb0bb6ff018433b24f2ac27e63f86c9f155f448b9,2024-10-07T17:47:48.410000 CVE-2024-47385,0,0,3588b617c4ae6f9c378bdeaed3c1b7404b0b57a022009c719f5f71b417142d29,2024-10-07T17:47:48.410000 CVE-2024-47386,0,0,8cb1861aa24862dc38fce1bb1f3d0d3efef1813cc377d83faa4f21f06229ffa0,2024-10-07T17:47:48.410000 CVE-2024-47387,0,0,08a3b98e23e8185d509837019c1ef3a9c139ede5ad875ee88b25d1df1e39d80b,2024-10-07T17:47:48.410000 @@ -261514,11 +261514,11 @@ CVE-2024-47418,0,0,1d09a601d50b55fb35b7d4fc7e118d1a06dd238f3708db9ef993b303806cc CVE-2024-47419,0,0,8fd66d9bf61c8353ab141ddd3435e43b693fb94a6a4d1ca08ad07bf05b83025e,2024-10-10T18:28:19.330000 CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 CVE-2024-47420,0,0,67ad7f7dd5cb664c9d8d7ab9101e8bdaff33af0ff65a5f148b23df17a4f95602,2024-10-10T18:28:26.860000 -CVE-2024-47421,0,0,102f8e332a29bbf3c4d5fb03ab9810391e67a628a1a147f11476861b16d4b605,2024-10-10T12:51:56.987000 -CVE-2024-47422,0,0,3952ccb617f0de75e022164e02292c15f6e11ca918ca4295a5ace8ee97dd98ab,2024-10-10T12:51:56.987000 -CVE-2024-47423,0,0,f17caf37955ec4ecc572648540e4cfbee61ac432f2927a7322d8623e06a593fd,2024-10-10T12:51:56.987000 -CVE-2024-47424,0,0,b1065552818ee3d76a7dfb093a54e32d2ed6acdb5049a855e0861b7712241711,2024-10-10T12:51:56.987000 -CVE-2024-47425,0,0,0727660882183f1790555d28a610d82bccf01dcb9973ef415c7fcc513e9991ef,2024-10-10T12:51:56.987000 +CVE-2024-47421,0,1,5697ffc98566081c4c6c49a3d864d68b4e0b77a80c41b109add3a8f16b70ad60,2024-10-10T12:51:56.987000 +CVE-2024-47422,0,1,44e5c03dae8aad63ffbb57ff6af7ab3f3791400867ba8fb71547541425989f7e,2024-10-10T12:51:56.987000 +CVE-2024-47423,0,1,bbd39328d0dc56b908a279de7aacf023d2d5b6b7ca6d3adaac446527c3a3379a,2024-10-10T12:51:56.987000 +CVE-2024-47424,0,1,bf356f288a8f1c472557c4349ecdd882895a66bd747f5bc6546b2dce788aadc6,2024-10-10T12:51:56.987000 +CVE-2024-47425,0,1,a447467008af7e9fe63ac1273d714471d0526dff10fa44ecdd8be176a733c0f9,2024-10-10T12:51:56.987000 CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 @@ -261549,9 +261549,9 @@ CVE-2024-47509,0,0,43e64569532dc69d5e1f5381f9f6dbc47e6b577336d03b81f0c24e659d0fa CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000 CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000 CVE-2024-47523,0,0,22d43e6df5f74e6749ea10e7fe6523466b29bb84b684bbdd4f0562f87b193f88,2024-10-07T19:07:30.287000 -CVE-2024-47524,0,0,1bd4f00e6fa525093ccd30a91dfc969466179c36c9dc448bfc17de308e2358a5,2024-10-04T13:50:43.727000 +CVE-2024-47524,0,1,77296b251ba1494f06bcdfbc6ea161d149e1205d582f48b9fdc9c430ceb9a466,2024-10-04T13:50:43.727000 CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb0cc,2024-10-07T19:08:18.707000 -CVE-2024-47526,0,0,8379f3e3eaa3a139b6bc5f35bce4eff2be22dfc91eb3287de6dd26bafc114174,2024-10-04T13:50:43.727000 +CVE-2024-47526,0,1,eb16a10d8f74cde3579603749ff3cfb381488e1ecf42d3c0633b2eaac9e4c5e1,2024-10-04T13:50:43.727000 CVE-2024-47527,0,0,6448adfc6fe781d292ba5a9887205495de1e6ae1fd7107635f3ac2f0d1da5da0,2024-10-07T19:08:41.467000 CVE-2024-47528,0,0,f8a40bc5f3a1abfe246d4cda70316c63fc753979863ed711468abfa611b23cd8,2024-10-04T13:50:43.727000 CVE-2024-47529,0,0,34283f2d46f63958e88a4c9e1bf6051bd39afb28245a7d6e6fcfb00459d368e2,2024-10-04T13:50:43.727000 @@ -261566,10 +261566,10 @@ CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e CVE-2024-47553,0,0,2212e0c73d31ee4117260b14c09959b86700d87277dc600c8b069eb02d73b59b,2024-10-11T20:04:08.623000 CVE-2024-47554,0,0,ed4aff6ea0e7ac69533e960f0592e4849edcc0303a79e4282ca0e96ec7b37a4c,2024-10-04T13:50:43.727000 CVE-2024-47555,0,0,fd6842fa8e3868552d886daf37839c899991f22ed0d1cbcbe8a1f0bc204570fe,2024-10-10T12:57:21.987000 -CVE-2024-47556,0,0,3777c77a7cfa512177d92b35ad1f5f20e21bfed49853fd196c2ebb401ca7bb5a,2024-10-10T12:57:21.987000 -CVE-2024-47557,0,0,c1226fc166f3f2b46508b58f20be486b7ca983d01baabccc08d932dec322637d,2024-10-10T12:57:21.987000 -CVE-2024-47558,0,0,72686dfa0c743bd969f5b1564a04d5f18c21af7ce456b0bbd518238d0ea74d96,2024-10-10T12:57:21.987000 -CVE-2024-47559,0,0,f2239e2603f21aec2e0f34acae5f93ddc2655aaa3a316e518b18ca1d3ff15e28,2024-10-10T12:57:21.987000 +CVE-2024-47556,0,1,122b452cc66f177a1e88c908ffba8d8db2aed2624c0223928e9cad490cf6f67f,2024-10-10T12:57:21.987000 +CVE-2024-47557,0,1,118f6e9e603bc85eaf335cfac9b0ec07ed2a854d60d6e99474292af9eab556e8,2024-10-10T12:57:21.987000 +CVE-2024-47558,0,1,941b9a8d0aa4748a5523fbfd93ee49cf68d9d7e57ba6f55bf9fe4c6d52a28947,2024-10-10T12:57:21.987000 +CVE-2024-47559,0,1,4c607037737a7ecdb236758ef35ccbc75725434bcb9a2baf77b8da4927b840ea,2024-10-10T12:57:21.987000 CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000 CVE-2024-47560,0,0,b8abd4241aae2bbcacde7e0c93543de13fb150a4040a68118a29f4e634e60873,2024-10-04T13:51:25.567000 CVE-2024-47561,0,0,1187d18aeddf57f3855631575eec8fc1684027bd65a7263241fe4e3f5d2788bc,2024-10-04T13:50:43.727000 @@ -261580,7 +261580,7 @@ CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bf CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000 -CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000 +CVE-2024-4760,0,1,b4849d754e19ff5b62ce1dfa55ef4652903c511172eef769e0d0e48dc2803d03,2024-05-16T15:44:44.683000 CVE-2024-47604,0,0,5221b4094b7a2bae2ba329933c1485a57bd9421ad0d112c374cd4d8ea378e664,2024-10-04T13:51:25.567000 CVE-2024-47608,0,0,6780a5cb01bdd639af89827da283834e6f19c572d8e127e2ec22fed13c61e1be,2024-10-07T18:51:05.650000 CVE-2024-47609,0,0,a40985fb9367be25d25953301cdaaaedb4fefdc923900e20947726055b93b1f1,2024-10-04T13:50:43.727000 @@ -261596,42 +261596,42 @@ CVE-2024-47621,0,0,e8b43c6946cd89c946e6f0e8241753ff7dff16af1bee79786407ce0f97d06 CVE-2024-47622,0,0,2e8247e218d8e217900d3be88f2df495717b0afb1aba9ab912a35f4769d9020e,2024-10-07T17:47:48.410000 CVE-2024-47623,0,0,79b2aba30289ad0615e4cf02860068fc1310e91c8af2ef3dbee425a81c5a0707,2024-10-07T17:47:48.410000 CVE-2024-47624,0,0,fea7b4fc073635c5722fc4d2b18422cee096b0582ed916f66921a903ec30c7dd,2024-10-07T17:47:48.410000 -CVE-2024-47625,0,0,9c9c9c26e68dd6fcdcf03789f3b3b537cbc093baa2f63430ddf50f7aa9bfa4ae,2024-10-07T17:47:48.410000 -CVE-2024-47626,0,0,b68d2dce87927352e199722edeedb5858e8b39f329035d7e08a0b49b1ecf9b77,2024-10-07T17:47:48.410000 -CVE-2024-47627,0,0,c8725d0fe891218cc3e4bd0b026f24e26101c73e9aef0ded00fd9ba2f0454971,2024-10-07T17:47:48.410000 -CVE-2024-47628,0,0,af3040d8a75387316d0302e908d2753d7f50eee82392d8e609212c6dcdfb6db5,2024-10-07T17:47:48.410000 -CVE-2024-47629,0,0,003566f6938d9e769196836f207a5a0097c8a5ba515fea380a76e0477064fc3e,2024-10-07T17:47:48.410000 +CVE-2024-47625,0,1,0916796060d2f51807ab38b78e1c767fa545bee115fcc34196ede03da2967d6b,2024-10-07T17:47:48.410000 +CVE-2024-47626,0,1,6a2798b05d03c7539d3bb30c32f2ecea0aeef06d40a70a5c79685b1dde07cbdf,2024-10-07T17:47:48.410000 +CVE-2024-47627,0,1,ce1c12861a4eed33d82c5912844c0d02e7588560f0864c2128d2eb7710712885,2024-10-07T17:47:48.410000 +CVE-2024-47628,0,1,e303b82a3f560cb352e3a1e13515be7fd247e3783e649b9a732720036c7b8724,2024-10-07T17:47:48.410000 +CVE-2024-47629,0,1,51f5df86c809714f4642df31c697cfa51fc1ab12be72e7afebcb230dc72efae5,2024-10-07T17:47:48.410000 CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000 -CVE-2024-47630,0,0,00151cfd5ff60817ba56689ea517685000fbc4335ef8c3e22ebd76a3e28f9303,2024-10-07T17:47:48.410000 -CVE-2024-47631,0,0,01fc100dd08a1360f7c125c78507402e09d2b1c2d847226a5af87eb0733a2942,2024-10-07T17:47:48.410000 -CVE-2024-47632,0,0,f0965ad8a98839b57c8efa58e92981fb5169721d554ccd74aa7f6384bc6276d7,2024-10-07T17:47:48.410000 -CVE-2024-47633,0,0,83d0f903f83dd379c31137a99d53fc1c554d901d5d9bc74c2d6bef68bc5c82b4,2024-10-07T17:47:48.410000 -CVE-2024-47635,0,0,b72deea70e905bb748839730e330b907a08dfe276b949c1628ef45ac3c08976b,2024-10-07T17:47:48.410000 -CVE-2024-47636,0,0,ec69ee24cf2cc4e35a0d87e9bc4dc38df2ef5d9589ff0aa5f365e729ec78649f,2024-10-10T18:15:07.920000 -CVE-2024-47638,0,0,b3cbfd223fe1cc94aab3e88ad41656f2b84c9afb1b07b461655fed70a6186be3,2024-10-07T17:47:48.410000 -CVE-2024-47639,0,0,0dbdca40ed3a65834d3c291ae2785dd80dbc26b9e69a0dc2156d5c47067029d8,2024-10-07T17:47:48.410000 +CVE-2024-47630,0,1,adfa126a6bff751cacedf82d84a5f3e91767172ee22cb0ebf2bbe0582808e6d2,2024-10-07T17:47:48.410000 +CVE-2024-47631,0,1,2f5538e06e1703745ac31e3e4aff85429449cb6536170f3449d5c719692260bc,2024-10-07T17:47:48.410000 +CVE-2024-47632,0,1,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a1d1,2024-10-07T17:47:48.410000 +CVE-2024-47633,0,1,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000 +CVE-2024-47635,0,1,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000 +CVE-2024-47636,0,1,40e2673332d0fccd09fa7d073f6fcd41cf460262cdbaeadb311021b5ee617d45,2024-10-10T18:15:07.920000 +CVE-2024-47638,0,1,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 +CVE-2024-47639,0,1,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f553,2024-10-04T13:51:25.567000 -CVE-2024-47642,0,0,d1dd50d8dbcb633303a682bd423b66e11940a67aa7cdb9180758f9102336a85e,2024-10-07T17:47:48.410000 -CVE-2024-47643,0,0,76324b383f26178af320ff117ac2bc824c9739123bf10b44dfde01cdcda7022a,2024-10-07T17:47:48.410000 -CVE-2024-47644,0,0,e673aed60238f9b5abec2b17d0b773fd574cc4aee068cf599e12a758154a364b,2024-10-07T17:47:48.410000 -CVE-2024-47646,0,0,10b5a56791d1f80011760e4ddb4fabbf6b562e5ec54c7774cd5b5f1d927a2684,2024-10-07T17:47:48.410000 -CVE-2024-47647,0,0,7716a0ae18142ae56901b805b3add32c3ed7fb51591ce35c85552affb5dedd67,2024-10-07T17:47:48.410000 -CVE-2024-47648,0,0,38ca133ebdd26d7310fc58b771105a72f4adf8394bf849f97ad77530c58416a6,2024-10-10T19:15:17.067000 +CVE-2024-47642,0,1,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000 +CVE-2024-47643,0,1,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000 +CVE-2024-47644,0,1,fd711aaea76127f15b2ba3d3dbc77e4b5102355ce0d5450815f1f781ee51f5f7,2024-10-07T17:47:48.410000 +CVE-2024-47646,0,1,01dc941ba058056f80ebe31f50a37207cf5e1478b0e71cd2c82bbad9118a33a9,2024-10-07T17:47:48.410000 +CVE-2024-47647,0,1,750a75d1d0089daf3b35f7acd85a584959bc0ef829ba0528ba953f2948970aa5,2024-10-07T17:47:48.410000 +CVE-2024-47648,0,1,50edcdb2f5567029ba5ab94a2307a7bbf958b3010b1a42ed3d78abb3161b4785,2024-10-10T19:15:17.067000 CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000 -CVE-2024-47650,0,0,9afef3be3c031099cbe7cbfa5812d4fd5a6f96ce9539e691bb6d557c122e6c41,2024-10-07T17:47:48.410000 +CVE-2024-47650,0,1,03cd193463056cd00bb497e04d4746a9d06b43100915cce839c17df72217d8de,2024-10-07T17:47:48.410000 CVE-2024-47651,0,0,2a67e121f3a9ddab317c97af10a93f430699735ffe494d2404661e90ec37663c,2024-10-10T21:01:39.413000 -CVE-2024-47652,0,0,0106178cdc2d236f6bd6fb41168a986de53675f8839d6b1fc83ef0e66c837bbc,2024-10-04T13:50:43.727000 -CVE-2024-47653,0,0,9abed72960a84ca31096d60eaeacc7bd22cfefab657976224976c20e44cb9674,2024-10-04T13:50:43.727000 -CVE-2024-47654,0,0,c063b2ef86115a996655e38ded9b00a5dbd609aea4e515001d1d61acc0e2d78e,2024-10-04T13:50:43.727000 -CVE-2024-47655,0,0,38268467637f3433ead865c4d53b98effdf5ad06b5c2f799470b492b88830a71,2024-10-04T13:50:43.727000 -CVE-2024-47656,0,0,7a20585ec39bccdb1c36f63c7ddc6799bb573e47e81f7253c1057fbfa3e19cb8,2024-10-04T13:50:43.727000 -CVE-2024-47657,0,0,fd6e9fac7740c0df68f13821033b31ca3440e5b3cb2262623db7046370d07e4d,2024-10-04T13:50:43.727000 +CVE-2024-47652,0,1,e6119e1b1843bb84938fce78d1c0f256d7208cc39325ce8f9243d6a34e8267fd,2024-10-04T13:50:43.727000 +CVE-2024-47653,0,1,9519cd07a2f606c18fc890059ca49ea1c557a6a482e8ed4df12afa932d2f0ec6,2024-10-04T13:50:43.727000 +CVE-2024-47654,0,1,c376c0b69642d4cefba9f285c5de383315c04ecf04987f787b943fc13c0f404c,2024-10-04T13:50:43.727000 +CVE-2024-47655,0,1,647a49a539bc24fa1b3aa70dda838c3f7f5d2c2c854cdbb2c1938fd32a6635e8,2024-10-04T13:50:43.727000 +CVE-2024-47656,0,1,db5bfd8d38d048ff46b9901dd086743f33565d8d1f1618f761910b78e461cd0e,2024-10-04T13:50:43.727000 +CVE-2024-47657,0,1,2a6ff811e43431f71e52e6f928ff9e6fe306de6e466fa74205b768482aa27683,2024-10-04T13:50:43.727000 CVE-2024-47658,0,0,7d83d41550ee4896fe2089957fc970e4ffb8e6c30451f535c67b0cffeb69f047,2024-10-10T12:51:56.987000 CVE-2024-47659,0,0,b7c74157edbbfcf6cc191fb9eb6c2e328a941e3c74433eed8f44bf21a8a12312,2024-10-10T12:51:56.987000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 CVE-2024-47660,0,0,accf7b6bc163d236ec224793cf44bab1e91316de88fa320bb4708923ce43fb79,2024-10-10T12:51:56.987000 -CVE-2024-47661,0,0,1ff30d8fde49751dd64f30df8e1b31f04a2c1291f7c9f3a7228e3fe40f63fd86,2024-10-10T12:51:56.987000 +CVE-2024-47661,0,1,48da1b79aad7ba45a129162914bb8375eb5088e7baeb4eb2c70a67496f2e12e7,2024-10-10T12:51:56.987000 CVE-2024-47662,0,0,9592ff301142fec228feda5f28aa5220c1e0fdd0719eedaab776fcd353ec2534,2024-10-10T12:51:56.987000 CVE-2024-47663,0,0,38c847c85cb58f1bdc14b2643d340f12f21f2abeb9d0471d3efb10c92740f7a5,2024-10-10T12:51:56.987000 CVE-2024-47664,0,0,1c2309f9d69bf8bb4cc3d6eb245972d5a50bf2b31179b3921c4437d37dadd6e5,2024-10-10T12:51:56.987000 @@ -261667,9 +261667,9 @@ CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68b CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 CVE-2024-47781,0,0,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000 CVE-2024-47782,0,0,378aebd3accf9c3d67ee33eb38516895e49edcc53cea98d4b8c2ea1a1799fb1e,2024-10-10T12:57:21.987000 -CVE-2024-47789,0,0,0349696d36cadc48041796d3cde8ea269da483b10c177364bf60fbf0c4fb2e71,2024-10-04T13:50:43.727000 +CVE-2024-47789,0,1,58d486cb2a38556d3f8fdfb21cb64a1df92689866524dcdf0da69b5014cf7dcc,2024-10-04T13:50:43.727000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 -CVE-2024-47790,0,0,1f668faa23a91dd91f71cf06e76f1527f76bb8429eca10f034e0a28bf1b53cf7,2024-10-04T13:50:43.727000 +CVE-2024-47790,0,1,bced470b136e2eb8cb7b9c3db29cf5287d0acbb7e40ed40a78254d377c367333,2024-10-04T13:50:43.727000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 CVE-2024-47803,0,0,e1d97b5f24ae71b6bd2435048764e12dedac3de98ce838d43be96ca9d7087e5f,2024-10-04T13:50:43.727000 CVE-2024-47804,0,0,a4af3b64d3fcfe309769ac07755d247ecf7636977262b35234365d56289d52aa,2024-10-04T13:50:43.727000 @@ -261677,41 +261677,41 @@ CVE-2024-47805,0,0,22ba52af9df34d0a80a1165aace8dfa18730f593f709643a29e4cd8d37bff CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a85c,2024-10-04T13:50:43.727000 CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000 CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 -CVE-2024-47812,0,0,397cf931cad747f9187f7df48c5f8098bd69901273af0ea8d48fb67c933d46b4,2024-10-10T12:51:56.987000 +CVE-2024-47812,0,1,ea18101fb5a2a10bec15eb933d7c14e1241ab94196b326a10d9c0654fde435f2,2024-10-10T12:51:56.987000 CVE-2024-47813,0,0,48a41eb36e488d083cd1f60a29be681cee836eceff483fa252745c12924671c8,2024-10-10T12:51:56.987000 CVE-2024-47814,0,0,c7cab541ca8df7a147747a1437099f1208747a6b637b4c4929d52961dcc18d9b,2024-10-10T12:57:21.987000 -CVE-2024-47815,0,0,81255b48d5277378beff1383e77e64aa261245477d97f4d0b1ea73e945f9424f,2024-10-10T12:51:56.987000 -CVE-2024-47816,0,0,1da39b970be1186c496f95f178fe995ed489c1ba7a2eb7cbd4306440a49cdeb6,2024-10-10T12:51:56.987000 +CVE-2024-47815,0,1,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670dbc,2024-10-10T12:51:56.987000 +CVE-2024-47816,0,1,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000 CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000 CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 -CVE-2024-47828,0,0,2a3f37a9071256a649791f70c6456109926a20b394ceabbba1acf5e3bcc75ff1,2024-10-10T12:51:56.987000 +CVE-2024-47828,0,1,20037a2831594572185910fec3fa22739c3e04d0ddf5a1652087e64bcac4c0e3,2024-10-10T12:51:56.987000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-47830,0,0,078fd3f57c1e124fe25812fa092e081898b54bb5455f5ac15a9ac7b0028bfea1,2024-10-11T15:15:05.613000 -CVE-2024-47832,0,0,6eaf4cba1d0f1ac09d634a837b942c4a4d31fbca5ff514618ce9cde402d23db0,2024-10-10T12:51:56.987000 -CVE-2024-47833,0,0,780bba6686a13dc95d3fa2e5d0a56f764e3e264192219eb33ec68032f867f21c,2024-10-10T12:51:56.987000 +CVE-2024-47832,0,1,2db718b13b3751bc3ef92e2930bbfe31f27f0a24beb6f2f6f579c1ed94f36d1a,2024-10-10T12:51:56.987000 +CVE-2024-47833,0,1,c198216a715effb211db9429fe892ad76ab094f250667361ca1b8e1df62c0332,2024-10-10T12:51:56.987000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 -CVE-2024-47840,0,0,b5ea555ef408ac20cbe46dfbf3d0edb1bb8eb4b89ca7622107e5cdb64a9762a5,2024-10-07T17:48:28.117000 -CVE-2024-47841,0,0,c79c7a110b47e87995e5e866c83fd654f88967df290dad7b6bd517f415ec30b5,2024-10-07T17:48:28.117000 -CVE-2024-47845,0,0,b1209a6fb5d1a94319fb81dc6019322c285a5d3551afaa8b6bc53d19e4d4c13d,2024-10-07T17:48:28.117000 -CVE-2024-47846,0,0,13258ab07c48624dda16e1d3e79802cd7d9d309898563627814fb1d5f16df0c1,2024-10-07T17:48:28.117000 -CVE-2024-47847,0,0,b5c350e4d681ac5233188f06bd21dc88f751be69c6c781764a7a566312b9cc72,2024-10-07T17:48:28.117000 -CVE-2024-47848,0,0,c0bc1862ec507acb8e27cba570bf4c4aa0e02c150899bcd02f80586716acbcb3,2024-10-07T17:48:28.117000 -CVE-2024-47849,0,0,f683087e978c04427c5eca2131f86412f6ba682f49fdd72aa9bf049eaad532cc,2024-10-07T17:48:28.117000 +CVE-2024-47840,0,1,cb48565e6bba6e4fc9a0c261bdf91f4901ff6056fea69898412e226250340c0b,2024-10-07T17:48:28.117000 +CVE-2024-47841,0,1,27d3864544a5832b38311433bd18fd5ebd0ac82e8629441881d441ad478d99bb,2024-10-07T17:48:28.117000 +CVE-2024-47845,0,1,d3249c38c91418ebff96a6ca4864e0d4ddc2d024adb70c041dea7cee390b051c,2024-10-07T17:48:28.117000 +CVE-2024-47846,0,1,165c9dd5888f52a81fc4f57cddd7dd3c0c8897b282fa59220ff5025b70b0278c,2024-10-07T17:48:28.117000 +CVE-2024-47847,0,1,db75fb871c3060f57f8d0c8feda210431cd5ec9da747d5bcd1248cd36fb264b5,2024-10-07T17:48:28.117000 +CVE-2024-47848,0,1,dc9eb429b1aadadb7717ca6bfd0505a99cdb374dc0fa769de0a8c407aae9a86d,2024-10-07T17:48:28.117000 +CVE-2024-47849,0,1,8097bd500a8452caf7b755c7d8d2130300990e24c21eb60895b5655f28c895a5,2024-10-07T17:48:28.117000 CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000 CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b89e,2024-10-07T16:15:05.753000 CVE-2024-47854,0,0,31b9ee1e6861649c0043a7af7c7a50d8ef5e295b98593959cd182d2901e547c2,2024-10-06T21:15:12.920000 CVE-2024-47855,0,0,ff52cc8efd16010ace1ca5c24f7c166f3d1a0b5862371f0cb96dbe810ee6ad58,2024-10-04T13:50:43.727000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 -CVE-2024-47867,0,0,6eadabfe91df88c97c0e1a0fb1fa01e28883385b26daf6d957ea0c9d42e524e4,2024-10-10T23:15:02.640000 -CVE-2024-47868,0,0,b0619b2c65e030ddd510d181f9450313afade796596784ff9b7bbfaa3597cb58,2024-10-10T23:15:02.797000 -CVE-2024-47869,0,0,821c67165014173e6a65555efe63004db60f2f69d0170d2918b3537cbf1a7c15,2024-10-10T23:15:02.930000 +CVE-2024-47867,0,1,f42a803b31137b24c2f133247ede4e885c372baa9f6c51df5b396292bc22df5e,2024-10-10T23:15:02.640000 +CVE-2024-47868,0,1,ce847dbdca90d2f3046069d195345a2918d8f1b9cacc37823b52869cb6cbf2f0,2024-10-10T23:15:02.797000 +CVE-2024-47869,0,1,273b02fd2418c383bd636d5cb8d7a85ed8d4c7bd160b9757d96a29c9f88dc725,2024-10-10T23:15:02.930000 CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000 -CVE-2024-47870,0,0,67440b65a260801b69dd4b36e2659045709b26a62ba343a9258c4e21ff3805ba,2024-10-10T23:15:03.070000 -CVE-2024-47871,0,0,4598420fb90bc720fd4ef6c3c6d6760832c25f6aa06e45d621b9a1ef226d8d4c,2024-10-10T23:15:03.187000 -CVE-2024-47872,0,0,8471c34cf55992e157ff7eba332e41edd983c92bf011e2e751c8d26e7ec94000,2024-10-10T23:15:03.303000 +CVE-2024-47870,0,1,3bd8e3ceefe027463d8073976e4ea0e45726dde193352e4459352a612c5ac20f,2024-10-10T23:15:03.070000 +CVE-2024-47871,0,1,95adbf9ac785fa5b2f18110f4003b42d3e890a95b9e88d98d036b6ca07657bf4,2024-10-10T23:15:03.187000 +CVE-2024-47872,0,1,c26c31f2f196ed1a4c9e7492e5637832173768d10758e37f15a9efc77da8dbe1,2024-10-10T23:15:03.303000 CVE-2024-47875,0,0,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0946,2024-10-11T15:15:05.860000 CVE-2024-47877,0,0,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 @@ -261721,7 +261721,7 @@ CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 -CVE-2024-47913,0,0,7dc94fcd4cdeeb6c0d9aba640aeb2f6806a34afc409a57e9cc79ea392fd74167,2024-10-07T17:48:28.117000 +CVE-2024-47913,0,1,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 @@ -261731,11 +261731,11 @@ CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e2 CVE-2024-47950,0,0,0333163b5a9f356fc60964ffdf9e21e2c5a0fd650f8b847ccf42b9907218b9aa,2024-10-11T19:57:16.883000 CVE-2024-47951,0,0,e529fafd02710d7ac35ac8b78eedca3443695e348ede4d153aabc61ddef6e118,2024-10-11T19:57:58.937000 CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000 -CVE-2024-47962,0,0,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000 -CVE-2024-47963,0,0,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000 -CVE-2024-47964,0,0,8708b1223f13c984225d5ff9a93e6643d31a9da9d412e571b444e93d6ab07c8d,2024-10-10T18:15:08.470000 -CVE-2024-47965,0,0,2326a0f43bbda417b7328f4bcf140455310111b0a6b80eb67cbda48f4f017f48,2024-10-10T18:15:08.587000 -CVE-2024-47966,0,0,2e5feecff0fa14f89d0ed8ddc60e7023397935bd4a2b23667d2d59536ef817ba,2024-10-10T18:15:08.710000 +CVE-2024-47962,0,1,dc4fbcf3f22ddfba51fad765b6c5159d786cd666d52391ebe5da8540c6e194c3,2024-10-10T18:15:08.183000 +CVE-2024-47963,0,1,52bba57e5a73d859adf5de752f1a6558abffc6499de100597906d6f195886408,2024-10-10T18:15:08.330000 +CVE-2024-47964,0,1,0f3e5ee231a2aedf013ec18ba21715ab3240166e15344de5fa0bcdc451497973,2024-10-10T18:15:08.470000 +CVE-2024-47965,0,1,23f74e9778c1caf16c562741e7a60f410ffe118388c341f6c841b21d1c139ce1,2024-10-10T18:15:08.587000 +CVE-2024-47966,0,1,277b88fa0f86054b94eb01913fb8ee3f438909497de7a90f695b0ac163f09520,2024-10-10T18:15:08.710000 CVE-2024-47967,0,0,a1330cc114fe2e48a56c50da9857d953b86ef030556f660ace8207b5a6ff6caf,2024-10-10T12:57:21.987000 CVE-2024-47968,0,0,4fff8938b14b264b8114ea788e4702165e516bca6198626b64c35403b2d1f728,2024-10-10T12:57:21.987000 CVE-2024-47969,0,0,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000 @@ -261778,23 +261778,23 @@ CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b6844179084 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 -CVE-2024-4826,0,0,653edd35c7fdee3e221d118a0cbb8a6cb193bae7007e1131f2de049718765a30,2024-05-16T13:15:48.163000 +CVE-2024-4826,0,1,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 -CVE-2024-4838,0,0,861c54104ff4f8055b432752c89d23d1189cc1e50f9e1f1901bda66c5518f757,2024-05-16T13:03:05.353000 +CVE-2024-4838,0,1,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 -CVE-2024-4843,0,0,6c6ae016d182516d10e6e73ab68236968844df3762466d188dfe9ab6c4374a75,2024-05-16T13:03:05.353000 -CVE-2024-4844,0,0,8d4783b6be8eb3ca86bdecf4aaa281d65ab414ff769f738cde8b6bc1a2becc80,2024-05-16T13:03:05.353000 +CVE-2024-4843,0,1,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 +CVE-2024-4844,0,1,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000 CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000 -CVE-2024-4851,0,0,cdc6cbe948e120051439ba4105c24946466b84d7a624559fd86ce63f704d51cd,2024-06-07T14:56:05.647000 +CVE-2024-4851,0,1,38c5779b92744ca185475962c4d2afdc1d0e546e334470d26d45672630578e65,2024-06-07T14:56:05.647000 CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000 CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 @@ -261832,7 +261832,7 @@ CVE-2024-48786,0,0,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537 CVE-2024-48787,0,0,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000 CVE-2024-48788,0,0,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000 CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000 -CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000 +CVE-2024-4881,0,1,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000 CVE-2024-48813,0,0,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 CVE-2024-48827,0,0,0692485b3e9c4ae06dd4ee6f885c25457f723f018116fcc7fc99c51a1476d31b,2024-10-11T21:36:44.280000 @@ -261841,10 +261841,10 @@ CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4 CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000 -CVE-2024-4888,0,0,fec1e03b9425eafa3abf9c794b417e5dd9f4ec5c0ccb57ecd621528833d262c0,2024-06-07T14:56:05.647000 -CVE-2024-4889,0,0,e1db15d22cd014db7823bf12ffdd16045472c9266c0e44b11059f83de00383eb,2024-06-07T14:56:05.647000 +CVE-2024-4888,0,1,52d3f21edee01fa1b7d50228c23ad770da0e07dcc70157700a078948f8463c9b,2024-06-07T14:56:05.647000 +CVE-2024-4889,0,1,dc396989938962dc001a5281d191cbfae52fbf722fa7438f9288c8cc16167175,2024-06-07T14:56:05.647000 CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 -CVE-2024-48902,0,0,a199409fe89d504d5aac3fbfd93ec8ade919d8618d3b520517113fdc75e03121,2024-10-10T12:51:56.987000 +CVE-2024-48902,0,1,4705ef2c55813b3d84116179c2f627380e6bdeb3958de084a14cde58a5b57f28,2024-10-10T12:51:56.987000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 @@ -261937,15 +261937,15 @@ CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 -CVE-2024-4984,0,0,4c770a6dc8c529f3c0af8d3e90db2be448e055221af015f31ebcc25d2362a995,2024-05-16T13:03:05.353000 +CVE-2024-4984,0,1,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000 CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000 -CVE-2024-4991,0,0,b8aeb3a106a2de8e1f478a959ccd7b275af0efb815e10ad7ee23eb648e7f1818,2024-05-16T13:03:05.353000 -CVE-2024-4992,0,0,ec1d992e1f5fe08415c179ce25b0fea001c4731a967f0b1076a75d3070776569,2024-05-16T13:03:05.353000 -CVE-2024-4993,0,0,83d0a599d5056adcc4735f300c1b206d5b3f5c64c1127f5cf2c14e64daef5477,2024-05-16T13:03:05.353000 +CVE-2024-4991,0,1,3aef226cc1578adb6c75565d63e7f13bcda4a2e79607b48e5e73e305c3d938d8,2024-05-16T13:03:05.353000 +CVE-2024-4992,0,1,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01e3,2024-05-16T13:03:05.353000 +CVE-2024-4993,0,1,e0839a9575413089a3f10a1147258f2a987a3e24cb291a41fcab67561670893d,2024-05-16T13:03:05.353000 CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000 CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000 -CVE-2024-4999,0,0,b4eb381faf94a34214b2224241fcf2183ad19cc1b2b10e88fb63132439185b3e,2024-05-16T15:44:44.683000 +CVE-2024-4999,0,1,aeea1ad154336e8cbd739fb19642e978908300b067641ea9bc4ea587cb0b31ba,2024-05-16T15:44:44.683000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000 CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000 @@ -262058,7 +262058,7 @@ CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 -CVE-2024-5124,0,0,5de159b8ed64f30a1dc7ca0397d4baf3e4e9f9a186275e9923a64ce440abb53a,2024-06-07T14:56:05.647000 +CVE-2024-5124,0,1,b8a394b1f9e7efd67dcc6c50bec734389cce911be4e1359209f30e9603da5904,2024-06-07T14:56:05.647000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 @@ -262066,7 +262066,7 @@ CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000 CVE-2024-5131,0,0,e128e407b1f44dbf47d9ef9fd7ec5fd0648bd27c90b8180b437c118e29f83c77,2024-10-03T16:59:22.137000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 -CVE-2024-5133,0,0,648bde382180217072a24835c94928745ca15c05591a819f85abc7813d4496bb,2024-06-07T14:56:05.647000 +CVE-2024-5133,0,1,27936bad37103e9254a9a9050e2be366a53929cc8a787649c338045c5f656d99,2024-06-07T14:56:05.647000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 @@ -262112,7 +262112,7 @@ CVE-2024-5182,0,0,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d6 CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000 CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7fd,2024-08-30T19:15:16.340000 CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000 -CVE-2024-5187,0,0,8cb79662a760d64eaa6c095be93462d8fe8184c0e06ac81e3b7767e0ccc3f033,2024-06-07T14:56:05.647000 +CVE-2024-5187,0,1,82f8c951042a5ba4a82b0de0fb43991e44ce0d3836dc54687f365e828045ac55,2024-06-07T14:56:05.647000 CVE-2024-5188,0,0,b2a939863f7779e6dba1e0e2aecd4047c60710495b7cac734003aec732566505,2024-06-11T17:41:17.087000 CVE-2024-5189,0,0,87ea6bb70c0f4e8e0e95d6725175819a83c6ff33cc484fc5f525db9ad5e385e9,2024-06-13T18:36:45.417000 CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000 @@ -262129,7 +262129,7 @@ CVE-2024-5202,0,0,506e1bf31418d031771b54eb5cec35a7698867910819f07cfbd45cd0a9a0bc CVE-2024-5203,0,0,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000 CVE-2024-5204,0,0,87eb5b753d379a1bd1ef79b260f2b73c84b7ff9a4b79082cf351323e04c98a6d,2024-05-29T13:02:09.280000 CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e385d,2024-05-24T13:03:11.993000 -CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca4436,2024-06-17T19:15:59.190000 +CVE-2024-5206,0,1,949f6fc71375d4626489d3f545bf3c5118f704b122802585ae58b6156da35470,2024-06-17T19:15:59.190000 CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000 CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000 CVE-2024-5209,0,0,7531866dc2069833de5cded2977d100fe13c1eac0700fc84557e1bd601c0dcd0,2024-08-19T13:00:23.117000 @@ -262171,7 +262171,7 @@ CVE-2024-5244,0,0,3de36675ae2f0b5e30ad70179a948c0cef684a516575b6f4510d379552ecc6 CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa31702,2024-05-24T01:15:30.977000 CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000 CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000 -CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000 +CVE-2024-5248,0,1,b90cf62374fff2bbccb4cea2a8300fe0ed476abbc6d72fbaeeaa13d1af4a5ebd,2024-06-07T14:56:05.647000 CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000 CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000 CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 @@ -262201,7 +262201,7 @@ CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d2 CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000 CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000 CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000 -CVE-2024-5278,0,0,070492ef57b88214566344e89a28a1f0ef4d4f18184d616c40ab3876a3b57140,2024-06-07T14:56:05.647000 +CVE-2024-5278,0,1,0137f7f9fca5010dd0e984a18e481a1fdb6c0eef44e397059c3c4ad95b60c95d,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000 CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 @@ -262447,7 +262447,7 @@ CVE-2024-5546,0,0,c5e286acb2f3606a77d5f9fad2cd25d0eec10ea9a2a627e2d4be4b4554a1c9 CVE-2024-5547,0,0,30803f020db51b7398a94ab478cc6cb1ea70aecfbbe13ac1b895b9f9fa592338,2024-07-12T08:15:11.230000 CVE-2024-5548,0,0,6a07d64078300a9d20971a8757a67f3f4682659414ef6d1de11cb6b5c54c02e2,2024-07-12T08:15:11.313000 CVE-2024-5549,0,0,2db2267d047672e6871a7836da6ae7aa97f316bb2880c93f204c63f2960062f6,2024-07-12T08:15:11.390000 -CVE-2024-5550,0,0,dab352871e5b1599db274fe7ee72f4ef4902afffcd5667b3ef675a3fe452e429,2024-06-07T14:56:05.647000 +CVE-2024-5550,0,1,d977d90861a3973f6f3fb1ad2774bd62095f4c8939293bbf64a9f8c98824caf8,2024-06-07T14:56:05.647000 CVE-2024-5551,0,0,d4fe322803a15d54f942643eecca544bbc21fd2d50a048ef751f6568e43cd352,2024-08-07T19:09:17.363000 CVE-2024-5552,0,0,27b7e1f2348eea0c7f3bb025b66602057c4c602e939dcc27630d367adfb91cd3,2024-09-23T22:31:27.563000 CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000 @@ -262963,7 +262963,7 @@ CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d7 CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000 CVE-2024-6153,0,0,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000 CVE-2024-6154,0,0,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000 -CVE-2024-6157,0,0,daf1a8f52914a5c4db57e6e1e23221c4507cee42bfb6ada152da69163c634a36,2024-10-10T13:15:14.370000 +CVE-2024-6157,0,1,0a46c38daa9e9cd16116a68fe90bde9b3eb1a120c739c8fd6a0f1b6a00a66d30,2024-10-10T13:15:14.370000 CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000 CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000 CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 @@ -263177,7 +263177,7 @@ CVE-2024-6395,0,0,8949d2f54703284d3b545906a65282811d0c7a0bd7bd2d1ca2dc3e2d333d4c CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000 -CVE-2024-6400,0,0,b12e51918d3fac611abb41581f64ff5897a57eb001a6dc3289eb9762196ba005,2024-10-04T13:50:43.727000 +CVE-2024-6400,0,1,8197ece32bcb0305f8428a663c1a4a5495ec77ab638d96c062f891b5b405ccd1,2024-10-04T13:50:43.727000 CVE-2024-6401,0,0,75f35c467a7667b8ee07e8ffaab5805a621ce217810e5427bec74047890dc99b,2024-09-20T17:07:55.740000 CVE-2024-6402,0,0,2dbb843b8ac3a7858f42e0a7205d0fe42cc4e1a6d0db6e5033a007b00a2a1ef3,2024-08-30T21:08:54.327000 CVE-2024-6403,0,0,9d6874f85ed8785db48c417cc57cf1b425db80cf3f43ac931de3a37049d75945,2024-08-30T21:08:04.557000 @@ -263284,7 +263284,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 CVE-2024-6529,0,0,39f9da174065ddfb2f1cb6d88de520cca12e78f6992a8df9512aec7d73b21efd,2024-08-01T14:35:13.090000 -CVE-2024-6530,0,0,e1744352671cbabdd1f5bc963e1180680638c909eaa8d9454144750cdb4b5589,2024-10-10T12:51:56.987000 +CVE-2024-6530,0,1,43ff626c5da37fe39737522d6419162d4dc4bfcd020f7f1699d3f4f0cfdec2d4,2024-10-10T12:51:56.987000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6532,0,0,34d446197f804dcbdd8feccdfe721cd1c46fe7ee3b5e0da65e1be9d287c7b644,2024-08-14T13:00:37.107000 CVE-2024-6533,0,0,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 @@ -263396,7 +263396,7 @@ CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f5488 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 CVE-2024-6657,0,0,f9f1eb8afc0fcee1648ff3b1592d9c7d58198951ffaa3d5eddbf57bf7a2d64a5,2024-10-11T14:15:05.770000 -CVE-2024-6658,0,0,7f941e970e0ddd88d17ac95cf96717b7dab27bb1b6ec72400c0fd64e8c2d71b4,2024-09-23T20:15:05.560000 +CVE-2024-6658,0,1,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 @@ -263465,7 +263465,7 @@ CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744 CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000 CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000 CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000 -CVE-2024-6747,0,0,bf0d76edeeb22be154253a6e2097a6489109e71197029ea995eb3a393f5f735d,2024-10-10T12:51:56.987000 +CVE-2024-6747,0,1,8b616df13e4df1f1e762a9c85cd0dbe82d8a7b051198b89f21b0da450045528f,2024-10-10T12:51:56.987000 CVE-2024-6748,0,0,3165cdb659bfb317f070ab6b5ff0ffe08f8676c2d4210e086188fb527771a712,2024-07-30T13:33:30.653000 CVE-2024-6750,0,0,259befaacfd3ee023627d5e60a86696c98cc4bb58920e9f36a409d03ab7792d0,2024-09-03T21:40:22.460000 CVE-2024-6751,0,0,65709f0db2fc5964de358cedefb78e4090d836ca670fed7f74fbf34d4a07dbbd,2024-09-03T21:39:06.433000 @@ -263529,7 +263529,7 @@ CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a946 CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000 CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de97130779,2024-09-11T16:32:16.247000 CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 -CVE-2024-6840,0,0,7c986c84330c0d6a36f8acbe5161f48fa3bb3212004b610946e64dcfd6e26341,2024-09-12T18:14:03.913000 +CVE-2024-6840,0,1,32a3665f80239333fecee34a11f4d8a5f93588e98d39b1a4bfaa2fe487feef20,2024-09-12T18:14:03.913000 CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000 CVE-2024-6845,0,0,8cfbf7a32934cd44512fb57429efe77d7878ee937ee4aaf559e172ffd7d4f76d,2024-10-07T16:58:39.060000 CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000 @@ -263691,11 +263691,11 @@ CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f8946 CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca45054,2024-08-31T03:02:41.763000 CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 -CVE-2024-7038,0,0,f6026a1dbe3c125b255efbfe964a7d25a93c1643c9cf71b323ac917211c9f7e5,2024-10-10T12:51:56.987000 +CVE-2024-7038,0,1,50e1a958338e09dd5d29ac761cd7257587d7fbf8d06206d63e71117bb6ca44d7,2024-10-10T12:51:56.987000 CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 -CVE-2024-7049,0,0,c8e98d99addb554a22cb9aed9502ec347f4e868295d0fa4515a9870e411b71e3,2024-10-10T12:51:56.987000 +CVE-2024-7049,0,1,d4744eea3422bfb32ace9d08093ed9c497b418bb1b39a00575462e262482df23,2024-10-10T12:51:56.987000 CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000 CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 @@ -263727,7 +263727,7 @@ CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b CVE-2024-7094,0,0,d8ce6991dc787cf1fc8f383d7f348b0cc8c833a282f09c60355b50a58a302aa6,2024-08-13T12:58:25.437000 CVE-2024-7098,0,0,a1c49ab120800ed86f2025110e68f50c456d030c99d6739576f8a1d2cc80570d,2024-09-20T17:14:53.063000 CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000 -CVE-2024-7101,0,0,09bb223dfe11de94c64cf08cf4ead3276cb0b7947ba7d814943a8cf3a6ced723,2024-07-26T12:38:41.683000 +CVE-2024-7101,0,1,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000 CVE-2024-7104,0,0,65dfc462223ed34264e8700eb7e9171b84ef85c656f444224981a91d9956a19c,2024-09-20T14:44:18.010000 CVE-2024-7105,0,0,46f1c8544843abdf42260f92967cf768f61b8f943bd2d80ab65735c61cbf36f4,2024-09-11T14:15:33.063000 CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000 @@ -263965,7 +263965,7 @@ CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c5 CVE-2024-7383,0,0,21277f7530eb9638c0031a3484c43cc9bf1c76998abaa0508791395c60c4cd7b,2024-09-25T01:15:45.270000 CVE-2024-7384,0,0,e16089be5aef5f78ca7e6b44ab3843ceb098d29ed31bfeb024ecf87d32c582a0,2024-09-27T13:15:28.443000 CVE-2024-7385,0,0,fc70fa45c6ab957d8de4927d500e717df28c4cfb0727ea9ee319768f7d1b14f2,2024-10-02T19:35:26.523000 -CVE-2024-7386,0,0,d2e07064fd53b4f2486678922d08c221ca3e369913ce854369225c4eab166918,2024-09-26T13:32:02.803000 +CVE-2024-7386,0,1,73853b6e40a3b4b4a94fcf4c59609f559f6495383ceafa0a1df8f3191c741131,2024-09-26T13:32:02.803000 CVE-2024-7387,0,0,88a2f5f296b30b6e91a6f72138ece306740eb87629edb428b81d1f03949ce086,2024-10-03T21:15:08.593000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 @@ -264041,7 +264041,7 @@ CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f9 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 CVE-2024-7489,0,0,6bee47903e820549e5e90c739107dc8047ac1f65bad2428fe064821e77e6f9e3,2024-10-12T06:15:02.337000 CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000 -CVE-2024-7491,0,0,a01b632cdea4b7de4f1d96a6110e5895a43b6bc1c1fcfe3f5789f97da5b84105,2024-09-26T13:32:02.803000 +CVE-2024-7491,0,1,d689a374fb3537e15633f4540eb868e4dc80670c3ee0d8274c63d44d12227824,2024-09-26T13:32:02.803000 CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000 CVE-2024-7493,0,0,3771857e70d7d3e7e04dd2b1f1ab0ad1e21954c07c8190785053e50de0d1ed22,2024-09-26T17:41:16.390000 CVE-2024-7494,0,0,3a598ade67522bffd51a3365723ddb5bff4182d602034c8ec8df719958075683,2024-08-19T17:34:50.933000 @@ -264490,7 +264490,7 @@ CVE-2024-8076,0,0,17f13fca60dc9f294e50e141a5e871f314ee6e5e737c4e528c1768c1265f9d CVE-2024-8077,0,0,52c1674bca408deb5f4af1cbc16aa8747d849ce452283a87adbc49089818e7d0,2024-08-29T21:59:08.997000 CVE-2024-8078,0,0,f626923249ac1663cbf454cb3abb7727962b2d31dfe3ce3fb67e98887e829858,2024-08-29T22:00:43.353000 CVE-2024-8079,0,0,40def7782e690abb046fba72bfae2275a611ebd1a8978a708346d40e8ccb882c,2024-08-29T22:00:11.680000 -CVE-2024-8080,0,0,c8da83ed651e2e78327dca04cb45f8efec07e44d550ef7a9ff0faf681234c986,2024-08-23T16:18:28.547000 +CVE-2024-8080,0,1,c6c520b18621943d9422629f3411fcefb69e52db6ad90688ccfee2ecbd43efea,2024-08-23T16:18:28.547000 CVE-2024-8081,0,0,a5310bc7e9b22185784b602e8eec862129b29e3e8dd39db46315df64d68f05ff,2024-08-27T16:12:33.580000 CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa15,2024-08-27T16:11:35.730000 CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 @@ -264588,7 +264588,7 @@ CVE-2024-8211,0,0,5b4e9b28e2816d2f35d4acb0350fc0e49e8657272045690c600cf9f90950ab CVE-2024-8212,0,0,66b37a4b12b90b5cc5591d36a74e4618a857f5189c3555eee7f804c09d611757,2024-08-29T15:53:02.077000 CVE-2024-8213,0,0,f08a4d7a28e82e7ff3d3e2612b90a791fae0345ea2975bd689f142229b49ea1c,2024-08-29T15:51:33.390000 CVE-2024-8214,0,0,e8cd969458fd2099a6e262b11999fd6101bb9998ecb02205d2db626dce16672e,2024-08-29T15:44:45.280000 -CVE-2024-8215,0,0,59ce378db9c6c9d718534b4174572b40b1c57eca347e2dcb82504870264c7d30,2024-10-10T12:56:30.817000 +CVE-2024-8215,0,1,2e01b1337ffa87d29b638f9eabb27d01916d8c3b7dc0472d4587f4e4a254221b,2024-10-10T12:56:30.817000 CVE-2024-8216,0,0,78f2e4469e404dfd9cf88b824b412b7d502e32bdaad0782bdef10dbca38d2a4b,2024-08-29T15:41:34.107000 CVE-2024-8217,0,0,3bb02b114c9683c5910dc1625ecdc6a0f8feff4dd9d0f42f36fc7a4e8c780af7,2024-08-29T15:39:43.643000 CVE-2024-8218,0,0,87eba2797b2b8c4fb49de9ac2fc9a1cf44c9da007d2eef048ba8b4f51ffca907,2024-08-29T15:38:10.610000 @@ -264736,7 +264736,7 @@ CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb84 CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 CVE-2024-8421,0,0,d73687c7a440fd8723ef6583db3c90a2a943a5b89a22a06b8eb401f91173afbd,2024-10-04T13:51:25.567000 -CVE-2024-8422,0,0,da1dd556419670385038468e2107102610aa221c3a3eaee298a2f7cb26fadde1,2024-10-10T12:56:30.817000 +CVE-2024-8422,0,1,255a3aa393f41406f9e07833c75444e6081f5177cdfe98ac4f09ed99731b15fb,2024-10-10T12:56:30.817000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000 CVE-2024-8430,0,0,55a9f0c318551ddd036fdf97a76cda9a73c7561d06c4df941f7c206a6547670b,2024-10-04T13:51:25.567000 @@ -264745,7 +264745,7 @@ CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677 CVE-2024-8433,0,0,10afb8a6fa43c6f6fbfbb3257c4e815f1728fa33e9d5d7be923265592220fbdc,2024-10-10T12:56:30.817000 CVE-2024-8434,0,0,f17fd5eecfec4b6092d883a27ff9fa9dfcb00839b391edc337e18ff19734c460,2024-10-02T17:25:30.140000 CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000 -CVE-2024-8437,0,0,e197ee77442bbe9c0c205a562fa2fee4cf9645f10acbb85445e512103cf01a70,2024-09-26T13:32:02.803000 +CVE-2024-8437,0,1,4b506df7175b44ffa93e3ef9b1fdedd8455751a5d7f25e7c7b69c7cd1dfd7636,2024-09-26T13:32:02.803000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c079,2024-09-25T19:34:19.683000 CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000 @@ -264778,7 +264778,7 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 CVE-2024-8476,0,0,092ef960d66528d11d9417cebbf68782d16f414858b72459c24698ae73498ac1,2024-10-02T17:31:00.583000 -CVE-2024-8477,0,0,560ff35aed3b9bd5544aad76af6fcb59dec1bfbf894f84166ea65d83ab0c9f01,2024-10-10T12:51:56.987000 +CVE-2024-8477,0,1,1faf02f48a6c137929c410bfef3e9ca70772a04b4f45e1a2889fbe2e2cd3997a,2024-10-10T12:51:56.987000 CVE-2024-8478,0,0,175c7b9f94662d755813fa2228cd0539f44691d1180c4633af22a35129eb9a32,2024-09-26T15:53:44.297000 CVE-2024-8479,0,0,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000 CVE-2024-8480,0,0,73de76891190d432c360d36e1da93720f2abf11adbca08499bebf4ffb87eb2bd,2024-09-26T18:13:58.470000 @@ -264787,23 +264787,23 @@ CVE-2024-8482,0,0,7f62f0d1a243ba448d81dc1e9f8e61d5af52a43134389c525974698cf1ec68 CVE-2024-8483,0,0,7b9d62ad2c15cc912981452040d1345e4ce933202d5b94754bb2f4a4c6c39a92,2024-10-02T16:42:30.347000 CVE-2024-8484,0,0,f455d9eda6cfa730254e6d1c54e42895291597af75d213a155b8f2778e2c53b8,2024-10-02T17:44:13.687000 CVE-2024-8485,0,0,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e39313163,2024-10-02T16:19:15.993000 -CVE-2024-8486,0,0,142dddefdb024c37bf64990d5cdf075e89e34583809c3fe8fbc3ef75d078d000,2024-10-07T17:48:28.117000 +CVE-2024-8486,0,1,a895c2dfc5296c31033d2d8775c35d4e89c74a55a8e4a0d1cd2be303d1154f98,2024-10-07T17:48:28.117000 CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f998b,2024-10-10T12:56:30.817000 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 -CVE-2024-8499,0,0,551fc12eb8cb4caa4e9bbd5dc03a7956334337857e6a71f0d5ccb7ec4fa77572,2024-10-04T13:50:43.727000 +CVE-2024-8499,0,1,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb39,2024-10-04T13:50:43.727000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53 CVE-2024-8508,0,0,095cff01fb00165e2108ed0a6b3f940edeffb7916515f1cc0f2ea48f2031a7c8,2024-10-04T13:50:43.727000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 -CVE-2024-8513,0,0,f2c9f0b23984b3fd254455cbfb09e4c8a0cb1b04789aa0ce90358c3617e7d185,2024-10-10T12:51:56.987000 +CVE-2024-8513,0,1,5e0bdda1c0b018ba91d0f10ae70eb6cfa8ecb6f600f283b8c321173de6280941,2024-10-10T12:51:56.987000 CVE-2024-8514,0,0,c58a76f0057441ba23f8e2f32e326770fb9d4e75db425aee0ab9e343556d5997,2024-10-02T19:59:17.080000 CVE-2024-8515,0,0,2860d4fc2403ef731ebb5d2e3d51ef0155fe3387c99bac76ffcaa85980c8d253,2024-10-02T19:22:00.953000 CVE-2024-8516,0,0,4c7cc8475226568ec7dcbebdfbb30107ff8998ef4ef82c2cfacac984d895c7fe,2024-10-02T19:22:44.933000 CVE-2024-8517,0,0,ce937d4c0c27f8995dba93692196810f803407b9c7a2ce432d973aed0a5fc274,2024-09-18T18:05:03.553000 CVE-2024-8518,0,0,759da2d37c4aaf02c69f2fbe6a6112ee2eb66d1b3bca228becbb2e86bb579cf2,2024-10-10T12:56:30.817000 -CVE-2024-8519,0,0,1aacd88d58f1107be56cf91e3e76096c2b7c27f5621315c82a8d3461470ecab4,2024-10-04T13:50:43.727000 +CVE-2024-8519,0,1,b4ee2f063157addc1a528eb0b22a0331a36b83d5d8a4d3e8da4814afae0fabae,2024-10-04T13:50:43.727000 CVE-2024-8520,0,0,4bf9c9cd030963a8ce8142c1cbb513efd4813c3e4b2408a924afa68b32dfbdb2,2024-10-08T21:50:30.153000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f38,2024-09-13T16:12:30.497000 @@ -264869,7 +264869,7 @@ CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec066 CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 -CVE-2024-8630,0,0,171e223312e05c108be17689ae4f899562cfc4dd591123d96527e97a9f5e9c7e,2024-09-30T12:45:57.823000 +CVE-2024-8630,0,1,fa2e1d0ffca4b3a6674a3552869b604a1a3b291cd638b0dbeae393e9111a5cfd,2024-09-30T12:45:57.823000 CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000 CVE-2024-8632,0,0,e0cada97c6995cbb67fe42f80a349e37abe4361f782a8365fc38e88552a5da8f,2024-10-04T13:51:25.567000 CVE-2024-8633,0,0,11f9c1ab75a0acad9e38c7131ee0e717752f233463501613a3dd97a61fe47734,2024-10-01T14:17:43.700000 @@ -264938,7 +264938,7 @@ CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c496 CVE-2024-8725,0,0,bda4a6515a704fa51f2d759f535270e57676d8c1b87d3a5cc5dc6f9e3d99ebf6,2024-10-01T14:16:42.727000 CVE-2024-8727,0,0,cb79e2fb4f4e8ddff2e3cdbb1cbb30b7c8fce0689b3d497e10ebbff2e74dd2da,2024-10-04T13:51:25.567000 CVE-2024-8728,0,0,d061a0a3e4a793bdc334c9b032908af2152405a24e9b06b2723d960e58ba5c92,2024-10-04T13:51:25.567000 -CVE-2024-8729,0,0,502746e08b16d3182f31a62af04f64a7f4cb2cae01ba403524a1f6920b83c55c,2024-10-10T12:51:56.987000 +CVE-2024-8729,0,1,e912efc66bdc104956ebf2aee531ee4293a718aac50c9b7bbda50b8d04130d71,2024-10-10T12:51:56.987000 CVE-2024-8730,0,0,ff380ede7d530472d7457d72280d0377e58fe499631b78029fd0dcbdd667a7f4,2024-09-26T19:58:33.353000 CVE-2024-8731,0,0,17c6adda5eb698d4c05886ce56b7c8d24eb85ac20af08445719f350b3f8c3e38,2024-09-26T19:43:33.110000 CVE-2024-8732,0,0,fdb5356750581bee2cd15ce9454648108e6d01424f144ebcf561e47c2245eaa8,2024-09-26T20:01:02.290000 @@ -264948,7 +264948,7 @@ CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f34 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 -CVE-2024-8743,0,0,a93bc6b28590855b99be656324020b1520bccdd3bcb2d1f83659062c870b749d,2024-10-07T17:48:28.117000 +CVE-2024-8743,0,1,65920323e1d664fd8f354bc76b73276103c2d19a537eecec01fa5cc8c5638d58,2024-10-07T17:48:28.117000 CVE-2024-8747,0,0,c8071dd8d89406610db13dc6a04dbbb98461ebd7257641ae31a11de6b1ad5c9f,2024-09-26T19:23:12.477000 CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000 CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b5620,2024-09-18T20:38:42.123000 @@ -264965,7 +264965,7 @@ CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588df CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000 CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000 CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 -CVE-2024-8771,0,0,15a682e997419ee1ac1bdcf705c5edffd097702609d5d4165bd4aad49599cecb,2024-09-30T12:46:20.237000 +CVE-2024-8771,0,1,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000 CVE-2024-8775,0,0,1f8b246503d32d66b42e8fe1d2ca1b6d98900c0e0fb5babb06cd69ea0d0b6cab,2024-09-14T11:47:14.677000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000 @@ -265035,9 +265035,9 @@ CVE-2024-8915,0,0,3d7924a02140bffa633b7bd8d59b4b3fbe9f92ae6bde22761e2a4adcfdb524 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 -CVE-2024-8925,0,0,f7b67219b091a742390ec1bc7b7a23f6bee63991cff554b1b79c817328faf839,2024-10-10T12:57:21.987000 -CVE-2024-8926,0,0,f260becf66260bc88c518d40940feebbefa9dc7db11337c2d47039024806f87d,2024-10-10T12:57:21.987000 -CVE-2024-8927,0,0,c1e9a062d52462d6fe242810289c0eebebd710add8b342036c04255888aa68d4,2024-10-10T12:57:21.987000 +CVE-2024-8925,0,1,573fa9fc5dcadaf344ac622d80d126966b00ab4fb4c5a5f790f844b7bfe8b0ca,2024-10-10T12:57:21.987000 +CVE-2024-8926,0,1,d0e916c7cd86cec53049a41ddbf4dec10c1366cdaa0ebe3384f1e3c4ead8cd0d,2024-10-10T12:57:21.987000 +CVE-2024-8927,0,1,fa734e1ab931770e223d419075fde647d7ea0d5746e67bf6b2f26703467a77b5,2024-10-10T12:57:21.987000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 @@ -265060,11 +265060,11 @@ CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9 CVE-2024-8970,0,0,01220d239772239c552efb8067c56a2081891e04faac8e9af54c0668dd9acf39,2024-10-11T13:15:17.270000 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 -CVE-2024-8977,0,0,1854c355a879a1753be7595f13bc9f67fdb20e00c1bb5266672eb0282e59a99d,2024-10-10T12:51:56.987000 +CVE-2024-8977,0,1,b30f5e9773cbebd8f8eab1c578a3df324c4584c4e480d99e81a4dd652a649813,2024-10-10T12:51:56.987000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 -CVE-2024-8987,0,0,131ba5dbb33e2e4795191d9e8dc13e7c10247826582eda8bd05234eb3009028f,2024-10-10T12:51:56.987000 +CVE-2024-8987,0,1,2e15a6866a11249df44905a7c91db802da346d4704f12cdcd4f7c5e157d2854e,2024-10-10T12:51:56.987000 CVE-2024-8989,0,0,caae46233d26ee2b67df93becf3adf518208e6bbacfb542b8b2dd6d9f605994c,2024-10-04T13:51:25.567000 CVE-2024-8990,0,0,ebe58ed4a084d59384bf44303a373b31562e7163a1320c584d218212811f287c,2024-10-04T13:51:25.567000 CVE-2024-8991,0,0,36ea31132f642cce3da65bf6a2c52220b14f1ba567442136b19c870ca92cc82c,2024-10-04T18:56:30.583000 @@ -265082,11 +265082,11 @@ CVE-2024-9011,0,0,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eea CVE-2024-9014,0,0,a8e29b928e7c02e09a31b50dee33eaa8cea5cb50c9cc022c5089f67468915a88,2024-09-26T13:32:55.343000 CVE-2024-9018,0,0,e176c873e94bd3e2c4b29c05a28da23ed581266b7e7463040882baa285f3a6c4,2024-10-07T19:20:48.293000 CVE-2024-9021,0,0,de7e8d34046f42f6ccd1c1916e1a012bc3502bb49751a8fdf9bccfa914a129ac,2024-10-10T12:57:21.987000 -CVE-2024-9022,0,0,f150208aaae2eaed713359f400156181e6aa1a4f5d3c759fa153dc1651766601,2024-10-10T12:51:56.987000 +CVE-2024-9022,0,1,0c9c4735874d1bcbff2a6e0d6a6aa9985e332f22e1144a381d492eecd805516a,2024-10-10T12:51:56.987000 CVE-2024-9023,0,0,8856d7ffdca739d2c0d1b85fb1ee05faeaf6947167077ac20feaa24f6c509db2,2024-10-01T14:39:38.370000 CVE-2024-9024,0,0,29f2f073ee82aef300cee3fd954ac6dc4243aa67d5082fca2a65737992da04c1,2024-10-02T18:02:59.683000 CVE-2024-9025,0,0,8c34a0621e4e149deefb96042ae2c7c0174789fb7b5db2c9c1ef1c4077be46cb,2024-10-01T13:44:23.667000 -CVE-2024-9026,0,0,1ed21598ecf1af4f167ed704808f588277119ba81d8cd1b51230bca1346530a5,2024-10-10T12:57:21.987000 +CVE-2024-9026,0,1,65298334bd9e9351553f5075717d2b9342ce021170798d097979a9878b6dec19,2024-10-10T12:57:21.987000 CVE-2024-9027,0,0,f3828020bd9a05a5e8ccaf0c12e55b05c6a031d2d0b0e5c28efac160e51428ac,2024-10-02T19:42:31.563000 CVE-2024-9028,0,0,12ca3746b7fb03c9df5889561116f4fbc62436426375b30bf910f3c4d7d8403e,2024-10-02T19:45:00.813000 CVE-2024-9029,0,0,9076ca7374bbbeb2209faec4a2cd78108bb0db6f5ed66892cd6b13e6647405d7,2024-09-30T12:46:20.237000 @@ -265109,19 +265109,19 @@ CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 CVE-2024-9051,0,0,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000 CVE-2024-9054,0,0,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000 -CVE-2024-9057,0,0,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000 +CVE-2024-9057,0,1,7120f445795029b2d9232bc6d376088813a1d971ec2cc3805c4f8c6e80f0ae9f,2024-10-10T12:51:56.987000 CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000 CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000 -CVE-2024-9064,0,0,ac473310ab43f9fb30dffa5d3f92bc818e294ac85215fde1a46fddd10d2a239a,2024-10-10T12:51:56.987000 -CVE-2024-9065,0,0,51931192660d148a6daaba8639621e38a6bb6429b22429d6e98cf1184291bace,2024-10-10T12:51:56.987000 -CVE-2024-9066,0,0,029e7fff882135723275436a7ffd016a916fb688dffa2aaaf8996414c0870f6e,2024-10-10T12:51:56.987000 -CVE-2024-9067,0,0,5af42da39a95d0404e86b69013242c48e33f22b626a24a9e144e4d7f8b3f310c,2024-10-10T12:51:56.987000 +CVE-2024-9064,0,1,3690c7b55d27fee8e350cfbaac84424d2ddbe800d1e2e12ef6772fb08a20e1ee,2024-10-10T12:51:56.987000 +CVE-2024-9065,0,1,e9efb6d99d6a8d9eb69ce9d64d363e1b2d23bb9225e836ece0e0e885bbb6727e,2024-10-10T12:51:56.987000 +CVE-2024-9066,0,1,fc87776b2f03474483556b1b2f376c42262803893b22c50cdaaf393d080aafc5,2024-10-10T12:51:56.987000 +CVE-2024-9067,0,1,7fdccb978deb88a23bf680725e31f34e04dafb7390e85f5eb83820286e0bc55a,2024-10-10T12:51:56.987000 CVE-2024-9068,0,0,01b6ceee3583b3b207ab2eeaf4c2684cbe8e9990b1a6178aa8ad730654493f98,2024-10-02T19:55:50.547000 CVE-2024-9069,0,0,904bb0393747d55de1840c322bbad7ae9d27b3e14c3398a0999f4d003e7be886,2024-10-02T19:37:49.777000 CVE-2024-9071,0,0,6a3b91964e28255133515a40cea9164b7d6e82b1113f289183d17f39a22489d5,2024-10-08T16:21:04.180000 -CVE-2024-9072,0,0,005912146cf10a7c966374db1ea1dc59f890da6d2ffa46a4dcea37394ffdbfcf,2024-10-10T12:51:56.987000 +CVE-2024-9072,0,1,d221aeea4cee9ebc13f53deb844d41f6cc7066bfd41bd05456b25ad9d097b6d3,2024-10-10T12:51:56.987000 CVE-2024-9073,0,0,e1a3718934b1c8aa8070be1e5efd6407ed841e421f9f505c84906bd05d8d4d7e,2024-10-02T19:32:43.047000 -CVE-2024-9074,0,0,b84a28074c96047ae7f557521e1eda6a4f5c8269b5a9c56aa56cd8ffd0526908,2024-10-10T12:51:56.987000 +CVE-2024-9074,0,1,bc413a44634bc6d0320a2c0e1f219d7fc05ab3b829231d0c75e6e0d564e09233,2024-10-10T12:51:56.987000 CVE-2024-9075,0,0,3b33ab99769a9c852230df8e8b6083f862011911d6a5bcadbdc727ad6f83ab66,2024-09-30T15:27:39.313000 CVE-2024-9076,0,0,8c57021a64484b6edbf7ffabe5a971516c1732fccafbf97d4089a67e7015212f,2024-09-27T16:14:04.977000 CVE-2024-9077,0,0,b59a81d09978bed17f369329899086dd9d16ca13d3114e4823b03c2ad7c75c03,2024-09-27T16:31:52.923000 @@ -265161,13 +265161,13 @@ CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000 CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000 CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000 -CVE-2024-9146,0,0,093a84e73722aaf94583ed37757bead7a369f935148ee5112a4de416d29a94d3,2024-10-07T17:48:28.117000 +CVE-2024-9146,0,1,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000 -CVE-2024-9156,0,0,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b54335,2024-10-10T15:35:15.513000 +CVE-2024-9156,0,1,bcd53d2df74817387f5c7b903fa39072b4201c0e9cf3669f3b4311525ede5f9c,2024-10-10T15:35:15.513000 CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 -CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000 +CVE-2024-9161,0,1,b475702d9da1cd18a82129e88647b71b0425c30925f01e0c024257c76be8d651,2024-10-07T17:48:28.117000 CVE-2024-9164,0,0,9992870700450aea4f4accfed1feb88e203e45183a15e0b94e4dc0ae91688c8d,2024-10-11T13:15:17.700000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000 @@ -265177,17 +265177,17 @@ CVE-2024-9172,0,0,061cdfe5504cd57ff23c615d7882c5ec428decc2bc25b474b7bdd44e1c6c93 CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb506,2024-10-01T14:12:41.293000 CVE-2024-9174,0,0,70fba8b83f62f6c4709cde03a07baa90e2b7205b145527e48fd4fbdcbf5b21e3,2024-10-04T13:50:43.727000 CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000 -CVE-2024-9180,0,0,9779e65e93417b197f46f5c463aa8866d46d5d3340da4da9b2b9c7085aba9dad,2024-10-10T21:15:05.010000 +CVE-2024-9180,0,1,09b2e0f3c1799965da79dc62f3f7016950c58ffc6f92cb270d955982c4115202,2024-10-10T21:15:05.010000 CVE-2024-9187,0,0,2781007ebf5b70adc7be2615b0370144f38bf44011cf16033b8612315f867048,2024-10-12T06:15:02.803000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000 CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000 -CVE-2024-9201,0,0,a44c16e9977c247511fb39c6475f3e4e6f33a76dde5a9e09317a93a9497d37be,2024-10-10T12:51:56.987000 +CVE-2024-9201,0,1,4cff5c7dc6aa71b16756eea8781184a206d8265972db558aa2b6fb5a1fa84a58,2024-10-10T12:51:56.987000 CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000 CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000 -CVE-2024-9204,0,0,8709d8f31d12084fc2eba23d41169bb9ba345e1a3d3bed7d676463fdbec26c9b,2024-10-04T13:50:43.727000 -CVE-2024-9205,0,0,b718d7a20230ca5535d4a92f87ab8371c72ac9b0f2e1a0dacf1f87ee0d6efefa,2024-10-10T12:51:56.987000 +CVE-2024-9204,0,1,c5246701198d6d63430cd35f719d347fee9189ea12aef09e66cf00bd43cb052c,2024-10-04T13:50:43.727000 +CVE-2024-9205,0,1,2342f85567b7ae33e437901f9d4f9c8c67422cd91ed15f39888babdabed28078,2024-10-10T12:51:56.987000 CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 @@ -265201,7 +265201,7 @@ CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 CVE-2024-9232,0,0,addd3c21da65f2294fcd06790057fabd158db76d23e6e63a31e06745dd1630d7,2024-10-11T13:15:18.313000 CVE-2024-9234,0,0,93ca479c6177293a6648dd18b24eccaa34af7d9740240888030f5df11e97e9ea,2024-10-11T13:15:18.530000 -CVE-2024-9237,0,0,6dd007338b51674bd9fefd8518a997a164b381519066f168810e8e196c9bbc64,2024-10-04T13:50:43.727000 +CVE-2024-9237,0,1,0e85c2cf89b7facf78d32fd32a25dffbbf4b2d8fbf5d6b7c796412387e496c24,2024-10-04T13:50:43.727000 CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000 CVE-2024-9242,0,0,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000 CVE-2024-9265,0,0,370ae511e2a3bdf95824ac5c42b3e844c54d5bb7a6631dfac66939ebcd808076,2024-10-07T18:48:15.380000 @@ -265238,9 +265238,9 @@ CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961 CVE-2024-9301,0,0,8bd5a6d252ad4356c723578db918b42e690d26a3308bebd8024d27b2807bcd16,2024-10-07T13:12:48.953000 CVE-2024-9304,0,0,f4e2b697051bb54ba85260a74446cf2ab04e7ed5a9a99551a585b1547839152d,2024-10-04T13:51:25.567000 CVE-2024-9306,0,0,ac26ad903bb36889edec0c6ea9a2822945801fec7c4fdd4634c75606f4fc1bfd,2024-10-08T16:25:29.877000 -CVE-2024-9312,0,0,c61a24c6a6bc70e80ca2fa418b83401f0228ff97884f8f436dcd1153e4d73199,2024-10-10T14:15:05.863000 +CVE-2024-9312,0,1,3dfa1fb61896254be60d93c0c360284db6fd2a50f4dc389d43297e0673970fbc,2024-10-10T14:15:05.863000 CVE-2024-9313,0,0,8eab8e6a12fcb7dddda62f8c34fd34d547229d6ef4cec2e38f61189642da0e5f,2024-10-04T13:50:43.727000 -CVE-2024-9314,0,0,a38936eed4619dcb3327257a1c570731c2950b1dc59439e66bd5a7e1f84786fb,2024-10-07T17:48:28.117000 +CVE-2024-9314,0,1,00d364d543c4cb2126acf6cc95de2d0f1b151f0a7217d33f64bbbac89a01f5f5,2024-10-07T17:48:28.117000 CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000 CVE-2024-9316,0,0,dc1cd9e0c0f14c1ac859a7efc8a45f5e2b48ab85717e9999593b73d7873483e5,2024-10-02T13:29:29.813000 CVE-2024-9317,0,0,f67b854cd75d25217a31bdd6074d6f9f6352c2218386ab264e509a61a09e8c0d,2024-10-01T13:32:39.140000 @@ -265270,13 +265270,13 @@ CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a74 CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000 CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000 CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000 -CVE-2024-9377,0,0,7e92c94153a671db6e3bc46a35701812779a3ebf2498b474df31292a74a22a6c,2024-10-10T12:51:56.987000 +CVE-2024-9377,0,1,3609389627c31bd336cd507d8749805892c4a829719c5e6a261e13fa574ffa8c,2024-10-10T12:51:56.987000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 -CVE-2024-9381,0,0,38dc7b42bfe6f81a683e774fe86ddcbec5bce97b381af2229d40d440156c5086,2024-10-10T12:56:30.817000 +CVE-2024-9381,0,1,25cf43ff2a0a9532d395ad1081122edeb1520bcb9236eaf7cc384a1005025472,2024-10-10T12:56:30.817000 CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 -CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000 +CVE-2024-9385,0,1,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000 CVE-2024-9393,0,0,8991f032fac5df92cbca1bcfbd289d2f6fc6372985ab09be505deb12f485dbe2,2024-10-11T16:07:50.900000 @@ -265285,7 +265285,7 @@ CVE-2024-9395,0,0,5635514233d9ffee7876b8b2143dfc7636f2a12f95a3e319a76e442d8673b9 CVE-2024-9396,0,0,530fd74976554bcd60385c13cda51e8c090f8d2168af9c130173451c01d15309,2024-10-04T13:51:25.567000 CVE-2024-9397,0,0,eedca49f89627e559465b4c1980d39b3c979416597a1ac9dbc74efac9146189f,2024-10-11T16:07:56.577000 CVE-2024-9398,0,0,bdddf943c112a95674b6a5445a1c9aea85241f45d8a7242f5a5f280afd3f7bd6,2024-10-11T16:08:14.577000 -CVE-2024-9399,0,0,a8306eeaf5f6d420fcd1d35299a7796a21f85097b65705c4ac2794bceab9b67e,2024-10-04T13:51:25.567000 +CVE-2024-9399,0,1,b9505fdff39688649b94796c2d6d1ac95f1703db383c5efda95a86ef3fb2acf9,2024-10-04T13:51:25.567000 CVE-2024-9400,0,0,a07b092a7377838a4bb1e87b4e3b2f09cba515c42895dfa1fbf9dfd7eae19700,2024-10-04T13:51:25.567000 CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f468c,2024-10-04T13:51:25.567000 CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000 @@ -265295,7 +265295,7 @@ CVE-2024-9407,0,0,c86f90b2fe6be22dec486d34b9c6e67b91a5945de93bcc27372041ed6a4268 CVE-2024-9410,0,0,90cffd2b402803b1ff7e6401238cb515c8bb4e7ed816fe3e9a33e1d435f92656,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 -CVE-2024-9417,0,0,3a253693d9f258d17d8c6435732a7f997d65ff8389871880258fe316da3e8053,2024-10-07T17:48:28.117000 +CVE-2024-9417,0,1,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 @@ -265306,33 +265306,33 @@ CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 -CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 -CVE-2024-9457,0,0,2e5f1e076d316abdd9befa1bb632f71036f861a4d1c633e303e5e7de81c7f7b3,2024-10-10T12:51:56.987000 +CVE-2024-9455,0,1,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000 +CVE-2024-9457,0,1,f1ca7d902794ee5a60173296ce79e3c04c5f47406e5613b90759a6469abe7281,2024-10-10T12:51:56.987000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 CVE-2024-9463,0,0,3d816240de9b00dd05613f74725c55702a05acf1893772c4b9bd28e230e084ba,2024-10-10T12:51:56.987000 CVE-2024-9464,0,0,2b54d926b0cd6ec5f6ac2bd88515e583386fc5e04d484fd98bdb41892b6d5e79,2024-10-10T12:51:56.987000 CVE-2024-9465,0,0,cfe5d6ca68cb5acf41db662703e8ec7b064db6a86490ab599bd64dcebc009e79,2024-10-10T12:51:56.987000 CVE-2024-9466,0,0,0579487090fcba10000d94b1f5e22a64bb4642c7ed576e1c7bcc464791ee8c09,2024-10-10T12:51:56.987000 CVE-2024-9467,0,0,03050e15364c5c594270c2e9ba115b3a00821c04109640eeeb50989db1e3de9d,2024-10-10T12:51:56.987000 -CVE-2024-9468,0,0,3a605e83184a40bd8285aed534f24a282040306539a1d55c82841777c5987c41,2024-10-10T12:51:56.987000 +CVE-2024-9468,0,1,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000 CVE-2024-9469,0,0,8bb9a78228eb26b44d146abb8c36e4dccf96e88c6afa5a6a89dd30c8de19d781,2024-10-10T12:51:56.987000 CVE-2024-9470,0,0,6d7d145d5ed6ae4ef4f33928573352f54839c5b9641b899af46f8b3aa4ed69d1,2024-10-10T12:51:56.987000 CVE-2024-9471,0,0,5d0487dbafd6cbb46e2a69b9e8ad8abe4233710e742dfa2d6675320cfdfe3aea,2024-10-10T12:51:56.987000 CVE-2024-9473,0,0,b488f190917a741efff9ce774060e2242f39c1fd009aabbb1ce12625032617b4,2024-10-10T12:51:56.987000 -CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000 -CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c7e,2024-10-04T13:50:43.727000 -CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000 -CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c91,2024-10-04T13:50:43.727000 -CVE-2024-9487,0,0,be00f607ab07459b01c7648dac82f3c2af8f672daa92e4c79a618b3482e9ac23,2024-10-10T22:15:11.357000 +CVE-2024-9481,0,1,dce581617d5cf6edbc62a2fe02f71507870c412f67698e0495feb9e6b8ee0972,2024-10-04T13:50:43.727000 +CVE-2024-9482,0,1,10c3c4a119489ce5d129acd1f72184e55e1f72d2675c976690dcbbc5d407b533,2024-10-04T13:50:43.727000 +CVE-2024-9483,0,1,6a9a1cfe421d679c621a2969a64278be9b39bdca7774e9b4a3235c5640b6357b,2024-10-04T13:50:43.727000 +CVE-2024-9484,0,1,3f1e4bdc376cc95b97b5c0150a8d7b1a17051d92adc32b058eb06edb62f443eb,2024-10-04T13:50:43.727000 +CVE-2024-9487,0,1,beb73b3d8f97bc0f66467815a7110c8dfb30965bcc0c7eab6e8cf6800448a2fa,2024-10-10T22:15:11.357000 CVE-2024-9507,0,0,8206bf7bacd235440b174401074873d20230c205313133d40f97129830221ccb,2024-10-11T13:15:19.160000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000 -CVE-2024-9518,0,0,4a32dfec9f85550debe31d9ad64141f69bc5b7098b3e90d19e2b442fddd1c52c,2024-10-10T12:51:56.987000 -CVE-2024-9519,0,0,06bc737cd8f16b861f6662031cf3ca6afacb22149a4d55be6376ebb4e754bf7e,2024-10-10T12:51:56.987000 -CVE-2024-9520,0,0,56bd22220a43e38a1a043559d21b9ec0fef97ea6b7e33029e2e545b00832357f,2024-10-10T12:51:56.987000 -CVE-2024-9522,0,0,f201013f69195a1c8c1c750c825e6a62e2e00398dbdccc0dccff97a33026ecd1,2024-10-10T12:51:56.987000 -CVE-2024-9528,0,0,d6fcaf4387a113a292c5be1e6315aa1024df0cc79a828aebf7bc2fe429a4bc75,2024-10-07T17:48:28.117000 +CVE-2024-9518,0,1,c04c98e1c389296845654c96319dd47888a97e4071cf9bebcbb4384a72ed870f,2024-10-10T12:51:56.987000 +CVE-2024-9519,0,1,102897136733755cc0c89296258e151926449817fe0601ec50ca82aa60f3787c,2024-10-10T12:51:56.987000 +CVE-2024-9520,0,1,a54e7da3f6e18fe875e3d221631dbbbc73aff452dffc2f32da30c1ef49a8c611,2024-10-10T12:51:56.987000 +CVE-2024-9522,0,1,bb6c8bc6fc12d8991e02349e6c5de8bb079f97462e46c85cb8f73c09cad2b96b,2024-10-10T12:51:56.987000 +CVE-2024-9528,0,1,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 @@ -265346,13 +265346,13 @@ CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422 CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000 CVE-2024-9552,0,0,0089ba0b10cb8d31710138a22fd4a80a1adb8a11c547d7653c5c7c5a85ee8f50,2024-10-09T11:15:32.333000 CVE-2024-9553,0,0,e562e3629a4d3dcbb1c0f68c360778c8b40d2abdc00b7e696f224eb5e09a71e1,2024-10-09T11:15:21.203000 -CVE-2024-9554,0,0,bd84f38adb3ba3dccafe55419a606b89f9861212884b57c128c50c590ca6a91d,2024-10-07T17:47:48.410000 +CVE-2024-9554,0,1,bc0732522a637814be9a419440d03ceba9ede41489feae5c169c0e2001b0baf5,2024-10-07T17:47:48.410000 CVE-2024-9555,0,0,820019e6568fa8e1fec5c7ee3b65cf6dcd66a9a7fbaab4fe3e5e127b82da3bd3,2024-10-08T18:36:39.123000 CVE-2024-9556,0,0,d7e7718ff1d3279981fe751528bd9fa57f0756509343c3e8c8e014bbccbaa988,2024-10-08T18:37:28.077000 CVE-2024-9557,0,0,d536aeb6ade307eac216e2073bbdc832d3dad6c569c06ce328ad0db2f77f601f,2024-10-08T18:37:43.163000 CVE-2024-9558,0,0,ea814241a5182b5b2be49699cc93c3f29036f9642fa033da03ebfd12d4ea99b1,2024-10-08T18:36:56.937000 CVE-2024-9559,0,0,a8c2279a4f580056bcc2cec2925b50092b134be2e98897c23f5fb7bf62817ebc,2024-10-08T18:37:54.077000 -CVE-2024-9560,0,0,0056bdefd3010e0a9bad215581dfc72d3d4d9b4cd699c24407d37866bdb9dcf5,2024-10-07T17:47:48.410000 +CVE-2024-9560,0,1,d4b2f8484e7856cbd8fe6236e1a4c7f31511b9598dc6eaedbb8bfe54a638e698,2024-10-07T17:47:48.410000 CVE-2024-9561,0,0,403c900b97d35cd498344111c33a21bc9d12577a593f804af14851d121659acb,2024-10-08T18:38:08.277000 CVE-2024-9562,0,0,24b8ce3625b9c960baccc39b1342ba09026888a30a22e76df87872d25fdd99e9,2024-10-08T18:38:23.920000 CVE-2024-9563,0,0,d04a15ff94fd263e1592738601aa4f4dbd97de56e0c50134531c3a9014e4a0d6,2024-10-08T18:38:35.537000 @@ -265368,13 +265368,13 @@ CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000 CVE-2024-9575,0,0,f6b14427489147da51632087d3ce5422a9383e0d7bccf4cb35592eda1a1d7d41,2024-10-10T12:51:56.987000 -CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000 -CVE-2024-9581,0,0,dcdedf39f55e8b175c72a20e72a1aed92038e920265594b4fc9925b7183ce1e6,2024-10-10T12:51:56.987000 +CVE-2024-9576,0,1,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000 +CVE-2024-9581,0,1,7e794ddfbd39982571ae3eb7a6ed31de2e39b9b68467940cf54765cbd34b4390,2024-10-10T12:51:56.987000 CVE-2024-9586,0,0,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000 CVE-2024-9587,0,0,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000 CVE-2024-9592,0,0,0f39969df8cdd7221e2f8596842e380d11b968fb83c9650c71ea7d95ce8c2502,2024-10-12T03:15:02.243000 CVE-2024-9595,0,0,038cc18ae435612d58f078c33771272fd0e9d6928588729ef19a0045b7a00bbd,2024-10-12T09:15:03.230000 -CVE-2024-9596,0,0,41f14771e651cbc1c37017cbe5a91040128a2c351e859a7b312163502a24a950,2024-10-10T12:51:56.987000 +CVE-2024-9596,0,1,e9ee6223c4ba2626fe5acdfa0aeb59c3c18c32202e4516b5ff779e917fbff784,2024-10-10T12:51:56.987000 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 CVE-2024-9610,0,0,86e6c47ecc50e652a252993dda4297709b0c2c74d4c2c73b4a97df11b17992ff,2024-10-11T13:15:20.257000 @@ -265383,56 +265383,56 @@ CVE-2024-9616,0,0,427d25c8d45ea418bf8a87056898c397d29d771d358dfd779d3089cf093d9b CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf728,2024-10-10T12:56:30.817000 CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000 CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 -CVE-2024-9623,0,0,05eef687418519373d15ec19a86683cd7648219a76f4b58bf6e516098fb1b885,2024-10-10T12:51:56.987000 +CVE-2024-9623,0,1,3386578fca7f2c1b9b8b4f00f8a9cc0d38eb476692ac8c36aa3c531d95d34930,2024-10-10T12:51:56.987000 CVE-2024-9656,0,0,a26feea40e7851e228d42b73e4b177c0c2083535fb7c5011d1e1dbc8247518bf,2024-10-12T06:15:03.077000 CVE-2024-9670,0,0,467e4a0d60b3ea8b5613919329bb37afd090c0014621c671b410e31a2a2a3636,2024-10-12T06:15:03.347000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000 -CVE-2024-9685,0,0,0533577bd5534b2238dda3fc39c720d3ca57598c0c892e8a746063784dfa2119,2024-10-10T12:51:56.987000 +CVE-2024-9685,0,1,e6c5702d4decca35be66ea71703aa60deb1f2e59d98c7d4ddb3a3f46548916f6,2024-10-10T12:51:56.987000 CVE-2024-9696,0,0,a63df99df1f6813fb55c58d350483f24d63b6efd0cdffde98a71bd76ffa94a8e,2024-10-12T09:15:03.590000 CVE-2024-9704,0,0,eac985eabca9a3c6a15dbb5a4e611613c412ae3dd37df6667fc5aafbc6bc84d5,2024-10-12T07:15:02.570000 CVE-2024-9707,0,0,5022899338c6a36d44072ae7018b6a919d11834b1f5740a300f73a64606c0150,2024-10-11T13:15:21.233000 CVE-2024-9756,0,0,68b121e1aaaab7f10ceb18cbdb5136f7cd438a7e04d1f722b0583aec18b45115,2024-10-12T07:15:02.820000 CVE-2024-9776,0,0,fd96ce126483e0639392cf2b3a5f9adb3f107706002f2ef2a96dfd4212d77df7,2024-10-12T06:15:03.640000 CVE-2024-9778,0,0,70f493b0089ba6ea3e74556b332f92784788d5bac40eef0d2025e5998ec03b8d,2024-10-12T06:15:03.930000 -CVE-2024-9780,0,0,64cb4b42f9787f95c4bcb2f0ffb7a4034eca385e970ac2bedc9fcd69728d3075,2024-10-10T12:51:56.987000 -CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000 -CVE-2024-9782,0,0,f6fdadb6173e6b1d6cefc02344a50956f97519ff0da6213ed752274ca4260d60,2024-10-10T12:51:56.987000 -CVE-2024-9783,0,0,712836b1436318ef30c4c9316757670b95113f358e845fe262e620150796b3c9,2024-10-10T12:51:56.987000 -CVE-2024-9784,0,0,64a6c68ed42050536e19b6453db5b3e132a6112e07a448f7da505723942301c6,2024-10-10T12:51:56.987000 -CVE-2024-9785,0,0,ee184b824fb4d6c43c3629feb69eb05004a7592fad511f98957566ebeb43d5af,2024-10-10T13:15:14.583000 -CVE-2024-9786,0,0,e7875c706b86134a4356de16f7f39d3d03c8ad5b5439952fad2634c3220ea97a,2024-10-10T13:15:14.860000 -CVE-2024-9787,0,0,a419614d20c76506100e7560985e58b193a4ffc80500f031d6c39db1267dc50f,2024-10-10T14:15:06.243000 -CVE-2024-9788,0,0,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98ec3,2024-10-10T14:15:06.537000 -CVE-2024-9789,0,0,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000 -CVE-2024-9790,0,0,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000 -CVE-2024-9792,0,0,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000 -CVE-2024-9793,0,0,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000 -CVE-2024-9794,0,0,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000 -CVE-2024-9796,0,0,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000 -CVE-2024-9797,0,0,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000 +CVE-2024-9780,0,1,25bf552fe0c333aee728201cd43bb68d618a3e48e236e5efa31a0a1b0261438b,2024-10-10T12:51:56.987000 +CVE-2024-9781,0,1,05e99923aaee7e014ef4a84addb9f9dd84cfde4cf7dabf943a828b781dac6231,2024-10-10T12:51:56.987000 +CVE-2024-9782,0,1,a647756d6fcead0657d56793fff80f8144a3adeb5979df9472867cd15d19cd02,2024-10-10T12:51:56.987000 +CVE-2024-9783,0,1,13e7034f9055b0f2c56f936acf9ad88d36eee40b386732a2eb83179a3ce66864,2024-10-10T12:51:56.987000 +CVE-2024-9784,0,1,91e0e46d054da9c3ea59f4b335d0cd5349e4658a9b75e5d0746d094b4b189598,2024-10-10T12:51:56.987000 +CVE-2024-9785,0,1,fd639a2e9bf760f78badc73cd07bc3da9ded552d5924a1da855caffd4c7baf0d,2024-10-10T13:15:14.583000 +CVE-2024-9786,0,1,fc39bdde468573e86a4d3b51599704f3509d6e432d1e6235372e2b5c301c9530,2024-10-10T13:15:14.860000 +CVE-2024-9787,0,1,cedc929ac0efd081e45837503dfdcb22269362674c6e9b69ca78b4cda3cacaf1,2024-10-10T14:15:06.243000 +CVE-2024-9788,0,1,6ab14d4b0fbe0e3d48c7d1b3983dd5487bf6a8072602049b4d3170a57e77c445,2024-10-10T14:15:06.537000 +CVE-2024-9789,0,1,4bf4634ef84c461da1ee08bc086ab48b6ff44b8f16163317f0e6f8fe47a201d9,2024-10-10T14:15:06.803000 +CVE-2024-9790,0,1,ec5bd65fadee5dfd78446f0b19aa81fddfabaab4a1496263ad72bd9134a05000,2024-10-10T15:15:15.457000 +CVE-2024-9792,0,1,b1f8b594309a8e572c809ee6eeae17e743a9d00156d7a90242221bb037d452df,2024-10-10T15:15:15.710000 +CVE-2024-9793,0,1,f4be3eea9df90dd25421bc3b464141cc157f9a6b8230a59d93479f45a4f5dfc6,2024-10-10T16:15:09.080000 +CVE-2024-9794,0,1,ebcc55daf490db589bc9a3ee9a0d04ee59574fbb449c188f7ef7bdc498369468,2024-10-10T16:15:09.350000 +CVE-2024-9796,0,1,899ce363196ddc68e5b47cda88813fdcdfeceffcc5f5079fa63ff41ce27f0d98,2024-10-10T15:35:16.310000 +CVE-2024-9797,0,1,84673663129f30c78d322c8d2b54641e46cf8cfe4c2f447d7a3d68d53d0af307,2024-10-10T17:15:16.063000 CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000 -CVE-2024-9799,0,0,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000 +CVE-2024-9799,0,1,70a07086124572dfb20e37331c344e8aa7308b329d17278a70fdb0307949efd1,2024-10-10T17:15:16.390000 CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000 -CVE-2024-9803,0,0,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000 -CVE-2024-9804,0,0,89f8ea72d25f0eddbb8b5a3baea4833631254612ffe4917b0c6293a590d52dbf,2024-10-10T18:15:09.150000 -CVE-2024-9805,0,0,f93447fea5a871d2a236223dab8ba6d5f2748eefc9e1e41bc80a3cf4d5d96eb7,2024-10-10T18:15:09.440000 -CVE-2024-9806,0,0,fab3cf780899402ed265861f091b2b5c5a2f3a65753dc88a57c329dcdda36189,2024-10-10T19:15:17.520000 -CVE-2024-9807,0,0,f5649b59fd8fb32d2f9e11414708f6df3b7dcdb3d251afc4ade1b8999c66290b,2024-10-10T19:15:17.797000 -CVE-2024-9808,0,0,12dce1f961995399bd84c517f37b8358d32cac0a693ba8205a0898e2643861b1,2024-10-10T20:15:05.003000 -CVE-2024-9809,0,0,5c1e904326cf3ec1c4ea5c0c061b9e3f46651617b12daa009afc36cd55471c31,2024-10-10T20:15:05.267000 -CVE-2024-9810,0,0,58892cd2ee4e7f061b9d9551b82639bd6ae9bb920a782066b01e5e2437d14039,2024-10-10T20:15:05.517000 -CVE-2024-9811,0,0,a363d0269356f2f6a435a37502557c3e13060bda99e1d3b9d7908a22e8f81531,2024-10-10T21:15:05.383000 -CVE-2024-9812,0,0,84a0a4c7476dad7f04cad89cc3da18e12422227f99bd80a54401a1c004280abc,2024-10-10T21:15:05.677000 -CVE-2024-9813,0,0,82e9ce42aed58de2b77887b19ce10ffb81e9a4959555fe4a3cc0c0c017de09fe,2024-10-10T21:15:05.963000 -CVE-2024-9814,0,0,914eadbcb14b3755a1ff05073e839e9ea8592bcea3203beef1a0acaccb769e31,2024-10-10T22:15:11.570000 -CVE-2024-9815,0,0,88a550f6cb92a368ea0bbbf49b20d73379efa44934b30bcb818d49eaa9b3f3f1,2024-10-10T22:15:11.917000 -CVE-2024-9816,0,0,b558749b310662e562a03139cd743ab5e13638cae5288ab2349400fc9e4a8f44,2024-10-10T22:15:12.230000 -CVE-2024-9817,0,0,64961e55de2aecac95e692e2205c7e393510ae0087bb3b78e5af557801c488ea,2024-10-10T23:15:03.410000 -CVE-2024-9818,0,0,4a540b8f9903a9b9420b63ef2490b163dd3b5219ef38e22237dcd7875973e6a1,2024-10-10T23:15:03.680000 +CVE-2024-9803,0,1,3767ab1e5da4ee86ee92ecd5c8c7f6657e2043873230a5cb4282e6c9ae4bf517,2024-10-10T17:15:16.730000 +CVE-2024-9804,0,1,d6defafc916cc20e2469b9c6c441348aa6a83ad8642135554648e89ae98d08a6,2024-10-10T18:15:09.150000 +CVE-2024-9805,0,1,0ef36e4f1e196e798f2ffd9e2d2c646e17b01eda6d5b9761d72d36a5aec93ff2,2024-10-10T18:15:09.440000 +CVE-2024-9806,0,1,efdadd0d0c62aafea2f174c2e98ea7984e83090cc704f9962412f51d57f5f423,2024-10-10T19:15:17.520000 +CVE-2024-9807,0,1,a3342b851be40196413c0d2766c3fb6d4cc91143e5325c1fa5c5daa2bbf000dc,2024-10-10T19:15:17.797000 +CVE-2024-9808,0,1,52f9a7e4754c2578c0deca847d4c374fdc7907c1277957d3d7ccbceb7ae55df4,2024-10-10T20:15:05.003000 +CVE-2024-9809,0,1,81a47f9de766837329f41e1391f223059a07ae7a7adb301f7078822f28c17bda,2024-10-10T20:15:05.267000 +CVE-2024-9810,0,1,0131de762872f04e0c6afb81c7dd4ce48810c97eade123bdbe9cb857683067b9,2024-10-10T20:15:05.517000 +CVE-2024-9811,0,1,98fe842d5a0df6409fc000c20ccaa6448a9e5bbe9018a03a582bf0eb9a2d9b09,2024-10-10T21:15:05.383000 +CVE-2024-9812,0,1,3d7043953b24d84b403fc69f4f128726d4abfe3819f41e63fd8d94798cf39e7b,2024-10-10T21:15:05.677000 +CVE-2024-9813,0,1,2496e1b4e0270910db5140e4e86cea599277054dbb1c6f71b5d8880dd7004cf7,2024-10-10T21:15:05.963000 +CVE-2024-9814,0,1,309499688253f0e12bf6699e7606c8bdd64efc012b09f74f9f74f8472a6839ae,2024-10-10T22:15:11.570000 +CVE-2024-9815,0,1,acdb2eea5487476eecdd8d88a221ef2e739cf1c612e45186b5ced05a7a6264d4,2024-10-10T22:15:11.917000 +CVE-2024-9816,0,1,24f7ee2c16fe348d340e7bcf315ed256344d7d90e5e0b7dcdaddb90504eefe81,2024-10-10T22:15:12.230000 +CVE-2024-9817,0,1,aa4071cf5ce97bf162c1cca4a7f07d25d51157e1698481fe4534c2979d4a7e22,2024-10-10T23:15:03.410000 +CVE-2024-9818,0,1,0b4965dc9157be1c79882236820da1fc50a01232d912ae1b867d598f551f291b,2024-10-10T23:15:03.680000 CVE-2024-9821,0,0,0fe84d15377a57feb9c16456d9d6e98b8f06d72079455451a6924d64eac80b40,2024-10-12T03:15:02.507000 -CVE-2024-9822,0,0,d08d61a8f285dedd6e0156668251bfed17abd9d34a7fc326c5d7b2d904c03ab9,2024-10-11T03:15:10.967000 +CVE-2024-9822,0,1,31c5fa39db5fe31c5cd7802827b5c169adace5e7cdcfe1c09d420a2a1af019c6,2024-10-11T03:15:10.967000 CVE-2024-9824,0,0,1fdcf28970a03200ea0750edfb27b712eac3be59fe088b6edf6f98bda2457c29,2024-10-12T06:15:04.230000 CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000 CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000 @@ -265440,4 +265440,4 @@ CVE-2024-9859,0,0,4c2e27e83d096af209ad8d4a7ba60ec60caaadb1032a58969905b29c3c0c3d CVE-2024-9860,0,0,9c9c6a59ce227b8b9c92f258ea8c8577b19c36b99b060db27cd4697c8991bf8d,2024-10-12T03:15:02.757000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9894,0,0,e4e640fa9b528f08dc5c5d33be8f6b79ae250b3934762a705b5583518e0f59c7,2024-10-12T13:15:13.737000 -CVE-2024-9903,1,1,58f302b12a47dd7ead8fa1f9333271cdf28eca910f8797ea587621aaa127ff01,2024-10-12T23:15:11.027000 +CVE-2024-9903,0,0,58f302b12a47dd7ead8fa1f9333271cdf28eca910f8797ea587621aaa127ff01,2024-10-12T23:15:11.027000