diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json index 4a4bb61b095..36e192b0285 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39327.json @@ -2,13 +2,17 @@ "id": "CVE-2023-39327", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-13T03:15:09.347", - "lastModified": "2024-07-13T03:15:09.347", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenJPEG. Maliciously constructed pictures can cause the program to enter a large loop and continuously print warning messages on the terminal." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en OpenJPEG. Las im\u00e1genes creadas maliciosamente pueden hacer que el programa entre en un bucle grande e imprima continuamente mensajes de advertencia en el terminal." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json index 0067a6575fa..3b04222bf0c 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39329.json @@ -2,13 +2,17 @@ "id": "CVE-2023-39329", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-13T03:15:09.597", - "lastModified": "2024-07-13T03:15:09.597", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenJPEG. A resource exhaustion can occur in the opj_t1_decode_cblks function in tcd.c through a crafted image file, causing a denial of service." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en OpenJPEG. Puede ocurrir un agotamiento de recursos en la funci\u00f3n opj_t1_decode_cblks en tcd.c a trav\u00e9s de un archivo de imagen manipulado, provocando una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41093.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41093.json index c8a531814ee..a5a5a015e23 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41093.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41093.json @@ -2,13 +2,17 @@ "id": "CVE-2023-41093", "sourceIdentifier": "product-security@silabs.com", "published": "2024-07-12T20:15:02.380", - "lastModified": "2024-07-12T20:15:02.380", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use After Free vulnerability in Silicon Labs Bluetooth SDK on 32 bit, ARM may allow an attacker with precise timing capabilities to intercept a small number of packets intended for a recipient that has left the network.This issue affects Silabs Bluetooth SDK: through 8.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Use After Free en el SDK Bluetooth de Silicon Labs en 32 bits, ARM puede permitir que un atacante con capacidades de sincronizaci\u00f3n precisa intercepte una peque\u00f1a cantidad de paquetes destinados a un destinatario que ha abandonado la red. Este problema afecta al SDK Bluetooth de Silabs: hasta 8.0.0." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json index e3b81e06074..4f5a8417169 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41916.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41916", "sourceIdentifier": "security@apache.org", "published": "2024-07-15T08:15:02.107", - "lastModified": "2024-07-15T08:15:02.107", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json index 82be95ae485..c18b5166e7c 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46801.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46801", "sourceIdentifier": "security@apache.org", "published": "2024-07-15T08:15:02.253", - "lastModified": "2024-07-15T08:15:02.253", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49566.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49566.json index f63c603adc7..e8ee9f0327e 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49566.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49566.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49566", "sourceIdentifier": "security@apache.org", "published": "2024-07-15T08:15:02.367", - "lastModified": "2024-07-15T08:15:02.367", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52885.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52885.json index 5f73056dd2f..c10876ba010 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52885.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52885.json @@ -2,13 +2,17 @@ "id": "CVE-2023-52885", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-14T08:15:01.823", - "lastModified": "2024-07-14T08:15:01.823", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix UAF in svc_tcp_listen_data_ready()\n\nAfter the listener svc_sock is freed, and before invoking svc_tcp_accept()\nfor the established child sock, there is a window that the newsock\nretaining a freed listener svc_sock in sk_user_data which cloning from\nparent. In the race window, if data is received on the newsock, we will\nobserve use-after-free report in svc_tcp_listen_data_ready().\n\nReproduce by two tasks:\n\n1. while :; do rpc.nfsd 0 ; rpc.nfsd; done\n2. while :; do echo \"\" | ncat -4 127.0.0.1 2049 ; done\n\nKASAN report:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n Read of size 8 at addr ffff888139d96228 by task nc/102553\n CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18\n Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n Call Trace:\n \n dump_stack_lvl+0x33/0x50\n print_address_description.constprop.0+0x27/0x310\n print_report+0x3e/0x70\n kasan_report+0xae/0xe0\n svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n tcp_data_queue+0x9f4/0x20e0\n tcp_rcv_established+0x666/0x1f60\n tcp_v4_do_rcv+0x51c/0x850\n tcp_v4_rcv+0x23fc/0x2e80\n ip_protocol_deliver_rcu+0x62/0x300\n ip_local_deliver_finish+0x267/0x350\n ip_local_deliver+0x18b/0x2d0\n ip_rcv+0x2fb/0x370\n __netif_receive_skb_one_core+0x166/0x1b0\n process_backlog+0x24c/0x5e0\n __napi_poll+0xa2/0x500\n net_rx_action+0x854/0xc90\n __do_softirq+0x1bb/0x5de\n do_softirq+0xcb/0x100\n \n \n ...\n \n\n Allocated by task 102371:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x7b/0x90\n svc_setup_socket+0x52/0x4f0 [sunrpc]\n svc_addsock+0x20d/0x400 [sunrpc]\n __write_ports_addfd+0x209/0x390 [nfsd]\n write_ports+0x239/0x2c0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n Freed by task 102551:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x50\n __kasan_slab_free+0x106/0x190\n __kmem_cache_free+0x133/0x270\n svc_xprt_free+0x1e2/0x350 [sunrpc]\n svc_xprt_destroy_all+0x25a/0x440 [sunrpc]\n nfsd_put+0x125/0x240 [nfsd]\n nfsd_svc+0x2cb/0x3c0 [nfsd]\n write_threads+0x1ac/0x2a0 [nfsd]\n nfsctl_transaction_write+0xac/0x110 [nfsd]\n vfs_write+0x1c3/0xae0\n ksys_write+0xed/0x1c0\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix the UAF by simply doing nothing in svc_tcp_listen_data_ready()\nif state != TCP_LISTEN, that will avoid dereferencing svsk for all\nchild socket." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: SUNRPC: corrige UAF en svc_tcp_listen_data_ready() Despu\u00e9s de que se libera el oyente svc_sock, y antes de invocar svc_tcp_accept() para el calcet\u00edn secundario establecido, hay una ventana que indica que el newsock retiene un oyente liberado. svc_sock en sk_user_data que clona desde el padre. En la ventana de ejecuci\u00f3n, si se reciben datos en el newsock, observaremos el informe de use-after-free en svc_tcp_listen_data_ready(). Reproducir mediante dos tareas: 1. while:; hacer rpc.nfsd 0; rpc.nfsd; hecho 2. mientras:; hacer eco \"\" | ncat -4 127.0.0.1 2049; Informe KASAN hecho: ================================================= ==================== ERROR: KASAN: slab-use-after-free en svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888139d96228 por tarea nc /102553 CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18 Nombre de hardware: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/11/2020 Seguimiento de llamadas: dump_stack_lvl+ 0x33/0x50 print_address_description.constprop.0+0x27/0x310 print_report+0x3e/0x70 kasan_report+0xae/0xe0 svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc] tcp_data_queue+0x9f4/0x20e0 tcp_rcv_ establecido+0x666/0x1f60 tcp_v4_do_rcv+0x51c/0x850 tcp_v4_rcv+0x23fc/0x2e80 ip_protocol_deliver_rcu+0x62/0x300 ip_local_deliver_finish+0x267/0x350 ip_local_deliver+0x18b/0x2d0 ip_rcv+0x2fb/0x370 __netif_receive_skb_one_core+0x166/0x1b0 Process_backlog+0x24c/0x5e 0 __napi_poll+0xa2/0x500 net_rx_action+0x854/0xc90 __do_softirq+0x1bb/0x5de do_softirq+0xcb/0x100 ... Asignado por la tarea 102371: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 __kasan_kmalloc+0x7b/0x90 svc_setup_socket+0x52/0x4f0 [sunrpc] 0x400 [sunrpc] __write_ports_addfd+0x209/0x390 [nfsd] write_ports+0x239/0x2c0 [nfsd] nfsctl_transaction_write+0xac/0x110 [nfsd] vfs_write+0x1c3/0xae0 ksys_write+0xed/0x1c0 do_syscall_64+0x3 8/0x90 Entry_SYSCALL_64_after_hwframe+0x72/0xdc Liberado por la tarea 102551: kasan_save_stack +0x1e/0x40 kasan_set_track+0x21/0x30 kasan_save_free_info+0x2a/0x50 __kasan_slab_free+0x106/0x190 __kmem_cache_free+0x133/0x270 svc_xprt_free+0x1e2/0x350 [sunrpc] _destroy_all+0x25a/0x440 [sunrpc] nfsd_put+0x125/0x240 [nfsd] nfsd_svc+ 0x2cb/0x3c0 [nfsd] write_threads+0x1ac/0x2a0 [nfsd] nfsctl_transaction_write+0xac/0x110 [nfsd] vfs_write+0x1c3/0xae0 ksys_write+0xed/0x1c0 do_syscall_64+0x38/0x90 entrada_SYSCALL_ 64_after_hwframe+0x72/0xdc Arregle el UAF simplemente sin hacer nada en svc_tcp_listen_data_ready() si state!= TCP_LISTEN, eso evitar\u00e1 desreferenciar svsk para todos los sockets secundarios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json index faad7c520f5..46044e7d672 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21513", "sourceIdentifier": "report@snyk.io", "published": "2024-07-15T05:15:01.857", - "lastModified": "2024-07-15T05:15:01.857", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23794.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23794.json index f55018d912a..70abd8c5ad2 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23794.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23794", "sourceIdentifier": "security@otrs.com", "published": "2024-07-15T08:15:02.470", - "lastModified": "2024-07-15T11:15:02.117", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json index 98e0f004a92..41ecb7344e4 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2870", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.310", - "lastModified": "2024-07-13T06:15:02.310", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento socialdriver-framework de WordPress anterior al 30.04.2024 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json index d8fd384aae8..7c7af2cbb6a 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30213.json @@ -2,13 +2,17 @@ "id": "CVE-2024-30213", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T23:15:09.927", - "lastModified": "2024-07-12T23:15:09.927", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "StoneFly Storage Concentrator (SC and SCVM) before 8.0.4.26 allows remote authenticated users to achieve Command Injection via a Ping URL, leading to remote code execution." + }, + { + "lang": "es", + "value": "StoneFly Storage Concentrator (SC y SCVM) anterior a 8.0.4.26 permite a los usuarios autenticados remotamente lograr la inyecci\u00f3n de comandos a trav\u00e9s de una URL de ping, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json index c0e054c205c..04877d48855 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3026", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.547", - "lastModified": "2024-07-13T06:15:02.547", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.7.8 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "El complemento WordPress Button Plugin MaxButtons de WordPress anterior a 9.7.8 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como el de editor realizar ataques de cross-site scripting" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31947.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31947.json index 03b451d3ef5..d5dbf089183 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31947.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31947.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31947", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T23:15:10.000", - "lastModified": "2024-07-12T23:15:10.000", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "StoneFly Storage Concentrator (SC and SCVM) before 8.0.4.26 allows Directory Traversal by authenticated users. Using a crafted path parameter with the Online Help facility can expose sensitive system information." + }, + { + "lang": "es", + "value": "StoneFly Storage Concentrator (SC y SCVM) anterior a 8.0.4.26 permite el Directory Traversal por parte de usuarios autenticados. El uso de un par\u00e1metro de ruta manipulado con la funci\u00f3n de ayuda en l\u00ednea puede exponer informaci\u00f3n confidencial del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32945.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32945.json index e13a8d8fd8c..29bee9913b7 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32945.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32945", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-07-15T09:15:02.260", - "lastModified": "2024-07-15T09:15:02.260", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json index beb66b5a4af..94819ef6801 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3632", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.617", - "lastModified": "2024-07-13T06:15:02.617", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Smart Image Gallery WordPress plugin before 1.0.19 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento Smart Image Gallery de WordPress anterior a 1.0.19 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json index ca79a919c7d..b47a681c41c 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3710", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.700", - "lastModified": "2024-07-13T06:15:02.700", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Image Photo Gallery Final Tiles Grid WordPress plugin before 3.6.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Image Photo Gallery Final Tiles Grid de WordPress anterior a 3.6.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a la p\u00e1gina, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de Cross-Site Scripting Almacenado. que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json index 86ca06e6479..b62e7c4ef1a 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3751", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.773", - "lastModified": "2024-07-13T06:15:02.773", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Seriously Simple Podcasting WordPress plugin before 3.3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Seriously Simple Podcasting de WordPress anterior a 3.3.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json index df1c9193cc5..268dd0a8682 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3753", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.840", - "lastModified": "2024-07-13T06:15:02.840", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Hostel WordPress anterior a 1.1.5.3 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39728.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39728.json index dce0db29f60..f0ace031d04 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39728.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39728", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T02:15:05.440", - "lastModified": "2024-07-15T02:15:05.440", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39729.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39729.json index 943784bc338..cccb4942fa5 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39729.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39729", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T03:15:02.043", - "lastModified": "2024-07-15T03:15:02.043", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39731.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39731.json index 5366c8fee5e..a629604bf65 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39731.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39731", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T02:15:05.670", - "lastModified": "2024-07-15T02:15:05.670", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39732.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39732.json index b9770b597fe..60ee333307c 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39732.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39732.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39732", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-14T13:15:20.433", - "lastModified": "2024-07-14T13:15:20.433", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 temporarily stores data from different environments that could be obtained by a malicious user. IBM X-Force ID: 295791." + }, + { + "lang": "es", + "value": "IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8 y 9.1.9 almacena temporalmente datos de diferentes entornos que podr\u00eda obtener un usuario malintencionado. ID de IBM X-Force: 295791." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json index 0da423954c7..f83c574a8e2 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39733", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-14T13:15:21.490", - "lastModified": "2024-07-14T13:15:21.490", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 295972." + }, + { + "lang": "es", + "value": "IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8 y 9.1.9 almacena las credenciales de usuario en texto plano que puede ser le\u00eddo por un usuario local. ID de IBM X-Force: 295972." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39734.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39734.json index 9e6abc0f488..a90d9b5ab38 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39734.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39734.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39734", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-14T13:15:21.860", - "lastModified": "2024-07-14T13:15:21.860", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8, and 9.1.9 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 296001." + }, + { + "lang": "es", + "value": "IBM Datacap Navigator 9.1.5, 9.1.6, 9.1.7, 9.1.8 y 9.1.9 no establece el atributo seguro en se\u00f1ales de autorizaci\u00f3n o cookies de sesi\u00f3n. Los atacantes pueden obtener los valores de las cookies enviando un enlace http:// a un usuario o colocando este enlace en un sitio al que accede el usuario. La cookie se enviar\u00e1 al enlace inseguro y el atacante podr\u00e1 obtener el valor de la cookie espiando el tr\u00e1fico. ID de IBM X-Force: 296001." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39735.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39735.json index 10de0506eea..1acde830854 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39735.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39735", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T03:15:02.307", - "lastModified": "2024-07-15T03:15:02.307", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39736.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39736.json index 08b42b50645..75fb3d425fb 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39736.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39736", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T02:15:05.947", - "lastModified": "2024-07-15T02:15:05.947", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39737.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39737.json index cdcdd6591cf..f3cca5eba0b 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39737.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39737", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T02:15:06.173", - "lastModified": "2024-07-15T02:15:06.173", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39739.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39739.json index 562463d1939..efaa0cb9cb4 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39739.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39739", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T02:15:06.417", - "lastModified": "2024-07-15T02:15:06.417", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39740.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39740.json index f83a988ac88..b60086e1ea2 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39740.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39740", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T03:15:02.557", - "lastModified": "2024-07-15T03:15:02.557", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39741.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39741.json index 5a7f0cd8d4e..04f7ecd67e0 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39741.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39741", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-15T03:15:02.793", - "lastModified": "2024-07-15T03:15:02.793", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39767.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39767.json index ea17c00ac56..905a1eef608 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39767.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39767", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-07-15T09:15:02.573", - "lastModified": "2024-07-15T09:15:02.573", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json index 85a8411eecb..685c5cf8d24 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3919", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.900", - "lastModified": "2024-07-13T06:15:02.900", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OpenPGP Form Encryption for WordPress plugin before 1.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." + }, + { + "lang": "es", + "value": "El complemento OpenPGP Form Encryption para WordPress anterior a 1.5.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross-Site Scripting Almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json index 2fad10d6e57..9153f445905 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3963", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:02.967", - "lastModified": "2024-07-13T06:15:02.967", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Giveaways and Contests by RafflePress WordPress plugin before 1.12.14 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "El complemento Giveaways and Contests by RafflePress de WordPress anterior a la versi\u00f3n 1.12.14 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con una funci\u00f3n tan baja como la de editor realizar ataques de cross-site scripting" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json index 2cc23af6e8e..a2ada07f14e 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3964", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.030", - "lastModified": "2024-07-13T06:15:03.030", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Product Enquiry for WooCommerce WordPress plugin before 3.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Product Inquiry for WooCommerce WordPress anterior a 3.1.8 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41007.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41007.json index 84ac9ec05aa..890bd0bde07 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41007.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41007", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-15T09:15:02.803", - "lastModified": "2024-07-15T09:15:02.803", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json index c1f1ad86dc2..07f9f816f0c 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4217", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.097", - "lastModified": "2024-07-13T06:15:03.097", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The shortcodes-ultimate-pro WordPress plugin before 7.1.5 does not properly escape some of its shortcodes' settings, making it possible for attackers with a Contributor account to conduct Stored XSS attacks." + }, + { + "lang": "es", + "value": "El complemento shortcodes-ultimate-pro de WordPress anterior a 7.1.5 no escapa adecuadamente a algunas de las configuraciones de sus c\u00f3digos cortos, lo que hace posible que los atacantes con una cuenta de Contributor realicen ataques XSS almacenados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json index 797d22cafef..87fda1d986d 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4269", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.170", - "lastModified": "2024-07-13T06:15:03.170", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SVG Block WordPress plugin before 1.1.20 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks." + }, + { + "lang": "es", + "value": "El complemento SVG Block WordPress anterior a la versi\u00f3n 1.1.20 no sanitiza el contenido del archivo SVG, lo que permite a los usuarios con al menos el rol de autor de SVG con JavaScript malicioso realizar ataques XSS almacenados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json index 3a968ea22ef..aec2642a0bb 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4272", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.230", - "lastModified": "2024-07-13T06:15:03.230", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Support SVG WordPress plugin before 1.1.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks." + }, + { + "lang": "es", + "value": "El complemento Support SVG WordPress anterior a 1.1.0 no sanitiza el contenido del archivo SVG, lo que permite a los usuarios con al menos el rol de autor de SVG con JavaScript malicioso realizar ataques XSS almacenados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json index 7373cce3fcf..93cbed3a889 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4602", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.297", - "lastModified": "2024-07-13T06:15:03.297", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Embed Peertube Playlist de WordPress anterior a 1.10 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json index 5fab8690ba9..421eb055574 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4752", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.370", - "lastModified": "2024-07-13T06:15:03.370", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The EventON WordPress plugin before 2.2.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento EventON WordPress anterior a 2.2.15 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json index 44b305ab437..c95f42a7f52 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4977", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.440", - "lastModified": "2024-07-13T06:15:03.440", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Index WP MySQL For Speed WordPress plugin before 1.4.18 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Index WP MySQL For Speed WordPress anterior a 1.4.18 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json index 85ef08fc601..92e29a0c7bf 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5002", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.500", - "lastModified": "2024-07-13T06:15:03.500", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Submitted Posts WordPress plugin before 20240516 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento User Submitted Posts de WordPress anterior a 20240516 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json index fa2e315c534..f6c14e55d8a 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5028", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.563", - "lastModified": "2024-07-13T06:15:03.563", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CM WordPress Search And Replace Plugin WordPress plugin before 1.3.9 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + }, + { + "lang": "es", + "value": "El complemento CM WordPress Search And Replace de WordPress anterior a 1.3.9 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json index 5e50fb49975..1bbc24f0de6 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5032", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.633", - "lastModified": "2024-07-13T06:15:03.633", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SULly WordPress plugin before 4.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento SULly WordPress anterior a 4.3.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json index 044887abfa9..27a37dbf775 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5033", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.707", - "lastModified": "2024-07-13T06:15:03.707", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SULly WordPress plugin before 4.3.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento SULly WordPress anterior a 4.3.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payloads XSS Almacenado a trav\u00e9s de un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json index 556bfa3f1f9..0740d640975 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5034", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.780", - "lastModified": "2024-07-13T06:15:03.780", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SULly WordPress plugin before 4.3.1 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + }, + { + "lang": "es", + "value": "El complemento SULly WordPress anterior a 4.3.1 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json index d133065a248..83538f8a902 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5074", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.840", - "lastModified": "2024-07-13T06:15:03.840", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json index 685e72dcca4..aeba8522bf5 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5075", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.910", - "lastModified": "2024-07-13T06:15:03.910", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json index f491f9d92b8..0a97e6d0db6 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5076", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:03.970", - "lastModified": "2024-07-13T06:15:03.970", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + }, + { + "lang": "es", + "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json index c65e1c3c36a..03926723171 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5077", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.033", - "lastModified": "2024-07-13T06:15:04.033", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payloads XSS Almacenado a trav\u00e9s de un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json index 0c711abdab3..b51ae3732b0 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5079", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.097", - "lastModified": "2024-07-13T06:15:04.097", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape some of the fields when members register, which allows unauthenticated users to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "El complemento wp-eMember de WordPress anterior a 10.6.7 no sanitiza ni escapa de algunos de los campos cuando los miembros se registran, lo que permite a usuarios no autenticados realizar ataques de Cross-Site Scripting Almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json index 30f02236df8..941fb9f5475 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5080", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.163", - "lastModified": "2024-07-13T06:15:04.163", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.6 does not validate files to be uploaded, which could allow admins to upload arbitrary files such as PHP on the server" + }, + { + "lang": "es", + "value": "El complemento wp-eMember de WordPress anterior a 10.6.6 no valida los archivos que se cargar\u00e1n, lo que podr\u00eda permitir a los administradores cargar archivos arbitrarios como PHP en el servidor." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json index cbc1a69d415..b181e04922a 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5151", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.237", - "lastModified": "2024-07-13T06:15:04.237", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SULly WordPress plugin before 4.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento SULly WordPress anterior a 4.3.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json index a6323dcf3d4..71278874abe 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5167", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.303", - "lastModified": "2024-07-13T06:15:04.303", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento CM Email Registration Blacklist y Whitelist de WordPress anterior a 1.4.9 no tiene verificaci\u00f3n CSRF al agregar o eliminar un elemento de la lista negra o blanca, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n agregue o elimine configuraciones de la lista negra o del men\u00fa de la lista blanca a trav\u00e9s de un ataque CSRF" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json index 916bf73ba58..aec8d09842b 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5280", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.360", - "lastModified": "2024-07-13T06:15:04.360", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make non-logged in users execute an XSS payload via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que no han iniciado sesi\u00f3n ejecuten un payload XSS a trav\u00e9s de un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json index c61b79b075a..e646bd88c9c 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5281", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.430", - "lastModified": "2024-07-13T06:15:04.430", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json index 57bd4b1a285..d2ff69ddb2d 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5282", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.490", - "lastModified": "2024-07-13T06:15:04.490", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json index 153fb54612e..ee6976433e2 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5283", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.553", - "lastModified": "2024-07-13T06:15:04.553", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json index 5dd645249e9..f3091e86aaa 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5284", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.617", - "lastModified": "2024-07-13T06:15:04.617", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS Almacenado a trav\u00e9s de un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json index 73733c1001d..b3ae7b30a93 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5286", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.700", - "lastModified": "2024-07-13T06:15:04.700", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json index 5e4f0f0e4a5..91cc5e1ba1f 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5287", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.780", - "lastModified": "2024-07-13T06:15:04.780", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in user change them via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un usuario que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5402.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5402.json new file mode 100644 index 00000000000..b245862ca41 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5402.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-5402", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2024-07-15T12:15:02.340", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unquoted Search Path or Element vulnerability in ABB Mint Workbench.\n\n\n\nA local attacker who successfully exploited this vulnerability could gain elevated privileges by inserting an executable file in the path of the affected service.\n\n\nThis issue affects Mint Workbench I versions: from 5866 before 5868." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:L/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7912&LanguageCode=en&DocumentPartId=1&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json index 1093e8c29b5..0eff6374f00 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5441.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5441", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T06:15:02.710", - "lastModified": "2024-07-09T18:19:14.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-15T13:39:20.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,56 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webnus:modern_events_calendar:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.12.0", + "matchCriteriaId": "191305A7-4F88-454B-A028-94A4B556FF06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.5.6", + "matchCriteriaId": "0063DAEA-0705-460D-97F5-E896290E08F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://webnus.net/modern-events-calendar/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c007090-9d9b-4ee7-8f77-91abd4373051?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json index 79611f0a524..84575e1d4f1 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5442", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.847", - "lastModified": "2024-07-13T06:15:04.847", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Photo Gallery, Sliders, Proofing y WordPress anterior a 3.59.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json index f892a118ee3..c13feeecc92 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5444", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.830", - "lastModified": "2024-07-12T16:12:04.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-15T13:41:20.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bible_text_project:bible_text:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.2", + "matchCriteriaId": "07BE072F-846A-49D1-ABAE-D72BA59AEB87" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/21eddf64-c71e-4aba-b1e9-fe67b4ddfb30/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json index 0f7f9051ef7..5b45c571f59 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5450", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:04.927", - "lastModified": "2024-07-13T06:15:04.927", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bug Library WordPress plugin before 2.1.1 does not check the file type on user-submitted bug reports, allowing an unauthenticated user to upload PHP files" + }, + { + "lang": "es", + "value": "El complemento Bug Library de WordPress anterior a 2.1.1 no verifica el tipo de archivo en los informes de errores enviados por los usuarios, lo que permite a un usuario no autenticado cargar archivos PHP." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json index 753672733a2..66f822691ed 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5472", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.000", - "lastModified": "2024-07-13T06:15:05.000", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP QuickLaTeX WordPress plugin before 3.8.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento WP QuickLaTeX WordPress anterior a 3.8.7 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json index cad21343868..6dbc31096ff 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5575", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.070", - "lastModified": "2024-07-13T06:15:05.070", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ditty WordPress plugin before 3.1.43 does not sanitise and escape some of its blocks' settings, which could allow high privilege users such as authors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + }, + { + "lang": "es", + "value": "El complemento Ditty WordPress anterior a la versi\u00f3n 3.1.43 no sanitiza ni escapa a algunas de las configuraciones de sus bloques, lo que podr\u00eda permitir a usuarios con altos privilegios, como autores, realizar ataques de cross-site scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json index 43d634dea96..cfaff1de90d 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5627", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.170", - "lastModified": "2024-07-13T06:15:05.170", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some parameters, which could allow users with a role as low as subscriber to perform Cross-Site Scripting attacks." + }, + { + "lang": "es", + "value": "El complemento Tournamatch de WordPress anterior a 4.6.1 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como el de suscriptor realizar ataques de cross-site scripting." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json index ca46fe29957..1a46b385ecc 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5630.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5630", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:01.827", - "lastModified": "2024-07-15T06:15:01.827", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Insert or Embed Articulate Content into WordPress plugin before 4.3000000024 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites." + }, + { + "lang": "es", + "value": "El complemento Insert or Embed Articulate Content into de WordPress anterior a 4.3000000024 no impide que los autores carguen archivos arbitrarios al sitio, lo que puede permitirles cargar shells PHP en los sitios afectados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json index 8392bb2233f..64e3b1136f7 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5644", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.243", - "lastModified": "2024-07-13T06:15:05.243", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Tournamatch de WordPress anterior a 4.6.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json index 139cf73f44c..b1a3c87c54f 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5713", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.313", - "lastModified": "2024-07-13T06:15:05.313", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers" + }, + { + "lang": "es", + "value": "El complemento If-So Dynamic Content Personalization de WordPress anterior a 1.8.0.4 no escapa del par\u00e1metro $_SERVER['REQUEST_URI'] antes de devolverlo en un atributo, lo que podr\u00eda generar cross-site scripting reflejado en navegadores web antiguos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json index 870a7884239..27a9cd9a41e 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5715", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.393", - "lastModified": "2024-07-13T06:15:05.393", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento de WordPress wp-eMember anterior a 10.6.7 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json index 3fd06e8f596..5086c92047f 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5744", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.457", - "lastModified": "2024-07-13T06:15:05.457", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-eMember WordPress plugin before 10.6.7 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers" + }, + { + "lang": "es", + "value": "El complemento wp-eMember anterior de WordPress a 10.6.7 no escapa del par\u00e1metro $_SERVER['REQUEST_URI'] antes de devolverlo en un atributo, lo que podr\u00eda generar cross-site scripting reflejado en navegadores web antiguos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5902.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5902.json index 7e0eedbf0d2..5372c91301f 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5902.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5902.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5902", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-12T22:15:02.437", - "lastModified": "2024-07-12T22:15:02.437", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name parameter in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in feedback form responses that will execute whenever a high-privileged user tries to view them." + }, + { + "lang": "es", + "value": "El complemento User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro de nombre en todas las versiones hasta la 1.0.15 incluida debido a una sanitizaci\u00f3n de entrada y salida de escape insuficiente. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en respuestas de formularios de comentarios que se ejecutar\u00e1n cada vez que un usuario con altos privilegios intente verlos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json index 6c9175b03ff..6ae7e66c4eb 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6070", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-13T06:15:05.520", - "lastModified": "2024-07-13T06:15:05.520", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento If-So Dynamic Content Personalization de WordPress anterior a 1.8.0.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6072.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6072.json index 5952bf06974..4edf057b9b2 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6072.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6072.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6072", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:02.007", - "lastModified": "2024-07-15T06:15:02.007", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers" + }, + { + "lang": "es", + "value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.5 no escapa del par\u00e1metro $_SERVER['REQUEST_URI'] antes de devolverlo en un atributo, lo que podr\u00eda generar cross-site scripting reflejado en navegadores web antiguos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6073.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6073.json index 2a3fd9e78f3..0c1d6c566e3 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6073.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6073.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6073", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:02.090", - "lastModified": "2024-07-15T06:15:02.090", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.5 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6074.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6074.json index 6487ec989e6..c8bd76d1ecd 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6074.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6074.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6074", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:02.170", - "lastModified": "2024-07-15T06:15:02.170", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.5 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6075.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6075.json index aa775fb41f2..8bf60051ffb 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6075.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6075.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6075", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:02.260", - "lastModified": "2024-07-15T06:15:02.260", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + }, + { + "lang": "es", + "value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.5 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6076.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6076.json index d00af006735..d1a86c78533 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6076.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6076", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:02.340", - "lastModified": "2024-07-15T06:15:02.340", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.5 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6289.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6289.json index 3c41a2c47e8..a141482c42a 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6289.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6289.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6289", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-15T06:15:02.413", - "lastModified": "2024-07-15T06:15:02.413", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPS Hide Login WordPress plugin before 1.9.16.4 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page." + }, + { + "lang": "es", + "value": "El complemento WPS Hide Login WordPress anterior a 1.9.16.4 no impide las redirecciones a la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s de la funci\u00f3n auth_redirect de WordPress, lo que permite que un visitante no autenticado acceda a la p\u00e1gina de inicio de sesi\u00f3n oculta." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6345.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6345.json index b78bd006021..68b72f919e0 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6345.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6345", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-15T01:15:01.730", - "lastModified": "2024-07-15T01:15:01.730", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6398.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6398.json index 55455a1ca3b..f6cc796709b 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6398.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6398", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-07-15T09:15:02.870", - "lastModified": "2024-07-15T09:15:02.870", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6465.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6465.json index 698cd9d3c5a..b0a95423373 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6465.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6465.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6465", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-13T12:15:10.797", - "lastModified": "2024-07-13T12:15:10.797", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Links Page plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wplf_ajax_update_screenshots' function in all versions up to, and including, 4.9.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to regenerate the link's thumbnail image." + }, + { + "lang": "es", + "value": "El complemento WP Links Page para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wplf_ajax_update_screenshots' en todas las versiones hasta la 4.9.5 incluida. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, regeneren la imagen en miniatura del enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6540.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6540.json index 06adc2024aa..a8822d8a820 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6540.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6540", "sourceIdentifier": "security@otrs.com", "published": "2024-07-15T08:15:02.743", - "lastModified": "2024-07-15T11:15:02.370", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json index 4c174058712..beb4f104cb0 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6574", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-13T06:15:05.587", - "lastModified": "2024-07-13T06:15:05.587", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Laposta plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.12. This is due to the plugin not preventing direct access to several test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. This plugin is no longer being maintained and has been closed for downloads." + }, + { + "lang": "es", + "value": "El complemento Laposta para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 1.12 incluida. Esto se debe a que el complemento no impide el acceso directo a varios archivos de prueba. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado. Este complemento ya no recibe mantenimiento y se ha cerrado para descargas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6721.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6721.json new file mode 100644 index 00000000000..bbad02ebe9a --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6721.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-6721", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-15T13:15:02.467", + "lastModified": "2024-07-15T13:15:02.467", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Duplicate" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json index 41ce5d744a2..73d2a7b8860 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6728.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6728", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T01:15:01.940", - "lastModified": "2024-07-14T01:15:01.940", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file typeedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271401 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Tailoring Management System 1.0. Ha sido clasificada como cr\u00edtica. Una parte desconocida del archivo typeedit.php afecta a esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-271401." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json index b65c7e7dcaa..2338191feae 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6729.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6729", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T02:15:02.117", - "lastModified": "2024-07-14T02:15:02.117", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /control/add_act.php. The manipulation of the argument aname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-271402 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Kortex Lite Advocate Office Management System 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /control/add_act.php. La manipulaci\u00f3n del argumento aname conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-271402 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6730.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6730.json index 211c608b7bc..5244c4e136c 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6730.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6730.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6730", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T02:15:03.420", - "lastModified": "2024-07-14T02:15:03.420", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Nanjing Xingyuantu Technology SparkShop up to 1.1.6. It has been rated as critical. This issue affects some unknown processing of the file /api/Common/uploadFile. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271403." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Nanjing Xingyuantu Technology SparkShop hasta 1.1.6. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /api/Common/uploadFile. La manipulaci\u00f3n del archivo de argumentos conduce a una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-271403." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6731.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6731.json index f3d18f36134..9d14e175789 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6731.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6731", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T22:15:02.937", - "lastModified": "2024-07-14T22:15:02.937", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6732.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6732.json index f921a0b60b8..11ac0841cc3 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6732.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6732", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T23:15:01.973", - "lastModified": "2024-07-14T23:15:01.973", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6733.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6733.json index b163d9d16ce..3a37410bccb 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6733.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6733", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-14T23:15:02.290", - "lastModified": "2024-07-14T23:15:02.290", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6734.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6734.json index c66f70b155a..e41e59839ac 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6734.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6734", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-15T00:15:01.913", - "lastModified": "2024-07-15T00:15:01.913", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6735.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6735.json index 0df765790d5..2e88bf6ae1d 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6735.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6735", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-15T00:15:02.207", - "lastModified": "2024-07-15T00:15:02.207", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json index b78eb22f666..f9637b9de1d 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6736", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-15T01:15:02.003", - "lastModified": "2024-07-15T01:15:02.003", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6737.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6737.json index 52bb8dd335c..6c451c73508 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6737.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6737", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T03:15:03.027", - "lastModified": "2024-07-15T03:15:03.027", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6738.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6738.json index 5d7d3d36fdc..1eab5acf961 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6738.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6738", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T03:15:03.293", - "lastModified": "2024-07-15T03:15:03.293", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6739.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6739.json index 5bcd6b6e19b..e42b83b8874 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6739.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6739", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T04:15:02.073", - "lastModified": "2024-07-15T04:15:02.073", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6740.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6740.json index 6f7288e849f..073f9ebcdcb 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6740.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6740", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T08:15:03.087", - "lastModified": "2024-07-15T08:15:03.087", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6741.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6741.json index d3549cca7a3..30f96ec23dd 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6741.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6741", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T09:15:03.117", - "lastModified": "2024-07-15T09:15:03.117", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6742.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6742.json index 8d3d42a099a..55d34a53967 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6742.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6742.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6742", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T06:15:02.497", - "lastModified": "2024-07-15T06:15:02.497", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AguardNet Technology's Space Management System does not properly filter user input, allowing remote attackers with regular privileges to inject JavaScript and perform Reflected Cross-site scripting attacks." + }, + { + "lang": "es", + "value": "El sistema de gesti\u00f3n de espacio de la tecnolog\u00eda AguardNet no filtra adecuadamente la entrada del usuario, lo que permite a atacantes remotos con privilegios regulares inyectar JavaScript y realizar ataques de Cross-Site Scripting Reflejado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6743.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6743.json index 441e5993d6f..1266bc79c53 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6743.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6743", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T07:15:25.310", - "lastModified": "2024-07-15T07:15:25.310", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6744.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6744.json index 887c32164bf..b86f5b48591 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6744.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6744", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-07-15T07:15:25.573", - "lastModified": "2024-07-15T07:15:25.573", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6745.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6745.json index a15f588c916..9b2449be346 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6745.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6745", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-15T11:15:02.450", - "lastModified": "2024-07-15T11:15:02.450", - "vulnStatus": "Received", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6746.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6746.json new file mode 100644 index 00000000000..6bed42d8ce8 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6746.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-6746", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-07-15T12:15:02.707", + "lastModified": "2024-07-15T13:00:34.853", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue \"because the default is that the software runs locally without going through the Internet\"." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-24" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NaiboWang/EasySpider/issues/466", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.271477", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.271477", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.371998", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9674212db5f..be7994cf636 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-15T12:00:18.236054+00:00 +2024-07-15T14:00:18.334586+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-15T11:15:02.450000+00:00 +2024-07-15T13:41:20.447000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257025 +257028 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `3` -- [CVE-2024-6745](CVE-2024/CVE-2024-67xx/CVE-2024-6745.json) (`2024-07-15T11:15:02.450`) +- [CVE-2024-5402](CVE-2024/CVE-2024-54xx/CVE-2024-5402.json) (`2024-07-15T12:15:02.340`) +- [CVE-2024-6721](CVE-2024/CVE-2024-67xx/CVE-2024-6721.json) (`2024-07-15T13:15:02.467`) +- [CVE-2024-6746](CVE-2024/CVE-2024-67xx/CVE-2024-6746.json) (`2024-07-15T12:15:02.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `104` -- [CVE-2024-23794](CVE-2024/CVE-2024-237xx/CVE-2024-23794.json) (`2024-07-15T11:15:02.117`) -- [CVE-2024-6540](CVE-2024/CVE-2024-65xx/CVE-2024-6540.json) (`2024-07-15T11:15:02.370`) +- [CVE-2024-6076](CVE-2024/CVE-2024-60xx/CVE-2024-6076.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6289](CVE-2024/CVE-2024-62xx/CVE-2024-6289.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6345](CVE-2024/CVE-2024-63xx/CVE-2024-6345.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6398](CVE-2024/CVE-2024-63xx/CVE-2024-6398.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6465](CVE-2024/CVE-2024-64xx/CVE-2024-6465.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6540](CVE-2024/CVE-2024-65xx/CVE-2024-6540.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6574](CVE-2024/CVE-2024-65xx/CVE-2024-6574.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6728](CVE-2024/CVE-2024-67xx/CVE-2024-6728.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6730](CVE-2024/CVE-2024-67xx/CVE-2024-6730.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6731](CVE-2024/CVE-2024-67xx/CVE-2024-6731.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6732](CVE-2024/CVE-2024-67xx/CVE-2024-6732.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6733](CVE-2024/CVE-2024-67xx/CVE-2024-6733.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6734](CVE-2024/CVE-2024-67xx/CVE-2024-6734.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6735](CVE-2024/CVE-2024-67xx/CVE-2024-6735.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6736](CVE-2024/CVE-2024-67xx/CVE-2024-6736.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6737](CVE-2024/CVE-2024-67xx/CVE-2024-6737.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6738](CVE-2024/CVE-2024-67xx/CVE-2024-6738.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6739](CVE-2024/CVE-2024-67xx/CVE-2024-6739.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6740](CVE-2024/CVE-2024-67xx/CVE-2024-6740.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6741](CVE-2024/CVE-2024-67xx/CVE-2024-6741.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6742](CVE-2024/CVE-2024-67xx/CVE-2024-6742.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6743](CVE-2024/CVE-2024-67xx/CVE-2024-6743.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6744](CVE-2024/CVE-2024-67xx/CVE-2024-6744.json) (`2024-07-15T13:00:34.853`) +- [CVE-2024-6745](CVE-2024/CVE-2024-67xx/CVE-2024-6745.json) (`2024-07-15T13:00:34.853`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9c40d3c2073..791f12a5b3b 100644 --- a/_state.csv +++ b/_state.csv @@ -229320,9 +229320,9 @@ CVE-2023-39323,0,0,7ae48940c5a8a1431db64af17a92a2bbe9c3e76c8aeccf82838c121abcf5c CVE-2023-39324,0,0,6ec2f79fc00f25fb9c6c7b8459112c051220341ced94e2f114cadb7ed5dacee0,2024-07-02T17:15:04.737000 CVE-2023-39325,0,0,785f0ee5445d2319094ac085ef1a18f86e938f9dfbf12cf5d8ec2af0282e5e30,2024-04-28T04:15:09.877000 CVE-2023-39326,0,0,e1a9611981dd83e07637d4dbde17c44d3de7222486174bb7560d2d0a1ac7e64c,2024-01-20T04:15:07.890000 -CVE-2023-39327,0,0,29d3f00941834ca86a70f55073ea3ba2373a6280635f30c2062f26a3d3b33c84,2024-07-13T03:15:09.347000 +CVE-2023-39327,0,1,895d2806c20991425b86249c7f90eaa9aa655c441aeb282c14c2fca6f2ea6f0f,2024-07-15T13:00:34.853000 CVE-2023-39328,0,0,68639298d126bcdce9a727148fd3f98646b65cbbafe77e1574e06e48594ca4b8,2024-07-09T18:19:14.047000 -CVE-2023-39329,0,0,7b89aa566b14387890cd3786a1d72d46f6786a4e00abb5c5bf8e9e49dab43a3f,2024-07-13T03:15:09.597000 +CVE-2023-39329,0,1,2e6ec28c106c0d41632f963bffc8abc1a0bced3a1e5cb0370e851b21b591dc5b,2024-07-15T13:00:34.853000 CVE-2023-3933,0,0,fd05fb2b687b880ce3ff695aa73fe42db295a332bee8b3e8fcbec1c8e7b0fcf3,2023-11-07T04:20:00.337000 CVE-2023-39331,0,0,02e0e1777d37caa02d2e32057898fb63511ee952aee19eced37ec4fc0e898e8a,2024-06-18T15:09:45.857000 CVE-2023-39332,0,0,76475ddfcfc452a138e1e0d4562b5d86f4dae11801e2d070da4b6af1f66855fd,2023-11-17T19:08:58.170000 @@ -230695,7 +230695,7 @@ CVE-2023-4109,0,0,8baa8250e57f9070f1588ee57a6aaa5e217a410144b639ec04878717d28bc6 CVE-2023-41090,0,0,4d5c0fd4d0575727f0bf2946f5c84c3a5bcfcb1a4c5d3adb384d0b3490f6aa8a,2024-02-14T15:01:46.050000 CVE-2023-41091,0,0,ca1acbfbb48698a0030abb208f0760a15256e3fda004078e03e1a216b077f0fa,2024-02-14T15:01:46.050000 CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000 -CVE-2023-41093,0,0,6650a34af2e1a97e30fa22381d74ecebae39146d0247e58dcc185c62904af144,2024-07-12T20:15:02.380000 +CVE-2023-41093,0,1,d92e4d99f23f942350b8dc1249513c7c19b532327e6403def65a885ee4ea3bdb,2024-07-15T13:00:34.853000 CVE-2023-41094,0,0,e795efab240a0805dca0faef22ec12891be19fc709d62de570a11cabba7cc9f8,2023-10-10T19:40:06.293000 CVE-2023-41095,0,0,deee64e9e520cbd28974f4c3c1b7d02b2c55b60ea677ddead3af0482dd0a784b,2023-11-07T20:35:26.983000 CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000 @@ -231320,7 +231320,7 @@ CVE-2023-41911,0,0,1df46f79cf9bc1d38990c3b683fc4a31a6be0aa50e00a3e29284d196b7798 CVE-2023-41913,0,0,4e4ec4a40ab37bee35ec8566ffb4ccbc79ee3c6ee1ba27569c1cf36bb11484e7,2024-06-11T04:15:10.863000 CVE-2023-41914,0,0,bd5a30d29435cc94b4493eb5f3b22b218475b94159794a3b96127ea337706fe7,2023-11-09T22:11:29.870000 CVE-2023-41915,0,0,eb4af7dc255b20820c2223dbb394a71a5ac4fe4f18ba74d3375c99078da8c66c,2024-07-11T14:15:12.997000 -CVE-2023-41916,0,0,55f61da920036ed70fdc1dcde68552b45e858408a26095d2aee18999f708b682,2024-07-15T08:15:02.107000 +CVE-2023-41916,0,1,b248f51c4e1db584d7fd40d43ab0d9562ade6d72e0603f248b9147b1c662091c,2024-07-15T13:00:34.853000 CVE-2023-41917,0,0,f3161e8d6c620e45be8c901747b972f5e1c375ee92e6d63bc7e00bef339a5387,2024-07-02T12:09:16.907000 CVE-2023-41918,0,0,0856e5fa41285db5b029ff0214e8d51ede0087304c24a711546183f0175c9d9e,2024-07-02T12:09:16.907000 CVE-2023-41919,0,0,6807d33f550dbbb2d90b8f4fce9a8f7ee1053b0fb9f312837bd90277e545973a,2024-07-02T12:09:16.907000 @@ -234640,7 +234640,7 @@ CVE-2023-46798,0,0,e6def47390ad0cca62c048a4ac18fd46e071329d2995b648bb5bf2f8420e9 CVE-2023-46799,0,0,4361c68cf7b923562592dd8fdbdffd552913294117946ddb972d4a241348b466,2024-01-02T22:15:08.863000 CVE-2023-4680,0,0,1f83e9eb1c73bdb55735cc4047268843416b3ea41519074c0832f6dc353107ef,2023-09-20T14:55:39.430000 CVE-2023-46800,0,0,d52933e53d6d15f5a2eaebc826a5324854d68f2efe77d60c5a7b7fcae21b94c4,2023-11-13T17:57:34.490000 -CVE-2023-46801,0,0,061a2724b5d35593bb04e4b2fa28b5e7ed01c0cd204132c80e12b5e4f71358e0,2024-07-15T08:15:02.253000 +CVE-2023-46801,0,1,8804645b261dd7f03cab8f5f7ced1c17669e9fb8b2c6f626f265e8c16631a9e7,2024-07-15T13:00:34.853000 CVE-2023-46802,0,0,c0da1cc5144de9428d72b3f4e2aaf6e20b248ee8e4010663f547f245abb34d46,2023-11-14T15:30:13.830000 CVE-2023-46803,0,0,cb9bb8e58cc7d3efaa7032194e8201cb447933fa588b63421b6631ce6a007215,2023-12-21T04:49:22.117000 CVE-2023-46804,0,0,076b3f265bfaa2ea0a3df1bc482a172069ea8f2d8965ae045330a23041a00075,2023-12-21T04:49:19.073000 @@ -236588,7 +236588,7 @@ CVE-2023-49558,0,0,0292793c2dbd787c41d2db53bda3a2a5f7afe4fb78f6bd238bd5897637472 CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d987,2024-06-13T18:36:09.010000 CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000 CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000 -CVE-2023-49566,0,0,9825043f8c33eb8f820ac44378bdaae17b26bca816e53d144a0f39338adffa66,2024-07-15T08:15:02.367000 +CVE-2023-49566,0,1,b687b12ca130c19a049c76ba2645e5d075dd6308d54f6cc532344942e01a0483,2024-07-15T13:00:34.853000 CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000 CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000 CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000 @@ -238942,7 +238942,7 @@ CVE-2023-52881,0,0,6fd8affdcc64e7515585a36e8830d44119718460b76d8f8a6eab4860fa38e CVE-2023-52882,0,0,e51efc18668383cabb6a1a97b2fa54b9809b5bd71d28b08d72a7fdf9caf29900,2024-06-27T14:15:12.840000 CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000 CVE-2023-52884,0,0,bbf325b5c1ed57a9d1f4ab6303e0df9c8a8b60b96f00c7266f34fe596a2f1382,2024-06-21T11:22:01.687000 -CVE-2023-52885,0,0,57a1064013287e819cb0ff78e395ff8eee4dfcdc2e4f046e99e301d2f7a77586,2024-07-14T08:15:01.823000 +CVE-2023-52885,0,1,e5c658cfc56d45f1e026b5e9d3b2354382c669c4a8a58f5c853288778028aada,2024-07-15T13:00:34.853000 CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000 CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000 @@ -243432,7 +243432,7 @@ CVE-2024-21509,0,0,08fba31db3f8065b5101d619dbf09f6a70e9bd75e0cdca8a16d4f1b7287d5 CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000 CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000 CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000 -CVE-2024-21513,0,0,4c52fb544a57e876ed31009c5ddede5ae8656f89fe88ef077a01bed0ede5a4b7,2024-07-15T05:15:01.857000 +CVE-2024-21513,0,1,41e7cfe4af9a27f4ef6f53859b6be58b35134e5fac65b882a934611713ec160f,2024-07-15T13:00:34.853000 CVE-2024-21514,0,0,e35fdd4092be130115fbeba8b97bd5409f312ce1ce7e7ffdef71e8b5183b17b0,2024-06-24T19:59:16.767000 CVE-2024-21515,0,0,1016168f136676e2e2388766ab91d4af3b5f99f1c59142f068698c8df1e46a6d,2024-06-24T19:58:28.987000 CVE-2024-21516,0,0,abe3a9cd7507c4a7cc049f342ee17d37e317ed8b9557eb7b4e8fb458fc8f5c80,2024-07-03T01:46:42.813000 @@ -244892,7 +244892,7 @@ CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755 CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000 CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000 CVE-2024-23793,0,0,abc7a72376237fb9339f76fe50f865546ed3223a3a4e1f62f9eeed3f891a3107,2024-06-07T14:56:05.647000 -CVE-2024-23794,0,1,0f3f4f6e61975759b9b7bd63917d9d9afaa4b71a7230091cca31bbb943aad06f,2024-07-15T11:15:02.117000 +CVE-2024-23794,0,1,c0544087bf0bddab1ed5b1941f03e920e8f43617f03b4efbcee9f51b063d7fe0,2024-07-15T13:00:34.853000 CVE-2024-23795,0,0,9bdc3de1a7867e5dd5f2fae2c65eb797848013ce1df4d3c76aab96b0210ba5a3,2024-02-13T19:21:23.593000 CVE-2024-23796,0,0,b78054f583bcbbbf407e069ae69c356916456fd9441cdd542f17ab5e1c4b585e,2024-02-13T19:21:35.680000 CVE-2024-23797,0,0,a4dc0b724fa07db85a396224b8453a0f6dbdf17528bc02ac5f794e344aa9a168,2024-02-13T19:21:42.603000 @@ -248212,7 +248212,7 @@ CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc875 CVE-2024-28683,0,0,a4d093be60b3c2d6b460f6a76cb45ebc186bb3e16caaa646235de3d01aeda1d8,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,dfd73b6865a99ea6334fc6b8649a9d09bd29a09bbb6221cc4e10b05f5c40ada5,2024-03-13T14:28:45.217000 CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 -CVE-2024-2870,0,0,2b3e07b087f226c36131af36e60237e95ea9c66e47ca2ba4875baa9a673dfca7,2024-07-13T06:15:02.310000 +CVE-2024-2870,0,1,101cdd5ef34ec78aee7279476042f6231ac50ceb8dcc24da905d675c6dbc10c3,2024-07-15T13:00:34.853000 CVE-2024-2871,0,0,a7a747cc7e44787061231b304b7fa297ab3e10c5c0c5d67f97a2b8176c2eaee9,2024-04-10T13:23:38.787000 CVE-2024-28713,0,0,683c52f8275705ee96e560652bde14603ddf66171fa872586de4b1b327a40ee2,2024-03-28T20:53:20.813000 CVE-2024-28714,0,0,08fb99191e192a3bc38b9f60fc274cd82e5a789fd8f516940f5690d375507572,2024-03-29T12:45:02.937000 @@ -249212,7 +249212,7 @@ CVE-2024-30209,0,0,c7651164f7ae5b8a1ad3c087ccef52dd980069585c4cb62ace335f9444cd1 CVE-2024-3021,0,0,7a43c9561da29130b5303fa05a38e9044e9c902fed6586556d1f1fafa7292e2a,2024-05-02T18:00:37.360000 CVE-2024-30210,0,0,a4e3e4c4242271077161d2b580120efd2eb393aeb016a0a4841fcee233aac25e,2024-04-15T13:15:51.577000 CVE-2024-30212,0,0,0594691160a4f5b2f1d0bcef9e405d8556ee2dba26e32f8dbf7305af5239bf11,2024-06-11T12:15:14.847000 -CVE-2024-30213,0,0,de50a20ff41c5d61cca60452df6a21fd2abda9a92b13429fe41a85308335bbad,2024-07-12T23:15:09.927000 +CVE-2024-30213,0,1,001ec9524dc220ee85a6f54bb457ea7aa91792bea2d026680b02da84c57b03b7,2024-07-15T13:00:34.853000 CVE-2024-30214,0,0,cf5accb9e4a3278486a75d6623c8c03abb4ef1fc50fe46650d28f97df932b65b,2024-04-09T12:48:04.090000 CVE-2024-30215,0,0,3576a060ab4a3509fa025a4a09e391456b98e8a3ff1f9ef6a6adfedd520e279a,2024-04-09T12:48:04.090000 CVE-2024-30216,0,0,317fbed0703b9e56e6e6659964629ef86247b3618fd61971d8544005edb73b9f,2024-04-09T12:48:04.090000 @@ -249263,7 +249263,7 @@ CVE-2024-30256,0,0,e75ede031c606ce2d7acc4bf8feac4bfef2318338ca7923c8ab4e53bf9fd6 CVE-2024-30257,0,0,2d2c79320eb6c250ea218b9d65d00438f3ab1d1d66b22bbb47986039a76c7abd,2024-04-18T18:25:55.267000 CVE-2024-30258,0,0,be4f589c49b014055159a05f1829800293febfca8e38460140d450bf4dee3e99,2024-05-14T16:13:02.773000 CVE-2024-30259,0,0,aeeede919b2ae279a309f635ca91bd3e6ced2bddd6e440037e1bd79ca18f797c,2024-05-14T16:13:02.773000 -CVE-2024-3026,0,0,985db4e6ec70b53c3e02affbdcd87ffe9009e7b8270b26cc5e8cb3f5bad5c29c,2024-07-13T06:15:02.547000 +CVE-2024-3026,0,1,d8648605f96a408a42be3135a2a6422aab4fbcefbe357545ef8a79ba2f2cf22c,2024-07-15T13:00:34.853000 CVE-2024-30260,0,0,d4130271cfcc7874f1662bea57df5c1a7f2253137b955f8b0920fdb6f8477d01,2024-04-19T23:15:11.047000 CVE-2024-30261,0,0,35caec8710f0a2f113e57c18f5aef464bdb17f669f2d2a7adbf2cdcb914bd28f,2024-04-19T23:15:11.137000 CVE-2024-30262,0,0,ab567f2dba8b2c5754e6ed9cfdf366e621e451f0ffe30dcd637b80052818cefe,2024-04-10T13:24:00.070000 @@ -250387,7 +250387,7 @@ CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58 CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000 CVE-2024-31943,0,0,a3c3177de375490a3bcbe7c4dc869c6dc98de8408de3c26e8167121dc5553a55,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,9b7df1c1d68c7ba82d2a7e14fc250e4409e7410da01d69528d57b3dba1022b40,2024-04-10T19:49:51.183000 -CVE-2024-31947,0,0,05771a2814e3261ec41be75ecd2a8a9092041d6aeaf653b2bd4c89663fbd7c50,2024-07-12T23:15:10 +CVE-2024-31947,0,1,53a07a96d235761473c51b6658ac88c324f970e3729e396995a521d5b07b0a35,2024-07-15T13:00:34.853000 CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000 CVE-2024-3195,0,0,54895de1b254f44ccb4469ba2b74594e6a91af91f3d85ccfdb05ae95c48717c5,2024-06-04T19:20:17.337000 @@ -251141,7 +251141,7 @@ CVE-2024-32936,0,0,23e0b37e344ddd92e30dd7d9ca686ba35ea7eca4cd8b4bf43262492fe5496 CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743878,2024-07-05T12:55:51.367000 CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,4fb2f2be57e3c45f28985f6208cc39a6b7c152924d34534ee51269b999eeb2f4,2024-05-28T12:39:28.377000 -CVE-2024-32945,0,0,b8c9269735f5f6a63fd0bf177ab6eb50792e8f8639ebe97145c8820b5acaf306,2024-07-15T09:15:02.260000 +CVE-2024-32945,0,1,956856d574c2521a35651cbe64981f22fd1a5aa6265fe5b1cf96a1b1cd915024,2024-07-15T13:00:34.853000 CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000 CVE-2024-3295,0,0,7e8dc8fb7d947b5fec16ad38c2014a5b0f40e3f43acfc4125c239589a9c410e5,2024-05-02T18:00:37.360000 @@ -253242,7 +253242,7 @@ CVE-2024-36305,0,0,e0280595514bfbb7f3f15347ff97ece344c7b914981829e66c5f0371fefcf CVE-2024-36306,0,0,2992c9d3dee00635a098da7a31d93968fe2ea44dae6af41b3d56ab6f08264468,2024-06-11T13:54:12.057000 CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c714342692d4,2024-07-03T02:03:05.420000 CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c973c,2024-05-15T16:40:19.330000 -CVE-2024-3632,0,0,a580525ecfd3a33868f2160de373b5e50662154b29005e43e9662d0d36ac67c1,2024-07-13T06:15:02.617000 +CVE-2024-3632,0,1,a30e0458749fa93817eac3ce167e4ad47bd23a68a6c45b46ba3f7e9f86bbb082,2024-07-15T13:00:34.853000 CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000 CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000 @@ -253660,7 +253660,7 @@ CVE-2024-37090,0,0,c9337b1c06176564880c76e8afe6a14b4c2c49859c9816b2ce1bd95c9844b CVE-2024-37091,0,0,29df61c14323673582d898ec108c905ef36e901d30b582cbe596401e89b91806,2024-06-24T12:57:36.513000 CVE-2024-37092,0,0,3fc461ce41765c8bd67eeb714962f1c1e9a4adb148f3385091f6bbdb349f9cbb,2024-06-24T19:26:54.367000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 -CVE-2024-3710,0,0,791fd7712f631951c6899e8403ca73c192fe073ab4f2f17c7ea866b4b51721bf,2024-07-13T06:15:02.700000 +CVE-2024-3710,0,1,11f8b032846e97ecdf9206fd4f5a2cf7a7723a72083208561fccf1e37f2e1a30,2024-07-15T13:00:34.853000 CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000 CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000 CVE-2024-3711,0,0,3b2dc1b2087adfd05ceebf60dbe737e15dd78bf5f431af93b3b9e5c8041fab21,2024-05-24T01:15:30.977000 @@ -253877,12 +253877,12 @@ CVE-2024-3750,0,0,efd622f326538dae191b06a5f79463da3c8ce4dd6062aaf01b384cc8ff8066 CVE-2024-37501,0,0,5ecb58b46cb9dfffffc738dc981f07d5bb389ccd62d90c017a24f4cdd2a17935,2024-07-09T18:19:14.047000 CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 -CVE-2024-3751,0,0,dc747642c95c9bb313d20dcbc56ee4a5d8663bf9a1eb83f8fb20e39f108b0020,2024-07-13T06:15:02.773000 +CVE-2024-3751,0,1,bf6b7a6b324c5665ab742f64d608fcb1d1c082126b8295162670eaae3251f2ee,2024-07-15T13:00:34.853000 CVE-2024-37513,0,0,ef9826079473ea90d03593899ffe7bbe7bec85e3a94cf208d1ce275e012edcb8,2024-07-09T18:19:14.047000 CVE-2024-3752,0,0,239ab2a4fa8a03a6a793fd7bad6c5508294cfd1be75f4ce013e63852e68d9c42,2024-05-06T12:44:56.377000 CVE-2024-37520,0,0,b5aefddfe809940e1b151a015b0ffa0023fbe6b4c84babfeaddab610d4977358,2024-07-09T18:19:14.047000 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 -CVE-2024-3753,0,0,077114a2a8c8bcba915a2d740613dfcdb4108e5c720965ec726fb16edcd1a941,2024-07-13T06:15:02.840000 +CVE-2024-3753,0,1,7ec7e7ddead92833cf7c33f0b6871feebee71d63726e8d778e9efc350bba07de,2024-07-15T13:00:34.853000 CVE-2024-37532,0,0,aa877fbc00f03a99fc2b9d43fb935fba6551700aac862f95f49a54cca4d5d3d2,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000 @@ -254569,7 +254569,7 @@ CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41 CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000 CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 -CVE-2024-3919,0,0,0907b484b5152b5ec0678a74ac604b9f28c921c564f31b28a301fc0f43b3cfed,2024-07-13T06:15:02.900000 +CVE-2024-3919,0,1,a7423741ea3b54999d6dce7118ede9537758eefd2b9032b5f13e527738f9bbf0,2024-07-15T13:00:34.853000 CVE-2024-3920,0,0,0491b769da3fcc1d713428de93228065f2895f5f96d5fbedd163ec53b9c646c0,2024-05-24T01:15:30.977000 CVE-2024-39202,0,0,f670ff06733dd4c6d5c11488fabc4a1bb063378e53783f2f50ddc1a245b1d647,2024-07-11T16:13:13.487000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 @@ -254785,8 +254785,8 @@ CVE-2024-39600,0,0,3135898d4a6f059003378f1686cc229eba804e1b1498ff1a755936e434035 CVE-2024-3961,0,0,4bb7e6d6d1ddc68d61d7e609322fcd2fdb4d5fbceccd5695fb72aeb515d7a2a0,2024-06-21T11:22:01.687000 CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000 -CVE-2024-3963,0,0,3b5fc63da38217b47320bc90d6e3a08d853a83e0d577bef871036cfc81678637,2024-07-13T06:15:02.967000 -CVE-2024-3964,0,0,fbfb54db29360ee1e7f21431c99e66fec89692ad8753ecb44306be0e4866f736,2024-07-13T06:15:03.030000 +CVE-2024-3963,0,1,22a9d7040d72db88d65fa4a5e43cfe7c84c7522ba3ba50e9ee83354901151cdc,2024-07-15T13:00:34.853000 +CVE-2024-3964,0,1,772b7775d62a6c0375062c778dbb9e238f127b1d5f317dca08751976877ef5e6,2024-07-15T13:00:34.853000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,73fb2ae6dbee87e9388d8eb74bc7dee75170ed92fa9ef996fc6e09e4c624edd8,2024-06-17T12:42:04.623000 CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 @@ -254814,22 +254814,22 @@ CVE-2024-39708,0,0,000cfabacce752db3861ff9f8f3b1c505cd90f739471d05927bcaf43cab3b CVE-2024-3971,0,0,453dcdeb8c637bd7bb985a1e1691d8c7769ab2a20a57d4f9c555aa6e1a8e675d,2024-06-17T12:42:04.623000 CVE-2024-3972,0,0,b88cd8559296a0afcfadf9b1abe7d20bd03ddac8a181190ab7883387b6e890c7,2024-06-17T12:42:04.623000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 -CVE-2024-39728,0,0,b691ce146e8c565f3cf02d5f420325f270414e7c2e82b09f7ad4b51460d61b2d,2024-07-15T02:15:05.440000 -CVE-2024-39729,0,0,23d3fd6d3d5fc7cb4088b4469562a023905508b991b078252733cb262d573b52,2024-07-15T03:15:02.043000 -CVE-2024-39731,0,0,fc590ba9e427932677f0ea3ef602e9c3544e323bf2346e8a6d3c522c9ae5b289,2024-07-15T02:15:05.670000 -CVE-2024-39732,0,0,693b248074a19c17461dbeefcb7ab738cd8ce52754bea08a2fdb9c6295cdc26f,2024-07-14T13:15:20.433000 -CVE-2024-39733,0,0,807de50b187aa6d16a4d9393ed66e48438d98f6ff200367ff9912c6579b3ac73,2024-07-14T13:15:21.490000 -CVE-2024-39734,0,0,d815178ce54f0e9d63f51bff8ccfab5a1270e4759aace88a1998e32cb69699bb,2024-07-14T13:15:21.860000 -CVE-2024-39735,0,0,fbbc027bcf7ffa14ee46f6edd2c95c665bf41c470c59361c62b3e5674870a144,2024-07-15T03:15:02.307000 -CVE-2024-39736,0,0,488aafaf66111fe7ba01749cae0b7262f5ae44c6cf07bd968299c7c59835c3b6,2024-07-15T02:15:05.947000 -CVE-2024-39737,0,0,5a28bf5a03c7a33e229f9440aad21efb5ca1f0399d42d3a49c698d501fe3c365,2024-07-15T02:15:06.173000 -CVE-2024-39739,0,0,f20992b02949cd1b8697b7ffcd0bb1f203a1a4bd5804c2643f00aae99444c98a,2024-07-15T02:15:06.417000 +CVE-2024-39728,0,1,5753dced91e38e2c288d86786d32b6020bbd362e78906f22195f88314c8a93c6,2024-07-15T13:00:34.853000 +CVE-2024-39729,0,1,e06436aa420463d1ce8ec1cbd91008bf873a619ba3957ef67f76f0d5eb74cbae,2024-07-15T13:00:34.853000 +CVE-2024-39731,0,1,627c8e06a07c143eb86f524c6798b51bab160ca70dc1f20fe6b845eee0524e0a,2024-07-15T13:00:34.853000 +CVE-2024-39732,0,1,7892e613cb40f3ee23c30308b27946892320a4d4412e577f372e2bc5cdd6f31a,2024-07-15T13:00:34.853000 +CVE-2024-39733,0,1,1bbce6e0fcb37fcebeee665224c8b9bc18fa1e9c0b769e817f516ff57bdea119,2024-07-15T13:00:34.853000 +CVE-2024-39734,0,1,8816f5c6e195bdd987c06b9f1ca82972af693b523cf2f662389613cae26eb0de,2024-07-15T13:00:34.853000 +CVE-2024-39735,0,1,9e82854968bf2a64c74cad3e59185a24ea80992bfa57034e66b8cacb5151d356,2024-07-15T13:00:34.853000 +CVE-2024-39736,0,1,ae10f6bdcbc550cd7631cae514b032611d1f5aea550bcdacb884e43dfa19421b,2024-07-15T13:00:34.853000 +CVE-2024-39737,0,1,7750e244939cf187bb42f686088411cc408be727c81b2690ed8f4f7dab8e8aab,2024-07-15T13:00:34.853000 +CVE-2024-39739,0,1,b8281c9decb9774a2c0c6ac78a95852da2b214cbf398aac91ce7593055a89ba1,2024-07-15T13:00:34.853000 CVE-2024-3974,0,0,99d0d4f641ea62ed82005791c26fea2e931a4b5fb3ed984def163639d28ba778,2024-05-14T16:11:39.510000 -CVE-2024-39740,0,0,6b60b6a11e14144e1d412da7ea5f4c5c3e2a73335aa423ed11f9f0531fba324f,2024-07-15T03:15:02.557000 -CVE-2024-39741,0,0,224e53f19f7fb4aa8c1a7f0aea4cd48b2bd55237f8b8efa2cd6aec2962bb79c2,2024-07-15T03:15:02.793000 +CVE-2024-39740,0,1,d055f1b5a1186ede7d5e8388dd500f09680ac9fdce50603b34118433df7e9201,2024-07-15T13:00:34.853000 +CVE-2024-39741,0,1,da49b33096a6695a0c2de8ba7befa4e237900710203ceae30da6c151c1ab746c,2024-07-15T13:00:34.853000 CVE-2024-39742,0,0,72b0792276cc76bab7fb041a3bdd0407bdbbf55dba99879aeb0e420b1c80fbbf,2024-07-08T15:49:22.437000 CVE-2024-39743,0,0,56ba3c78f140f47d5ebd80a82e98c5cbfee01c52fb9fdf85fab2837f5a9797dd,2024-07-12T14:15:16.487000 -CVE-2024-39767,0,0,a489fe85063cddc95dffc59e0a7720ed88319e4b3dc10bda1a454ee99c5a5f96,2024-07-15T09:15:02.573000 +CVE-2024-39767,0,1,51732b4a4da6271e0aeda47095f96976b0d2a2d30fc377bd57c610e7e5a075a1,2024-07-15T13:00:34.853000 CVE-2024-3977,0,0,87f55f2983faa9489e3ab65e96b4cea8a0d04681e4c4541cf69108c85d144a6c,2024-06-17T12:42:04.623000 CVE-2024-3978,0,0,e25d25f011ecf86a9a7629ea5449d530d107458e873c97f796fe325b70200d63,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 @@ -255152,7 +255152,7 @@ CVE-2024-41003,0,0,169fbc8d8f219b490cf3dfcf7244032fd260a4649a745984b83708bf36e0d CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054509,2024-07-12T16:34:58.687000 CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000 CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000 -CVE-2024-41007,0,0,d4ad9d46f4bd20c1c5d34c093ecb008dc833ebd112581aba5300c25d54bd40e6,2024-07-15T09:15:02.803000 +CVE-2024-41007,0,1,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000 @@ -255247,7 +255247,7 @@ CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cd CVE-2024-4214,0,0,6dc95cb08891bc473beaea6b69701e404acb0b7494c8f630888ffa867e36a2c9,2024-05-17T18:35:35.070000 CVE-2024-4215,0,0,e1516bffde121cdd72b9d60979ed7fe6f59f5c9dab0667f7e28a1d0bcbef7063,2024-06-10T18:15:36.443000 CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000 -CVE-2024-4217,0,0,25d881a713792e4ddccc015ee3946da1c3c97eef6d57d399ff21e957f4fd7764,2024-07-13T06:15:03.097000 +CVE-2024-4217,0,1,9979c68675bcac680eb1a9ec0bfd6c467888186b775eb69528325e0624ef9dea,2024-07-15T13:00:34.853000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 @@ -255292,10 +255292,10 @@ CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b851 CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,b21b1be134b642d147ee55ecb619e0382fab4366c661a291e53904c7941658dd,2024-05-24T01:15:30.977000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 -CVE-2024-4269,0,0,25ee5767be83f0ba0db68b2069bfe40cac41f446f3cd38218fb126682f3bea45,2024-07-13T06:15:03.170000 +CVE-2024-4269,0,1,73e6041cf4a57310e0f04dcfcf91795f5ff7b72f95c2da984372d47b5105ce94,2024-07-15T13:00:34.853000 CVE-2024-4270,0,0,3756dcd853f292d1ae47410e3e7a0a5c84a12d680350cff9a67bd178a0959db6,2024-06-17T12:42:04.623000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 -CVE-2024-4272,0,0,13e36b2bf465861e52e28a1694322e608e3b339ad047904bb6a6566ab85281bd,2024-07-13T06:15:03.230000 +CVE-2024-4272,0,1,ce3ca6df72e5fcfa2813c6cc0c351ea5c64ae351112c26159db9dbc45c6913e9,2024-07-15T13:00:34.853000 CVE-2024-4273,0,0,5b125871d487c3efbe3e6c153d4b19bf711348e838f76308254a9b0be85a18c9,2024-06-04T16:57:41.053000 CVE-2024-4274,0,0,75b03607f21ad1e6106012193c68fc94ebbedd9ebdaa49b327f299429c0ef078,2024-06-04T16:57:41.053000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 @@ -255585,7 +255585,7 @@ CVE-2024-4597,0,0,098adbd2826136caa11e67cd45a2f45f6208425bc1c84711667f353f70d7a2 CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000 CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000 -CVE-2024-4602,0,0,c1263cbebea4b27dbb386fa673c27b2e600a26eed9f3bd20ec3d4d48146d2495,2024-07-13T06:15:03.297000 +CVE-2024-4602,0,1,ecd22cb78f218c513f9fefdb8d739dc3203d715488f06f81ba0b6e76e450aefe,2024-07-15T13:00:34.853000 CVE-2024-4603,0,0,7bca9f2dadfec866e13d2cb237a0cdfb3e7733f93330ed987bf2cce70155b7d1,2024-06-21T19:15:30.783000 CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 @@ -255715,7 +255715,7 @@ CVE-2024-4748,0,0,dc500bd2c271d3e2932961c6c29606d3774e3a53e6aec567d01cebdb2996b9 CVE-2024-4749,0,0,247ef47fe14e2f3c30261b0797a6006095cb7721478ad0f0b62ea1bc828e91a0,2024-06-04T16:57:41.053000 CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000 CVE-2024-4751,0,0,4a5505fa6c4a26d1ebadf255bdcb189a3f8a4e23e25b830092ad73bb71504b01,2024-06-17T12:42:04.623000 -CVE-2024-4752,0,0,9ed825881699c17bbd1615aca6091e200e12d4dbd13ebc5b5d9d42fef7786afb,2024-07-13T06:15:03.370000 +CVE-2024-4752,0,1,f168ba945180fbe043a32a258fdb26c4bd817ecdcef6ee3e8dbf46da0da37e29,2024-07-15T13:00:34.853000 CVE-2024-4753,0,0,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 @@ -255905,7 +255905,7 @@ CVE-2024-4973,0,0,c8cb9b832f42f8b36963a1241c53cb5d648196ebedc5ede632c88d17792d2e CVE-2024-4974,0,0,29381f582adec4042105cf6b841ea7b6d4575f99995b9ea6ba695d777207b6ba,2024-06-04T19:20:56.237000 CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c152070c,2024-06-04T19:20:56.337000 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 -CVE-2024-4977,0,0,69a8e2defb062292c9dc0a4f397f9b9f4f1c9756f1e1799054127e5d9156b068,2024-07-13T06:15:03.440000 +CVE-2024-4977,0,1,6e31181bed7859521b5d24c43841f20e7e1d98c2d18342c3f8f5e654717b6cbe,2024-07-15T13:00:34.853000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -255920,7 +255920,7 @@ CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92 CVE-2024-4999,0,0,b4eb381faf94a34214b2224241fcf2183ad19cc1b2b10e88fb63132439185b3e,2024-05-16T15:44:44.683000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 CVE-2024-5001,0,0,6e789f4b84b7c30c10b52ba7371d899ee31aa38697e534b21234e708adacc825,2024-06-06T14:17:35.017000 -CVE-2024-5002,0,0,da41a6c3b1ade4706dc614636aec685153acb7e40aa1e8e4bd804f1058964a8f,2024-07-13T06:15:03.500000 +CVE-2024-5002,0,1,f7860d79f0c4960d9f9f9b184eddce2d975db46219a58cb625ab73e627c58cc7,2024-07-15T13:00:34.853000 CVE-2024-5003,0,0,a6d5ee419bb4435eda4a8327f2c1370e948cb22e5f2530800abb9a2dd6e74538,2024-06-07T14:56:05.647000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000 @@ -255939,11 +255939,11 @@ CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa CVE-2024-5022,0,0,0ed043d616e9fb9347e4abec6b2a3f19c9cd15ea7715d52174611d64d6e50bde,2024-05-20T13:00:34.807000 CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 -CVE-2024-5028,0,0,c0a83f8d003a1fce4e24da3753a0cd5fb6375a83aaafea68317fd84d200a5c46,2024-07-13T06:15:03.563000 +CVE-2024-5028,0,1,2434e547ff880e5f4d1440f985bfa31001a18577150e93f894f006e11a1cbd54,2024-07-15T13:00:34.853000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 -CVE-2024-5032,0,0,9b6823307734d5ffaf471cb54d738917f99101d5393108a1880028a38c5d0220,2024-07-13T06:15:03.633000 -CVE-2024-5033,0,0,23166929cf777fc2cf5f9fdd07a7c5a04c6a1161033dbdce84457b5705948ac3,2024-07-13T06:15:03.707000 -CVE-2024-5034,0,0,dab8cc3de2ab05c5dccde0e8009a648e0032610ed8cb55da0871b07f4291107b,2024-07-13T06:15:03.780000 +CVE-2024-5032,0,1,2a95b54bef1edd7dfe2c89e4d0c6cc67ca2232060fab200153538d83e47571c3,2024-07-15T13:00:34.853000 +CVE-2024-5033,0,1,c4ed23b4dca3b506656a5ef099d7b8a100d6cb5539f8aab89959b7bc021c6825,2024-07-15T13:00:34.853000 +CVE-2024-5034,0,1,0d4a8359031d086b11823b589f4e442de7bc398d57d6f500531606468b6a3900,2024-07-15T13:00:34.853000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,4929880c9b3abbf54880fa0bed4b7c17c0808597b14b2f547de3ab531aa69c9b,2024-07-14T17:15:09.667000 @@ -255976,12 +255976,12 @@ CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b CVE-2024-5071,0,0,785631f9585d5c4be650f1d6b68cd50ecc66584beb25a8693cb2019c0e550973,2024-06-26T12:44:29.693000 CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000 CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000 -CVE-2024-5074,0,0,dcd2f43b41606f53716d8e8198fa71008603d08f5ee0d2cd508ceb65f083d464,2024-07-13T06:15:03.840000 -CVE-2024-5075,0,0,95934ebb6e6a19db2898b46f8de4b5a456e37319a030b328e8115a4d43115400,2024-07-13T06:15:03.910000 -CVE-2024-5076,0,0,fc20a380f13c099c0bab55c99123f88f84c0c36bd86de2b17c6c3b81cc18d288,2024-07-13T06:15:03.970000 -CVE-2024-5077,0,0,3cc2daba1bfaa6791269453cb40e5fc4b93a16bff52d4b98064a50b83e8b8a26,2024-07-13T06:15:04.033000 -CVE-2024-5079,0,0,9b89547c193919ba4b174d788d5fbafcb229f2a9eba46da5ef589dcbba84e22b,2024-07-13T06:15:04.097000 -CVE-2024-5080,0,0,a95a41b43142627e234b862653a55ebd4e1c6bf3781a93cdf646a20dca28bfc9,2024-07-13T06:15:04.163000 +CVE-2024-5074,0,1,5802e9724eb7b9d81b02d2ccb6e64b34861d36b96cbd5e801230bdefb07c7e66,2024-07-15T13:00:34.853000 +CVE-2024-5075,0,1,b3041a73661beb75349966d6692d67e3c108a9afd397e6ef23ad2c7542c5b9df,2024-07-15T13:00:34.853000 +CVE-2024-5076,0,1,de500664b85830a99762c361ee42e0dafcd27a97d527daba96518ab3f706848b,2024-07-15T13:00:34.853000 +CVE-2024-5077,0,1,d82e85da4baf27e19518a40c5d8b25fa39278558fadb2dc40aeb9bb865d12bab,2024-07-15T13:00:34.853000 +CVE-2024-5079,0,1,1ed3e0bf8c36514858baa41d24357a34aba700910531c24d7fce43aded664b25,2024-07-15T13:00:34.853000 +CVE-2024-5080,0,1,04d4f2e8e71a583300ae241d169039e3612a143c25f17bada5d3ddecebba3027,2024-07-15T13:00:34.853000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-5086,0,0,cace1182cf9be3136b0c613ecdabc086a9a0b40661f04ebd6e230acc3565cbb0,2024-05-29T13:02:09.280000 @@ -256044,7 +256044,7 @@ CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 -CVE-2024-5151,0,0,575b70e7bfe5086920b22641f95acfd3710f73d3a299da068b627cc26bfb9c48,2024-07-13T06:15:04.237000 +CVE-2024-5151,0,1,ad1fc500121b870dcb89d61dc389b45e74c596af15ff84262d6f22aae7a67508,2024-07-15T13:00:34.853000 CVE-2024-5152,0,0,e73c7da8c8c2ed5e231c5b079e7db4dc62c411c7fa4263325d6a29492bb119e2,2024-06-06T14:17:35.017000 CVE-2024-5153,0,0,f4445073841b5acbebd46803c16ec0801d0a87720929a153584d25bf5c542784,2024-06-06T14:17:35.017000 CVE-2024-5154,0,0,0778eab6f080d653da2fa22f0e6231eb560d44947e17071f85f00815113f581a,2024-06-27T05:15:51.567000 @@ -256059,7 +256059,7 @@ CVE-2024-5162,0,0,bc43c0e53400207013018de37e6a47ad169ea3beb5e8705157d76c411f383a CVE-2024-5163,0,0,bdc81db4ac58629f980356520760931bcc42aa23cfccd4fdeb3934ec7b891de9,2024-07-03T02:08:37.670000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 -CVE-2024-5167,0,0,c314f80b95f205b735f4654c3b8eb7f41d481722cd6e84bd5c3c512290d615a1,2024-07-13T06:15:04.303000 +CVE-2024-5167,0,1,e70ccfbabc01b8de97ba44009da8fa7086c745b9505b331232e05a93bb886495,2024-07-15T13:00:34.853000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 CVE-2024-5169,0,0,3bfdfa0dcc6233f7f03d95ad806e52784a2f88929f2714b8b72cfdaa99aae3b7,2024-06-26T12:44:29.693000 CVE-2024-5171,0,0,77af1fe21b02961ed384a4252d7f9bfe075ab19bb84a586bbbba8f8ea958ee97,2024-06-21T13:15:12.973000 @@ -256154,13 +256154,13 @@ CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd CVE-2024-5277,0,0,290f6887dc0b7a5cb6634ba516b540acf0e27f0b1f08e29f3325fcd19c01494d,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,070492ef57b88214566344e89a28a1f0ef4d4f18184d616c40ab3876a3b57140,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 -CVE-2024-5280,0,0,d04713398c318d8f6f2743eb0b8be98fb79b4f4107a37c7b80b7a099871fd9cd,2024-07-13T06:15:04.360000 -CVE-2024-5281,0,0,2d914b20c8419d1e4141d831985d48a6766bb3ce13b135fd71d14caaf2d16332,2024-07-13T06:15:04.430000 -CVE-2024-5282,0,0,709866e1aad7666f7e530c99fa38093f0247abfb71abd228fdcb0bd86cb343e6,2024-07-13T06:15:04.490000 -CVE-2024-5283,0,0,14f6ef6eb599eef20ae25c736cb62de53bbd5886b5b2c028e7c85155f1dec868,2024-07-13T06:15:04.553000 -CVE-2024-5284,0,0,de28ea14ee234edd7f918c014920493f54f2a1f63a20c26817a44e4a237dd964,2024-07-13T06:15:04.617000 -CVE-2024-5286,0,0,043437eafc4cfcc9b332e36e963961e86fc5087d5a70ae79f06f52ac9f0d2b03,2024-07-13T06:15:04.700000 -CVE-2024-5287,0,0,beb0faf49c30ff920730a15a6d9dcbe58d0d9ca5abefaa5119dde828b4608b1d,2024-07-13T06:15:04.780000 +CVE-2024-5280,0,1,2c434e69f2189493b6c207c459c071fd464266eb561f5b97487e91b65df05ae3,2024-07-15T13:00:34.853000 +CVE-2024-5281,0,1,060b06867a1a1c8ae3c49fd1bf435135d5f31c9df63d2fac2402a303dd1dcaaf,2024-07-15T13:00:34.853000 +CVE-2024-5282,0,1,0e38a64d94c307cdd25aa8c70504121a3cc6e789cf8bf74fef94d0d9b37394df,2024-07-15T13:00:34.853000 +CVE-2024-5283,0,1,158766c6fc63e1521af07a024c96b4a9ea5b7a8f36231f7ef52200c9bb9d7eae,2024-07-15T13:00:34.853000 +CVE-2024-5284,0,1,4bfe0f5610c04cde5b0cb2c3dc3ab239b1848149dd6bfd8b564acd2ee160cb2a,2024-07-15T13:00:34.853000 +CVE-2024-5286,0,1,fc7b78be4389acfb6eeeebdbd1c2b2010558b9a0f60282696859e3db27abfc46,2024-07-15T13:00:34.853000 +CVE-2024-5287,0,1,d91964abcbe9a10e4df96379d6411e36555098088be8c568765ee25103481fbe,2024-07-15T13:00:34.853000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,46d8600092b67d78419e8396a0475f44ad2d697d614c735fcdb066f1cf0c44cc,2024-05-24T01:15:30.977000 @@ -256259,6 +256259,7 @@ CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591 CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000 CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000 CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000 +CVE-2024-5402,1,1,f9eeaef9d858d50b0dc8b7830c1c6e37f908d2aebea96748bdfca508ff29c76a,2024-07-15T13:00:34.853000 CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000 CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000 CVE-2024-5405,0,0,c7e95a2942d42700f7e78ab698eaffdd8aeff4f1adde3aec6c39fd8479ab2700,2024-05-28T12:39:28.377000 @@ -256290,14 +256291,14 @@ CVE-2024-5436,0,0,1f0ff22e526bae999a5752534900397469f10984712d6e1a281251b3244c7f CVE-2024-5437,0,0,b00058f5764b16d4661c63f1983ab9dae77d46bb23d9cbf0d57b3c9fafbd7a4a,2024-06-04T19:21:09.363000 CVE-2024-5438,0,0,beb1b61cb3794f25e50aa4c7911116dbbb532eaf0bf3366ce9bd52ca79f18ec6,2024-06-11T18:26:45.147000 CVE-2024-5439,0,0,e5ab091899f87682491464426dccc0d01925c42909ac499a5c8786d55427396d,2024-06-11T17:35:43.313000 -CVE-2024-5441,0,0,25db5b7a13fab891078be197e1cbab0e4a8b6901d0ef3c63d9c3d230ddafd0f6,2024-07-09T18:19:14.047000 -CVE-2024-5442,0,0,afe1e5640210c90ad6da05924222da61a8bffbc08dadcf30e815cb17a780e98e,2024-07-13T06:15:04.847000 +CVE-2024-5441,0,1,cd7b1b15236c7a2c2414b795b6ffce4b233942605e4b788f9b1cefb9a565eca2,2024-07-15T13:39:20.267000 +CVE-2024-5442,0,1,34914be0a30c7b71d2568f0cd14a15a5872c0256c9eaac36eaf3e6e263d79b5c,2024-07-15T13:00:34.853000 CVE-2024-5443,0,0,5355e7ea1610df75dc467c6771933fd6a627b9eafa985364872ccc88c9e02e01,2024-06-24T12:57:36.513000 -CVE-2024-5444,0,0,df6c64937a0a680b450e4731b07b240fc0d70d09b5799de50b3fbc75e0e9e8e3,2024-07-12T16:12:04.690000 +CVE-2024-5444,0,1,7a2603f1e6478613a17365e974ef612aa2f89724976e490873c8e2e39efd0067,2024-07-15T13:41:20.447000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,8dad4092319a8fbfdab77ac7cd7e399a1e2ec0c5413d879a1b42c4d6d7cdce19,2024-06-06T14:17:35.017000 -CVE-2024-5450,0,0,a30067463da79743f04e83d4fd311e0aeac3440f8788fcaf72039c9d1a29e1ec,2024-07-13T06:15:04.927000 +CVE-2024-5450,0,1,80002c52fa004acd100f77f277a6657bbab887f4ecf21032f57c390f6fb18acb,2024-07-15T13:00:34.853000 CVE-2024-5451,0,0,2896975541f1deb7d32c27fb696c9ed10757c5f40f89d620628d7346403ef637,2024-06-25T18:50:42.040000 CVE-2024-5452,0,0,78c116a6a9dc3570ee7c04955c3fdb947d6a087a3e839a7cc2b81e0409d936d8,2024-06-07T14:56:05.647000 CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a33b,2024-06-11T17:34:52.263000 @@ -256313,7 +256314,7 @@ CVE-2024-5465,0,0,e1087197780d213933532929216c55208ad75e1b22ea3ce55cab3809a78a17 CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,5ac6e5bbb985b1f56a24d83448848a6f9d47ec5d1570dbff766b29523f5e59ca,2024-06-17T12:42:04.623000 CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000 -CVE-2024-5472,0,0,8fad43828e0bba901795ded0eb6372b4078fd8d176d43e12dda426d7b9b2d12e,2024-07-13T06:15:05 +CVE-2024-5472,0,1,5266d0242327561f219784f0c46dd50d182936ab4a103ea249459b5dcb746156,2024-07-15T13:00:34.853000 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,f98bb962ebdc689e4533f9bc6000e2923314fc7e209e4220035a196848b232b3,2024-06-07T14:56:05.647000 @@ -256386,7 +256387,7 @@ CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec40 CVE-2024-5571,0,0,c5656d92123399f657b6e24b44e300308aef779837a4ed7761c4afb3c16bfae8,2024-06-11T17:29:03.277000 CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8aa3,2024-06-26T12:44:29.693000 CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000 -CVE-2024-5575,0,0,15a319da6102433179cb7de936fb4ded42043cda3b3019c5c48a80ff2c9299f5,2024-07-13T06:15:05.070000 +CVE-2024-5575,0,1,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000 CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000 @@ -256410,9 +256411,9 @@ CVE-2024-5613,0,0,d9550d95a21bd950ae7717d597381d24b04054ec554e6d52d8ed280e70034f CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000 CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000 -CVE-2024-5627,0,0,66070f4345a89fbce91264e434553655270bf1e2ea5355263f1edcb80e716e1b,2024-07-13T06:15:05.170000 +CVE-2024-5627,0,1,b223ea977e14432dc305de4592ca7e0252873a120062584093cd834d6b6d0c82,2024-07-15T13:00:34.853000 CVE-2024-5629,0,0,7b249822418cf5aa1c707605ba6baf660f2f435a4da7f400697e48d05f897bc1,2024-06-18T18:31:05.663000 -CVE-2024-5630,0,0,52ec1eb0db54ea0b7b0198efe49989f99e85115df9e70421c85adb45724f39d5,2024-07-15T06:15:01.827000 +CVE-2024-5630,0,1,fb7adf0088e41368472f75420c3099c89bfebd04ba5c8d0da385eed443082567,2024-07-15T13:00:34.853000 CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000 CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000 CVE-2024-5633,0,0,170bfadc0f2c2c5a9d793826d3ecd8b6db1b109076f41bde8833e3f86a8f0001,2024-07-09T18:19:14.047000 @@ -256425,7 +256426,7 @@ CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae07 CVE-2024-5640,0,0,9b7c1b85267a9cc2caf72f61af05d24f2e85f909270110c050e922f8e0836e8a,2024-06-07T14:56:05.647000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000 -CVE-2024-5644,0,0,c61b21cc8171b7dadeb3eededf18e8f87f0465dbeac22b33406f279577dd59af,2024-07-13T06:15:05.243000 +CVE-2024-5644,0,1,bd94085a240294e1c5f68d1f90c69c4fad395903cecf449c34955bd87fe371a3,2024-07-15T13:00:34.853000 CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000 CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000 @@ -256480,9 +256481,9 @@ CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000 CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000 -CVE-2024-5713,0,0,1bbf853429ffee7c04c67b772f8cb489adb7e09477bba9c63f4b74332264850e,2024-07-13T06:15:05.313000 +CVE-2024-5713,0,1,1544207c70e43a58ced03b4a71037ccf4b06ea5a079eac8d061df9a923a30cef,2024-07-15T13:00:34.853000 CVE-2024-5714,0,0,3bed7ab990351d2edaae16abe4fb599113cf539749761008bcee140b1f61ca68,2024-06-27T19:25:12.067000 -CVE-2024-5715,0,0,a78758a828ec1f632a981415558bbe60dcb2e8575a09bab3ad3974ef885b33c4,2024-07-13T06:15:05.393000 +CVE-2024-5715,0,1,c9423d03a33781e2585ea9b937e9fb4eec5b8598cb405fdeaf60688f27175a8c,2024-07-15T13:00:34.853000 CVE-2024-5724,0,0,38dc9a89d58808dd61e7800cf2b643020cc778ec51b79329e907aca911c20e64,2024-06-20T12:44:01.637000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 CVE-2024-5728,0,0,970711b5fa2959720f2da02dc0abb41a56789d3063753f984448aaa0fb048438,2024-07-08T14:19:16.400000 @@ -256498,7 +256499,7 @@ CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4f CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca454,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,598ae2049072e1c2a3df1e983119a3b149c1d2d0666eb71ab5fdb900f4e38254,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,fb1a8c1252ee22cc610fe8ff09c119041e84ac15850fc2d3efcf49cef978035c,2024-06-17T12:15:49.850000 -CVE-2024-5744,0,0,e32fae19fc4cf4faf9d51e9c38b2b538ad025c262b90c2bcc72891cbb7c8866a,2024-07-13T06:15:05.457000 +CVE-2024-5744,0,1,e3737fe4f172ad8183946894682042eed7a28dff51d6726bdf81e342ea27bf6f,2024-07-15T13:00:34.853000 CVE-2024-5745,0,0,dff05d6623c183c983d17145ccb68bed448b0bc79462e5e5f54dc4238cbb2935,2024-06-08T04:15:10.027000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 @@ -256600,7 +256601,7 @@ CVE-2024-5896,0,0,543a9739bb7994a5cf7a44d8a031ddac2c68327e324b7d90a0e38059960eb0 CVE-2024-5897,0,0,7705294a726132fe76b260cca78d94d4cdc2b24feee8f8352eb858eb73b1c164,2024-06-13T18:36:09.010000 CVE-2024-5898,0,0,0514997e9a16e932b4bae6c16e61e0724aa85046156dacb25935f77f1e43af81,2024-06-13T18:36:09.010000 CVE-2024-5899,0,0,9a50f1672a8f19c78e5991e440d5a0c2d46a5e3e821843d3d776673ac7766d57,2024-06-20T12:44:01.637000 -CVE-2024-5902,0,0,ee0aaad857ea23a8005d28af5fb21df67510241d1b94bcb3669f48f8ef8e3c14,2024-07-12T22:15:02.437000 +CVE-2024-5902,0,1,7888af9d367c2dddb4d6f8ca0d5bee140123446fdb703c2c12cdc94e6e9d8ba4,2024-07-15T13:00:34.853000 CVE-2024-5905,0,0,4cddf29ad2163bb8b2239ceb5203f74a5b4a23afcc7f990be1f84b574dbe384a,2024-06-13T18:36:09.010000 CVE-2024-5906,0,0,a1fa44f122d7ffd3a4fc5ad63386cd04b99a5d76db12bb969c9d718c580404dc,2024-06-13T18:36:09.010000 CVE-2024-5907,0,0,8da2ff5a99ae3e60868cc8e5ebd9b2b8ae3850be6aba2b66bee52114d6b27435,2024-06-13T18:36:09.010000 @@ -256705,13 +256706,13 @@ CVE-2024-6065,0,0,548e8e867c04e79878c430ada31323fc36976f485c950db4630bd23910f1b8 CVE-2024-6066,0,0,cbf8936592610ae34f4b5bf7fb4818686f988ed15a558bfd2730cc7024fe976a,2024-06-20T12:44:01.637000 CVE-2024-6067,0,0,596738069000cc0464260f732fa90b4426b6499980be7c9c05f741f30f52c3b4,2024-06-20T12:44:01.637000 CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 -CVE-2024-6070,0,0,fda60aed20061941b31688889a84b677cfadb3b2a6748f421c0508f973978bab,2024-07-13T06:15:05.520000 +CVE-2024-6070,0,1,550cc34b006f58a5af605c364247593b5f2cbb9a0691ad5a3bd7d60429d18e8e,2024-07-15T13:00:34.853000 CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000 -CVE-2024-6072,0,0,2a37356f1c5c7380e7fb2ba4da64fc99dd34edd0ab0a988c4535ecdb1a9671bd,2024-07-15T06:15:02.007000 -CVE-2024-6073,0,0,b0b6898996132e703e3b9677b4dd3a23202f901cb07651ca645bbf83d7229c2d,2024-07-15T06:15:02.090000 -CVE-2024-6074,0,0,5abef6dcdaa6db5530c9fefaa82a7e824f26bf69a85d7179b08e99e55de10cdf,2024-07-15T06:15:02.170000 -CVE-2024-6075,0,0,160fabe739424d304d5a553dee31a8ec9e488dd3ff52dd12a536aeda3c8e977a,2024-07-15T06:15:02.260000 -CVE-2024-6076,0,0,830dbb70acb84a03bb55ffb4e3604973fd60209760bda0b8b3203d8ef782c2bc,2024-07-15T06:15:02.340000 +CVE-2024-6072,0,1,4f13656baff685da9b2d64dd747fa8817b7fdc85c21c70e46a323bfa1c41449b,2024-07-15T13:00:34.853000 +CVE-2024-6073,0,1,17009fb08ee47dd70917764152509e83797e321e03fff267639abcfeb7cfb7e3,2024-07-15T13:00:34.853000 +CVE-2024-6074,0,1,f4eb9123ca6898ddca838aa668fe35c26275d698c88a205d0b4120ce21b1448a,2024-07-15T13:00:34.853000 +CVE-2024-6075,0,1,422eba84dabf7b4e778178d5896fdaeab90026f192e077a30b9d723db2f0f49a,2024-07-15T13:00:34.853000 +CVE-2024-6076,0,1,4b91d4805a095745bcd00ccf99e9f369678f51f36f672bc6db43419095d1b007,2024-07-15T13:00:34.853000 CVE-2024-6080,0,0,9ad80ebfe8b856e46a0a6652807c607b3ca5adc92bd23988173663f4819ac96b,2024-06-20T20:15:20.583000 CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000 CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000 @@ -256840,7 +256841,7 @@ CVE-2024-6285,0,0,4aa94975a6bb5a18c805d5376b856037574bf8fee823086f9b7bc28590de93 CVE-2024-6286,0,0,4253fb96346a1918be0a28cd65e6b1adc5e77be00b8a52085fa48d544178b784,2024-07-11T15:06:34.997000 CVE-2024-6287,0,0,33eb3fdec1ded4f76ac15192e7e8dad0a01f854eda2aab0f753cf76a946f89d3,2024-06-26T14:36:08.507000 CVE-2024-6288,0,0,9f80938a09fc40374e9bdf40ef0fae135802bf46d78932fb321a010e65edb615,2024-06-28T10:27:00.920000 -CVE-2024-6289,0,0,d13113d43fd31e25d4ff2d3026698f2c2a031832500174bf8951ae59406b9eb5,2024-07-15T06:15:02.413000 +CVE-2024-6289,0,1,7c9bbfba38701f43fea9c68bf83ec6250df7891d0da86b3e659d44be87e9561c,2024-07-15T13:00:34.853000 CVE-2024-6290,0,0,f38106d9e1179e3770e59e6eaa72c9e7b486c800903b3806d0d60fbc8ab354e0,2024-07-03T02:09:49.960000 CVE-2024-6291,0,0,fbd3e8c01e83f15387bec7fa3def7d60152486e2661a98df452a96f2d0c0973e,2024-07-03T02:09:50.740000 CVE-2024-6292,0,0,67575b31ef91584461fe54512334e761f8e74daed594248d12ac6ebaf52fad0d,2024-07-03T02:09:51.530000 @@ -256875,7 +256876,7 @@ CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac67050452 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 -CVE-2024-6345,0,0,443fca852f5a2d16d5229b74280cf9b11ec2cd856384f482ff01311f27e541b8,2024-07-15T01:15:01.730000 +CVE-2024-6345,0,1,26d2f90f0bb93b69c97213b43e75e7072dfc60d89cfab16c6d038c779e9eb4af,2024-07-15T13:00:34.853000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 @@ -256902,7 +256903,7 @@ CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9 CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede92f,2024-07-12T12:49:07.030000 CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 -CVE-2024-6398,0,0,25fc1d33676e0fa3de432d43eadf5fea86078aa0c43dc949452cf5d12d8387bd,2024-07-15T09:15:02.870000 +CVE-2024-6398,0,1,46dda7a5b4fe3cfc91f44f053e8ea205ce4ce2d1760fdb643ea6bf53ab588331,2024-07-15T13:00:34.853000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 @@ -256935,7 +256936,7 @@ CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000 CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000 -CVE-2024-6465,0,0,0415b7b4c4359615eae3ba0d01f828360cae0b63299db4354985b18b0f53c527,2024-07-13T12:15:10.797000 +CVE-2024-6465,0,1,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000 CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000 CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 @@ -256958,14 +256959,14 @@ CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818 CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000 CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 -CVE-2024-6540,0,1,048f946962d238ab989dc53a0defec06b3809bbcfafc1d2b844cdc543e9b59b2,2024-07-15T11:15:02.370000 +CVE-2024-6540,0,1,ae80e69879c516d55dfbe02503fe854b6ea2b3774bd5c69ce1915f3d1c5bb00e,2024-07-15T13:00:34.853000 CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce662,2024-07-12T17:01:48.353000 CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 -CVE-2024-6574,0,0,d74f9bce07b499b253bd85b2f4475d81f4c23cee79d551526c81d23d427be1f1,2024-07-13T06:15:05.587000 +CVE-2024-6574,0,1,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 @@ -257006,21 +257007,23 @@ CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18 CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000 CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000 CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000 -CVE-2024-6728,0,0,e183017f53cebadd8fd83fcd315bc6bb54392abb3d3fc4655226b62585a091c0,2024-07-14T01:15:01.940000 -CVE-2024-6729,0,0,fa42df8dffdc3aceaa852de6ae501e778aed5557b8af2eef2cc918445d4971ce,2024-07-14T02:15:02.117000 -CVE-2024-6730,0,0,1f06102f331be2f8c89ba0371b25dfc259847f3bd2a5119ede6d3559ac3922fd,2024-07-14T02:15:03.420000 -CVE-2024-6731,0,0,d6ba69c1ea993698458e5733cf77e9cacc16121fa3f39f895271abd5b9dc6d58,2024-07-14T22:15:02.937000 -CVE-2024-6732,0,0,bde41a2fcc8354eeb52edbf0114ead62bfa1203961bc0d02fd0fd13e365a1cf0,2024-07-14T23:15:01.973000 -CVE-2024-6733,0,0,f6cddf81529811a095e552fcd155206e33585e4ce7d8c11773c521ad8342041a,2024-07-14T23:15:02.290000 -CVE-2024-6734,0,0,35ad4713241fd28fed57d6774b45a15c31f59b9521c3c10965449a94e313a503,2024-07-15T00:15:01.913000 -CVE-2024-6735,0,0,2ce6ea351a72f35ea55b622e3da38c9e856fb1595dda134d5bbb7d1066f07849,2024-07-15T00:15:02.207000 -CVE-2024-6736,0,0,57a1a32ccb9f6b6a6149c214015712d5d3ba34f333734ff2da0c7ecac3d61292,2024-07-15T01:15:02.003000 -CVE-2024-6737,0,0,f2500b96f297496420e7886ea83e22aff04bfd00347c0b1eaba24891de9466bd,2024-07-15T03:15:03.027000 -CVE-2024-6738,0,0,e27688ef3b3d614037cacb67f4d62217d9173c59d93e584c34a0d8db8cd73967,2024-07-15T03:15:03.293000 -CVE-2024-6739,0,0,83c0c9385ad0d3a5719883ee07b3272617bbfdc33cd31f73be8ffe6dcd4ed7c7,2024-07-15T04:15:02.073000 -CVE-2024-6740,0,0,f1776e575f290e1e9c51c8817b26c1bcd138549f39f7d0b6988a456303cb5a29,2024-07-15T08:15:03.087000 -CVE-2024-6741,0,0,ce61236f475c8cb2330de9eb0f8f19023261d78e6914ca7ba52f1d56c2ae16fe,2024-07-15T09:15:03.117000 -CVE-2024-6742,0,0,2b86fba1f2a7157b39e546f75a5077c4dcdb952283c828feef9040f31be2c957,2024-07-15T06:15:02.497000 -CVE-2024-6743,0,0,580cbce1f6c54a5e1d2ac438ab4d8bc3712dd545bcde53caaa95a1c6974b6014,2024-07-15T07:15:25.310000 -CVE-2024-6744,0,0,0ec141a84dd42a7a4cb4f2a577390487ffba8667efdd2420530049dd41849a59,2024-07-15T07:15:25.573000 -CVE-2024-6745,1,1,3fd5fdab8b3b2e195918a110841677b890bd505e2b961f166224a0fc5ea27b17,2024-07-15T11:15:02.450000 +CVE-2024-6721,1,1,b4057e58e6305031dfa9a6eeff87222618102fe5e63e11855deba46f476c6cc1,2024-07-15T13:15:02.467000 +CVE-2024-6728,0,1,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000 +CVE-2024-6729,0,1,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000 +CVE-2024-6730,0,1,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000 +CVE-2024-6731,0,1,8b1bc197d6c83e4a15ec9bdc563f9a44e1ba36d3dc147d8b3dfa46c7f69ad895,2024-07-15T13:00:34.853000 +CVE-2024-6732,0,1,ac28e9a0508fc8dc150e02f5798f4bb306ba8a17e57e8047d772230217585286,2024-07-15T13:00:34.853000 +CVE-2024-6733,0,1,18a33bdfbd1590a52e854edce5b75cfa49380fcdce7cfa2be0277aed3c6345b6,2024-07-15T13:00:34.853000 +CVE-2024-6734,0,1,8b6d105ca4f42b59ee42d94922a6acf1442f87f5e4041b8929ad12d425870f9e,2024-07-15T13:00:34.853000 +CVE-2024-6735,0,1,9acae906b6151a5758bbc8dd374d62a7e07bf352957da31384b73247f81f53be,2024-07-15T13:00:34.853000 +CVE-2024-6736,0,1,58207aa17902b0bc6a6fa1e85120fac4b1e02a22ea40c4e600832ede05931b78,2024-07-15T13:00:34.853000 +CVE-2024-6737,0,1,52970e6676778303ed29e8596bdaebcf2e11123bfae38a5bc183bb484981ca83,2024-07-15T13:00:34.853000 +CVE-2024-6738,0,1,a5137ecbd3127f8598132ae72ef6eb0bc47a4988970159fabbd36918c0be3d91,2024-07-15T13:00:34.853000 +CVE-2024-6739,0,1,0d459007fcec97092b514395fc02bac63afdbd1ebdc66cb0925752186d2021ae,2024-07-15T13:00:34.853000 +CVE-2024-6740,0,1,f730f9c36a50b02d7befaed057481ea172287e736038c5585796e88f7565fd1a,2024-07-15T13:00:34.853000 +CVE-2024-6741,0,1,b79b37b238cd50da835ed0a026304117c198db84ec9f205daded4f74e448a08b,2024-07-15T13:00:34.853000 +CVE-2024-6742,0,1,8c2e2566aa858f8a9e83bd7ba100258a6b108757d1f7708f54ff943f7e7acd2b,2024-07-15T13:00:34.853000 +CVE-2024-6743,0,1,b5bdcf763424df0a669d5c15bdbbb7bec10bf081127f25ce533177712f64e56a,2024-07-15T13:00:34.853000 +CVE-2024-6744,0,1,020949a2024aa3b85b7509fdaf1fbd77d6aac4fbeecfbc8876f4d901482584cb,2024-07-15T13:00:34.853000 +CVE-2024-6745,0,1,707134dd0252b920cb08895baec52c5557bd805c744814b8ecb19c1d5a8e997c,2024-07-15T13:00:34.853000 +CVE-2024-6746,1,1,5be3956d6b4bf01a386e4ceaf78307e768b453c5db30b63143d293a79513dc46,2024-07-15T13:00:34.853000