diff --git a/CVE-2012/CVE-2012-05xx/CVE-2012-0507.json b/CVE-2012/CVE-2012-05xx/CVE-2012-0507.json index 921afee02d1..da5375020f8 100644 --- a/CVE-2012/CVE-2012-05xx/CVE-2012-0507.json +++ b/CVE-2012/CVE-2012-05xx/CVE-2012-0507.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-07T22:55:17.883", "lastModified": "2022-05-13T14:52:56.053", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html 'Applies to client deployments of Java. This vulnerability can be exploited only through Untrusted Java Web Start applications and Untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)'", "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-24", diff --git a/CVE-2012/CVE-2012-50xx/CVE-2012-5076.json b/CVE-2012/CVE-2012-50xx/CVE-2012-5076.json index 86f67c8d0a0..459b5933b3f 100644 --- a/CVE-2012/CVE-2012-50xx/CVE-2012-5076.json +++ b/CVE-2012/CVE-2012-50xx/CVE-2012-5076.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-10-16T21:55:02.073", "lastModified": "2017-09-19T01:35:25.370", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html\r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\"", "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", diff --git a/CVE-2013/CVE-2013-04xx/CVE-2013-0422.json b/CVE-2013/CVE-2013-04xx/CVE-2013-0422.json index 657e8070d3e..35181aca291 100644 --- a/CVE-2013/CVE-2013-04xx/CVE-2013-0422.json +++ b/CVE-2013/CVE-2013-04xx/CVE-2013-0422.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2013-01-10T21:55:00.777", "lastModified": "2014-02-21T04:56:53.360", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "evaluatorImpact": "Per: http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html\r\n\r\n'Note: JDK and JRE 6, 5.0 and 1.4.2, and Java SE Embedded JRE releases are not affected.'", "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", diff --git a/CVE-2013/CVE-2013-04xx/CVE-2013-0431.json b/CVE-2013/CVE-2013-04xx/CVE-2013-0431.json index 360d1c944cf..bab9b9522d8 100644 --- a/CVE-2013/CVE-2013-04xx/CVE-2013-0431.json +++ b/CVE-2013/CVE-2013-04xx/CVE-2013-0431.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2013-01-31T14:55:01.327", "lastModified": "2017-09-19T01:35:40.247", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html\r\n\r\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through untrusted Java Web Start applications and untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\"", "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", diff --git a/CVE-2013/CVE-2013-24xx/CVE-2013-2423.json b/CVE-2013/CVE-2013-24xx/CVE-2013-2423.json index 35824427719..ddf5a792877 100644 --- a/CVE-2013/CVE-2013-24xx/CVE-2013-2423.json +++ b/CVE-2013/CVE-2013-24xx/CVE-2013-2423.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2013-04-17T18:55:07.087", "lastModified": "2017-09-19T01:36:17.280", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cisaExploitAdd": "2022-05-25", "cisaActionDue": "2022-06-15", "cisaRequiredAction": "Apply updates per vendor instructions.", diff --git a/CVE-2013/CVE-2013-24xx/CVE-2013-2465.json b/CVE-2013/CVE-2013-24xx/CVE-2013-2465.json index 29537ecb4be..3288c1ce6ba 100644 --- a/CVE-2013/CVE-2013-24xx/CVE-2013-2465.json +++ b/CVE-2013/CVE-2013-24xx/CVE-2013-2465.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2013-06-18T22:55:02.807", "lastModified": "2022-05-13T14:52:56.247", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html\r\n\r\n'Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.'", "cisaExploitAdd": "2022-03-28", "cisaActionDue": "2022-04-18", diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25160.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25160.json index 17dc3d32f62..d1f588c2e6d 100644 --- a/CVE-2019/CVE-2019-251xx/CVE-2019-25160.json +++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T18:15:06.930", "lastModified": "2024-02-26T22:10:40.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25162.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25162.json index b329d646e7c..c95cc13bc5d 100644 --- a/CVE-2019/CVE-2019-251xx/CVE-2019-25162.json +++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T18:15:07.043", "lastModified": "2024-02-26T22:10:40.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36775.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36775.json index 0aae4f7bcb4..a3e32b49ceb 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36775.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36775.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T18:15:07.103", "lastModified": "2024-02-26T22:10:40.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46904.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46904.json index 56774103db2..a4339c604a9 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46904.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46904.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:45.260", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46905.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46905.json index 87db7e4e529..97c2cfd26f3 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46905.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46905.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:45.367", "lastModified": "2024-04-04T14:15:08.703", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46906.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46906.json index bb137c52a4e..64ad94a141f 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46906.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T18:15:07.160", "lastModified": "2024-02-26T22:10:40.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46908.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46908.json index 49d6ce7bfd8..4a0ce6717b6 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46908.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46908.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T07:15:06.977", "lastModified": "2024-02-27T14:20:06.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46909.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46909.json index f6ec3e50a81..53c7424e67a 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46909.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46909.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T07:15:07.130", "lastModified": "2024-02-27T14:20:06.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46910.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46910.json index 2c4f2fd4855..5a2623c29bd 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46910.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46910.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T07:15:07.307", "lastModified": "2024-02-27T14:20:06.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46912.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46912.json index efdda7985c4..9b644dc6340 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46912.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46912.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T07:15:07.613", "lastModified": "2024-02-27T14:20:06.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44633.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44633.json index bac5a360dbe..587df390c1e 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44633.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44633.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in YITH YITH WooCommerce Gift Cards Premium.This issue affects YITH WooCommerce Gift Cards Premium: from n/a through 3.23.1.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en YITH YITH WooCommerce Gift Cards Premium. Este problema afecta a YITH WooCommerce Gift Cards Premium: desde n/a hasta 3.23.1." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47604.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47604.json index 4fe9ecbef82..e212d16ac68 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47604.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47604.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in junkcoder, ristoniinemets AJAX Thumbnail Rebuild.This issue affects AJAX Thumbnail Rebuild: from n/a through 1.13.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en junkcoder, ristoniinemets AJAX Thumbnail Rebuild. Este problema afecta a AJAX Thumbnail Rebuild: desde n/a hasta 1.13." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json index 2ec16107234..ce7fb52e18c 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48626.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:45.720", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4965.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4965.json index 0d3d7a0bd59..075d45654c1 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4965.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4965.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Invitation Code Content Restriction Plugin from CreativeMinds plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018target_id\u2019 parameter in all versions up to, and including, 1.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Invitation Code Content Restriction Plugin from CreativeMinds para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'target_id' en todas las versiones hasta la 1.5.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27607.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27607.json index 6364463d11c..45a7da2bf32 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27607.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27607.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in WP Swings Points and Rewards for WooCommerce.This issue affects Points and Rewards for WooCommerce: from n/a through 1.5.0.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en WP Swings Points and Rewards para WooCommerce. Este problema afecta a Points and Rewards for WooCommerce: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2794.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2794.json index 36ee8833849..049ce8a59ce 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2794.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2794.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_deliver() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decode_submit(), but it was forgotten in decode_deliver()." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en ofono, una telefon\u00eda de c\u00f3digo abierto en Linux. Se activa un error de desbordamiento de pila dentro de la funci\u00f3n decode_deliver() durante la decodificaci\u00f3n de SMS. Se supone que se puede acceder al escenario del ataque desde un m\u00f3dem comprometido, una estaci\u00f3n base maliciosa o simplemente un SMS. Hay una verificaci\u00f3n vinculada para esta longitud de memcpy en decode_submit(), pero se olvid\u00f3 en decode_deliver()." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json index be7a8e9e258..1fbe369cd4e 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32295.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Alex Tselegidis Easy!Appointments.This issue affects Easy!Appointments: from n/a through 1.3.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Alex Tselegidis Easy!Appointments. Este problema afecta a Easy!Appointments: desde n/a hasta 1.3.2." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json index 4aa458ff04d..fbce55ad91e 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009." + }, + { + "lang": "es", + "value": "La caracter\u00edstica PKCS#11 en ssh-agent en OpenSSH anterior a 9.3p2 tiene una ruta de b\u00fasqueda insuficientemente confiable, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo si un agente se reenv\u00eda a un sistema controlado por un atacante. (El c\u00f3digo en /usr/lib no es necesariamente seguro para cargar en ssh-agent). NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2016-10009." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40148.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40148.json index f2d12906e9d..f1f648eed3d 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40148.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40148.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Server-side request forgery (SSRF) in PingFederate allows unauthenticated http requests to attack network resources and consume server-side resources via forged HTTP POST requests.\n" + }, + { + "lang": "es", + "value": "Server-Side Request Forgery (SSRF) en PingFederate permite que las solicitudes http no autenticadas ataquen recursos de la red y consuman recursos del lado del servidor a trav\u00e9s de solicitudes HTTP POST falsificadas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41677.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41677.json index 2b902dff644..d28e3147209 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41677.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41677.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows attacker to execute unauthorized code or commands via targeted social engineering attack" + }, + { + "lang": "es", + "value": "Credenciales insuficientemente protegidas en Fortinet FortiProxy 7.4.0, 7.2.0 a 7.2.6, 7.0.0 a 7.0.12, 2.0.0 a 2.0.13, 1.2.0 a 1.2.13, 1.1.0 a 1.1.6 , 1.0.0 a 1.0.7, Fortinet FortiOS 7.4.0 a 7.4.1, 7.2.0 a 7.2.6, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14, 6.2.0 a 6.2.15 , 6.0.0 a 6.0.17 permite al atacante ejecutar c\u00f3digo o comandos no autorizados mediante un ataque de ingenier\u00eda social dirigido" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json index 1aaef820e68..97234a6c886 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45590.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website" + }, + { + "lang": "es", + "value": "Un control inadecuado de la generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\") en Fortinet FortiClientLinux versi\u00f3n 7.2.0, 7.0.6 a 7.0.10 y 7.0.3 a 7.0.4 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados enga\u00f1ando a un usuario de FortiClientLinux para que visitar un sitio web malicioso" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json index 9fdedb69ac4..f3b4906b47d 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47540.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.0.5 through 3.0.7 may allows attacker to execute unauthorized code or commands via CLI." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.2 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.5 y 3.2.0 a trav\u00e9s 3.2.4 y 3.0.5 a 3.0.7 pueden permitir a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de CLI." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json index 7d27903a146..ed62c47b2cd 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47541.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 and 2.3.0 through 2.3.3 and 2.2.0 through 2.2.2 and 2.1.0 through 2.1.3 and 2.0.0 through 2.0.3 allows attacker to execute unauthorized code or commands via CLI." + }, + { + "lang": "es", + "value": "Una limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"path traversal\") en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.2 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.5 y 3.2.0 a 3.2. 4 y 3.1.0 a 3.1.5 y 3.0.0 a 3.0.7 y 2.5.0 a 2.5.2 y 2.4.0 a 2.4.1 y 2.3.0 a 2.3.3 y 2.2.0 a 2.2.2 y 2.1.0 a 2.1.3 y 2.0.0 a 2.0.3 permiten a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de CLI." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json index 56fbd081d71..30ac301f198 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47542.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A improper neutralization of special elements used in a template engine [CWE-1336] in FortiManager versions 7.4.1 and below, versions 7.2.4 and below, and 7.0.10 and below allows attacker to execute unauthorized code or commands via specially crafted templates." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un motor de plantillas [CWE-1336] en FortiManager versiones 7.4.1 e inferiores, versiones 7.2.4 e inferiores, y 7.0.10 e inferiores permite al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de plantillas especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json index ff37de1b75a..7876109104f 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48724.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de corrupci\u00f3n de memoria en la funcionalidad de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una solicitud HTTP POST especialmente manipulada puede provocar una denegaci\u00f3n de servicio de la interfaz web del dispositivo. Un atacante puede enviar una solicitud HTTP POST no autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json index bd5b823dd35..c4934af8dc1 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48784.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A\u00a0use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and below, version 7.2.7 and below, version 7.0.14 and below, version 6.4.15 and below command line interface may allow a local\u00a0privileged attacker with super-admin profile and CLI access\u00a0to execute arbitrary code or commands via specially crafted requests." + }, + { + "lang": "es", + "value": "El uso de una vulnerabilidad de cadena de formato controlada externamente [CWE-134] en FortiOS versi\u00f3n 7.4.1 e inferior, versi\u00f3n 7.2.7 e inferior, versi\u00f3n 7.0.14 e inferior, versi\u00f3n 6.4.15 e inferior, la interfaz de l\u00ednea de comando puede permitir una interfaz de l\u00ednea de comando local. Atacante privilegiado con perfil de superadministrador y acceso CLI para ejecutar c\u00f3digo o comandos arbitrarios a trav\u00e9s de solicitudes especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json index 5bccbe3430c..91b574e1bc5 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49074.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A denial of service vulnerability exists in the TDDP functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of network requests can lead to reset to factory settings. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad TDDP del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes de red especialmente manipuladas pueden provocar el restablecimiento de la configuraci\u00f3n de f\u00e1brica. Un atacante puede enviar una secuencia de paquetes no autenticados para desencadenar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json index 244c94ed4f7..796e7959fae 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49133.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comando en la funcionalidad tddpd enable_test_mode del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 compilaci\u00f3n 20220926 y el punto de acceso inal\u00e1mbrico Tp-Link N300 (EAP115 V4) v5.0.4 compilaci\u00f3n 20220216. Una serie de solicitudes de red especialmente manipuladas pueden conducir a la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede enviar una secuencia de paquetes no autenticados para desencadenar esta vulnerabilidad. Esta vulnerabilidad afecta a \"uclited\" en el EAP225(V3) 5.1.0 Build 20220926 del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico AC1350." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json index b8f987d04cd..c6f0d4125ba 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49134.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comando en la funcionalidad tddpd enable_test_mode del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 compilaci\u00f3n 20220926 y el punto de acceso inal\u00e1mbrico Tp-Link N300 (EAP115 V4) v5.0.4 compilaci\u00f3n 20220216. Una serie de solicitudes de red especialmente manipuladas pueden conducir a la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede enviar una secuencia de paquetes no autenticados para desencadenar esta vulnerabilidad. Esta vulnerabilidad afecta a \"uclited\" en el EAP115(V4) 5.0.4 Build 20220216 del punto de acceso Gigabit inal\u00e1mbrico N300." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json index fbe74ad056d..ac3db5d0e23 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49906.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x0045ab7c` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `ssid` en el desplazamiento `0x0045ab7c` del binario `httpd_portal` enviado con v5.1.0 Build 20220926 de EAP225." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json index 8f6619cff60..ea65a992237 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49907.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x0045aad8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `band` en el desplazamiento `0x0045aad8` del binario `httpd_portal` incluido con la versi\u00f3n 5.1.0 Build 20220926 de EAP225." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json index 95e0610be50..0fb01d9976f 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49908.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `profile` en el desplazamiento `0x0045abc8` del binario `httpd_portal` incluido con la versi\u00f3n 5.1.0 Build 20220926 de EAP225." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json index f91bab7e212..f76a1f34c14 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49909.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x0045ab38` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `action` en el desplazamiento `0x0045ab38` del binario `httpd_portal` incluido con la versi\u00f3n 5.1.0 Build 20220926 de EAP225." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json index f9e3ad9b844..4513dba497c 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49910.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x42247c` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `ssid` en el desplazamiento `0x42247c` del binario `httpd` enviado con la versi\u00f3n 5.0.4 Build 20220216 del EAP115." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json index e6a7c722766..01ec926b670 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49911.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x422420` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `band` en el desplazamiento `0x422420` del binario `httpd` incluido con la versi\u00f3n 5.0.4 Build 20220216 de EAP115." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json index e733bfd09f2..49f3a3cc3bf 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49912.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x4224b0` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `profile` en el desplazamiento `0x4224b0` del binario `httpd` enviado con v5.0.4 Build 20220216 de EAP115." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json index 893db8f9b18..8802849155e 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49913.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x422448` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la funcionalidad de programaci\u00f3n de radio de la interfaz web del punto de acceso Gigabit MU-MIMO inal\u00e1mbrico Tp-Link AC1350 (EAP225 V3) v5.1.0 Build 20220926. Una serie de solicitudes HTTP especialmente manipuladas pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad se refiere espec\u00edficamente al desbordamiento que se produce a trav\u00e9s del par\u00e1metro `action` en el desplazamiento `0x422448` del binario `httpd` enviado con la versi\u00f3n 5.0.4 Build 20220216 de EAP115." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50347.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50347.json index 5f0104c0077..0746a77e786 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50347.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50347.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "HCL DRYiCE MyXalytics is impacted by an insecure SQL interface vulnerability, potentially giving an attacker the ability to execute custom SQL queries. A malicious user can run arbitrary SQL commands including changing system configuration.\n" + }, + { + "lang": "es", + "value": "HCL DRYiCE MyXalytics se ve afectado por una vulnerabilidad de interfaz SQL insegura, que potencialmente le brinda a un atacante la capacidad de ejecutar consultas SQL personalizadas. Un usuario malintencionado puede ejecutar comandos SQL arbitrarios, incluido cambiar la configuraci\u00f3n del sistema." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json index 1abf0a59a83..67219d91e3c 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52070.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFreeChart v1.5.4 era vulnerable a ArrayIndexOutOfBounds mediante el m\u00e9todo 'setSeriesNeedle(int index, int type)'. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad. Es posible que la presentaci\u00f3n se haya basado en una herramienta que no es lo suficientemente s\u00f3lida para la identificaci\u00f3n de vulnerabilidades." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json index f96647fe9e7..647ad04ddf4 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52235.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "SpaceX Starlink Wi-Fi router GEN 2 before 2023.53.0 and Starlink Dish before 07dd2798-ff15-4722-a9ee-de28928aed34 allow CSRF (e.g., for a reboot) via a DNS Rebinding attack." + }, + { + "lang": "es", + "value": "El router Wi-Fi SpaceX Starlink GEN 2 anterior a 2023.53.0 y Starlink Dish anterior a 07dd2798-ff15-4722-a9ee-de28928aed34 permiten CSRF (por ejemplo, para un reinicio) a trav\u00e9s de un ataque de reenlace de DNS." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json index fba1484b1d9..4f578639c8d 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T13:15:08.140", "lastModified": "2024-04-04T14:15:09.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json index 666630e6170..71cb58d68e8 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T21:15:08.060", "lastModified": "2024-02-20T21:52:55.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52442.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52442.json index d7dc99b5cda..846dfb41578 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52442.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52442.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T08:15:45.547", "lastModified": "2024-02-22T19:07:27.197", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52453.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52453.json index 9a5f3905204..d6027913951 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52453.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.083", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52454.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52454.json index d6321527e48..6a7e25c1e91 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52454.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52454.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.137", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52455.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52455.json index 16d19f78657..c2247b3509f 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52455.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52455.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.193", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52456.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52456.json index 1798fa53329..65a51d245df 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52456.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.237", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52457.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52457.json index d8bc318fb13..b7282ab7317 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52457.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52457.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.290", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52459.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52459.json index cf6d923caff..1123d8d87bc 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52459.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52459.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.387", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52460.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52460.json index e3529a3a232..3d7cccc1bdb 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52460.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52460.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.440", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52461.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52461.json index 609ea5ea7b4..b620e6145f9 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52461.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52461.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.490", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52462.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52462.json index 9d976bdc7e9..c8253103544 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52462.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52462.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.540", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52463.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52463.json index aa76ea70817..1ee300cfb3d 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52463.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.590", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json index bd1415e0761..6c5eb553b9a 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.647", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52465.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52465.json index fb396df8f85..5c2c95fc2a2 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52465.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52465.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.537", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52467.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52467.json index 9757ed0506a..ede32fe8dc1 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52467.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52467.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.657", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52468.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52468.json index f4a191c9913..1228eeb8068 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52468.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.710", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json index 25f4aaed646..ad4ad6942d4 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.767", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json index 2b9dca3a342..457519d3ed5 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.820", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52471.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52471.json index 07826ee0407..b219bfb8abb 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52471.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.877", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52472.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52472.json index fea86ac8757..493056234a7 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52472.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.930", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52473.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52473.json index 27d1af50d01..36ccd69bc3a 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52473.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.977", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52474.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52474.json index 8b7f30b468a..395f520197e 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52474.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52474.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T18:15:07.237", "lastModified": "2024-02-26T22:10:40.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6236.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6236.json index ecea8fa722b..24036e237d5 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6236.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6236.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A flaw was found in JBoss EAP. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new \"provider-url\" option in addition to the \"realm\" option." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en JBoss EAP. Cuando una aplicaci\u00f3n OIDC que atiende a varios inquilinos intenta acceder al segundo inquilino, deber\u00eda solicitarle al usuario que inicie sesi\u00f3n nuevamente, ya que el segundo inquilino est\u00e1 protegido con una configuraci\u00f3n OIDC diferente. El problema subyacente est\u00e1 en OidcSessionTokenStore al determinar si se debe utilizar o no un token almacenado en cach\u00e9. Esta l\u00f3gica debe actualizarse para tener en cuenta la nueva opci\u00f3n \"proveedor-url\" adem\u00e1s de la opci\u00f3n \"realm\"." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json index 81ed0a393f1..f0381f29d7b 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6317.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A prompt bypass exists in the secondscreen.gateway service running on webOS version 4 through 7. An attacker can create a privileged account without asking the user for the security PIN.\u00a0\n\nFull versions and TV models affected:\n\nwebOS 4.9.7 - 5.30.40 running on LG43UM7000PLA \nwebOS 5.5.0 - 04.50.51 running on OLED55CXPUA \nwebOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB \u00a0\nwebOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA \n" + }, + { + "lang": "es", + "value": "Existe una omisi\u00f3n r\u00e1pida en el servicio secondscreen.gateway que se ejecuta en webOS versi\u00f3n 4 a 7. Un atacante puede crear una cuenta privilegiada sin pedirle al usuario el PIN de seguridad. Versiones completas y modelos de TV afectados: webOS 4.9.7 - 5.30.40 ejecut\u00e1ndose en LG43UM7000PLA webOS 5.5.0 - 04.50.51 ejecut\u00e1ndose en OLED55CXPUA webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 ejecut\u00e1ndose en OLED48C1PUB webOS 7.3. 1-43 (mullet-mebin) - 33.03.85 ejecut\u00e1ndose en OLED55A23LA" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json index 772d5891929..b5f669f03de 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6318.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A command injection vulnerability exists in the processAnalyticsReport\u00a0method from the com.webos.service.cloudupload\u00a0service on webOS version 5 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.\n\nFull versions and TV models affected:\n\n * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA\u00a0\n\n * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB\u00a0\n\n * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA\n\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00e9todo ProcessAnalyticsReport del servicio com.webos.service.cloudupload en webOS versi\u00f3n 5 a 7. Una serie de solicitudes especialmente manipuladas pueden llevar a la ejecuci\u00f3n de comandos como usuario ra\u00edz. Un atacante puede realizar solicitudes autenticadas para desencadenar esta vulnerabilidad. Versiones completas y modelos de TV afectados: * webOS 5.5.0 - 04.50.51 ejecut\u00e1ndose en OLED55CXPUA * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 ejecut\u00e1ndose en OLED48C1PUB * webOS 7.3.1-43 (mullet-mebin) - 33.03.85 ejecut\u00e1ndose en OLED55A23LA" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json index ca928b91cfb..652a98fe99d 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6319.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A command injection vulnerability exists in the getAudioMetadata\u00a0method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.\n\n * webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA\u00a0\n\n * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA\u00a0\n\n * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB\u00a0\n\n * webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA\n\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00e9todo getAudioMetadata del servicio com.webos.service.attachedstoragemanager en webOS versi\u00f3n 4 a 7. Una serie de solicitudes especialmente manipuladas pueden llevar a la ejecuci\u00f3n de comandos como usuario root. Un atacante puede realizar solicitudes autenticadas para desencadenar esta vulnerabilidad. * webOS 4.9.7 - 5.30.40 ejecut\u00e1ndose en LG43UM7000PLA * webOS 5.5.0 - 04.50.51 ejecut\u00e1ndose en OLED55CXPUA * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 ejecut\u00e1ndose en OLED48C1PUB * webOS 7.3.1-43 (mullet-mebin) - 33.03.85 ejecut\u00e1ndose en OLED55A23LA" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json index cd261047901..9f87dcdf56c 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6320.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A command injection vulnerability exists in the com.webos.service.connectionmanager/tv/setVlanStaticAddress endpoint on webOS versions 5 and 6. A series of specially crafted requests can lead to command execution as the dbus user. An attacker can make authenticated requests to trigger this vulnerability.\n\nFull versions and TV models affected:\n * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA\u00a0\n\n * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB\n\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el endpoint com.webos.service.connectionmanager/tv/setVlanStaticAddress en las versiones 5 y 6 de webOS. Una serie de solicitudes especialmente manipuladas pueden conducir a la ejecuci\u00f3n de comandos como usuario de dbus. Un atacante puede realizar solicitudes autenticadas para desencadenar esta vulnerabilidad. Versiones completas y modelos de TV afectados: * webOS 5.5.0 - 04.50.51 ejecut\u00e1ndose en OLED55CXPUA * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 ejecut\u00e1ndose en OLED48C1PUB" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6385.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6385.json index 5c809c79246..f3d356493b7 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6385.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6385.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WordPress Ping Optimizer WordPress plugin through 2.35.1.3.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks such as clearing logs." + }, + { + "lang": "es", + "value": "El complemento WordPress Ping Optimizer hasta la versi\u00f3n 2.35.1.3.0 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF, como borrar registros." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json index 31503152c3b..c45d41a22e1 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Spectra \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom CSS metabox in all versions up to and including 2.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Spectra \u2013 WordPress Gutenberg Blocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del metabox CSS personalizado en todas las versiones hasta la 2.10.3 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6522.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6522.json index 2ef2e7dc0de..c4ce7dcb588 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6522.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6522.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Privilege Management vulnerability in ExtremePacs Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3914.\n\n" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en ExtremePacs Extreme XDS permite recopilar datos proporcionados por los usuarios. Este problema afecta a Extreme XDS: antes de 3914." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6523.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6523.json index dd3a5619bf7..13e6207d0dd 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6523.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6523.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Authorization Bypass Through User-Controlled Key vulnerability in ExtremePacs Extreme XDS allows Authentication Abuse.This issue affects Extreme XDS: before 3914.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de clave controlada por el usuario en ExtremePacs Extreme XDS permite el abuso de autenticaci\u00f3n. Este problema afecta a Extreme XDS: antes de 3914." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6694.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6694.json index cde5008c331..79f81211071 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6694.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6694.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Themer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.4.9 due to insufficient input sanitization and output escaping on user supplied custom fields. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Themer para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 1.4.9 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los campos personalizados proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6695.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6695.json index 5d96039d5b4..842e2546c95 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6695.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6695.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Themer plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the 'wpbb' shortcode. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including arbitrary user_meta values." + }, + { + "lang": "es", + "value": "El complemento Beaver Themer para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.4.9 incluida a trav\u00e9s del c\u00f3digo corto 'wpbb'. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, extraigan datos confidenciales, incluidos valores user_meta arbitrarios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6777.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6777.json index db7218f53f2..25faa381dfb 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6777.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6777.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 9.0.34 due to the plugin adding the API key to several plugin files. This makes it possible for unauthenticated attackers to obtain the developer's Google API key. While this does not affect the security of sites using this plugin, it allows unauthenticated attackers to make requests using this API key with the potential of exhausting requests resulting in an inability to use the map functionality offered by the plugin." + }, + { + "lang": "es", + "value": "El complemento WP Go Maps (anteriormente WP Google Maps) para WordPress es vulnerable a la divulgaci\u00f3n de claves API no autenticadas en versiones hasta la 9.0.34 incluida debido a que el complemento agrega la clave API a varios archivos de complemento. Esto hace posible que atacantes no autenticados obtengan la clave API de Google del desarrollador. Si bien esto no afecta la seguridad de los sitios que utilizan este complemento, permite a atacantes no autenticados realizar solicitudes utilizando esta clave API con el potencial de agotar las solicitudes, lo que resulta en la imposibilidad de utilizar la funcionalidad de mapas que ofrece el complemento." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6799.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6799.json index b716a9f21f0..4cbeda83d24 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6799.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6799.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Reset \u2013 Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.99 via the use of insufficiently random snapshot names. This makes it possible for unauthenticated attackers to extract sensitive data including site backups by brute-forcing the snapshot filenames." + }, + { + "lang": "es", + "value": "El complemento WP Reset \u2013 Most Advanced WordPress Reset Tool de WordPress para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.99 incluida mediante el uso de nombres de instant\u00e1neas insuficientemente aleatorios. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluidas las copias de seguridad del sitio, mediante la fuerza bruta de los nombres de los archivos de las instant\u00e1neas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json index f419ff3afb2..a1b4676c56e 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.26 via the 'kadence_import_get_new_connection_data' AJAX action. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks de Kadence Blocks \u2013 Page Builder Features para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 3.1.26 incluida a trav\u00e9s de la acci\u00f3n AJAX 'kadence_import_get_new_connection_data'. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y pueden usarse para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json index 996a20f46c2..37166665c17 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Pods \u2013 Custom Content Types and Fields plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This is due to the fact that the plugin allows the use of a file inclusion feature via shortcode. This makes it possible for authenticated attackers, with contributor access or higher, to create pods and users (with default role)." + }, + { + "lang": "es", + "value": "El complemento Pods \u2013 Custom Content Types and Fields para WordPress es vulnerable a la falta de autorizaci\u00f3n en todas las versiones hasta la 3.0.10 incluida (con la excepci\u00f3n de 2.7.31.2, 2.8.23.2, 2.9.19.2). Esto se debe al hecho de que el complemento permite el uso de una funci\u00f3n de inclusi\u00f3n de archivos mediante un c\u00f3digo corto. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, creen pods y usuarios (con rol predeterminado)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json index 71d1971c545..ca250d7c9dc 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Pods \u2013 Custom Content Types and Fields plugin for WordPress is vulnerable to SQL Injection via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor level access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Pods \u2013 Custom Content Types and Fields para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de un c\u00f3digo corto en todas las versiones hasta la 3.0.10 incluida (con la excepci\u00f3n de 2.7.31.2, 2.8.23.2, 2.9.19.2) debido a una insuficiencia escape en el par\u00e1metro proporcionado por el usuario y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador o superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6993.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6993.json index 2c8255a8234..d8ec3ff42a9 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6993.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6993.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Custom post types, Custom Fields & more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode and custom post meta in all versions up to, and including, 5.0.4 due to insufficient input sanitization and output escaping on user supplied post meta values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Custom post types, Custom Fields & more para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado del complemento y meta de publicaciones personalizadas en todas las versiones hasta la 5.0.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los metavalores de publicaci\u00f3n proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json index 5e3578ed0fe..e9bf0934c71 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Pods \u2013 Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server." + }, + { + "lang": "es", + "value": "El complemento Pods \u2013 Custom Content Types and Fields para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo mediante c\u00f3digo corto en todas las versiones hasta la 3.0.10 incluida (con la excepci\u00f3n de 2.7.31.2, 2.8.23.2, 2.9.19.2). Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador o superior, ejecuten c\u00f3digo en el servidor." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7046.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7046.json index 6ca78c66e8d..981bb57bcd8 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7046.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7046.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Encryption \u2013 One Click Free SSL Certificate & SSL / HTTPS Redirect to Force HTTPS, SSL Score plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.0 via exposed Private key files. This makes it possible for unauthenticated attackers to extract sensitive data including TLS Certificate Private Keys" + }, + { + "lang": "es", + "value": "El complemento WP Encryption \u2013 One Click Free SSL Certificate & SSL / HTTPS Redirect to Force HTTPS, SSL Score para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 7.0 incluida a trav\u00e9s de archivos de clave privada expuestos. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluidas las claves privadas del certificado TLS." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json index 4fa10d24e7e..cd2cbfede02 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7164.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The BackWPup WordPress plugin before 4.0.4 does not prevent visitors from leaking key information about ongoing backups, allowing unauthenticated attackers to download backups of a site's database." + }, + { + "lang": "es", + "value": "El complemento BackWPup de WordPress anterior a 4.0.4 no impide que los visitantes filtren informaci\u00f3n clave sobre las copias de seguridad en curso, lo que permite a atacantes no autenticados descargar copias de seguridad de la base de datos de un sitio." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0159.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0159.json index 982308cc29b..1d9e88bf3e2 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0159.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0159.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system." + }, + { + "lang": "es", + "value": "Dell Alienware Command Center, versiones 5.5.52.0 y anteriores, contienen una vulnerabilidad de control de acceso inadecuado que provoca una denegaci\u00f3n de servicio en el sistema local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0376.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0376.json index e9a5252abb1..cc27450fe03 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0376.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0376.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Wrapper Link Widget in all versions up to, and including, 4.10.16 due to insufficient input sanitization and output escaping on user supplied URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Premium Addons for Elementor para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del widget Wrapper Link del complemento en todas las versiones hasta la 4.10.16 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en las URL proporcionadas por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json index c66dd16dddc..36ecac63f3e 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0588.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Paid Memberships Pro \u2013 Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.12.10. This is due to missing nonce validation on the pmpro_lifter_save_streamline_option() function. This makes it possible for unauthenticated attackers to enable the streamline setting with Lifter LMS via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Paid Memberships Pro \u2013 Content Restriction, User Registration, & Paid Subscriptions para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.12.10 incluida. Esto se debe a que falta la validaci\u00f3n nonce en la funci\u00f3n pmpro_lifter_save_streamline_option(). Esto hace posible que atacantes no autenticados habiliten la configuraci\u00f3n optimizada con Lifter LMS a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json index 751525a4594..d1c93f75111 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the contact form message settings in all versions up to and including 3.2.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This primarily affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks de Kadence Blocks \u2013 Page Builder Features para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de mensajes del formulario de contacto en todas las versiones hasta la 3.2.17 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de editor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto afecta principalmente a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0626.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0626.json index 57be3c28611..4ae76c0ed0c 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0626.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0626.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WooCommerce Clover Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callback_handler function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to mark orders as paid." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Clover Payment Gateway para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n callback_handler en todas las versiones hasta la 1.3.1 incluida. Esto hace posible que atacantes no autenticados marquen los pedidos como pagados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0662.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0662.json index 02b488f0c54..26d6bff8c37 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0662.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0662.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The FancyBox for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions 3.0.2 to 3.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento FancyBox for WordPress para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en las versiones 3.0.2 a 3.3.3 debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0826.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0826.json index e14f82c09bb..a0353479a7e 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0826.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0826.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 1.6.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Qi Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets del complemento en todas las versiones hasta la 1.6.7 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0872.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0872.json index 027d97e67b1..93ab9661710 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0872.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0872.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Watu Quiz plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.1 via the watu-userinfo shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to extract sensitive user meta data which can include session tokens and user emails." + }, + { + "lang": "es", + "value": "El complemento Watu Quiz para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.4.1 incluida a trav\u00e9s del c\u00f3digo corto watu-userinfo. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan metadatos confidenciales de los usuarios que pueden incluir tokens de sesi\u00f3n y correos electr\u00f3nicos de los usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0873.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0873.json index 0f832ef5002..6a08245e9e8 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0873.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0873.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Watu Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'watu-basic-chart' shortcode in all versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Watu Quiz para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'watu-basic-chart' del complemento en todas las versiones hasta la 3.4.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0899.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0899.json index 276baa7068f..f40911e11d8 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0899.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0899.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The s2Member \u2013 Best Membership Plugin for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 230815 via the API. This makes it possible for unauthenticated attackers to see the contents of those posts and pages." + }, + { + "lang": "es", + "value": "El complemento s2Member \u2013 Best Membership Plugin for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 230815 incluida a trav\u00e9s de la API. Esto hace posible que atacantes no autenticados vean el contenido de esas publicaciones y p\u00e1ginas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0952.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0952.json index 84490a0d1bc..30c1a4b7102 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0952.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0952.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting plugin for WordPress is vulnerable to time-based SQL Injection via the id parameter in all versions up to, and including, 1.12.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with accounting manager or admin privileges or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro id en todas las versiones hasta la 1.12.9 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con privilegios de administrador o administrador de contabilidad o superiores, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json index 788c4962ae9..3d70b6d5b85 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Radio \u2013 Worldwide Online Radio Stations Directory for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's settings in all versions up to, and including, 3.1.9 due to insufficient input sanitization and output escaping as well as insufficient access control on the settings. This makes it possible for authenticated attackers, with subscriber access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Radio \u2013 Worldwide Online Radio Stations Directory for WordPress para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n del complemento en todas las versiones hasta la 3.1.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes, as\u00ed como a una insuficiente control de acceso a la configuraci\u00f3n. Esto hace posible que atacantes autenticados, con acceso de suscriptor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json index 94c0e2587b2..928e1821bc1 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Radio \u2013 Worldwide Online Radio Stations Directory for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with subscriber access and above, to import radio stations, remove countries, and modify the plugin's settings, which can lead to Cross-Site Scripting, tracked separately in CVE-2024-1041." + }, + { + "lang": "es", + "value": "El complemento WP Radio \u2013 Worldwide Online Radio Stations Directory for WordPress para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones AJAX en todas las versiones hasta la 3.1.9 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor y superior, importen estaciones de radio, eliminen pa\u00edses y modifiquen la configuraci\u00f3n del complemento, lo que puede conducir a Cross-Site Scripting, rastreado por separado en CVE-2024-1041." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json index ec12faee47e..5cebbdc4cdd 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.6.3 due to missing validation on a user controlled key when looking up order information. This makes it possible for authenticated attackers to obtain information on orders placed by other users and guests, which can be leveraged to sign up for paid courses that were purchased by guests. Emails of other users are also exposed." + }, + { + "lang": "es", + "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a la referencia directa de objetos inseguros en todas las versiones hasta la 4.2.6.3 incluida debido a la falta de validaci\u00f3n en una clave controlada por el usuario al buscar informaci\u00f3n de pedido. Esto hace posible que los atacantes autenticados obtengan informaci\u00f3n sobre los pedidos realizados por otros usuarios e invitados, que pueden aprovecharse para inscribirse en cursos pagos que compraron los invitados. Tambi\u00e9n quedan expuestos los correos electr\u00f3nicos de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1308.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1308.json index 8f3428f5010..d0046347359 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1308.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1308.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WooCommerce Cloak Affiliate Links plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'permalink_settings_save' function in all versions up to, and including, 1.0.33. This makes it possible for unauthenticated attackers to modify the affiliate permalink base, driving traffic to malicious sites via the plugin's affiliate links." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Cloak Affiliate Links para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'permalink_settings_save' en todas las versiones hasta la 1.0.33 incluida. Esto hace posible que atacantes no autenticados modifiquen la base de enlaces permanentes de afiliados, dirigiendo el tr\u00e1fico a sitios maliciosos a trav\u00e9s de los enlaces de afiliados del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json index 77d2ed02f82..83dfe818e3b 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1315.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Classified Listing \u2013 Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing or incorrect nonce validation on the 'rtcl_update_user_account' function. This makes it possible for unauthenticated attackers to change the administrator user's password and email address via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This locks the administrator out of the site and prevents them from resetting their password, while granting the attacker access to their account." + }, + { + "lang": "es", + "value": "El complemento Classified Listing \u2013 Classified ads & Business Directory Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.0.4 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n 'rtcl_update_user_account'. Esto hace posible que atacantes no autenticados cambien la contrase\u00f1a y la direcci\u00f3n de correo electr\u00f3nico del usuario administrador a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto bloquea al administrador fuera del sitio y le impide restablecer su contrase\u00f1a, al tiempo que le otorga al atacante acceso a su cuenta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json index e9d6be51b53..c69f95ec00a 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1352.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Classified Listing \u2013 Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized access & modification of data due to a missing capability check on the rtcl_import_location() rtcl_import_category() functions in all versions up to, and including, 3.0.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to create terms." + }, + { + "lang": "es", + "value": "El complemento Classified Listing \u2013 Classified ads & Business Directory Plugin para WordPress es vulnerable al acceso no autorizado y a la modificaci\u00f3n de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones rtcl_import_location() rtcl_import_category() en todas las versiones hasta la 3.0.4 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, creen t\u00e9rminos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json index 06e2b90b50e..e85568cec80 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1387.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to insufficient authorization on the duplicate_thing() function in all versions up to, and including, 3.10.4. This makes it possible for attackers, with contributor-level access and above, to clone arbitrary posts (including private and password protected ones) which may lead to information exposure." + }, + { + "lang": "es", + "value": "El complemento Happy Addons for Elementor para WordPress es vulnerable al acceso no autorizado a los datos debido a una autorizaci\u00f3n insuficiente en la funci\u00f3n duplicate_thing() en todas las versiones hasta la 3.10.4 incluida. Esto hace posible que los atacantes, con acceso de nivel de colaborador y superior, clonen publicaciones arbitrarias (incluidas las privadas y protegidas con contrase\u00f1a), lo que puede provocar la exposici\u00f3n de la informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json index b58a79b61e4..77fa35752b5 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Memberpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018message\u2019 and 'error' parameters in all versions up to, and including, 1.11.26 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Note - the issue was partially patched in 1.11.25, but could still potentially be exploited under some circumstances." + }, + { + "lang": "es", + "value": "El complemento Memberpress para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s de los par\u00e1metros 'mensaje' y 'error' en todas las versiones hasta la 1.11.26 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace. Nota: el problema se solucion\u00f3 parcialmente en la versi\u00f3n 1.11.25, pero a\u00fan podr\u00eda explotarse en algunas circunstancias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1424.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1424.json index d3356cbdfea..343c720682e 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1424.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1424.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 3.5.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json index 81abf220f83..be1a30883cc 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1458.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018text_alignment\u2019 attribute of the Animated Text widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'text_alignment' del widget de texto animado en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json index f5b7c54c4a5..99f03e9cffc 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1461.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018style\u2019 attribute of the Team Members widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'estilo' del widget Miembros del equipo en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json index 639360318f8..618bd31629f 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Course, Lesson, and Quiz title and content in all versions up to, and including, 4.2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with LP Instructor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del t\u00edtulo y el contenido del curso, la lecci\u00f3n y el cuestionario en todas las versiones hasta la 4.2.6.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel LP Instructor, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json index ca65ee07795..21a77668f2c 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1464.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018style\u2019 attribute of the Posts Slider widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'estilo' del widget Control deslizante de publicaciones en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json index c8e7eeb8207..f4b9bcb7154 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1465.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018carousel_skin\u2019 attribute of the Posts Carousel widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'carousel_skin' del widget Posts Carousel en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json index 910207287a7..9f4a60413eb 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1466.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_style\u2019 attribute of the Posts Multislider widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-27986 may be a duplicate of this issue." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'slider_style' del widget Posts Multislider en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. CVE-2024-27986 puede ser un duplicado de este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json index 816f571abce..db40f124c1b 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A flaw was found in FreeIPA. This issue may allow a remote attacker to craft a HTTP request with parameters that can be interpreted as command arguments to kinit on the FreeIPA server, which can lead to a denial of service." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en FreeIPA. Este problema puede permitir a un atacante remoto crear una solicitud HTTP con par\u00e1metros que pueden interpretarse como argumentos de comando para kinit en el servidor FreeIPA, lo que puede provocar una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json index 5e7999f82b8..76d6fd34154 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1498.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Photo Stack Widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Photo Stack del complemento en todas las versiones hasta la 3.10.3 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1571.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1571.json index 89fe7283ddb..c55fe6a538c 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1571.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1571.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Video Embed parameter in all versions up to, and including, 9.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to the recipe dashboard (which is administrator-only by default but can be assigned to arbitrary capabilities), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Recipe Maker para WordPress es vulnerable a las Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro Video Embed en todas las versiones hasta la 9.2.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que los atacantes autenticados, con acceso al panel de recetas (que es solo para administradores de forma predeterminada pero se puede asignar a capacidades arbitrarias), inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1587.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1587.json index 092b36c9355..81c513c5737 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1587.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1587.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Newsmatic theme for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.3.0 via the 'newsmatic_filter_posts_load_tab_content'. This makes it possible for unauthenticated attackers to view draft posts and post content." + }, + { + "lang": "es", + "value": "El tema Newsmatic para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.3.0 incluida a trav\u00e9s de 'newsmatic_filter_posts_load_tab_content'. Esto hace posible que atacantes no autenticados vean borradores de publicaciones y publiquen contenido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1637.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1637.json index 07883e1a809..2e0bc80f511 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1637.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1637.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The 360 Javascript Viewer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check and nonce exposure on several AJAX actions in all versions up to, and including, 1.7.12. This makes it possible for authenticated attackers, with subscriber access or higher, to update plugin settings." + }, + { + "lang": "es", + "value": "El complemento 360 Javascript Viewer para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una verificaci\u00f3n de capacidad faltante y exposici\u00f3n nonce en varias acciones AJAX en todas las versiones hasta la 1.7.12 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1641.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1641.json index abe9bebf26c..67c31dae623 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1641.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1641.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Accordion plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'accordions_duplicate_post_as_draft' function in all versions up to, and including, 2.2.96. This makes it possible for authenticated attackers, with contributor access and above, to duplicate arbitrary posts, allowing access to the contents of password-protected posts." + }, + { + "lang": "es", + "value": "El complemento Accordion para WordPress es vulnerable al acceso no autorizado a los datos y a su modificaci\u00f3n debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'accordions_duplicate_post_as_draft' en todas las versiones hasta la 2.2.96 incluida. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, dupliquen publicaciones arbitrarias, permitiendo el acceso al contenido de publicaciones protegidas con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1774.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1774.json index d09b5503d44..738807f0bcb 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1774.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1774.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Customily Product Personalizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via user cookies in all versions up to, and including, 1.23.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. We unfortunately could not get in touch with the vendor through various means to disclose this issue." + }, + { + "lang": "es", + "value": "El complemento Customily Product Personalizer para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de cookies de usuario en todas las versiones hasta la 1.23.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Lamentablemente, no pudimos comunicarnos con el proveedor a trav\u00e9s de diversos medios para informar este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1780.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1780.json index ef869e16ef2..6d86c91d4b0 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1780.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1780.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The BizCalendar Web plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.1.0.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento BizCalendar Web para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'tab' en todas las versiones hasta la 1.1.0.19 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1790.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1790.json index 0799dd8ed24..c1b5ad511ae 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1790.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1790.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WordPress Infinite Scroll \u2013 Ajax Load More plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 7.0.1 via the 'type' parameter. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. This is limited to Windows instances." + }, + { + "lang": "es", + "value": "El complemento WordPress Infinite Scroll \u2013 Ajax Load More para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 7.0.1 incluida a trav\u00e9s del par\u00e1metro 'type'. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial. Esto est\u00e1 limitado a instancias de Windows." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1792.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1792.json index 967a528c532..2fef6446116 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1792.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1792.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The CMB2 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.10.1 via deserialization of untrusted input from the text_datetime_timestamp_timezone field. This makes it possible for authenticated attackers, with contributor access or higher, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. Please note that the plugin is a developer toolkit. For the vulnerability to become exploitable, the presence of a metabox activation in your code (via functions.php for example) is required." + }, + { + "lang": "es", + "value": "El complemento CMB2 para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 2.10.1 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables del campo text_datetime_timestamp_timezone. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo. Tenga en cuenta que el complemento es un conjunto de herramientas para desarrolladores. Para que la vulnerabilidad sea explotable, se requiere la presencia de una activaci\u00f3n de metabox en su c\u00f3digo (a trav\u00e9s de functions.php, por ejemplo)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1794.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1794.json index d616127f210..e1892200f9e 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1794.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1794.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Forminator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded file (e.g. 3gpp file) in all versions up to, and including, 1.29.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Forminator para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de un archivo cargado (por ejemplo, un archivo 3gpp) en todas las versiones hasta la 1.29.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1812.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1812.json index 8ea9c74fa1e..ae151bde7c7 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1812.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1812.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Everest Forms plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.0.7 via the 'font_url' parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Everest Forms para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 2.0.7 incluida a trav\u00e9s del par\u00e1metro 'font_url'. Esto hace posible que atacantes no autenticados realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y pueden usarse para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json index 8b3bd68db0f..521f17ca4b2 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Simple Job Board plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.11.0 via deserialization of untrusted input in the job_board_applicant_list_columns_value function. This makes it possible for unauthenticated attackers to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code when a submitted job application is viewed." + }, + { + "lang": "es", + "value": "El complemento Simple Job Board para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 2.11.0 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas que no son de confianza en la funci\u00f3n job_board_applicant_list_columns_value. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. Si una cadena POP est\u00e1 presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo cuando se vea una solicitud de empleo enviada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1850.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1850.json index c3abecdf93d..63b949dc7f6 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1850.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1850.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The AI Post Generator | AutoWriter plugin for WordPress is vulnerable to unauthorized access, modification or deletion of posts due to a missing capability check on functions hooked by AJAX actions in all versions up to, and including, 3.3. This makes it possible for authenticated attackers, with subscriber access or higher, to view all posts generated with this plugin (even in non-published status), create new posts (and publish them), publish unpublished post or perform post deletions." + }, + { + "lang": "es", + "value": "El complemento AI Post Generator | AutoWriter para WordPress es vulnerable al acceso no autorizado, modificaci\u00f3n o eliminaci\u00f3n de publicaciones debido a una falta de verificaci\u00f3n de capacidad en funciones conectadas por acciones AJAX en todas las versiones hasta la 3.3 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, vean todas las publicaciones generadas con este complemento (incluso en estado no publicado), creen nuevas publicaciones (y las publiquen), publiquen publicaciones no publicadas o realicen eliminaciones de publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1852.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1852.json index 1de53272ee5..1e975981944 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1852.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1852.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.4.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page which is the edit users page. This vulnerability was partially patched in version 3.4.9.2, and was fully patched in 3.4.9.3." + }, + { + "lang": "es", + "value": "El complemento WP-Members Membership Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del encabezado X-Forwarded-For en todas las versiones hasta la 3.4.9.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada, que es la p\u00e1gina de edici\u00f3n de usuarios. Esta vulnerabilidad se parch\u00f3 parcialmente en la versi\u00f3n 3.4.9.2 y se parch\u00f3 completamente en la 3.4.9.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json index 94d3d3b9fa2..33171e3f360 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1893.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Easy Property Listings plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018property_status\u2019 shortcode attribute in all versions up to, and including, 3.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Easy Property Listings para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del atributo de c\u00f3digo corto 'property_status' en todas las versiones hasta la 3.5.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en el consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1904.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1904.json index 8695880cf9f..094760e3ee2 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1904.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1904.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The MasterStudy LMS plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the search_posts function in all versions up to, and including, 3.2.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to expose draft post titles and excerpts." + }, + { + "lang": "es", + "value": "El complemento MasterStudy LMS para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n search_posts en todas las versiones hasta la 3.2.13 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, expongan borradores de t\u00edtulos y extractos de publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1934.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1934.json index c1830696669..617e99a1fde 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1934.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1934.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Compress \u2013 Image Optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wps_local_compress::__construct' function in all versions up to, and including, 6.11.10. This makes it possible for unauthenticated attackers to reset the CDN region and set a malicious URL to deliver images." + }, + { + "lang": "es", + "value": "El complemento WP Compress \u2013 Image Optimizer para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wps_local_compress::__construct' en todas las versiones hasta la 6.11.10 incluida. Esto hace posible que atacantes no autenticados restablezcan la regi\u00f3n CDN y establezcan una URL maliciosa para entregar im\u00e1genes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1948.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1948.json index c8e438a6137..d6acb36c428 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1948.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1948.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Getwid \u2013 Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the block content in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Getwid \u2013 Gutenberg Blocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del contenido del bloque en todas las versiones hasta la 2.0.5 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json index 0b7540ac1cc..4ccb708d97b 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1960.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Special Offer Day Widget Banner Link in all versions up to, and including, 2.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del enlace del banner del widget del d\u00eda de oferta especial en todas las versiones hasta la 2.8.1 incluida debido a una sanitizaci\u00f3n insuficiente de los insumos y a que los resultados se escapan de los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json index 1165fde16a7..0d97238356c 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.6 via the render function. This makes it possible for authenticated attackers, with contributor access or higher, to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 2.4.6 incluida a trav\u00e9s de la funci\u00f3n de renderizado. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1984.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1984.json index 5dd35917c32..e987ff814ab 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1984.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1984.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Graphene theme for WordPress is vulnerable to unauthorized access of data via meta tag in all versions up to, and including, 2.9.2. This makes it possible for unauthenticated individuals to obtain post contents of password protected posts via the generated source." + }, + { + "lang": "es", + "value": "El tema Graphene para WordPress es vulnerable al acceso no autorizado a datos a trav\u00e9s de metaetiquetas en todas las versiones hasta la 2.9.2 incluida. Esto hace posible que personas no autenticadas obtengan contenidos de publicaciones protegidas con contrase\u00f1a a trav\u00e9s de la fuente generada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1990.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1990.json index c78316120c2..3e7d2dd2088 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1990.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1990.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to blind SQL Injection via the \u2018id\u2019 parameter of the RM_Form shortcode in all versions up to, and including, 5.3.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login para WordPress es vulnerable a la inyecci\u00f3n SQL ciega a trav\u00e9s del par\u00e1metro 'id' del c\u00f3digo corto RM_Form en todas las versiones hasta la 5.3.1.0 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json index 8fe8ce79e56..21cfcf67bc8 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the update_users_role() function in all versions up to, and including, 5.3.0.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to escalate their privileges to that of an administrator" + }, + { + "lang": "es", + "value": "El complemento RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login para WordPress es vulnerable a una escalada de privilegios debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n update_users_role() en todas las versiones hasta la 5.3.0.0 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, escale sus privilegios al de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1999.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1999.json index db2f7b41871..9c2fa577c4e 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1999.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1999.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonial Widget's anchor style parameter in all versions up to, and including, 3.2.25 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks de Kadence Blocks \u2013 Page Builder Features para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro de estilo de anclaje del widget de testimonios en todas las versiones hasta la 3.2.25 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json index 7db48de9b9f..31c0bc8448c 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20665.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "BitLocker Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la caracter\u00edstica de seguridad de BitLocker" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json index 26108201df9..f7f2a13c2cf 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20669.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json index ae8e5cb16a6..f014479bf87 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20670.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Outlook for Windows Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de Outlook para Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json index ee02a61f928..a1c6c13c7bf 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20678.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en tiempo de ejecuci\u00f3n de llamada a procedimiento remoto" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json index 733004c97e0..6f53486d60e 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20685.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure Private 5G Core Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del n\u00facleo privado 5G de Azure" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json index 8788193800f..93c4e42dd22 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20688.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json index aeb5aa24204..12f13ab6c42 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20689.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json index 7673f3114a3..7a734f44945 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20693.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20737.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20737.json index 00767b2fb60..1ac4c2dba72 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20737.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20737.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "After Effects versions 24.1, 23.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.1, 23.6.2 y anteriores de After Effects se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json index b52eec13645..85e407f60f0 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20758.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but the attack complexity is high." + }, + { + "lang": "es", + "value": "Las versiones 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario, pero la complejidad del ataque es alta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json index b474c3b0053..37c38ed2d43 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20759.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Confidentiality and integrity are considered high due to having admin impact." + }, + { + "lang": "es", + "value": "Las versiones 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado que podr\u00eda ser aprovechada por un atacante con altos privilegios para inyectar scripts maliciosos en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable. La confidencialidad y la integridad se consideran altas debido a que tienen un impacto administrativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20766.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20766.json index 57768340f39..80ee8959dfd 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20766.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20766.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "InDesign Desktop versions 18.5.1, 19.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 18.5.1, 19.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20770.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20770.json index cc031be868f..d6b3425960c 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20770.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20770.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Photoshop Desktop versions 24.7.2, 25.3.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.7.2, 25.3.1 y anteriores de Photoshop Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20772.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20772.json index 85efa360a90..ad89ea27b5f 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20772.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20772.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Media Encoder versions 24.2.1, 23.6.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.2.1, 23.6.4 y anteriores de Media Encoder se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json index 960e968e34f..3c5111b1b26 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json index c87b51d2d18..6dcdfcb5642 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json index 5eab6f2963f..1eccb7e7fb0 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20794.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20794.json index 54bb90f1cf8..2415d1afd11 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20794.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20794.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Animate versions 23.0.4, 24.0.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service. An attacker could leverage this vulnerability to cause a system crash, resulting in a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.4, 24.0.1 y anteriores de Animate se ven afectadas por una vulnerabilidad de desreferencia de puntero NULL que podr\u00eda provocar una denegaci\u00f3n de servicio de la aplicaci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad para provocar una falla del sistema, lo que resultar\u00eda en una denegaci\u00f3n de servicio. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20795.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20795.json index f2e1f1be1e1..ca1f061a0ba 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20795.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20795.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Animate versions 23.0.4, 24.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.4, 24.0.1 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de enteros o envolvente que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20796.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20796.json index 2b17411a48d..ad6e3a7deac 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20796.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20796.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Animate versions 23.0.4, 24.0.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 23.0.4, 24.0.1 y anteriores de Animate se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20797.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20797.json index 3562afb88a7..94535397b4b 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20797.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20797.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Animate versions 23.0.4, 24.0.1 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones de Animate 23.0.4, 24.0.1 y anteriores se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites al analizar un archivo manipulado, lo que podr\u00eda resultar en una lectura m\u00e1s all\u00e1 del final de una estructura de memoria asignada. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20929.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20929.json index 4df15fb6f3d..bc9d4af1b35 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20929.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20929.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:47.590", "lastModified": "2024-02-20T19:51:05.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json index 29f982ef63b..89a483bfa9a 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:47.903", "lastModified": "2024-02-20T19:51:05.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20935.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20935.json index 5c09852d8cf..bce8fa5b992 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20935.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:48.077", "lastModified": "2024-02-20T19:51:05.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2018.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2018.json index 46ebc4be59b..1bb012851bd 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2018.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2018.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Activity Log Premium plugin for WordPress is vulnerable to SQL Injection via the entry->roles parameter in all versions up to, and including, 4.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. One demonstrated attack included the injection of a PHP Object." + }, + { + "lang": "es", + "value": "El complemento WP Activity Log Premium para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro entrada->roles en todas las versiones hasta la 4.6.4 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados con privilegios de suscriptor agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos. Un ataque demostrado incluy\u00f3 la inyecci\u00f3n de un objeto PHP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2026.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2026.json index 12bc8ddb8d1..6e4ee6ec8ed 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2026.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2026.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Passster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's content_protector shortcode in all versions up to, and including, 4.2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Passster para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto content_protector del complemento en todas las versiones hasta la 4.2.6.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2027.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2027.json index 120104d1294..92b6784d37a 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2027.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2027.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its style attributes in all versions up to, and including, 4.22.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Real Media Library: Media Library Folder & File Manager para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de sus atributos de estilo en todas las versiones hasta la 4.22.7 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2033.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2033.json index d75c72aded6..6c46a6d5ba6 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2033.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2033.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Video Conferencing with Zoom plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.5 via the get_assign_host_id AJAX action. This makes it possible for authenticated attackers, with subscriber access or higher, to enumerate usernames, emails and IDs of all users on a site." + }, + { + "lang": "es", + "value": "El complemento Video Conferencing with Zoom para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.4.5 incluida a trav\u00e9s de la acci\u00f3n AJAX get_assign_host_id. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, enumeren nombres de usuario, correos electr\u00f3nicos e identificaciones de todos los usuarios de un sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2039.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2039.json index ccc75f86305..ef3ac8e8e05 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2039.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2039.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Stackable \u2013 Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post(v2) block title tag in all versions up to, and including, 3.12.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Stackable \u2013 Page Builder Gutenberg Blocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la etiqueta de t\u00edtulo del bloque Post(v2) en todas las versiones hasta la 3.12.11 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida proporcionado por los atributos de usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2081.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2081.json index b06f2b1e6b3..b4851aeb140 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2081.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2081.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Best WordPress Gallery Plugin \u2013 FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the foogallery_attachment_modal_save action in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Best WordPress Gallery Plugin \u2013 FooGallery para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la acci\u00f3n foogallery_attachment_modal_save en todas las versiones hasta la 2.4.14 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2093.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2093.json index 8096f238a7f..0ee4e5d30b5 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2093.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2093.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The VK All in One Expansion Unit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 9.95.0.1 via social meta tags. This makes it possible for unauthenticated attackers to view limited password protected content." + }, + { + "lang": "es", + "value": "El complemento VK All in One Expansion Unit para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 9.95.0.1 incluida a trav\u00e9s de metaetiquetas sociales. Esto hace posible que atacantes no autenticados vean contenido limitado protegido con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json index 2761439345f..6b85b4ddbb3 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21322.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Defender para IoT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json index c4ee44734e0..b56b523a61c 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21323.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Defender para IoT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json index f1c3d29c233..9e779a97111 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21324.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Defender para IoT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json index e21b4d62d0e..099f926ee86 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21409.json @@ -8,6 +8,10 @@ { "lang": "en", "value": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en .NET, .NET Framework y Visual Studio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json index 2236b9572e8..c3db21e493a 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21424.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure Compute Gallery Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure Compute Gallery" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json index dd499591d37..27dec1761bd 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21447.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Authentication Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de autenticaci\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json index 6e7ed81418c..c2859e4b7e8 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21507.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Versions of the package mysql2 before 3.9.3 are vulnerable to Improper Input Validation through the keyFromFields function, resulting in cache poisoning. An attacker can inject a colon (:) character within a value of the attacker-crafted key." + }, + { + "lang": "es", + "value": "Las versiones del paquete mysql2 anteriores a la 3.9.3 son vulnerables a una validaci\u00f3n de entrada incorrecta a trav\u00e9s de la funci\u00f3n keyFromFields, lo que provoca envenenamiento de la cach\u00e9. Un atacante puede inyectar un car\u00e1cter de dos puntos (:) dentro de un valor de la clave creada por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21509.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21509.json index a1a01e1c0b2..68a7a8c83dc 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21509.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21509.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Versions of the package mysql2 before 3.9.4 are vulnerable to Prototype Poisoning due to insecure results object creation and improper user input sanitization passed through parserFn in text_parser.js and binary_parser.js." + }, + { + "lang": "es", + "value": "Las versiones del paquete mysql2 anteriores a la 3.9.4 son vulnerables al envenenamiento de prototipos debido a la creaci\u00f3n insegura de objetos de resultados y a una desinfecci\u00f3n inadecuada de las entradas del usuario pasadas a trav\u00e9s de parserFn en text_parser.js y binario_parser.js." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json index c6a16306535..bbc78fb781c 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21755.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.3 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.4 permite al atacante ejecutar no autorizados c\u00f3digo o comandos a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json index 62e085b1a88..21425dffd67 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21756.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests.." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.3 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.4 permite al atacante ejecutar no autorizados c\u00f3digo o comandos a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21848.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21848.json index 3ea9e71cc03..d4440d0111e 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21848.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21848.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Access Control in Mattermost Server versions 8.1.x before 8.1.11 allows an attacker that is in a channel with an active call to keep participating in the call even if they are removed from the channel\n\n" + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en las versiones 8.1.x anteriores a 8.1.11 de Mattermost Server permite que un atacante que se encuentra en un canal con una llamada activa siga participando en la llamada incluso si se elimina del canal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json index 0c6f8ad1289..c94bb6dceb4 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.15.22 via the signature functionality. This makes it possible for unauthenticated attackers to extract sensitive data including user signatures." + }, + { + "lang": "es", + "value": "El complemento Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.15.22 incluida a trav\u00e9s de la funcionalidad de firma. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluidas firmas de usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json index 56dcbd0edae..4b4ed2ce444 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.0. This is due to missing or incorrect nonce validation on the filter_users functions. This makes it possible for unauthenticated attackers to elevate their privileges to that of a teacher via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.0.0 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en las funciones filter_users. Esto hace posible que atacantes no autenticados eleven sus privilegios a los de un maestro a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json index 03a969b62c2..af20ce4e29d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Website Builder \u2013 More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Path Widget in all versions up to, and including, 3.20.2 due to insufficient output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Website Builder \u2013 More than Just a Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de ruta del complemento en todas las versiones hasta la 3.20.2 incluida debido a una salida insuficiente que se escapa en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json index 74d064f1c69..c0e238257bf 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2125.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Env\u00edaloSimple: Email Marketing y Newsletters plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3. This is due to missing or incorrect nonce validation on the gallery_add function. This makes it possible for unauthenticated attackers to upload malicious files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Env\u00edaloSimple: Email Marketing y Newsletters para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n gallery_add. Esto hace posible que atacantes no autenticados carguen archivos maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json index dda51127d59..f55b5248ee2 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Animated Box widget in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento JetWidgets For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Animated Box en todas las versiones hasta la 1.0.15 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2165.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2165.json index 81c1b70df9f..904b5772c5d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2165.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2165.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt parameter in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SEOPress \u2013 On-site SEO para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro alt de imagen en todas las versiones hasta la 7.5.2.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de autor o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json index 76b67bcdb44..a4465182120 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de bot\u00f3n en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json index 017505a6981..530b929d632 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-30424 is likely a duplicate of this issue." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de encabezado en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Es probable que CVE-2024-30424 sea un duplicado de este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2185.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2185.json index 71e5f353b97..1cc187681db 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2185.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2185.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Box widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Image Box en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2186.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2186.json index 3d7f0567010..e95f17ff23d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2186.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2186.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Team Members widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Miembros del equipo en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json index 4311efa6aa9..e1e573cbdc2 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Beaver Builder Addons by WPZOOM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonials widget in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder Addons de WPZOOM para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Testimonios en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2198.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2198.json index 75e9f302ded..44b10ff3823 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2198.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2198.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Contact Form by BestWebSoft plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018cntctfrm_contact_address\u2019 parameter in all versions up to, and including, 4.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Contact Form de BestWebSoft para WordPress es vulnerable a Reflected Cross-Site Scripting a trav\u00e9s del par\u00e1metro 'cntctfrm_contact_address' en todas las versiones hasta la 4.2.8 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22363.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22363.json index b76d2c14b8d..5affdc8c140 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22363.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22363.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "SheetJS Community Edition before 0.20.2 is vulnerable.to Regular Expression Denial of Service (ReDoS)." + }, + { + "lang": "es", + "value": "SheetJS Community Edition anterior a 0.20.2 es vulnerable a la denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22423.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22423.json index 51f041bb99e..908693670fd 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22423.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22423.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "yt-dlp is a youtube-dl fork with additional features and fixes. The patch that addressed CVE-2023-40581 attempted to prevent RCE when using `--exec` with `%q` by replacing double quotes with two double quotes. However, this escaping is not sufficient, and still allows expansion of environment variables. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021.04.11. yt-dlp version 2024.04.09 fixes this issue by properly escaping `%`. It replaces them with `%%cd:~,%`, a variable that expands to nothing, leaving only the leading percent. It is recommended to upgrade yt-dlp to version 2024.04.09 as soon as possible. Also, always be careful when using `--exec`, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous. For Windows users who are not able to upgrade, avoid using any output template expansion in `--exec` other than `{}` (filepath); if expansion in `--exec` is needed, verify the fields you are using do not contain `\"`, `|` or `&`; and/or instead of using `--exec`, write the info json and load the fields from it instead." + }, + { + "lang": "es", + "value": "yt-dlp es una bifurcaci\u00f3n de youtube-dl con funciones y correcciones adicionales. El parche que solucion\u00f3 CVE-2023-40581 intent\u00f3 evitar RCE al usar `--exec` con `%q` reemplazando comillas dobles con dos comillas dobles. Sin embargo, este escape no es suficiente y a\u00fan permite la expansi\u00f3n de las variables de entorno. La compatibilidad con la expansi\u00f3n de la plantilla de salida en `--exec`, junto con este comportamiento vulnerable, se agreg\u00f3 a `yt-dlp` en la versi\u00f3n 2021.04.11. La versi\u00f3n 2024.04.09 de yt-dlp soluciona este problema al escapar correctamente de `%`. Los reemplaza con `%%cd:~,%`, una variable que se expande a nada, dejando solo el porcentaje principal. Se recomienda actualizar yt-dlp a la versi\u00f3n 2024.04.09 lo antes posible. Adem\u00e1s, siempre tenga cuidado al usar `--exec`, porque si bien esta vulnerabilidad espec\u00edfica ha sido parcheada, usar entradas no validadas en los comandos del shell es intr\u00ednsecamente peligroso. Para los usuarios de Windows que no pueden actualizar, evite usar cualquier expansi\u00f3n de plantilla de salida en `--exec` que no sea `{}` (ruta de archivo); si se necesita expansi\u00f3n en `--exec`, verifique que los campos que est\u00e1 usando no contengan `\"`, `|` o `&`; y/o en lugar de usar `--exec`, escriba la informaci\u00f3n json y cargue los campos de \u00e9l en su lugar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22448.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22448.json index aac864fd078..85cb31cb69c 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22448.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22448.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service." + }, + { + "lang": "es", + "value": "Dell BIOS contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un usuario malintencionado local autenticado con privilegios de administrador podr\u00eda explotar esta vulnerabilidad y provocar una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22450.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22450.json index 622b949adc2..2671eed6b20 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22450.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22450.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise." + }, + { + "lang": "es", + "value": "Dell Alienware Command Center, versiones anteriores a 6.2.7.0, contienen una vulnerabilidad de elemento de ruta de b\u00fasqueda no controlada. Un usuario malintencionado local podr\u00eda potencialmente inyectar archivos maliciosos en la ruta de b\u00fasqueda de archivos, lo que comprometer\u00eda el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2200.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2200.json index 279a0cbf2f5..4a9229f3969 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2200.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2200.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Contact Form by BestWebSoft plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018cntctfrm_contact_subject\u2019 parameter in all versions up to, and including, 4.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Contact Form de BestWebSoft para WordPress es vulnerable a Reflected Cross-Site Scripting a trav\u00e9s del par\u00e1metro 'cntctfrm_contact_subject' en todas las versiones hasta la 4.2.8 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2222.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2222.json index 992460fb32b..62483e1dd30 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2222.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2222.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Advanced Classifieds & Directory Pro plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the ajax_callback_delete_attachment function in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with subscriber access or higher, to delete arbitrary media uploads." + }, + { + "lang": "es", + "value": "El complemento Advanced Classifieds & Directory Pro para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ajax_callback_delete_attachment en todas las versiones hasta la 3.0.0 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, eliminen cargas de medios arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json index 8b3ad44f3e4..74f7e42f37f 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:\u00a0\n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for\u00a0 Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de expresi\u00f3n regular incorrecta en Bitdefender GravityZone Update Server permite a un atacante provocar Server Side Request Forgery y reconfigurar el rel\u00e9. Este problema afecta a los siguientes productos que incluyen el componente vulnerable: Bitdefender Endpoint Security para Linux versi\u00f3n 7.0.5.200089 Bitdefender Endpoint Security para Windows versi\u00f3n 7.9.9.380 GravityZone Control Center (On Premises) versi\u00f3n 6.36.1" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json index e908e7da884..ea490411fbd 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: \n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"Path Traversal\") en el componente UpdateServer de Bitdefender GravityZone permite a un atacante ejecutar c\u00f3digo arbitrario en instancias vulnerables. Este problema afecta a los siguientes productos que incluyen el componente vulnerable: Bitdefender Endpoint Security para Linux versi\u00f3n 7.0.5.200089 Bitdefender Endpoint Security para Windows versi\u00f3n 7.9.9.380 GravityZone Control Center (On Premises) versi\u00f3n 6.36.1" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json index 392f2826817..ab34376aa92 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the id parameter in the google-map block in all versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access and higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro id en el bloque google-map en todas las versiones hasta la 2.6.4 incluida debido a una insuficiencia higienizaci\u00f3n de insumos y escape de salidas. Esto hace posible que atacantes autenticados con acceso de colaborador y superior inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2243.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2243.json index 2a84eddb3ef..d47b4619009 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2243.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2243.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in csmock where a regular user of the OSH service (anyone with a valid Kerberos ticket) can use the vulnerability to disclose the confidential Snyk authentication token and to run arbitrary commands on OSH workers." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en csmock donde un usuario habitual del servicio OSH (cualquiera con un ticket Kerberos v\u00e1lido) puede utilizar la vulnerabilidad para revelar el token de autenticaci\u00f3n confidencial de Snyk y ejecutar comandos arbitrarios en los trabajadores de OSH." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2261.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2261.json index 4240554740e..8e90fe41b2a 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2261.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2261.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Event Tickets and Registration plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.8.2 via the RSVP functionality. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including emails and street addresses." + }, + { + "lang": "es", + "value": "El complemento Event Tickets and Registration para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 5.8.2 incluida a trav\u00e9s de la funcionalidad RSVP. Esto hace posible que los atacantes autenticados, con acceso de colaborador y superior, extraigan datos confidenciales, incluidos correos electr\u00f3nicos y direcciones postales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2287.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2287.json index 2a1ff2f8938..2ea1bae3246 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2287.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2287.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Knight Lab Timeline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.9.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Knight Lab Timeline para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 3.9.3.3 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json index 993aa89089e..02517c48ec3 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The PowerPack Lite for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the link in multiple elements in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento PowerPack Lite para Beaver Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del enlace en m\u00faltiples elementos en todas las versiones hasta la 1.3.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json index 4b472fadd87..dad0b32cf5b 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23077.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFreeChart v1.5.4 era vulnerable a ArrayIndexOutOfBounds a trav\u00e9s del componente /chart/plot/CompassPlot.java. NOTA: esto es cuestionado por varios terceros que creen que no hab\u00eda pruebas razonables para determinar la existencia de una vulnerabilidad. Es posible que la presentaci\u00f3n se haya basado en una herramienta que no es lo suficientemente s\u00f3lida para la identificaci\u00f3n de vulnerabilidades." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23662.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23662.json index b444a62b230..e1df6da303b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23662.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23662.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiOS at least version at least 7.4.0 through 7.4.1 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.15 and 6.4.0 through 6.4.15 allows attacker to information disclosure via HTTP requests." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Fortinet FortiOS al menos en la versi\u00f3n 7.4.0 a 7.4.1 y 7.2.0 a 7.2.5 y 7.0.0 a 7.0.15 y 6.4.0 a 6.4.15 permite al atacante a la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de solicitudes HTTP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json index 83900232687..705655f3125 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23671.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"path traversal\") en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.3 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.4 permite a un atacante ejecutar c\u00f3digo no autorizado o comandos a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json index b8f1e26ce23..60cc0f98e81 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2302.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Easy Digital Downloads \u2013 Sell Digital Files & Subscriptions (eCommerce Store + Payments Made Easy) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.9. This makes it possible for unauthenticated attackers to download the debug log via Directory Listing. This file may include PII." + }, + { + "lang": "es", + "value": "El complemento Easy Digital Downloads \u2013 Sell Digital Files & Subscriptions (eCommerce Store + Payments Made Easy) para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.2.9 incluida. Esto hace posible que atacantes no autenticados descarguen el registro de depuraci\u00f3n a trav\u00e9s del Listado de directorios. Este archivo puede incluir PII." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json index 0e790d8cda2..a4066cb56d2 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Cards for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the BootstrapCard link in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Cards for Beaver Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del enlace BootstrapCard en todas las versiones hasta la 1.1.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2306.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2306.json index 1b83e29d6eb..b16ecc9e0e7 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2306.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2306.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Revslider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg upload in all versions up to, and including, 6.6.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure revslider can be extended to authors." + }, + { + "lang": "es", + "value": "El complemento Revslider para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la carga de svg en todas las versiones hasta la 6.6.20 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. De forma predeterminada, esto s\u00f3lo puede ser aprovechado por los administradores, pero la capacidad de usar y configurar revslider se puede extender a los autores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2311.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2311.json index 4f5ae659f36..2aa9a0a01cd 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2311.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2311.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Avada theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 7.11.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El tema Avada para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 7.11.6 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json index e4f2cde7c5f..509c9dc5034 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Link Library plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the searchll parameter in all versions up to, and including, 7.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Link Library para WordPress es vulnerable a Reflected Cross-Site Scripting a trav\u00e9s del par\u00e1metro searchll en todas las versiones hasta la 7.6.6 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2327.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2327.json index cc36337da35..fab42b94fec 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2327.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2327.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Global Elementor Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the button link URL in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Global Elementor Buttons para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la URL del enlace del bot\u00f3n en todas las versiones hasta la 1.1.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2334.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2334.json index 920128defe6..5b6782b336c 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2334.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2334.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Template Kit \u2013 Import plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the template upload functionality in all versions up to, and including, 1.0.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Template Kit \u2013 Import para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funcionalidad de carga de plantillas en todas las versiones hasta la 1.0.14 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2335.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2335.json index 97450731375..155307282b8 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2335.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2335.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elements Plus! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widget link URLs in all versions up to, and including, 2.16.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elements Plus! para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de m\u00faltiples URL de enlaces de widgets en todas las versiones hasta la 2.16.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2336.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2336.json index 07f85149fee..4506a42980a 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2336.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2336.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Popup Maker \u2013 Popup for opt-ins, lead gen, & more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.18.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Popup Maker \u2013 Popup for opt-ins, lead gen, & more para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 1.18.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente. y la salida se escapa en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json index d3a44dc2c90..3ca7afeb7be 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Avada theme for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.11.6 via the '/wp-content/uploads/fusion-forms/' directory. This makes it possible for unauthenticated attackers to extract sensitive data uploaded via an Avada created form with a file upload mechanism." + }, + { + "lang": "es", + "value": "El tema Avada para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 7.11.6 incluida a trav\u00e9s del directorio '/wp-content/uploads/fusion-forms/'. Esto hace posible que atacantes no autenticados extraigan datos confidenciales cargados a trav\u00e9s de un formulario creado por Avada con un mecanismo de carga de archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json index 91e6da31079..851fd9a6dc4 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the keys parameter in all versions up to, and including, 1.6.7.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro claves en todas las versiones hasta la 1.6.7.7 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en el consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de suscriptor y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json index 2de1661361b..97670f83144 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the customer_id parameter in all versions up to, and including, 1.6.7.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro customer_id en todas las versiones hasta la 1.6.7.7 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en el consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json index c6b713c4e87..3a854896dbf 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.11.6 via the form_to_url_action function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El tema Avada | Website Builder For WordPress & WooCommerce para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 7.11.6 incluida a trav\u00e9s de la funci\u00f3n form_to_url_action. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y pueden usarse para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json index e7d2d648281..6ccad719ce2 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2344.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Avada theme for WordPress is vulnerable to SQL Injection via the 'entry' parameter in all versions up to, and including, 7.11.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticted attackers, with editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El tema Avada para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'entry' en todas las versiones hasta la 7.11.6 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso a nivel de editor y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2347.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2347.json index 6083a3a2402..e0158c863b2 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2347.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2347.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name in all versions up to, and including, 4.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El tema de Astra para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del nombre para mostrar de un usuario en todas las versiones hasta la 4.6.8 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2348.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2348.json index 6da10b19dd0..6e6c2acdf04 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2348.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2348.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Gum Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post Meta widget in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gum Elementor Addon para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Post Meta en todas las versiones hasta la 1.3.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24245.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24245.json index 2f7b1954bea..bd52c3f88da 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24245.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24245.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue in Canimaan Software LTD ClamXAV v3.1.2 through v3.6.1 and fixed in v.3.6.2 allows a local attacker to escalate privileges via the ClamXAV helper tool component." + }, + { + "lang": "es", + "value": "Un problema en Canimaan Software LTD ClamXAV v3.1.2 a v3.6.1 y solucionado en v.3.6.2 permite a un atacante local escalar privilegios a trav\u00e9s del componente de herramienta auxiliar ClamXAV." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24694.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24694.json index d00e4bf1c68..d0a5c19fa69 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24694.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24694.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper privilege management in the installer for Zoom Desktop Client for Windows before version 5.17.10 may allow an authenticated user to conduct an escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de privilegios en el instalador de Zoom Desktop Client para Windows anterior a la versi\u00f3n 5.17.10 puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24809.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24809.json index 56e45efd16b..028e6e4b182 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24809.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24809.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Traccar is an open source GPS tracking system. Versions prior to 6.0 are vulnerable to path traversal and unrestricted upload of file with dangerous type. Since the system allows registration by default, attackers can acquire ordinary user permissions by registering an account and exploit this vulnerability to upload files with the prefix `device.` under any folder. Attackers can use this vulnerability for phishing, cross-site scripting attacks, and potentially execute arbitrary commands on the server. Version 6.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Traccar es un sistema de seguimiento GPS de c\u00f3digo abierto. Las versiones anteriores a la 6.0 son vulnerables a path traversal y a la carga sin restricciones de archivos con tipos peligrosos. Dado que el sistema permite el registro de forma predeterminada, los atacantes pueden adquirir permisos de usuario normales registrando una cuenta y aprovechar esta vulnerabilidad para cargar archivos con el prefijo \"dispositivo\" en cualquier carpeta. Los atacantes pueden utilizar esta vulnerabilidad para phishing, ataques de Cross-Site Scripting y, potencialmente, ejecutar comandos arbitrarios en el servidor. La versi\u00f3n 6.0 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2423.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2423.json index 660c9514310..0995fb78233 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2423.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2423.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The UsersWP \u2013 Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.2.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento UsersWP \u2013 Front-end login form, User Registration, User Profile & Members Directory para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 1.2.6 incluida. debido a una sanitizaci\u00f3n insuficiente de las entradas y a que la salida se escape en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2428.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2428.json index ecb388cc5b8..e12f2dfa377 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2428.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2428.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Ultimate Video Player For WordPress WordPress plugin before 2.2.3 does not have proper capability check when updating its settings via a REST route, allowing Contributor and above users to update them. Furthermore, due to the lack of escaping in one of the settings, this also allows them to perform Stored XSS attacks" + }, + { + "lang": "es", + "value": "El complemento Ultimate Video Player For WordPress para WordPress anterior a 2.2.3 no tiene una verificaci\u00f3n de capacidad adecuada al actualizar su configuraci\u00f3n a trav\u00e9s de una ruta REST, lo que permite a Contributor y a los usuarios superiores actualizarlos. Adem\u00e1s, debido a la falta de escape en una de las configuraciones, esto tambi\u00e9n les permite realizar ataques XSS almacenados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json index b1d2b44aef1..bb8e6f35104 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Lightweight Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.5.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Lightweight Accordion para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 1.5.16 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2447.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2447.json index 3d7d90bd8ba..d22b328aab0 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2447.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2447.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Mattermost versions 8.1.x before 8.1.11, 9.3.x before 9.3.3, 9.4.x before 9.4.4, and 9.5.x before 9.5.2 fail to authenticate the source of certain types of post actions, allowing an authenticated attacker to create posts as other users via a crafted post action.\n\n" + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 8.1.x anteriores a 8.1.11, 9.3.x anteriores a 9.3.3, 9.4.x anteriores a 9.4.4 y 9.5.x anteriores a 9.5.2 no logran autenticar la fuente de ciertos tipos de acciones de publicaci\u00f3n, lo que permite una atacante autenticado para crear publicaciones como otros usuarios a trav\u00e9s de una acci\u00f3n de publicaci\u00f3n manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2456.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2456.json index afe459bafbc..9304a8e3c39 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2456.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2456.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Ecwid Ecommerce Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 6.12.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Ecwid Ecommerce Shopping Cart para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 6.12.10 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2457.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2457.json index 906ec06e63d..90e40666584 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2457.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2457.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Modal Window \u2013 create popup modal window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 5.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Modal Window \u2013 create popup modal window para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 5.3.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json index 444e1a79ec4..5d13c1faed2 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Twitter Tweet widget in all versions up to, and including, 2.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento PowerPack Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de Tweet de Twitter en todas las versiones hasta la 2.7.18 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25115.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25115.json index ae2eac78c5d..7a792c07237 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25115.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25115.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "RedisBloom adds a set of probabilistic data structures to Redis. Starting in version 2.0.0 and prior to version 2.4.7 and 2.6.10, specially crafted `CF.LOADCHUNK` commands may be used by authenticated users to perform heap overflow, which may lead to remote code execution. The problem is fixed in RedisBloom 2.4.7 and 2.6.10.\n" + }, + { + "lang": "es", + "value": "RedisBloom agrega un conjunto de estructuras de datos probabil\u00edsticos a Redis. A partir de la versi\u00f3n 2.0.0 y anteriores a las versiones 2.4.7 y 2.6.10, los usuarios autenticados pueden utilizar comandos `CF.LOADCHUNK` especialmente manipulados para realizar un desbordamiento del mont\u00f3n, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo. El problema se solucion\u00f3 en RedisBloom 2.4.7 y 2.6.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25116.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25116.json index f020d0b27f1..934fe131d7e 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25116.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25116.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "RedisBloom adds a set of probabilistic data structures to Redis. Starting in version 2.0.0 and prior to version 2.4.7 and 2.6.10, authenticated users can use the `CF.RESERVE` command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in RedisBloom 2.4.7 and 2.6.10." + }, + { + "lang": "es", + "value": "RedisBloom agrega un conjunto de estructuras de datos probabil\u00edsticos a Redis. A partir de la versi\u00f3n 2.0.0 y anteriores a la versi\u00f3n 2.4.7 y 2.6.10, los usuarios autenticados pueden usar el comando `CF.RESERVE` para activar una aserci\u00f3n en tiempo de ejecuci\u00f3n y la finalizaci\u00f3n del proceso del servidor Redis. El problema se solucion\u00f3 en RedisBloom 2.4.7 y 2.6.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json index 622fe588c34..bbe0803d9c0 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@liferay.com", "published": "2024-02-07T15:15:08.907", "lastModified": "2024-02-07T17:04:54.407", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2501.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2501.json index 0355ea75af3..d7ad3777848 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2501.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2501.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Hubbub Lite \u2013 Fast, Reliable Social Sharing Buttons plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.33.1 via deserialization of untrusted input via the 'dpsp_maybe_unserialize' function. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Hubbub Lite \u2013 Fast, Reliable Social Sharing Buttons para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.33.1 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas que no son de confianza mediante la funci\u00f3n 'dpsp_maybe_unserialize'. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2504.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2504.json index 5ec71851aa4..a65531615e3 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2504.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2504.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Page Builder: Pagelayer \u2013 Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'attr' parameter in all versions up to, and including, 1.8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Page Builder: Pagelayer \u2013 Drag and Drop website builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'attr' en todas las versiones hasta la 1.8.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida del usuario. atributos proporcionados. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json index 317c6946ee5..3f5609ad0de 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget button URL in all versions up to, and including, 1.0.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento JetWidgets For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la URL del bot\u00f3n del widget en todas las versiones hasta la 1.0.16 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json index f801efe3219..2235522f8f8 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2513.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Chat App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'imageAlt' block attribute in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Chat App para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo de bloque 'imageAlt' en todas las versiones hasta la 3.6.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2536.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2536.json index df308698855..a2fc5f78a47 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2536.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2536.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Rank Math SEO with AI SEO Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HowTo block attributes in all versions up to, and including, 1.0.214 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Rank Math SEO con AI SEO Tools para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los atributos de bloque HowTo en todas las versiones hasta la 1.0.214 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2539.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2539.json index 8c6a02b467b..1d2697f8cd1 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2539.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2539.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widget '_id' attributes in all versions up to, and including, 8.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los atributos del widget '_id' en todas las versiones hasta la 8.3.6 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json index adf88f8f721..fc54abc5cbe 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_uri_editor' function in all versions up to, and including, 2.4.3.1. This makes it possible for unauthenticated attackers to view the permalinks of all posts." + }, + { + "lang": "es", + "value": "El complemento Permalink Manager Lite para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'get_uri_editor' en todas las versiones hasta la 2.4.3.1 incluida. Esto hace posible que atacantes no autenticados vean los enlaces permanentes de todas las publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json index a17f2307b5f..3487abd61ed 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json index cd288650c54..3f932700b3d 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json index c5f161da6b2..ba3bb98559e 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json index 77b47300724..43f460b866c 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json index 22eff7a2ec9..99f699b9207 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json index bfac93e266e..d6dd14fb7ce 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json index 027c81c0817..98f070b8b8e 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosos en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json index 67e63eee687..c73ddfcabda 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26122.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26122.json index 9e4c67cd39b..8b7d32aa266 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26122.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26122.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.19 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que un atacante podr\u00eda aprovechar para inyectar scripts maliciosas en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json index 6a13f7bd6cf..ba03ef40bca 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26168.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json index 8f331656ea9..23f9fa84899 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26171.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json index ed342c9bc1a..54fb72357ca 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26172.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DWM Core Library Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de la librer\u00eda principal de Windows DWM" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json index 0d3940f3b4e..1a5d3fc8416 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26175.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json index cbf26e75330..2a3b58dc5c8 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26179.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json index ea4377d6806..5fb1bf29b29 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26180.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json index a0f6854f0be..38b27909775 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26183.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Kerberos Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Kerberos" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json index 8e77dbecaa2..8ac3ba99e82 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26189.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json index 1bd571a7a27..d290c74a572 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26193.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure Migrate Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Azure Migrate" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json index 28130472392..aac8e7c3b51 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26194.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json index a031a9e3d82..c5e802842c5 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26195.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "DHCP Server Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servicio de servidor DHCP" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json index 01327724d03..4793c43cc45 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26200.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json index cf2fd471b94..4f296404ecc 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26202.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "DHCP Server Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servicio de servidor DHCP" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json index 18e27e259bd..1cc49c99e5f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26205.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json index 3eaca12a5e8..b14143b66a8 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26207.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json index ad2653c3ac5..03578f4ff2b 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26208.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Message Queuing (MSMQ)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json index 772e7e9a63c..701794b250e 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26209.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servicio del subsistema de la autoridad de seguridad local de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json index 35a97d6ca02..af0943a193f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26210.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del proveedor Microsoft WDAC OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json index ef687ae2739..ac5a3f84ca3 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26211.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json index 81203fce419..61b8f9250c2 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26212.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "DHCP Server Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio del servidor DHCP" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json index 269f7b65ced..f6534288434 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26213.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del sistema de archivos de intermediaci\u00f3n de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json index 4d2643a0d4a..cb23d772984 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26214.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft WDAC SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json index 485cdc1021d..a2bfecbffb1 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26215.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "DHCP Server Service Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del servicio del servidor DHCP" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json index e77d5f27427..6c0aa58a160 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26216.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows File Server Resource Management Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servicio de administraci\u00f3n de recursos del servidor de archivos de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json index 13756bcfad5..c7372937c51 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26217.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json index ed4e2f634c9..0626f0525fc 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26218.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Kernel Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del kernel de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json index c7f987864d0..d2a4e0ab4da 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26219.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "HTTP.sys Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio HTTP.sys" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json index d7280e21db3..f1d82e21be6 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26220.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Mobile Hotspot Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del punto de acceso de Windows Mobile" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json index 2c7a4a71fcd..f82ca67ebef 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26221.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json index 28b5c163105..e2f10dcd21f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26222.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json index 2a9f4cf22ce..51c73db69ab 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26223.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json index 1dc5c029495..e840f1b8e59 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26224.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json index 0e247cb4e80..910d46a75b6 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26226.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Distributed File System (DFS) Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del sistema de archivos distribuido (DFS) de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json index ce205e0da17..ccc65cd2584 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26227.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json index e913ac0e009..217ac7fb528 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26228.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Cryptographic Services Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la caracter\u00edstica de seguridad de los servicios criptogr\u00e1ficos de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json index dd0542479f5..b2c188a8268 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26229.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows CSC Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servicio CSC de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json index 849f36f20b6..ad7ea4359d8 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26230.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servidor de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json index 21f004fdf48..6c18944afb4 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26231.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json index 99e204ed3b0..5092210ead9 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26232.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Message Queuing (MSMQ)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json index bc511a58d44..137daf35460 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26233.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows DNS Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servidor DNS de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json index 8f12866a6c6..d5f4b59f1b7 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26234.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Proxy Driver Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad del controlador proxy" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json index 7926f1413dd..72918557fd4 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26235.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Update Stack Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de la pila de Windows Update" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json index a843cdc759d..d3cbc8e7b78 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26236.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Update Stack Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de la pila de Windows Update" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json index 93a2de124be..c8d5c6d5488 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26237.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Credential Guard de Windows Defender" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json index da9c4d15f38..558f45c162f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26239.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servidor de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json index a0578a97c8c..f5987b02f53 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26240.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json index 51c19b2de14..1c3f839bb05 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26241.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Win32k Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Win32k" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json index 93d8aee57c2..7bc887249ad 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26242.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del servidor de telefon\u00eda de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json index 144b0e477ea..b801728754c 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26243.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows USB Print Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador de impresi\u00f3n USB de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json index 0cdb00bb80b..056a7668ada 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26244.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del proveedor Microsoft WDAC OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json index a04db8a7517..73501121824 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26245.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows SMB Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Windows SMB" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json index 6f08de23770..94d011658c1 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26248.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Kerberos Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Windows Kerberos" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json index 974f3301af0..30914da8b95 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26250.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json index bc35056b012..e29a0b1c691 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26251.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft SharePoint Server Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Microsoft SharePoint Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json index 9a85487da74..8b22a53b620 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26252.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows rndismp6.sys Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows rndismp6.sys" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json index 6299ffd0ad9..16ae8f52a34 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26253.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows rndismp6.sys Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows rndismp6.sys" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json index 869879f9440..7110bb1c5fd 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26254.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio del bus de m\u00e1quina virtual de Microsoft (VMBus)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json index 1d8c16cf4b4..9417c000dd1 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26255.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json index 51f6b6b9aca..a68d98fed9f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26256.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "libarchive Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de libarchive" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json index fa0f4ad465c..fdb801f332f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26257.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Excel" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json index be8e4195436..9d19ff32046 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Chilkat before v9.5.0.98, allows attackers to obtain sensitive information via predictable PRNG in ChilkatRand::randomBytes function." + }, + { + "lang": "es", + "value": "Chilkat anterior a v9.5.0.98, permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de PRNG predecible en la funci\u00f3n ChilkatRand::randomBytes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json index b39772adeba..859f546f490 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26362.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "HTML injection vulnerability in Enpass Password Manager Desktop Client 6.9.2 for Windows and Linux allows attackers to run arbitrary HTML code via creation of crafted note." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n de HTML en Enpass Password Manager Desktop Client 6.9.2 para Windows y Linux permite a los atacantes ejecutar c\u00f3digo HTML arbitrario mediante la creaci\u00f3n de una nota manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26581.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26581.json index ebce4d9f62c..ebe1c42a425 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26581.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T13:15:09.020", "lastModified": "2024-02-23T09:15:22.563", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json index ab3442cf25a..73a3e2eee80 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26584.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-21T15:15:09.420", "lastModified": "2024-04-03T14:15:15.613", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26592.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26592.json index a122df45743..045109a02aa 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26592.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-22T17:15:09.217", "lastModified": "2024-02-23T09:15:22.877", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26593.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26593.json index 42387f4738e..372b50e5a0d 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26593.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T10:15:07.943", "lastModified": "2024-03-11T18:15:18.673", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26594.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26594.json index f2fe9c7b6f8..00c2d5e0f06 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26594.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26594.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T14:15:45.150", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26595.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26595.json index 9bbba609f9f..c8141329053 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26595.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26595.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.443", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json index 68acda2bdfe..3086ac1f816 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.500", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json index f1fbf19f613..d0d651ceb58 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.557", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26598.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26598.json index 95332cbf849..53408f871ff 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26598.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26598.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.610", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26599.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26599.json index efa825f0827..cdf51088583 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26599.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.660", "lastModified": "2024-02-23T16:14:43.447", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json index 7868ba211a2..a5ce81bb2a4 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:59.927", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26601.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26601.json index ce71d749665..a31cbd0a07d 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26601.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26601.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:59.987", "lastModified": "2024-03-01T14:15:54.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json index b2d4478c15e..18e23d22118 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.043", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26603.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26603.json index b189c89980b..5ecfaad1a1f 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26603.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.097", "lastModified": "2024-03-01T14:15:54.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26604.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26604.json index 02611b95fb7..6dddb64c65e 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26604.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26604.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.150", "lastModified": "2024-03-11T18:15:18.830", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26605.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26605.json index 9e7e45a4144..e1ce71ecf20 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26605.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26605.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.207", "lastModified": "2024-02-26T16:32:25.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json index b2aaabf54ce..318c5959b0b 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.260", "lastModified": "2024-03-11T18:15:18.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json index 4f38fc20123..9589b01776c 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26815.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check\n\ntaprio_parse_tc_entry() is not correctly checking\nTCA_TAPRIO_TC_ENTRY_INDEX attribute:\n\n\tint tc; // Signed value\n\n\ttc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]);\n\tif (tc >= TC_QOPT_MAX_QUEUE) {\n\t\tNL_SET_ERR_MSG_MOD(extack, \"TC entry index out of range\");\n\t\treturn -ERANGE;\n\t}\n\nsyzbot reported that it could fed arbitary negative values:\n\nUBSAN: shift-out-of-bounds in net/sched/sch_taprio.c:1722:18\nshift exponent -2147418108 is negative\nCPU: 0 PID: 5066 Comm: syz-executor367 Not tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:217 [inline]\n __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386\n taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [inline]\n taprio_parse_tc_entries net/sched/sch_taprio.c:1768 [inline]\n taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877\n taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134\n qdisc_create+0x9d4/0x1190 net/sched/sch_api.c:1355\n tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776\n rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617\n netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:745\n ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n ___sys_sendmsg net/socket.c:2638 [inline]\n __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f1b2dea3759\nCode: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759\nRDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004\nRBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000\nR10: 0000555500000000 R11: 0000000000000246 R12: 00007ffd4de45340\nR13: 00007ffd4de45310 R14: 0000000000000001 R15: 00007ffd4de45340" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: taprio: verificaci\u00f3n adecuada de TCA_TAPRIO_TC_ENTRY_INDEX taprio_parse_tc_entry() no verifica correctamente el atributo TCA_TAPRIO_TC_ENTRY_INDEX: int tc; // Valor con signo tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]); if (tc >= TC_QOPT_MAX_QUEUE) { NL_SET_ERR_MSG_MOD(extack, \"\u00edndice de entrada TC fuera de rango\"); volver -RANGE; } syzbot inform\u00f3 que pod\u00eda alimentar valores negativos arbitrarios: UBSAN: desplazamiento fuera de los l\u00edmites en net/sched/sch_taprio.c:1722:18 exponente de desplazamiento -2147418108 es negativo CPU: 0 PID: 5066 Comm: syz-executor367 No tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 29/02/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [en l\u00ednea] __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386 taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [ en l\u00ednea] taprio_parse_tc_entries net /sched/sch_taprio.c:1768 [en l\u00ednea] taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877 taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134 qdisc_create+0x9d4/0x1190 net/sched/sch_api. c:1355 tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_ker nel net/netlink/ AF_NETLINK.C: 1341 [en l\u00ednea] netlink_unicast+0x7ea/0x980 net/netlink/AF_netLink.c: 1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c: 1908 sock_sendmsg_nosec net/socket.c: 730 [730] 1 /0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/ 0x240 entrada_SYSCALL_64_after_hwframe +0x6f/0x77 RIP: 0033:0x7f1b2dea3759 C\u00f3digo: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 8 9c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002e RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004 RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000 R10: 0000555500000000 R 11: 0000000000000246 R12: 00007ffd4de45340 R13: 00007ffd4de45310 R14: 00000000000000001 R15: 00007ffd4de45340" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json index c4b1907af0c..b7acc406440 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86, relocs: Ignore relocations in .notes section\n\nWhen building with CONFIG_XEN_PV=y, .text symbols are emitted into\nthe .notes section so that Xen can find the \"startup_xen\" entry point.\nThis information is used prior to booting the kernel, so relocations\nare not useful. In fact, performing relocations against the .notes\nsection means that the KASLR base is exposed since /sys/kernel/notes\nis world-readable.\n\nTo avoid leaking the KASLR base without breaking unprivileged tools that\nare expecting to read /sys/kernel/notes, skip performing relocations in\nthe .notes section. The values readable in .notes are then identical to\nthose found in System.map." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86, relocs: ignorar reubicaciones en la secci\u00f3n .notes Al compilar con CONFIG_XEN_PV=y, los s\u00edmbolos .text se emiten en la secci\u00f3n .notes para que Xen pueda encontrar el punto de entrada \"startup_xen\" . Esta informaci\u00f3n se utiliza antes de iniciar el kernel, por lo que las reubicaciones no son \u00fatiles. De hecho, realizar reubicaciones en la secci\u00f3n .notes significa que la base KASLR est\u00e1 expuesta ya que /sys/kernel/notes es legible en todo el mundo. Para evitar filtrar la base de KASLR sin da\u00f1ar las herramientas sin privilegios que esperan leer /sys/kernel/notes, omita realizar reubicaciones en la secci\u00f3n .notes. Los valores legibles en .notes son id\u00e9nticos a los que se encuentran en System.map." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2623.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2623.json index e6381a692c5..df829aba750 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2623.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2623.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget's message parameter in all versions up to, and including, 5.9.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro de mensaje del widget de cuenta regresiva en todas las versiones hasta la 5.9.11 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y la salida se escapa. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2650.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2650.json index 0e1766cd149..6304dae5125 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2650.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2650.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the alignment parameter in the Woo Product Carousel widget in all versions up to, and including, 5.9.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro de alineaci\u00f3n en el widget Woo Product Carousel en todas las versiones hasta la 5.9.10 incluida, debido a una insuficiente higienizaci\u00f3n de los insumos y a fugas de los productos. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json index 66c335d6656..f37151955c6 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2654.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The File Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 7.2.5 via the fm_download_backup function. This makes it possible for authenticated attackers, with administrator access and above, to read the contents of arbitrary zip files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento File Manager para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 7.2.5 incluida a trav\u00e9s de la funci\u00f3n fm_download_backup. Esto hace posible que atacantes autenticados, con acceso de administrador y superior, lean el contenido de archivos zip arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2655.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2655.json index 92f29f2fe7b..423c995bae8 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2655.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2655.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post widgets in all versions up to, and including, 8.3.5 due to insufficient input sanitization and output escaping on author display names. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addons by Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets de publicaci\u00f3n del complemento en todas las versiones hasta la 8.3.5 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los nombres para mostrar de los autores. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2664.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2664.json index e494d0972c3..9ea34d7284e 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2664.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2664.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown Widget in all versions up to, and including, 4.10.24 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Premium Addons for Elementor para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del widget de cuenta regresiva del complemento en todas las versiones hasta la 4.10.24 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2665.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2665.json index d551c7211ff..3decf400daf 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2665.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2665.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's button in all versions up to, and including, 4.10.27 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Premium Addons for Elementor para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del bot\u00f3n del complemento en todas las versiones hasta la 4.10.27 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2666.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2666.json index d44b754a33d..a2336bbf920 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2666.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2666.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Bullet List Widget in all versions up to, and including, 4.10.24 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page and attempts to edit the content." + }, + { + "lang": "es", + "value": "Los complementos Premium Addons for Elementor para WordPress son vulnerables a Cross-Site Scripting almacenados basados en DOM a trav\u00e9s del widget de lista de vi\u00f1etas del complemento en todas las versiones hasta la 4.10.24 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada e intente editar el contenido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2693.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2693.json index 35b315d5312..901d130be8c 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2693.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2693.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Link Whisper Free plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.7.1 via deserialization of untrusted input of the 'mfn-page-items' post meta value. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Link Whisper Free para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 0.7.1 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables del valor meta de la publicaci\u00f3n 'mfn-page-items'. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27242.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27242.json index 013c12621b1..6ff02597f06 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27242.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27242.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross site scripting in Zoom Desktop Client for Linux before version 5.17.10 may allow an authenticated user to conduct a denial of service via network access." + }, + { + "lang": "es", + "value": "Cross site scripting en Zoom Desktop Client para Linux anteriores a la versi\u00f3n 5.17.10 pueden permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27247.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27247.json index c839214e760..f53ea696c0a 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27247.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27247.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper privilege management in the installer for Zoom Desktop Client for macOS before version 5.17.10 may allow a privileged user to conduct an escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de privilegios en el instalador de Zoom Desktop Client para macOS anterior a la versi\u00f3n 5.17.10 puede permitir que un usuario privilegiado realice una escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27448.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27448.json index c93daf5a0aa..1bdad9ea516 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27448.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27448.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "MailDev 2 through 2.1.0 allows Remote Code Execution via a crafted Content-ID header for an e-mail attachment, leading to lib/mailserver.js writing arbitrary code into the routes.js file." + }, + { + "lang": "es", + "value": "MailDev 2 hasta 2.1.0 permite la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de un encabezado Content-ID manipulado para un archivo adjunto de correo electr\u00f3nico, lo que lleva a lib/mailserver.js a escribir c\u00f3digo arbitrario en el archivo route.js." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27474.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27474.json index 3d78d408cc1..cdac21a8e53 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27474.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27474.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Leantime 3.0.6 is vulnerable to Cross Site Request Forgery (CSRF). This vulnerability allows malicious actors to perform unauthorized actions on behalf of authenticated users, specifically administrators." + }, + { + "lang": "es", + "value": "Leantime 3.0.6 es vulnerable a Cross-Site Request Forgery (CSRF). Esta vulnerabilidad permite a actores malintencionados realizar acciones no autorizadas en nombre de usuarios autenticados, espec\u00edficamente administradores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json index f8576bb39c7..6e838bacaad 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27476.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Leantime 3.0.6 is vulnerable to HTML Injection via /dashboard/show#/tickets/newTicket." + }, + { + "lang": "es", + "value": "Leantime 3.0.6 es vulnerable a la inyecci\u00f3n de HTML a trav\u00e9s de /dashboard/show#/tickets/newTicket." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27477.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27477.json index 4702a0c0bcb..0d8ddf5436c 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27477.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27477.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "In Leantime 3.0.6, a Cross-Site Scripting vulnerability exists within the ticket creation and modification functionality, allowing attackers to inject malicious JavaScript code into the title field of tickets (also known as to-dos). This stored XSS vulnerability can be exploited to perform Server-Side Request Forgery (SSRF) attacks." + }, + { + "lang": "es", + "value": "En Leantime 3.0.6, existe una vulnerabilidad de Cross-Site Scripting dentro de la funcionalidad de creaci\u00f3n y modificaci\u00f3n de tickets, lo que permite a los atacantes inyectar c\u00f3digo JavaScript malicioso en el campo de t\u00edtulo de los tickets (tambi\u00e9n conocido como tareas pendientes). Esta vulnerabilidad XSS almacenada se puede aprovechar para realizar ataques de Server-Side Request Forgery (SSRF)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27665.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27665.json index 90038269c13..0c194c6e0a0 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27665.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27665.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Unifiedtransform v2.X is vulnerable to Stored Cross-Site Scripting (XSS) via file upload feature in Syllabus module." + }, + { + "lang": "es", + "value": "Unifiedtransform v2.X es vulnerable a Cross-Site Scripting Almacenado (XSS) a trav\u00e9s de la funci\u00f3n de carga de archivos en el m\u00f3dulo Syllabus." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2730.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2730.json index 6997219ced4..37e2bb73cef 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2730.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2730.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Mautic uses predictable page indices for unpublished landing pages, their content can be accessed by unauthenticated users under public preview URLs which could expose sensitive data. At the time of publication of the CVE no patch is available \n\n" + }, + { + "lang": "es", + "value": "Mautic utiliza \u00edndices de p\u00e1ginas predecibles para p\u00e1ginas de destino no publicadas; usuarios no autenticados pueden acceder a su contenido a trav\u00e9s de URL de vista previa p\u00fablicas que podr\u00edan exponer datos confidenciales. En el momento de publicaci\u00f3n del CVE no hay ning\u00fan parche disponible" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2731.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2731.json index 105c8ac7f02..ed1cb1822b8 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2731.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2731.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Users with low privileges (all permissions deselected in the administrator permissions settings) can view certain pages that expose sensitive information such as company names, users' names and surnames, stage names, and monitoring campaigns and their descriptions. In addition, unprivileged users can see and edit the descriptions of tags. At the time of publication of the CVE no patch is available.\n\n" + }, + { + "lang": "es", + "value": "Los usuarios con privilegios bajos (todos los permisos deseleccionados en la configuraci\u00f3n de permisos de administrador) pueden ver ciertas p\u00e1ginas que exponen informaci\u00f3n confidencial como nombres de empresas, nombres y apellidos de los usuarios, nombres art\u00edsticos y campa\u00f1as de monitoreo y sus descripciones. Adem\u00e1s, los usuarios sin privilegios pueden ver y editar las descripciones de las etiquetas. En el momento de publicaci\u00f3n del CVE no hay ning\u00fan parche disponible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json index 087ca27b0cb..6558ac31972 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's \"Separator\" element in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bold Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del elemento \"Separator\" del complemento en todas las versiones hasta la 4.8.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json index a9858073a6d..dacc12511e6 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's AI features all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bold Page Builder para WordPress es vulnerable a las Cross-Site Scripting Almacenado a trav\u00e9s de las funciones de inteligencia artificial del complemento en todas las versiones hasta la 4.8.8 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json index f8d07f0a30f..67080a0bbac 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Price List' element in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bold Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del elemento 'Price List' en todas las versiones hasta la 4.8.8 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json index 1302808c9ad..e3c4828b22e 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via HTML Tags in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bold Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de etiquetas HTML en todas las versiones hasta la 4.8.8 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json index 7292a0a5c58..ce28c3f9a55 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2738.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Permalink Manager Lite and Pro plugins for WordPress are vulnerable to Reflected Cross-Site Scripting via the \u2018s\u2019 parameter in multiple instances in all versions up to, and including, 2.4.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "Los complementos Permalink Manager Lite y Pro para WordPress son vulnerables a Reflected Cross-Site Scripting a trav\u00e9s del par\u00e1metro 's' en m\u00faltiples instancias en todas las versiones hasta la 2.4.3.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2783.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2783.json index 9b9e40d65ed..b8a5153d91c 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2783.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2783.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The GamiPress \u2013 The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 6.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento GamiPress \u2013 The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 6.9.0 incluida debido a una desinfecci\u00f3n insuficiente de las entradas y a que la salida se escape en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json index 58ddaac772b..67d63f0c9b2 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2786.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on the title_tag attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de varios widgets en todas las versiones hasta la 3.10.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en el atributo title_tag. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json index eac6e500e78..9a45ee7c143 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2787.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Page Title HTML Tag in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la etiqueta HTML del t\u00edtulo de la p\u00e1gina en todas las versiones hasta la 3.10.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json index 0d0c50ac0e9..8a724bf6f69 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2788.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post Title HTML Tag in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la etiqueta HTML del t\u00edtulo de la publicaci\u00f3n en todas las versiones hasta la 3.10.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json index aa6bf437b7c..841f6788d02 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2789.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Calendy widget in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Calendy del complemento en todas las versiones hasta la 3.10.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json index 7f3d9b5b499..e226d893038 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28190.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, users can inject malicious code in filenames when uploading files (back end and front end), which is then executed in tooltips and popups in the back end. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, remove upload fields from frontend forms and disable uploads for untrusted back end users." + }, + { + "lang": "es", + "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 4.0.0 y antes de la versi\u00f3n 4.13.40 y 5.3.4, los usuarios pueden inyectar c\u00f3digo malicioso en los nombres de archivos al cargar archivos (back-end y front-end), que luego se ejecuta en informaci\u00f3n sobre herramientas y ventanas emergentes en el back-end. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, elimine los campos de carga de los formularios frontales y deshabilite las cargas para usuarios finales que no sean de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28191.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28191.json index 3ce10a8108b..d65b361fdd6 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28191.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28191.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.0.0 and prior to version 4.13.40 and 5.3.4, it is possible to inject insert tags in frontend forms if the output is structured in a very specific way. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, do not output user data from frontend forms next to each other, always separate them by at least one character." + }, + { + "lang": "es", + "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 4.0.0 y antes de la versi\u00f3n 4.13.40 y 5.3.4, es posible inyectar etiquetas de inserci\u00f3n en formularios de interfaz si la salida est\u00e1 estructurada de una manera muy espec\u00edfica. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, no genere datos de usuario desde formularios de interfaz uno al lado del otro, sep\u00e1relos siempre con al menos un car\u00e1cter." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28234.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28234.json index 1029667477a..8967f38db1a 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28234.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28234.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments." + }, + { + "lang": "es", + "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 2.0.0 y anteriores a las versiones 4.13.40 y 5.3.4, es posible inyectar estilos CSS a trav\u00e9s de BBCode en los comentarios. Las instalaciones s\u00f3lo se ven afectadas si BBCode est\u00e1 habilitado. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, desactive BBCode para comentarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json index 62cd11cc2dd..9b2335a1a13 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28235.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Contao is an open source content management system. Starting in version 4.9.0 and prior to versions 4.13.40 and 5.3.4, when checking for broken links on protected pages, Contao sends the cookie header to external urls as well, the passed options for the http client are used for all requests. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable crawling protected pages." + }, + { + "lang": "es", + "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. A partir de la versi\u00f3n 4.9.0 y antes de las versiones 4.13.40 y 5.3.4, al comprobar si hay enlaces rotos en p\u00e1ginas protegidas, Contao tambi\u00e9n env\u00eda el encabezado de la cookie a URL externas; las opciones pasadas para el cliente http se utilizan para todas las solicitudes. . Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, desactive el rastreo de p\u00e1ginas protegidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json index 56587d0631e..340aa8b43a8 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28896.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json index 77e2915be79..05c71d2a15a 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28897.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json index e03b8ee0824..904f5acc446 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28898.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json index e10ca8f1f07..43053e802b4 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28900.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json index b1285e60768..2f7c9e9f2ff 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28901.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json index 6b8c6404fee..9cfede383cd 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28902.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del Administrador de conexi\u00f3n de acceso remoto de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json index 84470c6cd69..ed8a9bbddcd 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28903.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json index 236d1314f18..6808acad1c7 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28904.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del sistema de archivos de intermediaci\u00f3n de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json index 7d6fc30e88c..95a38187ae2 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28905.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del sistema de archivos de intermediaci\u00f3n de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json index 80505050aea..39bef523f23 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28906.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json index 5342ac95dc2..22c4c37d475 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28907.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del sistema de archivos de intermediaci\u00f3n de Microsoft" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json index 2587fe0f073..58872a89074 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28908.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json index decc69d27c4..3729001cdf5 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28909.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json index 4839cb57724..ed0aaf5ff06 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28910.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json index 2085fab0469..778d4b9e41c 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28911.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json index 7673813d9af..91e99abd6bd 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28912.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json index 0c4e42475b4..d0341a0b79f 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28913.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json index de786d009c9..1193b14d076 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28914.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json index b341e2123de..6074feac65e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28915.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json index 6d01241a11b..7ab94a32038 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28917.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el alcance del cl\u00faster de extensi\u00f3n de Kubernetes habilitada para Azure Arc" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json index c9bfde5b7af..6d8ddc09342 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28919.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json index c86af95c2bb..6f0032e0439 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28920.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json index e47fe73433b..06b9d9424a7 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28921.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json index 3ac78eb2321..412830b135f 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28922.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json index 175beda84af..fd516812158 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28923.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json index 15ebb9a7447..7402a203a6b 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28924.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json index 8d804f8d80d..25b1bd8eddb 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28925.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json index 1075b28afc1..3f66acc4119 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28926.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json index 2b3c13dfe12..474e20125dd 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28927.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json index ba8a474c4ac..b68997ac078 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28929.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json index 23a725ecc78..417cdf93df6 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28930.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json index b8eac014df7..bd3265706f9 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28931.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json index 97ac0f02f7d..5ab20d420be 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28932.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json index 6383e7ad0c2..83d56aca953 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28933.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json index 51890c2b877..3593a575ba2 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28934.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json index e125faacc75..c2bbe99377d 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28935.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json index 433a772e692..d95887ba572 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28936.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json index ef79a4e53ba..f7feabd237e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28937.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json index 67d9b938b20..0e19df10c9e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28938.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json index 12acfef500d..9fc6bcb92c9 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28939.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json index 381e09ffa70..4855a02adea 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28940.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json index 13e0df36a9f..a7a3fa44f33 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28941.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json index 747d788830f..55a828e2508 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28942.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json index 5b21eeb27e7..43287d3a9f1 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28943.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json index cbd58c54ef9..02d4e00f29a 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28944.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json index 6bad1d25f17..c21143c25a4 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28945.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28949.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28949.json index f1838d90a14..d0dc5bb6b42 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28949.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28949.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.\n\n" + }, + { + "lang": "es", + "value": "Las versiones de Mattermost Server 9.5.x anteriores a 9.5.2, 9.4.x anteriores a 9.4.4, 9.3.x anteriores a 9.3.3, 8.1.x anteriores a 8.1.11 no limitan el n\u00famero de preferencias de usuario que permiten a un atacante enviar un gran n\u00famero de preferencias del usuario que pueden causar denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2804.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2804.json index 9134e86cec4..ba77e376e99 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2804.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2804.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Network Summary plugin for WordPress is vulnerable to SQL Injection via the 'category' parameter in all versions up to, and including, 2.0.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Network Summary para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'categor\u00eda' en todas las versiones hasta la 2.0.11 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2845.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2845.json index cd479bdb262..3ac747c7602 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2845.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2845.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The BetterDocs \u2013 Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer For Elementor & Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 3.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento BetterDocs \u2013 Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer For Elementor & Gutenberg para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 3.4.2 incluida debido a una sanitizaci\u00f3n insuficiente de las entradas y a que la salida se escape en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json index 03d312396ca..d78f384a8a2 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2847.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.24.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WordPress File Upload para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 4.24.5 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2871.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2871.json index 4ba46a45287..c53af70f627 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2871.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2871.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Media Library Assistant plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode(s) in all versions up to, and including, 3.13 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Media Library Assistant para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 3.13 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json index 8bc0bb397ac..5a1111bda5e 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29043.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador ODBC de Microsoft para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json index 687170c2f6f..7236b58b8c2 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29044.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json index 2613a04e900..024c465c860 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29045.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json index 9d9d77c75f1..5798a351710 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29046.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json index fea8727d75b..81ddffff2d1 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29047.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json index 6a3760bb92b..0299420cef6 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29048.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json index 15d4cf3028d..931e6df9102 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29050.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Cryptographic Services Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de los servicios criptogr\u00e1ficos de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json index 5ef7bf05fa2..4b836b93867 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29052.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Storage Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el almacenamiento de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json index 6ef803d2ec8..3be375287eb 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29053.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Defender para IoT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json index 0dacba401e4..928b4386d93 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29054.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Defender para IoT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json index 2f016b8df9c..91587646ad0 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29055.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Defender para IoT" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json index 8be92dd6989..c84499723b4 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29056.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Authentication Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de autenticaci\u00f3n de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json index 080f7f1e4bb..a4e068f7269 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29061.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json index dfe15226d14..ca63a5cbb5f 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29062.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de arranque seguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json index 3adf798d5bb..a475f6642fd 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29063.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure AI Search Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de b\u00fasqueda de Azure AI" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json index 29d8416d884..ec1f52e3510 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29064.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Hyper-V Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Hyper-V" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json index f8e9ccbd17c..598bb5b03e9 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29066.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Windows Distributed File System (DFS) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del sistema de archivos distribuido (DFS) de Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29221.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29221.json index 18e7a1eafaa..812e97963c0 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29221.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29221.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Access Control in Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 lacked proper access control in the `/api/v4/users/me/teams` endpoint\u00a0allowing\u00a0a team admin to get the invite ID of their team, thus allowing them to invite users, even if the \"Add Members\" permission was explicitly removed from team admins. \n\n" + }, + { + "lang": "es", + "value": "Control de acceso inadecuado en las versiones de Mattermost Server 9.5.x anteriores a 9.5.2, 9.4.x anteriores a 9.4.4, 9.3.x anteriores a 9.3.3, 8.1.x anteriores a 8.1.11 carec\u00edan de control de acceso adecuado en el endpoint `/api/v4/users/me/teams` que permite a un administrador de equipo obtener el ID de invitaci\u00f3n de su equipo, lo que les permite invitar a usuarios, incluso si el permiso \"Agregar miembros\" se elimin\u00f3 expl\u00edcitamente de los administradores de equipo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json index 60a4c4e23ec..f89284ec625 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29269.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter." + }, + { + "lang": "es", + "value": "Un problema descubierto en Telesquare TLR-2005Ksh 1.0.0 y 1.1.4 permite a los atacantes ejecutar comandos arbitrarios del sistema a trav\u00e9s del par\u00e1metro Cmd." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json index f6ee56807e1..89602604459 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29296.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de enumeraci\u00f3n de usuarios en Portainer CE 2.19.4. Este problema ocurre durante el proceso de autenticaci\u00f3n del usuario, donde una diferencia en el tiempo de respuesta podr\u00eda permitir que un usuario remoto no autenticado determine si un nombre de usuario es v\u00e1lido o no." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29439.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29439.json index e4ab657fc5d..80c885ec62f 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29439.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29439.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos escalar privilegios e inyectar nodos ROS2 maliciosos en el sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29441.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29441.json index 183950be6b7..3a6fa5ce5e5 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29441.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29441.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29443.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29443.json index 7cedab288e7..0b6a834df56 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29443.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29443.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29444.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29444.json index 7fb18f4af6e..b658402cbcf 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29444.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29444.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema, y scripts de interfaz." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29445.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29445.json index 545d11813bc..c65dea5b802 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29445.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29445.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 (Robot Operating System 2) Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3 donde el sistema transmite mensajes en texto plano, lo que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29447.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29447.json index b29a35c2d8d..31ba20c7f6c 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29447.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29447.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Humble Hawksbill en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando credenciales predeterminadas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29449.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29449.json index 9c8ae951c1b..a6d5f3be78a 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29449.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29449.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Humble Hawksbill en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de ataques de intermediario debido a la transmisi\u00f3n de datos en texto plano a trav\u00e9s de los canales de comunicaci\u00f3n de los nodos ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json index 7a7bac50571..1c5f4ac183c 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29460.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue in PX4 Autopilot v.1.14.0 allows an attacker to manipulate the flight path allowing for crashes of the drone via the home point location of the mission_block.cpp component." + }, + { + "lang": "es", + "value": "Un problema en PX4 Autopilot v.1.14.0 permite a un atacante manipular la ruta de vuelo, lo que permite que el dron se estrelle a trav\u00e9s de la ubicaci\u00f3n del punto de inicio del componente Mission_block.cpp." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json index f00a704a81f..78cf9e08fe1 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue in the kiosk mode of Secure Lockdown Multi Application Edition v2.00.219 allows attackers to execute arbitrary code via running a ClickOnce application instance." + }, + { + "lang": "es", + "value": "Un problema en el modo quiosco de Secure Lockdown Multi Application Edition v2.00.219 permite a los atacantes ejecutar c\u00f3digo arbitrario ejecutando una instancia de aplicaci\u00f3n ClickOnce." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29502.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29502.json index 3f88bd20475..53ec3d5d5d5 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29502.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29502.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue in Secure Lockdown Multi Application Edition v2.00.219 allows attackers to read arbitrary files via using UNC paths." + }, + { + "lang": "es", + "value": "Un problema en Secure Lockdown Multi Application Edition v2.00.219 permite a los atacantes leer archivos arbitrarios mediante rutas UNC." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json index fedcce8ee1a..de91dcaba47 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29504.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross Site Scripting vulnerability in Summernote v.0.8.18 and before allows a remote attacker to execute arbtirary code via a crafted payload to the codeview parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting en Summernote v.0.8.18 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro codeview." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29672.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29672.json index 8d3f3106287..2388b71d59b 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29672.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29672.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Directory Traversal vulnerability in zly2006 Reden before v.0.2.514 allows a remote attacker to execute arbitrary code via the DEBUG_RTC_REQUEST_SYNC_DATA in KeyCallbacks.kt." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Directory Traversal en zly2006 Reden anterior a v.0.2.514 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de DEBUG_RTC_REQUEST_SYNC_DATA en KeyCallbacks.kt." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29863.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29863.json index 9d1a25408af..91648ce029e 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29863.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29863.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator." + }, + { + "lang": "es", + "value": "Una condici\u00f3n de ejecuci\u00f3n en instalador ejecutable en Qlik Qlikview anterior a las versiones SR3 de mayo de 2022 (12.70.20300) y SR2 de mayo de 2023 (12,80.20200) puede permitir que un usuario existente con privilegios inferiores haga que el c\u00f3digo se ejecute en el contexto de un administrador de Windows." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29902.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29902.json index 7b01bb86709..4450158d41f 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29902.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29902.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, a remote image with a malicious attachment can cause denial of service of the host machine running Cosign. This can impact other services on the machine that rely on having memory available such as a Redis database which can result in data loss. It can also impact the availability of other services on the machine that will not be available for the duration of the machine denial. The root cause of this issue is that Cosign reads the attachment from a remote image entirely into memory without checking the size of the attachment first. As such, a large attachment can make Cosign read a large attachment into memory; If the attachments size is larger than the machine has memory available, the machine will be denied of service. The Go runtime will make a SigKill after a few seconds of system-wide denial. This issue can allow a supply-chain escalation from a compromised registry to the Cosign user: If an attacher has compromised a registry or the account of an image vendor, they can include a malicious attachment and hurt the image consumer. Version 2.2.4 contains a patch for the vulnerability." + }, + { + "lang": "es", + "value": "Cosign proporciona firma de c\u00f3digo y transparencia para contenedores y binarios. Antes de la versi\u00f3n 2.2.4, una imagen remota con un archivo adjunto malicioso pod\u00eda provocar una denegaci\u00f3n de servicio en la m\u00e1quina host que ejecuta Cosign. Esto puede afectar a otros servicios de la m\u00e1quina que dependen de la memoria disponible, como una base de datos de Redis, lo que puede provocar la p\u00e9rdida de datos. Tambi\u00e9n puede afectar la disponibilidad de otros servicios en la m\u00e1quina que no estar\u00e1n disponibles mientras dure la denegaci\u00f3n de la m\u00e1quina. La causa principal de este problema es que Cosign lee el archivo adjunto de una imagen remota completamente en la memoria sin verificar primero el tama\u00f1o del archivo adjunto. Como tal, un archivo adjunto grande puede hacer que Cosign lea un archivo adjunto grande en la memoria; Si el tama\u00f1o de los archivos adjuntos es mayor que la memoria disponible de la m\u00e1quina, se le negar\u00e1 el servicio a la m\u00e1quina. El tiempo de ejecuci\u00f3n de Go realizar\u00e1 un SigKill despu\u00e9s de unos segundos de denegaci\u00f3n en todo el sistema. Este problema puede permitir una escalada de la cadena de suministro desde un registro comprometido hasta el usuario de Cosign: si un adjunto ha comprometido un registro o la cuenta de un proveedor de im\u00e1genes, puede incluir un archivo adjunto malicioso y da\u00f1ar al consumidor de la imagen. La versi\u00f3n 2.2.4 contiene un parche para la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29903.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29903.json index b4d2494a1f4..c1aa3017b40 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29903.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29903.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, maliciously-crafted software artifacts can cause denial of service of the machine running Cosign thereby impacting all services on the machine. The root cause is that Cosign creates slices based on the number of signatures, manifests or attestations in untrusted artifacts. As such, the untrusted artifact can control the amount of memory that Cosign allocates. The exact issue is Cosign allocates excessive memory on the lines that creates a slice of the same length as the manifests. Version 2.2.4 contains a patch for the vulnerability." + }, + { + "lang": "es", + "value": "Cosign proporciona firma de c\u00f3digo y transparencia para contenedores y binarios. Antes de la versi\u00f3n 2.2.4, los artefactos de software creados con fines malintencionados pod\u00edan provocar la denegaci\u00f3n de servicio de la m\u00e1quina que ejecuta Cosign, lo que afectaba a todos los servicios de la m\u00e1quina. La causa principal es que Cosign crea sectores basados en la cantidad de firmas, manifiestos o certificaciones en artefactos que no son de confianza. Como tal, el artefacto que no es de confianza puede controlar la cantidad de memoria que asigna Cosign. El problema exacto es que Cosign asigna memoria excesiva en las l\u00edneas, lo que crea un segmento de la misma longitud que los manifiestos. La versi\u00f3n 2.2.4 contiene un parche para la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json index b1ef333588e..c85decacc99 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29905.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "DIRAC is an interware, meaning a software framework for distributed computing. Prior to version 8.0.41, during the proxy generation process (e.g., when using `dirac-proxy-init`), it is possible for unauthorized users on the same machine to gain read access to the proxy. This allows the user to then perform any action that is possible with the original proxy. This vulnerability only exists for a short period of time (sub-millsecond) during the generation process. Version 8.0.41 contains a patch for the issue. As a workaround, setting the `X509_USER_PROXY` environment variable to a path that is inside a directory that is only readable to the current user avoids the potential risk. After the file has been written, it can be safely copied to the standard location (`/tmp/x509up_uNNNN`)." + }, + { + "lang": "es", + "value": "DIRAC es un interware, es decir, un marco de software para inform\u00e1tica distribuida. Antes de la versi\u00f3n 8.0.41, durante el proceso de generaci\u00f3n del proxy (por ejemplo, cuando se usa `dirac-proxy-init`), es posible que usuarios no autorizados en la misma m\u00e1quina obtengan acceso de lectura al proxy. Esto permite al usuario realizar cualquier acci\u00f3n posible con el proxy original. Esta vulnerabilidad solo existe durante un corto per\u00edodo de tiempo (menos de un milisegundo) durante el proceso de generaci\u00f3n. La versi\u00f3n 8.0.41 contiene un parche para el problema. Como workaround, configurar la variable de entorno `X509_USER_PROXY` en una ruta que est\u00e9 dentro de un directorio que solo sea legible para el usuario actual evita el riesgo potencial. Una vez escrito el archivo, se puede copiar de forma segura a la ubicaci\u00f3n est\u00e1ndar (`/tmp/x509up_uNNNN`)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json index fd2c395402c..2e444ea678e 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29982.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json index c56badc22e1..61f5a414616 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29983.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json index 883d0cba9be..107fcd34ca0 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29984.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json index 04567c407ac..909ed19bc4c 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29985.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del controlador Microsoft OLE DB para SQL Server" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json index 8f05111c407..c2d7ea20f21 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29988.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "SmartScreen Prompt Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de solicitud de SmartScreen" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json index e41186a581e..cdea3b122cf 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29989.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure Monitor Agent Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del agente de Azure Monitor" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json index 753355afca3..56e28cd8a34 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29990.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json index ec2d7e7d381..2850dd94e4e 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29992.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure Identity Library for .NET Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Librer\u00eda de identidad de Azure para la vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de .NET" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json index ca23b029ddf..b72aa6070ed 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29993.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Azure CycleCloud Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure CycleCloud" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json index afdbf998c96..b5275bc5f0f 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper input validation in PAM JIT elevation feature in Devolutions Server 2024.1.6 and earlier allows an attacker with access to the PAM JIT elevation feature to forge the displayed group in the PAM JIT elevation checkout request via a specially crafted request.\n\n" + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la funci\u00f3n de elevaci\u00f3n PAM JIT en Devolutions Server 2024.1.6 y versiones anteriores permite que un atacante con acceso a la funci\u00f3n de elevaci\u00f3n PAM JIT falsifique el grupo mostrado en la solicitud de pago de elevaci\u00f3n PAM JIT a trav\u00e9s de una solicitud especialmente manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json index 3b49770d2c5..1c89d37b514 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2946.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's QR Code Widget in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de c\u00f3digo QR del complemento en todas las versiones hasta la 2.8.4 incluida. debido a una sanitizaci\u00f3n insuficiente de las entradas y a que la salida se escape en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2957.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2957.json index 7d8331bfd7f..ea5a9d5ea92 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2957.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2957.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Simple Ajax Chat \u2013 Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field in all versions up to, and including, 20240216 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Simple Ajax Chat \u2013 Add a Fast, Secure Chat Box para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del campo de nombre en todas las versiones hasta 20240216 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que un atacante no autenticado inyecte scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2974.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2974.json index 83ff43ff77a..3df276b35b7 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2974.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2974.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 5.9.13 via the load_more function. This can allow unauthenticated attackers to extract sensitive data including private and draft posts." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a la exposici\u00f3n de informaci\u00f3n confidencial en versiones hasta la 5.9.13 incluida a trav\u00e9s de la funci\u00f3n load_more. Esto puede permitir a atacantes no autenticados extraer datos confidenciales, incluidas publicaciones privadas y borradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json index 61fce548d48..49e22c5fea0 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Contao is an open source content management system. Prior to version 4.13.40, when a frontend member changes their password in the personal data or the password lost module, the corresponding remember-me tokens are not removed. If someone compromises an account and is able to get a remember-me token, changing the password would not be enough to reclaim control over the account. Version 4.13.40 contains a fix for the issue. As a workaround, disable \"Allow auto login\" in the login module.\n" + }, + { + "lang": "es", + "value": "Contao es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.13.40, cuando un miembro del frontend cambia su contrase\u00f1a en los datos personales o en el m\u00f3dulo de contrase\u00f1a perdida, los tokens de recordarme correspondientes no se eliminan. Si alguien compromete una cuenta y puede obtener un token de recuerdo, cambiar la contrase\u00f1a no ser\u00eda suficiente para recuperar el control de la cuenta. La versi\u00f3n 4.13.40 contiene una soluci\u00f3n para el problema. Como workaround, deshabilite \"Permitir inicio de sesi\u00f3n autom\u00e1tico\" en el m\u00f3dulo de inicio de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30702.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30702.json index d97bf0af914..bdda1901512 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30702.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30702.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30703.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30703.json index a575e1b1de9..8361ed35742 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30703.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30703.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitrarios en ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de una carga \u00fatil manipulada para el Mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30704.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30704.json index 406ed719bee..043a15ece55 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30704.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30704.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de entradas manipuladas en los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30706.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30706.json index 5266149d090..f72159f725a 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30706.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30706.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las versiones ROS2 Dashing Diademata ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30707.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30707.json index 8fa9fff614a..a4926a9e1fd 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30707.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30707.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos escalar privilegios e inyectar nodos ROS2 maliciosos en el sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30708.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30708.json index 89d4abb3fda..841fd9cb249 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30708.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30708.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30710.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30710.json index 31f8f9a9410..d9fed7d8a9e 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30710.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30710.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder f\u00e1cilmente a estos datos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30711.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30711.json index 0ef6a4a93ba..462327ecdb6 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30711.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30711.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando las credenciales predeterminadas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30712.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30712.json index 92e3a85de50..8a18fb10172 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30712.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30712.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS2 (Robot Operating System 2) Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30713.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30713.json index 447ad620f2c..b6add0f0ae5 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30713.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30713.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de los m\u00f3dulos de ejecuci\u00f3n de comandos externos, los controladores de llamadas del sistema y los scripts de interfaz." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30715.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30715.json index 95ed5b59833..96ffeaa0317 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30715.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30715.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30716.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30716.json index 684a605e5d0..864e821e0e3 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30716.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30716.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An insecure logging vulnerability in ROS2 Dashing Diademata ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attacks to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de registro inseguro en ROS2 Dashing Diademata ROS_VERSION 2 y ROS_PYTHON_VERSION 3 permite que los ataques obtengan informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30718.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30718.json index c2acf79d098..a6e4b204122 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30718.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30718.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION=2 and ROS_PYTHON_VERSION=3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Dashing Diademata en ROS_VERSION=2 y ROS_PYTHON_VERSION=3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30719.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30719.json index 7c81716916d..d6620f47a87 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30719.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30719.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An insecure deserialization vulnerability has been identified in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, mecanismos de comunicaci\u00f3n entre procesos e interfaces de comunicaci\u00f3n de red." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30721.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30721.json index a623c118386..85ca9d7798a 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30721.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30721.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An arbitrary file upload vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS2 Dashing Diademata en ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del Sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30722.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30722.json index 1e394361e14..6e2110effa9 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30722.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30722.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de los nodos ROS." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30723.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30723.json index eaaf2207d54..652a2aca182 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30723.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30723.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An unauthorized node injection vulnerability has been identified in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS nodes into the system due to insecure permissions." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizado en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos escalar privilegios e inyectar nodos ROS maliciosos en el sistema debido a permisos inseguros." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30724.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30724.json index 19849531879..c32af73543f 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30724.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30724.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30726.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30726.json index 86bdc99d850..79cbb0ab170 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30726.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30726.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A shell injection vulnerability was discovered in ROS (Robot Operating System) Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS handles shell command execution in components like command interpreters or interfaces that process external inputs." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de shell en ROS (Robot Operating System) Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS maneja la ejecuci\u00f3n de comandos de shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30727.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30727.json index f5ab202a2d8..f4cfe60eab8 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30727.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30727.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS Kinetic Kame in Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to obtain sensitive information via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en Kinetic Kame ROS_VERSION 1 y ROS_ PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano, lo que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de un ataque de intermediario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30728.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30728.json index 3638f63e724..3c6a4ade259 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30728.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30728.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS (sistema operativo de robot) Kinetic Kame ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados obtener acceso utilizando las credenciales predeterminadas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30729.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30729.json index 3acedee16df..20bb867928b 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30729.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30729.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An OS command injection vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s de m\u00f3dulos de ejecuci\u00f3n de comandos externos, controladores de llamadas del sistema y scripts de interfaz." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30730.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30730.json index 818bd938cef..084d2d1db15 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30730.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30730.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An insecure logging vulnerability has been identified within ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de registro inseguro dentro de ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30733.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30733.json index 6d2e57f865d..769035fb4dc 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30733.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30733.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings within these components." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas dentro de estos componentes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30735.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30735.json index 23f7e586084..0cf6cd8e1b7 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30735.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30735.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An arbitrary file upload vulnerability has been discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS system, including the server\u2019s functionality for handling file uploads and the associated validation processes." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos de ROS. sistema, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30736.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30736.json index 527a785b36a..eab1c72b277 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30736.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30736.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An insecure deserialization vulnerability has been identified in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30737.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30737.json index 91efc015544..5156c4e57f6 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30737.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30737.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue was discovered in ROS Kinetic Kame in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS system." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS Kinetic Kame en ROS_VERSION 1 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json index f82be67bd1a..1b08305583f 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30849.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Arbitrary file upload vulnerability in Sourcecodester Complete E-Commerce Site v1.0, allows remote attackers to execute arbitrary code via filename parameter in admin/products_photo.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga de archivos arbitrarios en Sourcecodester Complete E-Commerce Site v1.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de nombre de archivo en admin/products_photo.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json index 4877faaca44..b9507d77d11 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30891.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A command injection vulnerability exists in /goform/exeCommand in Tenda AC18 v15.03.05.05, which allows attackers to construct cmdinput parameters for arbitrary command execution." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en /goform/exeCommand en Tenda AC18 v15.03.05.05, que permite a los atacantes construir par\u00e1metros cmdinput para la ejecuci\u00f3n de comandos arbitrarios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3020.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3020.json index b25dda19a5f..066e60c7142 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3020.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3020.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The plugin is vulnerable to PHP Object Injection in versions up to and including, 2.6.3 via deserialization of untrusted input in the import function via the 'shortcode' parameter. This allows authenticated attackers, with administrator-level access to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento es vulnerable a la inyecci\u00f3n de objetos PHP en versiones hasta la 2.6.3 incluida mediante la deserializaci\u00f3n de entradas que no son de confianza en la funci\u00f3n de importaci\u00f3n a trav\u00e9s del par\u00e1metro 'shortcode'. Esto permite a atacantes autenticados, con acceso a nivel de administrador, inyectar un objeto PHP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json index 25b2c69b6a7..ba0f0856d7d 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "In Eclipse Kura LogServlet component included in versions 5.0.0 to 5.4.1, a specifically crafted request to the servlet can allow an unauthenticated user to retrieve the device logs. Also, downloaded logs may be used by an attacker to perform privilege escalation by using the session id of an authenticated user reported in logs.\n\nThis issue affects org.eclipse.kura:org.eclipse.kura.web2 version range [2.0.600, 2.4.0], which is included in Eclipse Kura version range [5.0.0, 5.4.1]\n\n" + }, + { + "lang": "es", + "value": "En el componente Eclipse Kura LogServlet incluido en las versiones 5.0.0 a 5.4.1, una solicitud manipulada espec\u00edficamente al servlet puede permitir que un usuario no autenticado recupere los registros del dispositivo. Adem\u00e1s, un atacante puede utilizar los registros descargados para realizar una escalada de privilegios utilizando la identificaci\u00f3n de sesi\u00f3n de un usuario autenticado informado en los registros. Este problema afecta al rango de versiones org.eclipse.kura:org.eclipse.kura.web2 [2.0.600, 2.4.0], que se incluye en el rango de versiones de Eclipse Kura [5.0.0, 5.4.1]." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json index b9a6686ac78..b43e71a506c 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3053.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Forminator \u2013 Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 forminator_form shortcode attribute in versions up to, and including, 1.29.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Forminator \u2013 Contact Form, Payment Form & Custom Form Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo de c\u00f3digo corto 'id' forminator_form en versiones hasta la 1.29.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3064.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3064.json index 54a207c5a03..e44662a2d8d 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3064.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3064.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Elementor Addons, Widgets and Enhancements \u2013 Stax plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'Heading' widgets in all versions up to, and including, 1.4.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complementos Elementor Addons, Widgets and Enhancements \u2013 Stax para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets de 'Encabezado' del complemento en todas las versiones hasta la 1.4.4.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente de las entradas y a que la salida se escape en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3093.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3093.json index bbec6d64fa8..6c7625301b9 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3093.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3093.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Font Farsi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including 1.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Font Farsi para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 1.6.6 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3097.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3097.json index bf2bb8cb39a..d36c6bafef0 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3097.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3097.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WordPress Gallery Plugin \u2013 NextGEN Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the get_item function in versions up to, and including, 3.59. This makes it possible for unauthenticated attackers to extract sensitive data including EXIF and other metadata of any image uploaded through the plugin." + }, + { + "lang": "es", + "value": "El complemento WordPress Gallery Plugin \u2013 NextGEN Gallery para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n get_item en versiones hasta la 3.59 incluida. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluidos EXIF y otros metadatos de cualquier imagen cargada a trav\u00e9s del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31285.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31285.json index ec84ee4d7d2..ce3b10271cc 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31285.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31285.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tooltip WordPress Tooltips allows Stored XSS.This issue affects WordPress Tooltips: from n/a through 9.5.3.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Tooltip WordPress Tooltips permite almacenar XSS. Este problema afecta a la informaci\u00f3n sobre herramientas de WordPress: desde n/a hasta 9.5.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31361.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31361.json index 2e9b783755a..0573ce7c69d 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31361.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31361.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bunny.Net allows Stored XSS.This issue affects bunny.Net: from n/a through 2.0.1.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en bunny.Net permite almacenar XSS. Este problema afecta a bunny.Net: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31387.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31387.json index 7bcfe629076..384316cd11d 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31387.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31387.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Popup LikeBox Team Popup Like box allows Stored XSS.This issue affects Popup Like box: from n/a through 3.7.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Popup LikeBox Team Popup Like box permite almacenar XSS. Este problema afecta el cuadro Popup Like: desde n/a hasta 3.7.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31430.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31430.json index d1e9b5616bc..ec6e35694be 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31430.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31430.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF \u2013 WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR \u2013 Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net.This issue affects WOLF \u2013 WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.1; BEAR \u2013 Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net: from n/a through 1.1.4.1.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en realmag777 WOLF \u2013 WordPress Posts Bulk Editor and Manager Professional, realmag777 BEAR \u2013 Bulk Editor and Products Manager Professional para WooCommerce de Pluginus.Net. Este problema afecta a WOLF \u2013 WordPress Posts Bulk Editor and Manager Professional: desde n/a hasta 1.0.8.1; BEAR \u2013 Editor masivo y administrador de productos profesional para WooCommerce de Pluginus.Net: desde n/a hasta 1.1.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31453.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31453.json index 3e163b0acb8..26217e89947 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31453.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31453.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.2.0, the absence of restrictions on the endpoint, which allows users to create a path for uploading a file in a file distribution, allows an attacker to add arbitrary files to the distribution. The vulnerability allows an attacker to influence those users who come to the file distribution after them and slip the victim files with a malicious or phishing signature. Version 2.2.0 contains a patch for the issue.\n\nCVE-2024-31453 allows users to violate the integrity of a file bucket and upload new files there, while the vulnerability with the number CVE-2024-31454 allows users to violate the integrity of a single file that is uploaded by another user by writing data there and not allows you to upload new files to the bucket. Thus, vulnerabilities are reproduced differently, require different security recommendations and affect different objects of the application\u2019s business logic." + }, + { + "lang": "es", + "value": "PsiTransfer es una soluci\u00f3n para compartir archivos autohospedada y de c\u00f3digo abierto. Antes de la versi\u00f3n 2.2.0, la ausencia de restricciones en el endpoint, que permit\u00eda a los usuarios crear una ruta para cargar un archivo en una distribuci\u00f3n de archivos, permit\u00eda a un atacante agregar archivos arbitrarios a la distribuci\u00f3n. La vulnerabilidad permite a un atacante influir en los usuarios que llegan despu\u00e9s de ellos a la distribuci\u00f3n de archivos y deslizar los archivos de la v\u00edctima con una firma maliciosa o de phishing. La versi\u00f3n 2.2.0 contiene un parche para el problema. CVE-2024-31453 permite a los usuarios violar la integridad de un dep\u00f3sito de archivos y cargar nuevos archivos all\u00ed, mientras que la vulnerabilidad con el n\u00famero CVE-2024-31454 permite a los usuarios violar la integridad de un solo archivo cargado por otro usuario escribiendo datos all\u00ed y no le permite cargar nuevos archivos al dep\u00f3sito. Por lo tanto, las vulnerabilidades se reproducen de manera diferente, requieren diferentes recomendaciones de seguridad y afectan a diferentes objetos de la l\u00f3gica empresarial de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31454.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31454.json index 034bc94c720..e10e20ec667 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31454.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31454.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.2.0, the absence of restrictions on the endpoint, which is designed for uploading files, allows an attacker who received the id of a file distribution to change the files that are in this distribution. The vulnerability allows an attacker to influence those users who come to the file distribution after them and slip the victim files with a malicious or phishing signature. Version 2.2.0 contains a patch for this issue.\n\nCVE-2024-31454 allows users to violate the integrity of a file that is uploaded by another user. In this case, additional files are not loaded into the file bucket. Violation of integrity at the level of individual files. While the vulnerability with the number CVE-2024-31453 allows users to violate the integrity of a file bucket without violating the integrity of files uploaded by other users. Thus, vulnerabilities are reproduced differently, require different security recommendations and affect different objects of the application\u2019s business logic." + }, + { + "lang": "es", + "value": "PsiTransfer es una soluci\u00f3n para compartir archivos autohospedada y de c\u00f3digo abierto. Antes de la versi\u00f3n 2.2.0, la ausencia de restricciones en el endpoint, que est\u00e1 manipulado para cargar archivos, permit\u00eda a un atacante que recib\u00eda la identificaci\u00f3n de una distribuci\u00f3n de archivos cambiar los archivos que se encuentran en esta distribuci\u00f3n. La vulnerabilidad permite a un atacante influir en los usuarios que llegan despu\u00e9s de ellos a la distribuci\u00f3n de archivos y deslizar los archivos de la v\u00edctima con una firma maliciosa o de phishing. La versi\u00f3n 2.2.0 contiene un parche para este problema. CVE-2024-31454 permite a los usuarios violar la integridad de un archivo subido por otro usuario. En este caso, los archivos adicionales no se cargan en el dep\u00f3sito de archivos. Violaci\u00f3n de la integridad a nivel de archivos individuales. Mientras que la vulnerabilidad con el n\u00famero CVE-2024-31453 permite a los usuarios violar la integridad de un dep\u00f3sito de archivos sin violar la integridad de los archivos cargados por otros usuarios. Por lo tanto, las vulnerabilidades se reproducen de manera diferente, requieren diferentes recomendaciones de seguridad y afectan a diferentes objetos de la l\u00f3gica empresarial de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json index 17f6738af35..4dea55fcc18 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31455.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Minder by Stacklok is an open source software supply chain security platform. A refactoring in commit `5c381cf` added the ability to get GitHub repositories registered to a project without specifying a specific provider. Unfortunately, the SQL query for doing so was missing parenthesis, and would select a random repository. This issue is patched in pull request 2941. As a workaround, revert prior to `5c381cf`, or roll forward past `2eb94e7`." + }, + { + "lang": "es", + "value": "Minder de Stacklok es una plataforma de seguridad de la cadena de suministro de software de c\u00f3digo abierto. Una refactorizaci\u00f3n en el commit `5c381cf` agreg\u00f3 la capacidad de registrar repositorios de GitHub en un proyecto sin especificar un proveedor espec\u00edfico. Desafortunadamente, a la consulta SQL para hacerlo le faltaba par\u00e9ntesis y seleccionaba un repositorio aleatorio. Este problema se solucion\u00f3 en la solicitud de extracci\u00f3n 2941. Como workaround, revierta antes de `5c381cf` o avance m\u00e1s all\u00e1 de `2eb94e7`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31457.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31457.json index e87e0adfe03..f9af9ba160c 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31457.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31457.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. gin-vue-admin pseudoversion 0.0.0-20240407133540-7bc7c3051067, corresponding to version 2.6.1, has a code injection vulnerability in the backend. In the Plugin System -> Plugin Template feature, an attacker can perform directory traversal by manipulating the `plugName` parameter. They can create specific folders such as `api`, `config`, `global`, `model`, `router`, `service`, and `main.go` function within the specified traversal directory. Moreover, the Go files within these folders can have arbitrary code inserted based on a specific PoC parameter. The main reason for the existence of this vulnerability is the controllability of the PlugName field within the struct. Pseudoversion 0.0.0-20240409100909-b1b7427c6ea6, corresponding to commit b1b7427c6ea6c7a027fa188c6be557f3795e732b, contains a patch for the issue. As a workaround, one may manually use a filtering method available in the GitHub Security Advisory to rectify the directory traversal problem." + }, + { + "lang": "es", + "value": "gin-vue-admin es un sistema de gesti\u00f3n backstage basado en vue y gin, que separa la parte delantera y trasera de la pila completa. La pseudoversi\u00f3n 0.0.0-20240407133540-7bc7c3051067 de gin-vue-admin, correspondiente a la versi\u00f3n 2.6.1, tiene una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en el backend. En la funci\u00f3n Sistema de complementos -> Plantilla de complemento, un atacante puede realizar un directory traversal manipulando el par\u00e1metro `plugName`. Pueden crear carpetas espec\u00edficas como `api`, `config`, `global`, `model`, `router`, `service` y la funci\u00f3n `main.go` dentro de directory traversal especificado. Adem\u00e1s, los archivos Go dentro de estas carpetas pueden tener c\u00f3digo arbitrario insertado en funci\u00f3n de un par\u00e1metro PoC espec\u00edfico. La raz\u00f3n principal de la existencia de esta vulnerabilidad es la controlabilidad del campo PlugName dentro de la estructura. La pseudoversi\u00f3n 0.0.0-20240409100909-b1b7427c6ea6, correspondiente a el commit b1b7427c6ea6c7a027fa188c6be557f3795e732b, contiene un parche para el problema. Como workaround, se puede utilizar manualmente un m\u00e9todo de filtrado disponible en el aviso de seguridad de GitHub para rectificar el problema de directory traversal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31465.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31465.json index 04ccd5a0cba..9a255996e70 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31465.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31465.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.20, 15.5.4, and 15.9-rc-1, any user with edit right on any page can execute any code on the server by adding an object of type `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the document `XWiki.SearchSuggestSourceSheet`." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 5.0-rc-1 y antes de las versiones 14.10.20, 15.5.4 y 15.9-rc-1, cualquier usuario con derecho de edici\u00f3n en cualquier p\u00e1gina puede ejecutar cualquier c\u00f3digo en el servidor agregando un objeto de tipo `XWiki .SearchSuggestSourceClass` a su perfil de usuario o cualquier otra p\u00e1gina. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.20, 15.5.4 y 15.10 RC1. Como workaround, aplique manualmente el parche al documento `XWiki.SearchSuggestSourceSheet`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json index 267ce643954..e79f1e84a8e 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31487.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 may allows attacker to information disclosure via crafted http requests." + }, + { + "lang": "es", + "value": "Una limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"path traversal\") en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.4 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.5 y 3.2.0 a 3.2. 4 y 3.1.0 a 3.1.5 y 3.0.0 a 3.0.7 y 2.5.0 a 2.5.2 y 2.4.0 a 2.4.1 pueden permitir al atacante la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de solicitudes http manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json index 71667a21105..6a403010198 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An external control of file name or path vulnerability [CWE-73] in FortiClientMac version 7.2.3 and below, version 7.0.10 and below installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process." + }, + { + "lang": "es", + "value": "Un control externo de la vulnerabilidad de nombre de archivo o ruta [CWE-73] en FortiClientMac versi\u00f3n 7.2.3 y anteriores, versi\u00f3n 7.0.10 y el instalador inferior puede permitir a un atacante local ejecutar c\u00f3digo o comandos arbitrarios escribiendo un archivo de configuraci\u00f3n malicioso en /tmp antes de iniciar el proceso de instalaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json index ad5e50fcb1e..3a47772397a 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the \"id\" parameter in admin/admin_cs.php." + }, + { + "lang": "es", + "value": "Sourcecodester Online Graduate Tracer System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"id\" en admin/admin_cs.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json index 1e7f9f44e95..1eb6941633f 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31507.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the \"request\" parameter in admin/fetch_gendercs.php." + }, + { + "lang": "es", + "value": "Sourcecodester Online Graduate Tracer System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"solicitud\" en admin/fetch_gendercs.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json index 681f63cacf0..e6faac35841 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into \u201cremarks\u201d, \u201cborrower_name\u201d, \u201cfaculty_department\u201d parameters in /classes/Master.php?f=save_record." + }, + { + "lang": "es", + "value": "Vulnerabilidad de cross-site scripting (XSS) almacenado en Computer Laboratory Management System v1.0 permite a los atacantes ejecutar c\u00f3digo JavaScript arbitrario al incluir payloads maliciosos en los par\u00e1metros \"remarks\", \"borrower_name\", \"faculty_department\" en /classes/Master.php? f=save_record." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31819.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31819.json index 67284c81c5e..97bcb3bf916 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31819.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31819.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component." + }, + { + "lang": "es", + "value": "Un problema en WWBN AVideo v.12.4 a v.14.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro systemRootPath del componente submitIndex.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json index ccb687e1bfa..53f4cb6eb83 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31864.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.\n\nThe attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver.\nThis issue affects Apache Zeppelin: before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\") en Apache Zeppelin. El atacante puede inyectar configuraci\u00f3n confidencial o c\u00f3digo malicioso al conectar la base de datos MySQL a trav\u00e9s del controlador JDBC. Este problema afecta a Apache Zeppelin: anteriores a 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json index a3836cbf984..a60d4e7f427 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31865.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Zeppelin.\n\nThe attackers can call updating cron API with invalid or improper privileges so that the notebook can run with the privileges.\n\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Zeppelin. Los atacantes pueden solicitar la actualizaci\u00f3n de la API cron con privilegios no v\u00e1lidos o inadecuados para que el port\u00e1til pueda ejecutarse con esos privilegios. Este problema afecta a Apache Zeppelin: desde 0.8.2 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json index c322c203ff6..15149884a96 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31866.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.\n\nThe attackers can execute shell scripts or malicious code by overriding configuration like\u00a0ZEPPELIN_INTP_CLASSPATH_OVERRIDES.\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de codificaci\u00f3n o escape de salida inadecuados en Apache Zeppelin. Los atacantes pueden ejecutar scripts de shell o c\u00f3digo malicioso anulando configuraciones como ZEPPELIN_INTP_CLASSPATH_OVERRIDES. Este problema afecta a Apache Zeppelin: desde 0.8.2 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json index 5e0f69a6d25..7fedefe17fa 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31867.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Zeppelin.\n\nThe attackers can execute malicious queries by setting improper configuration properties to LDAP search filter.\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Zeppelin. Los atacantes pueden ejecutar consultas maliciosas estableciendo propiedades de configuraci\u00f3n incorrectas en el filtro de b\u00fasqueda LDAP. Este problema afecta a Apache Zeppelin: desde 0.8.2 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json index 12cf6a55f37..85b97284a79 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.\n\nThe attackers can modify helium.json and exposure XSS attacks to normal users.\nThis issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de codificaci\u00f3n o escape de salida inadecuados en Apache Zeppelin. Los atacantes pueden modificar helium.json y exponer ataques XSS a usuarios normales. Este problema afecta a Apache Zeppelin: desde 0.8.2 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31924.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31924.json index 29712bc9f99..a223f053c11 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31924.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31924.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Exactly WWW EWWW Image Optimizer.This issue affects EWWW Image Optimizer: from n/a through 7.2.3.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Exactly WWW EWWW Image Optimizer. Este problema afecta a EWWW Image Optimizer: desde n/a hasta 7.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31925.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31925.json index 1ec5ab157db..ef0fb7a63a2 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31925.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31925.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FAKTOR VIER F4 Improvements allows Stored XSS.This issue affects F4 Improvements: from n/a through 1.8.0.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en FAKTOR VIER F4 Improvements permite almacenar XSS. Este problema afecta a las mejoras F4: desde n/a hasta 1.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31926.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31926.json index cae13c21e46..51c4b82a346 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31926.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31926.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BracketSpace Advanced Cron Manager \u2013 debug & control allows Stored XSS.This issue affects Advanced Cron Manager \u2013 debug & control: from n/a through 2.5.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en BracketSpace Advanced Cron Manager \u2013 debug & control almacenar XSS. Este problema afecta al Advanced Cron Manager: depuraci\u00f3n y control: desde n/a hasta 2.5.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31927.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31927.json index b4f0f72d466..40c4ce55d40 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31927.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31927.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aminur Islam WP Login and Logout Redirect allows Stored XSS.This issue affects WP Login and Logout Redirect: from n/a through 1.2.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Aminur Islam WP Login and Logout Redirect permite almacenar XSS. Este problema afecta a WP Login y Logout Redirect: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31928.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31928.json index eb3742830d0..c1478052d0d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31928.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31928.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Darko Top Bar allows Stored XSS.This issue affects Top Bar: from n/a through 3.0.5.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Darko Top Bar permite almacenar XSS. Este problema afecta a la barra superior: desde n/a hasta 3.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31929.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31929.json index 6dc927ae601..5d92f526789 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31929.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31929.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Polevaultweb Intagrate Lite allows Stored XSS.This issue affects Intagrate Lite: from n/a through 1.3.7.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Polevaultweb Intagrate Lite permite almacenar XSS. Este problema afecta a Intagrate Lite: desde n/a hasta 1.3.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31930.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31930.json index cad99693f86..02af83ed4c2 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31930.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31930.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.1 .\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pdfcrowd Save as PDF plugin by Pdfcrowd permite almacenar XSS. Este problema afecta el complemento Guardar como PDF de Pdfcrowd: desde n/a hasta 3.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31931.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31931.json index 747117e1a5e..64b82588350 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31931.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31931.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Save as Image plugin by Pdfcrowd allows Stored XSS.This issue affects Save as Image plugin by Pdfcrowd: from n/a through 3.2.1 .\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Save as Image plugin by Pdfcrowd permite almacenar XSS. Este problema afecta al complemento Guardar como imagen de Pdfcrowd: desde n/a hasta 3.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31932.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31932.json index 6b9c467a243..0e48d597734 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31932.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31932.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in CreativeThemes Blocksy Companion.This issue affects Blocksy Companion: from n/a through 2.0.28.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en CreativeThemes Blocksy Companion. Este problema afecta a Blocksy Companion: desde n/a hasta 2.0.28." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31934.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31934.json index 2b65d9cd738..b2d31be5350 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31934.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31934.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Link Whisper Link Whisper Free.This issue affects Link Whisper Free: from n/a through 0.6.9.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Link Whisper Link Whisper Free. Este problema afecta a Link Whisper Free: desde n/a hasta 0.6.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31935.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31935.json index 4cd4bd830f5..97d57e6ba06 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31935.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31935.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in BracketSpace Simple Post Notes.This issue affects Simple Post Notes: from n/a through 1.7.6.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en BracketSpace Simple Post Notes. Este problema afecta a Simple Post Notes: desde n/a hasta 1.7.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31936.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31936.json index 1e6f17e0410..6c4f8b246ab 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31936.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31936.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in AyeCode Ltd UsersWP.This issue affects UsersWP: from n/a before 1.2.6.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en AyeCode Ltd UsersWP. Este problema afecta a UsersWP: desde n/a antes de 1.2.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31937.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31937.json index e7038c3a8dc..6eaa70c93d2 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31937.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31937.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Visitor Analytics TWIPLA (Visitor Analytics IO) allows Stored XSS.This issue affects TWIPLA (Visitor Analytics IO): from n/a through 1.2.0.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Visitor Analytics TWIPLA (Visitor Analytics IO) permite almacenar XSS. Este problema afecta a TWIPLA (Visitor Analytics IO): desde n/a hasta 1.2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31939.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31939.json index da380f52627..aa50b7072f1 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31939.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31939.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Soflyy Import any XML or CSV File to WordPress.This issue affects Import any XML or CSV File to WordPress: from n/a through 3.7.3.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Soflyy Importe cualquier archivo XML o CSV a WordPress. Este problema afecta la importaci\u00f3n de cualquier archivo XML o CSV a WordPress: desde n/a hasta 3.7.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json index f6aa0adcc72..fac027b0903 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31981.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 3.0.1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, remote code execution is possible via PDF export templates. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10-rc-1. If PDF templates are not typically used on the instance, an administrator can create the document `XWiki.PDFClass` and block its edition, after making sure that it does not contain a `style` attribute. Otherwise, there are no known workarounds aside from upgrading." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.0.1 y anteriores a las versiones 4.10.20, 15.5.4 y 15.10-rc-1, la ejecuci\u00f3n remota de c\u00f3digo es posible mediante plantillas de exportaci\u00f3n de PDF. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.20, 15.5.4 y 15.10-rc-1. Si las plantillas PDF no se utilizan normalmente en la instancia, un administrador puede crear el documento \"XWiki.PDFClass\" y bloquear su edici\u00f3n, despu\u00e9s de asegurarse de que no contiene un atributo \"estilo\". De lo contrario, no se conocen workarounds aparte de la actualizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json index 9cd59a438ae..2727511bf82 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31982.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 2.4-milestone-1 y anteriores a las versiones 4.10.20, 15.5.4 y 15.10-rc-1, la b\u00fasqueda en la base de datos de XWiki permite la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del texto de b\u00fasqueda. Esto permite la ejecuci\u00f3n remota de c\u00f3digo para cualquier visitante de un wiki p\u00fablico o usuario de un wiki cerrado, ya que la b\u00fasqueda en la base de datos es accesible de forma predeterminada para todos los usuarios. Esto afecta la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.20, 15.5.4 y 15.10RC1. Como workaround, se puede aplicar manualmente el parche a la p\u00e1gina \"Main.DatabaseSearch\". Como workaround, a menos que los usuarios utilicen expl\u00edcitamente la b\u00fasqueda en la base de datos, esta p\u00e1gina se puede eliminar ya que no es la interfaz de b\u00fasqueda predeterminada de XWiki." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json index 058b3665129..6b21f7bf06d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31983.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. In multilingual wikis, translations can be edited by any user who has edit right, circumventing the rights that are normally required for authoring translations (script right for user-scope translations, wiki admin for translations on the wiki). Starting in version 4.3-milestone-2 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, this can be exploited for remote code execution if the translation value is not properly escaped where it is used. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may restrict edit rights on documents that contain translations." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. En los wikis multiling\u00fces, las traducciones pueden ser editadas por cualquier usuario que tenga derechos de edici\u00f3n, eludiendo los derechos que normalmente se requieren para la autor\u00eda de traducciones (derecho de script para traducciones de alcance de usuario, administrador de wiki para traducciones en el wiki). A partir de la versi\u00f3n 4.3-milestone-2 y anteriores a las versiones 4.10.20, 15.5.4 y 15.10-rc-1, esto se puede aprovechar para la ejecuci\u00f3n remota de c\u00f3digo si el valor de traducci\u00f3n no se escapa correctamente cuando se utiliza. Esto ha sido parcheado en XWiki 14.10.20, 15.5.4 y 15.10RC1. Como workaround, se pueden restringir los derechos de edici\u00f3n de documentos que contienen traducciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json index 1de2abbd187..eb9d76f3b04 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31984.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 7.2-rc-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, by creating a document with a specially crafted title, it is possible to trigger remote code execution in the (Solr-based) search in XWiki. This allows any user who can edit the title of a space (all users by default) to execute any Groovy code in the XWiki installation which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the `Main.SolrSpaceFacet` page." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 7.2-rc-1 y anteriores a las versiones 4.10.20, 15.5.4 y 15.10-rc-1, al crear un documento con un t\u00edtulo especialmente manipulado, es posible activar la ejecuci\u00f3n remota de c\u00f3digo en (Solr- basado) b\u00fasqueda en XWiki. Esto permite que cualquier usuario que pueda editar el t\u00edtulo de un espacio (todos los usuarios de forma predeterminada) ejecute cualquier c\u00f3digo Groovy en la instalaci\u00f3n de XWiki que comprometa la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esto ha sido parcheado en XWiki 14.10.20, 15.5.4 y 15.10 RC1. Como workaround, aplique manualmente el parche a la p\u00e1gina `Main.SolrSpaceFacet`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json index 271da51502d..e133f8ddc12 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, it is possible to schedule/trigger/unschedule existing jobs by having an admin visit the Job Scheduler page through a predictable URL, for example by embedding such an URL in any content as an image. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, manually apply the patch by modifying the `Scheduler.WebHome` page." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.1 y anteriores a las versiones 4.10.20, 15.5.4 y 15.10-rc-1, es posible programar/activar/desprogramar trabajos existentes haciendo que un administrador visite la p\u00e1gina del Programador de trabajos a trav\u00e9s de una URL predecible, por ejemplo incrustando dicha URL en cualquier contenido como una imagen. La vulnerabilidad se solucion\u00f3 en XWiki 14.10.19, 15.5.5 y 15.9. Como workaround, aplique manualmente el parche modificando la p\u00e1gina `Scheduler.WebHome`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json index da3996ce093..dec6c0975ee 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31986.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, by creating a document with a special crafted documented reference and an `XWiki.SchedulerJobClass` XObject, it is possible to execute arbitrary code on the server whenever an admin visits the scheduler page or the scheduler page is referenced, e.g., via an image in a comment on a page in the wiki. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, apply the patch manually by modifying the `Scheduler.WebHome` page." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, al crear un documento con una referencia documentada especialmente manipulada y un XObject `XWiki.SchedulerJobClass`, es posible ejecutar c\u00f3digo arbitrario en el servidor cada vez que un administrador visita la p\u00e1gina del programador o se hace referencia a la p\u00e1gina del programador, por ejemplo, a trav\u00e9s de una imagen en un comentario en una p\u00e1gina de la wiki. La vulnerabilidad se solucion\u00f3 en XWiki 14.10.19, 15.5.5 y 15.9. Como workaround, aplique el parche manualmente modificando la p\u00e1gina `Scheduler.WebHome`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json index 2274c7a5158..6cde5de45cd 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31987.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 6.4-milestone-1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, any user who can edit any page like their profile can create a custom skin with a template override that is executed with programming right, thus allowing remote code execution. This has been patched in XWiki 14.10.19, 15.5.4 and 15.10RC1. No known workarounds are available except for upgrading." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 6.4-milestone-1 y antes de las versiones 4.10.19, 15.5.4 y 15.10-rc-1, cualquier usuario que pueda editar cualquier p\u00e1gina como su perfil puede crear una m\u00e1scara personalizada con una anulaci\u00f3n de plantilla que se ejecuta con derecho de programaci\u00f3n, permitiendo as\u00ed la ejecuci\u00f3n remota de c\u00f3digo. Esto ha sido parcheado en XWiki 14.10.19, 15.5.4 y 15.10RC1. No hay workarounds disponibles excepto la actualizaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json index b1896bd0bc8..a5e66568ac0 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 13.9-rc-1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, when the realtime editor is installed in XWiki, it allows arbitrary remote code execution with the interaction of an admin user with programming right. More precisely, by getting an admin user to either visit a crafted URL or to view an image with this URL that could be in a comment, the attacker can get the admin to execute arbitrary XWiki syntax including scripting macros with Groovy or Python code. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9. As a workaround, one may update `RTFrontend.ConvertHTML` manually with the patch. This will, however, break some synchronization processes in the realtime editor, so upgrading should be the preferred way on installations where this editor is used." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 13.9-rc-1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, cuando el editor en tiempo real est\u00e1 instalado en XWiki, permite la ejecuci\u00f3n remota de c\u00f3digo arbitrario con la interacci\u00f3n de un usuario administrador con programaci\u00f3n correcta. M\u00e1s precisamente, al lograr que un usuario administrador visite una URL manipulada o vea una imagen con esta URL que podr\u00eda estar en un comentario, el atacante puede lograr que el administrador ejecute sintaxis XWiki arbitraria, incluidas macros de scripts con c\u00f3digo Groovy o Python. Esto compromete la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9. Como workaround, se puede actualizar `RTFrontend.ConvertHTML` manualmente con el parche. Sin embargo, esto interrumpir\u00e1 algunos procesos de sincronizaci\u00f3n en el editor en tiempo real, por lo que la actualizaci\u00f3n deber\u00eda ser la forma preferida en instalaciones donde se utiliza este editor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31995.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31995.json index 8cbdc8b58ac..69dc992a09d 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31995.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31995.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "`@digitalbazaar/zcap` provides JavaScript reference implementation for Authorization Capabilities. Prior to version 9.0.1, when invoking a capability with a chain depth of 2, i.e., it is delegated directly from the root capability, the `expires` property is not properly checked against the current date or other `date` param. This can allow invocations outside of the original intended time period. A zcap still cannot be invoked without being able to use the associated private key material. `@digitalbazaar/zcap` v9.0.1 fixes expiration checking. As a workaround, one may revoke a zcap at any time." + }, + { + "lang": "es", + "value": "`@digitalbazaar/zcap` proporciona una implementaci\u00f3n de referencia de JavaScript para capacidades de autorizaci\u00f3n. Antes de la versi\u00f3n 9.0.1, al invocar una capacidad con una profundidad de cadena de 2, es decir, se delega directamente desde la capacidad ra\u00edz, la propiedad \"expires\" no se verifica adecuadamente con la fecha actual u otro par\u00e1metro de \"fecha\". Esto puede permitir invocaciones fuera del per\u00edodo de tiempo previsto original. A\u00fan no se puede invocar un zcap sin poder utilizar el material de clave privada asociado. `@digitalbazaar/zcap` v9.0.1 corrige la verificaci\u00f3n de vencimiento. Como workaround, se puede revocar un zcap en cualquier momento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json index 2a4a37eb1c3..610e950d9e7 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 3.0.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, the HTML escaping of escaping tool that is used in XWiki doesn't escape `{`, which, when used in certain places, allows XWiki syntax injection and thereby remote code execution. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9 RC1. Apart from upgrading, there is no generic workaround. However, replacing `$escapetool.html` by `$escapetool.xml` in XWiki documents fixes the vulnerability. In a standard XWiki installation, the maintainers are only aware of the document `Panels.PanelLayoutUpdate` that exposes this vulnerability, patching this document is thus a workaround. Any extension could expose this vulnerability and might thus require patching, too." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.0.1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, la herramienta de escape HTML que se usa en XWiki no escapa a `{`, que, cuando se usa en ciertos lugares, permite la inyecci\u00f3n de sintaxis XWiki y, por lo tanto, la ejecuci\u00f3n remota de c\u00f3digo. La vulnerabilidad se solucion\u00f3 en XWiki 14.10.19, 15.5.5 y 15.9 RC1. Aparte de la actualizaci\u00f3n, no existe una workaround gen\u00e9rica. Sin embargo, reemplazar `$escapetool.html` por `$escapetool.xml` en los documentos XWiki soluciona la vulnerabilidad. En una instalaci\u00f3n est\u00e1ndar de XWiki, los mantenedores s\u00f3lo conocen el documento `Panels.PanelLayoutUpdate` que expone esta vulnerabilidad, por lo que parchear este documento es una workaround. Cualquier extensi\u00f3n podr\u00eda exponer esta vulnerabilidad y, por lo tanto, tambi\u00e9n podr\u00eda requerir parches." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json index e4faf5ec4ec..42e3630acf4 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, parameters of UI extensions are always interpreted as Velocity code and executed with programming rights. Any user with edit right on any document like the user's own profile can create UI extensions. This allows remote code execution and thereby impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9-RC1. No known workarounds are available." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica. Antes de las versiones 4.10.19, 15.5.4 y 15.10-rc-1, los par\u00e1metros de las extensiones de UI siempre se interpretan como c\u00f3digo Velocity y se ejecutan con derechos de programaci\u00f3n. Cualquier usuario con derecho de edici\u00f3n en cualquier documento, como el propio perfil del usuario, puede crear extensiones de interfaz de usuario. Esto permite la ejecuci\u00f3n remota de c\u00f3digo y, por lo tanto, afecta la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.19, 15.5.4 y 15.9-RC1. No hay workarounds disponibles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31999.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31999.json index 3c422166107..fb4216838fd 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31999.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31999.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "@festify/secure-session creates a secure stateless cookie session for Fastify. At the end of the request handling, it will encrypt all data in the session with a secret key and attach the ciphertext as a cookie value with the defined cookie name. After that, the session on the server side is destroyed. When an encrypted cookie with matching session name is provided with subsequent requests, it will decrypt the ciphertext to get the data. The plugin then creates a new session with the data in the ciphertext. Thus theoretically the web instance is still accessing the data from a server-side session, but technically that session is generated solely from a user provided cookie (which is assumed to be non-craftable because it is encrypted with a secret key not known to the user). The issue exists in the session removal process. In the delete function of the code, when the session is deleted, it is marked for deletion. However, if an attacker could gain access to the cookie, they could keep using it forever. Version 7.3.0 contains a patch for the issue. As a workaround, one may include a \"last update\" field in the session, and treat \"old sessions\" as expired." + }, + { + "lang": "es", + "value": "@festify/secure-session crea una sesi\u00f3n segura de cookies sin estado para Fastify. Al final del manejo de la solicitud, cifrar\u00e1 todos los datos de la sesi\u00f3n con una clave secreta y adjuntar\u00e1 el texto cifrado como un valor de cookie con el nombre de cookie definido. Despu\u00e9s de eso, la sesi\u00f3n en el lado del servidor se destruye. Cuando se proporciona una cookie cifrada con un nombre de sesi\u00f3n coincidente en solicitudes posteriores, descifrar\u00e1 el texto cifrado para obtener los datos. Luego, el complemento crea una nueva sesi\u00f3n con los datos en el texto cifrado. Por lo tanto, en teor\u00eda, la instancia web todav\u00eda accede a los datos desde una sesi\u00f3n del lado del servidor, pero t\u00e9cnicamente esa sesi\u00f3n se genera \u00fanicamente a partir de una cookie proporcionada por el usuario (que se supone que no se puede crear porque est\u00e1 cifrado con una clave secreta que el usuario desconoce). El problema existe en el proceso de eliminaci\u00f3n de la sesi\u00f3n. En la funci\u00f3n de eliminaci\u00f3n del c\u00f3digo, cuando se elimina la sesi\u00f3n, se marca para su eliminaci\u00f3n. Sin embargo, si un atacante pudiera obtener acceso a la cookie, podr\u00eda seguir us\u00e1ndola para siempre. La versi\u00f3n 7.3.0 contiene un parche para el problema. Como workaround, se puede incluir un campo de \"\u00faltima actualizaci\u00f3n\" en la sesi\u00f3n y tratar las \"sesiones antiguas\" como vencidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json index f088d58d152..cfbcb8c6aa5 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3119.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento del b\u00fafer en todas las versiones de sngrep desde la v0.4.2, debido al manejo inadecuado de los encabezados SIP 'Call-ID' y 'X-Call-ID'. Las funciones sip_get_callid y sip_get_xcallid en sip.c usan la funci\u00f3n strncpy para copiar el contenido del encabezado en buffers de tama\u00f1o fijo sin verificar la longitud de los datos. Esta falla permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de mensajes SIP especialmente manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json index 40df59e8573..5847776b933 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3120.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP\u00a0messages." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en todas las versiones de sngrep desde la v1.4.1. La falla se debe a una verificaci\u00f3n inadecuada de los l\u00edmites al copiar los encabezados 'Content-Length' y 'Warning' en b\u00faferes de tama\u00f1o fijo en las funciones sip_validate_packet y sip_parse_extra_headers dentro de src/sip.c. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de mensajes SIP manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3136.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3136.json index b414b559de1..7431c0c4078 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3136.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3136.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.3 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento MasterStudy LMS para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 3.3.3 incluida a trav\u00e9s del par\u00e1metro 'plantilla'. Esto hace posible que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3167.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3167.json index 7c5d9892986..a49a3f6f218 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3167.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3167.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018twitter_username\u2019 parameter in versions up to, and including, 2.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Ocean Extra para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'twitter_username' en versiones hasta la 2.2.6 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32001.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32001.json index 4f45876de69..543f6b05052 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32001.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32001.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. As a workaround, avoid using LookupSubjects for negative authorization decisions and/or avoid using the broken schema.\n" + }, + { + "lang": "es", + "value": "SpiceDB es una base de datos gr\u00e1fica manipulada espec\u00edficamente para almacenar y evaluar datos de control de acceso. Uso de una relaci\u00f3n de la forma: `relation folder: folder | folder#parent` con una flecha como `folder->view` puede hacer que LookupSubjects solo devuelva los asuntos encontrados en los asuntos de `folder` o `folder#parent`. Este error solo se manifiesta si el mismo tipo de asunto se usa en varios tipos en una relaci\u00f3n, existen relaciones para ambos tipos de asunto y se usa una flecha sobre la relaci\u00f3n. Cualquier usuario que tome una decisi\u00f3n de autorizaci\u00f3n negativa basada en los resultados de una solicitud de LookupSubjects con una versi\u00f3n anterior a la v1.30.1 se ver\u00e1 afectado. La versi\u00f3n 1.30.1 contiene un parche para el problema. Como workaround, evite el uso de LookupSubjects para decisiones de autorizaci\u00f3n negativas y/o evite el uso del esquema roto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32083.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32083.json index 388033515d0..602bd3d9fdb 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32083.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32083.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Varun Kumar Easy Logo allows Stored XSS.This issue affects Easy Logo: from n/a through 1.9.3.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Varun Kumar Easy Logo permite almacenar XSS. Este problema afecta a Easy Logo: desde n/a hasta 1.9.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32106.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32106.json index fe9d566f037..1baa8e3eb9b 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32106.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32106.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Compress WP Compress \u2013 Image Optimizer [All-In-One].This issue affects WP Compress \u2013 Image Optimizer [All-In-One]: from n/a through 6.10.35.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Compress WP Compress \u2013 Image Optimizer [All-In-One]. Este problema afecta a WP Compress \u2013 Image Optimizer [All-In-One]: desde n/a hasta 6.10.35." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32107.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32107.json index 8188d67028a..159ae7a798e 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32107.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32107.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in XLPlugins Finale Lite.This issue affects Finale Lite: from n/a through 2.18.0.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en XLPlugins Finale Lite. Este problema afecta a Finale Lite: desde n/a hasta 2.18.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32108.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32108.json index 2592d950644..10e85adf27b 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32108.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32108.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stephanie Leary Convert Post Types.This issue affects Convert Post Types: from n/a through 1.4.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Stephanie Leary Convert Post Types. Este problema afecta a Convert Post Types: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json index c171be276f1..f962831dc40 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode.This issue affects WP Matterport Shortcode: from n/a through 2.1.8.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Julien Berthelot / MPEmbed.Com WP Matterport Shortcode. Este problema afecta a WP Matterport Shortcode: desde n/a hasta 2.1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32112.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32112.json index 554ac44fc63..23b3a60a1ec 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32112.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32112.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Leadinfo leadinfo. The patch was released under the same version which was reported as vulnerable. We consider the current version as vulnerable.This issue affects Leadinfo: from n/a through 1.0.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Leadinfo leadinfo. El parche se lanz\u00f3 con la misma versi\u00f3n que se inform\u00f3 como vulnerable. Consideramos que la versi\u00f3n actual es vulnerable. Este problema afecta a Leadinfo: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3208.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3208.json index e8e4842aef5..c07a2c6a4d1 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3208.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3208.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Sydney Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Filterable Gallery widget in all versions up to, and including, 1.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Sydney Toolbox para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de galer\u00eda filtrable del complemento en todas las versiones hasta la 1.28 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json index 2a9bc8b923f..18edbf68a38 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content \u2013 ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'reg-single-checkbox' shortcode in all versions up to, and including, 4.15.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content \u2013 ProfilePress de WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'reg-single-checkbox' del complemento en todas las versiones hasta, e incluido, 4.15.5 debido a una sanitizaci\u00f3n insuficiente de las entradas y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3213.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3213.json index 744eb1d73a7..376123e80a0 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3213.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3213.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Relevanssi \u2013 A Better Search plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the relevanssi_update_counts() function in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to execute expensive queries on the application that could lead into DOS." + }, + { + "lang": "es", + "value": "El complemento Relevanssi \u2013 A Better Search para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n relevanssi_update_counts() en todas las versiones hasta la 4.22.1 incluida. Esto hace posible que atacantes no autenticados ejecuten consultas costosas en la aplicaci\u00f3n que podr\u00edan conducir a DOS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json index 1f217e3a7d2..fa3a4451960 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Relevanssi \u2013 A Better Search plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration." + }, + { + "lang": "es", + "value": "El complemento Relevanssi \u2013 A Better Search para WordPress es vulnerable a la inyecci\u00f3n CSV en todas las versiones hasta la 4.22.1 incluida. Esto hace posible que atacantes no autenticados incrusten datos no confiables en archivos CSV exportados, lo que puede resultar en la ejecuci\u00f3n de c\u00f3digo cuando estos archivos se descargan y abren en un sistema local con una configuraci\u00f3n vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json index 941511d106e..44227f6dc9f 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3217.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value' and 'attribute_id' parameters in all versions up to, and including, 1.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WP Directory Kit para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'attribute_value' y 'attribute_id' en todas las versiones hasta la 1.3.0 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en el consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3235.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3235.json index c6287e62c79..5e60f3fcc3f 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3235.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3235.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Essential Grid Gallery WordPress Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.1 via the on_front_ajax_action() function. This makes it possible for unauthenticated attackers to view private and password protected posts that may have private or sensitive information." + }, + { + "lang": "es", + "value": "El complemento Essential Grid Gallery de WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.1.1 incluida a trav\u00e9s de la funci\u00f3n on_front_ajax_action(). Esto hace posible que atacantes no autenticados vean publicaciones privadas y protegidas con contrase\u00f1a que pueden contener informaci\u00f3n privada o confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json index 2c61a7f5b49..a8501b91dd5 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3244.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's \r\n'embedpress_calendar' shortcode in all versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'embedpress_calendar' del complemento en todas las versiones hasta hasta, e incluyendo, 3.9.14 debido a una sanitizaci\u00f3n insuficiente de las entradas y a la salida de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json index 97a691539cb..010ad7c808c 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL attribute of widgets in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bold Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo URL de los widgets en todas las versiones hasta la 4.8.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json index 4c0f33fe6f7..c87f12e3bad 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bt_bb_price_list shortcode in all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bold Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto bt_bb_price_list del complemento en todas las versiones hasta la 4.8.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3272.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3272.json index cd269d4fa87..81514db9ad9 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3272.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3272.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T01:15:50.123", "lastModified": "2024-04-12T01:00:02.673", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cisaExploitAdd": "2024-04-11", "cisaActionDue": "2024-05-02", "cisaRequiredAction": "This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3273.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3273.json index df7bd60cdd3..72fa56002cd 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3273.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3273.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T01:15:50.387", "lastModified": "2024-04-12T01:00:02.673", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cisaExploitAdd": "2024-04-11", "cisaActionDue": "2024-05-02", "cisaRequiredAction": "This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json index 6de4d3d4d0f..2461337e6c4 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3281.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was discovered in the firmware builds after 8.0.2.3267 and prior to 8.1.3.1301 in CCX devices. A flaw in the firmware build process did not properly restrict access to a resource from an unauthorized actor." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware posteriores a 8.0.2.3267 y anteriores a 8.1.3.1301 en dispositivos CCX. Una falla en el proceso de creaci\u00f3n del firmware no restringi\u00f3 adecuadamente el acceso a un recurso por parte de un actor no autorizado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3313.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3313.json index 4a2a9a8749c..50bafdaaea8 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3313.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3313.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "SUBNET Solutions Inc. has identified vulnerabilities in third-party \ncomponents used in PowerSYSTEM Server 2021 and Substation Server 2021.\n\n" + }, + { + "lang": "es", + "value": "SUBNET Solutions Inc. ha identificado vulnerabilidades en componentes de terceros utilizados en PowerSYSTEM Server 2021 y Substation Server 2021." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3343.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3343.json index 2cb6dd11f38..60a2d91f958 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3343.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3343.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's block attributes in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder para Gutenberg Editor y el complemento FSE para WordPress son vulnerables a Cross-Site Scripting a trav\u00e9s de los atributos de bloque del complemento en todas las versiones hasta la 2.6.8 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3344.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3344.json index 62e8b1421f8..578298bf8ec 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3344.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3344.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file upload in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "The Otter Blocks \u2013 Gutenberg Blocks, Page Builder para Gutenberg Editor y el complemento FSE para WordPress son vulnerables a Cross-Site Scripting a trav\u00e9s de la carga de archivos SVG en todas las versiones hasta la 2.6.8 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3446.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3446.json index 39991b80661..99cdaab1b48 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3446.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3446.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una doble vulnerabilidad gratuita en los dispositivos QEMU virtio (virtio-gpu, virtio-serial-bus, virtio-crypto), donde el indicador mem_reentrancy_guard no protege suficientemente contra problemas de reentrada de DMA. Este problema podr\u00eda permitir que un invitado privilegiado malintencionado bloquee el proceso QEMU en el host, lo que provocar\u00eda una denegaci\u00f3n de servicio o permitir\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario dentro del contexto del proceso QEMU en el host." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3448.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3448.json index daf431a77e2..6c0d33ae39b 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3448.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3448.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Users with low privileges can perform certain AJAX actions. In this vulnerability instance, improper access to ajax?action=plugin:focus:checkIframeAvailability leads to a Server-Side Request Forgery by analyzing the error messages returned from the back-end. Allowing an attacker to perform a port scan in the back-end. At the time of publication of the CVE no patch is available.\n\n" + }, + { + "lang": "es", + "value": "Los usuarios con pocos privilegios pueden realizar ciertas acciones AJAX. En este caso de vulnerabilidad, el acceso inadecuado a ajax?action=plugin:focus:checkIframeAvailability conduce a Server-Side Request Forgery al analizar los mensajes de error devueltos desde el back-end. Permitir que un atacante realice un escaneo de puertos en el back-end. En el momento de publicaci\u00f3n del CVE no hay ning\u00fan parche disponible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3512.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3512.json index f000a470a1d..f74ff224142 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3512.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3512.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'note_color' shortcode in all versions up to, and including, 7.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Shortcodes Plugin \u2014 Shortcodes Ultimate para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'note_color' del complemento en todas las versiones hasta la 7.0.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3514.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3514.json index 2ee69eb2adc..8ad70fc3b4f 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3514.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3514.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Responsive Tabs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the tabs_color value in all versions up to, and including, 4.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Responsive Tabs para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del valor tabs_color en todas las versiones hasta la 4.0.6 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3521.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3521.json index db04a36ab39..ff369af28e3 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3521.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3521.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Byzoro Smart S80 Management Platform up to 20240317. It has been rated as critical. Affected by this issue is some unknown functionality of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259892. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Byzoro Smart S80 Management Platform hasta 20240317 y se ha calificado como cr\u00edtica. Una funci\u00f3n desconocida del archivo /useratte/userattestation.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento web_img conduce a una carga sin restricciones. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259892. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3522.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3522.json index cae1bcf40ae..0553441bf2e 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3522.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3522.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Campcodes Online Event Management System 1.0. This affects an unknown part of the file /api/process.php. The manipulation of the argument userId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259893 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Campcodes Online Event Management System 1.0 y se ha clasificado como cr\u00edtica. Esto afecta a una parte desconocida del archivo /api/process.php. La manipulaci\u00f3n del argumento userId conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259893." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3523.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3523.json index 52c988e69d1..320cafa0805 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3523.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3523.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in Campcodes Online Event Management System 1.0. This vulnerability affects unknown code of the file /views/index.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259894 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Campcodes Online Event Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /views/index.php. La manipulaci\u00f3n del argumento ID conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259894 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3524.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3524.json index c2ab0741e99..945e926217d 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3524.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3524.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Campcodes Online Event Management System 1.0. This issue affects some unknown processing of the file /views/process.php. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259895." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Campcodes Online Event Management System 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /views/process.php. La manipulaci\u00f3n del nombre del argumento conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259895." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3525.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3525.json index 5eab5bcc30d..5df2a1bc7d4 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3525.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3525.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Campcodes Online Event Management System 1.0. Affected is an unknown function of the file /views/index.php. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259896." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Campcodes Online Event Management System 1.0 y se ha clasificado como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /views/index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento msg conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259896." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3526.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3526.json index b70a14fb291..b6dbb2192c7 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3526.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3526.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability has been found in Campcodes Online Event Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259897 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Event Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento msg conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259897." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3528.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3528.json index 7c9bf96e7da..86871f9e503 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3528.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3528.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Online Student Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file units_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259898 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Complete Online Student Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo unit_view.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento FirstRecord conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259898 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3529.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3529.json index c2d3d408962..5dce63783e9 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3529.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3529.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Online Student Management System 1.0. It has been classified as problematic. This affects an unknown part of the file students_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259899." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Online Student Management System 1.0. Ha sido clasificada como problem\u00e1tica. Una parte desconocida del archivo Students_view.php afecta a esta vulnerabilidad. La manipulaci\u00f3n del argumento FirstRecord conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259899." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3530.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3530.json index 54da410c8a1..bdbe9c28472 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3530.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3530.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Online Student Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file Marks_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259900." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Online Student Management System 1.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo Marks_view.php. La manipulaci\u00f3n del argumento FirstRecord conduce a Cross-Site Scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259900." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3531.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3531.json index 929bc2927db..59485878ca1 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3531.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3531.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Online Student Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file courses_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259901 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Online Student Management System 1.0. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo courses_view.php. La manipulaci\u00f3n del argumento FirstRecord conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259901." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3532.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3532.json index 53329933cef..4036207015f 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3532.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3532.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Campcodes Complete Online Student Management System 1.0. Affected is an unknown function of the file attendance_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259902 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Complete Online Student Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo Assistance_view.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento FirstRecord conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259902 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3533.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3533.json index adae0480d8f..7be93f3e072 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3533.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3533.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in Campcodes Complete Online Student Management System 1.0. Affected by this vulnerability is an unknown functionality of the file academic_year_view.php. The manipulation of the argument FirstRecord leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259903." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Complete Online Student Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo academic_year_view.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento FirstRecord conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259903." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3534.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3534.json index 57546a059d5..135ca58a3ce 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3534.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3534.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Campcodes Church Management System 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259904." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Church Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo login.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento contrase\u00f1a conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259904." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3535.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3535.json index 9b87d4b8688..f0f559b9062 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3535.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3535.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Campcodes Church Management System 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259905 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Church Management System 1.0 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /admin/index.php. La manipulaci\u00f3n del argumento contrase\u00f1a conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259905." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3536.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3536.json index 52d7623e89f..59605c038ef 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3536.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3536.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability has been found in Campcodes Church Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/delete_log.php. The manipulation of the argument selector leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259906 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Church Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/delete_log.php. La manipulaci\u00f3n del selector de argumentos conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259906 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3537.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3537.json index 175fb337369..dda2869c375 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3537.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3537.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Church Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/admin_user.php. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259907." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Church Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /admin/admin_user.php. La manipulaci\u00f3n del argumento nombre conduce a la inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259907." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3538.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3538.json index f8a129566c0..8850de7051d 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3538.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3538.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Church Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/addTithes.php. The manipulation of the argument na leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259908." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Church Management System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/addTithes.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento na conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259908." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3539.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3539.json index 481e17eaae5..3457def6d7e 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3539.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3539.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Church Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/addgiving.php. The manipulation of the argument amount leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259909 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Church Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/addgiving.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la cantidad del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259909." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3540.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3540.json index ce0aaf03b46..eacfe2bfec4 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3540.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3540.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in Campcodes Church Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add_sundaysch.php. The manipulation of the argument Gender leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259910 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Church Management System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/add_sundaysch.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento G\u00e9nero conduce a la inyecci\u00f3n SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259910 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3541.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3541.json index 2658627cbb4..5c9b65e18ed 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3541.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3541.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Campcodes Church Management System 1.0. This affects an unknown part of the file /admin/admin_user.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259911." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Church Management System 1.0 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /admin/admin_user.php. La manipulaci\u00f3n del argumento nombre conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259911." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3542.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3542.json index b7b937ca6d4..b68d9089aab 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3542.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3542.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in Campcodes Church Management System 1.0. This vulnerability affects unknown code of the file /admin/add_visitor.php. The manipulation of the argument mobile leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259912." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Church Management System 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/add_visitor.php. La manipulaci\u00f3n del argumento m\u00f3vil conduce a Cross-Site Scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259912." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json index c54933f3726..f878e945fa2 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper permission handling in the vault offline cache feature in Devolutions Remote Desktop Manager 2024.1.20 and earlier on windows and Devolutions Server 2024.1.8 and earlier allows an attacker to access sensitive informations contained in the offline cache file by gaining access to a computer where the software is installed even though the offline mode is disabled.\n\n" + }, + { + "lang": "es", + "value": "El manejo inadecuado de permisos en la funci\u00f3n de cach\u00e9 fuera de l\u00ednea de vault en Devolutions Remote Desktop Manager 2024.1.20 y versiones anteriores en Windows y Devolutions Server 2024.1.8 y versiones anteriores permite a un atacante acceder a informaci\u00f3n confidencial contenida en el archivo de cach\u00e9 fuera de l\u00ednea obteniendo acceso a una computadora donde el software est\u00e1 instalado aunque el modo sin conexi\u00f3n est\u00e9 desactivado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3567.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3567.json index ccc3540cac9..63a34b4786b 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3567.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3567.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en QEMU. Se produjo un error de aserci\u00f3n en la funci\u00f3n update_sctp_checksum() en hw/net/net_tx_pkt.c al intentar calcular la suma de comprobaci\u00f3n de un paquete fragmentado de tama\u00f1o corto. Esta falla permite que un invitado malintencionado bloquee QEMU y provoque una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/README.md b/README.md index 7b664c39db4..1fc138c9123 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-13T22:00:38.882579+00:00 +2024-04-14T02:00:38.212497+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-04-13T00:00:20.243962+00:00 +2024-04-14T00:00:20.251311+00:00 ``` ### Total Number of included CVEs @@ -38,15 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -- [CVE-2024-3740](CVE-2024/CVE-2024-37xx/CVE-2024-3740.json) (`2024-04-13T21:15:48.353`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `602` +- [CVE-2024-3512](CVE-2024/CVE-2024-35xx/CVE-2024-3512.json) (`2024-04-10T13:23:38.787`) +- [CVE-2024-3514](CVE-2024/CVE-2024-35xx/CVE-2024-3514.json) (`2024-04-10T13:23:38.787`) +- [CVE-2024-3521](CVE-2024/CVE-2024-35xx/CVE-2024-3521.json) (`2024-04-11T01:26:03.900`) +- [CVE-2024-3522](CVE-2024/CVE-2024-35xx/CVE-2024-3522.json) (`2024-04-11T01:26:03.977`) +- [CVE-2024-3523](CVE-2024/CVE-2024-35xx/CVE-2024-3523.json) (`2024-04-11T01:26:04.057`) +- [CVE-2024-3524](CVE-2024/CVE-2024-35xx/CVE-2024-3524.json) (`2024-04-11T01:26:04.140`) +- [CVE-2024-3525](CVE-2024/CVE-2024-35xx/CVE-2024-3525.json) (`2024-04-11T01:26:04.223`) +- [CVE-2024-3526](CVE-2024/CVE-2024-35xx/CVE-2024-3526.json) (`2024-04-11T01:26:04.297`) +- [CVE-2024-3528](CVE-2024/CVE-2024-35xx/CVE-2024-3528.json) (`2024-04-11T01:26:04.380`) +- [CVE-2024-3529](CVE-2024/CVE-2024-35xx/CVE-2024-3529.json) (`2024-04-11T01:26:04.450`) +- [CVE-2024-3530](CVE-2024/CVE-2024-35xx/CVE-2024-3530.json) (`2024-04-11T01:26:04.530`) +- [CVE-2024-3531](CVE-2024/CVE-2024-35xx/CVE-2024-3531.json) (`2024-04-11T01:26:04.613`) +- [CVE-2024-3532](CVE-2024/CVE-2024-35xx/CVE-2024-3532.json) (`2024-04-11T01:26:04.690`) +- [CVE-2024-3533](CVE-2024/CVE-2024-35xx/CVE-2024-3533.json) (`2024-04-11T01:26:04.777`) +- [CVE-2024-3534](CVE-2024/CVE-2024-35xx/CVE-2024-3534.json) (`2024-04-11T01:26:04.860`) +- [CVE-2024-3535](CVE-2024/CVE-2024-35xx/CVE-2024-3535.json) (`2024-04-11T01:26:04.940`) +- [CVE-2024-3536](CVE-2024/CVE-2024-35xx/CVE-2024-3536.json) (`2024-04-11T01:26:05.020`) +- [CVE-2024-3537](CVE-2024/CVE-2024-35xx/CVE-2024-3537.json) (`2024-04-11T01:26:05.100`) +- [CVE-2024-3538](CVE-2024/CVE-2024-35xx/CVE-2024-3538.json) (`2024-04-11T01:26:05.180`) +- [CVE-2024-3539](CVE-2024/CVE-2024-35xx/CVE-2024-3539.json) (`2024-04-11T01:26:05.253`) +- [CVE-2024-3540](CVE-2024/CVE-2024-35xx/CVE-2024-3540.json) (`2024-04-11T01:26:05.330`) +- [CVE-2024-3541](CVE-2024/CVE-2024-35xx/CVE-2024-3541.json) (`2024-04-11T01:26:05.407`) +- [CVE-2024-3542](CVE-2024/CVE-2024-35xx/CVE-2024-3542.json) (`2024-04-11T01:26:05.483`) +- [CVE-2024-3545](CVE-2024/CVE-2024-35xx/CVE-2024-3545.json) (`2024-04-10T13:23:38.787`) +- [CVE-2024-3567](CVE-2024/CVE-2024-35xx/CVE-2024-3567.json) (`2024-04-10T19:49:51.183`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e71206e4641..3955f6f3054 100644 --- a/_state.csv +++ b/_state.csv @@ -52271,7 +52271,7 @@ CVE-2012-0503,0,0,5bb96ae26837a805d7fa66e75442e814407382db108a377ddc78dd833af750 CVE-2012-0504,0,0,1961c18e6f6910c58174fd564fc48ff28240a7377431019c7bcba5ffaa4c0224,2022-05-13T14:52:54.567000 CVE-2012-0505,0,0,9712747aa0277b822522627abab6cef8992a136182c784c40145d0bd88ef57b5,2022-05-13T14:52:58.333000 CVE-2012-0506,0,0,bb53ce1d8967382af615f12fc0e61b1a362026027f212a89f6d72266ac07ecdf,2022-05-13T14:52:53.100000 -CVE-2012-0507,0,0,9575a52765142d40cbaa2419b98205aab38a80caeb73cc151a80ac8f7b9caffa,2022-05-13T14:52:56.053000 +CVE-2012-0507,0,1,5d135683ab4c6f4c9545e91b9d4290e06367f5dedb63e6aa2f802ec41115289d,2022-05-13T14:52:56.053000 CVE-2012-0508,0,0,cd87216a7eba4ef5e144ed0c79ca45c1e5e11853990e6794200bfaa51c8bf05d,2019-10-09T23:04:19.900000 CVE-2012-0509,0,0,4bb7869695749e4ea3822fbb33bea47204098f200d50d85b03d296362e0134d3,2013-10-11T03:40:52.470000 CVE-2012-0510,0,0,318043bad5ba89f2672e8b2b9fa6776008b7822d2dd76376c067d48773f1870c,2013-10-11T03:40:52.550000 @@ -56319,7 +56319,7 @@ CVE-2012-5072,0,0,48145817e7855e8caff1395e546a16c15677d3827fc113fc350e44e648d2c1 CVE-2012-5073,0,0,62a1f988cb523b2c836ac47c19787922d2dbe21ba1c63730c5a90a86b97c13dc,2022-05-13T14:52:57.413000 CVE-2012-5074,0,0,8c3fe91c281b4c37eb1bdd90249cf434fa3c43fb82d40701fae44df87ab76890,2017-09-19T01:35:25.200000 CVE-2012-5075,0,0,6a220cd847586e2140ef620dcfcb15a74b7bf1bd05ae03367fff1ee2e6d16a7c,2022-05-13T14:52:55.070000 -CVE-2012-5076,0,0,1b6cca74133f6246aef63403d6f401668d2077a1377f905e31c9349332139c4d,2017-09-19T01:35:25.370000 +CVE-2012-5076,0,1,03501cf4860ff20d473a4d4ac6cd5e01809b37475ea3107c718c2f229dfb2db8,2017-09-19T01:35:25.370000 CVE-2012-5077,0,0,5aa4181d5b49a1fc98d970f7f6ebfbf31d39ef2ed6308996a4869ff7da59cd9d,2022-05-13T14:52:52.243000 CVE-2012-5078,0,0,72547a47ffa4d2f879d06a93a8a4b0a3ba0db3acf407bdcf8dea5ed3535443fe,2017-09-19T01:35:25.527000 CVE-2012-5079,0,0,38f5cd56f5e034ac849faaefa3da898fcf19944709cc362dc77e913edf736f03,2022-05-13T14:52:58.733000 @@ -58107,7 +58107,7 @@ CVE-2013-0418,0,0,8953fe051672e370278939280d95cb4daaa31a910bf05556394b28b32ac7df CVE-2013-0419,0,0,1bcca4fe685ba04e519973985bd2149cc135474263809ae621bb9790f90f9011,2022-05-13T14:52:56.670000 CVE-2013-0420,0,0,a70aece7b0844a55566a2af29baa1e4ba446cea5a6d480882dd86faf02e42cc5,2018-10-30T16:27:33.937000 CVE-2013-0421,0,0,92fba897114aaffd3bc59b50d94175f14a5c23375af9121f20f0be3f003c049e,2023-11-07T02:13:50.393000 -CVE-2013-0422,0,0,3724b2603e8bcf869bcb90788bca7d09ed6b4d02295ebb3e235439ed8b3c46d2,2014-02-21T04:56:53.360000 +CVE-2013-0422,0,1,1651e83539464b5e070dfcb64f5be39e80c3f8b223b8bdcd11283a466e1b9f9f,2014-02-21T04:56:53.360000 CVE-2013-0423,0,0,fa35468e07e04ec5221789a164f503fb5194c360e0a2477a99cefb88ec5b9ee8,2022-05-13T14:52:57.907000 CVE-2013-0424,0,0,32fdf0c78cb06020a743132da93a30cef1dea048fe681ee6f75c164429f309cf,2022-05-13T14:52:52.387000 CVE-2013-0425,0,0,d7a13673decb3693e5417b117f3ed83bc5a5191d8dffeac5966004872f1c933f,2022-05-13T14:52:55.197000 @@ -58116,7 +58116,7 @@ CVE-2013-0427,0,0,8044dc398c999a9c6de6c7dbc63f2f8289ae946b221e4624c68b496bfa8818 CVE-2013-0428,0,0,2e24d67ea4beeb6648a4744f99a4e50e5a62d29f4a8a7e29bb913de15376c80d,2022-05-13T14:52:54.277000 CVE-2013-0429,0,0,18017d986b10a008618c1e329296d019aa4ba02b96ea157156bb9e7cc70a7a0d,2022-05-13T14:52:58.570000 CVE-2013-0430,0,0,7f0912f766c372c9f2e57209d490146cf95611ca3ddee809b86c181894a41b33,2022-05-13T14:52:52.937000 -CVE-2013-0431,0,0,f0ccd5b534956719860147bf5962165e676606139f7f7763832c6affe3f9045b,2017-09-19T01:35:40.247000 +CVE-2013-0431,0,1,593ba5d231059245086f09e2155025815af4ba1e583fb4bd9da09627be5b7764,2017-09-19T01:35:40.247000 CVE-2013-0432,0,0,fa9007b9079ab4b20813248ea49be2bc9e5f80db74051d466860acd25b08a897,2022-05-13T14:53:00.437000 CVE-2013-0433,0,0,c3d0b14df71b368d8039dc60972cb9e77b572c189759e617890a620eec0c9b60,2022-05-13T14:52:51.860000 CVE-2013-0434,0,0,1301e63a9e6484115749cec39be17954b8ec901c27b556e5aaffe6154dbc0fde,2022-05-13T14:52:56.967000 @@ -60021,7 +60021,7 @@ CVE-2013-2419,0,0,026051edc6306d8a3a36e37ada9683aab828a24b53ba9f1e4245a034836edd CVE-2013-2420,0,0,5385716493e883c4f72720a0e99db3c21cea02c22aa3e77ef793655495863531,2022-05-13T14:52:57.210000 CVE-2013-2421,0,0,f80ee91dea9d706c0fb63bc22bd6dbc88c0dc1ce393206b24058e6d943dfd044,2017-09-19T01:36:17.090000 CVE-2013-2422,0,0,270b13df3db8e9c74a8c1a00bcb458560312313818aa9dafde765583821dc5f8,2022-05-13T14:52:53.067000 -CVE-2013-2423,0,0,109c76b26de7d279bbc873c8b1a766978b2e64ff24ec54439eae340fbb9ef746,2017-09-19T01:36:17.280000 +CVE-2013-2423,0,1,390fec251d1fc42ce62e43292f558f8e532cfeeb7b97990b0468ff355f3ca55e,2017-09-19T01:36:17.280000 CVE-2013-2424,0,0,d13d6f12eb90d96b7e1e7fca50155f247bf0db24977b0256cd18ee193e808ef9,2022-05-13T14:53:00.487000 CVE-2013-2425,0,0,d3bd37d19d7f3cf6d0e6b3e234318f4f7ad079d6d4b5f3d5530c3a57ad31172c,2017-09-19T01:36:17.497000 CVE-2013-2426,0,0,41bf624bccb14ee83ce39920d98704bda1211673acfd169f6330a5087b5a3e66,2017-09-19T01:36:17.577000 @@ -60063,7 +60063,7 @@ CVE-2013-2461,0,0,42959d377df1a6cb9fad7b9b962e51452ee1b7e88567d63958c5b3a634e16f CVE-2013-2462,0,0,32b0e63c8056fbccf31bcd05e7d74b662712378a8c61a29d6c922698a013b825,2017-09-19T01:36:21.873000 CVE-2013-2463,0,0,44f3beed461a436e730557018ed5bc1684d580f5fd4ab7aad914584ac2582c8d,2022-05-13T14:52:58.643000 CVE-2013-2464,0,0,4f4c5b6d3bc03fa72122f0f44eec26623ec8c67a8b05c67b571b23c4258aa9ba,2022-05-13T14:52:55.033000 -CVE-2013-2465,0,0,1eec8c03744eedc6573e691d6f634249a84327283c7a96e30ea8a15bb5441984,2022-05-13T14:52:56.247000 +CVE-2013-2465,0,1,c31d81067aec13f2422b620b19cd81f4c7fb3eaa9de7f6d043091d38094c74e4,2022-05-13T14:52:56.247000 CVE-2013-2466,0,0,25514ffa8d2fd5473be9e92028cf7a2a52b04688e47c203538b98b4d711c0455,2022-05-13T14:53:00.830000 CVE-2013-2467,0,0,ef12223eb001dfb2468e0d70d65d6a8e3fa443fecae0647e6da4098e9fd4137d,2022-05-13T14:49:20.390000 CVE-2013-2468,0,0,f26915d9440699b354a47249b048d134b140a4a1545492dd3fcc32a3573dfe6b,2022-05-13T14:52:57.990000 @@ -138356,9 +138356,9 @@ CVE-2019-25157,0,0,47ac2254d65c305411367156491c044e367329fe5ec4e761ce84175ae7e11 CVE-2019-25158,0,0,6e4c9ac80f185b0bed03ebcbf7838818c9581d341dd2fb268cb222a7da494b45,2024-04-11T01:05:27.610000 CVE-2019-25159,0,0,9c046fadaf72ccf56d5ba4f88035c591a4ada8201641a53e0241e0fa7a999fdf,2024-04-11T01:05:27.710000 CVE-2019-2516,0,0,b9e50ff13d1cca8bef009677eec58d5076a2082df0304aadd62d58872fdc540e,2020-08-24T17:37:01.140000 -CVE-2019-25160,0,0,b13eb895edea02ae847daa5b1690813468a23dcaa51a67e526a746b1acb66ce3,2024-02-26T22:10:40.463000 +CVE-2019-25160,0,1,932887e1f1091ed398f98a84fbfe569d11ea979aa7ba9a0a48d11e0332710f09,2024-02-26T22:10:40.463000 CVE-2019-25161,0,0,ab5accc2ac125381139c67d24a467228839f96c40d12df4a45f5e76c4a19b8e2,2024-02-27T10:15:06.833000 -CVE-2019-25162,0,0,adf72b41a39513949ef1a0c0dfc7ec1fce72598a895d50336df49641f929381d,2024-02-26T22:10:40.463000 +CVE-2019-25162,0,1,703ab507b2744d1607cd26b66fad59ad0e62ddf18271fd1527f9eb39b143ffe3,2024-02-26T22:10:40.463000 CVE-2019-2517,0,0,841793a01535ff6653114dfb79e7fd00b0fde99cc6587998b53d3742df8ecc63,2020-08-24T17:37:01.140000 CVE-2019-2518,0,0,9efef458b1303554e425998695dd03f68df8dae2feff042ca130dc9d08d18071,2020-08-24T17:37:01.140000 CVE-2019-2519,0,0,80cb8a26de2a58d99b181963daed12ecd759858d5d5f05a1d765a0af10d1fcb8,2020-08-24T17:37:01.140000 @@ -159227,7 +159227,7 @@ CVE-2020-36771,0,0,afe932f6818ebb6d4f20ad8a7ca4f8981b1751089bde71032000ba94d04fb CVE-2020-36772,0,0,ff3e4f879e7ae418a701647a13240a39df8c57776ec6e58c53b6a64dafad1969,2024-03-28T19:15:46.887000 CVE-2020-36773,0,0,d0ddb06ecf8d46409b82e3ffb254421534eaa86dda122f28d93753543197a5b1,2024-03-04T23:04:23.720000 CVE-2020-36774,0,0,caefdac33e8d57c5a006664b2d809197b3c6abe35049510ce3150d4c26215374,2024-02-20T19:50:53.960000 -CVE-2020-36775,0,0,bebe52696a44c06274c8ae812282ae2f64cd40883bb94084381cc8f248cf9dd7,2024-02-26T22:10:40.463000 +CVE-2020-36775,0,1,5b5e03f446cd0fdcc62cb97f59ba2f19199465f86d2aec6a0c88abbaaf38f4c5,2024-02-26T22:10:40.463000 CVE-2020-36776,0,0,0d6a9157d7be92178ede0efa42b523dcc249f49fe1156166723fda7b340f9325,2024-04-10T19:34:31.410000 CVE-2020-36777,0,0,08fa78c9c2f6757fa09a48c61f09e33f93d3cddffe3460adda403850ad08e31e,2024-04-10T19:32:09.210000 CVE-2020-36778,0,0,cfe13668981468f714abe64449a0c090bc5d650427cab2f289f1a6bc1a11f72e,2024-02-28T14:06:45.783000 @@ -186631,15 +186631,15 @@ CVE-2021-46900,0,0,e195cd7cb24b95e31a6122d6f3d56cdcb4ddfc8ff41351544f7397822bc57 CVE-2021-46901,0,0,1665cb5ca539440295d8a959d2760d12b56c4be1868c712c96ca3dcd4d3dde1d,2024-01-08T19:09:08.890000 CVE-2021-46902,0,0,15d8c1cefd0a39c70036d20031a514b6fb8f249aa94f97dfa235932c5c479f7f,2024-02-13T00:38:32.413000 CVE-2021-46903,0,0,59ca1d694c639409297840c930e3dd8d372cadedd1376cf64770674d9911e3bf,2024-02-13T00:38:22.293000 -CVE-2021-46904,0,0,befbbb2047b1023912633fb0dec4a9ed1f9ea6d83caa6e00b69c52d6f0335aea,2024-02-26T16:32:25.577000 -CVE-2021-46905,0,0,dfdde76de6a6bad5eece535a98b4c74f83e9a4dacf0f80a1281998a4e463dbd4,2024-04-04T14:15:08.703000 -CVE-2021-46906,0,0,eb434dc1991c48ce4eb56cb2b3806509966c30ba9016ad3586891a1dc47eb175,2024-02-26T22:10:40.463000 +CVE-2021-46904,0,1,7d8f22b448667400fa759fb1016e0f561c1b7d5d4173c046f2adf8a8768f62a8,2024-02-26T16:32:25.577000 +CVE-2021-46905,0,1,106a1f3819afd9e9a9703f38f8220ad47505099e61f9d15af11ef76a33b5c244,2024-04-04T14:15:08.703000 +CVE-2021-46906,0,1,c94dfc8823c1374e4fafdab777e665ddcc81908dc920a5f9767effd1903a6e70,2024-02-26T22:10:40.463000 CVE-2021-46907,0,0,1f9b2c2375fa009b016f94aa5d024afa767a5a81d6bdb7bf20e32e33a05d91c6,2024-03-19T13:15:06.713000 -CVE-2021-46908,0,0,67f912657f123d50c1881b9d265bd000af86b0195a2b177aad9980da36a2a329,2024-02-27T14:20:06.637000 -CVE-2021-46909,0,0,e631d720c5af3d93100a1d5b75c61b7ce8e8de41b1e355e917900d6be2739ad1,2024-02-27T14:20:06.637000 -CVE-2021-46910,0,0,acb3da1af30b35efc1d65a115c25ebe4fe878b8cccdb0e816f6128bd0f8b19c6,2024-02-27T14:20:06.637000 +CVE-2021-46908,0,1,1de4f248b3dd21d701e70cccd66f431824b5b2d5d81a96aa605db5e78b8e3c27,2024-02-27T14:20:06.637000 +CVE-2021-46909,0,1,40fb9eb042371b667f63f8793c6aacef4fc2b0c5c3b54f75c2a12cd834973ac7,2024-02-27T14:20:06.637000 +CVE-2021-46910,0,1,baa7461991ac2d310efb8e00e864ec78e46c8be70264078eae1dee6e1f92ac46,2024-02-27T14:20:06.637000 CVE-2021-46911,0,0,973e5434d94857d7ce5f92e46cbddf882d04ab841ce580e9c22036f97e26ba63,2024-04-10T13:49:55.043000 -CVE-2021-46912,0,0,b31960b9deff4acc16e0d688f71c47d035d8e5ab28eb0aad84982a7ff1e98a4a,2024-02-27T14:20:06.637000 +CVE-2021-46912,0,1,bc5f54e7543adcfc73bb7927630de43ae7ce02c6619bd414f046afac01cd9b90,2024-02-27T14:20:06.637000 CVE-2021-46913,0,0,f58fc974dccb901f3e57b3ef42a41338976fc699e65fb9d1ac435282de2fd5b1,2024-04-10T13:45:03.623000 CVE-2021-46914,0,0,8a15bbaea92a9a7ce09d6e5bc7999b47e166c23b94bd22ba6b37cbddc241f534,2024-04-10T14:03:21.823000 CVE-2021-46915,0,0,fb430111ca0292b5609a974da73aa1d7b3dda5ce06100e52b738c0346d203019,2024-04-10T13:55:34.140000 @@ -208826,7 +208826,7 @@ CVE-2022-44629,0,0,e7a049bee5a2f3469dc8b884397d057a67e1269ad177ae77829257d77d214 CVE-2022-4463,0,0,4b7e50808768d57d6d25b20c104750389a724c17381e9cc150083d4c72b5c6b4,2023-11-07T03:57:52.977000 CVE-2022-44631,0,0,dafa8ce9e6459782b799173cbe37082b4ceb500c6fa4bcfb852036bd2b334813,2023-04-28T03:45:05.617000 CVE-2022-44632,0,0,d132ad181bffb78fccb40f8374084df01a672dba36f77a7ef8d22679a3aa7d90,2023-04-27T12:50:59.047000 -CVE-2022-44633,0,0,fc17f715b1851a3fceebed239cd050e3831c2e403c10615dbde1a7359d18bf4b,2024-04-11T12:47:44.137000 +CVE-2022-44633,0,1,b351e0797cdc8b75230f8125d324cf115071c30737f93d6f7500dcade93b0a0f,2024-04-11T12:47:44.137000 CVE-2022-44634,0,0,fbb61381bf79d25cf184d4a22dd8e160d0bd8ec9199c0c9b00aed1fa04f1ebd0,2022-11-22T20:52:40.467000 CVE-2022-44635,0,0,66d6af9f45b059a3fb4a2da1eefca0c84e6ba33db6640347d9b4249ebe85233e,2022-12-01T21:24:36.790000 CVE-2022-44636,0,0,8ae0a5a965bd0101e028ac41dc232dcaaff6774ba16b112a127305476aa0bc63,2022-12-29T18:42:00.133000 @@ -210846,7 +210846,7 @@ CVE-2022-4760,0,0,e6f8047ba1d4de454b548e035e00d155c0c6548627066d4ff180c160036960 CVE-2022-47600,0,0,f45f1eaf79114803bc4062c2713986ee2c7493ebb61f7e428c08134dd4accc1a,2023-05-16T18:59:53.153000 CVE-2022-47602,0,0,a585a98b2f136fd85ef0bc64249b5186193708b3c60934c56f170bb0a3e00a5f,2023-11-07T03:56:22.383000 CVE-2022-47603,0,0,05e9a0f8663de892d82d4e04cb21ea93a03e418abbc3c5eb01f57c5a326afb08,2023-11-07T03:56:22.607000 -CVE-2022-47604,0,0,9cefaccf1a61c2f37b11daed7142121146c78220cac5f643baf32a1e5e10e810,2024-04-11T12:47:44.137000 +CVE-2022-47604,0,1,308ca40daf3af9b778d04a904f51770c7dde475c06c6b3e3c84b961e0246f611,2024-04-11T12:47:44.137000 CVE-2022-47605,0,0,effc88f4328ff237bcbd6ae800d9a0f56be2dcbbd3107733cc5adda3367e45e7,2023-08-30T14:47:42.933000 CVE-2022-47606,0,0,055fca79c4da14580bae2088807011e7bad4f34c766bebbedb3f8f3ccf7d9f35,2023-05-16T19:06:39.777000 CVE-2022-47607,0,0,c677f8ca102d0a4e4631217bb28230bfd302ee1c3222e784709d64a504efed20,2023-11-07T03:56:22.987000 @@ -211463,7 +211463,7 @@ CVE-2022-48622,0,0,ec3892c719560f573e15b7aeaf0ff6e1061faa317127aa4fe22d07724deb3 CVE-2022-48623,0,0,35796016b2974df38876f788a8262118276143c1be8b81a53a3c19ad985851f1,2024-02-13T14:01:07.747000 CVE-2022-48624,0,0,3443005982091900e80529213830120f211c919372f2b4459da27a12e635ec55,2024-02-20T19:50:53.960000 CVE-2022-48625,0,0,7bc403b36bf8fdca3e98a9856c6ae990f3da4d13f0f27b5e9dd4164789f34420,2024-02-20T19:50:53.960000 -CVE-2022-48626,0,0,608fe8fe0e144c1aea3964bfcdd2e2be8bbf971aefa8586dbe4b24c8faaa462a,2024-02-26T16:32:25.577000 +CVE-2022-48626,0,1,14765d34cf62070ba7d6052855d7d857f50799c8f5161efb565824ad6b256e82,2024-02-26T16:32:25.577000 CVE-2022-48627,0,0,22229bbcfc221c1a66d57361893659703193a672850e59d004737cb18434f698,2024-04-13T12:15:10.870000 CVE-2022-48628,0,0,53833f4c493a0dc2eadce20e074749d0beda4aee81d045b4d048c848f17d5c49,2024-03-04T13:58:23.447000 CVE-2022-48629,0,0,fa048196d2bfc6b10ff3d7f516159c362398b51507f15ab4e218ad5e1ec3c673,2024-03-21T02:44:43.813000 @@ -211567,7 +211567,7 @@ CVE-2022-4961,0,0,cfb40af700dab166ee8d1fc20c9ba15634070fad68b825e67f502e11907417 CVE-2022-4962,0,0,e348e400599b040ec797bb1ed5eaab06be8ad541212a2ee2660f0eadd1993315,2024-04-11T01:17:36.043000 CVE-2022-4963,0,0,697a2712d9fb570d962a97b7d0cda4b6af69825d2a5b41ef3ef74038b4d3cf66,2024-04-11T01:17:36.140000 CVE-2022-4964,0,0,1e33f52f21e6461cc018675c2148aa96cac948ebdf6307b4d3746f8773a9bfe3,2024-01-30T21:50:30.930000 -CVE-2022-4965,0,0,b957e1a919c86367649f027b271852d79ddce1859309edf6d1b6a7da217f18a6,2024-04-10T13:24:00.070000 +CVE-2022-4965,0,1,db99caae0cb2de43133818216d728b6e383517fb71f67f622369387ae341b961,2024-04-10T13:24:00.070000 CVE-2022-4966,0,0,8b319c91d131e57de6dcf9330b865ff34208feda4443f646ca1e94697ccb5596,2024-04-11T01:17:36.257000 CVE-2023-0001,0,0,6ba5d6c17cbd7ec9fa4676d0367d715dae6604f51d9cfe28b728a892d018af19,2024-01-12T22:10:50.817000 CVE-2023-0002,0,0,1b2ceaca2ad4aa0f50a972375612dbbc2aec389d54ffce2da41cd327ee68ab86,2023-11-07T03:59:26.433000 @@ -219551,7 +219551,7 @@ CVE-2023-27603,0,0,fe3bc0c1ac45dd7a42228215c241ed70be535c184fac7a7dd1e2add3ac99b CVE-2023-27604,0,0,3858a72c8fcc9cb75777bdd76bc7f6286327cf694bca0a9feb0539a4e637062e,2023-09-01T17:11:03.007000 CVE-2023-27605,0,0,94edbe7a0b48bd092aaf1666520540071a63c73b91c8b76dd0b88487a78befc1,2023-11-10T04:20:00.893000 CVE-2023-27606,0,0,30235a67c2a712c8fd0803d38a7257beaf0ef84b3c2088caade759d6a478aa8a,2023-07-26T01:18:52.087000 -CVE-2023-27607,0,0,47c0bf97878071be86e748248577130174953356013dec7a17dc0328086d0c54,2024-04-11T12:47:44.137000 +CVE-2023-27607,0,1,470290fc5396093987b62dcbe78321d797c79fd1e2c413d9c177845c129e05ee,2024-04-11T12:47:44.137000 CVE-2023-27608,0,0,1470c2135fb0bf2006dbd1b6c863fb15645c10dcaeb358a285a58f5966d24f92,2024-03-25T13:47:14.087000 CVE-2023-2761,0,0,fbcf7ac8468f75f3dfa3f4e2e63b95bb6af7b8fb5619b2e659b6fe57cacf7480,2023-11-07T04:13:16.437000 CVE-2023-27610,0,0,b01ada77b54956c5d30c9fd3f0f711e30602f0b3a21e8a0882098033c43faeba,2023-04-25T19:50:17.680000 @@ -219794,7 +219794,7 @@ CVE-2023-27936,0,0,f8bc1c0a3fb525076ccd1156af3c972d15f708cf2933f5870bcc5bd0a1bb1 CVE-2023-27937,0,0,049cbf13eb63038ae7a32c6c949787807b81d5824a4a725d922fc1c059da0d06,2023-07-27T04:15:17.987000 CVE-2023-27938,0,0,7236c5a52772998b3c19b281121ff384524ced483365b937b3b9687bee34e196,2023-07-27T01:15:16.097000 CVE-2023-27939,0,0,ba272f3d6249e15db29cd3c68f36557ba9b3c624fe7cfca8a9ce3e5e164dcbe7,2023-08-19T00:42:42.367000 -CVE-2023-2794,0,0,5e5939bbaa035c92de0d57503a2a74a114c478b5849c9174117ac4a1a2f0d5fb,2024-04-10T13:23:38.787000 +CVE-2023-2794,0,1,c7e6e1f58708b69aa787605185728625087477c65015b3d29bbe34c0d6f72a58,2024-04-10T13:23:38.787000 CVE-2023-27940,0,0,2faecbee4a3a79838c7458b279d15464a94c4ce120ada765437ae3577030a38e,2023-07-27T04:15:18.130000 CVE-2023-27941,0,0,6013b6583875fe20c1dee7ec2570912b412c709232435f88984d79066ed0d077,2023-07-27T04:15:18.447000 CVE-2023-27942,0,0,db34e52d0fb138a186dc8fb9018b0e3ad3a2c8109f563c9c55b727b413c9c765,2023-07-27T04:15:18.623000 @@ -223054,7 +223054,7 @@ CVE-2023-32290,0,0,9c4bb9817d78cee1b4574799ae72138f302978bce52c75e2a5c9735dd6937 CVE-2023-32291,0,0,b13582f6df765cf66559182b3cdbd9631340010ec8805f1c99c883fb7685c7b7,2023-12-05T19:18:51.637000 CVE-2023-32292,0,0,5f53c5c7d966a0756c5fa881e0bb188a78cf08738ea5ab4c0cc95dd712222b6e,2023-08-10T03:49:42.763000 CVE-2023-32294,0,0,52188b6bff693079d9ac6f474f38cd8885c0cb6e0c4880457891953576a8f607,2023-09-01T12:06:38.193000 -CVE-2023-32295,0,0,fdcdf708f84cb96e10342db7e15de3ca6a4129bea5c6cee8b61ae509e34e649d,2024-04-11T12:47:44.137000 +CVE-2023-32295,0,1,8b3db94b4f7a1a75a89fabb248bab94538da321a01ea4b81c3c6d75720fde60f,2024-04-11T12:47:44.137000 CVE-2023-32296,0,0,f03a8ea514506a3657b7ae5de5b3e2a51319bb9a0207095e8feafa10f654e241,2023-09-06T22:33:10.717000 CVE-2023-32298,0,0,ec209ee8ba235a06176757af041551cbc9f28aa90a1f2823c42aac846023b685,2023-11-15T16:17:11.723000 CVE-2023-3230,0,0,f88f693440cb4d182aff411843a5c33b585925292b53965b7d75ef0aaa0fb027,2023-06-17T03:08:30.887000 @@ -227359,7 +227359,7 @@ CVE-2023-38404,0,0,3dc6ba7796bd771a65b22048e59c9ab5fef46da9252fb3726f228bc9dd4b4 CVE-2023-38405,0,0,c9debfd5593845ef6520958dbc49abb74fd74ee699fbdda9849aeefe8e69acd0,2023-07-27T03:46:14.810000 CVE-2023-38406,0,0,53664c0ac92a6a642347f5a5b1cfadb2353026ad1b135845142bf4ee408ff41f,2023-11-14T20:03:32.717000 CVE-2023-38407,0,0,e6e482bbeb9b1ec4c08137dc31311a16b63901519c781f9f82a524f9167d2222,2023-11-14T17:38:10.273000 -CVE-2023-38408,0,0,d096ce6b1e1ae5ca92da22ae6b0e69e0a183709fb248f60799d11a2af22a33e3,2024-04-04T06:15:08.430000 +CVE-2023-38408,0,1,a5b3564bc29fbafca29af20a4fd1ef12d39f0184d3edb95cb86e49e205895556,2024-04-04T06:15:08.430000 CVE-2023-38409,0,0,6490e149eaf901300003e5cb5fe2beb3e6bba4dd1431a86db788223f5e63097f,2023-07-27T03:49:09.943000 CVE-2023-3841,0,0,61d45d034c43bdfe7db00d574171e298c10908077b0cbed791a92ef272a288fa,2024-04-11T01:21:25.730000 CVE-2023-38410,0,0,dacab55bd139fa677a3b09e8882ef5d31eb8780377d0feebcd0e9b7c3e9a7a6e,2023-08-01T19:54:15.847000 @@ -228626,7 +228626,7 @@ CVE-2023-40142,0,0,d5a72dea9a0318cab919a5bf191445692aa0ad0a797e051a6aa9b8b7f53f5 CVE-2023-40143,0,0,8c978f8247b7423552e3d09442fe1fdea2e08675347e89ad16716858fe9c2f99,2024-02-13T22:02:22.543000 CVE-2023-40144,0,0,0056d58a6477acb16a5d607f5a3843be963e3f196d479797461e0908359c06f1,2023-08-29T14:34:01.297000 CVE-2023-40145,0,0,fc0133bc7728eb3878f4a5859c22bf60c367ee185da0135c40a479df331b812c,2023-10-26T14:26:42.150000 -CVE-2023-40148,0,0,2c7ba15a3c3f2a0f95f1cdba51a2ffc514edf79ef92a16be9976d0facbb056e5,2024-04-10T13:23:38.787000 +CVE-2023-40148,0,1,3a5f03b1aa00a8bd0a848d3bf1b1452f60e566d8234a3267239c6668b57729f0,2024-04-10T13:23:38.787000 CVE-2023-4015,0,0,ffb821ba8a72e103b442ef841456a522cb0b0c89ec1113e0f3392baae2ce9537,2023-12-12T14:31:41.517000 CVE-2023-40150,0,0,0e872de5ba350ed9027dba969a6339b3e0651150b08d6545e648299241abca80,2023-11-07T04:20:07.803000 CVE-2023-40151,0,0,9431105ce9ddf1090a9e164bea663f282ddc71188eae991a83d3f63e68b003b0,2023-11-29T17:28:12.413000 @@ -229663,7 +229663,7 @@ CVE-2023-41672,0,0,701169e96a982f458276c5bf1421b24cf87ec1a37cbd6e2104ba995ffeec3 CVE-2023-41673,0,0,dd8132c0522783af5ee2376cce12c3ecb9f5d6592fe92710b52edbdbb42ff4b0,2023-12-15T19:10:46.137000 CVE-2023-41675,0,0,0ae1a5035d33330fd4a6a353b75af4bc2ad84d42edfa84f1e33d0bc3f8ccae9e,2023-11-07T04:21:04.410000 CVE-2023-41676,0,0,36c933286752ad7523065926766df538ff4c67a887209724cd00db232a66d0cd,2023-11-21T01:36:19.403000 -CVE-2023-41677,0,0,e6f13b717a22d30997f29819a0750c77c0e7032459a43b3572a3524267951f15,2024-04-10T13:24:22.187000 +CVE-2023-41677,0,1,0c88fea09692162a66bef1cce6e012388fa364e432811347eb784044b6cb52f4,2024-04-10T13:24:22.187000 CVE-2023-41678,0,0,da87a666a4a57a0d93a3383fd85969ac9e3d67438cc4440ec5ac1997cba8b245,2023-12-15T19:31:27.400000 CVE-2023-41679,0,0,fb46f735ce75ea63a0abedf7f71ce6b9910a5f32bc0285907e6127ad42129702,2023-11-07T04:21:04.513000 CVE-2023-4168,0,0,b2ee4441a7e8c8049befb0f60fd23429b78fadcecd4cf274eb81307b65df6e1b,2024-04-11T01:22:22.373000 @@ -231969,7 +231969,7 @@ CVE-2023-45582,0,0,ec3038d8e89bbe4a7db2f562aaf37c6a90f550f4c48b131a2c62e29f98347 CVE-2023-45585,0,0,f8948e6ae3dd3172522e4847e92a91dd603a009d568e79de2b51810b9e36e369,2023-11-18T03:29:09.223000 CVE-2023-45587,0,0,a9cb60a58e0c672e26b5905c5a5990c316a4eadd694972cc6304e59e4e2c383e,2023-12-15T19:41:03.370000 CVE-2023-4559,0,0,c2ff5ee22dbab7f8f12a0b8ec6e04d46759703fc404aa72fc134ce5a76fd980f,2024-04-11T01:22:31.523000 -CVE-2023-45590,0,0,fe2c3ba810f7ef06cff39b62bc5c4306c22361d20b2604e27c9f6c938df6918b,2024-04-10T13:24:22.187000 +CVE-2023-45590,0,1,98628c5d512b4fa4db82f9f9a9f9c201229c72b697b9d090bf82475aac88350b,2024-04-10T13:24:22.187000 CVE-2023-45591,0,0,59e0e290570a33256ead5cd03a248fd939e29365d0ce5c906334216f5f80fc10,2024-03-05T13:41:01.900000 CVE-2023-45592,0,0,2941ec5bfe1caf7e9575b01add63862e95944ed4f3bc17e33a573383017a43d0,2024-03-05T13:41:01.900000 CVE-2023-45593,0,0,a7decca146ee12a4c87882013d98f33447acb38dd333ac108560bcca14897e11,2024-03-05T13:41:01.900000 @@ -233348,9 +233348,9 @@ CVE-2023-47534,0,0,81a5c657381b573d19aa39a0b2a9c5cefb1552d1a7cd2bbc725130b38cdd6 CVE-2023-47536,0,0,c92809299ce994fe002984e3ea770aaca21d26ac58ae60aa42bd9b1f93a95802,2023-12-18T17:19:51.397000 CVE-2023-47537,0,0,e819c54cb454cf4f0620df9dd3d6930b398a1b42288f9e331fa69cbd987badb2,2024-02-22T15:26:01.937000 CVE-2023-4754,0,0,d1a60aeff3e1b2426ae95f9ba5659b82b6b06e64889df384bdf47a9b7ba058b6,2023-09-06T22:23:47.563000 -CVE-2023-47540,0,0,90fe045e25b56e5f0c0cb173a6d060689dac3d00fd4ffe1f1d91f9e02c2359c4,2024-04-10T13:24:22.187000 -CVE-2023-47541,0,0,78fe0bb1c3b0e541903ef4658720db3b5111a9422362ed5a5f0ac2bbb7695287,2024-04-10T13:24:22.187000 -CVE-2023-47542,0,0,fe9827c2d3a8959ac48f3981a94d7b0ec58a6fbf6d5f8b6e4bd2cd4a9305378c,2024-04-10T13:24:22.187000 +CVE-2023-47540,0,1,26164122b5debc25c175f537f3ccb6470f834500489c8942faece9d5ce5fc4b5,2024-04-10T13:24:22.187000 +CVE-2023-47541,0,1,073baaa595808fdc2a7f0d5dfc8e0ba7658e35c8265907a6d9c69193e6ccf2f3,2024-04-10T13:24:22.187000 +CVE-2023-47542,0,1,fabc6776957c8e6c803e501dee41866cb519c5ffce889ea92bfac50091ba0488,2024-04-10T13:24:22.187000 CVE-2023-47544,0,0,74a441f4f77a4621b886a1416c40c51bc2362c461a054f5d2e1a6477464ff2fa,2023-11-20T20:29:18.980000 CVE-2023-47545,0,0,41120a1766a824a28cac2c99cc626dd434d3f35147c984dffcb5895b5696e466,2023-11-20T20:28:54.547000 CVE-2023-47546,0,0,bd56aed1ac9a9698908401f32f3ade73a17b9443433cb85112e459fdf5c01493,2023-11-20T20:28:19.373000 @@ -234203,7 +234203,7 @@ CVE-2023-48720,0,0,71e46ed990f77e5e1ab7e573b7ce199df9e319357ad7189c0aedad622b34f CVE-2023-48721,0,0,8c47109b9e61cc40969444ae2ead7963b8d4bdd6b8b65c475e745b38f8da5161,2024-01-02T16:15:12.337000 CVE-2023-48722,0,0,b21bc90cd9ce1ec7c1af64c0d1da78505a33d180402299b29d84366f786b9b7d,2023-12-29T15:30:32.720000 CVE-2023-48723,0,0,51de78ba4a0fea3bc725aa980029a19ae13dc47bb89690d15ea1655fe7f3baae,2024-01-02T16:15:12.377000 -CVE-2023-48724,0,0,93532edb99c2acf29145be1df3f86ba52ea90645c67506b76d0d4d895e01184c,2024-04-10T13:24:22.187000 +CVE-2023-48724,0,1,161f36a41465719e133c9dd4fcc3244326e7b46b87de3c4fdce57047eeea7f1b,2024-04-10T13:24:22.187000 CVE-2023-48725,0,0,e6e5b3a3cd78432765b74b2d7360c44fd933c54a4cf2f2334e127b9f4342156b,2024-03-08T14:02:57.420000 CVE-2023-48728,0,0,ed4fb3603eb3d1fb4a8089303ba944449bfea1856081f932800d0cc5bd7026e1,2024-01-17T15:19:11.497000 CVE-2023-48729,0,0,13f3c83cf7904baff3f0b31a9a04b64ff281e898cd527079412a7cd8a8ab623a,2024-02-14T18:15:46.243000 @@ -234249,7 +234249,7 @@ CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c CVE-2023-48781,0,0,0b8167a5eef8ab6e938308c388d4115607ba3ad1846d34aa073b91ec79ad8a40,2023-12-22T09:47:10.017000 CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4f66,2023-12-15T20:01:55.773000 CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000 -CVE-2023-48784,0,0,8850392ad1b83ced711b271c3a0877dd56ad73687eea4723d42202863716f2a3,2024-04-10T13:24:22.187000 +CVE-2023-48784,0,1,b3d1501bb048dcb80a87c3b20a0d9a81b9a1c7a911266164777c907ae67fb8ad,2024-04-10T13:24:22.187000 CVE-2023-48788,0,0,34a74b48d25913e490d4cc594c6129a6c91bce07a8d2d01b7625f50dbee729ec,2024-03-26T01:00:02.003000 CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 @@ -234392,7 +234392,7 @@ CVE-2023-49062,0,0,068484681abaf43841eb99ab0ed862f133e5253b284cc541c1c2972f2bfd5 CVE-2023-49068,0,0,c80c101a6567d5e001bf80bd192cc6c02bc83242cdfebc387037548c73e960a9,2023-12-01T13:53:23.050000 CVE-2023-4907,0,0,8641e26d9489913936718e7eae574611ae3f349b3bc3ae094cd558ba78dcb7a0,2024-01-31T17:15:17.750000 CVE-2023-49070,0,0,0534adf05a11629b68e19c072b5987401c90067fb46308aa630dac9a694c5940,2023-12-29T18:15:39.103000 -CVE-2023-49074,0,0,73cad348c4aa8443b2fce6734ecffc78c10bf17ee6ed11446642688cb07eed47,2024-04-10T13:24:22.187000 +CVE-2023-49074,0,1,fa99f8d6845ad22e47d22276e5eb8d3e0cc96f3ce21692e5fdf010d5bb56dd92,2024-04-10T13:24:22.187000 CVE-2023-49075,0,0,913e46bb74318ee75a4ddd2acb7f1e5126a9f9e9c3cb15478c7bbdbe3f992f86,2023-12-04T17:53:15.497000 CVE-2023-49076,0,0,08cf9b7057cb4805ab4e567bd39b0c423aa49a71072cd8f82a0f9b8b94966479,2023-12-05T18:14:20.597000 CVE-2023-49077,0,0,48375974b1462e0d1d4acfad900ee40a5b9f0e2936f899dccbee7ff32126b23f,2023-12-05T17:39:23.030000 @@ -234451,8 +234451,8 @@ CVE-2023-4913,0,0,cd0281c3ea214aae7362adc6977cf8b2200973629edaa0da0ce079b555ba91 CVE-2023-49130,0,0,4c2c917ea6ccdddb6dcb4301b91405bd33b9adf99c5e517bd3d969225808c38e,2024-01-10T20:30:18.623000 CVE-2023-49131,0,0,e61e3494ed1c115d0770551e82cde72433851662b96fa72b7d10542f232ca3fd,2024-01-10T20:30:29.007000 CVE-2023-49132,0,0,ebbc7d193cdefe4939adcba7bbbe0ba52a60464d77374d32564640c93c00a285,2024-01-10T20:30:39.817000 -CVE-2023-49133,0,0,af6ee7788d3c601e4168434df0b30705662404f9690a1a0dc3e600d9ee3420b7,2024-04-10T13:24:22.187000 -CVE-2023-49134,0,0,d8d22b0802c9999ba73fe7e6c8af5f74a528fe177c05667c278fe2d770da013e,2024-04-10T13:24:22.187000 +CVE-2023-49133,0,1,dad182d5b2583b8b9bafc2e19a04694930abc10e985abd56f13d8b654a0f655e,2024-04-10T13:24:22.187000 +CVE-2023-49134,0,1,2656c8e87b9bcbee87555558ab00c94bf17556a04418262b71cfa604bdc15ff3,2024-04-10T13:24:22.187000 CVE-2023-49135,0,0,9f30a2b1aec673fc3f9bb80a0a42daa84ea6c4a6016e18c100f5838afb394e2a,2024-01-05T22:04:16.437000 CVE-2023-4914,0,0,0279c4f46287c6c360e1b4fa314c6db89b8c67160845891a95205646ff8cbe91,2023-09-14T00:43:57.353000 CVE-2023-49140,0,0,7862d6efde898af8aba85584b48367b423cc13d6d094d6ae73b54169ddb58dc8,2023-12-14T20:50:01 @@ -234935,15 +234935,15 @@ CVE-2023-49880,0,0,257c43be93776568a0b52b8a6e628304074ba9fd82011c7d2857ed2bb2f10 CVE-2023-49897,0,0,870ad155edef57b65e707e243e055d6d18af07e15c1ff8359a26652388fe88f7,2023-12-22T04:15:09.130000 CVE-2023-49898,0,0,b2a1db122e368d3cde8339cc3a7f10b600032b56ed6d4a0eb150bd85f0d23b04,2024-01-05T20:00:50.767000 CVE-2023-4990,0,0,6c714ad5429626565156c819a6158c984ff4f11be9d2b200d6059e25722c351b,2023-10-16T19:14:35.937000 -CVE-2023-49906,0,0,25aaa87bdc6afd4b07ac5775c651384b436e6161beae0ca41d4acfc5ffb3381a,2024-04-10T13:24:22.187000 -CVE-2023-49907,0,0,88a6e90537e6df12cb393ee5f70bce57edc5455140487c77511924dcd6af5a5b,2024-04-10T13:24:22.187000 -CVE-2023-49908,0,0,fed4a187142879168ff16e74ab680643197c949ff388302218b1a872d9f256be,2024-04-10T13:24:22.187000 -CVE-2023-49909,0,0,11265376e06000a99dc14e76de202166a98c0196fc8c8bb68a36c8013410025a,2024-04-10T13:24:22.187000 +CVE-2023-49906,0,1,fead0920487f37626e411045e94c39fd6e25b001b956bce487d5bd3ad6eff216,2024-04-10T13:24:22.187000 +CVE-2023-49907,0,1,7785a671847026ec96324b57270b7610ae57b2d4ab4e3daa317028f61961e9c9,2024-04-10T13:24:22.187000 +CVE-2023-49908,0,1,4001e7f094b94cd33a4c95c4ef983d213dda482317e050a86719f7e07a2b6e7a,2024-04-10T13:24:22.187000 +CVE-2023-49909,0,1,2327de10e3a32cd7cb2d296b02321a6060e96fd06f0c3f8bb14b5fafa7897f96,2024-04-10T13:24:22.187000 CVE-2023-4991,0,0,1a55ddf25a888ed21371b9ee46d8bbcb76ec3b25dccb3800547e80fbcf26b24f,2024-04-11T01:22:39.460000 -CVE-2023-49910,0,0,cec8afbfefd7325e8a9b6830de1ca415b6e1d7a97c9d334e541fc91c442e9a48,2024-04-10T13:24:22.187000 -CVE-2023-49911,0,0,1dadcd81a3b18c840f5b26826ef7ff0b63ca6a52b211bf250b62ce4e267fc261,2024-04-10T13:24:22.187000 -CVE-2023-49912,0,0,7f31d16ac912fd84aa9423962d84d8f8e6fd7651a402ed68cfb455d4e8452ba4,2024-04-10T13:24:22.187000 -CVE-2023-49913,0,0,5d9cc411970071fa21c01c018bcee63a865e854eb0c11c217475fe52cf678eb3,2024-04-10T13:24:22.187000 +CVE-2023-49910,0,1,87eb4a694663d0b5990fc68dfcd60066457157a93d346255056d49e1066eca3d,2024-04-10T13:24:22.187000 +CVE-2023-49911,0,1,f162e5bd5fba87c9cc114320cdb5108f7958101f899d32a41f25fbcca6c0ea90,2024-04-10T13:24:22.187000 +CVE-2023-49912,0,1,e5a965f6c96b471c3858604cfbe89bb29394860ad1063f2268a092067a017b95,2024-04-10T13:24:22.187000 +CVE-2023-49913,0,1,2d41f5007a530866fa8368f30736e1a8706c89dfc1252e7d815eb1322b7d0532,2024-04-10T13:24:22.187000 CVE-2023-49914,0,0,5cab0a051c77f20f0e1965440812ba29ffb7db5d89ee06f1f98d52c994286c24,2023-12-07T19:04:24.117000 CVE-2023-49920,0,0,95ad99a89e65f0f1a24a3af0d45eca609ac623e79fcc48b1b462a9d0752f0903,2023-12-28T13:49:22.483000 CVE-2023-49922,0,0,08399520b800d4342637b05f466e75991a66c2a5dc2abfe822e63cfdfcf3b210,2023-12-19T15:11:00.423000 @@ -235161,7 +235161,7 @@ CVE-2023-50343,0,0,859f83a721acdaaac8cba4befed6f70c13a472a1125df6b3d7d5513a7d94a CVE-2023-50344,0,0,6c07f349574d2a6be6564f8e865cc501d59b291dc7e28765e6b3de95f5cd10f4,2024-01-09T17:51:58.343000 CVE-2023-50345,0,0,b254d05295c8e471f0aafd83bf06f34b6fda92883b0abc41a84d3ebd9da61fd2,2024-01-09T19:50:11.817000 CVE-2023-50346,0,0,7d43e1a3ef0ad352b4c2959926b7c24a3111fa009948f035cf450685719b8e43,2024-01-09T19:50:45.653000 -CVE-2023-50347,0,0,53cbd614d3813d1de0e9b12ad11f93304fa78dc9cf87d41443a468c6a2c0f1ff,2024-04-10T13:23:38.787000 +CVE-2023-50347,0,1,e3108f97957b9ce9d74329976e68bdbf0260c6e3fd954fd8499d5582c3975009,2024-04-10T13:23:38.787000 CVE-2023-50348,0,0,2b2e401a0efc97fcd3f209e50d44a55592bfb0fa0d1560bcb638fbe878a39892,2024-01-09T19:50:04.390000 CVE-2023-50349,0,0,66fedfcef81508bdf9cc9d3026217f5cdb0ac6309de4ede5a7ff99fde76ce825,2024-02-16T21:34:23.923000 CVE-2023-5035,0,0,994162f1c0fa95befb39d29be2b2ec872be4bf0e774c6b5949585ec1ba1b96c1,2023-11-09T19:54:28.697000 @@ -236026,7 +236026,7 @@ CVE-2023-52064,0,0,d161416577f26fcbecd38bb973b8c964ce87228edb02a6ee42c92f03db6b0 CVE-2023-52068,0,0,46dc0fb42ad609daf31d3e02e701415ff11a96cf786461d87c5b67e664893e04,2024-01-22T19:53:08.497000 CVE-2023-52069,0,0,770903ab1d55ddc9209197d2b9a5ac15e4c462725c148188d13afa72d2843b5a,2024-01-23T21:41:02.097000 CVE-2023-5207,0,0,68bb12ed05545b826662bd3f81bdb86f249305fd13af79b5c6ef464a8fb92564,2023-10-04T01:55:31.953000 -CVE-2023-52070,0,0,8966cb69ab112df374514f68f3740e32c894d7a9d7ef3e0954b2323fbfa4c980,2024-04-11T19:15:16.037000 +CVE-2023-52070,0,1,0bf0c87afd6055ce701382cd0c5d8f0d1b0f82dbdd657c51472bf82e96b133ee,2024-04-11T19:15:16.037000 CVE-2023-52071,0,0,ad965383e3002b3edaaabcd0d35cb4f0d481af86aa23ed4bd97e6efd9d6aa2dc,2024-02-23T09:15:21.867000 CVE-2023-52072,0,0,02127eb9ae4273b1ad79732d9280cd4f630158412943ba361c9a56a2bce352ce,2024-01-11T20:05:45.403000 CVE-2023-52073,0,0,123468189ce68f3cfbeab56f91e9e4c60c12979b9e605872064a295c45e39979,2024-01-11T20:05:37.137000 @@ -236163,7 +236163,7 @@ CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24 CVE-2023-5223,0,0,1a090c888286dc136b02a2e4c59b213154a29ed55f2789c321155d9895f1355c,2024-04-11T01:22:55.043000 CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000 CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000 -CVE-2023-52235,0,0,16981ffc5fe969f81317d84f727c6e32258dd02cfb8c5b06541b383bfe064ddb,2024-04-05T12:40:52.763000 +CVE-2023-52235,0,1,cd0fd933ddc53865fa09d8b56f84ffa70ea224ae48315dee51674d5a7a8efbaa,2024-04-05T12:40:52.763000 CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000 CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000 CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000 @@ -236289,17 +236289,17 @@ CVE-2023-5243,0,0,c84c98bc662840372bb3f6eda1ad149cb2f2941942ba96750d72e9684f09cf CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330fe89,2024-02-13T14:01:49.147000 CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000 CVE-2023-52432,0,0,d9e628cd1ba368f63ce7d4aa2f3fa1ad3ace9f6cbad32032b51f0e38a1c9e333,2024-03-05T13:41:01.900000 -CVE-2023-52433,0,0,1ff15e0b84ada10d9fe85644e2eeee231a8e039de83865a18bc59793995bf899,2024-04-04T14:15:09.057000 +CVE-2023-52433,0,1,1cb769e1f9fec61d125d42d2cfec9073ea0ff149315edfd2c60d8d77a20b64f4,2024-04-04T14:15:09.057000 CVE-2023-52434,0,0,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000 CVE-2023-52435,0,0,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000 -CVE-2023-52436,0,0,8f17bb726b2823c780a3b9583f0f935844b4d54710b449490ca6c5a93a233290,2024-02-20T21:52:55.187000 +CVE-2023-52436,0,1,f2ceadfab7e339670d3ef2d14370a8b04b4c4e2e8f82617541201e13957b570c,2024-02-20T21:52:55.187000 CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000 CVE-2023-52438,0,0,320b81973417672f06fe062915e89ef0ec0fe09ac9641be89e9ceb9cc678c91e,2024-03-15T14:03:51.503000 CVE-2023-52439,0,0,1acb61b0653d7d06078084524dd22a72646c2e70fb118450a15ea65c12a46971,2024-03-15T14:21:10.847000 CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b6e,2023-09-29T17:53:12.883000 CVE-2023-52440,0,0,7f79ecc423520493b7ea33e872fa5ceb47ef15bacc232c9a528905fdc11fa5b2,2024-03-15T13:44:59.367000 CVE-2023-52441,0,0,29f8dfdafb0665e97721ef99b56f7416e8cc50e990c6b9fd16addab92b75b2de,2024-03-15T13:56:31.710000 -CVE-2023-52442,0,0,f0e32f692f04917f9b44f1a58b9cc67efd1d412e7f16caea29f8d0af9ba07f69,2024-02-22T19:07:27.197000 +CVE-2023-52442,0,1,08b5844833bbf9d6521cedb8bc5d80955d6b1d19ce5ea976637d3dbe7f6802e4,2024-02-22T19:07:27.197000 CVE-2023-52443,0,0,d2cfc476b089f8fdcf50f50719540af45f0af66b06ea096a3e3bdb089d114cc0,2024-03-14T20:16:02.947000 CVE-2023-52444,0,0,e4e74b636a9119fb1430d59aa25d18b36c2089ded63e3a22c77190c88140fba1,2024-03-14T20:13:28.070000 CVE-2023-52445,0,0,935e18f4f35f2d58044edd90dd7b35f47e4402522601caceac7b2bae2ab24ab7,2024-03-14T20:13:50.727000 @@ -236311,30 +236311,30 @@ CVE-2023-5245,0,0,e4b08d166fa624efe0905252122b9076873a0aaf2d4a309ee2e9db34327ff0 CVE-2023-52450,0,0,2bab0519c8c73ad4475ba6c1040107cc3bb5f758499ce6a9019d700dd0c9b8a4,2024-03-18T18:34:16.497000 CVE-2023-52451,0,0,65a739f6d581805ce2cf2b36d79848a56d63f5f7e896bfc143f00d66a3183e39,2024-03-18T18:33:31.077000 CVE-2023-52452,0,0,7baace8ccf50e6e949146023fb757b323cf12c7750b0fc5df8cd239e671f9bac,2024-03-18T18:24:33.550000 -CVE-2023-52453,0,0,69ba07cbae189e1e3a60d3872d700f556de0e7e337d505dd8820b63e89f74b76,2024-02-23T16:14:43.447000 -CVE-2023-52454,0,0,22ebb0b0075370b9ddd1f11dacb5857dfa819e1c67bf8f66b5199dda2b146dd4,2024-02-23T16:14:43.447000 -CVE-2023-52455,0,0,50387c03b1888e13e7e7ba3d95a1c5309a79f1bdc75211d85b07758cabd70d1a,2024-02-23T16:14:43.447000 -CVE-2023-52456,0,0,e421d9f482810945cd720df8f922a5cf6f052a7c1f0af7e67ffc8a9733b6670c,2024-02-23T16:14:43.447000 -CVE-2023-52457,0,0,ee1d4e46d28ff504e5b2edea46299d5e9a6be3c5358266e0cb2ffc7fa57e470a,2024-02-23T16:14:43.447000 +CVE-2023-52453,0,1,540f086ddb4d87c68a063cf01b29630dc3cd1261ca04635b7aecfc5ad7b681e6,2024-02-23T16:14:43.447000 +CVE-2023-52454,0,1,992f00482a134745ded2c4d87c47d8f7101929f24acb8c06da66ea994a41802a,2024-02-23T16:14:43.447000 +CVE-2023-52455,0,1,76a6bcb530205d4971a4b440b50dd84bc697337c3fb3171373045411403058f1,2024-02-23T16:14:43.447000 +CVE-2023-52456,0,1,10a5abe34cd481166ef5bd0c8f2721aa67c0c3b426198c8f94ac38f160f96c83,2024-02-23T16:14:43.447000 +CVE-2023-52457,0,1,6f0cb6a137d10bff51f7fd0ceb008040ac18c4c0c65b0db7128924c45f02580c,2024-02-23T16:14:43.447000 CVE-2023-52458,0,0,4179a61058bc469d80baf47d1fe4bca0075a62207d9346d1e8d88a1c46056860,2024-04-13T12:15:11.020000 -CVE-2023-52459,0,0,ff4a750420417f6e1a73adecde2dedfab2306c936ad4e31af5077c218978412a,2024-02-23T16:14:43.447000 +CVE-2023-52459,0,1,c11aebe2be21999c43ab80746556120222524712be70c9c8bb4eb5ed37d630c7,2024-02-23T16:14:43.447000 CVE-2023-5246,0,0,efc93f05f4d6576c2fefda617ffc50a2cd42a25ecc2a7e9c2794376627e129e7,2023-10-31T11:58:05.363000 -CVE-2023-52460,0,0,3580a9c6cf57f915a3439bb097f6bfb87395e4435a6db3a971756930a69e16c5,2024-02-23T16:14:43.447000 -CVE-2023-52461,0,0,719a65925f951c681f50c05e9ce85d8b5d8fa1d42253944e773762e89d82d323,2024-02-23T16:14:43.447000 -CVE-2023-52462,0,0,55631bf14d775de6893b08bfa144e321e97b4df78e896cb3dc2d71556fcd4fb0,2024-02-23T16:14:43.447000 -CVE-2023-52463,0,0,84f81a800f526426cdd73a288b8916a5382f876f3928b7564eea8c6cdf4481ae,2024-02-23T16:14:43.447000 -CVE-2023-52464,0,0,dad6951dd4fc63654468296a96395645fcc4452c722b366a85b3b5b266fc3434,2024-02-23T16:14:43.447000 -CVE-2023-52465,0,0,7fa78ce01edf01847e3dfb9fa53919bc9c76cb2b3e110c9a971bad83b5e86e49,2024-02-26T16:32:25.577000 +CVE-2023-52460,0,1,7b5ce003348e2b0c98c11a11dd79b88b3d4e9f665c8574fd29056aa818d9e331,2024-02-23T16:14:43.447000 +CVE-2023-52461,0,1,0e4def3da0077977c0198465fc1be0f30b9f34acfdf83f12cf0b89000b004b24,2024-02-23T16:14:43.447000 +CVE-2023-52462,0,1,20ba12f9b584ea9029478bee5d96be5eff52d04472ac0a5dc42253960d917772,2024-02-23T16:14:43.447000 +CVE-2023-52463,0,1,d2f59f8423a5a06cfc6fffd134596a3946afed945a229e47ce85482973c45abd,2024-02-23T16:14:43.447000 +CVE-2023-52464,0,1,42a3908c37b4dc5e025800440c043a58b21bbf0e27c9316a1a4fe7451f45d14e,2024-02-23T16:14:43.447000 +CVE-2023-52465,0,1,8956afa175cc237677dc22c4581d786ca5066af1a82094ecc5413bd72197fb4d,2024-02-26T16:32:25.577000 CVE-2023-52466,0,0,56f8cc53f82884aedbecde370c65172b4b8e71564d7391aaf8319e40e8aedfea,2024-03-03T08:15:07.860000 -CVE-2023-52467,0,0,d95015273625dc41028f97703af5454e8189506645b788af69a39823c12f5aed,2024-02-26T16:32:25.577000 -CVE-2023-52468,0,0,eb217d8dd52235aab57d74e8da11223aaf747b3881c9b021d9b45d3ed82ddb22,2024-02-26T16:32:25.577000 -CVE-2023-52469,0,0,a491d54dca5002a97f3e6ecd0827e72cef30fb8b460d6eec4df5bfdfbf022a3a,2024-02-26T16:32:25.577000 +CVE-2023-52467,0,1,8e337ff0d9f89056d891f0d1f27543bb5ce4829cc7cb8b2fb2a27f70eb795fe3,2024-02-26T16:32:25.577000 +CVE-2023-52468,0,1,22ee95f60b530d6b8bd5a13f984d6c42411fd943b1b3c418942bc7b91cbc48a1,2024-02-26T16:32:25.577000 +CVE-2023-52469,0,1,57b3dc8c9fdccf2ee5e6620c216414eb72a43b8602dbda335e6f018dd9947f6c,2024-02-26T16:32:25.577000 CVE-2023-5247,0,0,1476fd60cd067d05ec1c6bec9fda463c4aea196d092298e87bdb01efe1f6d4ee,2023-12-05T18:28:03.620000 -CVE-2023-52470,0,0,51d0f60d7ec96c4b7f8fd9208b945b4509121635706aa5bdaaf14c13a344aa62,2024-02-26T16:32:25.577000 -CVE-2023-52471,0,0,b642f8e9041d5d724a49a08400a32dc28531cdefd549b4c5ee2fae2720da71c6,2024-02-26T16:32:25.577000 -CVE-2023-52472,0,0,b5720e7339779b9c69140ada4eb12f1cc6f526ed72fad3101c15cc52f606ed96,2024-02-26T16:32:25.577000 -CVE-2023-52473,0,0,b34cff90b7bf9c79ce76f9f3bc54fcd3449b09a7080f87b4720ff27b548cf81f,2024-02-26T16:32:25.577000 -CVE-2023-52474,0,0,6877148e7efbdf841291639c32f424cd174600e42fd97a28c6a91bbde37c1f5e,2024-02-26T22:10:40.463000 +CVE-2023-52470,0,1,bcf431a2900f2ff89a1c0135248b85180e276012600dafbbfaf3c47745ed092b,2024-02-26T16:32:25.577000 +CVE-2023-52471,0,1,98019c1b242166c9185213b2d49dc842e5484f48cf27f56385f0d3d5860abc0c,2024-02-26T16:32:25.577000 +CVE-2023-52472,0,1,d64a16266a6acc60a5e0bf3a03a48823962e71636070ded43983fefe1f46f4e4,2024-02-26T16:32:25.577000 +CVE-2023-52473,0,1,62136d71510bda8b7e538495029d252e48507c1caf12a0a52ac3785ebabe27fb,2024-02-26T16:32:25.577000 +CVE-2023-52474,0,1,b9f9d0a312e51d9a8f506d80ce2688592c84db2d9a89df836eca54efa2ba8edb,2024-02-26T22:10:40.463000 CVE-2023-52475,0,0,aea1f61605749b823b9030eaa04c6190ad328a4a027c1710dde7c15d17b7e88d,2024-02-29T13:49:29.390000 CVE-2023-52476,0,0,9cb1bc3168cdade3d6916d674b6fa120b5a505e7a4001b9aab86132cf27a69a5,2024-02-29T13:49:29.390000 CVE-2023-52477,0,0,b72b46a60c0d5be38719cc48822f05ded4ca225ae30175718a7ab9b8ee043bd1,2024-02-29T13:49:29.390000 @@ -237387,7 +237387,7 @@ CVE-2023-6232,0,0,ba2cdf630fabf4bd0ac948405fb458e3ef453f28a2bd013f114fe7232f74f8 CVE-2023-6233,0,0,219eace3a1a0153d9e9c47c5f968398c12850df06483ce044fb78774d98c685f,2024-02-13T19:51:52.220000 CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7e2,2024-02-13T19:51:46.740000 CVE-2023-6235,0,0,a6ac280c87945b3531740d074fb7f02bafe0fd764523c0dc65a87b2c28ffc24b,2023-11-29T16:59:51.970000 -CVE-2023-6236,0,0,f30b1dead20c10f769b0ea13b34c3a20a3db1b74a6b65395d2ec0b6baf5d883c,2024-04-10T13:23:38.787000 +CVE-2023-6236,0,1,c746200290431ebe52c336c97f229880dd537f5eeffbab0aaed59ac6b0e48cbf,2024-04-10T13:23:38.787000 CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000 CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000 CVE-2023-6240,0,0,12ab4bd584cb69f33bfd21cd68c3dcd33151a210965a0c843c22e8a6643ab9e0,2024-03-26T16:15:09.550000 @@ -237458,10 +237458,10 @@ CVE-2023-6313,0,0,37257477d4aa2923e734a02239fe22761c2b383dd01a5ad6f0805b72148ecb CVE-2023-6314,0,0,f4128a234377715ed433398ed29329489185b89566c1f8948f1313fe3eb87e21,2024-01-02T13:31:21.217000 CVE-2023-6315,0,0,0ea3d757b463802bd072d80c605e85486723b96d15e4b6f43ffdbe4b27553792,2024-01-02T13:43:51.817000 CVE-2023-6316,0,0,d2a53cf9d574188a1d1db73921a61c0a0e0e318b0720f84fd1373b0184553c47,2024-01-17T20:17:22.003000 -CVE-2023-6317,0,0,eb7fbadd966758690c57a974bcc046a6190126e13dd337f4077202380f3680b7,2024-04-10T13:24:22.187000 -CVE-2023-6318,0,0,b04e66f64e6fec0dfc89f72bd79f50f1ee7f9e81599bed1958c3e33604d6dee2,2024-04-10T13:24:22.187000 -CVE-2023-6319,0,0,752db95a0425aaa6cbc5ae671266ba8e248421542172015485e780bc37897b40,2024-04-10T13:24:22.187000 -CVE-2023-6320,0,0,e6c28f520a1f98d57a1ef16a12494de83980ae8144bec2b5d676dfb6e316b75b,2024-04-10T13:24:22.187000 +CVE-2023-6317,0,1,8005668dd53be4160301b5b7b73d649ca2700c557cff68617cb9f4fc86cf1b50,2024-04-10T13:24:22.187000 +CVE-2023-6318,0,1,31c2fb1cd754277e618c0d9fd0a07d39188240a3788ec94703d397062dcf56fd,2024-04-10T13:24:22.187000 +CVE-2023-6319,0,1,d367b191e27375692172eb19bcb0608e2452cabe89ff70ee26a0cc611e078cfc,2024-04-10T13:24:22.187000 +CVE-2023-6320,0,1,12439bfbb9ea4a0b41dc589df0e6b582f49a61d5d7d25f7801f6519055dfdbe8,2024-04-10T13:24:22.187000 CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000 CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000 CVE-2023-6333,0,0,c9c5b2d28685d70e3694c86d73a2ffba7633a0d13b15746a0b23ea79549ea6b5,2023-12-12T20:39:57.697000 @@ -237508,7 +237508,7 @@ CVE-2023-6380,0,0,392e06acbd089517e78f47acec46283d5c2952e9063d6ec241117f7f2010ba CVE-2023-6381,0,0,9eb2cc86268893afb53ecfd36bf1545e56605f2230eb1c628f554cc9d2441ca9,2023-12-18T19:58:19.327000 CVE-2023-6383,0,0,eac1f58249c44013eaf9187ffa2f61b6b9c7a5a7e3f599e1a3d52dda8bd10105,2024-01-11T20:02:29.963000 CVE-2023-6384,0,0,e42c9ea468164d3f1395963798a71fe4d69d29c0523c49e6e6b388cfb04d28f8,2024-01-26T19:41:47.807000 -CVE-2023-6385,0,0,024fd895feee4ade0634cacd2a4e73786fe3017358c36280d4b8008519e78f4e,2024-04-10T13:23:38.787000 +CVE-2023-6385,0,1,049ae674d4d43f272c3f927a467a05302d852711996c1c33eaa10b46d553ec9f,2024-04-10T13:23:38.787000 CVE-2023-6387,0,0,01061a4384eac1426c0b0307a5f5a77ccf3d061f2850efece6ee122c1a41c078,2024-02-10T04:10:48.473000 CVE-2023-6388,0,0,c28a286715bf87797fdcc5ab820176f5279623dade7dc3ac703720528daa24e8,2024-02-14T20:15:52.940000 CVE-2023-6389,0,0,d0a12c9c16de667bd5cc2f85daee7b3033ee9a0ab0ad0970781f0b062ab5edcf,2024-02-03T01:20:39.633000 @@ -237589,7 +237589,7 @@ CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472e CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000 CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000 CVE-2023-6485,0,0,d84b1f2fa339ee3fbe00211d49269bf9012e27d7ef753ce7f80b70bff072340c,2024-01-08T19:31:52.377000 -CVE-2023-6486,0,0,2852c688030b05f345f0ff9f0e876ab8d345b734861d6146e29b6ccbab426a36,2024-04-10T13:24:00.070000 +CVE-2023-6486,0,1,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a5507a,2024-04-10T13:24:00.070000 CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000 CVE-2023-6489,0,0,8be5137422e44d9e775f7530defb6286a84af9abdf8da8a38a11072ad60f9cbc,2024-04-12T12:43:57.400000 CVE-2023-6493,0,0,f1b44774d19dee2dde0db6057c1c8da6a9052c466b0c843005cf7e84e74e5bad,2024-01-10T15:10:40.807000 @@ -237617,8 +237617,8 @@ CVE-2023-6517,0,0,3467593a9d1064dca9fbac50097aac110e8ea12ac0f5d56273a5e05aa70522 CVE-2023-6518,0,0,701884efa90328aec127750f6d7a617892af73d7d9d1cbf5cfc7a0127e0ae388,2024-03-21T02:50:38.627000 CVE-2023-6519,0,0,1067c6eb2fdb653773710a715d19abe17d72d4948b55787118a707da115fb55e,2024-03-21T02:50:38.713000 CVE-2023-6520,0,0,51cb07e213c2b58051c216c89b744fc7c414cbeef02be0ba128dd84d6c032cdf,2024-01-17T20:43:01.987000 -CVE-2023-6522,0,0,e2a708a4903adadeca3b568b6a016d873c022ef513915335664038e161f935de,2024-04-05T12:40:52.763000 -CVE-2023-6523,0,0,d3a9048f5a7ff44e2a6950b8c3357bca3f23405f7d00dd88c1769618a08641fd,2024-04-05T12:40:52.763000 +CVE-2023-6522,0,1,4efe5d74ec25e40bbc73d39de4a0bc9decfbeba03311ca737fb6bd10288f7ab1,2024-04-05T12:40:52.763000 +CVE-2023-6523,0,1,b8b9e6555fc66a468e8f157f620b53ecedd2cd25f7a85f1b7ad38c21dcb8f6bb,2024-04-05T12:40:52.763000 CVE-2023-6524,0,0,c1e8fe40a4048e04c188cd09d174accb2325b4f144f04207980ba18caef1e277,2024-02-02T16:33:29.477000 CVE-2023-6525,0,0,ac70555a2bef1a8087998ae6359b27cf29025600da9a470253289615b5779d5a,2024-03-17T22:38:29.433000 CVE-2023-6526,0,0,bf53e42fb8e2321f8ebfec63b58aabc5d9b3663864ac691d642ae796c386736c,2024-02-12T16:00:51.520000 @@ -237751,8 +237751,8 @@ CVE-2023-6689,0,0,f525637daa23406ff158ff2d4d69ed0fb36c36685b0e4e4782d2006f17da66 CVE-2023-6690,0,0,4a0a71b1ead07e18f281fc4661b8ad9c1c5894485cf3fc449f0f62ac342ca884,2023-12-29T19:21:45.180000 CVE-2023-6691,0,0,4508ab5df364506b806420a77fca83d065a1d8f25fe3acc54e1f9c114307cf91,2023-12-28T18:28:00.493000 CVE-2023-6693,0,0,6873a264484b094c8ce71cc1218181d85ec7b1708eb4e4c0806f70e884fa33d8,2024-03-08T17:57:54.067000 -CVE-2023-6694,0,0,3540c50295d3e35d550ed4b2d6863ddbb6b04d906fd5fa02e5871d6d5b2e2956,2024-04-10T13:24:00.070000 -CVE-2023-6695,0,0,a9add852f122e588985feb5d4fe62aed2ba5cdccb597a85a236dad8af301d128,2024-04-10T13:24:00.070000 +CVE-2023-6694,0,1,74888c6061f5995c1ece9e256c949c745db7a28c9fae546822fe2bdd37077360,2024-04-10T13:24:00.070000 +CVE-2023-6695,0,1,c350585c288709484fa2c4ed5afca55376ce388211fecd421637a541eb8ceb4d,2024-04-10T13:24:00.070000 CVE-2023-6697,0,0,e4339138bfdad4a40ac5f595e1eff8e88fb25ea1f60bcfd83302475d5a5a44cb,2024-01-30T20:25:21.367000 CVE-2023-6699,0,0,9a17c40ae044b87058ba5cf6f205be27efddf5ec08f4e3c0c855e1346e832f36,2024-01-17T00:02:15.700000 CVE-2023-6700,0,0,febd44b44e68931da5556e3850b52d8ad5facf8c9b194d0da3f6a8bc0608cdf3,2024-02-09T16:38:05.687000 @@ -237814,7 +237814,7 @@ CVE-2023-6773,0,0,9bb5ea16e6185b8ff0a9d10877922a6482bcc8da61784dbc32f7667f958208 CVE-2023-6774,0,0,8ff567719aad58d61d9feb363e57646ebc95f8e60de9a7bbe27fd727f177d50a,2024-04-11T01:23:26.447000 CVE-2023-6775,0,0,dcbda1983988ac4c11b9a749288f364dfbf178e71b8fd962c848b0a38ed21dd9,2024-04-11T01:23:26.537000 CVE-2023-6776,0,0,2968271048fa8ca653df4209575bff057123f6c32739a4f0bc08a9ea121efe01,2024-01-18T16:24:38.070000 -CVE-2023-6777,0,0,ca51f3552bc757d66e935fd16dbdc44f10d2bd4dd7c7fbc9dc6d00de53589324,2024-04-10T13:24:00.070000 +CVE-2023-6777,0,1,4533a8a66a5e14fb0237ab65b881e9f1c9a8cb0c6310a769db581c2c117ebbad,2024-04-10T13:24:00.070000 CVE-2023-6778,0,0,4da0caccc37ccc1faf5007378583694bfb6f9351ba67d60d3ee84f433b4b0fe9,2024-02-08T10:15:12.243000 CVE-2023-6779,0,0,84945b027810dcbe6c0b2bcc726a9d50fb0817df70a01f395a9528ce38146495,2024-02-27T17:26:48.247000 CVE-2023-6780,0,0,5dfd988419cec384929ee5ea37cfe3044f42ae11bc2461e6beb6e09b0ef7d99f,2024-03-26T16:15:10.083000 @@ -237831,7 +237831,7 @@ CVE-2023-6793,0,0,f4125c003a76c8c018da148784325e9b4feb90d72c7624c3e8b48d5ebe310d CVE-2023-6794,0,0,1b671f40f3778d9f3c313d7ef02eccd3efd07be3416fa2869419b18e4a1a8399,2023-12-18T18:43:03.610000 CVE-2023-6795,0,0,824c93ddeaf05c7c0b68ecc0e93b845ec237dee4909f6753dbc411f4521eb329,2023-12-18T18:41:04.070000 CVE-2023-6798,0,0,6730e1036d89f62476765565f66a7250844f6f83bec708c68bd33ec612ec1b4d,2024-01-12T18:47:11.793000 -CVE-2023-6799,0,0,2c67e0846455bc1355062bbd4b91d32749ffcd0baaa389398d098558304cb0ce,2024-04-10T13:24:00.070000 +CVE-2023-6799,0,1,5108cd894375ae547e6d2dfa8883e464ee944f58d5f3bfffd9f7f8e54b5caa52,2024-04-10T13:24:00.070000 CVE-2023-6801,0,0,a242fbc47dc9de51a07a6b913814c902349bb31ce0d7f754e180e6a41ced487b,2024-01-12T21:05:21.497000 CVE-2023-6802,0,0,00b16af184ac08eea558edf74b1ad3bbb763e944b10a4e309cf7216aedf300fc,2023-12-29T19:17:51.287000 CVE-2023-6803,0,0,c7be83c7b2d4875f24695322cda22dc742edb82701baf0271cf61c2186890a97,2023-12-29T19:16:51.867000 @@ -237971,9 +237971,9 @@ CVE-2023-6958,0,0,360585034baba3dde8bbd2b4edec3a36320e0765453af141d99ea526bd11ab CVE-2023-6959,0,0,3499bdabf9b48447bf05d447c84d13393f065f476750e301dd4268abb320735c,2024-02-14T17:01:57.227000 CVE-2023-6960,0,0,e8901c6e4d7cc7fbce8a2552bd507c251572c059d2a27cad1e2667a56b5bb81a,2024-03-17T22:38:29.433000 CVE-2023-6963,0,0,231e665c342f619449883ebe35105e509b0377505f1217d0d32ee087d0bccd84,2024-02-14T17:05:16.533000 -CVE-2023-6964,0,0,02ea1ed8346e095dd4f1368e1e083b51ac3246c651eaceb27961eec5a0a6ea8d,2024-04-10T13:24:00.070000 -CVE-2023-6965,0,0,6904a4b6b09aa3717c0860e7e9cff2525131a4d57eea0dcc0f006f933901ae44,2024-04-10T13:24:00.070000 -CVE-2023-6967,0,0,b4108c330fc8e0112313827b4bc8b8e6629f4134df78e43c6d3b489da94f2142,2024-04-10T13:24:00.070000 +CVE-2023-6964,0,1,c0ad1bab867494413e0d294a1b4ba02b00c210ce5ff95683c4a7abe457ff5c04,2024-04-10T13:24:00.070000 +CVE-2023-6965,0,1,3161cd0566c2f4cc68cf7da3dd5f4f40c9e680a32873d29dc93679331f60d2f6,2024-04-10T13:24:00.070000 +CVE-2023-6967,0,1,e8d18a8c3855ee1871e469a1371a3b540ec58090306c27aae2cc4afa88f127e6,2024-04-10T13:24:00.070000 CVE-2023-6969,0,0,af7f1fac7c19184dd4a346dfa3002dd56ea8bf066ba1c7fbe000ae3b87995670,2024-03-13T18:16:18.563000 CVE-2023-6970,0,0,0f9239778a6c6425e613c8adeae37463c6bdd10b4d16dd22430636510b0bbc4a,2024-01-24T20:48:25.003000 CVE-2023-6971,0,0,87d9fb2fea287f164d59546a7daf008cb5ef4f3ea279e66acf661ea916f01d0f,2023-12-29T06:21:25.760000 @@ -237995,11 +237995,11 @@ CVE-2023-6989,0,0,a85ca03d11a82ecc2e82be398d4b11a7b4ee4de78aa85413258f2349b89784 CVE-2023-6990,0,0,01d5bcf5e62c5222c793fc4edf13b00345aab40daa5f91d63001defe12e5e53d,2024-01-18T17:34:58.227000 CVE-2023-6991,0,0,d320d8ae9f6660f9233afb9df2cd31c45357215c0ccb55c17ca3121c7ce334d3,2024-01-22T19:31:34.783000 CVE-2023-6992,0,0,782459730e7f591519995ae52281035d0bdd789cfc03f6c2dc4b426bd3514ab5,2024-01-10T01:14:35.027000 -CVE-2023-6993,0,0,6b1b4419ff20a22f73a54c4494f168d3661ff647d9ebe012ed38ff2235932cb5,2024-04-10T13:24:00.070000 +CVE-2023-6993,0,1,28e7892ca4f5a684ce198eb7d7cc71dc3b6e2c6ceb40db0cb67a0dd62b85a28e,2024-04-10T13:24:00.070000 CVE-2023-6994,0,0,16f7e9fe74177d8db08799b63fa83e321311be77b4109dc289e6c47e1eef23ca,2024-01-17T22:13:52.143000 CVE-2023-6996,0,0,fee6e56e5dfa5586cde4e5e46c334df0d57a09de47acc9683a6bef239c1421e0,2024-02-13T16:11:03.577000 CVE-2023-6998,0,0,7ec8e3aeb835c2df2ba7b5ff2a1ecfa2cc1cb25e89b11d6e99a0cc8f67bf0b09,2024-01-11T20:25:14.163000 -CVE-2023-6999,0,0,650a0a073f8272b3d028deeea21cdf7f5c0ee6cb7b9c4042003a83cd7212be91,2024-04-10T13:24:00.070000 +CVE-2023-6999,0,1,751c05f1afe21c6c013987d1c78286c3d5f55f717e4a5173d60ccbd0607b50eb,2024-04-10T13:24:00.070000 CVE-2023-7002,0,0,ed72bcef2e48a126a1ff1be4af10c1beaccaaa869a7de81d46962e400743fa1b,2023-12-29T06:21:43.197000 CVE-2023-7003,0,0,c2f67685caafc56100d1d2a37ad4d98cbab0dde58c7d186a42f1e45043a47a17,2024-03-17T22:38:29.433000 CVE-2023-7004,0,0,3e9a2bc9909d36e2af7dddeb28517498d215f6e0ede14782acb4def06a55a403,2024-03-17T22:38:29.433000 @@ -238036,7 +238036,7 @@ CVE-2023-7041,0,0,4c05239592fe7eb2606d4d1520c43f9a4a8f23deddca74748295456fde25ed CVE-2023-7042,0,0,ee601eeb9ba474cb0a6162641758a11404619b159a8ea7c522f5605fcab32621,2024-01-22T05:15:08.547000 CVE-2023-7043,0,0,4e0d13314b235582b2eee5346938647b725841413b0cf7dcdcd97fb8c388d5ac,2024-02-09T01:00:15.637000 CVE-2023-7044,0,0,e5885ac0038b67788ac2339019a4789c312787e8319dea36168ca85cc31f3eb5,2024-01-10T16:12:34.983000 -CVE-2023-7046,0,0,bb7fe78e2da201de484fc9199315f82d30f142fbcef863fca2b409aefe337936,2024-04-10T13:24:00.070000 +CVE-2023-7046,0,1,3d3d155f8807b16946d1f3278020372de7951eceac00ede9bf19713ccd7900b1,2024-04-10T13:24:00.070000 CVE-2023-7047,0,0,8087f4740ef1671361f635076bb9da65d1d9fa07ceb4638f75ee35892f4f8533,2024-01-04T18:37:04.157000 CVE-2023-7048,0,0,2a459dad5db1d6a34bbf230b1f6ffc9b0ab472c033e4f18ba083c60236b4bc6b,2024-01-17T22:32:55.657000 CVE-2023-7050,0,0,ad61f52bc79121c24b99b4e8b24707325e6abd47d429195a6cf53aeee5fdc246,2024-04-11T01:23:32.627000 @@ -238135,7 +238135,7 @@ CVE-2023-7159,0,0,8d0ac799b1b43e77d10c0278eeb0cf9dec9b44228855eabe9257963fb4a3a5 CVE-2023-7160,0,0,af6d51713b5471f48e62800ed78bdb63c0fedde936fbb52c45f6e9b021bbb8f9,2024-04-11T01:23:38.847000 CVE-2023-7161,0,0,19e342e2e6907ce77eda7a1f28291d09d90d4ffdca8aa5c39ac0e84e6b729fd2,2024-04-11T01:23:38.937000 CVE-2023-7163,0,0,0f5c35a87fc47051aa08ee9aab448a8efa59bbfa72ee9ee97a6b130cd14ca045,2024-01-04T19:56:45.747000 -CVE-2023-7164,0,0,c8685deb3cb6253bc899e8b87ef1fdb1b2e357ec125d05cf17d757f460e8618a,2024-04-08T18:48:40.217000 +CVE-2023-7164,0,1,0eba723e66ffde882f886b1d956fc76bf968cae8235a06d4473a12b674cc971f,2024-04-08T18:48:40.217000 CVE-2023-7165,0,0,1d97a8a837ff89aac62852f940d39f1fe6be2be70c7e979a7de92240e40591e2,2024-02-27T14:20:06.637000 CVE-2023-7166,0,0,0ac6c206a656f676dcea97df1445e29e7c53ac52f46885960d94e0afcad8c918,2024-04-11T01:23:39.093000 CVE-2023-7167,0,0,2ad0a7fd6f0156359513234ef6a12567866f88d4c0e31ddc963112ef38c1e460,2024-02-27T14:20:06.637000 @@ -238267,7 +238267,7 @@ CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 CVE-2024-0157,0,0,3c7d306ba5c349389c0dd005fe8cb072a4fdc9dc666817fce658edb3c587f9c5,2024-04-12T17:17:21.027000 -CVE-2024-0159,0,0,1e894f3b7e8a4464a8a938598dea9c22b2785f51066fcb76006f4e3a3483cf07,2024-04-10T13:23:38.787000 +CVE-2024-0159,0,1,2ad1cb026904adca39b92e28c0c2ad3b954009db9f9d73bdfde530f15bd720ee,2024-04-10T13:23:38.787000 CVE-2024-0161,0,0,73817f9b8418eb2b694637c6f29b853142572f0b28368cfdbc90d03735fa61fd,2024-03-13T18:16:18.563000 CVE-2024-0162,0,0,d4afb611e62def47b22c9b0a9015aad8ee85286e9696283d1d6c34751c0c24e7,2024-03-13T18:15:58.530000 CVE-2024-0163,0,0,75d5ab5994e40a3df17c737e0c0e470df2e79ad42fff0430bf355117e2272e40,2024-03-13T18:15:58.530000 @@ -238454,7 +238454,7 @@ CVE-2024-0371,0,0,a139f54c94137c24136debf0883dc7aee475cdb62b7738cadfed1bd0271635 CVE-2024-0372,0,0,18826f915f0bc09bfb51bafc2d8b83a2d53235dbbf608422fa68103f3cb8fe9d,2024-02-10T02:19:07.437000 CVE-2024-0373,0,0,e84d2ec214e6cf6d6530785b5a74d258c7c8442b5d909b69597e97fd4e61d68c,2024-02-10T02:20:26.317000 CVE-2024-0374,0,0,f37caf26fbd3e90b22e4e273dd9fd96488e9a00e4f132f831c14a53163be15a6,2024-02-10T02:27:25.150000 -CVE-2024-0376,0,0,92eb89d6c9e1c14481c70fc8bb6c69a253e6a04ecdc01e743e054b070a41a975,2024-04-10T13:24:00.070000 +CVE-2024-0376,0,1,b3add6e4abb2934b720f30dbe6ccb59a81e56399f6543d820c0f356ac3b1a15d,2024-04-10T13:24:00.070000 CVE-2024-0377,0,0,d2684599bab86b5a7cc190447c80c03d1b8a3e77bcd151cb3211d639e3271770,2024-03-13T18:16:18.563000 CVE-2024-0378,0,0,39a7c54c1e9a093aa89edfb414f4ccbde6e4a38ec33d55270428b49bd7f52400,2024-03-04T13:58:23.447000 CVE-2024-0379,0,0,174da64b305b0263e8906a1d5cc2f6215dd55f09aa0a9c8b5bda9bf88e026ed4,2024-02-29T13:49:29.390000 @@ -238642,7 +238642,7 @@ CVE-2024-0584,0,0,ab11ab9e67542a108cd207bce8a5607c22e027da068ad22c4543cb92c068dd CVE-2024-0585,0,0,cb619b9c96197bc0856de1bbba23498fa56abfb6d3b929fbcd544e7cec12d3c9,2024-02-13T14:04:59.323000 CVE-2024-0586,0,0,1da6c9cc73a40c340fe22aaa76f93ff10ee25c955238e3456b7a453a0c4fb81e,2024-02-13T14:05:10.647000 CVE-2024-0587,0,0,cfa091110ac70477c0692ee9c8862c7e798daf43a8e5d4a58640e068c5ddce5f,2024-01-30T02:04:15.073000 -CVE-2024-0588,0,0,e4fad6c84e60c787c4c775d5619345ba277edc7fcd532ed3992819015bf17829,2024-04-10T13:24:00.070000 +CVE-2024-0588,0,1,9655ed147e31b9fee93fc18c9df393b20e726d325a3f53abcb744d5e8622b4b2,2024-04-10T13:24:00.070000 CVE-2024-0589,0,0,609b73335080a50660d01dda7e7f80e47997482ead80737f0ecff98f5492292f,2024-02-03T00:19:14.737000 CVE-2024-0590,0,0,5dd8bd2a77cd45ab64ad9c3bb679c6154f3eb49e105e35d9c446e15ba07c54c8,2024-02-29T13:49:29.390000 CVE-2024-0591,0,0,17137f9234bbe522e7d4017c6dd7d09e25b3754d1dbc7dbc6e34a6feeb4b0677,2024-03-13T18:16:18.563000 @@ -238652,7 +238652,7 @@ CVE-2024-0594,0,0,60077e504dbbc890300ba3e96330ae555ec39c3816d3dd082cc5d28cf0cd63 CVE-2024-0595,0,0,af15af2ea25dae8e87d2cb0077ff60ffffba24a68e71adf6bfae2d8b34b81c14,2024-02-16T21:34:39.327000 CVE-2024-0596,0,0,0b265c937c4478a403b4fd3af4ba464d6f3e32204d68b008dcd08a509673f056,2024-02-16T21:34:53.293000 CVE-2024-0597,0,0,3a1e17fd48d4d13e1e3eeb0b7af292f08f1669c0f9ba176e3313fb24210e6aa1,2024-02-13T14:05:27.427000 -CVE-2024-0598,0,0,63ed6e7eb636c222c2cf40e7ea51a71218f6c309cc81940583423055ab62a5eb,2024-04-10T13:24:00.070000 +CVE-2024-0598,0,1,905d7443f5fe0cd440f5b3fed3dfd6b7335390ae802c46bc574bdf1908ea4874,2024-04-10T13:24:00.070000 CVE-2024-0599,0,0,7dbc47ef846c625bd51347329cac172e404c9e2251f0c6faedc638908e0999f0,2024-04-11T01:24:04.477000 CVE-2024-0601,0,0,e51823402e97a07a5a141e1ad7d876e713cfe8c12cd26cbeabb8756f653a410d,2024-04-11T01:24:04.567000 CVE-2024-0602,0,0,121da777ee04d2ac9ddf0483eb65b67eea3e0e5db73adf300f88ae860a247195,2024-02-29T13:49:29.390000 @@ -238676,7 +238676,7 @@ CVE-2024-0622,0,0,e186536dcc4d5eb54c215571bac19acf437efbeb21d4ea8cb00afffb19198b CVE-2024-0623,0,0,435a12ca9bf560f92a091a8adc9fed70987d56024bbadeb6cd09719f8de0c967,2024-01-26T18:33:07.443000 CVE-2024-0624,0,0,193a94c59e6aef2611f3b709bfcfdfe730e53076589746822f137984322f4a3a,2024-01-31T19:03:53.193000 CVE-2024-0625,0,0,e6db3236f3f3d4946f9c7470ea75c8f4fd101b44f963c82c90bc3a0f21b31db9,2024-02-02T05:08:07.047000 -CVE-2024-0626,0,0,c8c8940519a862a9dffdf36b882c8d48d5da50d6a5eb5d68f6c928539d29335a,2024-04-10T13:24:00.070000 +CVE-2024-0626,0,1,99f69af94a80c3ff521223c10206b5e62d73f526e3736bdf7c339e8efe1faca9,2024-04-10T13:24:00.070000 CVE-2024-0628,0,0,6929f2a7a44b9bc6b3b457ec8d478ddb1d9368f01ad7383ad0399a751f886828,2024-02-13T19:18:46.020000 CVE-2024-0630,0,0,49e9d42e1e8004a90a8d62b54ea8a5d5f6ebecab9fac26e6e82dc914d2e02636,2024-02-13T15:42:35.563000 CVE-2024-0631,0,0,a93d19933a511a51c218d396d78958f6493e1f093b61b401d8813f21718183cd,2024-03-13T18:16:18.563000 @@ -238701,7 +238701,7 @@ CVE-2024-0657,0,0,03df31f96a365ff74f536b2e576f724034746c6f9a8bd5289cabe539324842 CVE-2024-0658,0,0,c8030063b20ea5d291fe015d3d843f0861f0a368b4142f19ac4bd520de201605,2024-02-29T13:49:29.390000 CVE-2024-0659,0,0,df689a39891b5c6d4100205e35de6fcd55a04c0a3e8ccca3c16484c60b0ba8b4,2024-02-13T15:47:35.880000 CVE-2024-0660,0,0,d069b27074b6f4c7f7ed2315cc5f6367dfdc33c074b9539ae7e63fd7cffb71c7,2024-02-13T14:05:53.893000 -CVE-2024-0662,0,0,9562ab3ed3a25da81d683d5b62337da5f456b091c310e2cadae3dc9fa2eb20ff,2024-04-10T13:24:00.070000 +CVE-2024-0662,0,1,92446e560a040f8467aa9754fe3262f02d99557be673b0d22dc72fb0fd25b12b,2024-04-10T13:24:00.070000 CVE-2024-0663,0,0,05ef70641d92d11cbeba1424e109dc7a89b0e41c31e6b917439e40614b4b1683,2024-01-19T20:15:13.073000 CVE-2024-0664,0,0,ea2f7fc19e58aaf281007ce3999e25cec1a5f029916f27a82cef856bf88de93b,2024-02-01T04:15:02.763000 CVE-2024-0665,0,0,4f11c74d31ee400b4dead80ad52f0a187a0b330f44c457216c2744da6f35977f,2024-01-29T16:11:47.440000 @@ -238849,7 +238849,7 @@ CVE-2024-0822,0,0,f0d03b223c25850830b62db3595d4728a822efa091e187df2417c03c793bd8 CVE-2024-0823,0,0,a63a05b2a58b2f56e53480af56c377c69cf08327cb1f1db6940a24172c959e48,2024-02-13T19:40:20.973000 CVE-2024-0824,0,0,ee54bc5a89bdd6db6ee84c2f2693d0df2457876a968075ae1f91006433bf9238,2024-02-01T04:15:36.430000 CVE-2024-0825,0,0,640a2040332cafaea4e55fd6e76e7cead516d73bc693718308a9c3d177692244,2024-03-05T13:41:01.900000 -CVE-2024-0826,0,0,4b76cf564991a5bec6a0132b2460a5cc6f5b7037f5f1d38faeeed258b569e18c,2024-04-10T13:24:00.070000 +CVE-2024-0826,0,1,24567e2e197fe838f055858883c74f8705d1d90c240292f11cb62bd3d837aed8,2024-04-10T13:24:00.070000 CVE-2024-0827,0,0,20e04c8383d19c4b40bd78c264481ece2616543c1ee7f4893bd2d7a2474fec65,2024-03-13T18:16:18.563000 CVE-2024-0828,0,0,d69418d6c393b4dc996241694ca6e8bff2c3ad9a6a94962ff43ee882ac8eb063,2024-03-13T18:16:18.563000 CVE-2024-0829,0,0,98e430cc4b532794881f6225196961f391ee187b18b02e853eeb361c5237fa80,2024-03-13T18:16:18.563000 @@ -238879,8 +238879,8 @@ CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fc CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000 CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000 CVE-2024-0871,0,0,9f662ac78f6b1a329c54044768cbd47d14bc8d8fd129fd78afaf32634a3ad01c,2024-03-13T18:16:18.563000 -CVE-2024-0872,0,0,ada5775916c2cac4c195eaa3d280c11fbe735ac51fe2a74eac9940cadda51b03,2024-04-10T13:24:00.070000 -CVE-2024-0873,0,0,95754cd203c9a7796aab440a440d7aceb25e9f419f0726f1824dd4021e5694ea,2024-04-10T13:24:00.070000 +CVE-2024-0872,0,1,0924bc55b3c6385ba217ce4e13ea2506dd75654857395c8dd6e4d9ff36d14ecf,2024-04-10T13:24:00.070000 +CVE-2024-0873,0,1,ae04380d23748d0f0a688c94a994d5ec2180cdc927be703e44a79b3aa33c7fb2,2024-04-10T13:24:00.070000 CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000 CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000 CVE-2024-0881,0,0,f5a1e6e9b750ec678efb854ce078d7ad08217191215f6280dc39f8ef88d758b6,2024-04-12T12:44:04.930000 @@ -238898,7 +238898,7 @@ CVE-2024-0895,0,0,6a76c7f2f120789a65253031d7521e1f62411bd227b5e6c7a4bb7791428925 CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95acb,2024-03-13T18:16:18.563000 CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000 CVE-2024-0898,0,0,8e1a15f2adb6e1251c3b5c487bb49c70d962e45988b99a32b53b9adb0687df3d,2024-03-13T18:16:18.563000 -CVE-2024-0899,0,0,69381743e0941bd3af0bcde61cd8e69f52ebab9329b49bf254097f80a1b86c2b,2024-04-10T13:24:00.070000 +CVE-2024-0899,0,1,7d5a1ea0e11c81ea4fdf5cc7256f52b0decb0abb96aea80029ec1a81b2559961,2024-04-10T13:24:00.070000 CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d580a,2024-03-26T12:55:05.010000 CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000 CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc5d,2024-03-12T12:40:13.500000 @@ -238937,7 +238937,7 @@ CVE-2024-0945,0,0,acfa867aef6de5f90cd37defae67cb9b2e19e7990c01567c09ada00086ade7 CVE-2024-0946,0,0,283089fb3fdca4da451ffc3499cb9fbed55c67e9f31132e716a01132ba7c4775,2024-04-11T01:24:14.490000 CVE-2024-0948,0,0,7028140d4db5f4314f31d3e66c236731f86b5efea9303a5b4263145c4abb616e,2024-04-11T01:24:14.583000 CVE-2024-0951,0,0,943e60a265ecc53992d941a81b6f313c111cfeda921581030b0003b8c39af369,2024-03-18T19:40:00.173000 -CVE-2024-0952,0,0,0d4d536b5d21e4db354be7a67a7fe9dce5dd1311e4230c6a50b33973e385acd0,2024-04-10T13:24:00.070000 +CVE-2024-0952,0,1,6f32644ab0ef2315b1a9443b0a1a75ad72efcd18f9832ac32457ec11d58a6f70,2024-04-10T13:24:00.070000 CVE-2024-0953,0,0,56fda260ffe976a7ef0af83f343a5276bf8287ea78e25bf62da55b0bd2fa66b4,2024-02-09T16:38:45.380000 CVE-2024-0954,0,0,92d487f8352d875ad7c9643d44b7db6d2cc982c57e78aa26aa47eabfd56c0e18,2024-02-13T19:44:56.887000 CVE-2024-0955,0,0,cfbac7d3febc68cf4fd877d8d46446e6f6653d1e6237b8fd255083aebefa3781,2024-02-14T18:15:04.450000 @@ -239019,8 +239019,8 @@ CVE-2024-1037,0,0,56c2bf173cbe35f7be1fd85a7f9349da5a53d5f062ad199ec4c7889ed66fa3 CVE-2024-1038,0,0,a59e051c66982ec01554553e4f88009ef81e4cb49d3bbb0d8afb2d814599a350,2024-03-13T18:16:18.563000 CVE-2024-1039,0,0,fcf0861bef489b5eff5c054a39bb477e60662674e08063be1298e11081d962dd,2024-02-07T14:09:47.017000 CVE-2024-1040,0,0,4a229b12b9bec4f157eabcd482ba70b3993780f28c426bbbec4dc92dbb534a56,2024-02-07T17:11:40.623000 -CVE-2024-1041,0,0,8a3e3936c4272f54b4625e5985ca8036be0d2a78ead65a2ac888eab6132483a8,2024-04-10T13:23:38.787000 -CVE-2024-1042,0,0,5241ecb5105ad8cb582b7ce6f7c1abca4779ad5783c99cf85432c56b33b3b6c8,2024-04-10T13:23:38.787000 +CVE-2024-1041,0,1,d464f784954da4fe874569498742a85518af088890dbf76d6339602a56393b45,2024-04-10T13:23:38.787000 +CVE-2024-1042,0,1,92c6c57127a5553986201d8fa20a00077eb1c5b4ad55ce37b24237ac34883988,2024-04-10T13:23:38.787000 CVE-2024-1043,0,0,b25ebe81211528c764a166d703b4d746eaf91f405ce1938d3f2e7d17971a1c4b,2024-02-29T13:49:29.390000 CVE-2024-1044,0,0,6f7b0e82deadcfa67f18486b93a7911031cae5b34d2ea63a1991d5191d89e6fc,2024-02-29T13:49:29.390000 CVE-2024-1046,0,0,04593d809e4dc181ec893504bde5771d15890d7d13ac640142c747dade4cf5a5,2024-02-13T19:44:34.880000 @@ -239217,7 +239217,7 @@ CVE-2024-1283,0,0,95516cccfd3330b62eba366e128fd4e30c7541dad3dfc25f8801e64cf1671d CVE-2024-1284,0,0,a542ed7ad2fc69d5fc164ea1e42af4493449dbb177723d14d8b566e116471710,2024-02-14T18:19:17.177000 CVE-2024-1285,0,0,a8d06021bbbc067e01fc0fb972479a24043fbf71636156ee5faa6d7cb6a0d157,2024-03-05T13:41:01.900000 CVE-2024-1288,0,0,b2fb26eabaee4b1e084af1c3f59636d52924d41dd7ccd2b4bc0724034e1cf5e4,2024-02-29T13:49:29.390000 -CVE-2024-1289,0,0,bd6bbcf37fa2c40db7e2af44df6f96497d0c4940b866806d7a47edb23a784fe8,2024-04-10T13:24:00.070000 +CVE-2024-1289,0,1,8e197948ffeaae9c6a1da989579c61a2fb620cd8b14d44e81d11760d9479a982,2024-04-10T13:24:00.070000 CVE-2024-1290,0,0,baece1538df8c22d28fd0bd05c4e563303d939ac74c0bd56e489e067e52ccdf9,2024-03-12T12:40:13.500000 CVE-2024-1291,0,0,fe166acb5d95f395c2c2fc690290a718609fcb00811b1e4c9c8ca50b4e3f8de7,2024-03-13T18:16:18.563000 CVE-2024-1292,0,0,907fd2224f3cc98f6ddba430073b9fe125cb0f29dd99769274d8a3062533485a,2024-04-08T18:48:40.217000 @@ -239231,12 +239231,12 @@ CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e28 CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000 CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000 CVE-2024-1304,0,0,279cd487b9476fd1f6c48e9b147ffdce9f2fbae718f78edd3d048c2b1852071a,2024-03-12T17:46:17.273000 -CVE-2024-1308,0,0,f8167d4ecf3e4397894cb11b1a9eb2bfdc173e0433ac649d323949cffdf7c040,2024-04-10T13:24:00.070000 +CVE-2024-1308,0,1,779e92eb8f86f1576242d727b2f521b27075ae2e12c38fe16d52227bf6d49040,2024-04-10T13:24:00.070000 CVE-2024-1309,0,0,37b1e0c9fe9df0fc7a03a06970b38a07b0edfe094c103b528d7941f417bdf8c0,2024-03-19T21:15:07.570000 CVE-2024-1311,0,0,20a61f35b7a8de98663666fd1f61d0df3e6b038130c47bc649450e0122352cca,2024-03-13T18:16:18.563000 CVE-2024-1312,0,0,663659c34940a4e82708fc60c7161257042c7f9bd582badd425cca624f8b6adc,2024-02-15T05:03:16.077000 CVE-2024-1313,0,0,562c47fdec7fbd9a287ee9674f4979954fc2879accd4243718cbbaae423f1211,2024-03-27T12:29:41.530000 -CVE-2024-1315,0,0,a9f1c17f34fda71261f7b616e00c58a11f9d30d9d7dee8ed98a3385a04d57995,2024-04-10T13:24:00.070000 +CVE-2024-1315,0,1,d9883d9fdc5f0fab9153839f951bf15edb44c0c3f41ccf69e2e360f4fa3fd5cc,2024-04-10T13:24:00.070000 CVE-2024-1316,0,0,dae955296327b353aa27d8bc1af469f8d6e2fc99bafb9912a8a91f853637db34,2024-03-05T13:41:01.900000 CVE-2024-1317,0,0,ba972057a3142a6b0f5f7821f2d6d05a0e2c1df8c0f90d05faf0bfe23df772b2,2024-02-29T13:49:29.390000 CVE-2024-1318,0,0,313c18c8ad43ea5396fa9c419a431e323021257098ec3c837498ea7ee85f1f8d,2024-02-29T13:49:29.390000 @@ -239267,7 +239267,7 @@ CVE-2024-1345,0,0,edc14e21821ef700ebe0363d9d625110658b2ac84664f2109ac9f28db37f2b CVE-2024-1346,0,0,f9b1cf937db0cca6baf401ddf2b76ede34aff7f78d164647460f90ba78591111,2024-02-20T19:50:53.960000 CVE-2024-1349,0,0,b279200dbd0caf4e8952d9c37c4c16e81897b7eb26d17adae101e27da89cab26,2024-02-29T13:49:29.390000 CVE-2024-1351,0,0,ccfc6382e78432a14bc2d9bf0a36d4e4d8658043dc7dae2de5101e9686831717,2024-03-08T14:02:57.420000 -CVE-2024-1352,0,0,00b65d29d9ad5b552c703b5aa1eea916728ac3527e320e0fc29989d7a3196a7d,2024-04-10T13:24:00.070000 +CVE-2024-1352,0,1,e0b6a716f2e5b0725527c1a8037ed8995ec00af00fdbeed9d4a1021a159725c7,2024-04-10T13:24:00.070000 CVE-2024-1353,0,0,7dc4bcc56a6ab6ae775b6111486ce2b2e99fc200a3863d36a2e31e24dc0d9db9,2024-04-11T01:24:25.947000 CVE-2024-1354,0,0,7e9a958865e30c89765260c45d4ae133e4c586a23883dff6b33b804192a001d2,2024-03-05T20:22:24.573000 CVE-2024-1355,0,0,dd36a54ac939524c987827d5cb09797409e1063b770f9d9a2dc86b1a7287f5d9,2024-03-05T20:22:38.100000 @@ -239296,7 +239296,7 @@ CVE-2024-1381,0,0,d91e8a30b8be52d3f20fae315772163054b248740b5446a92a5d7400055357 CVE-2024-1382,0,0,2a91cda82e6eccbb12479004f1cab52cf9c7a68d5341c41e9ea2a1161aafd11d,2024-03-07T13:52:27.110000 CVE-2024-1383,0,0,9b7f3b63a5060d2ec2114b4c1750cf327ef7ed2270b46ed8e25ed7e6ce34b642,2024-03-13T18:15:58.530000 CVE-2024-1385,0,0,dbce5441133505850ee71cf9552da15ebefa84ee6a5209ddf04a55419d91235c,2024-04-08T18:49:25.863000 -CVE-2024-1387,0,0,b31dc31da09d2e6af4acc0cb254a99508b8de774e1d29ccac41e8e4ae0218cde,2024-04-10T13:24:00.070000 +CVE-2024-1387,0,1,eb9376c41128d18557ee1a29155168e72d91b5083060eaf8f5bfc39338b2fa7f,2024-04-10T13:24:00.070000 CVE-2024-1388,0,0,a64ad787329a1a90b9d619f8ebf265bcdd5478117890b0948e19434b66711749,2024-02-28T14:06:45.783000 CVE-2024-1389,0,0,226d878edb33aaeccb843dfb02fa51c12df5fa099ed0c545a3e0cbe9644a211e,2024-02-29T13:49:29.390000 CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60ea,2024-02-29T13:49:29.390000 @@ -239317,7 +239317,7 @@ CVE-2024-1408,0,0,459282e673d0895d08ca66f1f5c00497d34216acebf7f722a72b076c4d3b2a CVE-2024-1409,0,0,d0e45009fed6fac81d0d180ff2fcd57cf5cd35a7a048fa6351f7a4a4461a1319,2024-03-13T18:15:58.530000 CVE-2024-1410,0,0,535308bfcb5b14b9cf6546577fa611ecf7473e04ab146e149a1b5e72425241fd,2024-03-13T12:33:51.697000 CVE-2024-1411,0,0,155d980c645848a0fa2746dd2fa4140b3d2b5b8cd5e82a2761118e461d98b145,2024-02-29T13:49:29.390000 -CVE-2024-1412,0,0,e9c6d908379a7d916a20781a95c4f4828fcdce135b5cd14ed2811c8be9d1097e,2024-04-10T13:24:00.070000 +CVE-2024-1412,0,1,b2ab5c85612971c6bb1eb64609f318c48cfc202324c4b9956a6f7ab3d3e6712b,2024-04-10T13:24:00.070000 CVE-2024-1413,0,0,af2cf6651f1cdd9ff20e27e884b529ceac85b387ba67abac2a26a08e26cf3f68,2024-03-13T18:15:58.530000 CVE-2024-1414,0,0,8f138da96eafd299d81e9063e920ea7e6e3c79c8674ee2d0cf04b624b232e13b,2024-03-13T18:15:58.530000 CVE-2024-1418,0,0,0c2bd655c73d8cca0739c64cccc1864f3dc8cacdea241f8d71e81333af8966f7,2024-04-04T12:48:41.700000 @@ -239326,7 +239326,7 @@ CVE-2024-1420,0,0,63be6135cf11500708980f0eb6e023d1c00fd2eeb1aa055b1a9dd099f6d1d3 CVE-2024-1421,0,0,f03d7f3ef1765f0f145e59552c7f2e0551f5780bf62fafd3ac0b92ab1fea1897,2024-03-13T12:33:51.697000 CVE-2024-1422,0,0,2267ebdeae44f32d1c6ec66b03449193e62b83e6330bcf0a397e6b29ad3e9c4e,2024-03-13T18:15:58.530000 CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe785,2024-02-27T15:15:07.460000 -CVE-2024-1424,0,0,a43dd1d4afa68fc3cd4bf6e9f58ee05d4d8114d8a9d8615bb1baacc57afc52cd,2024-04-10T13:24:00.070000 +CVE-2024-1424,0,1,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000 CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000 CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000 CVE-2024-1430,0,0,f6cfc2470f7007eaad290d0fa038b4243c074335d7e370b06a50f17dadfffcc6,2024-04-11T01:24:26.960000 @@ -239352,15 +239352,15 @@ CVE-2024-1452,0,0,51f181c1ce7f414dcbc42b69c76b53c13d660e1251c29566016e6272acef67 CVE-2024-1453,0,0,f2c87bd71819898e18766c6a4daf73ab310fc7d532ef66c70b02c381b9ef54a2,2024-03-01T22:22:25.913000 CVE-2024-1454,0,0,cc63bfc078899c3bc2d22b3e00f458fc4bbbae1bbb587edc98f331b0cecc8681,2024-03-23T03:15:10.633000 CVE-2024-1455,0,0,e991b0f975ced8cb78d5000d363daf3daaec18408e94acd68eacb2c7bf82f408,2024-03-26T17:09:53.043000 -CVE-2024-1458,0,0,775b1a885504dd2584c23ecc24bb29e2f852d5cf532bcebbdaf63d4b3ec93910,2024-04-10T13:24:00.070000 +CVE-2024-1458,0,1,66bdbc91195a55d9296ac1ceb5474c75aed0d73b189c6e7e68fdb9d572621be2,2024-04-10T13:24:00.070000 CVE-2024-1459,0,0,11d2cc6cb4f85209b5f6836b3ad08354090d0f8d1b51c2b33235c6338b29d8d2,2024-02-27T16:55:31.430000 CVE-2024-1460,0,0,72a696faff0084769a753b7a612492bd21b36a83db7299f8f95b0e781bb3b173,2024-03-07T13:52:27.110000 -CVE-2024-1461,0,0,83598010799d45fd5985122381de65ed7b2357a8cb1a014551da773eeb01153c,2024-04-10T13:24:00.070000 +CVE-2024-1461,0,1,1f89e81afdad5c99001f0e5b265207e4cfad29933cb5f22b6b1abf09579e2522,2024-04-10T13:24:00.070000 CVE-2024-1462,0,0,f3ee140db9c61db8a6c7f5353abc1c410537cb76557d1e48dcbdbb2e89f421db,2024-03-13T18:15:58.530000 -CVE-2024-1463,0,0,0c39cb2799e9b63983a497ad155449bf14de5f0071a75ea23d21e1fb1a8127dd,2024-04-10T13:24:00.070000 -CVE-2024-1464,0,0,51d2331524413f91f0029a3e20e79df7ca4445486bde58dec293a98b8645d047,2024-04-10T13:24:00.070000 -CVE-2024-1465,0,0,492471ecaa00b2e08c65faf36a9d885b521631747388fbe6bbb62013bc07683c,2024-04-10T13:24:00.070000 -CVE-2024-1466,0,0,1052cbea223656934b591f78ff5be0bf71c01e570a4a279d0869f36005f683c0,2024-04-10T13:24:00.070000 +CVE-2024-1463,0,1,7f5adb54d73370c5165e23d07bce9e05965e647532b3d1d5246ee80540d6061a,2024-04-10T13:24:00.070000 +CVE-2024-1464,0,1,66cdcaa0d5747e1df8ce6bf443c5449ae128872e2b15d4f36d16657c0d3dd814,2024-04-10T13:24:00.070000 +CVE-2024-1465,0,1,50640d1b9b662f6b9595f667c6dea5a3109040974a7a6904d50f64c468dbca77,2024-04-10T13:24:00.070000 +CVE-2024-1466,0,1,5d578968ae7705cd3a7f52ecf71135f312a30236a60a176e5837a6a9be923e7c,2024-04-10T13:24:00.070000 CVE-2024-1468,0,0,4517d5dd5472fccb03db943dd2b07b64e505f3a6f8deb2585efb6085b2bb0ecf,2024-02-29T13:49:29.390000 CVE-2024-1470,0,0,a319bf52254e8a113f9bd2ad26de6ffc3c195db928a3c5fc6503676eeb57300e,2024-02-29T13:49:29.390000 CVE-2024-1471,0,0,10089aa571f1fe9be8fa521af5eb8689bcde31feb298e1e8773050de96f09f74,2024-02-15T06:23:39.303000 @@ -239372,7 +239372,7 @@ CVE-2024-1476,0,0,d66db5b934d457173411a6e7c87c116f96f98ca76565b282c78606f1c9c844 CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd63,2024-03-20T13:00:16.367000 CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000 CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000 -CVE-2024-1481,0,0,a8cbfc73046fae6257e660b57faee3d8a5b984c76f3fe14b3100746497a22dd1,2024-04-11T12:47:44.137000 +CVE-2024-1481,0,1,9be0fdcf57b38b07a109c4217cf66bb00129c047018ee84a1da402a4636338fe,2024-04-11T12:47:44.137000 CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000 CVE-2024-1484,0,0,2816ffb064ebf87ebca44e6afd6928df4e130e61997f3bc50802157887bafe8f,2024-03-13T18:15:58.530000 CVE-2024-1485,0,0,b9f4145834ee9d538c2d6e8caecb301f8f2dde5a282a13e80f59671c5263bb0b,2024-02-22T01:15:07.980000 @@ -239382,7 +239382,7 @@ CVE-2024-1489,0,0,601abc5a034fbcf389e475f712bdb62e609e01342eb7a5cc6cdf4f20f6ce01 CVE-2024-1492,0,0,ac491e1ac05085ffca5a01bc169673ef656902c869bec5c48f97ccc7785388e6,2024-02-29T13:49:29.390000 CVE-2024-1496,0,0,cb4e1e2b66486c1532bf5fd9642c761fbe286057f303a98e25c71b95ed8fd1ee,2024-02-29T13:49:29.390000 CVE-2024-1497,0,0,84c0cad6cfa5eb0a51311cf784383979e7b18f97e3410e261be2597241b19a2b,2024-03-13T18:15:58.530000 -CVE-2024-1498,0,0,40481094594825136dfcdc4a28838dcddb10201d9f5ace4a1d79816e711f69cc,2024-04-10T13:24:00.070000 +CVE-2024-1498,0,1,dbfa90e748374cdff6d50ea0e523503c56f859a0246f6ee6330cf24c8e6bbccf,2024-04-10T13:24:00.070000 CVE-2024-1499,0,0,91ca0fb4c1bb1a7f62ccb6528d85aa9ea53650637bf02e5061f1039652f03a64,2024-03-13T18:15:58.530000 CVE-2024-1500,0,0,694c5b055ade5990dcda28494b58d57c2094a15be5f713df4a9d8676c9d55c87,2024-03-07T13:52:27.110000 CVE-2024-1501,0,0,03a0e69bbed943f6752c31b93edc06b4f9628316bedb06b12c13732297836920,2024-02-22T19:07:37.840000 @@ -239438,12 +239438,12 @@ CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd CVE-2024-1566,0,0,bcb44d286e02234542f3c248bc98cc24bc3480b83f57b1e48ca76a36f687c2d5,2024-02-28T14:06:45.783000 CVE-2024-1568,0,0,7ab3f38998f0710d2dd36692efaa4d3f1b1bcb35035794e68e81071a3e18c01a,2024-02-28T14:06:45.783000 CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000 -CVE-2024-1571,0,0,5ab83e1f1534c951946b1217d18172ff4f1f811a6dd485f5d94add105f6e07a7,2024-04-10T13:24:00.070000 +CVE-2024-1571,0,1,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000 CVE-2024-1580,0,0,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000 CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000 CVE-2024-1585,0,0,28463bd155a05d2316353e6514b9a508a20ac865f3758bba518e17e798be46b0,2024-03-13T18:15:58.530000 CVE-2024-1586,0,0,5d29863fd70aac8e717d245accca9ae08ad8b931c761848e1bfdc8f128a7bab7,2024-02-29T13:49:29.390000 -CVE-2024-1587,0,0,b144cd3d551cce72e6ff9d1e42e09cf754f8f213e011569b4e5ceab72808d9ff,2024-04-10T13:24:00.070000 +CVE-2024-1587,0,1,a3dc5407167c30397d414cc23308471c6083e1769d91e5ed3be517c852a315f9,2024-04-10T13:24:00.070000 CVE-2024-1588,0,0,acc3db8a37f506fb5ec73c38a871aff7599ded752431db201ee11b58efc0cc71,2024-04-08T18:48:40.217000 CVE-2024-1589,0,0,d7dcf36ad68703d9507d75fc584fbb1d9ba1bfd4c920be78263720d8b4274d1a,2024-04-08T18:48:40.217000 CVE-2024-1590,0,0,8cf7a30592711c236a58c08f65bffca938f2cb5ec79513db7f6cedfa37d0bfed,2024-02-23T16:14:43.447000 @@ -239470,10 +239470,10 @@ CVE-2024-1632,0,0,6e1c47780d96ad6fcb59ec0ca790b51a445b7ba6bfe735fc687e801fa4e9fa CVE-2024-1633,0,0,38fdaaa081cb72684e8a3a7c24003a4981094738f4cb62580982692842e12368,2024-02-20T19:50:53.960000 CVE-2024-1635,0,0,e1588f2cd247e15e68626e1a5acb1d2b5be9c85501293daf78f9466841e901e5,2024-04-04T18:15:09.393000 CVE-2024-1636,0,0,110561fc2d8220a09cd098605d5d9c82332c44e2266859d6f751e2ed66576fc3,2024-02-28T14:06:45.783000 -CVE-2024-1637,0,0,f14cfea07e01805fc3cc7f9b7ca65078bdc6784ef2be1379c102894de11b3af1,2024-04-10T13:24:00.070000 +CVE-2024-1637,0,1,ad9b5ab8aa7d33952d11bf9f2ca328427186899a35864ba9221fa2bbd849dc16,2024-04-10T13:24:00.070000 CVE-2024-1638,0,0,3d25792f560ad8670a55d542406f093195536acafd656ae4b3cd5fcca03c7380,2024-02-20T19:50:53.960000 CVE-2024-1640,0,0,3de113a5a2a8fc8c6ec04f102502cb7635248dd1f83ad2ae4c7d82063b072cd9,2024-03-13T18:15:58.530000 -CVE-2024-1641,0,0,6a296e5c3b46e563bb680f862a5d819bb1ac5cd1c65594075bb36488207d9350,2024-04-10T13:23:38.787000 +CVE-2024-1641,0,1,db95c0008c57ce95ca85cf094dbdeb4d82a2a2bfa518dd1f84fc93bf6e7265ca,2024-04-10T13:23:38.787000 CVE-2024-1642,0,0,b56fc714c74323ffc8268da7a782967b97e8e6de1f7a55688041114caad8282d,2024-03-13T18:15:58.530000 CVE-2024-1643,0,0,e3df219e8eb9506e92b2b6e4de208b2b263ce33723b442fcd24ff658bbde2969,2024-04-10T19:49:51.183000 CVE-2024-1644,0,0,258e0c2c60e2ead118c6bf409e3c4e6182303d86b8fb67135f0b03753d76fde4,2024-02-20T19:50:53.960000 @@ -239558,13 +239558,13 @@ CVE-2024-1770,0,0,333904774d9a4f3dfdb80debed66f75e1822143539d08bcc59c6ad7076c3f6 CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000 CVE-2024-1772,0,0,f463c6e0ffedf6e7f9eeffbe41cb0b2bd4f1ee4e50feda73e1765eef17f6d45e,2024-03-13T18:15:58.530000 CVE-2024-1773,0,0,eea85e1a4bb87da89a486d39c94ff7ae4042032c41aee54c0645824074a798c9,2024-03-08T14:02:57.420000 -CVE-2024-1774,0,0,d2bcbc2b08e1aeccc33d1be91b29cb87c7b86d1956f9486340f5f233305e8632,2024-04-10T13:23:38.787000 +CVE-2024-1774,0,1,d0a6f0de15559c98147699c73af73058926266aa6e2f8db9e2bc925420e04a11,2024-04-10T13:23:38.787000 CVE-2024-1775,0,0,9251ce0ce013940fdcea6a8508a8734ab927a5b12c391ade9b3bd8a41359a4bb,2024-03-04T13:58:23.447000 CVE-2024-1776,0,0,ee26f83e9648ef58987c10f04b2fa62032ea09f35a95017a417d0154ef32ff6a,2024-02-23T16:14:43.447000 CVE-2024-1777,0,0,7f3883d534a120a8cff87968a21540ef16d832f58919191f780b9fec702065b9,2024-02-23T16:14:43.447000 CVE-2024-1778,0,0,bb32c9c8623efdc375722a5eaacff37e306cef2d2b6050df151c28e0294862e8,2024-02-23T16:14:43.447000 CVE-2024-1779,0,0,52402e90395b428f6856dc24f97ef7b7f0a3561b9cb72d6d638dbd8e15b0aa01,2024-02-23T16:14:43.447000 -CVE-2024-1780,0,0,6b673d312cf82e1d50fe5df78cae5d8f10aa0c500dc02e45a5740fb109e03a0f,2024-04-10T13:23:38.787000 +CVE-2024-1780,0,1,42a6443b08a2870f404e36a2e3a993f8774c3d5e0c4a4b27e863abc175d7cec5,2024-04-10T13:23:38.787000 CVE-2024-1781,0,0,35e64b1769fc93ca5a66e6da64fb95f7c5b415d1da3903528152fc56bc184c15,2024-04-11T01:24:30.440000 CVE-2024-1782,0,0,7bb794c803b8c97c3d3467d00bb1bf320376c37316ca729a379344fb33124f68,2024-03-05T13:41:01.900000 CVE-2024-1783,0,0,4d74c2ac198f4fbefa8d34d22be084fc38dfac41ecfad44d46b170de9d7e8043,2024-04-11T01:24:30.530000 @@ -239573,11 +239573,11 @@ CVE-2024-1785,0,0,876f54e758144e65bdb2dbfed145663c2de508f0271124e6075f587cf87035 CVE-2024-1786,0,0,8d272bb934edd6ba22bea71862b8c1a4f9dd955b8b61c076d6b42c937a212ef5,2024-04-11T01:24:30.693000 CVE-2024-1787,0,0,4146a54c8ed6fe4a4bd4ac127005b4c82b6cbf8a65b06534af23146a4cc88e7f,2024-03-20T13:00:16.367000 CVE-2024-1788,0,0,880181e49a800669246c4d4cd32ccd361560cda70996b821fd2bf7b522fa9d8b,2024-03-04T13:15:44.523000 -CVE-2024-1790,0,0,21c0ca36a5ae13a32a17723ca29bd8b5bf5d89bbbda66dc4245b499299ab9f8b,2024-04-10T13:23:38.787000 +CVE-2024-1790,0,1,b8412da1a4c3f521dd650e697e4a3d85fe859c9cf5470ebe731f0a2e75023a71,2024-04-10T13:23:38.787000 CVE-2024-1791,0,0,94b807664cc318fbe90aaeaea162bfe11604582cb7b653dcbd8bff403308918c,2024-02-28T14:06:45.783000 -CVE-2024-1792,0,0,d511357db31769ba8ba1848d597c59bdf83c08ffb383f0e685469c0319061a20,2024-04-10T13:23:38.787000 +CVE-2024-1792,0,1,a70c1954f887a10d02e564a2dd7108def38a57268e885b26020a4a15e640cbe4,2024-04-10T13:23:38.787000 CVE-2024-1793,0,0,3494301efa02a0e20ca0de86bcda1ef047bce42ec552921c17fcf5aaec5cd3e4,2024-03-13T18:15:58.530000 -CVE-2024-1794,0,0,4477d7d100a896a0661e2521d0c0980354133df9fb3c727ece6e646795724edd,2024-04-10T13:23:38.787000 +CVE-2024-1794,0,1,46e5b4fec9ec33eb5dc913c1127981257660c77147c0ce41b532ba6f093a2620,2024-04-10T13:23:38.787000 CVE-2024-1795,0,0,1b752a891bb13a47f72347c8c8e56ca42639e487517ff34113185bc389e14cdf,2024-03-15T12:53:06.423000 CVE-2024-1796,0,0,0d45ca23d706070722a6c263b0a043ee8c6eb3040c72430b32f91625f999eb26,2024-03-15T12:53:06.423000 CVE-2024-1799,0,0,8e4f46043a693e1e65b9dd005f67530feacae41bd91f1e68379061e4054a79b9,2024-03-20T13:00:16.367000 @@ -239589,8 +239589,8 @@ CVE-2024-1807,0,0,6dbeb428bdd4e7924085fe13367a9dffd6fd78079f134662060a2ca2ad9fe3 CVE-2024-1808,0,0,2da113a6f87d1b28b926abe8dc4a1c1454247327ae44f0a848973179ceb1addc,2024-02-28T14:06:45.783000 CVE-2024-1810,0,0,87b76a0adcc5367a72905293694c8fa51dacb1a6251047990874cf512fe46e78,2024-02-26T13:42:22.567000 CVE-2024-1811,0,0,3613fe77a2980e4b6b465cfeec45d621e33c15641e99d2d50d666aa59062a374,2024-03-20T17:18:26.603000 -CVE-2024-1812,0,0,fbc26aba8a4ecf9d69680ddc302bd35f138fce0a3c20f1ff289c63c02babca12,2024-04-10T13:23:38.787000 -CVE-2024-1813,0,0,7e7f30d296495c43bfc1d040a35c69a96da78f02aef1630009b91f1d0c574249,2024-04-10T13:23:38.787000 +CVE-2024-1812,0,1,1a6f9eeab96c73268af7052134c8cf1c44932ad69fbc301edf8d35b130e7f416,2024-04-10T13:23:38.787000 +CVE-2024-1813,0,1,7221461b551b49805924c88f7a02ee625bae550432e647062e4543b6083025c7,2024-04-10T13:23:38.787000 CVE-2024-1817,0,0,a33cdbf9cbc3b0ad2476b6a62accb5a7d217191a415b9109324ba29e7070fef6,2024-04-11T01:24:30.973000 CVE-2024-1818,0,0,6e1a220f05608ea0e424a71187726a6fffe8c42476486dd9d107ae6ec46c1954,2024-04-11T01:24:31.050000 CVE-2024-1819,0,0,10622d5190734ca1aa04d08c9a7621fbbbf292fce31f2ad5dac4306b91142a57,2024-04-11T01:24:31.130000 @@ -239613,9 +239613,9 @@ CVE-2024-1843,0,0,381f1dba7504e2dd4844c9284f47a0574c276b6a0dafd5dcab8a395be3a465 CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b5116,2024-03-20T13:00:16.367000 CVE-2024-1847,0,0,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000 -CVE-2024-1850,0,0,0125729df4810600372717822d3c43eb2fd5bc47c2c712579bb28439e190d0ef,2024-04-10T13:23:38.787000 +CVE-2024-1850,0,1,619cf2eb46834aecbb5c680ea41679eadc7e54936ecf9bc9140e736a3bd02f40,2024-04-10T13:23:38.787000 CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000 -CVE-2024-1852,0,0,f2f5858a45b00d06692502a6379526bb5538d0a8ad666a8eba1841e8676a7c7c,2024-04-10T13:23:38.787000 +CVE-2024-1852,0,1,9f92825b65e6bb9369c1037dcd50c43b1f7e5526ff6359d4256ca25ce4ba1079,2024-04-10T13:23:38.787000 CVE-2024-1853,0,0,88e46cdee904df65be156cae6d046ba1f9b383351c4ae2ffb721120e1de469e2,2024-03-15T12:53:06.423000 CVE-2024-1854,0,0,3a967413553da784783a186d6f1f68031ea1075d4f2cd23254325d37dfc46570,2024-03-13T18:15:58.530000 CVE-2024-1856,0,0,48e25a0a51ff59c36d550bf65bc3fc4ba5a1076a897470898ae662b3caa65413,2024-03-20T17:18:26.603000 @@ -239647,14 +239647,14 @@ CVE-2024-1888,0,0,5c48c7ef8072bebc640799142c34dfeb37124cccb7d60f3f8c8d95bce0e2f8 CVE-2024-1889,0,0,266d2715fa1a608706d6d5ec1f8a7bfcae214ce874200158676325862e799b25,2024-04-11T01:24:33.167000 CVE-2024-1890,0,0,d821e28303657343be278f464dff038e934f4ce7013e324636dd2062e1ff0b5d,2024-04-11T01:24:33.240000 CVE-2024-1892,0,0,373f803d6e2c349da77bd96fbf4e63bc235b5171a737a3452c0ca1b5e8e1db5d,2024-02-28T14:06:45.783000 -CVE-2024-1893,0,0,0ba16f9b29b991769077d3e3157bbe1097f88fd0897b3f9248a360d0b27e3477,2024-04-10T13:23:38.787000 +CVE-2024-1893,0,1,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000 CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000 CVE-2024-1898,0,0,cd46da23aa9e689b946891d810a24293bd08f970fb7bfbbf6f19e3a7303f1ecd,2024-03-06T15:18:08.093000 CVE-2024-1899,0,0,0cc7828b184cee934c2917326a122f6c3f70483a306517df38cc4ef91b9244cb,2024-02-26T22:10:40.463000 CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a71,2024-03-06T15:18:08.093000 CVE-2024-1901,0,0,e852d825cede13009c4c827235fab136069de3983ba4df012d62632a4fcd1d38,2024-03-06T15:18:08.093000 CVE-2024-1902,0,0,5171da92b1abd552ffa4eb9e46deba06c3c70f873c054d3e0ef47494429820b3,2024-04-10T19:49:51.183000 -CVE-2024-1904,0,0,55eb8512d2966e4554529d5aa10bb91bfa6ece02d0437b6388263934abcecacb,2024-04-10T13:23:38.787000 +CVE-2024-1904,0,1,894e214d09f8efe1b9b69452204531788406056d1489422306bbd393d57cb47d,2024-04-10T13:23:38.787000 CVE-2024-1906,0,0,4a0389164694374915846934d3ecd021a9b146d80ff266286dcad5a6eeb2c849,2024-02-27T14:19:41.650000 CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432ec5,2024-02-27T14:19:41.650000 CVE-2024-1908,0,0,92bf17210112d2d60d7d442f37608315d845944e26306753d826ae8aa1a4dd43,2024-03-21T12:58:51.093000 @@ -239678,7 +239678,7 @@ CVE-2024-1928,0,0,ce94ec63205e6aa85b5a559496f823814c1cb4c8bba251a028dd87a071a77e CVE-2024-1931,0,0,9addd176c290e22e67edc560a4bf57dff4e662c3f91f11bddbbfbe493f9f8b5b,2024-03-07T13:52:27.110000 CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000 CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000 -CVE-2024-1934,0,0,cfbe9ccb16a9db0898128c688f503291920d9283cdb6e01bc83d9fd3717ea68a,2024-04-10T13:23:38.787000 +CVE-2024-1934,0,1,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000 CVE-2024-1935,0,0,a7f7eb7b74a22681adc4071f1d8733546534bbce79c7b6b4b422bbf2e641050e,2024-03-13T18:15:58.530000 CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000 CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000 @@ -239687,7 +239687,7 @@ CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab8 CVE-2024-1942,0,0,980efc55f5eab41cf2c4f30738d9bba260cb2905950fe4e94d5f18fcbaafef3e,2024-02-29T13:49:29.390000 CVE-2024-1943,0,0,12241ffd50e07c2810c1836c3e8f27c317becac2e0f94ec708a8bb306904594f,2024-02-28T14:06:45.783000 CVE-2024-1946,0,0,af7e2ec42a5afab60b9a3763ea55ebf1fcd65e75a30c1e439a4143c057a7746a,2024-04-02T12:50:42.233000 -CVE-2024-1948,0,0,c7f93f65fba0144c7c736d5c290a67e935396176de0543517c2c36495e890726,2024-04-10T13:23:38.787000 +CVE-2024-1948,0,1,3b9dd0af22ded16434e2e74af00411bc9bda9ff6b249d0bd983122bb1f1701db,2024-04-10T13:23:38.787000 CVE-2024-1949,0,0,051a05e25046a0f112eb24d722170fc36b6bcbbf293884b0efecbc55edcf2747,2024-02-29T13:49:29.390000 CVE-2024-1950,0,0,3d0cf5e4f27a6994bfd6f2f36017782a4ee9c8e70afd4626b6fc2907681e561d,2024-03-13T18:15:58.530000 CVE-2024-1951,0,0,11a38d2f06372febfe2ad92386723f9076b01d60cd04929a8bf0a4c554bc1263,2024-03-13T18:15:58.530000 @@ -239697,14 +239697,14 @@ CVE-2024-1954,0,0,7fadc688eebc9f9d8a117615a238e699db3daf8bc72b3b9023cf31ebedfa45 CVE-2024-1956,0,0,5d6f6903c59c264faff18a7d730514ef8c8f257378e253aea7524c9395e9f82e,2024-04-08T18:48:40.217000 CVE-2024-1957,0,0,374e26fd5ef5c7f4d127290cf43f59d975dd627c1635927490965197747f47aa,2024-04-13T02:15:06.593000 CVE-2024-1958,0,0,37958071a5e3626b0202aace46631ba6fa86579be41bc6a7a46ba3505e19759c,2024-04-08T18:48:40.217000 -CVE-2024-1960,0,0,c86a049feb90aee5a9d0b328d538593c01d3ceb4e322c67edb3077bc0b513c5d,2024-04-10T13:23:38.787000 +CVE-2024-1960,0,1,dfd1b0f1ac48f633451a81968052e172becf7727c212216325a77c712783473a,2024-04-10T13:23:38.787000 CVE-2024-1962,0,0,8c71ccd644902c0f670c27728543c4472e05aeb359cd7fb7b0615991cb743fd6,2024-03-25T13:47:14.087000 CVE-2024-1965,0,0,53b8948dc1992d8ed8a6fb1de9b8b2c61bce73181655f1de36932a04b4a837af,2024-02-28T14:06:45.783000 CVE-2024-1970,0,0,d3aea28e144f49dbf23817ed920457508211fde47410f2dc8402d51fca340e23,2024-04-11T01:24:34.623000 CVE-2024-1971,0,0,3941b1255117148389caff017cc56f445270956ee3ccbc478da194cbc8ba98d9,2024-04-11T01:24:34.700000 CVE-2024-1972,0,0,c71fb5f5db3d66affd27c6de84e37984ba71563e0476d90de04fd0cfc90397ec,2024-04-11T01:24:34.773000 CVE-2024-1973,0,0,7e572d102b77b447a07e2619921bbb7e602276924c210475f15b92aa04c8d92c,2024-03-26T12:55:05.010000 -CVE-2024-1974,0,0,9458ac5e38e8701612ef5b58feb9c7a777a14b57cc0f176d44274debebc507c4,2024-04-10T13:23:38.787000 +CVE-2024-1974,0,1,7f88ee599f5c95c87bbe5f9b0baac796fcadd8a704a82a5d68676829598ebabb,2024-04-10T13:23:38.787000 CVE-2024-1976,0,0,77ae2df323cf6637a14fb06bcb46d711f13422518ce52e9430227e1e91ad53e3,2024-02-29T13:49:29.390000 CVE-2024-1977,0,0,a7692b2da3b0113a60567ddf6634026c09e0a2eeec7666bb0cdf204455073a9e,2024-02-29T13:49:29.390000 CVE-2024-1978,0,0,3ef3e0470f639541e7aa5332764a4fdc0e9cab2190d02bdfffcc246fd4ade338,2024-02-29T13:49:29.390000 @@ -239712,20 +239712,20 @@ CVE-2024-1979,0,0,cc9dc9ac6cc8a95dd98863a7334b2cf30748679b66f27f42154ef38cb6efa3 CVE-2024-1981,0,0,56a3a9db8d42e012d762fd6941fad1981a0b2b42e5454cd6b5d1b42406dba2ca,2024-02-29T13:49:29.390000 CVE-2024-1982,0,0,ffbc05dfb227c410b4f1143a120edd4d2849f76b514d8ea46cab15f8dbe11320,2024-02-29T13:49:29.390000 CVE-2024-1983,0,0,62f30f32deb07c2fa9f5132c6c474637c4be91aae3bc6910d5cf4e52256053b9,2024-03-20T13:00:16.367000 -CVE-2024-1984,0,0,9c173c631e993fbbc230292500d1c277759643f3772df78e473cc7c253f0b163,2024-04-10T13:23:38.787000 +CVE-2024-1984,0,1,465cc0e2e1f58fc8492061094a8536c47636769a8f8e9054141eb83f9d971ffb,2024-04-10T13:23:38.787000 CVE-2024-1985,0,0,f4d22aa67ab0779a241527c882b8b9cfdde337f2865b4bc4e809350f7d4a661e,2024-03-13T18:15:58.530000 CVE-2024-1986,0,0,3573e34f135546ed04633bd0d17cea080212de55551e8ab04d2e00c52e1a5093,2024-03-08T14:02:57.420000 CVE-2024-1987,0,0,51b6353c7487197fcf85dba32dd0017998b1425a36ba707e32269bf4afb531af,2024-03-08T14:02:57.420000 CVE-2024-1989,0,0,e603d4bdfbac73448a418c09b573178507e96a797a5be54fa1a78504bbf887da,2024-03-06T15:18:08.093000 -CVE-2024-1990,0,0,3b5ca510e1cf62023646d8287da6e7f5dd5d23fbf42766303322eb2deb7134d4,2024-04-10T13:23:38.787000 -CVE-2024-1991,0,0,f75288ed711b2f3aff412705bc0ad14f138b37f5249d09703f002efa9181eed6,2024-04-10T13:23:38.787000 +CVE-2024-1990,0,1,18962fc675767ec36941dde216e2cdde20628da130363efb991b1aaf982f61a8,2024-04-10T13:23:38.787000 +CVE-2024-1991,0,1,6ed6543aa2fe028ae9875088171a10ff91252f94ba37ee2f5600210d331d8c90,2024-04-10T13:23:38.787000 CVE-2024-1992,0,0,5414f0dcecaa73989b0a42a4479c3faccff7f0923e4cfe603f1f9c3c287083d8,2024-03-20T17:15:07.307000 CVE-2024-1994,0,0,1fc6be1045c805d0a18a545eb973281471f24e830a1967106032db95f6cfe060,2024-04-08T18:49:25.863000 CVE-2024-1995,0,0,941755b4b854fdf87f18ab79194bcc08291f96cbab42350512c28358afffef58,2024-03-20T13:00:16.367000 CVE-2024-1996,0,0,5966bad552d6bc038d1a2d91bc8f9a32839c685a6932cffdc232ba52d55e3b88,2024-03-13T18:15:58.530000 CVE-2024-1997,0,0,b02f2b8fcf27f075ede3d31ab90af2f1a113a308252f819da806cdcb7ece15d4,2024-03-13T18:15:58.530000 CVE-2024-1998,0,0,a3342ccc0c3061474cbfc167041184af8112bec2c082d20ac42626a5c675b156,2024-03-14T18:15:07.003000 -CVE-2024-1999,0,0,21092a19c46f0306396dbaa5c1d32d4b7511ae33edcd8ce6b9b9f1905d091920,2024-04-10T13:23:38.787000 +CVE-2024-1999,0,1,f6af60cbfc609ce1a5481b1af111b21c76b0267bc8cc3b99baa03f46180b41d5,2024-04-10T13:23:38.787000 CVE-2024-2000,0,0,108d93fddd41a17ddd3e047596b7f6a0573ec46987e100f3d626f9ebaa3d0da8,2024-03-13T18:15:58.530000 CVE-2024-20001,0,0,efbe4e49752ddfea997ebdd6c491b74eca19a99884d44def3e33c77345370bb0,2024-02-09T02:02:13.153000 CVE-2024-20002,0,0,46b6afed42316be97368931c2d39434a4c3b4f4412ec2aa11d0d2b3e3bf7e82f,2024-02-09T02:01:37.090000 @@ -239789,7 +239789,7 @@ CVE-2024-2009,0,0,9b55342ffec10615d0b8c459ade62fe8830f5a48032854bfae3395294e52ea CVE-2024-2014,0,0,33689b6246efd8c3288e25cdb8b6b92c886b5a74886e16b7f5a239c00157221c,2024-04-11T01:25:15.667000 CVE-2024-2015,0,0,3a6ba0d5314b8ed998336596925ac69e78bb4999e5f6defc6a75c7f38655fd4e,2024-04-11T01:25:15.740000 CVE-2024-2016,0,0,d8e0bbb890994a6f7eab0de0bd6605771d2c088a7f76cb9607119165cb463ca4,2024-04-11T01:25:15.827000 -CVE-2024-2018,0,0,45b0e10ab973bcb43c1bf766992193cab3427a4d084665607b2c45f51792e017,2024-04-10T13:23:38.787000 +CVE-2024-2018,0,1,d35c240fd39d286b27481a94e4954ccbe09b47d7acc7f4c0e9843003d15978e5,2024-04-10T13:23:38.787000 CVE-2024-2020,0,0,fae0c240b0782069c1e4908f1890c1c955952a86e3799d8e37b19bbdb6902437,2024-03-13T18:15:58.530000 CVE-2024-2021,0,0,e4c0a08fcd34d8ba7da6ea75e2dbeddbc92c4b928e875c6149cf2099823a96dc,2024-04-11T01:25:15.930000 CVE-2024-2022,0,0,b27e710a10f627d856725c74755af6a5f9ec4136d0f125657996f5b1aecfdc77,2024-04-11T01:25:16.010000 @@ -239800,13 +239800,13 @@ CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fb CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000 CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000 CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000 -CVE-2024-2026,0,0,ed4dcb3e402e018514d645618c9ab32400863342a4042f7498c515962a2306af,2024-04-10T13:23:38.787000 +CVE-2024-2026,0,1,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000 CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,eee9d5be1e797577581d307b6debeb0e216dfa8c65e90aa4284e364da06d4b08,2024-02-06T19:23:20.600000 CVE-2024-20265,0,0,fbaf861e98006a5b6737fd0e8bab7fd09d0628199afba5baf3a37aa186d05d2d,2024-03-27T17:48:21.140000 CVE-2024-20266,0,0,8ef765963c597b11e674c30d3673d6a4527a34856fca46db51488c029980fb8e,2024-03-13T18:15:58.530000 CVE-2024-20267,0,0,2716a642cdad532c3a4bd75fb20d5fecd6f79884b8ec8ad4d3b70c55b604b9c9,2024-03-04T22:45:43.893000 -CVE-2024-2027,0,0,871be00683af22933b5f4ba65336ca59092a39f814ec8a3da56996336547c167,2024-04-10T13:23:38.787000 +CVE-2024-2027,0,1,6e3759a5bdb352dc5bab44c468cffa2ecd21e9f4099295f5b448368c2b785df2,2024-04-10T13:23:38.787000 CVE-2024-20270,0,0,e782cd7ba9de695c0ad1c66716422322472732a1f5415c3e41652abc7d8c0edc,2024-02-02T16:15:54.227000 CVE-2024-20271,0,0,ad8586dcafd5564f33900eedde3dbc70dfc658b63de362a0c803a1c4d38dbc5c,2024-03-27T17:48:21.140000 CVE-2024-20272,0,0,185f140724efe06396f39e49d9628053efc8d5b0f336793319946b145d008ecc,2024-02-02T16:15:54.683000 @@ -239848,7 +239848,7 @@ CVE-2024-20324,0,0,8105b558a920362954e59927ed45c499623f22f3987422dccf7aa064c5d5b CVE-2024-20325,0,0,dfe1f947bf6fc9efa452f1881c4faae47bd9e909bfa416f69baa534db16c5289,2024-02-22T19:07:27.197000 CVE-2024-20327,0,0,0b0737184be7039f4590b285733309ba156da40401e164ab950277586b5aa24a,2024-03-13T18:15:58.530000 CVE-2024-20328,0,0,13a28c8852ca273b55c1f130423e4a6ac2577a7815aa1061922f9234c0e1ab39,2024-03-01T22:22:25.913000 -CVE-2024-2033,0,0,e0d7ab5e99469a56f012c9a04d51b1756e87c1b285bb0381674d37e8f119fbd2,2024-04-10T13:23:38.787000 +CVE-2024-2033,0,1,f5fe8db5021f3e22566d05e7fe01aca13f3288ae0aa286203b57a8e2fcfb1f17,2024-04-10T13:23:38.787000 CVE-2024-20332,0,0,2eed54e8c89f572e2ac5b0877ebefdcc0fed46a4f98f65da556e819746693911,2024-04-03T17:24:18.150000 CVE-2024-20333,0,0,7d726a4e97f8f82b74369ab1e46fd2b6337f36046226cd7b31f111383907efc2,2024-03-27T17:48:21.140000 CVE-2024-20334,0,0,18b2976fe7617e9c11c78a8d90e80ba0f8467a68831ebacab61d55e403864fcd,2024-04-03T17:24:18.150000 @@ -239866,7 +239866,7 @@ CVE-2024-20354,0,0,77dad3524fb09cfda3488dd6cb6801d1cbef489cb4a9c5ad1ce0cd080b146 CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000 CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000 -CVE-2024-2039,0,0,49a06009c6a9de870d1e5cc8aa02051bf0af400b7a2338e7a71dcc6251079875,2024-04-10T13:23:38.787000 +CVE-2024-2039,0,1,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b24,2024-04-10T13:23:38.787000 CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000 CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000 CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000 @@ -239902,12 +239902,12 @@ CVE-2024-20661,0,0,814c927e5138e606adeef567c83f6731bfa5934266128d6eda829c1be2a28 CVE-2024-20662,0,0,678526df5b8fa58ae59d74ff613df6b6a1e6905b86effc104d278622d06a8162,2024-04-11T20:15:12.477000 CVE-2024-20663,0,0,18f125bc667cfbfe8a63780a9c8c829aff02ba17c55899c1394411bd296f9e03,2024-04-11T20:15:12.737000 CVE-2024-20664,0,0,b9cdb49aab6a19047525bf4a1bdaac91b10b36820f562fce672d9fb21ec7e8c1,2024-04-11T20:15:12.850000 -CVE-2024-20665,0,0,b15f9c82d8535dfac7b5b9026af1976e2ae63503ca46ad3d99203e209bfb1340,2024-04-10T13:24:22.187000 +CVE-2024-20665,0,1,4152fd7eaf2940d1fdc6ee00834b7770ce5f7d170d2355b78c7d9b17727ed02a,2024-04-10T13:24:22.187000 CVE-2024-20666,0,0,0ce324407dd82e4e7a1b15cd12b40148eb641daed761ee5aba9c7d397558354d,2024-01-14T22:46:45.707000 CVE-2024-20667,0,0,6ec563c79c01d58115ff50915db3b6561dfed3bafb7b43385fe0dcd1a1ffeeed,2024-04-11T20:15:13.097000 -CVE-2024-20669,0,0,dee0283fc693208abd8d06cd3411dd75a49c5ad04a563b79b5500b1052bd1c39,2024-04-10T13:24:22.187000 +CVE-2024-20669,0,1,c87d9eddd238e7c1bf6f8169ecddfe1f5ddd555dcc652ae52d503a72c11f769a,2024-04-10T13:24:22.187000 CVE-2024-2067,0,0,2a68a3d0aa49aa4869c0a2749dce216781ae64da9296ef0e80cb62990f6d7677,2024-04-11T01:25:17.067000 -CVE-2024-20670,0,0,2cee6b1f1d02cbec10d100bef01a16698a43e540f215599cfe75db0a36315eb8,2024-04-10T13:24:22.187000 +CVE-2024-20670,0,1,b2d78e35bd2bb5eb43de8422bcd00b05d3a190f76c85f548849b89780a039253,2024-04-10T13:24:22.187000 CVE-2024-20671,0,0,a909e7542a4f27bac7b3c8922bc1dcc8da9c04f9b5256ff72be51b705a438f9c,2024-03-12T17:46:17.273000 CVE-2024-20672,0,0,586025d75610d6f675953991e7fedf1dd3dafae527b62b3c4bc1579cf08bc78c,2024-01-14T22:48:45.253000 CVE-2024-20673,0,0,54b4e9f241ee8ab47844805a07750d3fdabb10465652b2260f0e87e7bebbe285,2024-02-22T15:29:57.733000 @@ -239915,7 +239915,7 @@ CVE-2024-20674,0,0,d7c6662e16282211f30dd37457111eea17691669cc0c244e657068ead7a27 CVE-2024-20675,0,0,098a1c1051e51e54708ad491ffc1da84402b5013489ba95a88b69b71214102c2,2024-01-18T19:14:08.637000 CVE-2024-20676,0,0,48eaca75a560962487bb2acc71489d0c576b4342f1ae814f87ae7b6d3f63e5af,2024-04-11T20:15:13.450000 CVE-2024-20677,0,0,dbe3999893617de6b867a5cc620a57c185c1cdce19c1d0c57883bf801b09a9b9,2024-04-11T20:15:13.663000 -CVE-2024-20678,0,0,0f1205f704bcc41c63535109498fe1e0faa74d2976a20420827e9b9e4d6b5903,2024-04-10T13:24:22.187000 +CVE-2024-20678,0,1,e9b30213a4906c726048109d23c7adc0ebb9c2ee5b671b495b1c257542c66e9b,2024-04-10T13:24:22.187000 CVE-2024-20679,0,0,bbf8f03d367dc50e3409fbf8c2c7769b07ed5a16f7457ea4a75d15bf0bdf7d8a,2024-04-11T20:15:13.820000 CVE-2024-2068,0,0,a8553e82c44b4ef1a36fb0b7d9c4aad163e07b201db95c77d4a3cd46967818cc,2024-04-11T01:25:17.150000 CVE-2024-20680,0,0,c80a2ded839f91f047347abda9411c4846d986545845289a155ec1cc05326607,2024-04-11T20:15:13.937000 @@ -239923,16 +239923,16 @@ CVE-2024-20681,0,0,32956235da70502f3d4a22130559526fee19f7de4c303373ffb4073c22a7f CVE-2024-20682,0,0,1a57c24bc3dc483f70e15a461700b9db0032e25a2a8c657b9f3ecdace3787a0a,2024-04-11T20:15:14.297000 CVE-2024-20683,0,0,1ff5f10fb99a354fe594bccb83a1a2318044abcfd3fbae51c533723f23af0902,2024-04-11T20:15:14.463000 CVE-2024-20684,0,0,686693d1accd35f9736c3d7184e5ec3facc278ec3cdd65c4b7796c141053b25c,2024-04-11T20:15:14.717000 -CVE-2024-20685,0,0,e9b08d14d97551796fc5543126337c83962f36701d07b0735cd6469df1320bd5,2024-04-10T13:24:22.187000 +CVE-2024-20685,0,1,fbf881e50f9c1700711443f4fd7d9d901d85a0fb8404bfeb08cd8e20384811e2,2024-04-10T13:24:22.187000 CVE-2024-20686,0,0,f572ab94cb498c197a69ef2fe5d42baf16271802ff2b34d7ad4548c67dc81679,2024-04-11T20:15:14.960000 CVE-2024-20687,0,0,38a253d0de192ada482105481d82a8ee1598eaff254c621ae2a10c16504a9c08,2024-04-11T20:15:15.090000 -CVE-2024-20688,0,0,e5e59f9109fb1e4648229c0c7ca44fbc745e1a8a966e6f283a49803eec0d3546,2024-04-10T13:24:00.070000 -CVE-2024-20689,0,0,93d6aeb2a33c86b70926159703218436a2717e1fd5e24329faba63a7a3bc2d36,2024-04-10T13:24:00.070000 +CVE-2024-20688,0,1,762cd702eccd7f2064a607efa259484eff3aa365535664330b91a7f788cd8b66,2024-04-10T13:24:00.070000 +CVE-2024-20689,0,1,bf0572faf26e577213109420cb10bef7f50476e35794178f9f3ef7b3692e6d29,2024-04-10T13:24:00.070000 CVE-2024-2069,0,0,db51faea36a163f6be66753746a0834470b3edbda27d7472fe4d7fedfbadacca,2024-04-11T01:25:17.233000 CVE-2024-20690,0,0,5abaa1aa74aa5c961fe79564dbdf23314ed63b332cd1d4a71abc7f8d73804918,2024-04-11T20:15:15.197000 CVE-2024-20691,0,0,ae5181219351c4b74ad367ab6f95a04690c5698fe717db676f223e833b024b9f,2024-04-11T20:15:15.450000 CVE-2024-20692,0,0,992df56e833d465c7d88af08526d18f5e93ee2c7f71607c8ddf7908875231cf7,2024-04-11T20:15:15.637000 -CVE-2024-20693,0,0,63e425eb7b4be775d6fc51a8715d53acd59bbc9ba7507b03427e7d93d8da236b,2024-04-10T13:24:00.070000 +CVE-2024-20693,0,1,58b2c5f69bf7013e2db66a3ca1c15a7c56f3eeb06bade8eb94e849e9cb18c8ff,2024-04-10T13:24:00.070000 CVE-2024-20694,0,0,bbb32433ca57cf68bf9cc44cf2358f6f5afae077eb6ae210c8fb4f037e7766bf,2024-04-11T20:15:15.860000 CVE-2024-20695,0,0,d655ea44843b13d9a73e241507a3f2d1d9fb16fa934b6a05f35e3bbb2ecc1792,2024-04-11T20:15:16.140000 CVE-2024-20696,0,0,b800e91a60eee0db65ecb766e2563f97182b88d8f277468550fc4eb7fa8bd267,2024-04-11T20:15:16.377000 @@ -239971,7 +239971,7 @@ CVE-2024-20733,0,0,2eb52670906ff0cad8500be429d653a9513dd1b739d502e57210996c49679 CVE-2024-20734,0,0,7a9fcca3a02c0117ad25035158579ec7504cf021acc151bf0e320c53fde70a8a,2024-03-01T23:07:08.780000 CVE-2024-20735,0,0,e644adf80fbc7c9d3e807dcb4ce7aada7bbb5cea3cd721082c0e3b2e0ca6c2e1,2024-03-12T14:54:29.657000 CVE-2024-20736,0,0,ae63b7adffa707edee65265eee19de1060dc8acc279f726884467fc381fb3187,2024-03-12T14:54:37.200000 -CVE-2024-20737,0,0,f055ac729801d1cfaefd4896ad7e8d89e6edef2e28b3c21904eefffccaedfb5e,2024-04-10T13:23:38.787000 +CVE-2024-20737,0,1,27cc5c1704c98b79b46c2d3ecfed689fc40983810033149047bc474503b2e074,2024-04-10T13:23:38.787000 CVE-2024-20738,0,0,e3ae1bbbb9ba53c0acaec8f7c83de088cee3a7c497e79fbf01d013a0c18467fc,2024-03-15T17:15:07.907000 CVE-2024-20739,0,0,6ee9532bad0997a83220674dc5e2d57f40f889dce3e9d4053b7ae92c5ab450ae,2024-02-15T14:28:20.067000 CVE-2024-2074,0,0,6402017b268eb79211e7a764b2ecb99021df9cedc9077b293d875dccfa89d715,2024-04-11T01:25:17.627000 @@ -239992,8 +239992,8 @@ CVE-2024-20754,0,0,81e060e70421921d47c9b5f39a0b588de5cbe53f3728eba912e2e038b4e02 CVE-2024-20755,0,0,fba4e17137418712248ac6e19aab4c7a4a836f7a43b6a373583de953e0de81e7,2024-03-18T19:40:00.173000 CVE-2024-20756,0,0,1d30dbdf41055263ead5435751d3a80ea211c2e82d513df846150a11bc88bcee,2024-03-18T19:40:00.173000 CVE-2024-20757,0,0,b97a36c03efe5ad2511eee63d0b5d713951b948a454f0b78b72ebf0ba4bce454,2024-03-18T19:40:00.173000 -CVE-2024-20758,0,0,89433cd76673fba48c29d5fe3ec54660508f956169796ea742e9fe57c4d8d978,2024-04-10T13:23:38.787000 -CVE-2024-20759,0,0,633c8771b939b9866a242c07bbb34685f7f9227a15fd0b72ad6c13abefe22ac0,2024-04-10T13:23:38.787000 +CVE-2024-20758,0,1,ccfdcf3bd88a5648b95849c093a7af69385dced634d44c545e8c639b9796943d,2024-04-10T13:23:38.787000 +CVE-2024-20759,0,1,68184df3a0a4b711d8d3ec24e596140e331060ae888105b04874c1d1e5762049,2024-04-10T13:23:38.787000 CVE-2024-2076,0,0,2b60925de696fb76933c333de5d870cb438c74e1a07f44c0a8a8f24f72add760,2024-04-11T01:25:17.787000 CVE-2024-20760,0,0,204cd974bf046961281f736fcf8c3a8da7f4acd089fa16bbd63678be587eff1f,2024-03-18T19:40:00.173000 CVE-2024-20761,0,0,d56e32b9a706189bdedf92d63dff18762ae45fed762ca58aafd5596a9bb4ec22,2024-03-18T19:40:00.173000 @@ -240001,22 +240001,22 @@ CVE-2024-20762,0,0,8843a00223c2fed95a9995841d1e393e5b6f0c74cf9d99f10f5957775ceb5 CVE-2024-20763,0,0,0ccd52aad72f4be4faf0e81e7f3be4b6f3d51f6bb880ef4436de89f24f0b893a,2024-03-18T19:40:00.173000 CVE-2024-20764,0,0,5c1354be3aa65d1ff2ebbfac4bbdfb4b43e77c0fbeb10cfdb9551fe4c099b137,2024-03-18T19:40:00.173000 CVE-2024-20765,0,0,587edfdbeb3ebaced0466ec8843227c839c877e75de542cc1c98abe163bc98be,2024-02-29T18:06:42.010000 -CVE-2024-20766,0,0,37f2499fb454e7659ff2f42c912c9237b6d3b4b5d751b2f1d0c6c74dbfc596d5,2024-04-10T19:49:51.183000 +CVE-2024-20766,0,1,0ac4fd6509dc00149fb1a788760879d2fa4c79652035a363ad404f0317702460,2024-04-10T19:49:51.183000 CVE-2024-20767,0,0,2f9f61b60fd0f122ed1c1348df04236455af6358ddef21fe50e4123b4febd83c,2024-03-18T12:38:25.490000 CVE-2024-20768,0,0,f06963f8fe3df5940e395a67d62309c22b5fac8953d781f176f52d7ddd8209b2,2024-03-18T19:40:00.173000 CVE-2024-2077,0,0,ed742777a844802a95de89f1d11ca7dd9557000e51b3501ce5b70d3e965a9096,2024-04-11T01:25:17.870000 -CVE-2024-20770,0,0,b452668d3ae98f217d8bea177e42979a128cbbf212c1a92d6e462904da6b905f,2024-04-10T19:49:51.183000 +CVE-2024-20770,0,1,7abd7bf265e8cba717d792314d1957f4f7aadd084d22983a6c6437c52cb803fb,2024-04-10T19:49:51.183000 CVE-2024-20771,0,0,aa3713047207268912fd55e4289a3534be4a66897769a616792977c8f76615b4,2024-04-11T12:47:44.137000 -CVE-2024-20772,0,0,765cd68ada502af45ff5792f209bebd791f8752b34a494a6319fed3810a8d65a,2024-04-10T19:49:51.183000 -CVE-2024-20778,0,0,f0225a43e675af7e7f934f2c69b7291761101d21323c77717441c44569d93b06,2024-04-10T13:23:38.787000 -CVE-2024-20779,0,0,8ffadc128ea4002b645f782b512b2fd3a8dcd54ac65b17bd8cd9ee7acf977815,2024-04-10T13:23:38.787000 +CVE-2024-20772,0,1,ba4143bcc899081833115118ea14dcdc5a8a0b1624cc913ca572fb909f12c02c,2024-04-10T19:49:51.183000 +CVE-2024-20778,0,1,e976407642c5bb35b6116530469966aa2101f0b51f16cbc18fee45e534c89a47,2024-04-10T13:23:38.787000 +CVE-2024-20779,0,1,6fd5665d768cb852ea47732221a85e067d0080ad0de1ca2d2241cb625c59d9ad,2024-04-10T13:23:38.787000 CVE-2024-2078,0,0,1f3625edc40ce981dfa798326c49d364352417c97edbdeb08f2797c1a0a609b2,2024-03-01T14:04:04.827000 -CVE-2024-20780,0,0,574124000db8320c57d028804999a836d9b9050c3d741a571a028b24c532fb1a,2024-04-10T13:23:38.787000 +CVE-2024-20780,0,1,ec1b341950c30681e570ac487b080ed639019cf375cf8a334e95e6a235124aee,2024-04-10T13:23:38.787000 CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000 -CVE-2024-20794,0,0,fea5cc08c6a651aece2b525234e823f637e345263faf16eb516400068ce7ea17,2024-04-11T12:47:44.137000 -CVE-2024-20795,0,0,44ca2c650ff50a4668fcffb03f444dbe14a05272953111ec9160efd1ae7acafb,2024-04-11T12:47:44.137000 -CVE-2024-20796,0,0,70207eadfae5ddc766c052a4630da9342a8c355afa209a1e1246ccb631ff1d37,2024-04-11T12:47:44.137000 -CVE-2024-20797,0,0,4c7d3a4c8e4bd48fa5a2e7eeb46bdd4800aa76c344c2e433c399e241cb7784c7,2024-04-11T12:47:44.137000 +CVE-2024-20794,0,1,4fe1712e563ebe7ce315d7e522a29bf13a19a3e9ef230be176694920d61afc35,2024-04-11T12:47:44.137000 +CVE-2024-20795,0,1,cd7ff50f8ca961947e205c660b3364abe9f8ebb2130c9ff9ad7235f8951a7a63,2024-04-11T12:47:44.137000 +CVE-2024-20796,0,1,9f91cdf60843a0b7b0c45e20f9d786e0895d9dcbe5e5ddd6c81933919004da26,2024-04-11T12:47:44.137000 +CVE-2024-20797,0,1,17a1e38e11c1a82479bf9de83d1237006ae91faea0179cff21770ee5c753ee34,2024-04-11T12:47:44.137000 CVE-2024-20798,0,0,235b61f33837fd3bbd1205b27b72558ba61339a75ddef3c924f394e9eff5f7d0,2024-04-11T12:47:44.137000 CVE-2024-20799,0,0,5332d5e7b13388161eae410a6b53d5afb13895598cbbc29823f7f536c0dd7d70,2024-04-02T12:50:42.233000 CVE-2024-2080,0,0,32a4465f2fc45199bcb0563622cd911532e367b79194bc4a312258059486223d,2024-03-22T12:45:36.130000 @@ -240029,7 +240029,7 @@ CVE-2024-20806,0,0,d91ad46d90e0ff091998cada2d81c14600d8a6af3e2f2eaca686c484eac64 CVE-2024-20807,0,0,9527378f197a1269c157606e59ecd9e9efafd0d4c9f3121fe4326b6906ec0298,2024-04-02T01:15:51.090000 CVE-2024-20808,0,0,139faa0016267d0838f3bc1dd9f1cf492fc3d618d565af0cf551eb5a0ace916c,2024-01-10T14:33:08.153000 CVE-2024-20809,0,0,76a421af3a736e91e7de84e9d61701185485e919233bdf706fe267ee6ac3edbb,2024-01-10T14:21:37.030000 -CVE-2024-2081,0,0,0f1f1067e62c8e655eb0a720bf364cd047c669268d43a2f733fb6409c855e0e1,2024-04-10T13:23:38.787000 +CVE-2024-2081,0,1,22491e8f7f1c0785d92566eab5be27abddd134fe94e23c3a848038bb85d668fc,2024-04-10T13:23:38.787000 CVE-2024-20810,0,0,b1aac7dc4d216338da51704e97692cee6f028bf9c08204e03c4328b43b10dec1,2024-04-02T01:15:51.197000 CVE-2024-20811,0,0,03d5372096fd869ec13df33db20be9c4e1fb18b3fe04ad4281637b7bba86e3a7,2024-02-13T18:17:59.350000 CVE-2024-20812,0,0,b93acc9425e1d8d437a5e97edf7b9a8cab7283608fe5235521aec8d913f6f816,2024-02-13T18:18:17.027000 @@ -240102,14 +240102,14 @@ CVE-2024-20925,0,0,d10a0fca7a09ebfdc0a7c4cca93388f8d5399e3596a7bbbc8406e33599af1 CVE-2024-20926,0,0,d3873216ee94fa84b249beb1c74c8ef3c07eed47d225f5ba000c10569483b609,2024-02-02T17:35:48.843000 CVE-2024-20927,0,0,dd319773d81284268868fde18d9e1f440821df6daac2f5182ce3459809ef6e3a,2024-02-20T19:51:05.510000 CVE-2024-20928,0,0,62acc5ac117e98fc779b69b28a3acca08e161be5774f871fae1de668aedb00f8,2024-01-20T18:37:12.027000 -CVE-2024-20929,0,0,59a1527778cf95cafab24a166cf235fd329997e7946635bd6228ec16e9a50e9e,2024-02-20T19:51:05.510000 -CVE-2024-2093,0,0,0a9aceb1fdc94a06a51676c46108972e89fed227310accbee3873605a7f814a7,2024-04-10T13:23:38.787000 +CVE-2024-20929,0,1,1693dcf580161f691196c5674ce91320ab817d4397e292c3e2046fbdd09c5ac4,2024-02-20T19:51:05.510000 +CVE-2024-2093,0,1,a4867dec35bcf9684e077ed5c300a3ab923f46a48aae8d56999df2b88e6af50c,2024-04-10T13:23:38.787000 CVE-2024-20930,0,0,90dadbb3a7daa911b38bb2d6ec038f2cd4395aed330fb198e4b13bc74db9e0d8,2024-01-20T18:36:08.060000 CVE-2024-20931,0,0,58d3bdd289dffbe6049bb6be797c361438f71727c158d50465923fd1b67ab7a1,2024-02-20T19:51:05.510000 CVE-2024-20932,0,0,644a02b48b2b610d4f6884c9ce127666b0107ce0866b406fe25dccedf2ad5220,2024-02-14T20:46:22.083000 -CVE-2024-20933,0,0,74da3dd6fbcb71f6002e475f0860b9991cb42ae70225cc5d8936725612676722,2024-02-20T19:51:05.510000 +CVE-2024-20933,0,1,375f182111402aecc5507a4b33d8926e9417767627a06855d127b74c624eaa9e,2024-02-20T19:51:05.510000 CVE-2024-20934,0,0,e16db4aeb437979dad2cb882bbac47a2d493e9d52dda22646d8aa68c83a56dcf,2024-01-20T18:35:47.127000 -CVE-2024-20935,0,0,5994453efdc0d67e4c2707e79c383da7b257b33d96143707e3e7767b55a04f92,2024-02-20T19:51:05.510000 +CVE-2024-20935,0,1,9daa495ec8bfc750f90b74bdf6d1df84f7f39cb2afe7940b4213b9cc3270dfc8,2024-02-20T19:51:05.510000 CVE-2024-20936,0,0,9061c6526390c7222d38b2d71e023310a6b47f90297e78f58ed4889f2add5817,2024-01-20T18:35:22.853000 CVE-2024-20937,0,0,7287758e2231259c9c014f555798b3ad9c0afc6357df1bf350c3b71db439e271,2024-02-20T19:51:05.510000 CVE-2024-20938,0,0,ea972d05f0d1f5b51def7d5218b80054aec917696cf23e63727531a9a53169a6,2024-01-20T18:35:05.397000 @@ -240168,16 +240168,16 @@ CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4c CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6df,2024-03-29T12:45:02.937000 CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000 CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000 -CVE-2024-2112,0,0,e4071dfcb489627de03f7079d2957a746f07dcd0cb84ff3f51258f2e0ba363b8,2024-04-10T13:23:38.787000 +CVE-2024-2112,0,1,a1cb4c4251bcffa2c05884275a870a25f5932616e05316e143e17d4e95c29cc7,2024-04-10T13:23:38.787000 CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000 -CVE-2024-2115,0,0,ad4a99897aa65ee70731a7a49c28f7d6309b2934d1a4b752871efea7dc55e0f1,2024-04-05T12:40:52.763000 +CVE-2024-2115,0,1,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000 CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000 -CVE-2024-2117,0,0,71702f05d6b8adbf2274f0cb61dee8b9ac6fbc422bc4a53126847f88a9f49e8e,2024-04-10T13:23:38.787000 +CVE-2024-2117,0,1,d94804a9fc0846420aec73bfb7661886dd6c525cbdcae51571bcd3adf1a56a79,2024-04-10T13:23:38.787000 CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000 CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000 CVE-2024-2123,0,0,50093ae27aa67e742757e304ff2f215cc4cf255fadb869543328103242423601,2024-03-13T12:33:51.697000 CVE-2024-2124,0,0,6c05438396435f5a71d022df467bc26ef0c83811ea38fc903b63d8ae9658d2c8,2024-03-20T13:00:16.367000 -CVE-2024-2125,0,0,e29f8913cecd06b0ce32c08926c0ad4202aa011b60ad3a3bae1987905324a0d7,2024-04-10T13:23:38.787000 +CVE-2024-2125,0,1,21907277d02e81dabf0303aac375ec9a544529904f2ff625079487b0f36ac4ce,2024-04-10T13:23:38.787000 CVE-2024-2126,0,0,13e3f6075721fc7f6ab432c6038c8c1eb1002e657bb661fb4f4ea89d60982c15,2024-03-13T18:15:58.530000 CVE-2024-2127,0,0,7e732da9362123c901ed00a29dfcc3ca896b81c43d152f47d3b1708469785552,2024-03-08T14:02:57.420000 CVE-2024-2128,0,0,b758ae1e45bbf3f98be89f21520e72433f96873d6cb56cc91a1f688f1fc159ac,2024-03-08T14:02:57.420000 @@ -240200,9 +240200,9 @@ CVE-2024-21318,0,0,1d38b2f556ce115a36f42470ffcf2d3c1fbd9c2b91565b465985a1bee6904 CVE-2024-21319,0,0,747953902656a6f866871e65996a596ef98f36ac2f0ae2061c6c9d462c70d046,2024-04-11T20:15:18.893000 CVE-2024-2132,0,0,3b8fb3b1e21708dee38931061b6e4bb20015caa6e6f92a264bd45d8ad9d9ed3f,2024-04-08T18:48:40.217000 CVE-2024-21320,0,0,a3bf3da27176a0d34311a3e8ef1e3996013da15c218904cc7f7dd18b3e093c8d,2024-04-11T20:15:19.010000 -CVE-2024-21322,0,0,239067f1130cc6cd3107685db6aa2b7a4060e069d4164a6e8af17723c7cad80a,2024-04-10T13:24:00.070000 -CVE-2024-21323,0,0,b80c3702bae885c0108585d09b5c5055c193c118b3f31dc4df83ae44c971475c,2024-04-10T13:24:00.070000 -CVE-2024-21324,0,0,75fa592f61b7249f6853c3a1316a0b5a01c3cb17d08e72f666f13057b21f3557,2024-04-10T13:24:00.070000 +CVE-2024-21322,0,1,f65cb2d74d732ec5e441ae2d8c3e24b5a347300176d88019078d888617e330d7,2024-04-10T13:24:00.070000 +CVE-2024-21323,0,1,5c1e11db15c2fb474e51109729d0492105f3164a790d1f2c00bb372aaf5dd1ff,2024-04-10T13:24:00.070000 +CVE-2024-21324,0,1,42fbf44b38bcd35ad5b80521d333e069a665fc05171fc616d9a5cd82c840cf47,2024-04-10T13:24:00.070000 CVE-2024-21325,0,0,2a48fadb641b45ae89a1ae3b8e4b1c5e17f5198c9d080870f58b373f11874709,2024-04-11T20:15:19.130000 CVE-2024-21326,0,0,9b99383e3910a33b7c019a2944e435999c12719dc82d122ce9f6853940851c45,2024-01-31T20:10:24.203000 CVE-2024-21327,0,0,e9667552b7520bed2314a9e39306d68a9b42cac039d1ffe648b199306b0be1c3,2024-04-11T20:15:19.377000 @@ -240258,7 +240258,7 @@ CVE-2024-21376,0,0,9ee4d0e1aa15948ddd10dcf7006265a2eb0d632db40a01d2e6e5ab4ae5ecb CVE-2024-21377,0,0,468000aacff8053166dce0652ff51058357ba1843e1ea061b43ec6a018b7eba0,2024-04-11T20:15:27.067000 CVE-2024-21378,0,0,7a7fd532f10e17328e2b6aa8725324b1c2d7f37c1318dba0bbc39c248064cffb,2024-04-11T20:15:27.180000 CVE-2024-21379,0,0,cb2d68f1b7b1154e27e517f6a195f261481a4b9e82c55df919907b6b32a030fc,2024-04-11T20:15:27.490000 -CVE-2024-2138,0,0,984dc6cf9b2ce28c1694498e83a6f6aae6b2964ba3f11ef37b298552f9df6cfd,2024-04-10T13:23:38.787000 +CVE-2024-2138,0,1,cf3f05655a7738d410f944dbc1ee03b2694fdebe182279bc579f64336326598c,2024-04-10T13:23:38.787000 CVE-2024-21380,0,0,46c06a122d9e212da9787566b2b9669dc9323db579b26c3115e1681dcf5e56ca,2024-04-11T20:15:27.590000 CVE-2024-21381,0,0,72f7b9b55c939769a350c0abd0fd7bce6a88b4756b31388e1530f5e00de6c03f,2024-04-11T20:15:27.700000 CVE-2024-21382,0,0,ce26ee4feecaaaca2bcf2a219776153944e976e7b533be79ee23589169fc4ac0,2024-01-31T20:10:16.277000 @@ -240289,7 +240289,7 @@ CVE-2024-21405,0,0,79a753e5216c8e7d441f365b802cf329eb3cde591eb23dbcf426831b9e003 CVE-2024-21406,0,0,d9dac5bc44dbebfd05f03e280925bc3ac94f640a50f6faaa8f52743f800621e2,2024-04-11T20:15:29.927000 CVE-2024-21407,0,0,0279a72e303faa160d30b4ad9e1ea7eb3ba3ed94d621cf3d29dc4ea48448a407,2024-04-11T20:15:30.097000 CVE-2024-21408,0,0,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000 -CVE-2024-21409,0,0,c0fb37f3ea3e156ce8b2bf538bc22de00b8f09ca5ac78296d871ec4ab5768a65,2024-04-10T13:24:00.070000 +CVE-2024-21409,0,1,3252b9c8091d5332a3bc773a89fdbd086af57e3bd078c5be3485ae52c4af326c,2024-04-10T13:24:00.070000 CVE-2024-2141,0,0,e26109b8e99283bdb62d5043bdd1f401aa59fc85bb3806b759e44b62f049717a,2024-04-01T01:12:59.077000 CVE-2024-21410,0,0,db7fce94f4a1c2a55f5d89a3dd59e07a5e16b4870bf710b54b6aae28aa7b99d3,2024-04-11T20:15:30.337000 CVE-2024-21411,0,0,8d8f952d2011bbfdff19ef0bb365756eff0dc13d4fce72dca6529e4e1e68205f,2024-03-12T17:46:17.273000 @@ -240301,7 +240301,7 @@ CVE-2024-2142,0,0,775c587e23838eccc1f05d84b61c4d1b983fbea738158d2b5672ec0ee3392f CVE-2024-21420,0,0,c443dae0e9cb977d713b28c60596b474281d9e54d9d4872b58447ac566bb3e97,2024-04-11T20:15:30.883000 CVE-2024-21421,0,0,ba8423a9f096c86c4c4746df3fafea597a8042e8f3a3594375e861377c5bff3a,2024-03-12T17:46:17.273000 CVE-2024-21423,0,0,72b41cc6b131f8c33d53f5b1b9d9c002818d4d4ea0440990019a30ebd0dc6a9d,2024-02-26T13:42:22.567000 -CVE-2024-21424,0,0,1eab34163c7fab432314bb2470502fb1c60053a18c3ce3b44dbb3f20d5b24313,2024-04-10T13:24:00.070000 +CVE-2024-21424,0,1,f0ac6080e8acf8658a413c6a67f4f2883d669628ac20bb6a474371ff2a84db21,2024-04-10T13:24:00.070000 CVE-2024-21426,0,0,62e535860cd764d97419c6644d71bd3c35e073eaf2f51b753c24a9f9c3089023,2024-04-11T20:15:31.033000 CVE-2024-21427,0,0,9302735195689e19167f4b48a00821853ffdb5f4d6cfa8cfd79901c61e1635c3,2024-04-11T20:15:31.130000 CVE-2024-21429,0,0,936a9aa46e49cbebb2c3804bcc2938038e830db3c07baa7251bfd252a42b98e4,2024-04-11T20:15:31.223000 @@ -240324,7 +240324,7 @@ CVE-2024-21443,0,0,351fe15abd456c427616557d25169a722702ad3e4b5a9b3ed0933edcd9c3d CVE-2024-21444,0,0,b0488391da96c664156b64856f2904799cd493e53e2f197d9cd62ef0fa346688,2024-04-11T20:15:32.657000 CVE-2024-21445,0,0,95d0d7dd52273a33a963adbabf5c3e62912d37674acd08f34868678e159d0bdb,2024-04-11T20:15:32.753000 CVE-2024-21446,0,0,215bfb2e37749423d2c1771f43e4408ab4c6c19c01d1a776623c4a461d7a6ea9,2024-04-11T20:15:32.857000 -CVE-2024-21447,0,0,cd907e6e0434622dba0789d1f6ee9110328ed46cedefbf945d0c52a9accccc19,2024-04-10T13:24:00.070000 +CVE-2024-21447,0,1,ee6b6887da857dbb3a0d99b0d7e56a17925e1ca3556381e55f615bac24b89d9e,2024-04-10T13:24:00.070000 CVE-2024-21448,0,0,cc7a91363ba573b50587da0303693d8cc9f301ad18237b5902b852564dd20cb7,2024-04-11T20:15:32.957000 CVE-2024-2145,0,0,7798ca35245cf2302b4a494353f9ed4c3754d17d7f6fce522ae2220692bf9f77,2024-04-11T01:25:18.577000 CVE-2024-21450,0,0,ba03d25a544224b919939c73f3c0e5c0df60d80b8563e099528458d18fbd951d,2024-04-11T20:15:33.050000 @@ -240363,9 +240363,9 @@ CVE-2024-21503,0,0,dbde89ae4e130de7b3da2486efecec01760e430d7d72c91a7a50092dd8618 CVE-2024-21504,0,0,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46 CVE-2024-21505,0,0,790ab171c9e46ac93718d1bb5680fe990f4ed1edc4d489f5e4dab09077e05267,2024-03-25T13:47:14.087000 CVE-2024-21506,0,0,b5aa4619d56c5b7d271b796126b72b2ac8b7ae1845a40ea2ecb14b02eea63bc2,2024-04-08T18:49:25.863000 -CVE-2024-21507,0,0,7ad34a21aa2a06bdfc6aa362d26298c931659d611cedabf46442e71cc3bc97df,2024-04-10T13:23:38.787000 +CVE-2024-21507,0,1,b27f6d75429acab2680ad1c4eafae6068e12dceeaf532d34c061e24473a2d8ef,2024-04-10T13:23:38.787000 CVE-2024-21508,0,0,cd586a09fe54df7c696f2b333fd5accf6715d2f6a2387d472b5f305a62739372,2024-04-11T12:47:44.137000 -CVE-2024-21509,0,0,69a64a9a3ac84c217870338b514586a211b95f635819f54405eb637564b80245,2024-04-10T13:23:38.787000 +CVE-2024-21509,0,1,b1840eaff4c2213087c96721aaf87fdc6158bea90de6f63bdc95977af5681b08,2024-04-10T13:23:38.787000 CVE-2024-2151,0,0,1984075479a813303a33fbf40ee9d084e33ab05911d0014a1aff56e74a532cd4,2024-04-11T01:25:19.060000 CVE-2024-2152,0,0,d88c805e31f2469ea62a2f070cd3165046fcadf7379eeee508317e4c8341dd17,2024-04-11T01:25:19.140000 CVE-2024-2153,0,0,5a75e22f63315456f3ebc78cfda206253cd84838795a10d092092a6057d48f7b,2024-04-11T01:25:19.217000 @@ -240434,7 +240434,7 @@ CVE-2024-21646,0,0,dc8deadc497fbe885b316db50fe46233e296dee6ce82335351dec340faf15 CVE-2024-21647,0,0,dabec5705dc7b34c5645a2a3b673607689dc47c11f23acd7c53d329a615ebcf2,2024-01-11T17:31:54.497000 CVE-2024-21648,0,0,1469dabfec52b708d9f85c7ecd5d9ba5aceebc24818ce2b1def8a07877642602,2024-01-12T17:04:00.520000 CVE-2024-21649,0,0,7c6601ab19fae69b0394619b81ee444fda4d153a80a3cfe11d1aec4c20580d67,2024-02-08T16:43:53.780000 -CVE-2024-2165,0,0,d8fb91201533da5e3d7d3ada1637c760a65104527fb27baa5e55620e3b07d7d5,2024-04-10T13:23:38.787000 +CVE-2024-2165,0,1,96e595ae8440780e69756dbcd55d05f7e147e1a255fbebd2fbf88d7b7651e298,2024-04-10T13:23:38.787000 CVE-2024-21650,0,0,3a0b953c563f222640e14d0396aea7c6a144484adb27cd9e00ee3594cd5dd9b3,2024-01-11T18:46:08.260000 CVE-2024-21651,0,0,136261d793a44a9ef45740acc5477522b935825eb24ca39b41770ad8b0563bb1,2024-01-12T17:15:18.467000 CVE-2024-21652,0,0,fd7d783fb3598545d62431d471b089f83bc954b2e432c0f17582d4e5175e6030,2024-03-18T19:40:00.173000 @@ -240486,8 +240486,8 @@ CVE-2024-21747,0,0,35403744e7ef40fd68d659ac75e691394b3bec12407204459bb0ee7326018 CVE-2024-21749,0,0,977e78c03c745b3f2715cc5017eb627860eddebef9d26895b59c2bc8df042370,2024-02-29T13:49:47.277000 CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000 CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000 -CVE-2024-21755,0,0,499d7e811c8671cb4944111e4eb62758ed5b8dcbf1c2ae6e2978b35593922f7b,2024-04-10T13:24:22.187000 -CVE-2024-21756,0,0,5f81a0bcb1e5db55f22bb2037286b482ad350a1c0bdb609079f7be2cbdc71209,2024-04-10T13:24:22.187000 +CVE-2024-21755,0,1,3649ad429f456b06338c76a7773a7effa9162638dba6b0cd829505e767eab517,2024-04-10T13:24:22.187000 +CVE-2024-21756,0,1,7e40cab71c47f1a51d786a1ac8dd4278e504d9e4172c58909f1d2b21a6d9e3a6,2024-04-10T13:24:22.187000 CVE-2024-2176,0,0,0b1ad65e2de8a26d446910c44762983b7c0d3648d9404f5b09d2ef1eb4a5dde1,2024-03-23T03:15:12.287000 CVE-2024-21761,0,0,8ab59e75152f9d6936d0a5e25258149f4630555ed80a24ba673592c858a212ca,2024-03-21T21:04:27.653000 CVE-2024-21762,0,0,0b64c1e53b9988082cc4d4d5e4617e40dc5892047d7c058b50bd69b94b2061c8,2024-02-13T18:21:14.607000 @@ -240510,7 +240510,7 @@ CVE-2024-2180,0,0,2305055222e043302fd0a35766f1bca6beeccec40b2b0bc17ac70e6f8c4d20 CVE-2024-21802,0,0,c2f755a99401908f2373688013136a016a34cd02c10ca7074ad31e9e4c194461,2024-02-26T18:15:07.290000 CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000 CVE-2024-21805,0,0,0cc71f66658f89ba3aa136c4707e117e9b180b89a5ccd9ebabe7b07f7d2cf47d,2024-03-12T12:40:13.500000 -CVE-2024-2181,0,0,e6b48c2e6cf33c831f22f18527983dbfa1fdc4a20c53d9f3ccc94d4bb1a5f8b0,2024-04-10T13:23:38.787000 +CVE-2024-2181,0,1,a2fd878694432bbeda0e10d1053b12e99b3f48073d2428b435e4e90241d01c63,2024-04-10T13:23:38.787000 CVE-2024-21812,0,0,17aa7837957a8314d8283bcd6803c6ec88b5ca54481af89e2e3321502a717b6c,2024-04-02T15:15:52.650000 CVE-2024-21815,0,0,ab91a303e2db960020337e0aa80545ce17eb52c46e86c32df0cef6312db60a85,2024-03-05T13:41:01.900000 CVE-2024-21816,0,0,ed35c1f8ddc7850dea188572415674feef10c1ffe60798b90d7a35a6b1fca0ac,2024-03-04T13:58:23.447000 @@ -240519,7 +240519,7 @@ CVE-2024-21821,0,0,4c3f841f13791c81362ea564b3fbf92012289121b1ae208771ab4f8c8efda CVE-2024-21824,0,0,3bddb01433a875d84e1ff57d3fa88062c16a6aea3448fe5a7afcbbae2986da28,2024-03-18T12:38:25.490000 CVE-2024-21825,0,0,1b47c3f0e2bb27ba429b8b0ff73ec4e737b53c8991d881956fe812d8a2d73bd5,2024-02-26T18:15:07.390000 CVE-2024-21826,0,0,db46d5d52cce4b3faca9d1878c694b0b714eba4ae02907457ece6927043134cc,2024-03-04T13:58:23.447000 -CVE-2024-2183,0,0,ffa7084604a431e39515ab2b94b7b758a5e112aa3f52d40c3e0fc641aae12f08,2024-04-10T13:23:38.787000 +CVE-2024-2183,0,1,d2fc5903dd12fc59dfdda0bd9c528b50368a6c295b02593ecad0115a711b3755,2024-04-10T13:23:38.787000 CVE-2024-21833,0,0,d495db7ecc3e5eea6a844ebf68934df72f88808ddb4472cc88d71eac4c0a6284,2024-01-18T18:26:59.627000 CVE-2024-21834,0,0,adfdacc4c0ad7fb798fc6feea300b691936e258291634c57f962c7e425f92b08,2024-04-02T12:50:42.233000 CVE-2024-21836,0,0,aeffe599125aefebf3045665d78d7d0e3cd21d6805eaf7ff802211b8970e2608,2024-02-26T18:15:07.487000 @@ -240527,18 +240527,18 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000 CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000 CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000 -CVE-2024-21848,0,0,7a5c20e4b54cd22bcbafb7b3c75de756ff2f96e19251406e86ddab1348ece0ad,2024-04-05T12:40:52.763000 +CVE-2024-21848,0,1,1fde96dab5128745ee3e4ea7f8cda5cbe7e9c944949a63485c9658d999c137ed,2024-04-05T12:40:52.763000 CVE-2024-21849,0,0,777d92a1c4bb7f79ad58de292d7b92c84e7bc7c1bbc5ad80d97c5d175c6259e9,2024-02-14T18:04:45.380000 -CVE-2024-2185,0,0,5d753ad25c898f77d61ad58a562e95b8a9827e651c2fa0ca303d03e3b8d5a2eb,2024-04-10T13:23:38.787000 +CVE-2024-2185,0,1,715b4c907b3d19350ef7be845da2bc745dc7e2e4eb5111e392ff343232e67b39,2024-04-10T13:23:38.787000 CVE-2024-21851,0,0,854dd5d2aabc832591989b715d43ec08aeafe79b0e7fb2b7b8e58485d72989a1,2024-02-07T18:15:48.700000 CVE-2024-21852,0,0,3082fd3c592fa6da1ceb030e60633f5be1a3b7d2adb2434a27465175a4927608,2024-02-07T17:15:05.653000 -CVE-2024-2186,0,0,496bf342421212760e33558b903f5579a437e016886f7a1410d133a9f457ed56,2024-04-10T13:23:38.787000 +CVE-2024-2186,0,1,4728e4b8025493f52dc648682b7d6f9a2f45205c65dfb67aeb61a6d3c2fad886,2024-04-10T13:23:38.787000 CVE-2024-21860,0,0,9745cb77a8de410a197a8548750acfeec47533851fdeac14642298bec1ba6b31,2024-02-07T18:23:16.470000 CVE-2024-21863,0,0,271dac2898e305fa77d04d20ca85b0dae0a5a0857bbfa85084510f677962f58a,2024-02-07T18:23:11.090000 CVE-2024-21865,0,0,7a0c150742a363fb7b1bfb201c6089eca71d87169fcff3d08a3aee9d2d9b45ea,2024-03-25T13:47:14.087000 CVE-2024-21866,0,0,e7c03b05e2d3f94b4b523aca377b349190d980e16c741cbf713751bf3c07dcf0,2024-02-07T17:27:52.793000 CVE-2024-21869,0,0,48ec62155fd9a810461dcd57893eff3c63fc7d7992b6dd94f9f3d8f38382a25c,2024-02-07T17:29:50.927000 -CVE-2024-2187,0,0,0e005123547e1f04f114ae3ab1e57167e68e1d3a6e767153c0d2843ae244e7f5,2024-04-10T13:23:38.787000 +CVE-2024-2187,0,1,ec12e7fb0306f6807d4637027c46ccbfa30febf5b0c3aec15cd51db28e1f84c7,2024-04-10T13:23:38.787000 CVE-2024-21870,0,0,eb93ddaf02bbc4698ce65f000ac66cf4bffe10c9c37f8f4faeecaca1a04000b0,2024-04-03T17:24:18.150000 CVE-2024-21875,0,0,d88c7fa028650d8c38c644c89741f5c8883fbb1f9fa5219cf2c447a4b53bf374,2024-04-12T07:15:08.283000 CVE-2024-2188,0,0,50073fcb971d8d943a63e1f3e232811ec9a11d1acf3f48e9da561ed8964c30e8,2024-03-05T13:41:01.900000 @@ -240574,13 +240574,13 @@ CVE-2024-2194,0,0,0000ff116712731a482809b568183b726be1f79dae082b76e9b69fc3294825 CVE-2024-2195,0,0,a3e1dae4f377e533904ca66f7bd1f0f0fe11e281ad36a18b90b817c693e4caa6,2024-04-10T19:49:51.183000 CVE-2024-2196,0,0,9e530937eda77e7652f5a6ae126160bf319243bfd91e75e1d1a392f295014fb9,2024-04-10T19:49:51.183000 CVE-2024-2197,0,0,414465715952d5c6949fa149e5daed1e85f3f5623a9c37e112592963e0dbadb6,2024-03-20T13:00:16.367000 -CVE-2024-2198,0,0,6badf10cf8f983fe5323b878b9b4680d34ba94cfb69d5451158240ca3ed94bb0,2024-04-10T13:23:38.787000 +CVE-2024-2198,0,1,ab46e4c1d54bb1e14c6f5e0da6a11f6c2395ca25454e70b66ef98a9f852be13d,2024-04-10T13:23:38.787000 CVE-2024-21982,0,0,994386f15521161d8cc5450a9cd855c84b7920a60d3a57eb970483fe82fbbf1f,2024-01-18T20:16:20.420000 CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8bd7,2024-02-20T19:51:05.510000 CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000 CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000 CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000 -CVE-2024-2200,0,0,0333097cc32aacc23b0f3271d35c7e4458cd7afa485a07930866199f0339f418,2024-04-10T13:23:38.787000 +CVE-2024-2200,0,1,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000 CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000 CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000 CVE-2024-22006,0,0,4c7c420bbb6e62588c7a1f4eb632b3e6efe7a61ff08393b9055a3796f498bb2e,2024-03-15T20:15:07.573000 @@ -240721,7 +240721,7 @@ CVE-2024-22211,0,0,0f9574cc03ebb6848610e302a32dfefe91bcba1d51d44ecaff83ff018a0ee CVE-2024-22212,0,0,bf710a06400d8397b49230a1f7b6ca9af7e1bce04b5698107bc2d07d5d224d3b,2024-01-26T14:58:18.877000 CVE-2024-22213,0,0,f5ce0b8d904bc58daba82de23646e101545eb18147e4809cc489e57c95062cf9,2024-01-25T15:10:41.767000 CVE-2024-22216,0,0,ad9e618012f80eff7dfe64e3510860845d729abd042379a649987f3ddba2c0d0,2024-02-15T20:09:29.663000 -CVE-2024-2222,0,0,7b71d280c4c93c54a5c4e1dcb2a1c8e2d47dea62a74a4cb2d6ca6c77e49ca09d,2024-04-10T13:23:38.787000 +CVE-2024-2222,0,1,a53cfb7c64d97d26c4e65bc2d9969d839e064c5743d181d9fb6c6c839869b78d,2024-04-10T13:23:38.787000 CVE-2024-22220,0,0,3bf857bacecd2f33dd8c4b2baa47073263a1d13ae061707002131b71c91c9ca6,2024-02-22T19:07:27.197000 CVE-2024-22221,0,0,b3efad7b7f953954f022dbd9803ebbc724057f30518d423d59ede417c3c8618b,2024-02-16T13:40:34.093000 CVE-2024-22222,0,0,4ad3479324f3be9af62cfd910b01a676d4941746c4b409168aec4a6c062180d2,2024-02-16T13:40:22.813000 @@ -240732,7 +240732,7 @@ CVE-2024-22226,0,0,0d0a641f57bdd270587828a9a2bed46d21e4a42e20578c34da0758c83220e CVE-2024-22227,0,0,da75d9c9489c29f1cc0bee36d7764c9cdfb4cf2b057bac2e908e6263109bed68,2024-02-15T06:25:36.360000 CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778f85,2024-02-15T06:25:45.463000 CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000 -CVE-2024-2223,0,0,d2508c52c19baecd6fb99bf545d50d06b257669ab85bc5a60cfeeccce89334a5,2024-04-10T13:24:22.187000 +CVE-2024-2223,0,1,1b410a9ed5d5a5d32a9a4408c4dbc25d2dfc4cd58665c0d802a4cb2c5e3cd9dc,2024-04-10T13:24:22.187000 CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000 CVE-2024-22233,0,0,0fe59b4b663f0c6d5b9043fb5ee923bedfa271d937aabb2465577a5f1e4e3b27,2024-01-29T17:24:16.230000 CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000 @@ -240741,7 +240741,7 @@ CVE-2024-22236,0,0,8201be843ca4fddc3e50d61ba00eee488c4be6cba8a9459a0251fd7b88b77 CVE-2024-22237,0,0,e71897597855cd1424c518c72383f574819812eafb673db1067e39ca6ce39465,2024-02-10T04:12:42.680000 CVE-2024-22238,0,0,7cde94c40824c59018efefacd980beca9642688e0bc3a9b4bd234ac24d76c945,2024-02-10T04:12:32.263000 CVE-2024-22239,0,0,bbc3a472e1d6ecc835cd57fa3021e572fa71f1c8c62196314a99a704e393b5ba,2024-02-10T04:12:18.850000 -CVE-2024-2224,0,0,89d856f7b1edfd3c86875c5eac48f04432aba69e99ec6af6a41578d1f1283a01,2024-04-10T13:24:22.187000 +CVE-2024-2224,0,1,5ad1118fd399d4ade727f64cbe596f80a242d06d5a99e51c3e459a148b49f2a3,2024-04-10T13:24:22.187000 CVE-2024-22240,0,0,9d0b72097aa3b0fcd2ce100bde56bd14382bcab6c31de68e5fe9354868ac9639,2024-02-10T04:11:57.463000 CVE-2024-22241,0,0,496f061bf551a3619640a70a8bba0bd7b22a646ffcd7631f69738ec433aa1245,2024-02-10T04:11:46.267000 CVE-2024-22243,0,0,cd5131de758a556ae754d98313ecfca987f6ffd9ea403d0f3d0f2e39b0761770,2024-02-23T16:14:43.447000 @@ -240759,7 +240759,7 @@ CVE-2024-22256,0,0,7ccfa1d456f911dd1ae59428e390bb74a9bd8e0f03e6ec12672c279cdd5bf CVE-2024-22257,0,0,f92aa8bf394d8fd611f53add1392a351f03e12bf743f9f4955afd6cb96ba5fe5,2024-03-18T19:40:00.173000 CVE-2024-22258,0,0,73834c066fffbf1ceac081ac0d8fd511b8fd9e870301a54667895cd45741a179,2024-03-20T13:00:16.367000 CVE-2024-22259,0,0,547e720795826cec4771fb96783f58d3e37f083da9aea1ec36ad1e3651ab2c72,2024-03-17T22:38:29.433000 -CVE-2024-2226,0,0,c9b4bf8c70e9f47b2ba54070f7bfeab16df38cf60daf1d96cb927ebbf9e480fb,2024-04-10T13:23:38.787000 +CVE-2024-2226,0,1,ee8f1ca60db458688b285f09c24138ba2af43e7eda48e7abf64d7861f3a6fd0e,2024-04-10T13:23:38.787000 CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000 CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000 CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000 @@ -240816,7 +240816,7 @@ CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f CVE-2024-22360,0,0,b51802432bc04c6d8daeffb43226824cdd8f27647664bb8d35541e7d6a53f5a2,2024-04-03T17:24:18.150000 CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000 CVE-2024-22362,0,0,4494985f455ed96204ebe979f8c6258ea6c0e638d2824040e5afe72aebdf02d6,2024-04-11T01:24:44.947000 -CVE-2024-22363,0,0,f2093904f2c0c2583f88242c81aca179a42da115cdf994261e5d1b6c9758852a,2024-04-05T12:40:52.763000 +CVE-2024-22363,0,1,49b3a4a06183cff23e9f4b732de70e02111fb3ceb530303377cbe277522eab17,2024-04-05T12:40:52.763000 CVE-2024-22365,0,0,b09f0e3dd0fc2bf60706805e33c1f78b209416e9ed2aa43cb1cfb00b1fe90d17,2024-02-14T00:27:40.143000 CVE-2024-22366,0,0,430ca6193adfaa0b9afcb94c1ccbb70fbf418a97a177252da5823216c0a609df,2024-01-30T22:15:32.033000 CVE-2024-22368,0,0,6b22b40b8e4884565fa5c7d8677cdf0e0ae6419db0baf589179542cd6fadbd26,2024-02-27T04:15:06.767000 @@ -240862,22 +240862,22 @@ CVE-2024-2242,0,0,39d308e366a51cd5a7be9e3c4a03c92cd8109861f94356873beae64a70ef55 CVE-2024-22420,0,0,dcbfe647d1443cce2b795eae483259c958c0472084bb1bb4ee3374c4670666da,2024-02-10T02:51:45.717000 CVE-2024-22421,0,0,58c7848effa15c2f45cae3a355504d85dac425537d9bac99b99330760ff84e0c,2024-02-10T02:51:03.987000 CVE-2024-22422,0,0,cafc60081059c38b5fbf7c4dc43db8e59eaafdb89fe8cc5c7225f1844e49fce8,2024-01-25T22:19:52.030000 -CVE-2024-22423,0,0,57a364dbbd13dea9c63c13ace111a52c120b123af49ae8b9fecb54bb2435fb96,2024-04-10T16:15:09.793000 +CVE-2024-22423,0,1,d96d26849b220812724f61180fd88d4989d6af488638694c1b2d2c6bf65e986f,2024-04-10T16:15:09.793000 CVE-2024-22424,0,0,83375ad265e9c43ef3d1aea756c45fddd902a18f6120fe465a11301a71a985ab,2024-01-31T19:51:26.407000 CVE-2024-22425,0,0,58c578ae099965e7b72bc618ad55b6b7844e0f69d2e6cb7594bd7c946eef5a64,2024-02-16T13:37:51.433000 CVE-2024-22426,0,0,a535bca9811983074d0c9cf7a9ad36e777c8164f73ae7ea2a393f049f829d17d,2024-02-16T13:37:51.433000 CVE-2024-22428,0,0,d92a5a80e616f72d015e3df366132cde5205daf6f1415ae7d5800097348c1806,2024-01-23T14:13:19.053000 -CVE-2024-2243,0,0,2c7c067eccd30934f41c4c6ed9ede33fef6861f345b1e47ad3d64fc35d288428,2024-04-10T13:23:38.787000 +CVE-2024-2243,0,1,fd3b162b0deb37bb7e6d2b4457ac5f67b777c94fc366baaf5d3d683b036b09e1,2024-04-10T13:23:38.787000 CVE-2024-22430,0,0,2e5779ce610960aa54065a985f7d7b4d5fc66005f09960beaac23d15bb28ba31,2024-02-03T00:30:48.593000 CVE-2024-22432,0,0,a5ce1013533b36d94c95ad06d489dc2a6480ecc8fe7741cd230ce585b643d9e0,2024-02-01T17:00:46.647000 CVE-2024-22433,0,0,15060e68251742f26417bd26381576269dfd06519ddd1ac4517720d4b647a719,2024-02-13T22:51:37.293000 CVE-2024-22436,0,0,00b74e1ff886d20ebe92bbc8b1e6fdd82d357402c604ca27f782e052d7d04706,2024-03-27T12:29:41.530000 CVE-2024-2244,0,0,6067a10fe151799fd67b78b9c0fca1b24ea3e87a8b60b472c9b5348df432c4fd,2024-03-27T12:29:30.307000 CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66c08,2024-02-27T16:51:44.013000 -CVE-2024-22448,0,0,1998df184ff852bd0f4cda362094334c20ac2ed7160bce4bb8d903691f68b352,2024-04-10T13:23:38.787000 +CVE-2024-22448,0,1,1992600b8600bb56aae73cb12b4e127beb346d00ee726bae431172f71d819620,2024-04-10T13:23:38.787000 CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000 CVE-2024-2245,0,0,a8dfb8351f46296f236b450578550d52c11e3bbe1608a2f34bef4ace0db3b43b,2024-03-07T13:52:27.110000 -CVE-2024-22450,0,0,514f120964817c01c084f31a49354193b7bc6ead01558f2cfd684cdb79b91ab5,2024-04-10T13:23:38.787000 +CVE-2024-22450,0,1,445adc74bb3b82f8dc44979742580991502de3c450d807165cb197fa244088d7,2024-04-10T13:23:38.787000 CVE-2024-22452,0,0,127230ed19ef42fab9dfd33c1c907465943886cdbfdbca0852d4f8b4df75a872,2024-03-04T13:58:23.447000 CVE-2024-22453,0,0,d34f36f5ba0d6c8920acf384004dd0c56235ac34a71473708e1fa31b04710cc8,2024-03-19T13:26:46 CVE-2024-22454,0,0,323c0cbc8c3a94d57ed602cc461475e5ca2e60a686452caf750d59ecf708ba74,2024-02-27T17:10:16.097000 @@ -240932,7 +240932,7 @@ CVE-2024-22592,0,0,f50afa29eb1912ea2c3e321f184317ab81adfed74c362dc96640e9870bb57 CVE-2024-22593,0,0,993941354f61719e720764f4475d3b2e7a78eded6442ffaa6fe56e23dc421b8f,2024-01-20T18:49:24.957000 CVE-2024-22601,0,0,92ecea299ccef3b7cd4d91b41e992ed614a8d9984f7a4392cc8890904d00c311,2024-01-23T14:23:11.057000 CVE-2024-22603,0,0,4919aa7e5a59d3ee5df33db7d0969165de88de1745941bbbf66bc33f0421270c,2024-01-23T14:23:38.480000 -CVE-2024-2261,0,0,21e3838ce73b5aeb0289bef7089f11af1cb049b8a5101969522cfc133c266d03,2024-04-10T13:23:38.787000 +CVE-2024-2261,0,1,c292e061fc6a0764495ba9495b5ee23da62e67d2c3ec4353f74385ff07320fae,2024-04-10T13:23:38.787000 CVE-2024-2262,0,0,075276591e06009dee51b94f02d229e9758918474093d28cdb085c71aa0d06d7,2024-04-01T12:49:00.877000 CVE-2024-22625,0,0,aa710101d72d691dda095f08d60dd3f7eb4bbeafe717cbfa8f98cff1c7b460d2,2024-01-19T14:40:27.910000 CVE-2024-22626,0,0,fc707ee8f5c412b901c3f24bd4c3662a5fd9b8a23f261dbe38ea261f2f9fadea,2024-01-19T14:40:09.903000 @@ -241020,13 +241020,13 @@ CVE-2024-2286,0,0,657861131740076699183211e8ffc4b18c067668bfd7d2635b81e0ec9c54a2 CVE-2024-22860,0,0,2356d6c888fca02c70325b51a39623a7535f82a709f9194a1301833cd9cbfe59,2024-02-02T23:38:02.733000 CVE-2024-22861,0,0,c89d044769ece1a7b6a075f4ae298dac300ceb86cde9ed7916956be6ce090fa7,2024-02-02T23:38:20.193000 CVE-2024-22862,0,0,8c77a453cf55f4869bcb690a30d93ebca959e1728384e14ae5102a4662e5da73,2024-02-02T23:38:28.047000 -CVE-2024-2287,0,0,51ef564e93e2a57f2aff2ac63382b46175147ec0b3beaabdd17a5109f1b49412,2024-04-10T13:23:38.787000 +CVE-2024-2287,0,1,70ab97c84182418a629888e71d4f0edc431f01bcc113efc72745ae673681cb47,2024-04-10T13:23:38.787000 CVE-2024-22871,0,0,e9ecd82d56ec3247868ab1a712ec2b02bb22b83148693677e1b066f1f92adeb7,2024-03-24T03:15:08.910000 CVE-2024-22873,0,0,2a33a0b832ddf4aee4047ef1581dd0b404351988770abd350bc232fc7a919eaf,2024-02-26T16:32:25.577000 CVE-2024-22876,0,0,ab3e7325225f85fec74512859181d3694c521af354c51fd0a6e35209ffc9a561,2024-01-25T18:19:25.647000 CVE-2024-22877,0,0,642d7085683e3f73b5dacc06a16c4d9d3eb82f5021c869a0fbd04c810dffe02a,2024-01-25T17:45:50.770000 CVE-2024-22889,0,0,3ce8cf8d0a106aecfadf497a37eb6fe4b8112fb322509ae8146be604489ba3b1,2024-03-06T15:18:08.093000 -CVE-2024-2289,0,0,6a82c15d63d7bc8324e653e0df11c88e6d5843d04cc0aef73e6c06499fab780d,2024-04-10T13:23:38.787000 +CVE-2024-2289,0,1,9589c60d9e556c1a19069c42597a9efc90bf8a31f64793a3f0ab413e7ed78380,2024-04-10T13:23:38.787000 CVE-2024-22891,0,0,fe729f8b9ffa3e07095f19f53905c64a69c09d6b32564d519c8a0193de35f420,2024-03-01T14:04:26.010000 CVE-2024-22894,0,0,e34058d747882ba74ff76759bef46e72e7e9b82d1cdcefb4304f524c355177aa,2024-03-05T21:15:07.790000 CVE-2024-22895,0,0,47199b8e7851e99d287da6eeefbe43cd3299e45fdc01bb3cb9773b1a6425bc1d,2024-01-26T19:34:53.417000 @@ -241063,7 +241063,7 @@ CVE-2024-2298,0,0,110c8428bf2ee1d404b6fc16e696c66e1acb2b6e80ed3915e48e2b44d3e42d CVE-2024-22983,0,0,1b3e25c68b4f4c09625b6b1616200d426118f4ab97bcd8f55256ede34123b9bc,2024-02-29T13:49:47.277000 CVE-2024-22984,0,0,e1878756268a68f030b8a1f4c487c52d091cec58671de352e5b7d5d34740ed57,2024-02-07T20:15:49.320000 CVE-2024-22988,0,0,9bce914ce9d429b5a5cd734f9618e22363c87c41939b422b32cac88106642a90,2024-03-18T20:15:08.793000 -CVE-2024-2302,0,0,aecb1175e7d0dcd3b9e1b1cb64d6b3ea8ff139c3edb4c4e21ee964c9bf66b8d7,2024-04-10T13:23:38.787000 +CVE-2024-2302,0,1,111ef6bb80800aad8b5212c78d791bb76a08a7abc709646851b3bdf2c22369ae,2024-04-10T13:23:38.787000 CVE-2024-2303,0,0,e8ec06902514d48e2641fcd827085959ad9d4a100b3417c3f9c5bb681b9976f4,2024-03-26T12:55:05.010000 CVE-2024-23031,0,0,50a01a02c17debf717506fceb27518dcc1b40bb12f5847f406f4c7143af31def,2024-02-02T16:15:45.433000 CVE-2024-23032,0,0,d816fb742830db2ae31aaf2f9eaeddace513bb113282a64f1e9cfa85a92eae11,2024-02-02T16:15:50.530000 @@ -241071,19 +241071,19 @@ CVE-2024-23033,0,0,f21a57749bcc6c4adedee8c08d8f7499bd817689eb51d8cc4a9b5771f50ba CVE-2024-23034,0,0,b4b4611ca83bd41bf8a52de647c7c7587d1c72d820720f018ce134c76450f07f,2024-02-02T16:16:04.670000 CVE-2024-2304,0,0,002885016cb6de20a7ac74c3320e64b475ced64cf41e23553cf72ac590e02c41,2024-03-20T13:00:16.367000 CVE-2024-23049,0,0,0b53d9fcaa3d982fbaba3ce5ecc9aca5fa97b026cc60aeb6562fcda76003228f,2024-02-12T17:17:31.967000 -CVE-2024-2305,0,0,350a9df0267a8630fb2e6722407d65407d09c278902160db5f0fa256fc00ef47,2024-04-10T13:23:38.787000 +CVE-2024-2305,0,1,67ddd3b17ba89a100104a555d07abbc0e6c698f4bcfe4bdd3aaeaec76405ba20,2024-04-10T13:23:38.787000 CVE-2024-23052,0,0,77bed15b5f7e3314dd1881600e0ebeeaf755dc8617c95300b8711f94c23a9aaa,2024-02-29T13:49:29.390000 CVE-2024-23054,0,0,33bc84808c5267105bbf1f05c69dd18d50eb53fad76c5e5038e537d42119e3a6,2024-02-13T18:27:16.557000 CVE-2024-23055,0,0,54124e9a9a97d45f754e7c71f6e5d2e241045f3c06b3c7fed8b9e56023ee1e70,2024-02-02T17:05:51.857000 CVE-2024-23057,0,0,adc1796cef08e8d149e4ec26b93b507eb10ee425914261b35693ce21283d0912,2024-01-18T15:16:24.097000 CVE-2024-23058,0,0,76633a37511046d6156754b8149320c3ad4867d16013e544115c9e451443aa83,2024-01-18T15:16:50.140000 CVE-2024-23059,0,0,1ae620a0d7759193ae34540a4455aa9c0a81f947f508fbecbd634aa926d83d19,2024-01-18T15:17:14.453000 -CVE-2024-2306,0,0,bc5118b4183fb8d85b363074da38c21425d73c04ce07dac09760780e15d985da,2024-04-10T13:23:38.787000 +CVE-2024-2306,0,1,9f487c2d8209218621d1d76cdabca18f6ed784cc183269f450c7ace110fb436e,2024-04-10T13:23:38.787000 CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000 CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000 CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000 CVE-2024-23076,0,0,700ca636baaf983297d803f7f456b25aa5c602cae51535b97505ad7243477397,2024-04-11T19:15:16.170000 -CVE-2024-23077,0,0,df31910c1e429b1e9f298bd00c0b1f1808de437ccbe476ca6824b67d02870831,2024-04-11T19:15:16.223000 +CVE-2024-23077,0,1,57e8b414449b730b1ca9269904f89e0bc15e3a7f300d5895ffca3c751d69833d,2024-04-11T19:15:16.223000 CVE-2024-23078,0,0,7542b39a6d77d318cffec2a0d48f88fc80581f152adedc13166a11343c2a6b36,2024-04-11T19:15:16.270000 CVE-2024-23079,0,0,0e48d79f0a15a7541c0b37162a74d592ae7fd494b012db345a4a7c0c62a4ecb4,2024-04-11T19:15:16.317000 CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000 @@ -241097,7 +241097,7 @@ CVE-2024-23086,0,0,84287977eab241265f69ad39dd1efe49fbc488d3bee216c68604fc835c00c CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 -CVE-2024-2311,0,0,cbc2cb390fe031f0fa811d6f60ac5c2223ddfcc0903ea51d2eab4573e665b0de,2024-04-10T13:23:38.787000 +CVE-2024-2311,0,1,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000 CVE-2024-23112,0,0,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000 CVE-2024-23113,0,0,29903cf0008dd4023f7698dfe9b07a61d8c5e19cfdea1fb0ce14ef659e7383ed,2024-02-22T15:33:00.970000 CVE-2024-23114,0,0,184fa653e4551a8698139895eb4d05d830e4b2d2a73606f2e94ea8d7330a5675,2024-02-20T19:50:53.960000 @@ -241194,7 +241194,7 @@ CVE-2024-23246,0,0,35ade6591543da60554a3e5d0b3ba4063bcd707fba447526ac948b0b2212c CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a0f0,2024-03-13T23:15:46.613000 CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000 CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000 -CVE-2024-2325,0,0,da5125ca2f199db5825f6694de70ff653d23bd02b76900350d3368ba831aaac6,2024-04-10T13:23:38.787000 +CVE-2024-2325,0,1,23b75df513c3c155a2acfcf2e34574fcebd08fb3e2a0b9207d1fa3d021e99412,2024-04-10T13:23:38.787000 CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000 CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000 CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000 @@ -241214,7 +241214,7 @@ CVE-2024-23266,0,0,6815b460f7716d52df98ab436e6b42da2e782eedd3a5d15e033e5ba09801d CVE-2024-23267,0,0,d5b27df89e87163c273c4cfdb022944a468171435a4aac14f3c213d699a4a63f,2024-03-14T19:05:20.860000 CVE-2024-23268,0,0,81165c5c09e8474d57b6891cda51eb4f30eab0837f193e7c4798fe99fd2b9a98,2024-03-14T19:05:36.077000 CVE-2024-23269,0,0,b560efe5c2974c123fc7f649e82a050e1990e700d52c94117e9aef09610b87b2,2024-03-13T23:15:47.147000 -CVE-2024-2327,0,0,c906b117c59ff23e9988f74b5c7189269585558933b0efdb8319cafbe1f4cf00,2024-04-10T13:23:38.787000 +CVE-2024-2327,0,1,a7786a53bb7c4df3e66b854b45a310f7f5811391bb9bcee5783d76299a2ec745,2024-04-10T13:23:38.787000 CVE-2024-23270,0,0,9ffc7392eb2f4eff1860dcb80336f5a8cdd382df1e721d75c8ca7db15331f0ca,2024-03-14T19:06:02.210000 CVE-2024-23272,0,0,c9da5a5a9448d1badcb55f1bb94ecccfda01d4c50c7c75b1140074bcaecd426e,2024-03-14T19:54:08.100000 CVE-2024-23273,0,0,cb1e92b841add9beb7ff32d91364414d10118c43bd74e233718396f3b8460ec5,2024-03-14T19:54:26.287000 @@ -241273,7 +241273,7 @@ CVE-2024-23332,0,0,ad52e25a8e8aa939055f450db475e34085130355e0e6d4b9d3c88d3525604 CVE-2024-23333,0,0,7b8931efbf20aee2c14dc80ecf0d7a5ac3c4ce24616b4a2bde21d3ff46ae73e6,2024-03-19T13:26:46 CVE-2024-23334,0,0,08cde117a4b38806b93df46059f745f0c6d4757b2ad8859dd7f49ccce43fe183,2024-02-09T03:15:09.603000 CVE-2024-23339,0,0,ff39b3b78ba3a587e65c45755920a02972ff0423fe99d41c48ef314a8ec0f5c3,2024-01-30T14:30:28.343000 -CVE-2024-2334,0,0,648443538b52fcd046e4c0266deaa03264e1803f3bf39ab084e0441e5343be7f,2024-04-10T13:23:38.787000 +CVE-2024-2334,0,1,07a5ef4ee8e4439608d25c330c2279282c54bdac5cfaa3d5b02abd29bc53f7d1,2024-04-10T13:23:38.787000 CVE-2024-23340,0,0,1464843bbb79a1028e64685d9db4214cd46f9ec4abb91dc09759e94b16f2cd52,2024-01-30T14:30:38.267000 CVE-2024-23341,0,0,ce324aaf112e2cae8a68c291b93146bc0875f1df6506055e6ace2f0f3f2e87f9,2024-02-01T20:15:31.893000 CVE-2024-23342,0,0,bac4ba2407e52070a4eb8df36b2bc26632e701022247813db283330171613618,2024-02-06T18:36:47.733000 @@ -241283,18 +241283,18 @@ CVE-2024-23346,0,0,bb7c11f59ccc20504bb314d2d6ada7f0774d5a8cac55ad0601efb0091bf75 CVE-2024-23347,0,0,034d6b6be7c9394d46207db406e2c86dd7d449b275e683fc3c4141405dc325d6,2024-01-30T15:09:12.163000 CVE-2024-23348,0,0,92a7e7bef3ec1179e19ad5c2474f0b5313131709cf2a35687899de4d9c869ec9,2024-01-29T22:56:06.637000 CVE-2024-23349,0,0,dd612fd3207aeed84d29483560afd009900ae25b3e9e30c7def342c7dcf13df1,2024-02-22T19:07:27.197000 -CVE-2024-2335,0,0,1e8954a6f228dc1f47774f0efa07b2b573d8abdd29969e56e3c5712ce5501e19,2024-04-10T13:23:38.787000 -CVE-2024-2336,0,0,5ce14c744c3ba53aa613607219a5518a767e546f6ef15c2822d8d6faa547442b,2024-04-10T13:23:38.787000 +CVE-2024-2335,0,1,efe1e2a5a88779dcaa56517f16fc8862179b5ee96c6455caf55add5931f2e14c,2024-04-10T13:23:38.787000 +CVE-2024-2336,0,1,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000 CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000 CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000 CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000 CVE-2024-2339,0,0,fdf2e9587a4f32c10532c2236faf6d2db35a7825d1bc11064100d013b4c7d19f,2024-03-08T21:19:43.127000 -CVE-2024-2340,0,0,fb4ff7eea2ad7470bebbddfcdc7e0e78aee75a10d9f17fdc6f2e95d8afcd2bba,2024-04-10T13:23:38.787000 -CVE-2024-2341,0,0,6524442d60465c3b9d4b73c95ee093598fd1b495b8cf4c06a6878d4a752994cc,2024-04-10T13:23:38.787000 -CVE-2024-2342,0,0,5a11b5b81c8d2b43bba6fc113c126c96cbde7d86a8ca9423fbdfefaa79e6a53d,2024-04-10T13:23:38.787000 -CVE-2024-2343,0,0,b18c18d57c0e39a3e171648cdca079c3a003a99d3c8bfcc7e5dfb6bfd1b5fdfb,2024-04-10T13:23:38.787000 +CVE-2024-2340,0,1,d294e254dbf0f3063a7327aad236ad49fef30308d124dbaf763dd1f5f8508fa0,2024-04-10T13:23:38.787000 +CVE-2024-2341,0,1,b615bf7f92b7e741658437b7c86aa9f275b164bf2c92e64dfbdf656f94d59603,2024-04-10T13:23:38.787000 +CVE-2024-2342,0,1,7ed8c43ec4a0a8817ee152d2facabb20a4d88acc4a224e0b65bd61a23cae5736,2024-04-10T13:23:38.787000 +CVE-2024-2343,0,1,7cfebf43156d5b1866d864fa4db2f01e585938e762ad3cb82704eb59e8e4f5bb,2024-04-10T13:23:38.787000 CVE-2024-23439,0,0,75842703fc8396c264bf7f64d302dcdccc156c8a0d8e8ba1a2e2bc4a679ac3fd,2024-02-13T15:16:05.223000 -CVE-2024-2344,0,0,c753ed13c50b3c271cd5526079e052e20456ab7fb7c43bf1f3bdaa81d102accf,2024-04-10T13:23:38.787000 +CVE-2024-2344,0,1,9cae69222ac86b797893a236952e2b67d0f04fb96cc74f0182a6b9bc4a4c1da0,2024-04-10T13:23:38.787000 CVE-2024-23440,0,0,9dd065aa3db280abdb31ad5cddbf9a0771593c407067e49d6917c21b3390f15a,2024-02-13T15:16:05.223000 CVE-2024-23441,0,0,821a9fc4779da9403532f4be71c4c0616cc5f4f7bdd56ecb83e25ef4a979d675,2024-02-05T18:41:43.547000 CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000 @@ -241305,12 +241305,12 @@ CVE-2024-23450,0,0,6fbd14dba7c079ef13d798ab57ec4ea5a51f9ba377b47e78eb5f421772561 CVE-2024-23451,0,0,1527b911dea291b0766ddb3062c19eeaba982e875c4189924798b47289a058fe,2024-03-28T02:01:21.693000 CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000 CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000 -CVE-2024-2347,0,0,65bb1718b753cc79631661d9f158d7e686f84df247707244b6387519e8b21659,2024-04-10T13:23:38.787000 +CVE-2024-2347,0,1,72273356ef668e46bc249f1161d9e793d562ab02a3d6eaa18d7e41a99c45f641,2024-04-10T13:23:38.787000 CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000 CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000 CVE-2024-23478,0,0,b3a2615dbe854f9cd6f6758ce3a7c085bf544d3fb8c18446bd16ed76b713d059,2024-02-20T20:39:52.377000 CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c108,2024-02-20T20:17:31.460000 -CVE-2024-2348,0,0,e233605aee1f61183aaab69a1d7a37227bb7dc1e1c6880ac452e10f8d86b0b2e,2024-04-10T13:23:38.787000 +CVE-2024-2348,0,1,1b2471f8551c69b217b1850b52d1bf1e7f9aea8e8dfc43b59c7bf2992281c35f,2024-04-10T13:23:38.787000 CVE-2024-23482,0,0,9bbfaddb28c8d4f40fa7310b24a63cdb6abbe6ffffa800b3d9da686c071e8fa5,2024-03-26T17:09:53.043000 CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000 CVE-2024-23492,0,0,d17f20935d7800a39d4799e18e6d8e0d4e3c7e091ea11abdb4c06f64410c2404,2024-04-11T01:24:48 @@ -241407,8 +241407,8 @@ CVE-2024-23656,0,0,695cb145f7353545c42b021c49ddb6b311a4d25b9fa1e7632b8b33e1235c6 CVE-2024-23658,0,0,4fd332de96fe33333de93e4a2a6d5b75daef55cd44cb46bff5d3000338fc5623,2024-04-08T18:48:40.217000 CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32583,2024-01-25T14:58:22.470000 CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000 -CVE-2024-23662,0,0,ccce40118c5db0d909b4529d80177f035ec43468627722d24a0e29be59bc1da7,2024-04-10T13:24:22.187000 -CVE-2024-23671,0,0,318d767d3aa8219ced2dc552b9fd6e4988e340e4b4bb8cff1c841b13c19448fe,2024-04-10T13:24:22.187000 +CVE-2024-23662,0,1,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000 +CVE-2024-23671,0,1,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000 CVE-2024-23672,0,0,54bf1407d160f0bf02a84f88f834a69410f295a08745f6fc791198a038b82c2c,2024-04-06T06:15:07.717000 CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000 CVE-2024-23674,0,0,6ff4eec4bc6bf37404ee9cc16207f5af57bda7bc987c56668d0793a7a9ea14ad,2024-02-16T13:37:55.033000 @@ -241690,9 +241690,9 @@ CVE-2024-24202,0,0,1d105bed1b9a63d735bee37efd6d6c425165a2cc4b28137df80d69159f445 CVE-2024-24213,0,0,b32e26decdd6febd3030abfdfe583c112d658780e004cff40a19d9340ba685eb,2024-04-11T01:24:51.500000 CVE-2024-24215,0,0,d3883dc710155bd950a18903f8aa5eb2eda59d1e9725a4303b203ea7778b78f1,2024-02-15T18:08:47.813000 CVE-2024-24216,0,0,3c3e699d8ba3256f67c55852e9ef2e3011cfbebba9e6c02139e656f08115b8a1,2024-02-08T13:44:21.670000 -CVE-2024-2423,0,0,2fd334088309e8046cbd2af1f31bf8fcb75107a97a8c1080c0fcc2e21d8f19da,2024-04-10T13:23:38.787000 +CVE-2024-2423,0,1,5bfc4e68c37a4c14acd324fb416e78f1034dda3465a5e8e8246ae1e28c5e4cf2,2024-04-10T13:23:38.787000 CVE-2024-24230,0,0,ed6d69d70561399663ef8e2e33150b56625833d6257f46ca8936cf12e494e1dd,2024-03-18T12:38:25.490000 -CVE-2024-24245,0,0,a3491dc5b2dd404246a6bbad7e2ebb9b480a2d11a10cf05ef16bec3b18dbe471,2024-04-10T13:23:38.787000 +CVE-2024-24245,0,1,02b2177d08ffae0fccf9c4d152b876d37df4c8a7f2a57421ad045d08738c06c9,2024-04-10T13:23:38.787000 CVE-2024-24246,0,0,a359f80a084921532494c4fa2ff8f2a634ef8a2b8a955c0780fc32be13916cdd,2024-04-01T15:32:10.190000 CVE-2024-2425,0,0,42108437c542a39ceb0f679642e1b0ec6cc1a657618629f319596aa4231ada63,2024-03-26T12:55:05.010000 CVE-2024-24254,0,0,9339820ae71b7b870d84000911554e2e5f93e1c4ab945fdf5145aa252036f9c2,2024-02-15T18:46:57.737000 @@ -241713,7 +241713,7 @@ CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774 CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000 CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000 CVE-2024-24279,0,0,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000 -CVE-2024-2428,0,0,7e4667a956009570e8d71bd09f03b4f68ff8f4847f37f04b92705c326de93aad,2024-04-10T13:23:38.787000 +CVE-2024-2428,0,1,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd163,2024-04-10T13:23:38.787000 CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000 CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000 @@ -241746,7 +241746,7 @@ CVE-2024-24336,0,0,f4912e863fa74b8ab422c3568a4f277c89a6d7944484768fcb0717c5b37fc CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000 CVE-2024-2435,0,0,a82b6b668d8e82e4d367c64006f2c2586551c9f49283b8f01e55602069760d54,2024-04-02T18:12:16.283000 CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000 -CVE-2024-2436,0,0,187ae3d57b7a47aa9114b322d5eb5dee40cc87d9f0c32aa122ba94c441370d75,2024-04-10T13:23:38.787000 +CVE-2024-2436,0,1,0058451184de01ace2b295600d83c490983eb7c72ad2716d828043436e9ab2c7,2024-04-10T13:23:38.787000 CVE-2024-2437,0,0,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000 CVE-2024-24375,0,0,8b7b6d88ebdbf07fe35df57d72c437faa8e29b0694741b8e5685af13c2e7457b,2024-03-07T13:52:27.110000 CVE-2024-24377,0,0,4fd82afd92a47ec9c215e71594b94e69e50289be89a362cbe08c09e263cd1ed7,2024-02-16T13:37:51.433000 @@ -241769,7 +241769,7 @@ CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d7 CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000 CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000 CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000 -CVE-2024-2447,0,0,906e36be68bb3e3b54c27f29a8d05491b5e785fe002de5d733845b79907f4576,2024-04-05T12:40:52.763000 +CVE-2024-2447,0,1,98d6ee4bfc4bbcb879253b0dd170d35d54c74469ff0d71b9003eb54bde1e07ff,2024-04-05T12:40:52.763000 CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000 CVE-2024-24474,0,0,7ff84388b8a92907ef716e1ca2c29ef338e5f699b29d362e7b2c54bbc2735acd,2024-02-21T01:15:07.857000 CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf6901317f8,2024-02-21T01:15:07.890000 @@ -241804,7 +241804,7 @@ CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6c CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000 CVE-2024-24558,0,0,e1e4d32f901535a55c2f6412106d8d6d972ab259b4d2d031ab0a6368463e0518,2024-02-06T19:35:24.230000 CVE-2024-24559,0,0,a0cb86b836a7e79e3e1b100a5872aae73fa30cbfc276547c01a7202600c7c117,2024-02-12T21:40:56.547000 -CVE-2024-2456,0,0,a36337a098c24a50839965231cbd93bee89174bc30a905ec25db56b4d35b94a5,2024-04-10T13:23:38.787000 +CVE-2024-2456,0,1,50cc90bc41b3799405fb23cbe82f5c15d252305910bd20a549ad8554a4e042cd,2024-04-10T13:23:38.787000 CVE-2024-24560,0,0,d3bc441b7f7323645f1a247e96e6668e58a3a1d0f8c643e79ccfcc74a44eb295,2024-02-12T15:23:42.867000 CVE-2024-24561,0,0,5be80f6a2f32171d39ff2e793460c0d1935dad674bb1256dbd8e583d7f642aab,2024-02-09T20:21:23.980000 CVE-2024-24562,0,0,068ce50e95e6f4dfbeb293ae7d3cbe2cbd5b32a672f85c5a16b6fa473f0abcb4,2024-03-14T20:11:36.180000 @@ -241815,7 +241815,7 @@ CVE-2024-24566,0,0,1c28593bf7ac8d72460eddf815bd9259e38880fc391402b836a55cdd1fa79 CVE-2024-24567,0,0,7c1e78e89185a9f9c94c3bf7ac3d1d659c1daaa202331425dd879f090ea4a1a1,2024-02-06T19:41:58.417000 CVE-2024-24568,0,0,71e4d7a9cffee045b35f7529b4ff8de06e3a67341cd1b62224799bc4395a178c,2024-03-07T03:15:07.247000 CVE-2024-24569,0,0,2ae0964162999ff69a873ddfcd4f751b9f85cd23a8a1496e7a290b16cff36691,2024-02-09T20:15:06.707000 -CVE-2024-2457,0,0,b45dcee4413e9c3d8d96d6fb8fedc5f853298fd6b13296dee47550abf6184210,2024-04-10T13:23:38.787000 +CVE-2024-2457,0,1,01d6ba66b7578630af5b69fdb414eb43ee65ace20292b1afeca4d9b1f5138d83,2024-04-10T13:23:38.787000 CVE-2024-24570,0,0,8cd6522156c798652b314789606ec3a3ba27e15109454ffa128837b5f255a2c0,2024-02-14T17:15:14.840000 CVE-2024-24571,0,0,b3244a194c786b51054d765d55d7c0e78d86d16efb6803c8da9ef79216e9ceb1,2024-02-07T17:25:31.677000 CVE-2024-24572,0,0,0ef3e838a5a4a27207f9382de8c84c436e270ba7e51f50e14249ab80bf27e914,2024-02-07T17:34:10.943000 @@ -241849,7 +241849,7 @@ CVE-2024-24690,0,0,b064f3fea62dba9853729f8357de119fa88ea4aead23988b276e6e51ccb7c CVE-2024-24691,0,0,a76353515beadaf8c5ab8c85548352cb8d07fba46e2e52250d1013c36454f5d3,2024-02-14T13:59:35.580000 CVE-2024-24692,0,0,580d11b018a5e4d4bbd8e658047778e9899568d414cc4a0fa08655ce5029182d,2024-03-21T21:06:13.123000 CVE-2024-24693,0,0,36e2ec3a95914b813d61d4e7c82d051b203658aebe54474f144897f2ad128ac4,2024-03-22T00:41:44.403000 -CVE-2024-24694,0,0,98fe550e7ee379ec8e0f1153e160444ac08ff8e3643abbce6a31e7f6ace18378,2024-04-10T13:24:00.070000 +CVE-2024-24694,0,1,068a6104701cd88a375163b365faab013d80ab08263c551a2479b851e2edfce8,2024-04-10T13:24:00.070000 CVE-2024-24695,0,0,606c643a42f31f28b0c959359b82791b707a5a22460402bee290460756c5a48f,2024-02-14T13:59:35.580000 CVE-2024-24696,0,0,576100c87aabfd2cc5b0639b848a7910d803f378a6ee205e48b9f5fdb10e1485,2024-02-14T13:59:35.580000 CVE-2024-24697,0,0,28ddea48b1f88de42c49f013244848535d125d1e05c0c1f34faaf6ee6851bc2d,2024-02-14T13:59:35.580000 @@ -241937,7 +241937,7 @@ CVE-2024-24805,0,0,e29e332c74f752c041b199d456a830edbb89b88194c491ad82ada59c027ad CVE-2024-24806,0,0,c22f635b0a8e149aa103df5ec505273138fb224093663def7772242037a61135,2024-03-05T23:15:07.867000 CVE-2024-24807,0,0,2d34e5a71f21b856008e0b8570ab5cdf60822d8a0563980a1edf758417c67389,2024-02-12T21:41:24.647000 CVE-2024-24808,0,0,bdbd983ba6c1a4b09d677aa089f9419ebf22e351f535d11a049fcdc6e3f33540,2024-02-13T22:48:57.290000 -CVE-2024-24809,0,0,8b1f459f1e82398741621383d387219ba488c3708d360ad27178b205aae38a4d,2024-04-10T19:49:51.183000 +CVE-2024-24809,0,1,d874717865fc012d305f784225b2b23635d949f1bd288015d58a446d7aa15bcf,2024-04-10T19:49:51.183000 CVE-2024-2481,0,0,88c0a3b39ab4c159a7ab630dcf536c234c59a9afd39f365d3f678bb6bfa9f03b,2024-04-11T01:25:24.573000 CVE-2024-24810,0,0,9dab4129d1c20588c512bce77a7cc1f7e1b1d517809a86dc2acb61d422d4f488,2024-02-14T20:12:54.643000 CVE-2024-24811,0,0,a42cc7b4d95d752401262af12a58e0c503baff6bc12320ad45002a6cf532b477,2024-02-14T20:26:39.143000 @@ -242026,7 +242026,7 @@ CVE-2024-24905,0,0,d7e93f9dc91e7e0fc974d5294e6bad29e608d74322077ba4d39a1c57043a9 CVE-2024-24906,0,0,6cea72bb7f9258908c1ed1c3f8325d4f06f0b542821e0483a147e01b51c62959,2024-03-01T14:04:04.827000 CVE-2024-24907,0,0,df860e0bf6b93f40d4575a350995841695d535878bc5da8a5944cc146004b078,2024-03-01T15:23:36.177000 CVE-2024-2491,0,0,56d5936f32866edf29962cfc16d1b84e21384fb0d36dc5404e3888c50a6878ee,2024-04-01T01:12:59.077000 -CVE-2024-2492,0,0,57cb6f6447e01ef0b805077bcb5e843e626213239d46a8d23d1437f29946d36d,2024-04-10T13:23:38.787000 +CVE-2024-2492,0,1,a83da3e7ac12e71f3238f0026df94ba19b3a7e74326df6047a5459c611fae961,2024-04-10T13:23:38.787000 CVE-2024-24920,0,0,0c6e0a299c3dcb3e2c9c47cd3391320c9c9126b8fcb7683d54f65bff941cba09,2024-02-13T14:01:00.987000 CVE-2024-24921,0,0,2756f13f54e6771800d4e52f7442498e73a8fe2b3f97e730b1c320dbcf7f624d,2024-02-13T14:01:00.987000 CVE-2024-24922,0,0,680b15f3fa23668c58f8fb97e1903f0bb50dd4180870bdd41f68c0313884ae2b,2024-02-13T14:01:00.987000 @@ -242070,19 +242070,19 @@ CVE-2024-25003,0,0,81fc44567692de3ff8c7fc733c0c0e2d235894df02bbd6e47e58282e05233 CVE-2024-25004,0,0,7a3e97355ce2dbcf95cced55d21b2139e157cf3c2ca72e6e2fce6c561e1f0059,2024-02-14T20:15:45.980000 CVE-2024-25006,0,0,278d69bef7a5b71fea8ac282ea762bfb648a5b4e588b178033e660e47357f487,2024-02-29T13:49:29.390000 CVE-2024-25007,0,0,19dcf4d2e7dac0a9583b14c230680f508f36f7285f2d93f9df004bff9ec0d268,2024-04-04T19:24:50.670000 -CVE-2024-2501,0,0,d6cc996122268160caa98c5277bb53a4aab7397dd2e9d58b1005b4aa5f52213c,2024-04-10T13:23:38.787000 +CVE-2024-2501,0,1,b5cf131f2289d74297b2dbc19cfb603ec735e9b1cc811c1a98b1a3682a5e2b82,2024-04-10T13:23:38.787000 CVE-2024-25016,0,0,7e9eb7e6fcca7e9c1cce27612a823457d13842f65d70f0e121b2ced7865b5e82,2024-03-04T13:58:23.447000 CVE-2024-25021,0,0,268da4d399cf08337d73768c3fd4fa53ef33e5f2d74019133c16ace4407a10a2,2024-02-22T19:07:27.197000 CVE-2024-25027,0,0,506fa0f038304c2bb065c6aafbb038363984a8c8037945872a1b74013246a31c,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,d48a17c1d5ef1bfa6fbe7d5b73144f127d39825001bfd50aa27289e6a7875699,2024-04-08T18:48:40.217000 CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90bde,2024-04-03T17:24:18.150000 -CVE-2024-2504,0,0,3040c8c2ce875dbba7058169acf164ea9f7e262af6640fc001259938b402cb8c,2024-04-10T13:23:38.787000 +CVE-2024-2504,0,1,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000 CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000 CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000 CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000 CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525ccf,2024-03-04T22:43:15.337000 CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000 -CVE-2024-2507,0,0,508445926df697fd9784e7984445d946255ab6a7d9811bf65dcf21dc750671b6,2024-04-10T13:23:38.787000 +CVE-2024-2507,0,1,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000 CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000 CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c62f,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,c28ed534590feb1739659669df4a7c74247df29d1ac0d5daa9ed512959af803c,2024-03-23T03:15:11.330000 @@ -242111,8 +242111,8 @@ CVE-2024-25111,0,0,f72e8e44455321d1ed6e80f096ea71e33de3e8d0ccd8f6d4c6adc0c0a3546 CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000 CVE-2024-25113,0,0,e5d677582d1aad971970a68e649e33cfa2ee5186bf6cd06840ccc711efadc8c5,2024-02-17T22:15:46.660000 CVE-2024-25114,0,0,ecee9bf310f42cdc25e42eb7e8e0873fc105e6d49306efcf1c5e89293138d56c,2024-03-12T12:40:13.500000 -CVE-2024-25115,0,0,794c10d60d8e1725eca84ed0066a7065ae3508dff9f1721135be35b3b3d23a89,2024-04-10T13:24:00.070000 -CVE-2024-25116,0,0,95fc552ad9539e955af94b91d5a5bcb7ad405eb25544fcc94fd6818e13f80f36,2024-04-10T13:24:00.070000 +CVE-2024-25115,0,1,d7b3827e35febbe79a761dd59ec0928f5034de9d955c8c41bc1f0d9b9d493132,2024-04-10T13:24:00.070000 +CVE-2024-25116,0,1,0d1db2b0cf9b0caae53928dcc37415d5405f80d4e58fa13006b0352305fd371f,2024-04-10T13:24:00.070000 CVE-2024-25117,0,0,cce25568087f33e003e408ef917e795ca999bd847bf0523692770a2f14b70a2f,2024-02-22T19:07:27.197000 CVE-2024-25118,0,0,3fbb7bd2ea030169057e53aa8097cf72e542454fa697c8e1373dbceac219b3ce,2024-02-14T13:59:35.580000 CVE-2024-25119,0,0,7cd87f99fb66775df0c616b08a2a8e7e6786731a0a287e8bc249c826bc7816c6,2024-02-14T13:59:35.580000 @@ -242125,7 +242125,7 @@ CVE-2024-25125,0,0,03925adfa38bf797dc151fd5680f0ab37a79a2912dfcf8cdab7cc1499ec66 CVE-2024-25126,0,0,e7fe7bad13284a29baf3c16af90815094380793e5b5c321ae600676a2f216b98,2024-02-29T13:49:47.277000 CVE-2024-25128,0,0,7334aec016c577035ebb2657507ac671a422c14b4804f2c352282d58d31a1359,2024-02-29T13:49:29.390000 CVE-2024-25129,0,0,d73ea0e489c6e407bc8e6650eadabb3fab8ef2de749cb8e03138e3f9975ee423,2024-02-23T02:42:54.547000 -CVE-2024-2513,0,0,1f3ee4cb9150b585d76dc06f589f10b1bd120d3359b2c80cb619d2aad6ecee83,2024-04-10T13:23:38.787000 +CVE-2024-2513,0,1,f14fb8418d7d2e52f53318c37a69f53d74c808a0bec442a2f388a4035004f9f0,2024-04-10T13:23:38.787000 CVE-2024-25130,0,0,dfd3b71b6f109c56e49cc2deb90049d7c8b1e363f41477ddb743b8c28ddfbfb8,2024-02-23T02:42:54.547000 CVE-2024-25136,0,0,d3d5f32dfa8a7a75500d820e2e9106e7e9713b7d91708c8855453059f3e65a8b,2024-03-27T12:29:30.307000 CVE-2024-25137,0,0,280354fc4c48d5adb5372557b7f211349643cd58f8ff011fa0d7219bb58f9430,2024-03-27T12:29:30.307000 @@ -242134,7 +242134,7 @@ CVE-2024-25139,0,0,74a1a5b7a626d7e1a0de61a1ac7f86e47d772626c4f0df2c72c44f9b9fe45 CVE-2024-2514,0,0,96aa0d3cf09a0ef3fcd86890da8f9fdea178ce42d022735887ee7f8798ba45a2,2024-04-11T01:25:25.547000 CVE-2024-25140,0,0,e0076fbf31538b086dd52a856ddfe0d9cdd6db5df39f7558a16df193b37935a7,2024-04-11T01:24:55.113000 CVE-2024-25141,0,0,48f7b04af2e96f1eec8716e65032c2fb66196d4c47edca9d45198681efaeed74,2024-02-20T22:15:08.670000 -CVE-2024-25143,0,0,1e8c832f1a9dadf4942cad4aead6d2b651b3644cad4a347f966955fac6cc114d,2024-02-07T17:04:54.407000 +CVE-2024-25143,0,1,7a38d7256730cc2c02a81fb1740e1251b0cdcb86272bba7bb704010555e7d14e,2024-02-07T17:04:54.407000 CVE-2024-25144,0,0,a6c13ad7167848c49a5d40b01da68d21d9e0c28e7dcf9021386119f5261fbaa8,2024-02-15T04:36:24.350000 CVE-2024-25145,0,0,4d151fe37dc24069dd8110580bdd4f039d66d4f3402218ddef43cec9606e51ad,2024-02-15T15:10:35.503000 CVE-2024-25146,0,0,013579f9ad5fbd09d96a5f18f7da7c3d6883c1239dae1f074da9550709e7bb36,2024-02-15T04:37:12.337000 @@ -242253,7 +242253,7 @@ CVE-2024-25350,0,0,4025b81199a224e7878ebb894cfce4cd4a7613ab77d81e491781294f34953 CVE-2024-25351,0,0,b34112a1dde05e9e9b4f5cfa676ebc0f3ddbf68e11e3555b3133c6ff3fc419ef,2024-02-29T13:49:47.277000 CVE-2024-25354,0,0,f42efd766ea7de269c602d96eef2e737ebc201c930b7678451ec9c71ead98d82,2024-03-28T02:01:13.303000 CVE-2024-25359,0,0,e52a0991ba8548dff26799e463bd4b47a9488509a0199d8c2e3284055fd171da,2024-03-21T12:58:51.093000 -CVE-2024-2536,0,0,aa8f1eeb222f3cf39a58c7dabf82d7461827ad429b90dd3c9b15a4ae633fc12e,2024-04-10T13:23:38.787000 +CVE-2024-2536,0,1,671f61d8f69f123ac0a044d4939347c45ec1c01a8fc8620d0ca3b16f74cc8685,2024-04-10T13:23:38.787000 CVE-2024-25360,0,0,1c224af52aa70bed49a607a4215cecfbab2aa2b1075dbd9a5d0950bdddee46dc,2024-02-12T17:31:21.670000 CVE-2024-25366,0,0,42444ea7163dcf216e98149de6c852e3a522cf0916fcfc86ec3c2f68f59c5418,2024-02-20T19:50:53.960000 CVE-2024-25369,0,0,6b635a0ec16a5aff0496a1a96852f7939fcabc08a5bea78c4a18bfb5071718c0,2024-02-23T02:42:54.547000 @@ -242266,7 +242266,7 @@ CVE-2024-25385,0,0,3d2189f37c69e02ce7f2d6f668e9f0e15554305edf58754347a8471b02d03 CVE-2024-25386,0,0,b3e34473858eb8e804a89ab203abac2433271329bd78e7f08fb63dfed4e84395,2024-03-13T04:15:07.960000 CVE-2024-25388,0,0,7378fbfbad07c3a1df4c0c9a1829967464c6dab19312e7a7fabced11f827ce3b,2024-03-27T12:29:30.307000 CVE-2024-25389,0,0,27c52fda9fac5a1ae583386d983618027a20f67ffa3e219595822128703dc64a,2024-03-27T12:29:30.307000 -CVE-2024-2539,0,0,dce2cb4b244ba2e91e80ffd4f401e7ff6d5c8fed50d0441d217f4798e104d9d3,2024-04-10T13:23:38.787000 +CVE-2024-2539,0,1,f25f12532940b515866968371aba8ed1356f3c8da800c6922f39d9ae9e60a0cf,2024-04-10T13:23:38.787000 CVE-2024-25390,0,0,2ba9fb0ea6d86778ddfdf726a7cfb9973a33bce589b33500d3efdd6440a760dc,2024-03-27T12:29:30.307000 CVE-2024-25391,0,0,1c117a537f777fe2a71170697d3cdc756bc2722eeea16080a6a080558b8e08fd,2024-03-27T12:29:30.307000 CVE-2024-25392,0,0,b0f1384b3e79f88728b946215e9a8e5385498d18b54d51bbb89ac255b523116a,2024-03-27T12:29:30.307000 @@ -242289,7 +242289,7 @@ CVE-2024-25421,0,0,541431fb721c49167084cbc501b059961969c28902a19d56e08bf6556ad2c CVE-2024-25422,0,0,9045d15a9a7aafc5aaaae0629255ad0c09af460732a4878c1110a6bd32d7e5a3,2024-02-29T13:49:47.277000 CVE-2024-25423,0,0,33cd9c56ae4cfa1d6cc2435a00a829df789b80150b430b34308e45329f20c67c,2024-02-22T19:07:27.197000 CVE-2024-25428,0,0,c9a4a68822ce56f9f70c0633568698e7786e1f54738d13d0ca759099f302c24e,2024-02-22T19:07:37.840000 -CVE-2024-2543,0,0,b44f6c0d70669027b08a6fde86a42e912fd6831f64e2f82993952f6b314fcc8a,2024-04-10T13:23:38.787000 +CVE-2024-2543,0,1,948700ae15fbd5c1866509dc944be18a443427fe1c4b177507ba1136d9b34fa6,2024-04-10T13:23:38.787000 CVE-2024-25434,0,0,697a02c9c4f985f6fefec935d860bbe4ed3c1b769b3e0509b4ac3ebf45248c8e,2024-03-04T13:58:23.447000 CVE-2024-25435,0,0,5aa64975be08e57a704a6c841e36caefc3d38b78728fcb0e2c8d354011089ffe,2024-02-29T13:49:47.277000 CVE-2024-25436,0,0,47927030ec98577212362a78e90252dfa20b99724b765bcfdedadc73bd03f0bf,2024-03-04T13:58:23.447000 @@ -242626,8 +242626,8 @@ CVE-2024-26042,0,0,03fb2b5cf170bd39573b8f257ae9b6c28ef1a40fa07083818bdc3995b5db0 CVE-2024-26043,0,0,482a4a425af4039a702efaeef92551e13284c9f8eb3db7356add7273dc30e590,2024-03-18T19:40:00.173000 CVE-2024-26044,0,0,b518a3376dfbcdc4f83fa3b2d9e9aa7fb63d94b00df6e18c01713440a53013e6,2024-03-18T19:40:00.173000 CVE-2024-26045,0,0,08942c292372cf3993fdd01e67d959f5107895a4448dcb7babde70b37726ebce,2024-03-18T19:40:00.173000 -CVE-2024-26046,0,0,938562451526d5eb19e1bff96bf5c7fda03cc035bc668e6176b9b0041bbe8bae,2024-04-10T13:23:38.787000 -CVE-2024-26047,0,0,b2ffe90c20ed35452336a2a9c826fbfc22917e65d06d830217881817c5ce051e,2024-04-10T13:23:38.787000 +CVE-2024-26046,0,1,969d4eff29122249810e6ff396f0b0c7f84bbd4a3fa2126981b0fabc208e6dee,2024-04-10T13:23:38.787000 +CVE-2024-26047,0,1,ac1aa5ac0bff812109d9943609f1580f1fd36fa5bc40f7651eda21e3a793dbc5,2024-04-10T13:23:38.787000 CVE-2024-2605,0,0,90950600e560f983be09997b2b7f2779a7e2fc74a8a6e0a38cfc34d5bc304f4c,2024-03-19T13:26:46 CVE-2024-26050,0,0,eb9ee431559af9d829793f6818c55fe93ed678728fdecba000208e2984060695,2024-03-18T19:40:00.173000 CVE-2024-26051,0,0,4438091cbf0beca4bb3839c89b87ec0573c089871d69c37c30147fa46e48e963,2024-03-18T19:40:00.173000 @@ -242644,17 +242644,17 @@ CVE-2024-26067,0,0,6cf3689ffa7432b284a37dceebd0ae5bcfb5fc56073ba00c111269d1c42a1 CVE-2024-26069,0,0,a1c7c95b874763881b1f03e8593110c4a631a69d80a788bcc9b57929f7af8905,2024-03-18T19:40:00.173000 CVE-2024-2607,0,0,89a26984e83bf730f9e0ffcdf869aba87099eedf56fce22909503cb84d4113dd,2024-03-25T17:15:51.727000 CVE-2024-26073,0,0,be3d519e9b30d51cbf4ccfc39d78d1364251c98dd2190cc75119ad7d31d9fbba,2024-03-18T19:40:00.173000 -CVE-2024-26076,0,0,410cf52453bf7c3398224aacbf1da1f2007d9e49c121e47f1afb614ef58507ac,2024-04-10T13:23:38.787000 -CVE-2024-26079,0,0,e529b5298cc6d5271945876a212daf44479347c483dcc8b59ca471ed38c0bae9,2024-04-10T13:23:38.787000 +CVE-2024-26076,0,1,dd253dd02ca5cdf33476fa07aa48b0d3b8afaffb5fcaa6203628f4bd44edfdb2,2024-04-10T13:23:38.787000 +CVE-2024-26079,0,1,d38ad5703492e3d5955769f8da924f53fd7fefeb38650250cfec3e979713edbc,2024-04-10T13:23:38.787000 CVE-2024-2608,0,0,ae6bcd3c34b2e2d2990ddd5b5011c47bd45b71daefa72e13093360a8fd3053e7,2024-03-25T17:15:51.783000 CVE-2024-26080,0,0,985369cd20039768ffb9e0a343ef3ec94259ec110458f9976172d6fbd3da993c,2024-03-18T19:40:00.173000 -CVE-2024-26084,0,0,f87181a4f0d6329301e983866197cc0130097c58749620ebdfbd6f6bc6b687f3,2024-04-10T13:23:38.787000 -CVE-2024-26087,0,0,66c2ef0198502511d324d148bb6414ea2cdb2fed582ca56debd5ebf07750e0ac,2024-04-10T13:23:38.787000 +CVE-2024-26084,0,1,4198569d9b83e7c17fa91f0baf1eeab883647801d84066753aca49311c01beec,2024-04-10T13:23:38.787000 +CVE-2024-26087,0,1,79a90816bd0d6064ff1c3bd6bcc349fec6b5af43993ed0a4b50116beb1f7cb07,2024-04-10T13:23:38.787000 CVE-2024-2609,0,0,8d3ff4f3b7e7487dc1449c9749529344da068210715a909d46b995312841cab1,2024-03-19T13:26:46 CVE-2024-26094,0,0,115591706a1991dd063241a84e1b5d445de4b8fd9fdb36186da6ec8b646a848b,2024-03-18T19:40:00.173000 CVE-2024-26096,0,0,84e4ab51865319a31a25e45dde90a75fe091e9b10c864322c7ee514e973d84e6,2024-03-18T19:40:00.173000 -CVE-2024-26097,0,0,2d22ccd7423d13c440e08d3ea39058336f1d994fd4cd629801f598f08385efba,2024-04-10T13:23:38.787000 -CVE-2024-26098,0,0,dab0cbeac521de37486d9b8f9ed6a5e20119cbec83be85b4f3bad3e5ddaf0129,2024-04-10T13:23:38.787000 +CVE-2024-26097,0,1,7ae84bcb4f2242da5f1cb9c97a939f17dfa4e935e4c482bd4227896c976f6e45,2024-04-10T13:23:38.787000 +CVE-2024-26098,0,1,6c35094d19d48fca0f427ce960b728809731e7203794cace89106aa1f9639bc6,2024-04-10T13:23:38.787000 CVE-2024-2610,0,0,67723a01564f2caea2c87514edec943383e963cca14b6936c961f3c55ac7dad5,2024-03-25T17:15:51.833000 CVE-2024-26101,0,0,2bf0c5ae81eb658ae920761740fba30a13654d6bcbf86dd4e653e1de81b7da64,2024-03-18T19:40:00.173000 CVE-2024-26102,0,0,a1f3ece58b171923a5a838c81e95df1660daf279c6c7255c4252f371b8a78bab,2024-03-18T19:40:00.173000 @@ -242668,7 +242668,7 @@ CVE-2024-26118,0,0,963ae62af66a2ea966470a317245a015b7cd01b5e05579f193a4ff306d392 CVE-2024-26119,0,0,923abcc576a87c27af1ca6d3c3002e8f022c78a64cc1bd3e44c7feebac90f9a3,2024-03-18T19:40:00.173000 CVE-2024-2612,0,0,563748cada404dea46a8a1098e6e9010359bb31f9781cebd62e08951dacf5761,2024-03-25T17:15:51.923000 CVE-2024-26120,0,0,e5b5d998e52f780cb5d1f40c7c4390d3b1515abeccf20370448b68865fa00009,2024-03-18T19:40:00.173000 -CVE-2024-26122,0,0,8c04d9ca00ba640412adc0b63e2fc98f7f1aa3c1ab7af9467b58973c1c3b191e,2024-04-10T13:23:38.787000 +CVE-2024-26122,0,1,ebd0b44b5bc15532d34026512ae127f0930d62b2b57bf3dbe4bee69b04bdb3de,2024-04-10T13:23:38.787000 CVE-2024-26124,0,0,ab8f2017ef0c3d450afff0e4d68ea6b589bbb2fecbbaa8ab6de815da1a5b12bc,2024-03-18T19:40:00.173000 CVE-2024-26125,0,0,0e1aa1a870111e13cba190593df732023dd1a768da77b87d37882fcb57fe6b32,2024-03-18T19:40:00.173000 CVE-2024-26128,0,0,c70d7cf32a5694fc3f84894b4fd56cc1fe56399910a443c60418b95af56a6cc6,2024-02-23T02:42:54.547000 @@ -242708,93 +242708,93 @@ CVE-2024-26164,0,0,7a5a47325a52b9d58c705dc706d735c42c05e49e17dbe17668afd9c66b85e CVE-2024-26165,0,0,a1425dd3ba6a9256a35ea0d63f285ba1e05f8153f9e51034a0497747fbc27ee4,2024-03-12T17:46:17.273000 CVE-2024-26166,0,0,f391c4b0db733d40148db48047d4241707d804226a4057e01c2cdc7ed3c4af9e,2024-04-11T20:15:33.987000 CVE-2024-26167,0,0,c7ef30deac9cc168daf190a6134ba584248b8a1ef0f1584bf395b9e88fcd8841,2024-03-08T14:02:57.420000 -CVE-2024-26168,0,0,2c405304f64c19f28b043c27e9907b9082eb4597256c0fa1fef18cbee19e125e,2024-04-10T13:24:00.070000 +CVE-2024-26168,0,1,949af59ee3b8c1baa60afaabce6faf5f018a8b72d7b8397412fa4ad69b2f274a,2024-04-10T13:24:00.070000 CVE-2024-26169,0,0,2d1119475d439c4b121ffec0de24c31b9e211863770703474be28295dbeee3e3,2024-04-11T20:15:34.100000 CVE-2024-26170,0,0,b923c0fa6e4f0b77c0dadd8ee680132ca97043b58671f05f987b51d479a0edc4,2024-04-11T20:15:34.203000 -CVE-2024-26171,0,0,45a38d2c18f5fc35933996dd56fffbc90ced4cff206190237d37ea5b306e5e99,2024-04-10T13:24:00.070000 -CVE-2024-26172,0,0,770aa8dfc3c5f40f32f5b8d7f4d54f83e447a52775fd3e91dcb84430ef2a7d82,2024-04-10T13:24:00.070000 +CVE-2024-26171,0,1,9585df40c5f7289258f98464992d6f7b36d924236a4b679b88371a3376d72c9d,2024-04-10T13:24:00.070000 +CVE-2024-26172,0,1,c6f278d7e7fafad9e920f5166d13c7edaac3efa6dc535e1f3334920cb3dd37e9,2024-04-10T13:24:00.070000 CVE-2024-26173,0,0,e33d1fd736b59f657ec387d7529ba1e1cde39fd167abf346a667f8ac2153b5c3,2024-03-12T17:46:17.273000 CVE-2024-26174,0,0,9e513d57e50b9338000cd9327d30b626c06fb8e9c0ed4bbca1a259e4ec582ab2,2024-04-11T20:15:34.313000 -CVE-2024-26175,0,0,1208ec694cb77fa8e74f3fd459aa9f0f7a5d16e9149f79a4cbae7057b2784a46,2024-04-10T13:24:00.070000 +CVE-2024-26175,0,1,9502ef7a505e9bc3ab50fe796acaf120e3ddae048baffc4a254a12810263040f,2024-04-10T13:24:00.070000 CVE-2024-26176,0,0,f59903f2631e58e79a3070c1f29430524476df93867e947d3ea24ca678f70e53,2024-04-11T20:15:34.400000 CVE-2024-26177,0,0,5e5591b51929988e6d47df6b283f8296af1e7f5e6dd74dff0a5dcb3d5b9bd2a6,2024-04-11T20:15:34.493000 CVE-2024-26178,0,0,0ea3ff59f80ecc740a7520fa54df65db9194a0e2f5b284e4a28108c6cdd7c32b,2024-04-11T20:15:34.590000 -CVE-2024-26179,0,0,ead33c661e152d0f60d329524cf500b91aaf67564c3f32d2c4adfbe7ea3264a4,2024-04-10T13:24:00.070000 -CVE-2024-26180,0,0,124e71d0e60dd5b5ddb896edf54ab56c1d5dfeff3766f7c83d1f4063dd0619a0,2024-04-10T13:24:00.070000 +CVE-2024-26179,0,1,2c0e9c26edbe7391894ae0316bece6d7f0e00e30d0dd35ed10702d1f0851486d,2024-04-10T13:24:00.070000 +CVE-2024-26180,0,1,2642e54652d0be099215ac2592071956276bb0b78149f1f8d9ba58e9dd3a0ce8,2024-04-10T13:24:00.070000 CVE-2024-26181,0,0,3a411991e2aecfef78fa22d696562d983ee0c725c3bcbac06e5fb980d6ae1993,2024-03-12T17:46:17.273000 CVE-2024-26182,0,0,485ae09810036858e090542cbab32de37612825a546d21a345f4c90039e51c49,2024-04-11T20:15:34.707000 -CVE-2024-26183,0,0,ca19f42b6c3da15a56410d4a6127a90050d9b5330398cba9c766e0d030a8ca2d,2024-04-10T13:24:00.070000 +CVE-2024-26183,0,1,28caf9fc957a2961602c26f17ce14c17950995b5ed55b7d5cdd2976488235c63,2024-04-10T13:24:00.070000 CVE-2024-26185,0,0,6e745f64b9530fceedea2868b774af86932bc48ec5b750819a4e5aa823ad37d8,2024-04-11T20:15:34.800000 CVE-2024-26188,0,0,cbced0ad38341d6a0035f6538415d27dffda3a0d4e621c0cbaaaeee14ff9bce4,2024-02-26T13:42:22.567000 -CVE-2024-26189,0,0,59214ec354e2f2e4d7f8fd52e770d13345d517dbb11adcadd6e79cd74651b576,2024-04-10T13:24:00.070000 +CVE-2024-26189,0,1,1f95108b705e718e6e21af2a68b22c3ad95b6094387a864e506ddc314b4c700d,2024-04-10T13:24:00.070000 CVE-2024-26190,0,0,76526318d1c3b640ed017a80a37e549397fce3426a35285fe2d480c510b19d0e,2024-04-11T20:15:34.910000 CVE-2024-26192,0,0,c1e942eeeb9f7e77b820994815c0152ac4eb6f717d3961fe34eee61ad41ed3ff,2024-02-26T13:42:22.567000 -CVE-2024-26193,0,0,99baa8d720e4510e90796cef0e7ffaf6321628120664f91b2673dc5a66457e5e,2024-04-10T13:24:00.070000 -CVE-2024-26194,0,0,5c4583ddc938297b846af5382a458fafd990cd714b814c89419ccf38f01b36f1,2024-04-10T13:24:00.070000 -CVE-2024-26195,0,0,bb7a48cbcc79f7fb060f9fa60fd47a1aa7864ae2f3d7e1b82779d744f3c214e0,2024-04-10T13:24:00.070000 +CVE-2024-26193,0,1,11dc10de408e0eeac89e7f5c9f988e275d3b49f10a7e40608511a2378684373d,2024-04-10T13:24:00.070000 +CVE-2024-26194,0,1,1178b3d1cceea5f3af742d5f3341232cb85468232559f83781b4bab6643439dc,2024-04-10T13:24:00.070000 +CVE-2024-26195,0,1,ffdd20db71cd126f38d1f4852c3772c9faa8ab4ba22fae9502cb6db4ea07270f,2024-04-10T13:24:00.070000 CVE-2024-26196,0,0,1ee43aadb57b3b8ca7d28d011e60635f3daaaef1122662143a55d71dc16b6177,2024-04-01T15:23:59.877000 CVE-2024-26197,0,0,d2427241bd7a7514eb5dd09d72f4dbbe122c7dae85c0aacf9d871c0db998fa60,2024-04-11T20:15:35.027000 CVE-2024-26198,0,0,49f0d8eaff7224b58c03d9c724e0ea0b8c931116d6256f8e155eb59f945506d7,2024-04-11T20:15:35.127000 CVE-2024-26199,0,0,5ee5d30f2af04f456f9a7ca3eae9a1036d222f0b01e33d3ba424ad44f9310e30,2024-04-11T20:15:35.223000 CVE-2024-2620,0,0,abaf194dc1788505aceca959648ef75759c7eff00f2db6839095205b9867dfa4,2024-04-11T01:25:29.957000 -CVE-2024-26200,0,0,7dfa96536d7349ba78ef3f9802d88ddca45b558a4eaa76cf915dc611e4bb505d,2024-04-10T13:24:00.070000 +CVE-2024-26200,0,1,ac9a900f7f82db1de9b375020212489031795f56e3644c5afcd9936ccd1f1d3b,2024-04-10T13:24:00.070000 CVE-2024-26201,0,0,7dca8dfbfd9d47f0893d0c28f71f752210fb3d0378ae8013bce3377ae0b0b18e,2024-04-11T20:15:35.327000 -CVE-2024-26202,0,0,e793f2f11d419ef1a8fbbc7aee55fa8c03be9b64f257dba20a36488f7a11ba79,2024-04-10T13:24:00.070000 +CVE-2024-26202,0,1,9afbb3c203aa077c49e0c21dc715de9545f55ae9683dc7ffea9563fb866dd22a,2024-04-10T13:24:00.070000 CVE-2024-26203,0,0,7c1cf72e526455e70011b15834b5a8d8b572ca60f5b5c39751f37b553ce90643,2024-04-11T20:15:35.420000 CVE-2024-26204,0,0,f8a87c4023a9ea8eaf9565814ec84a7de3ef88eb1646fdcdda062066adbe4900,2024-04-11T20:15:35.527000 -CVE-2024-26205,0,0,3f84a77ed1dab84314d1f49dcd8e212a07d5e131e6023ac077bf94d372f1fcff,2024-04-10T13:24:00.070000 -CVE-2024-26207,0,0,12521272cd6b66696e5597b7f61bddb49b228ae5053c58aab9e1f7a832b15a78,2024-04-10T13:24:00.070000 -CVE-2024-26208,0,0,bf3fab1d67dc0b939ada750508b74a1795ed40536ae676a27897ba394e49dc99,2024-04-10T13:24:00.070000 -CVE-2024-26209,0,0,015cc4e19aa882e5e7c642de00822a4aee0183708a373f348bb3467187b9ac89,2024-04-10T13:24:00.070000 +CVE-2024-26205,0,1,77a23cd894df001ef88d657235e0ec136a4faa76f9606336a92f8416a0ec7bcc,2024-04-10T13:24:00.070000 +CVE-2024-26207,0,1,a5463f0881d194da5172c38c2be07e734307c8a81dc93caf7ac5b0b0560ab175,2024-04-10T13:24:00.070000 +CVE-2024-26208,0,1,52e3ca1e3454e32acef35108a8bf7c3f80b2183119bc36b4e85fd793c1dd08c1,2024-04-10T13:24:00.070000 +CVE-2024-26209,0,1,82682c39e122c502344cfec99060829696dc591186b810997b9794a17a4732c2,2024-04-10T13:24:00.070000 CVE-2024-2621,0,0,4f6c6ce5b32aca344418f982f60fcf3f133c07adc6baacc5b8752bde5f3c7b29,2024-04-11T01:25:30.040000 -CVE-2024-26210,0,0,b09ff64b29a2d8b5b432d1c5af1eb32c9a2a29db5f680eddb0bc9179b2f86532,2024-04-10T13:24:00.070000 -CVE-2024-26211,0,0,5102fceb7be22318b281df4f815f38fdf55f9a207a0815cd3b8c6382c2de0236,2024-04-10T13:24:00.070000 -CVE-2024-26212,0,0,caa9977cd472b0f2d6b105d79e97aaf9c7f6f701ed3b3898fc345c0d3ad4ac82,2024-04-10T13:24:00.070000 -CVE-2024-26213,0,0,c109e08db5018ef416030f47bffdffe9e92f0e9a07baf1a029a880851c1dc412,2024-04-10T13:24:00.070000 -CVE-2024-26214,0,0,8912c651fb54d7ec786dec6f4b36c547098d9d2704c12f9510ea589567f5a3ab,2024-04-10T13:24:00.070000 -CVE-2024-26215,0,0,1d9cca8614a443532fda2270b2a8416a163438a11c3bcdd0d75b1247d77105ec,2024-04-10T13:24:00.070000 -CVE-2024-26216,0,0,e75fda88e13947dd160d9e7ca5700ebaf996fcabd98fa28a8aef3b80ff976f92,2024-04-10T13:24:00.070000 -CVE-2024-26217,0,0,adcfd10cee2a311ee3377ddb2b6dc84b034bf7a7314e2cf997ad76788fcceeac,2024-04-10T13:24:00.070000 -CVE-2024-26218,0,0,493e4362568582fb16c167247db869115e08a4adb409a1a1db9f8fdb9e383172,2024-04-10T13:24:00.070000 -CVE-2024-26219,0,0,4c778d3cf72695ef43e6af341bb8385a9929d3468b6e7cab7379ce9890adc39d,2024-04-10T13:24:00.070000 +CVE-2024-26210,0,1,916f1372633f1911bd72004379235748804faa18c5be7368306a394e7f806d77,2024-04-10T13:24:00.070000 +CVE-2024-26211,0,1,a1ba556a2f0ed921ddab1a8a6f513b95b797b266198d535d5dd1fa95f40f4973,2024-04-10T13:24:00.070000 +CVE-2024-26212,0,1,399bc3cc9cbdb31663132cef17e7cd125d7c1b0f55a34874ad57580ccc08342c,2024-04-10T13:24:00.070000 +CVE-2024-26213,0,1,99538ac412c86353162dd3efaf1553410a990d0ffc8c85485c2a11c39bc070bf,2024-04-10T13:24:00.070000 +CVE-2024-26214,0,1,eea33e8e8ebc88f6a6e1d923bd034e2f29d03a2e3c3a415178a61c0a466728b9,2024-04-10T13:24:00.070000 +CVE-2024-26215,0,1,f3fd052b0107e26c2a1dda26273ddabaea08297ab7aa717e7def58f6f86ab636,2024-04-10T13:24:00.070000 +CVE-2024-26216,0,1,6159f3400fe92efda4da955d756092175c9403a000b0f2b8ed67d31ee18a1687,2024-04-10T13:24:00.070000 +CVE-2024-26217,0,1,ee3bc7999442a924c52e0492366973788d75c711e588133d4c446e25ea2c450c,2024-04-10T13:24:00.070000 +CVE-2024-26218,0,1,0891a6d86187323e00733b2feafeefe7d17b85e66a4710bb064ded9b38f7d500,2024-04-10T13:24:00.070000 +CVE-2024-26219,0,1,6e4e5b52915fee80a1802001a387380949da8624a5a1d8a1b46aa2aff50c1ff5,2024-04-10T13:24:00.070000 CVE-2024-2622,0,0,980839f80bae39bd008f161bc86f287eb01c5d66b4af732830a9f7c827b4ea45,2024-04-11T01:25:30.123000 -CVE-2024-26220,0,0,6560ab27deea12f29d125e00ee83a24fa77fd787bcf1b8cef9ad61001f6d8784,2024-04-10T13:24:00.070000 -CVE-2024-26221,0,0,1096bcb22187e51a9675b6a45f85bebf011b4304d9bdbd701d15752ff120ea8b,2024-04-10T13:24:00.070000 -CVE-2024-26222,0,0,4d7f249142b167c004630e94f4b391d171cc4b6a2d7bf83a4a8ed52931449aec,2024-04-10T13:24:00.070000 -CVE-2024-26223,0,0,07194c92dc3c25c6699267cbbfa93d0438777fce7f237c1daf54b5a8298a3ae4,2024-04-10T13:24:00.070000 -CVE-2024-26224,0,0,ccf2049c0fcd960a1a71c94e2a767fa57b6842cbd80c2929e6233010f267720f,2024-04-10T13:24:00.070000 -CVE-2024-26226,0,0,d970ac21a3d71a84296f7fa4ab54dbfcd9d9feffb99a7709b41286431ed8e023,2024-04-10T13:24:00.070000 -CVE-2024-26227,0,0,53f5ace6d3b63932165c2c28ef1aa4ff1fdaf1c77167ef3915b6b3023d4fceda,2024-04-10T13:24:00.070000 -CVE-2024-26228,0,0,b06b80e627068db56d80fa6e7bcbdd80755c1b1ac7e0671663ac38fda454c023,2024-04-10T13:24:00.070000 -CVE-2024-26229,0,0,288b1a81e61ec74e466ac909d3a6439baff12201e74452cbaf875e0e4d82a70b,2024-04-10T13:24:00.070000 -CVE-2024-2623,0,0,1ee35c433c495d9d4729bd07e7df68df57f6b4d83a7a67bb0aa9da87b43f0779,2024-04-10T13:23:38.787000 -CVE-2024-26230,0,0,e44b26f4332fdb20548bd3ea62e1d990e0a630c8dd88af78504bbd492ac19689,2024-04-10T13:24:00.070000 -CVE-2024-26231,0,0,ae08587f57be9ccbad6130670d0f6a97b73be86137556b09b168709d4f59588c,2024-04-10T13:24:00.070000 -CVE-2024-26232,0,0,ccfc82155fe7c1c0f810ee73539b6e3131664337e852930e8214abbea13046c8,2024-04-10T13:24:00.070000 -CVE-2024-26233,0,0,fc39f83d3cf9cd7d5f2bc1cd0d00efbc8c69100f411c9485bf03e78003120af2,2024-04-10T13:24:00.070000 -CVE-2024-26234,0,0,a058f5f1a6612109908898470eda57a7d8b1eee3373f18e16fd8e2a867b571b8,2024-04-10T13:24:00.070000 -CVE-2024-26235,0,0,cdc85a46147e5f4011dc9f5c5dcbdf70dba00b0084c1182072faf21f97c5612c,2024-04-10T13:24:00.070000 -CVE-2024-26236,0,0,6ed85431734b08216c6adc9f2c374a94e19154091b573559076f0e6b04273a53,2024-04-10T13:24:00.070000 -CVE-2024-26237,0,0,7bef228418e3d704b3d42c63738c070159cb9e7e4157a93128a46624426d777b,2024-04-10T13:24:00.070000 -CVE-2024-26239,0,0,4f63ebbc7e1c22083582adfab4c707529af94a9f5399301d47a3930a2309b762,2024-04-10T13:24:00.070000 -CVE-2024-26240,0,0,2f45510daec1dd2ac4098c0830ca81a62f3158c4f8fb0986b50921df87f337b0,2024-04-10T13:24:00.070000 -CVE-2024-26241,0,0,f3127d5b8ecc2ceba2c948686b824ffc706a8d9de41755caeb6f631b6d8d5d1c,2024-04-10T13:24:00.070000 -CVE-2024-26242,0,0,13908f587604cb77a200f2921f3f1d1bd492a3cd6ced6d9152b1f0a97b0f3ef3,2024-04-10T13:24:00.070000 -CVE-2024-26243,0,0,96928d297b82261cb4bf5707730f5a07d8ced4196c8fc7c6b3ef4c73639fcc1b,2024-04-10T13:24:00.070000 -CVE-2024-26244,0,0,952e903ed5d0dc24f6e07b3c1cbaaa53c1c789f53429f46fe2bb34c6ba022479,2024-04-10T13:24:00.070000 -CVE-2024-26245,0,0,6b80b16e5eaae3fbaa670bda5dc515099239727c8140e19492596426fe8f55c7,2024-04-10T13:24:00.070000 +CVE-2024-26220,0,1,0a60772611c019f6a9650ff19559dac35888bf06669556b8d07676e9e23e3835,2024-04-10T13:24:00.070000 +CVE-2024-26221,0,1,202c6c1334feb3b04972952f43307134db58d29b07c4df3d3a3a1459d97141e9,2024-04-10T13:24:00.070000 +CVE-2024-26222,0,1,e7f3e63b4b4786196b2b033e78d59539753cbc1d32893421bf40f55af826dd24,2024-04-10T13:24:00.070000 +CVE-2024-26223,0,1,e98198855057e05a84d57c3f95ba5b1f04726f0624ff2e136d7481407a6a8a6e,2024-04-10T13:24:00.070000 +CVE-2024-26224,0,1,e76e4101047624228fff653ee44945294a33ae0469e5a0362b44ac2b9c8c4793,2024-04-10T13:24:00.070000 +CVE-2024-26226,0,1,21787233315afc49c6fc0dce4dd7d84ed2fa9454e13592f216d63809062599a8,2024-04-10T13:24:00.070000 +CVE-2024-26227,0,1,d719db2e77fae81f3ea062dab43293de2c5e7c064eff5c295df2b14cba91d370,2024-04-10T13:24:00.070000 +CVE-2024-26228,0,1,ba99e1a786e7d3085768a8008bae09ef0c1ca3dcf46923a7672c35547f158442,2024-04-10T13:24:00.070000 +CVE-2024-26229,0,1,a2a7b52a90b6e97ba26694d91688bc1daba4b849ae9f43401b001759f9f1633d,2024-04-10T13:24:00.070000 +CVE-2024-2623,0,1,a2042a70cc1826203ff4d13e05dfce6c15f75d889780b06c682bc0848ef450a1,2024-04-10T13:23:38.787000 +CVE-2024-26230,0,1,51096dbc248068cb57ae888c826503f09edfcbf992cc9af7194b93b6760fd6d6,2024-04-10T13:24:00.070000 +CVE-2024-26231,0,1,9cb3acaea3c2ba0925c98d48e4805df6b8ed9de3e83327ff4e7cdfaca5685afd,2024-04-10T13:24:00.070000 +CVE-2024-26232,0,1,e9e48df77ad08850efc962662888a7669dd67cde068bfb463c84f954e690e879,2024-04-10T13:24:00.070000 +CVE-2024-26233,0,1,e6fb2ec449f0ce5911cc5b3250ded16c2c69f0a4ec1693aa5f64c5493f783810,2024-04-10T13:24:00.070000 +CVE-2024-26234,0,1,77d908db38a46c6b67662334adefbf9511f56ed3133da56e4a86c77a8f0d32b3,2024-04-10T13:24:00.070000 +CVE-2024-26235,0,1,238f95a3c32a7461ebd3197393c04d121713fd0ed856b9088be98d3509604e21,2024-04-10T13:24:00.070000 +CVE-2024-26236,0,1,b6e84295a01ab38c004343cf5326a05bf37fa5cb0c9e77f3502b9892ded41bc2,2024-04-10T13:24:00.070000 +CVE-2024-26237,0,1,d7b5edb2c455a2163554b4d3a9f835dbd5fee74ce2e8c6b8d5886a8c0cdd7659,2024-04-10T13:24:00.070000 +CVE-2024-26239,0,1,8ef455d21d9ec30218697a33a1866485503072933ee890517574c48be2ea10d9,2024-04-10T13:24:00.070000 +CVE-2024-26240,0,1,4ea8777adc7b14bce710a14bd53bad9590a2f13a5004ddf3b269a9fcbc4b4c4f,2024-04-10T13:24:00.070000 +CVE-2024-26241,0,1,772beff964b10aabb07e187685d203cd6b32b788fead119e5930e95a3ff995ef,2024-04-10T13:24:00.070000 +CVE-2024-26242,0,1,7b46b68ffb6bd3037fda8a1661ba25f0b24271ae089c085bad211104dd85c11d,2024-04-10T13:24:00.070000 +CVE-2024-26243,0,1,d4b7eb815650962abefd8cc9c475c165d83f93e67fbe55f7f1d7f675eaed5dc2,2024-04-10T13:24:00.070000 +CVE-2024-26244,0,1,8b04d16b3d5d5f3c648828bbc30588c7b90f336fbf7c83fb8ed1f9e51b26d8ea,2024-04-10T13:24:00.070000 +CVE-2024-26245,0,1,d5695bd1946c16edd59d50975f824fe1e2978fe12fd0c13dbf0b752647d7d40b,2024-04-10T13:24:00.070000 CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000 CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000 -CVE-2024-26248,0,0,9eef61989497f97311bf02dd887a2ffd25824dcdbe673cdf7ab935bd300867bb,2024-04-10T13:24:00.070000 +CVE-2024-26248,0,1,6ae330f1e55408ec4dd52dd06effc5327b4b346eca0b13e84863b9f73c26f72c,2024-04-10T13:24:00.070000 CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000 -CVE-2024-26250,0,0,f2a0cfb4070d028fb586e99bf79195cfce38d163d3114da6029688af5df96b07,2024-04-10T13:24:00.070000 -CVE-2024-26251,0,0,73706fff26dfd6018547bde71f04abb33d91a3ef3daff150e9fe8799142097ff,2024-04-10T13:24:00.070000 -CVE-2024-26252,0,0,814cda7beb1d5331a67f8c026d891f43858aa7f34b110381821b6ca45d4337c2,2024-04-10T13:24:00.070000 -CVE-2024-26253,0,0,2127dce9201eee8b7bda3ed2aa63fedd6eb77ea915c4ab9e3ae86d675cd03731,2024-04-10T13:24:00.070000 -CVE-2024-26254,0,0,6f6e7dc433cc9421ab08238b2a14d21e88ce54e2ec7fdb953e5b9f52e6f616c5,2024-04-10T13:24:00.070000 -CVE-2024-26255,0,0,43ea931558d1e8067d5b4a89cccba5d3dc6374bab57a4f00297a35423c691e08,2024-04-10T13:24:00.070000 -CVE-2024-26256,0,0,064742e8020a8e5020b5f240ee4760db903b5b90f14d2d6e62cdb2350abb90a6,2024-04-10T13:24:00.070000 -CVE-2024-26257,0,0,8419a4e8380c4555162da2853e4590efa05ff72dc7b47cb9d6dc645a4f3e3348,2024-04-10T13:24:00.070000 +CVE-2024-26250,0,1,ecedab60b29c43c07ee17ab13d711a3aa7e304497760670e923cdaafca978755,2024-04-10T13:24:00.070000 +CVE-2024-26251,0,1,93b7994c36892af069d09f0bd9192bf3186ac00597569c0b9811874a9fd481c7,2024-04-10T13:24:00.070000 +CVE-2024-26252,0,1,df562f5c83abdc407ed37aaf1c1c037cf6f8550dbd77ed7347471880b86721c3,2024-04-10T13:24:00.070000 +CVE-2024-26253,0,1,34481f020a86a742b6ced94cd3663067ce41019d1907c6b06ed17f950058a134,2024-04-10T13:24:00.070000 +CVE-2024-26254,0,1,07a4b81b26bc3f1c97cbd450d7200968eabb824affdc4e125ab1428b8b376be4,2024-04-10T13:24:00.070000 +CVE-2024-26255,0,1,85638effedfaf37162394543c2ea8be3fea3cadc51d4bb0413585c9f3e228970,2024-04-10T13:24:00.070000 +CVE-2024-26256,0,1,f714f94a944624e570ad65ecd1d4f933197efdaca8ea3947e2937a6a17fb1db6,2024-04-10T13:24:00.070000 +CVE-2024-26257,0,1,05a28d03660a848990668904555214fae6f00026d23d1677e03b07f5dc8dee4e,2024-04-10T13:24:00.070000 CVE-2024-26258,0,0,e2948ebecdedd5be931de1508231bfb7181246b38ce20c139f19e68ae9750f3d,2024-04-04T12:48:41.700000 CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000 CVE-2024-26260,0,0,41c48505050cd0603f041cb40494690b052971f86cff83dd85a1f53d94faeb17,2024-02-15T06:23:39.303000 @@ -242843,7 +242843,7 @@ CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64f CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46 CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000 CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000 -CVE-2024-26329,0,0,61f5ce23611f085b03f5d098cc8be55618eca0c5c59bafee25a97403dd794491,2024-04-05T12:40:52.763000 +CVE-2024-26329,0,1,6eec7b644c4867f186846a122998b4350a4dc0459882c3ea663ee6d77c6e1117,2024-04-05T12:40:52.763000 CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46 CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000 CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000 @@ -242858,7 +242858,7 @@ CVE-2024-26350,0,0,94fde44080954984b73836ed416075677e0fc24eadc0bc6ed473bcf70a41b CVE-2024-26351,0,0,ca59fd7de6fb4b8be3d1dd63bf1340c6e097ec7efd2f74728f2b6d3782e5af9c,2024-02-22T19:07:27.197000 CVE-2024-26352,0,0,a91e9b827b34ff74d03de6eecd5ed6a244c3125227e96fd7536e6e0fc75fc75e,2024-02-22T19:07:27.197000 CVE-2024-2636,0,0,2136f31c86bb7a335e516e0265dfb7c3eee5b1d10cfc06f1391b5375fe684311,2024-03-19T13:26:46 -CVE-2024-26362,0,0,568459a9b3f0f2bf9253e0b7023e892a2cedf66f461f74559cd0b82c3e57a2d1,2024-04-11T12:47:44.137000 +CVE-2024-26362,0,1,6a18777bd7815cb774b31220e78a758adc0ac0f202205f9d0b94f55fedbb403c,2024-04-11T12:47:44.137000 CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46 CVE-2024-2639,0,0,65f044c66a229f5aa21034e06bbca27de9dcb6c2f13f2794f7f7e35ab06cbe4b,2024-04-11T01:25:30.337000 CVE-2024-2641,0,0,34c0d1d302553f4b81cdbb023feecfd6ba8f3d20851af8b9c7f5333289d1e31a,2024-04-11T01:25:30.427000 @@ -242897,16 +242897,16 @@ CVE-2024-26490,0,0,b6f6bbce17cb8b3e0d7ffc74af2883f439e6d11d15d184e2f1a2e43e85a99 CVE-2024-26491,0,0,73ef4da115c90ed06a18a1a334653b2533761b4f911c3db9814bd0d18285bcac,2024-02-22T19:07:27.197000 CVE-2024-26492,0,0,223ddadc0c7efe7b0886f487630808be0927541c8864c0a1df96647191c41c4f,2024-03-08T14:02:57.420000 CVE-2024-26495,0,0,bbb6b231bf109fc8acfd5241f02faec1361b46bca779b6926f0190dbd5a53c19,2024-04-03T12:38:04.840000 -CVE-2024-2650,0,0,5473086d334066fe47ab686464aa8acd09d841347cf10fa73254742011d4af91,2024-04-10T13:23:38.787000 +CVE-2024-2650,0,1,e5741f6c9edd36c8ab868274b7c5445ec4657874106d32e2eb21c1d38ec57aa0,2024-04-10T13:23:38.787000 CVE-2024-26503,0,0,67af53e4079744ca59c487303c5ff1417327cd875b9be966624dba59813771c0,2024-03-15T12:53:06.423000 CVE-2024-26521,0,0,cd304afd2135ea7b8ef2211742c7b93ec84446277e098ef9dbbecd48d38b35d0,2024-03-12T12:40:13.500000 CVE-2024-26529,0,0,947c282389b2399c937e39be9afb47cae33d04cd0c4d375c710a3d8a93a18338,2024-03-13T12:33:51.697000 CVE-2024-2653,0,0,1b90dd54d7cdd8c3f7a671a7b17e805395dcf75d86254158436fed2a545bcd1d,2024-04-04T12:48:41.700000 -CVE-2024-2654,0,0,3392f6eb7c0f866489faaa90415bf7b400587c559b50b06f40468cff38263a42,2024-04-10T13:23:38.787000 +CVE-2024-2654,0,1,0748d73b52f4ac42603e428b2f6da950cd44a4e4f05eed25ff353784691c1c85,2024-04-10T13:23:38.787000 CVE-2024-26540,0,0,b5235e29de9ae6dda085cae04785695bbdb6918510d970ab98c90b5258eae60c,2024-03-15T12:53:06.423000 CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000 CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000 -CVE-2024-2655,0,0,17e9094b055a91ded2eda94deb691e287b08025d1031110ac516bf78ff787243,2024-04-10T13:23:38.787000 +CVE-2024-2655,0,1,2591f365056beba0d1e47df33ae27c996a361a1761c0f5ac1773463f65afef67,2024-04-10T13:23:38.787000 CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b3412f9,2024-03-22T12:45:36.130000 CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000 CVE-2024-2656,0,0,4340d2751b5b936977156d3c9b66d1badc283b5d0363629845c954a91d88c161,2024-04-08T18:49:25.863000 @@ -242915,10 +242915,10 @@ CVE-2024-26574,0,0,dcbd7ef017b2c94376d84166225aa21f7faefc7d209424b74f38bdb42fbf0 CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000 CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000 CVE-2024-26580,0,0,495279035de581ec6008f44dc7438add36c8c374f59c2ede086a388e56fdb00a,2024-03-06T15:18:08.093000 -CVE-2024-26581,0,0,353f24559890ac7b3597bd26d99362ecbfd523a3ec7e2aa7e9d65e75d894e5ee,2024-02-23T09:15:22.563000 +CVE-2024-26581,0,1,6589e1e6fbb71081f17acf0e47196cdde864a76e8ebb5845f92ba805d61a58ca,2024-02-23T09:15:22.563000 CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000 CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000 -CVE-2024-26584,0,0,d68a4d58b87753c0e1bb744e1a26295eea21086b2f2685b711c57bb3369e39c5,2024-04-03T14:15:15.613000 +CVE-2024-26584,0,1,b2b48302c00eaeeb768b321c147a1b7d666d3960cce1d3c0055da0c0aaefe43b,2024-04-03T14:15:15.613000 CVE-2024-26585,0,0,f63f838d2bcdd8ae6d99da2fdbc37c9df617bc6a41e88fe22fa920d7915c1497,2024-04-03T14:15:15.853000 CVE-2024-26586,0,0,85e4fb034cd8f802fb7949a6edeb44e49e071e6e365162d8c01bd895923b7bfd,2024-03-18T18:12:44.400000 CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000 @@ -242926,22 +242926,22 @@ CVE-2024-26588,0,0,a12e329faae009d801e11973c8a72020a4a4a89d8da3b097e68d3f4be6ee8 CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b7555f,2024-03-18T17:56:56.953000 CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000 CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000 -CVE-2024-26592,0,0,29665c76de8638ed40d9f3e8b018657c0f74950f2732dfb5df89d934712e51d1,2024-02-23T09:15:22.877000 -CVE-2024-26593,0,0,cd2e95ac01546387c9c0e4472acf1544d866afb8a59c1a7d17619ef886560aab,2024-03-11T18:15:18.673000 -CVE-2024-26594,0,0,0a89bbaff9ef6fec25f019f6fb698a73a842e87451bde7ab14d7c364ad53f83e,2024-02-23T16:14:43.447000 -CVE-2024-26595,0,0,7340de816e73adc20ef887da5adddab91231f977834e5f36a585c863363669d9,2024-02-23T16:14:43.447000 -CVE-2024-26596,0,0,2803c3b549b44ba7cecd9ac1430162205767f0e9836b1e5ab45cc66dabd39e5f,2024-02-23T16:14:43.447000 -CVE-2024-26597,0,0,98d17c648d291fbbd48c6391cb97940c9aa01d7e5da83fbaa07dee719ea6e8da,2024-02-23T16:14:43.447000 -CVE-2024-26598,0,0,3809f87b73f8670bce7c0d4d9c0ca4b732f8aed5351b5f90e3e61d853947f78c,2024-02-23T16:14:43.447000 -CVE-2024-26599,0,0,0641ea7592ee5f956df298df813657f138a609527f250cc998a11d698e0dc2cc,2024-02-23T16:14:43.447000 +CVE-2024-26592,0,1,5ff5d392da394512ac4c5d4bc3e700039f943a7b57abe9c25e65c9574333338f,2024-02-23T09:15:22.877000 +CVE-2024-26593,0,1,14e89098c4374dceb139b8720f315d2d4d167aa05c7c8c3a8d22cb5f072b2887,2024-03-11T18:15:18.673000 +CVE-2024-26594,0,1,50c57f8d072c06fc1d758c298fd45e612682bb463c5ced52358cf263ead62b05,2024-02-23T16:14:43.447000 +CVE-2024-26595,0,1,694daf602656b4ed21baf00e65a2ece9ee3da5d86ae6a27e3f4e63f298d511c5,2024-02-23T16:14:43.447000 +CVE-2024-26596,0,1,2a0ee593181ebffed2014a10486a4c2b6aa8c4e8c0bb77bff57bc3d1234112ef,2024-02-23T16:14:43.447000 +CVE-2024-26597,0,1,2b82c8c415cea5dbf16e60dd47fd2542fe188832a7275535fe39289a226ea0d7,2024-02-23T16:14:43.447000 +CVE-2024-26598,0,1,6bc00bbc1a75fc8082ace2bb158a658e8060b1766057b506bce455f0f42eea1e,2024-02-23T16:14:43.447000 +CVE-2024-26599,0,1,b349da6d38af36bce475dd5433566f79908831950c5827677e81407b46612529,2024-02-23T16:14:43.447000 CVE-2024-2660,0,0,4c72efaeff53ee65e5810791290c8031a58671a377a7f696900b9cf4cce27193,2024-04-04T19:24:50.670000 -CVE-2024-26600,0,0,c967e669b8dc1c398c391a67baeb20a028c116e1c9e8995fa190674b2ce453e2,2024-02-26T16:32:25.577000 -CVE-2024-26601,0,0,d1f2880c84770148fac928bc914c5e3e1e77054a6615fd508dea9c472726a343,2024-03-01T14:15:54.050000 -CVE-2024-26602,0,0,9c5686f95c797b041fd83fdb0374462b98546f1ee93289b9d03b0b6dd08b63f1,2024-02-26T16:32:25.577000 -CVE-2024-26603,0,0,310135b19aa343ad8f122ae3de335e2951866d9efd4a5be6db0362ef749bcf7d,2024-03-01T14:15:54.097000 -CVE-2024-26604,0,0,9ac74be28974ad0b6cacf865aee48ec771430720d721be3ed86217b87f579060,2024-03-11T18:15:18.830000 -CVE-2024-26605,0,0,096348b07fe52dbfa83c7c1f4ec426f563858c6dc0ce23dfa4a557cbc9078c29,2024-02-26T16:32:25.577000 -CVE-2024-26606,0,0,20fa425762db9f3f8661f6a0d75963b997124489c62106fe03a6af0cc1a2a171,2024-03-11T18:15:18.890000 +CVE-2024-26600,0,1,e52b32492be1e9346c6ff2bdd73bba7ae03906c84e66b0a014d5790046b4a7f1,2024-02-26T16:32:25.577000 +CVE-2024-26601,0,1,92b9586a290fa7a925b7bbca7274b6c97e0f33ee9968e204265a261df9fc9890,2024-03-01T14:15:54.050000 +CVE-2024-26602,0,1,b11727a2cda75aa2d8cf27436da78575da5bf9cbcbd49da0fdd8c31846b33165,2024-02-26T16:32:25.577000 +CVE-2024-26603,0,1,143854e8e001b24951e364d17e8b7c1e463c8e2a2273d7853fedc79c792cc7e5,2024-03-01T14:15:54.097000 +CVE-2024-26604,0,1,59f8b3d81c6ab95fb72cb53dc40e6d14639beb467cfdc24c5c29872e7b40eecc,2024-03-11T18:15:18.830000 +CVE-2024-26605,0,1,aab94dafdccda32e695894b8575be02df76e27c32a5a28d72ee4c120ec1cd1b8,2024-02-26T16:32:25.577000 +CVE-2024-26606,0,1,7034efffab3b42598d89ad6fb9cb70d605d9325d56ffeb831bd748e726781fd6,2024-03-11T18:15:18.890000 CVE-2024-26607,0,0,10f708b618964c31a16152436a6b5d9b9b34324402ac957d6db7b57f6219ed49,2024-02-29T13:49:29.390000 CVE-2024-26608,0,0,9db678542933ad0e36202af80b187252a408347bbb9057cd73da20b3710cb095,2024-03-12T12:40:13.500000 CVE-2024-26609,0,0,eba52c1ed17b7c8e6fdbc8e74f6dcae3f10c0a54b31264558f9d09c22050a68b,2024-03-12T14:15:07.133000 @@ -242975,7 +242975,7 @@ CVE-2024-26636,0,0,760d91a296e0acf8ba41ea5db2ecf406899fc0855e4062b2617f6fe9e15d4 CVE-2024-26637,0,0,fc892e24bd1b7e8206ffae07359f5a6f79726dc219d9822d731828992a4ead1a,2024-03-18T12:38:25.490000 CVE-2024-26638,0,0,810693405d991f7ccd7a2a1a0260a34b1a9402f77c9d945d74efd33b7925ef28,2024-03-18T12:38:25.490000 CVE-2024-26639,0,0,8a473c1426f4ebb022f445f83a8e03ee2f46b4cc924d5c9a8fc1fa54d3a5296a,2024-04-04T14:15:09.457000 -CVE-2024-2664,0,0,76c2eb15b1304e4432d81aae6c6052bc244d87ac501c2510e16c4e1099abfb8d,2024-04-10T13:23:38.787000 +CVE-2024-2664,0,1,c0b832041353c8a6cfaeb7e198e87ee27cc866ec20501fb216f1e10cc4fe5ced,2024-04-10T13:23:38.787000 CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714c33,2024-03-18T12:38:25.490000 CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000 CVE-2024-26642,0,0,d2e0d803edae72f0bb1df72459245605f31020a70778e2d10c78ed3e6034ddef,2024-04-13T12:15:11.297000 @@ -242986,7 +242986,7 @@ CVE-2024-26646,0,0,dccd3fb042f624b294392888bd78f3cb643c796b96f3f1a01e194aa7fd56d CVE-2024-26647,0,0,29bdc4340bafd301bcad34511ccc4699e791a96b6f9c94e00888fcdf9deccf2c,2024-03-27T12:29:41.530000 CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000 CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000 -CVE-2024-2665,0,0,4d5b68c6845284fb68e0f9cb00a1f0da08d2fe95d850b5ec943341a9edbcf6b9,2024-04-10T13:23:38.787000 +CVE-2024-2665,0,1,599614c9554c62a1cfca8ae9827c37fab37a372d5dc9c8c042123c0e72c6c04e,2024-04-10T13:23:38.787000 CVE-2024-26650,0,0,a6462e36b1dd6f69ddd876eed038a048534eb12e06d7671796e4cb5890514076,2024-03-27T12:29:41.530000 CVE-2024-26651,0,0,664bc67b3020a550d402c968ae917bf5e5ca3e46c2b2c739e7380a7f1a9e1448,2024-04-03T04:15:11.563000 CVE-2024-26652,0,0,83433335e001013ce7fac31bffa4d9f6c5d9ac03e3150fd567d8288efd087e28,2024-03-27T15:49:41.437000 @@ -242997,7 +242997,7 @@ CVE-2024-26656,0,0,5337c8b618800d7ae076a65ae658288f2225d153cd5a33d44f7af43e0758d CVE-2024-26657,0,0,5dc4a9c95210d3424ad527963550b1460b63acfba87b6d5e9086dc26cb8bd63d,2024-04-03T14:15:17.153000 CVE-2024-26658,0,0,1013cf0b269e9d3559a1126cca40b69c8071575276ed3dd1757812dfad4c0199,2024-04-02T12:50:42.233000 CVE-2024-26659,0,0,9da56d86cd36627698f3029a2c5501b296124cd8c7d2b484b46f5f4c8dbd5a07,2024-04-02T12:50:42.233000 -CVE-2024-2666,0,0,91e4f53a6c2da95fb287e931431a508eefc6befec6c35c355aabb3003588ba7c,2024-04-10T13:23:38.787000 +CVE-2024-2666,0,1,ffba1198f94465a43012b1f89eeaeac60b5b7fef826803818be3a7145aba7307,2024-04-10T13:23:38.787000 CVE-2024-26660,0,0,b1951297ec8036559699923c7fc2f6a4b545d195c3084904d1128a08b214c072,2024-04-02T12:50:42.233000 CVE-2024-26661,0,0,a20c8f17e2fdf6f97b076b112a4d67d7d684b0b99a9a03f3b46ed343b76fe75e,2024-04-02T12:50:42.233000 CVE-2024-26662,0,0,5478b81863bcc7c7fcff764c891ce6afaadb8c53ea3ff8fbccd3df211f951a10,2024-04-02T12:50:42.233000 @@ -243167,8 +243167,8 @@ CVE-2024-26811,0,0,cee29b2b278372d159ec8640ea5ad6aca2c80b1bf221aa5dbd03d1b241f20 CVE-2024-26812,0,0,a42c8187b68beb1cc0b158f76e6d556e04202cce9b8d74f10baf062b3b08439c,2024-04-13T12:15:11.580000 CVE-2024-26813,0,0,e26d7e44e13f3412bd160f19d0ae99bd36159f47f75a2e8fb78ec9249e2769c3,2024-04-13T12:15:11.633000 CVE-2024-26814,0,0,cc1f4c4ee0ddb8caf435f1369c8b74e01b83a1ebb078466c399be2b768271bff,2024-04-13T12:15:11.683000 -CVE-2024-26815,0,0,133c840a93190196251e236a7b756ae7e6a7f81da1230a3aaac98b433b5182c6,2024-04-10T13:23:38.787000 -CVE-2024-26816,0,0,38ad8d2b936736e6fe0dcde7d0e9aedff6e9f3f061cfb35587215b4681f05ebb,2024-04-10T19:49:51.183000 +CVE-2024-26815,0,1,ad84c918cc4b6959b9513350d04a4e06efb88cb36d856c286d02e439b1d59421,2024-04-10T13:23:38.787000 +CVE-2024-26816,0,1,7edd6d54a3ba0eb8973c578b9102ff3c74e5fec3289e651ec34592c623f09528,2024-04-10T19:49:51.183000 CVE-2024-26817,0,0,6e7d1b607f6e6ef65a746f02838707f99fa04c3cdd12da2ca45bbcf97004348f,2024-04-13T12:15:11.730000 CVE-2024-2682,0,0,0f2a052c92797c0b9eb2b669278d840d43bd9a849bc2ac56884f6083311e897c,2024-04-11T01:25:32.230000 CVE-2024-2683,0,0,104be48708f7d1d402bdc35a78c18c31fd0a8b7272f17cf78ee82a1b2a0cf430,2024-04-11T01:25:32.320000 @@ -243180,7 +243180,7 @@ CVE-2024-2688,0,0,4d2ee00fbdc8f698cfa2b48095538092c3008625057bbba0ed83fe0f8586af CVE-2024-2689,0,0,ca3db738ee48a3133b58c96e06b69010b9eabf8a8a2da4363a993adb771d8842,2024-04-04T12:48:41.700000 CVE-2024-2690,0,0,4c826b0268110ff7b23e3bd95d3e0dea47699c94cc2fb91bdb7e2a7eec48f946,2024-04-11T01:25:32.763000 CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000 -CVE-2024-2693,0,0,c2299dbeb22eb456c4008320057e6debea98e9b0d418e2e72d119a1b25e8358d,2024-04-10T13:23:38.787000 +CVE-2024-2693,0,1,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000 CVE-2024-2700,0,0,2ca42770cf7c7cf86ee4d8d6265dda94df5f872b89d2aa713fb4c7e7054c6177,2024-04-04T16:33:06.610000 CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000 CVE-2024-2703,0,0,acd3d7979e587f06a1f1c7c632685dcda516645b7d07e09f38809885e199d09c,2024-04-11T01:25:32.890000 @@ -243277,8 +243277,8 @@ CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672 CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb027c,2024-03-12T12:40:13.500000 CVE-2024-27237,0,0,c9df1e7ac4a8ec03918c32a86c9c817e799f7110838b8d32905600c71cb57808,2024-03-12T12:40:13.500000 CVE-2024-2724,0,0,d84af29dc771f15bf9bc747f8064ec43ed6ea62cecc1d0bdf5353519ea88d1ba,2024-03-22T15:34:43.663000 -CVE-2024-27242,0,0,05ea0b7d1f0059a435f25c47cbd8f2d8ba397d5e571bb2503f33c8b93ab862a1,2024-04-10T13:24:00.070000 -CVE-2024-27247,0,0,5c93f47403db156af8625d4a18d51aefb93aae21a961634e93cd7cbb1b3d1766,2024-04-10T13:24:00.070000 +CVE-2024-27242,0,1,4bcf7143849c415b8cba90784829de5a74333601b3e2c00d25c6430d064be462,2024-04-10T13:24:00.070000 +CVE-2024-27247,0,1,9590a32000c7161883bd601f17b84889ac73a7794287ae1fd94cd04419528997,2024-04-10T13:24:00.070000 CVE-2024-2725,0,0,f5993e44d4dd2cf17ff419f8f154eb7cefc4802f6428c3ec1541fed0378bb103,2024-03-22T15:34:43.663000 CVE-2024-27254,0,0,6863e2c846e99549e249a94dae3c18d1781ed3b7e7fcc2d6019a28e44086daf5,2024-04-03T17:24:18.150000 CVE-2024-27255,0,0,1a87ed865e33969bd25e1a85296cce48c9cd6a59a0cfe097079e825c89c0500e,2024-03-04T13:58:23.447000 @@ -243309,7 +243309,7 @@ CVE-2024-27296,0,0,901935067cb900aa3d3e5cb66a728219c721e905c9fe9d36e52511f3308a6 CVE-2024-27297,0,0,4adef5b6b344504047ea652a2ba40cd8b6a71ad7086f702d549e1a8bda9ad1af,2024-03-12T12:40:13.500000 CVE-2024-27298,0,0,a8aed3b2e69fefd191b53544430d926c208f222363c2c19dd5ec3e2eaeb94751,2024-03-01T22:22:25.913000 CVE-2024-27299,0,0,8b5bf40e4aad9a36a65492e15bd324c8e360f15aa9f3bf381660f89101851e57,2024-03-26T12:55:05.010000 -CVE-2024-2730,0,0,6537aa9bc204ead443c0d64b2ab37a4e49d99454a6d6f7b3ea69694cf3413832,2024-04-10T19:49:51.183000 +CVE-2024-2730,0,1,b59ef74585520bdd558b04e3417ff4325dc06611f489526bfbae91e7f5cc7845,2024-04-10T19:49:51.183000 CVE-2024-27300,0,0,e09586c3544cbffe3d4251163c79579e1a8196e21b19b2a9e6dc8cfd244b40b0,2024-03-26T12:55:05.010000 CVE-2024-27301,0,0,74c556708d876810af23ae3cffbf459613046c823b0484037e03fc39213cfa63,2024-03-14T20:11:36.180000 CVE-2024-27302,0,0,1d89d4e993b760e97bde0be7bbf0ab174b73b3040fcfa7b093617ace631fac45,2024-03-06T21:42:48.053000 @@ -243319,7 +243319,7 @@ CVE-2024-27305,0,0,b3f2edbf169d953c39bcc940e16d0680bda3e4c24593a205df513ed3ad926 CVE-2024-27307,0,0,0637b05d2a36e47d121bc1fe1beac809e09e2be90d0aa4c4cb901114110f37d2,2024-03-06T21:42:48.053000 CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad595214f,2024-03-06T21:42:48.053000 CVE-2024-27309,0,0,4093b9f2cbf928f26e9937b5de3222826640db2cf36c920423d7b5a351b050a1,2024-04-12T12:43:46.210000 -CVE-2024-2731,0,0,754dc2f2f31f575b1ee28e214b4a7c1f5c57228efd9a387f90b5f1da191d5789,2024-04-10T19:49:51.183000 +CVE-2024-2731,0,1,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000 CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000 CVE-2024-27316,0,0,f74760c26c990a740e0324824f0b675680e5de06987a970f7e8469d8bc15b083,2024-04-05T12:40:52.763000 CVE-2024-27317,0,0,4c274cf3230c0a934555f5c84dc2c211701c44c03ccbc45b4514969783da0dab,2024-03-13T12:33:51.697000 @@ -243333,7 +243333,7 @@ CVE-2024-27326,0,0,d9507836adf68c2d2ae7fc27b567b32556a33bc16097b980148b918340a9d CVE-2024-27327,0,0,e769c6ce2e7d7e90447bc793511729d4ff9c20d4aa399fc19c03309b7551de11,2024-04-02T12:50:42.233000 CVE-2024-27328,0,0,dc504ac36f7882e020c43530d4299fb1fd59c008847560d9c950539f1ddc5b24,2024-04-02T12:50:42.233000 CVE-2024-27329,0,0,b5e829dda913f4516a159566d573e0d1b09bf8852cf38c52e86996f4c76fd07e,2024-04-02T12:50:42.233000 -CVE-2024-2733,0,0,cf385fe86c61284b978db36b66989dea3e773ec3a1a29b3bab476008f46796ab,2024-04-10T13:23:38.787000 +CVE-2024-2733,0,1,20b49bf0c7897a99c134475c767f5b3660bd324ee3562abff61993bff3fcce78,2024-04-10T13:23:38.787000 CVE-2024-27330,0,0,8072370ce5b3203817614cb562edf65f0213fec706c2bcecf5d67c5f6aa914e3,2024-04-02T12:50:42.233000 CVE-2024-27331,0,0,7b171b1822af62ae391382afd558518e8ab2a41c8bbe77bcbbee6e44dcdeeae1,2024-04-02T12:50:42.233000 CVE-2024-27332,0,0,cc2b240deaa7cd93099f9d5b5a51c78c92a7ba0504231e3c4f9e1406904f7566,2024-04-02T12:50:42.233000 @@ -243344,7 +243344,7 @@ CVE-2024-27336,0,0,ab735383c5ac501ff6119396cc2c03937ec00bb9399d65e652c53ee0e1e68 CVE-2024-27337,0,0,5b26bfdb0208bb7ef6dfb690400a977839eabaa725ec898b4919489185c9f6a5,2024-04-03T17:24:18.150000 CVE-2024-27338,0,0,ff540dd7839364ba10fdf837292cde0ded409fd9263cf15a9dc15bf6f790f6d8,2024-04-03T17:24:18.150000 CVE-2024-27339,0,0,eca5014081acbc59598210e3e472747bddc5f1d1b36245eeb33a886498faec6c,2024-04-03T17:24:18.150000 -CVE-2024-2734,0,0,417631995b1b02cfb9ac9dc6b76803e7ac9f2de96e66896bbc0fc557a8e493fa,2024-04-10T13:23:38.787000 +CVE-2024-2734,0,1,4c8d3d85de7fed69cd0069a6a1f252b231f45bd5131f454cb3e261f84793f330,2024-04-10T13:23:38.787000 CVE-2024-27340,0,0,6d258142a246b76d7db81378cce2359254ec1872cd6bd0f28553fb4415efca75,2024-04-03T17:24:18.150000 CVE-2024-27341,0,0,425db1823d8541f1b672a459b8af9079a35e86775939f95d7f507b41d9306b33,2024-04-03T17:24:18.150000 CVE-2024-27342,0,0,ec384860c2701fdf2fad567f4da838a0cf1838e959b519e866c364f8ddb6e3dc,2024-04-03T17:24:18.150000 @@ -243352,15 +243352,15 @@ CVE-2024-27343,0,0,45c7ed1c4eed9ea624ee8b5def6c8c375e3f0f3011b69d57beef7384d6bbc CVE-2024-27344,0,0,8aefe242670cc36dda0dce3798a7acb646a2bde29ffc66b45e4357a4348e3048,2024-04-03T17:24:18.150000 CVE-2024-27345,0,0,fe911dc85212419c00cd206bd5ce379cb6ba140e18be3c5480a17f10aedd8eb1,2024-04-03T17:24:18.150000 CVE-2024-27346,0,0,386b701029626639fdc143fc77e569108911d00594cd7781652dc458bf9d469e,2024-04-03T17:24:18.150000 -CVE-2024-2735,0,0,ff920486529d1f84ac9361983e7636408ed8db1301446daf522c5d6cf104818f,2024-04-10T13:23:38.787000 +CVE-2024-2735,0,1,0fc46982ae2bb65c79d893d71d43586449f915b196de8114a5c92c3c81993284,2024-04-10T13:23:38.787000 CVE-2024-27350,0,0,5597abb0ceda36739a00afc67d358c9c0f6015c501af0eb35c72e1c96465f58f,2024-02-26T16:32:25.577000 CVE-2024-27351,0,0,e5505530871c697c674195d8ffd42c312d6a761b119915763b01b65b4bd9b691,2024-04-13T04:15:09.670000 CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624556,2024-03-21T02:52:19.927000 CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000 CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000 CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000 -CVE-2024-2736,0,0,366c0553365805af25b6c6f61e251ed091a74444d155d88f7b943f6521ddbe23,2024-04-10T13:23:38.787000 -CVE-2024-2738,0,0,5fb35d0c0d41e4dd44983039c78a20b6332083777e4c71d6cf4c3c9c68efe14c,2024-04-10T13:23:38.787000 +CVE-2024-2736,0,1,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000 +CVE-2024-2738,0,1,6819e123d1b9c89828d0cda96e445b3a2cfd159134a3eaf302a0f1f8d1cb625a,2024-04-10T13:23:38.787000 CVE-2024-2740,0,0,d811151885dcf4f2b77a4d174a11ca3affaa40577de972dcb33bdeeea321a401,2024-04-11T12:47:44.137000 CVE-2024-2741,0,0,72a13180f65eaa34946651eb5c88084bf0e961149a90b72b29d8dddde47c3326,2024-04-11T12:47:44.137000 CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000 @@ -243371,14 +243371,14 @@ CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000 CVE-2024-27444,0,0,e4b72098e3b1a45c8b94b724b5aa67a3c5d7a627e3b85b33a53ae8fca137be64,2024-02-26T16:32:25.577000 CVE-2024-27447,0,0,0ad05b799b801710378617c3e979150b26491a5a3c175938d5888d52afd14aa3,2024-02-26T16:32:25.577000 -CVE-2024-27448,0,0,f81f5d795d2c514b1278f07b1bfac28be27d44388681ccc2d557339e34fe134c,2024-04-05T12:40:52.763000 +CVE-2024-27448,0,1,b3253001da8ad269109d252133c73be99f3540a277a858a81eb58e8471be512d,2024-04-05T12:40:52.763000 CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5dd,2024-04-02T12:50:42.233000 CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 -CVE-2024-27474,0,0,3f6f80db0b301c204d6b2a1bb5c1d45dd98964f36bca9ba7b8880ce1563183fa,2024-04-10T19:49:51.183000 -CVE-2024-27476,0,0,fc417a689fdcfd8fe1f357b69c3f577b74e8f18417ef31df14a14d2d72652d6f,2024-04-10T19:49:51.183000 -CVE-2024-27477,0,0,21d1441f759f05e7854d20aec973170403321f17a33224baa310af28424db832,2024-04-10T19:49:51.183000 +CVE-2024-27474,0,1,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000 +CVE-2024-27476,0,1,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000 +CVE-2024-27477,0,1,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000 CVE-2024-2748,0,0,cea6a4ab9c8e50f2f7b04d95a9a3a983480b862f6880d1aa4b59ef11a50c4683,2024-03-21T12:58:51.093000 CVE-2024-27488,0,0,a11ec8781330011d7d2c9111350fb429a691d0d011b5b0ec6e5912d62ef9d791,2024-04-08T18:48:40.217000 CVE-2024-27497,0,0,bf2a79c4e0ba614def454bde2dd33c58ed2360c3c6db31ca982c34485458d0c9,2024-03-01T15:23:36.177000 @@ -243434,7 +243434,7 @@ CVE-2024-2766,0,0,34cbc59ea91b1b478908d0dbf136c3288efc6ea10b46d01fc26157c33ebd7d CVE-2024-27660,0,0,ebc867d9e8ab77866712caf2c77523ce69fe475473038494b2e093ce6c793b8c,2024-03-01T14:04:26.010000 CVE-2024-27661,0,0,86da8e187830fd36888e5a846b7303cd63252f868f903b0bf7eaad6fbe1ac85e,2024-03-01T14:04:26.010000 CVE-2024-27662,0,0,3251284bf234434361d463758a344d1bc61b65e736c70ed013176b4fc1a3abef,2024-03-01T14:04:26.010000 -CVE-2024-27665,0,0,db2d39e78b7761c76d0b9cae2edf6b12c1eb29f95986525d6f396e616326fa1c,2024-04-10T13:23:38.787000 +CVE-2024-27665,0,1,7027fc9a99142ed7f7251233abca99ca1b31c012a50d1923107c8a11de0ac891,2024-04-10T13:23:38.787000 CVE-2024-27668,0,0,3d0ef551db37f6453bbc8a48bdf0ebb1fc9bdb4acce199cfd9ed21dfb3bdfe95,2024-03-04T15:35:25.673000 CVE-2024-2767,0,0,678ed52841a12018dde5f17bb13a098b6becb4799c1b813b082ad370f3609c2a,2024-04-11T01:25:35.513000 CVE-2024-27673,0,0,21c37c3b345d49a8525208ae1b1f076696d069d35649f7159ee135fb7877d68e,2024-04-03T16:15:07.173000 @@ -243484,12 +243484,12 @@ CVE-2024-2778,0,0,61e3128d6b5b99fe23ee2707a129462f95cc39b72990559c52734572277346 CVE-2024-2779,0,0,87241bb56fd5ec51155c8a533081609be6976509d34f81a170150bf1607d61a0,2024-04-11T01:25:36.323000 CVE-2024-2780,0,0,55ab4cb1b7288a4ba9af22773d37fdeb181752a65ee0f51476504ba2b669d700,2024-04-11T01:25:36.413000 CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000 -CVE-2024-2783,0,0,7e316c3dc4eb17e53769e53104528ae096cd45b1bb865371f3955ffafb8b4427,2024-04-10T13:23:38.787000 -CVE-2024-2786,0,0,644d53f8f03d889cf30bc1c6f0ebbe3784a77b215ea25a33c2411e25ac507537,2024-04-10T13:23:38.787000 -CVE-2024-2787,0,0,9593747f26582914629297cbfbf2fe680d96be78699fba56b115d29d746d123e,2024-04-10T13:23:38.787000 -CVE-2024-2788,0,0,b13e194e1304c29af0425ea621e6a88fe5853b102dd3bbda614c7e1f4e32fc57,2024-04-10T13:23:38.787000 +CVE-2024-2783,0,1,5e3d9294a74b759ac7450c1cf79e73d07c944f71ed4c195d3306f256a09a6879,2024-04-10T13:23:38.787000 +CVE-2024-2786,0,1,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 +CVE-2024-2787,0,1,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 +CVE-2024-2788,0,1,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000 CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000 -CVE-2024-2789,0,0,2afffdf74e69b0b7eba2aca71847fef0766706347d095d962d4ce0047a300cf1,2024-04-10T13:23:38.787000 +CVE-2024-2789,0,1,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000 CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d74a1,2024-03-13T12:33:51.697000 CVE-2024-27895,0,0,e8e082e473ed76dea7e0db1fd0e0603d1d69d1ba5e6a1a82578100cdf406ffed,2024-04-08T18:48:40.217000 CVE-2024-27896,0,0,88fc4dc869bbb4cce477334b59754ef261ad68592aa0aa0ff71f89ccdf4b1875,2024-04-08T18:48:40.217000 @@ -243596,7 +243596,7 @@ CVE-2024-2803,0,0,ce930c4e9bc9258ecb2ab0c912abdd19cc32c8e899acb9b2ec454e5acd9e0e CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000 CVE-2024-28034,0,0,e5d4c7f2c16c323ac1d823673cb666d8489267399fd40a7bc5f2df29f57c8112,2024-04-11T01:25:08.517000 CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000 -CVE-2024-2804,0,0,525948f3525c9bd444af85af186d35f505b6c99368cd7886dab9b587c5fe1fa8,2024-04-10T13:23:38.787000 +CVE-2024-2804,0,1,e0bc04f900a999f4a26367b15f33e067e2f6beed81e7fe017505f263f65dfc77,2024-04-10T13:23:38.787000 CVE-2024-28040,0,0,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000 CVE-2024-28041,0,0,4d284a807f7da2d3fcf5f7c7ae19f2272c31bf9662bccbca7ea6b863e800e974,2024-03-25T13:47:14.087000 CVE-2024-28045,0,0,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000 @@ -243688,8 +243688,8 @@ CVE-2024-28183,0,0,643292dec7e2c62a314435936df2f6b3b26afeacc823e8335f2b17ff913aa CVE-2024-28184,0,0,477afbf0dc7ee8d9429045c75878ff2a88abaa5598b6ce7fba2a5f1850b6b613,2024-03-23T03:15:11.827000 CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000 CVE-2024-28187,0,0,622ab766d3601fab3d937cf5c750ad7e8af82148d21dbe4188ae92a13fa234a3,2024-03-12T12:40:13.500000 -CVE-2024-28190,0,0,928ee7376627fe52f31bcc90fd26cbafbd8262b1f1338d2f299f6ff0f8ddf010,2024-04-10T13:24:22.187000 -CVE-2024-28191,0,0,7e4ef407b3f91b4792cce8da4173cd55f572b78b50a7027e064fd8fa5271446e,2024-04-10T13:24:22.187000 +CVE-2024-28190,0,1,12748f0d1d96c1dd12a55a7d01d52ecfa2471e70f938533a65cafe7ab3067955,2024-04-10T13:24:22.187000 +CVE-2024-28191,0,1,853b71b5fbff382cadd88b4aabffb5ecf2befa7c0c649d2de50031fa606cbe52,2024-04-10T13:24:22.187000 CVE-2024-28192,0,0,b174fe16c8c5d79ad271f4d2c9a4367f27378fbad36778038489438c03ab1c5e,2024-03-14T12:52:16.723000 CVE-2024-28193,0,0,8c1ca4c11484246f93cc5d645c632e9426b6a7357ef642cc72cfc1bf4fa0ff90,2024-03-14T12:52:16.723000 CVE-2024-28194,0,0,bbf543bd49e731dd9f0390cae255c29b8ec19d1f801fcc500577e5449dd9092a,2024-03-14T12:52:21.763000 @@ -243718,8 +243718,8 @@ CVE-2024-28230,0,0,1e1aea5bf150158cabb6123095cd25bf2e623dcd1551c7fc009bbc925067e CVE-2024-28231,0,0,5e761a67d0b527d5d1f49cd829677b302c9d9c476b3ca48da7a3eb960c53e613,2024-03-21T12:58:51.093000 CVE-2024-28232,0,0,8ef357538478976964b194f69d44c7b53df50fcc2e4627ca6de9a9f16fb71629,2024-04-02T12:50:42.233000 CVE-2024-28233,0,0,4aadf14c4fd4756e7a0ebfb9ca455df6b34da82a881bbdee9f58080e191197ba,2024-03-28T02:01:21.693000 -CVE-2024-28234,0,0,75343fd156feff25e287ddd2c51afb40239fee9c3f78bd38ee8a6c062e1f32e4,2024-04-10T13:24:22.187000 -CVE-2024-28235,0,0,d2a8359584439c2819316ad83fa6536b20948790527d483372066fe7c2aab87a,2024-04-10T13:24:22.187000 +CVE-2024-28234,0,1,6b978492719d69df4096887798403da6495274dcfef255d91c3c2570b3cffb5a,2024-04-10T13:24:22.187000 +CVE-2024-28235,0,1,061a34a90d1f62320003cb91beb70e041e98f1a9fa50ac825647327d85f5eb7a,2024-04-10T13:24:22.187000 CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000 CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf25f,2024-03-19T13:26:46 CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000 @@ -243801,10 +243801,10 @@ CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c CVE-2024-28442,0,0,9ea96c60b8ff6baa7d1ad057217e5f7850dd6ddd87730a2235900122a8b6a92d,2024-03-27T12:29:30.307000 CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46 CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46 -CVE-2024-2845,0,0,6b577ef869b97e8aecff377c3460e73abc54dc02c80dafcbfa7e14142e45f4de,2024-04-10T13:23:38.787000 +CVE-2024-2845,0,1,80afa4abae65a6bc76ac4540472949a0289e2da05adab5fbb831a4fc70a6c6dd,2024-04-10T13:23:38.787000 CVE-2024-28456,0,0,744bee611bfa3a5280688a3ee0e679f5d309aa4aaba4baf760ce4b1b49f266f8,2024-03-29T12:45:02.937000 CVE-2024-28458,0,0,3d1f3db263d3de782873e851f102b9d9c83f7ed4bd62c6ff2233f5d36ab6017a,2024-04-12T12:43:57.400000 -CVE-2024-2847,0,0,d47822ca0e89cdc5dcfe7c1590b85b04856b320d1f9bc971a6bc4cc557bc222a,2024-04-10T13:23:38.787000 +CVE-2024-2847,0,1,b1ba55ba00c2998f8e7d089e798ecbfe4d5746f0ca402c2401402431a680b61a,2024-04-10T13:23:38.787000 CVE-2024-2848,0,0,70c3ffd1cf432be636363e63100c8b1240d8d2d45b3240d4b9b6ebaad06a96a2,2024-03-29T12:45:02.937000 CVE-2024-2849,0,0,ca92d91a084681114580510e6740b4cc5e68d8bd07d70fe003ea88566b2c0fc5,2024-04-11T01:25:38.773000 CVE-2024-2850,0,0,c619e9677d0ae7b95d7b04f7e5b6a8b7687fe798ec4dc682b49e053a7fab1b22,2024-04-11T01:25:38.857000 @@ -243882,7 +243882,7 @@ CVE-2024-28681,0,0,ab17b4fa17ebf8eb3957de6dd91fe40414f05e3821f3c9e15b7d517b0542f CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0ded,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000 -CVE-2024-2871,0,0,daef8601b41b0efa61772133eaaf6e65eed24f0ab19d09ba4c3626bd7b22e78f,2024-04-10T13:23:38.787000 +CVE-2024-2871,0,1,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000 CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000 CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000 CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000 @@ -243942,59 +243942,59 @@ CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 CVE-2024-28895,0,0,e719d13135e97e941113ab974fe7dd84c43c28aacb52b0a20894b149f6e995bb,2024-04-01T01:33:21.910000 -CVE-2024-28896,0,0,3ce21368201f16ef5819c4eac46aef9f2b1b3fd87db8438584332df2a5f1c137,2024-04-10T13:24:00.070000 -CVE-2024-28897,0,0,428e3fb49abe2360ea843aa341ab7719b246d3a2a0690176052ff7a5f88e8bf7,2024-04-10T13:24:00.070000 -CVE-2024-28898,0,0,b0528442d1dd2716e60433a2b7082d76ec947185e86b6ea1c5603418ae0f1dcb,2024-04-10T13:24:00.070000 +CVE-2024-28896,0,1,286c9b14277dfd3fb198ad35d3d66add8da721df3cae192b0956bb3da3951188,2024-04-10T13:24:00.070000 +CVE-2024-28897,0,1,0a5ccdd1042b8db9d056fbeeae5a0c8cc4acbb19abca5fd7375a157081a30561,2024-04-10T13:24:00.070000 +CVE-2024-28898,0,1,59a427cf57f4f6010a775df10963b4a8d7529faa0ab726e1f146fa99467525db,2024-04-10T13:24:00.070000 CVE-2024-2890,0,0,4c3942fb63df92293ceb0810767d0c0704e4aa5c317aa4d330866ad74b1803b2,2024-03-28T12:42:56.150000 -CVE-2024-28900,0,0,7dbb6d3315b3c796081df2d1806abdc25deeb51f098cec752b15558ad30fb758,2024-04-10T13:24:00.070000 -CVE-2024-28901,0,0,793310470a6298fe128984e4ded538a52cc48406a9eb9a9f9c70e32d5ae3e477,2024-04-10T13:24:00.070000 -CVE-2024-28902,0,0,223f2fa4c8f8a03bbbf56e1ac45068b26a954bd05fb1ebea02b187ef639193cb,2024-04-10T13:24:00.070000 -CVE-2024-28903,0,0,7846a5f484d466fce0a132dd5d243f0638fdf44f4eff9887a92437b5229591a5,2024-04-10T13:24:00.070000 -CVE-2024-28904,0,0,345b43f6782760f81a6a20d10522341164d674e18eafc119e2be924ce37b5f00,2024-04-10T13:24:00.070000 -CVE-2024-28905,0,0,84235eea9d75a40938c157b16853c690e08ff18003c0563db09838692b6c6ac3,2024-04-10T13:24:00.070000 -CVE-2024-28906,0,0,bef94cfe1bbe8593dcaf860cf271e7ebfcea3db470c463e07ad82c7ffedc209c,2024-04-10T13:24:00.070000 -CVE-2024-28907,0,0,3154531b826ea592dccd4038856b3dddb516155e017bb180d8bf41c3d5e332fd,2024-04-10T13:24:00.070000 -CVE-2024-28908,0,0,a2bc6906d0b4798b7dc6bd735ac227851a8e1b398adfd2f7358bc2fb9e7379e6,2024-04-10T13:24:00.070000 -CVE-2024-28909,0,0,fca090335877a9803e98ebebf095b744cfb3bb11c955548a398029f362433a13,2024-04-10T13:24:00.070000 +CVE-2024-28900,0,1,b203b9ee55719f6f3e9fdafd8b34c8a81dcda2e283e54fe9556ae1c07188173d,2024-04-10T13:24:00.070000 +CVE-2024-28901,0,1,b7af6274f7d1fdccd02d3c13882167a0dca44278227b7e3e605a80f750921dec,2024-04-10T13:24:00.070000 +CVE-2024-28902,0,1,5d48e658c01b4654689da6b67e9f514b23d7254af031b3d9559a09540851ca1a,2024-04-10T13:24:00.070000 +CVE-2024-28903,0,1,7dee44c8d1a3a0186e8e9b83a364e19930ea8882005550783b8254b94b91f102,2024-04-10T13:24:00.070000 +CVE-2024-28904,0,1,8c988c5704b8ad109ebc5d625403926af139c58d66e868adfcc5995a4a6062c1,2024-04-10T13:24:00.070000 +CVE-2024-28905,0,1,c6f12ec34358f6669b667c50e3a511df4b729186a9c1d254bd321afb1d12dab0,2024-04-10T13:24:00.070000 +CVE-2024-28906,0,1,72fd4c0e97a10d433881f1327ec4be653178c1fd2ec5dc62670db785cfa6034b,2024-04-10T13:24:00.070000 +CVE-2024-28907,0,1,03afe815dcd129c95970e7cbf17c8ba726b0ce10d8de83656eb89ab53358ec0b,2024-04-10T13:24:00.070000 +CVE-2024-28908,0,1,16df0a4c828a05e9b8eadc3c40f8de1cc6a2245df7595d1486f09497771e195c,2024-04-10T13:24:00.070000 +CVE-2024-28909,0,1,57d68e1fb03602ba62e693163539f09c1c6a13bfc72738d11e27c3ed5d593b79,2024-04-10T13:24:00.070000 CVE-2024-2891,0,0,92d6aae8b25f44825c7b5f09bfe1575af417f8dadaf6983038b46d20f4be0c65,2024-04-11T01:25:39.760000 -CVE-2024-28910,0,0,959d509c7b013d9af4e4dcd1bfa9e0cb4375e2695ab950274ee76820ece551c9,2024-04-10T13:24:00.070000 -CVE-2024-28911,0,0,22323c718279a51e7a2582c392d8be0f78e702f4a24a5065c9ab0dc0b2a9e313,2024-04-10T13:24:00.070000 -CVE-2024-28912,0,0,82d10271df8d772b6997433b7f3383e25b6fe14897bf8db60720a1809c7c9ba6,2024-04-10T13:24:00.070000 -CVE-2024-28913,0,0,e354b2bed96265d0a943c75e3834cc3f8e0461beda6225cde35455b615ddd620,2024-04-10T13:24:00.070000 -CVE-2024-28914,0,0,df952b864838622e938ea9a8b7f91478d9431e637bb924c7e7d0350f29434422,2024-04-10T13:24:00.070000 -CVE-2024-28915,0,0,0c2c61d2c13376328deb3038f75ec6a67f6d2ac5894e96b3bd878388101eae21,2024-04-10T13:24:00.070000 +CVE-2024-28910,0,1,0e7fc50d91405adc804438be224af6c02d159aa177ee7d6fc6300440293ae43c,2024-04-10T13:24:00.070000 +CVE-2024-28911,0,1,bae4b422c3ec0f510c5e791db50fc84a937e1d83c970a7eb9cf3e86ccf0e3b21,2024-04-10T13:24:00.070000 +CVE-2024-28912,0,1,13f72840d2360e9041a847783f5a8a613822d251cd307623f96951922b91f356,2024-04-10T13:24:00.070000 +CVE-2024-28913,0,1,1004259288cab566eda2d254a4bb527968a91f75cc139dfff11628a733f7edfe,2024-04-10T13:24:00.070000 +CVE-2024-28914,0,1,9b47a840ee2ea939494930e08f4341ec691fde582d749394e920092145a77a7a,2024-04-10T13:24:00.070000 +CVE-2024-28915,0,1,c8d93dd8d8e9d7f3496ce3ad05c965c07e90d91e1c00aec2cb398336991be303,2024-04-10T13:24:00.070000 CVE-2024-28916,0,0,e706f666ea11a9941dbab0eda30a738bfd911f26992ec94b10c70243514684f3,2024-04-11T20:15:35.637000 -CVE-2024-28917,0,0,b13e17c3dd3af6821cbdfc8e5f3684c634fa564f50e58ca436f553bff168fd47,2024-04-10T13:24:00.070000 -CVE-2024-28919,0,0,8ded94536b1a484a61d231220d7fd23a2472525c8fa468c0d7a0b59817cbedec,2024-04-10T13:24:00.070000 +CVE-2024-28917,0,1,1e6692a1855b068f4acd279508d9e32067a6a679df9347bae767813c22d5b18e,2024-04-10T13:24:00.070000 +CVE-2024-28919,0,1,079770e7dfc323d2faae4b519f0ec8b40ec1eb6c6e707003507b564549164470,2024-04-10T13:24:00.070000 CVE-2024-2892,0,0,908252a3184a15f9b2100b51424da4c64122c16f355bd12f6dab43cbb2367749,2024-04-11T01:25:39.853000 -CVE-2024-28920,0,0,9bdf2a4bdfea9df599a550b0fc190822e6180c8a3e7442e39b37b901b3581f89,2024-04-10T13:24:00.070000 -CVE-2024-28921,0,0,ba5f7d2254a49a44e1cdef9e03ed45d026be1858bcdf245efb9260a35bf1dab3,2024-04-10T13:24:00.070000 -CVE-2024-28922,0,0,33d492649a7ae0a3aeaf915139cf5b88a9464e0fff6da2792bf61f67dbc72cea,2024-04-10T13:24:00.070000 -CVE-2024-28923,0,0,56d15234484b39e95ef5c6f60276e9025758dc0f688d23cba3938c0ed74aadd4,2024-04-10T13:24:00.070000 -CVE-2024-28924,0,0,ecedfa2b6a30b9a3c2ddf6260ff30cd8413bac30086c9c7b3635333a4ea3dcd5,2024-04-10T13:24:00.070000 -CVE-2024-28925,0,0,fcc8c96711f44f14847f61d89a390d224755ad91ec923055a48b1e4f9700a10f,2024-04-10T13:24:00.070000 -CVE-2024-28926,0,0,fa9155dd1b1133a73d6bce3527b2fdb917ff590ef5b68bae130db4b18ffb445f,2024-04-10T13:24:00.070000 -CVE-2024-28927,0,0,e114f5d24017a5cd3480feb8e65fb82053e2dc9fd04363284688acd2c037391c,2024-04-10T13:24:00.070000 -CVE-2024-28929,0,0,025bb271b324b9385f66680d0ddb3fa77a4add3e161497b5dd9d3eb618c724b4,2024-04-10T13:24:00.070000 +CVE-2024-28920,0,1,29bbb5a0053078b91bb73d209b79413cf3938f5f45a45e02daa16818adfdfefd,2024-04-10T13:24:00.070000 +CVE-2024-28921,0,1,78582c85830b2e06ea46d8c4b55cca9744596c2f17c0f2488b0075c3899a8eb3,2024-04-10T13:24:00.070000 +CVE-2024-28922,0,1,4f96695227ca5f83a23f4c6ddca6a6a06aba48d4040253898ece64f4840384c5,2024-04-10T13:24:00.070000 +CVE-2024-28923,0,1,92b0a561f01aa7c8ca9f012336d0ebcdfd741e583e924e2152f6e8dbdb439e8f,2024-04-10T13:24:00.070000 +CVE-2024-28924,0,1,e56c98b63ce2e4258a2d75e2373c55a7d6746edd02a048bc1eb9cebdf266477c,2024-04-10T13:24:00.070000 +CVE-2024-28925,0,1,20033909185b9c185081a9969da53bd8f679d2ea39ce9304b0cf4f1e109932ec,2024-04-10T13:24:00.070000 +CVE-2024-28926,0,1,dac590423dfd555a11b375502c621f94d73a470e3ca81141ad413c673f60b632,2024-04-10T13:24:00.070000 +CVE-2024-28927,0,1,7b60ead6d0c8add00213f0a2270ffcaa01d66fd20479fc38afa4300f98829500,2024-04-10T13:24:00.070000 +CVE-2024-28929,0,1,e9f8c9e034e8b99dffb84878ed544f8e62db0ee14c14634e4036cf67630d5cc7,2024-04-10T13:24:00.070000 CVE-2024-2893,0,0,1843e1b331f9090df58522c26f33824cc4a9fe0bae55fc6a7be7adaa99a442b0,2024-04-11T01:25:39.947000 -CVE-2024-28930,0,0,4c27e9db6b5dab804f9b8110be8a22f4302d2405410541611f618cddd1ae64be,2024-04-10T13:24:00.070000 -CVE-2024-28931,0,0,62718d618955466c94b1b174b223277dc858629699986a7baeadf052735eb5a9,2024-04-10T13:24:00.070000 -CVE-2024-28932,0,0,eb83a7559af1893aacd43466c79a4f92fc222d09960f28461eb6f37aec125984,2024-04-10T13:24:00.070000 -CVE-2024-28933,0,0,24c319072f1f14797024118448e29c46ceb0a83af085df1e12f2e71d10d56cbc,2024-04-10T13:24:00.070000 -CVE-2024-28934,0,0,800f5707ee90f7c8fc403b5d30ae7dcc34cd164c2666ff2ff2fb02ae9242ad48,2024-04-10T13:24:00.070000 -CVE-2024-28935,0,0,9cdf7283dd618dc176f17df4c88e75e37f91c6c71ce3b0881fcaa4f79e11ab67,2024-04-10T13:24:00.070000 -CVE-2024-28936,0,0,24b3c87e3b02eb59cb01e429888a0fc7fa3476dce967ab67b7fb279e37ed769b,2024-04-10T13:24:00.070000 -CVE-2024-28937,0,0,c0a05c167b06733e53705aaa03acbb0e19e82395bfe6a76b400d9b1fd23c2942,2024-04-10T13:24:00.070000 -CVE-2024-28938,0,0,a7c45c5c0439f85fa7a0639e05649ffb7d3be392fb1e53bab61a37a1fe3ceb8a,2024-04-10T13:24:00.070000 -CVE-2024-28939,0,0,98e1c4b62c1caa2530ec59167276143213b039ca6b5ec8e6785b1aefb64ed70f,2024-04-10T13:24:00.070000 +CVE-2024-28930,0,1,ddb7bea8c42e1b48a9ad16003154217758cbc24083fbfc7476bf94146e8432d3,2024-04-10T13:24:00.070000 +CVE-2024-28931,0,1,7384966a7cf022eb169e0803487c166a2974948e7a673a22a9f70508f0df0e42,2024-04-10T13:24:00.070000 +CVE-2024-28932,0,1,d0922d238cbfe19db5db98f56a7b506a66e50d46635ecf8386da528140c4fa6a,2024-04-10T13:24:00.070000 +CVE-2024-28933,0,1,e58f26ba354111f0a9d8df6ddfee854759d2d6c426e4631515b0ae5f0429aaa8,2024-04-10T13:24:00.070000 +CVE-2024-28934,0,1,1894f4e4e105f4387516707a8ee59913ea81975ecfcd09d6aa05ff8eb2cedc72,2024-04-10T13:24:00.070000 +CVE-2024-28935,0,1,34ec5be45be787669d42e24c38e9781dcf194bea2ca7cfd5d58fe486bc65a86a,2024-04-10T13:24:00.070000 +CVE-2024-28936,0,1,5fa47a63497adeedf4f73387a73d48532582b75f97d96daebffaf71d840c8746,2024-04-10T13:24:00.070000 +CVE-2024-28937,0,1,29aa0711136018e902e36736b2b8d48add50dc84135f1a6f8045733b415c75eb,2024-04-10T13:24:00.070000 +CVE-2024-28938,0,1,df86382e8a56fd400656ca607b53ebca1946cc9a02b960734a7635da6b85c426,2024-04-10T13:24:00.070000 +CVE-2024-28939,0,1,9d77f6e9f94619f38809055a574130f658873ae3047222b29d8f529ed94c8346,2024-04-10T13:24:00.070000 CVE-2024-2894,0,0,4381eb8ec0fd0ec577c6d700c34ade1ba6ed70aac14591ae8a3b2eaea4f40eec,2024-04-11T01:25:40.033000 -CVE-2024-28940,0,0,f96c6aea73a5074ddfc722dc73a55e3193795eb9369027da762d2e806ace1188,2024-04-10T13:24:00.070000 -CVE-2024-28941,0,0,3d33cd7f5fe0a36bc31a2bcc2e0d9e623c9cb82d5f7da1416f35e9a4c647ec51,2024-04-10T13:24:00.070000 -CVE-2024-28942,0,0,e96311acc678442db001569bff31c52dce71fce7ce8878aad213eb2fe1489d87,2024-04-10T13:24:00.070000 -CVE-2024-28943,0,0,411e1b3df0c04f11a5800ad88e43e1db907b5d45ede277521153638ce95049c6,2024-04-10T13:24:00.070000 -CVE-2024-28944,0,0,da417a74ce7fd929adc27cf7ac1e35d6d0c2d61b171b81664a4c6cfb063ec752,2024-04-10T13:24:00.070000 -CVE-2024-28945,0,0,00d4f51f8da6564f0515744b30ecd78dabb86e2db6190d9e8bf1f815b32db603,2024-04-10T13:24:00.070000 -CVE-2024-28949,0,0,d59e9094e037f96ff4bc86b6cb6d10d8eb628a7e17d47b677dc979654662e8ff,2024-04-05T12:40:52.763000 +CVE-2024-28940,0,1,e0df5896c6f9e6416092ead699309aae1e34b43c25374be6102e513c505f5bc9,2024-04-10T13:24:00.070000 +CVE-2024-28941,0,1,0cc751af1a11bb0acc0919769a89f0f9d20fce9e553ac2f1bb5e0385d93ca37b,2024-04-10T13:24:00.070000 +CVE-2024-28942,0,1,6ce9487b7674899a890f931a57018fdff9d2d1dffdb0eca9598a4bcd1642a8e7,2024-04-10T13:24:00.070000 +CVE-2024-28943,0,1,72866fea18ebe3f987f03d5964ddd9b86605fb90b7bb3cca339095916f5baab7,2024-04-10T13:24:00.070000 +CVE-2024-28944,0,1,eacf9b24abaddca3252bddf107477dc058bcc4f073e99508835581adf310c0f8,2024-04-10T13:24:00.070000 +CVE-2024-28945,0,1,b08e2cbb1c7a93b1222ebbf8aa1a37e80f7f024f6c88fb0439aa69284f048fd5,2024-04-10T13:24:00.070000 +CVE-2024-28949,0,1,4edf5d325effaefea897e8c73e89e2e83493d64d37f4fcb7d9633b3c6ac5712c,2024-04-05T12:40:52.763000 CVE-2024-2895,0,0,d61a8f2e21d910d4ee1cce78240b172700d6d37b7338513222c6ec123c5cf7f8,2024-04-11T01:25:40.127000 CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000 CVE-2024-2896,0,0,5de59d7245da47f589f3ef8b760f3f6474bf3327cc8f382548cfd383506a8e1b,2024-04-11T01:25:40.217000 @@ -244028,27 +244028,27 @@ CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11a CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000 CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000 CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000 -CVE-2024-29043,0,0,615f4280adc066f10773f9e067e5d4716a07cf5356a1c0ff327cde289a9ce5dc,2024-04-10T13:24:00.070000 -CVE-2024-29044,0,0,ba67e9a20cb9127256f10d9d32d8847817dba5705106715ef5acaa6821a1cadf,2024-04-10T13:24:00.070000 -CVE-2024-29045,0,0,e2caa1789aea209881890f4d6b05c684e90e994781ea9f2f43861c07ce42eff0,2024-04-10T13:24:00.070000 -CVE-2024-29046,0,0,7dc8a12dd333b1e7bde6b140c386bf7a30c39e0aa0297f533651eee9158b9210,2024-04-10T13:24:00.070000 -CVE-2024-29047,0,0,65e774e197709a4f195e164ea21b77cbc469eb496b61a5e57330612a7bb5e93a,2024-04-10T13:24:00.070000 -CVE-2024-29048,0,0,04936e95cec2b19b68e73741f728697338bb2c4c82428437b21307d0563c31b8,2024-04-10T13:24:00.070000 +CVE-2024-29043,0,1,a6b5a5b270ee9b198f94a0f09e59dfb944c5cad6bfa0e71af6c157ac0edbbe91,2024-04-10T13:24:00.070000 +CVE-2024-29044,0,1,ae51cbba69d0cd130e7153b8c4e56bd5c91892037a788b9c1a3360acdd58d5db,2024-04-10T13:24:00.070000 +CVE-2024-29045,0,1,c579ea038cd6474a627c83b85e9238c9c2e0f67839ea3c295f36779cfe8f829c,2024-04-10T13:24:00.070000 +CVE-2024-29046,0,1,934c54a354b7983248c1038ad849bfccbb8c13c9b2573a8e1ac4e386edc3669d,2024-04-10T13:24:00.070000 +CVE-2024-29047,0,1,caa5c4d2d0f1bf304a4ee6216a36e2941161e0820c7a8b8276d73d490e44c6f2,2024-04-10T13:24:00.070000 +CVE-2024-29048,0,1,95c20ac7de8bc227c17638fc56daca89aa86872041643304379a7c60cc8dac12,2024-04-10T13:24:00.070000 CVE-2024-29049,0,0,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000 -CVE-2024-29050,0,0,8360259cd344b14f69bda758f8335aa676d95c53a6cfd02fbdbb8bec5327620c,2024-04-10T13:24:00.070000 -CVE-2024-29052,0,0,302fc34361a07dbe23f17db03f551ad99d4562d0bb8ee613b460c283d7d5e45a,2024-04-10T13:24:00.070000 -CVE-2024-29053,0,0,09dc8f7740e68432c3bee006e802b148ba0f860af91d5804e09e256182c371a3,2024-04-10T13:24:00.070000 -CVE-2024-29054,0,0,bbdbeecd9a69c8e37be2b996f14c1993e0ffda0c449d3aa94c0d31ac9f54902b,2024-04-10T13:24:00.070000 -CVE-2024-29055,0,0,8cde63aff7b2d2368fe4de1d8ee6c171074c5dff974e33678413a0a566074c03,2024-04-10T13:24:00.070000 -CVE-2024-29056,0,0,790bd619d3d320f5fb7c89ec15f9c75dda230c9024c14cda7a236f2f4138d020,2024-04-10T13:24:00.070000 +CVE-2024-29050,0,1,b81f6cf3efac23ad29fb0ec76c4ddabcbf2924e0345ac83e98aface32c2a7152,2024-04-10T13:24:00.070000 +CVE-2024-29052,0,1,8baaf625c18ac9f1ef2c4e663966f2220f841c4e9f88900d8fdfc1e431c0b1f6,2024-04-10T13:24:00.070000 +CVE-2024-29053,0,1,471c6e5251806e83b0549ac60349aa965c82a65f766ed16f5ab804a043cfd87c,2024-04-10T13:24:00.070000 +CVE-2024-29054,0,1,9c8bb63335b4bdbeccacedcc7a5d86757aa0928570c204d1d2daadb453b24b5a,2024-04-10T13:24:00.070000 +CVE-2024-29055,0,1,3445b0211831595bf4855fcc998d05e20092c56a85048071ba01ea078e1869e8,2024-04-10T13:24:00.070000 +CVE-2024-29056,0,1,59e4a201e827c9d4ddee55e826858fe99fa43e081c8d3803a7f9f3af32fea6d8,2024-04-10T13:24:00.070000 CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000 CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000 CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000 -CVE-2024-29061,0,0,3bfb422d4e76899d3d41b900f882a38fc0665d9a3b0f190e4f150546d578d76d,2024-04-10T13:24:00.070000 -CVE-2024-29062,0,0,0661482f64104a2c2b10b8bf9cb7f19000cd069b3931f334801dc674e2a800b1,2024-04-10T13:24:00.070000 -CVE-2024-29063,0,0,484c12ce67fecdde3fc48f99e3d076fcb0724f4f0216294a0c173ee61d2ede59,2024-04-10T13:24:00.070000 -CVE-2024-29064,0,0,d672fbf377f52416d580855f81a9318c25190f86e545d2d14fdb639663773b74,2024-04-10T13:24:00.070000 -CVE-2024-29066,0,0,050a2b8655c09f3897fdd4344098252722081ecfeb58e53a7257878b70e6e8c7,2024-04-10T13:24:00.070000 +CVE-2024-29061,0,1,9a84b2fa53241053529ab7c7923670b025db4a34c5978d7081a5a0e488bf1dc6,2024-04-10T13:24:00.070000 +CVE-2024-29062,0,1,aca6985c8b36eeb4c7255030efc95c15b663af6c314c31265729ece46da72913,2024-04-10T13:24:00.070000 +CVE-2024-29063,0,1,9dd92692e86c18107436ef4a5c609dee7af8a065ae51bf02187ee7cc8285048a,2024-04-10T13:24:00.070000 +CVE-2024-29064,0,1,6a31c4be5cdf5b4136f98ebcdea18ed590cfcb656650a646fb3bcb2e2a9235de,2024-04-10T13:24:00.070000 +CVE-2024-29066,0,1,b033dec16249c47216f72affbb210c8ed478f17a804b8c831619777a2cc5b7fc,2024-04-10T13:24:00.070000 CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000 CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000 CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000 @@ -244115,7 +244115,7 @@ CVE-2024-2916,0,0,c74b0e02c26d49757c7110350f70f594c80131a88e5459340882216a6ce2cd CVE-2024-29167,0,0,a241c0370aca39bdde3756afb7c001252f0cf73de126f56792a3495b17752ba7,2024-04-11T01:25:12.800000 CVE-2024-2917,0,0,fe4ecbf71555b0a304d5040dfe64f154cd535585df66817c9fcf17ba930da936,2024-04-11T01:25:41.313000 CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000 -CVE-2024-2918,0,0,e76b7b953cb3273412dd642f5d94b893176191276b7c3ea8a43759fa5ce53ea6,2024-04-10T13:23:38.787000 +CVE-2024-2918,0,1,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000 CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000 CVE-2024-29182,0,0,994aac2c86ee972711edfdd4e92cd8578cd6ea33eb856fd8da15e01f82c49b30,2024-04-04T16:33:06.610000 CVE-2024-29184,0,0,5d28e98e710e6ef5aa032fbd7c50016a2d314d8a7140355939fc7fee0918ef2b,2024-03-22T19:02:10.300000 @@ -244141,7 +244141,7 @@ CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71 CVE-2024-2921,0,0,6f7f3b512cf8e7465b0aea1823cce56bf608a3c1f40869feddab084c3da126e6,2024-04-09T19:15:38.423000 CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000 CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000 -CVE-2024-29221,0,0,f2d1d960d4a048ea2d2f1110f82493b575c09a1c9952fc52354f28724a9b468d,2024-04-05T12:40:52.763000 +CVE-2024-29221,0,1,5b9bc923efd821827e4ccdc23f19bce61ce6bc08809d3d2c26ee85f72d1e2770,2024-04-05T12:40:52.763000 CVE-2024-29225,0,0,a6cc20b79c51246e02458e8af6d1ba48add09d07b0dc74d5ff710efa51c99a1a,2024-04-04T12:48:41.700000 CVE-2024-29227,0,0,f6ae69390655a5f3b8c2022246ade0c8e664001b7471a757ba66feb751afa8e1,2024-03-28T12:42:56.150000 CVE-2024-29228,0,0,c25efa24257cb2397a0d93759c26652d6dbbd7283b577526be7a83acca6ea890,2024-03-28T12:42:56.150000 @@ -244162,7 +244162,7 @@ CVE-2024-29241,0,0,0d22a80c0de17d3b18b0f9136bc6951a88a9b84e77f5185bb4dfc57412ae7 CVE-2024-29243,0,0,862def336b16032c1130c00f979aa4f537404b17294c1ae567f40eb15801f627,2024-03-21T15:24:35.093000 CVE-2024-29244,0,0,f38f58b77ca3d656d49038b33ac381f2ddffb3511144fd7b7141fdc358ac519c,2024-03-21T15:24:35.093000 CVE-2024-2925,0,0,7e1bff7e262b77495d2e25a300630629f063c78f4962ee86607d3baa34c6e9cb,2024-04-02T12:50:42.233000 -CVE-2024-29269,0,0,36b619c41c14f2c02cf2ae1fee2eb7d8b4de15f54ec440f48b1c530eef83822a,2024-04-11T12:47:44.137000 +CVE-2024-29269,0,1,9b11d11a037b6954b270dd1b7e311b80ffcbe943612f925425d255419b632392,2024-04-11T12:47:44.137000 CVE-2024-2927,0,0,bdf732f7fa78a5c3cda179e5feed61ca3a4c17d8b99723863a302b2e126d87a3,2024-04-11T01:25:41.463000 CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000 CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000 @@ -244171,7 +244171,7 @@ CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d084 CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b270d,2024-04-02T12:50:42.233000 CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000 CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000 -CVE-2024-29296,0,0,5b58dad52a7b2dec666d2978e3f5f4cece57f7bf0cc217fd87e64ea8463739bc,2024-04-10T19:49:51.183000 +CVE-2024-29296,0,1,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000 CVE-2024-2930,0,0,337492b179fbec8f39a448e0d835a264515add1a9cb1abd7b1714333878c14e4,2024-04-11T01:25:41.570000 CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000 CVE-2024-29302,0,0,befca4baa09da55c6ccc652e95ace012df1b1e2aab7ec33ac183ae5971911acf,2024-03-26T12:55:05.010000 @@ -244204,24 +244204,24 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3 CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000 CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000 CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000 -CVE-2024-29439,0,0,1aac7039b2e7c87e86c2cabdf4d223a74c967c55162af47c9f6278ccfd9e4c56,2024-04-11T12:47:44.137000 +CVE-2024-29439,0,1,7cf0a70cfb4668256337458d91ed2c0209386440e59360f7cd569e5c066d3d8d,2024-04-11T12:47:44.137000 CVE-2024-2944,0,0,bf30485559894333f745f8eef196b6be024a5609ef9407e8d76f3c04dece3bb3,2024-04-11T01:25:42.527000 CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000 -CVE-2024-29441,0,0,2c9147cb4c4a28541276b47a84003a8ae2aeb0f6cf9d7228788968c8b4dfd9ab,2024-04-11T12:47:44.137000 +CVE-2024-29441,0,1,7d177bd767a6ee2302e79b98db9366f551a06c46417701848d75068973be5d72,2024-04-11T12:47:44.137000 CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000 -CVE-2024-29443,0,0,23da21eb5c033ef90bb7e61564ff7cc8f31845b5649a0c15600b8c3d545e6f83,2024-04-11T12:47:44.137000 -CVE-2024-29444,0,0,95e62b56b5e97e2ed604d6219af5deaf255bbcc5cd82d870f91f4bd55c259516,2024-04-11T12:47:44.137000 -CVE-2024-29445,0,0,c2ef72c3c2391ffd126adf78e3d5bceb8bf2e01256830d65ee297de99f5d377c,2024-04-11T12:47:44.137000 -CVE-2024-29447,0,0,92c6de77b8cf380385bb9e656f2ad88813d4a29832b3293c0533cca88aeb477f,2024-04-11T12:47:44.137000 +CVE-2024-29443,0,1,56c4a998b5da875c2f7671831ef2b48002f3c56461a59b8a1dbbd2d293ca92b5,2024-04-11T12:47:44.137000 +CVE-2024-29444,0,1,0268c5b80999b51afe8710a3826f9f5f0fd5248ec4523b9a74cbe1ada6ad287b,2024-04-11T12:47:44.137000 +CVE-2024-29445,0,1,cc3751764af52423ac5b7dc05636571bd50b99f4e8200f72021ee84ebbcf377e,2024-04-11T12:47:44.137000 +CVE-2024-29447,0,1,e1180cdede2080c441e7d0c7f49606d27c37531b26d1a8fd47e476e26ff10081,2024-04-11T12:47:44.137000 CVE-2024-29448,0,0,4ba65fdbb0ca30d9cdfb72c06aca70585e95b847cd3e3e977305949fbe0c68bd,2024-04-11T12:47:44.137000 -CVE-2024-29449,0,0,04bec11fa670c70a10a9dea0184c3b9e4afb5240d7fa22eb888d883293f95584,2024-04-11T12:47:44.137000 +CVE-2024-29449,0,1,47dcba52f80d694fddef2a5c37e5d232752be79c6d29facb1f20baa4976bd45a,2024-04-11T12:47:44.137000 CVE-2024-2945,0,0,9a8b20f2d1f78244c8700886f61029534f24a9a5de87a4254b75a2868f9e961c,2024-04-11T01:25:42.617000 CVE-2024-29450,0,0,005fd00ff20c3a890af8b95157cd66876d6e8274cc9a8e97d7d9e2739fb8ba9d,2024-04-11T12:47:44.137000 CVE-2024-29452,0,0,390452f7e03ee0abed26b2bb426d4b14b3ea2b82601f2db2f6e611b242e9dfeb,2024-04-11T12:47:44.137000 CVE-2024-29454,0,0,c5e740cd1abf29bb706f61bdcb9cac715190bdeda241ee5e4735d3e49da21397,2024-04-12T12:43:57.400000 CVE-2024-29455,0,0,6e1789780e5aa8031c75de8caec34ad04dbe0084b961cab46e445dc7c45cfc0e,2024-04-11T12:47:44.137000 -CVE-2024-2946,0,0,8a22c9853e8b531bbd8a8e90a11cfdbe9528f15dbd8531539c68a8acd7935dc8,2024-04-10T13:23:38.787000 -CVE-2024-29460,0,0,a86cab0a2fd502381de5f641ee662fdee151a3a747010fc347b01d225e8de57b,2024-04-11T12:47:44.137000 +CVE-2024-2946,0,1,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000 +CVE-2024-29460,0,1,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000 CVE-2024-29461,0,0,0a962275603a40d5edfc4c251c5b3ff3f503370fb441ed65dfd9001dd22fa797,2024-04-12T14:15:07.597000 CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000 CVE-2024-2947,0,0,1f5db3dcaa8eaba268358fabd07cd32a790eaac8bc91ef0018408fc63d80627e,2024-03-31T02:15:09.150000 @@ -244236,9 +244236,9 @@ CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee CVE-2024-2949,0,0,fe05e354f0ebdb867f0f2833560dc840c15ef92daf8a56e7a3e31b95f453d065,2024-04-08T18:48:40.217000 CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000 CVE-2024-2950,0,0,e07028f6204e1653615da40fab9edc1b22f1b4a28f65125bfe5341d4aac985fa,2024-04-08T18:49:25.863000 -CVE-2024-29500,0,0,f19fe0d4eef22dcbc0de1681b68c822fe92bd8301841316fe4ab14118f48716d,2024-04-11T12:47:44.137000 -CVE-2024-29502,0,0,6e62dadbf98cd95dfd98e33bc4b97382893fb78f7e45df165b4a86a3e4380d37,2024-04-11T12:47:44.137000 -CVE-2024-29504,0,0,0938f06acf0a8f69ee3ef724f38b387cd9b8f781e41e16dacd9a6749142d5861,2024-04-11T12:47:44.137000 +CVE-2024-29500,0,1,e867a892b6feea61da09f4d0f3774bdfb045763ae21492d0ad387c1de2b2b650,2024-04-11T12:47:44.137000 +CVE-2024-29502,0,1,1cedf8999be6431ee5260cbb2cb95e7cf3e534192a33d0246363cb8fb473dca1,2024-04-11T12:47:44.137000 +CVE-2024-29504,0,1,0d65a25fe5a416a240505601ef6342ac18259cd3d27cbe77fe65455a306d4953,2024-04-11T12:47:44.137000 CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000 CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000 CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000 @@ -244246,7 +244246,7 @@ CVE-2024-2952,0,0,939a970c38c4c38d32f261474303e00aa67a1ba31ee744c3e77cc578544ec2 CVE-2024-2954,0,0,297c9bf8798d95f9e2afa5ec16629f7d540183d0c516c52354e99c26b91889b6,2024-03-27T12:29:30.307000 CVE-2024-2955,0,0,7b3584b3085df80313994af4cf3b36fbdc31ed891538537fda101558172f4879,2024-03-27T12:29:30.307000 CVE-2024-2956,0,0,1f998613263914bb93c36fc6850584cdfe450d6dc26811c07d743b16483d0fc7,2024-03-27T12:29:30.307000 -CVE-2024-2957,0,0,2b14847427942168b4cc7724519e3dd6505cf12874643bed2563c8363bfa3b0a,2024-04-10T13:23:38.787000 +CVE-2024-2957,0,1,ac8390067e308aa1d0182fc1e6566dfc49293a4efcfdac5c5a2e83565eda21fe,2024-04-10T13:23:38.787000 CVE-2024-2962,0,0,66e1dbbf6553695d3f3b80872691537dfe2ee799c385611e870cc04c150d3a60,2024-03-27T12:29:30.307000 CVE-2024-2963,0,0,fd3dfe2484fa8fbcf32b1e1713c092eebd2b546a8fe9a7f583270172bb703a7d,2024-03-29T12:45:02.937000 CVE-2024-2964,0,0,491ec5f2811a24301edaa3e4cd378090bf610cd2f1b9a50cd7e0dcb254704174,2024-03-29T12:45:02.937000 @@ -244256,7 +244256,7 @@ CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000 CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000 CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000 -CVE-2024-29672,0,0,776eb07524d64e6e5cc2e229f34f0dd803ed0649383c6a95c6b77a4d3423b9d6,2024-04-05T12:40:52.763000 +CVE-2024-29672,0,1,1eb55fec3ce5ae998cf80be88c51c3b9d6ba2532b7f0accc6fb84646ec36fc57,2024-04-05T12:40:52.763000 CVE-2024-2968,0,0,bb1433aeb37408aced09cd0721b3e3c51d5f43d4ee9668f91f68b12504b22dc7,2024-03-29T12:45:02.937000 CVE-2024-29684,0,0,cda7b88ce861488cce375da0c97c96f4e8ca98f9272907d42a882870472a7fa4,2024-03-26T17:09:53.043000 CVE-2024-29686,0,0,f28994100c5b68b5e6e76a2cd5f49e57e689fa593d950ab5fc8ee013ddbaa784,2024-04-11T01:25:13.773000 @@ -244268,7 +244268,7 @@ CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc14 CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000 CVE-2024-29738,0,0,99465af485b39ff68e105b0428c69eb9adbd1c8e009fe9a3569be9db8bf56cc1,2024-04-08T18:49:25.863000 CVE-2024-29739,0,0,7135a40bab238cf97a55844698a5a7210b69874e392968b48d12413c9c3727c9,2024-04-08T18:49:25.863000 -CVE-2024-2974,0,0,ea7a3b2b60655ce9a8504c77a0301c9fde1ddf3567070294ad8f2cee3457bcf9,2024-04-10T13:23:38.787000 +CVE-2024-2974,0,1,cc3d6ccfa15f0e42af840eac31b32f2ae897d1c61c7e06aeb8dd8aa1c1fe2162,2024-04-10T13:23:38.787000 CVE-2024-29740,0,0,6afaeb137abdb820cd439f4a8de4b3444fb8dd8390664ecb8f5b544cb64f829a,2024-04-08T18:49:25.863000 CVE-2024-29741,0,0,58a208fae70919819896a10b0ac69af17481c90fbaf33f6b074138668c8454e7,2024-04-08T18:49:25.863000 CVE-2024-29742,0,0,013e0935d87738e02ad985787df8e1bdb20608d450a31e334d4001bfd987aadc,2024-04-08T18:49:25.863000 @@ -244359,7 +244359,7 @@ CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09 CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000 CVE-2024-2986,0,0,01bb42d09e6880377170054d703fbd0500734f3636bfcb54533e077ece93d102,2024-04-11T01:25:43.877000 CVE-2024-29862,0,0,a716ba813aa67ee5575393b9d0a0602e3eeaba0f3c15482bf8b9bf774b2f14bb,2024-03-21T12:58:51.093000 -CVE-2024-29863,0,0,388618c2b783009f36afce6af0c89975a6bf81e4406d69131389d902724e5763,2024-04-05T12:40:52.763000 +CVE-2024-29863,0,1,5ec71e17f35f1b20d68a8fb4a9c7a1d55d3d29cfb9efd5769e3093565fc81079,2024-04-05T12:40:52.763000 CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000 CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000 CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000 @@ -244393,10 +244393,10 @@ CVE-2024-29898,0,0,a2f935bfbb33add93aff8d32c09dc9f7952be5c0243aad5cba34861657283 CVE-2024-2990,0,0,89c533835232ad897b32cd77305aec10d5a9688e15694ac781a10f6133dc8ebb,2024-04-11T01:25:44.273000 CVE-2024-29900,0,0,b99cd571d8d699adcff1d9a0f6085772745471b84efa1b60422f06d61cde9485,2024-04-01T01:12:59.077000 CVE-2024-29901,0,0,b07651b5e3683d58062a2619f65cd6b587a09c22191d8a54182f7055ad9642db,2024-04-01T01:12:59.077000 -CVE-2024-29902,0,0,d38aca6bfbbc05b483f7f5cb07bbeb0f385ced4324e96528738f421c68e89ce9,2024-04-11T12:47:44.137000 -CVE-2024-29903,0,0,95f39478e0597c4a9552f60d463a9990494f462b7a00898192e5a261c00c929c,2024-04-11T12:47:44.137000 +CVE-2024-29902,0,1,ff524ff233541889b72946b7788a46aa29d3ce32e5ad5b964571c174c6677d60,2024-04-11T12:47:44.137000 +CVE-2024-29903,0,1,5ab370ea9fa2ddd9940950d7a3afa524c2d9d070c2e0c9be888b8ea9f403586c,2024-04-11T12:47:44.137000 CVE-2024-29904,0,0,922d3ca540b7a7a38e394677ef40fbe71374cf5fd3f36e5754c424444d9736e1,2024-04-01T01:12:59.077000 -CVE-2024-29905,0,0,3a300037a30bf563b822204e8e235e379178549d87f6d48f161231fe894a3135,2024-04-10T13:24:00.070000 +CVE-2024-29905,0,1,78ce7fba049d2754a58dcb03228f818c108f85be1c93b32f6c333cbb00b3530d,2024-04-10T13:24:00.070000 CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000 CVE-2024-29907,0,0,95ebf1e66704307f93559559f18923b10f644f7f3c6486fedede31060b34f004,2024-03-27T12:29:30.307000 CVE-2024-29908,0,0,e8d16098eaf081188862f8dc959904187f56568ff6eac559fa0228e1e293cd7d,2024-03-27T12:29:30.307000 @@ -244445,16 +244445,16 @@ CVE-2024-2996,0,0,ce0ff76245864ce5ac90a5463bb82f1b7ea8cb5b36b1788a5a81e2b6f1ea29 CVE-2024-2997,0,0,9898fb7013ec19b0561eed8c77e485f2157863b27165155c8b5ee1597a437181,2024-04-11T01:25:44.910000 CVE-2024-2998,0,0,d70ba68eced6e12f3efc70fcd8b1293409b727b749095518ed0181052dee5fce,2024-04-11T01:25:44.997000 CVE-2024-29981,0,0,c96dd694e005cfa279d5e947e4d6817df7542f096ff0bafaff31fc9da738a741,2024-04-09T17:16:00.943000 -CVE-2024-29982,0,0,828adb40e7a46ad2755ae7d326d94defcacf0824217650e8a96cec0a1412fe3d,2024-04-10T13:24:00.070000 -CVE-2024-29983,0,0,83a439dab50417fb19eea9e6c9d07944bb361a90cf8c965c3ad44b479ec8e259,2024-04-10T13:24:00.070000 -CVE-2024-29984,0,0,03565b9dff15922c4650dc6cb11189e28c92d3f477cb5d1ce948f5dc8104a0e4,2024-04-10T13:24:00.070000 -CVE-2024-29985,0,0,ecd647e730d9fe4ac860214c3e9d3db7d1b53abf76d5d33e6723598159fba518,2024-04-10T13:24:00.070000 -CVE-2024-29988,0,0,a0efdfbf37c4e514af846a2611bd4463b9c04fc119836c107bb135dcc7dd289e,2024-04-10T13:24:00.070000 -CVE-2024-29989,0,0,3d3690284866aa560de959ef564399c99d1a9c5021f162c575358cd43a180264,2024-04-10T13:24:00.070000 +CVE-2024-29982,0,1,64f04207a570cedc766e0c25e46008bcac3eae2a59a1b82cc7357dd602bc9510,2024-04-10T13:24:00.070000 +CVE-2024-29983,0,1,fcb26f8ef908d69f46c133d47f6fa7f3c86c8dbeb0e9e8f0c2b6960da90e3d87,2024-04-10T13:24:00.070000 +CVE-2024-29984,0,1,c8eb19615edacf6092478fb2ad2d94260f928e0cc536a406011e5f52cd4d7b56,2024-04-10T13:24:00.070000 +CVE-2024-29985,0,1,2e01df5251c981f52737c67be1729569718fa94485a3bfe706db8d88b47a628b,2024-04-10T13:24:00.070000 +CVE-2024-29988,0,1,bf0bbcb636e6e27ec2cb89a88c8abc4abdf1f79b1102eae649a3dab7cec00dda,2024-04-10T13:24:00.070000 +CVE-2024-29989,0,1,8f06390ede228924078f3e71f278dc13caa7b29bc7a43dd5671d47700d642746,2024-04-10T13:24:00.070000 CVE-2024-2999,0,0,93764efa64b3dcfc4638c75bee33639db1903b616e49bced1213022003f81c16,2024-04-11T01:25:45.083000 -CVE-2024-29990,0,0,737297a77c95354026c4bc9022e7a4c7842bbe07957fac1faf2377e6f04ade39,2024-04-10T13:24:00.070000 -CVE-2024-29992,0,0,c4c9dce0b9d8d1cd0eaa6e1d4c0292d54fe819d6745e16370151d288ca4fcf56,2024-04-10T13:24:00.070000 -CVE-2024-29993,0,0,d781c19dcc484ee8bab5459993a9c02fd62ea1a56af9a8167a2a823087a6aa05,2024-04-10T13:24:00.070000 +CVE-2024-29990,0,1,4fb22e3f78e293ab66036da85b0456e7601ca3a5f8a3371c39802daa9ed68e73,2024-04-10T13:24:00.070000 +CVE-2024-29992,0,1,a9a6a6e362d1822da112d05802efc488015940dd3b3a1bc471e83e0b667ed82a,2024-04-10T13:24:00.070000 +CVE-2024-29993,0,1,c0abc6441c54b5cc8347c2c61be82ca5f5d688e960629985178e6b0cadd03b2a,2024-04-10T13:24:00.070000 CVE-2024-3000,0,0,5345dfb9fe0095c252e690315f2c208190816c6842c47344e6d14d6a58ee9cd5,2024-04-11T01:25:51.190000 CVE-2024-3001,0,0,166014582f95ace18f19056bf46328e639c7eacf99106f9aa7a80816fde73f40,2024-04-11T01:25:51.277000 CVE-2024-3002,0,0,16788083fe7e681bdbe59bf4b485529665f3f0fe70ff2027f0a151c33e7f2889,2024-04-11T01:25:51.360000 @@ -244497,7 +244497,7 @@ CVE-2024-30196,0,0,d2ac84277a23f4b5e271ce2c7d4f7b0b3ba143a5ee4c4c57ab5da01130524 CVE-2024-30197,0,0,288d78e7c11236a5f722084420002764ad474d2c9287fafa0d6ab710ccab6011,2024-03-27T12:29:30.307000 CVE-2024-30198,0,0,31fee0120950788847cd0ab4b7b0da2f0726f56dd48f310d8edd8da5db6cd55b,2024-03-27T12:29:30.307000 CVE-2024-30199,0,0,d2af55dc99f66af456eb8430e12e50fddabc5ce58b7a94f635d8b2dab64c1797,2024-03-27T12:29:30.307000 -CVE-2024-3020,0,0,f6ba83f1982c41b739b7ca341ddabb3ae1ddfda5684e74601b329b8e7d9ab5ae,2024-04-10T13:23:38.787000 +CVE-2024-3020,0,1,d48d97f2e6cf6f4abdcfb96091c7720f82f38bf4177577222de3405e587a6a87,2024-04-10T13:23:38.787000 CVE-2024-30200,0,0,9adcefcb3e5812cec8cd44a9a88b692de594f8e133ab1714b423d1bff89ce491,2024-03-28T12:42:56.150000 CVE-2024-30201,0,0,3952b6c13b3d885aad66ee813b7d523c28ff501b8652baca0c999976127b257e,2024-03-27T12:29:30.307000 CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4dc77,2024-03-25T16:43:06.137000 @@ -244548,7 +244548,7 @@ CVE-2024-30254,0,0,ca73d473f0415036087aca2c59a68335788468b11a20b2908935567766161 CVE-2024-30255,0,0,7a6027ee928c41155eb75584731055507a485cc638e26b6a9a3843b7b8e81c23,2024-04-05T12:40:52.763000 CVE-2024-30260,0,0,c6bf8d1d16b655c7a063a3beaca3d5e8dd95040bd121f2300be6f059b963ee87,2024-04-12T02:15:06.457000 CVE-2024-30261,0,0,32805bf675259d2c4189a3b4724ae8e9d235b7ebd7897ef404f285aaa8896b80,2024-04-12T02:15:06.540000 -CVE-2024-30262,0,0,f318cfbbaf899854242caf1fb06c65e4db818618c4c661c397f9e1f24a120f34,2024-04-10T13:24:00.070000 +CVE-2024-30262,0,1,1fa25a25356aeafdd2a6a2236d1119dec7ce89cccfc2e5ccf2d342cf39a19bd5,2024-04-10T13:24:00.070000 CVE-2024-30263,0,0,865e3a568432a1e114cdb349ba49e79d9bbc223ad67092921d5af173a6615f0c,2024-04-04T19:24:50.670000 CVE-2024-30264,0,0,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000 CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913b9c,2024-04-04T12:48:41.700000 @@ -244677,7 +244677,7 @@ CVE-2024-30455,0,0,115244366736fad049cb2d568fd37bcd1f9387962814ae164a94d7f893776 CVE-2024-30456,0,0,58b7f6d9df0133114222c028c59aa68a983be02157b04b25b467f54970276f3b,2024-03-29T13:28:22.880000 CVE-2024-30457,0,0,0e1a5411ec4ddd12ef39ffb10d5b7f249bf382292e8158c3b3ccafeb0f7acbcd,2024-03-29T13:28:22.880000 CVE-2024-30458,0,0,138b6d21084a1b9981d25ac0a20e6d58c8531b97987312f29ce581613992ae6f,2024-03-29T13:28:22.880000 -CVE-2024-3046,0,0,6f7de942e8e549f1d11128ce1fdc1d43ff069b9ee5096f8d2f2a11dd0def2f36,2024-04-10T06:15:07.253000 +CVE-2024-3046,0,1,f5e052c1ea891df75a0fe667fc4295d772a2daf5c23e7fc1339c4348c40758b9,2024-04-10T06:15:07.253000 CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000 CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000 CVE-2024-30463,0,0,417553a6f74795aba1e180f9fa11122fb72f60b63e441eca3940c7cd28530a48,2024-04-01T01:12:59.077000 @@ -244721,7 +244721,7 @@ CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000 CVE-2024-30524,0,0,3f617e1e45b1122d6b1034d70f29ff7cb7551f904c4e8a57e14430a05ec497b2,2024-04-01T01:12:59.077000 CVE-2024-30526,0,0,104d793a66172acd99ba27a22d83ba8e2d51aa54cd9b15f3bc6afe8a835c5254,2024-04-01T01:12:59.077000 -CVE-2024-3053,0,0,357a1183b954e05f1980c79419e3fb5fa7999211c8a519479bf046d49173bd2b,2024-04-10T13:23:38.787000 +CVE-2024-3053,0,1,229c354cd3a0cecb51dd999b0e615993d2b674b0536a00d5050bf9c52ceb3ac1,2024-04-10T13:23:38.787000 CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36d33,2024-04-01T01:12:59.077000 CVE-2024-30531,0,0,b09c54bc9b690b21f0b4a0d96b7e8e1d6291d5af0953063c3755ba446b38cd3e,2024-04-02T20:31:58.463000 CVE-2024-30532,0,0,357b3cd0362ba41f527f4c50b79023773ef0743103703dd0647d41de653db743,2024-04-02T20:31:58.463000 @@ -244798,7 +244798,7 @@ CVE-2024-30636,0,0,c96d7020b9575675321d21406a3dff42d8ec7d0432a5844ede2770796a618 CVE-2024-30637,0,0,08a72ae3945dbc8426c1fcf549781118e319e52e6929a1d19f5c23c1cf06f6ec,2024-04-01T01:12:59.077000 CVE-2024-30638,0,0,476165b7ba1121567d55c67d54d9d40e3e29ea068ff3cb9f8e442a4ce4566f0b,2024-04-01T01:12:59.077000 CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442509,2024-04-01T01:12:59.077000 -CVE-2024-3064,0,0,bd0c5dec4afbb2b54ae7c811b5bd0614bccd47977768f3e2360af5db66c71826,2024-04-10T13:23:38.787000 +CVE-2024-3064,0,1,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000 CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000 CVE-2024-30659,0,0,6b674dcc6172a28fd382455a39837aee02d1048828b479da4de736260a001915,2024-04-08T18:48:40.217000 CVE-2024-30661,0,0,ca3a009dda716fdf3c3b4141a47c3533be46c4c31a5c8c5b65ef3f7e55a4c4a0,2024-04-08T18:48:40.217000 @@ -244829,33 +244829,33 @@ CVE-2024-30696,0,0,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30 CVE-2024-30697,0,0,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000 CVE-2024-30699,0,0,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000 CVE-2024-30701,0,0,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000 -CVE-2024-30702,0,0,d53b16d92906f663acd44a63bef6b751a5cc28145cdb3aab020f970b26ea59be,2024-04-10T13:24:00.070000 -CVE-2024-30703,0,0,97991efd7e079319d321474e4be815be416fe495a98b954e57d9d84be977a87c,2024-04-10T13:24:00.070000 -CVE-2024-30704,0,0,390cb14706b65a89657100599f89f7cffcf1023fafed0da9e9cca4697652c89a,2024-04-10T13:24:00.070000 -CVE-2024-30706,0,0,5fe6eeb0e8149237cc39bbe046d5fe11f3cade01be3ae665b616204961fc3c7d,2024-04-10T13:23:38.787000 -CVE-2024-30707,0,0,77a9fd5c27a36ab36c45bca2c02a47ca644be67ec2d60baf9f50889f26653e96,2024-04-10T13:23:38.787000 -CVE-2024-30708,0,0,809d5d275c0b9965785467acc52108129afa51bb1977bba2c39863bd71040f12,2024-04-10T13:23:38.787000 -CVE-2024-30710,0,0,1d1b3eafe059ca9f97a22dd92c9a829ea228151209ebe38182c7c9a836357413,2024-04-10T13:23:38.787000 -CVE-2024-30711,0,0,61251e240000f80894ef17bb556b9059e568ec94e60cc4125b0286be25d49c60,2024-04-10T13:23:38.787000 -CVE-2024-30712,0,0,cc4f8a652c11d2571870fd6e37b40adf5c32e790c0ad0d11ad0644c98c39fa52,2024-04-10T13:23:38.787000 -CVE-2024-30713,0,0,9e9242153b1a273c1b0a5771ede21a2de74c17408dce94a50bb2d4b9c6b4ea7b,2024-04-10T13:23:38.787000 -CVE-2024-30715,0,0,53ae0e7c8bfa78c2f4701721d587a7c724d2a9122f7caec7a1a3c1b27acfe248,2024-04-10T13:23:38.787000 -CVE-2024-30716,0,0,628cbc48a427229b4a324363d5537a45496bc898fed683c98fe40cff12148b83,2024-04-10T13:23:38.787000 -CVE-2024-30718,0,0,2480ac44c4207a311c16eacc390cdd4113c8507a10300d608dafe4db7b44210e,2024-04-10T13:23:38.787000 -CVE-2024-30719,0,0,c9ce0e5a3860b2996107f536eacc4b055f491d81062cdae98b0435a3d1150004,2024-04-10T13:23:38.787000 -CVE-2024-30721,0,0,c99786a299a19483d71d447b41e8b45858debc778907988e795ea658b4df96e0,2024-04-10T13:23:38.787000 -CVE-2024-30722,0,0,c58c354f5dc361c126dedccca4513774b1d56a6c64d8eeba2d09196724978452,2024-04-10T13:23:38.787000 -CVE-2024-30723,0,0,dc330635bd2c0f023fa185f0fdee50819537ec1cb3e04c9b923279375b9e4c3b,2024-04-10T13:23:38.787000 -CVE-2024-30724,0,0,c5bc1d62745db5722694ff82efab2f050e090e2cdc10d3b46cd1ca9a686ec9d6,2024-04-10T13:23:38.787000 -CVE-2024-30726,0,0,3d4fe5e2b1ab21972d6cf937194590c4e66b9e113c35d539a0da2d600d1f2acc,2024-04-10T13:23:38.787000 -CVE-2024-30727,0,0,0d4038bb750868d5905673e402c30dc4315a2d8a9c9f26326b27ae647049f1e0,2024-04-10T13:23:38.787000 -CVE-2024-30728,0,0,89af681498dce457253faee869c8392d8fd7163479c66a7a38713d5d09e25d88,2024-04-11T12:47:44.137000 -CVE-2024-30729,0,0,2dc1920138a02b98187be4280645fa3245cc8bcb6e49f3a9af11f72c0a8c1673,2024-04-10T13:23:38.787000 -CVE-2024-30730,0,0,55714fc9d38b1912a54f0372ab1aa07c606dae0d74e47062a6cd1a41e2c6378e,2024-04-10T13:23:38.787000 -CVE-2024-30733,0,0,a9382491192019dac57569c44518f9ec249641fcfad37be5bc7ffe4231d9be0e,2024-04-10T13:23:38.787000 -CVE-2024-30735,0,0,8c6a2bcf19d95466fd5c0e3b455abea90529b5348bbd31435915e5f483a239c7,2024-04-10T13:23:38.787000 -CVE-2024-30736,0,0,7ebc915ddb71a4f1213e16d8f0752e9c770bc01aa94f5158b15c076e3b8c3e42,2024-04-10T13:23:38.787000 -CVE-2024-30737,0,0,b861900faf8bc29c62ab7dd1d9218f061a063d462d2d4c8ac9d142eebf5135f4,2024-04-10T13:23:38.787000 +CVE-2024-30702,0,1,3202ab3b96337818fa5697e074c56de6b3f80d2a2d54b4e19bbd152344839f49,2024-04-10T13:24:00.070000 +CVE-2024-30703,0,1,d65523fa26837f143aa861c4b1ec22513e9119e27da48ccd66026c68d769da4b,2024-04-10T13:24:00.070000 +CVE-2024-30704,0,1,4be6f74b234ab487793dbcc167bc99fcc85408b78dae088a65348367022464d8,2024-04-10T13:24:00.070000 +CVE-2024-30706,0,1,03893f8ba2617a63c8f0f690a761c749ad6c0a21548a544156d648c98f4fab3e,2024-04-10T13:23:38.787000 +CVE-2024-30707,0,1,b3787314c5b41663f817d28039ba162cb3c9b1be3feb9468dcb0c11582ff962f,2024-04-10T13:23:38.787000 +CVE-2024-30708,0,1,10ddd37221e5a1c0cf70f11b4f20a4eb46a946eba4360a4f83ad136c08b7e804,2024-04-10T13:23:38.787000 +CVE-2024-30710,0,1,ad0b2fc27c744492bd638ad1270e2eb0cf591817d25e6033c0ebbfd623f99942,2024-04-10T13:23:38.787000 +CVE-2024-30711,0,1,1cca53fbf3011ffff61c60b94d4155920621fd56a5bd85710f9dff6c1e97a66c,2024-04-10T13:23:38.787000 +CVE-2024-30712,0,1,2c1a525e9cea1ecfad7022378dd4f3aa58224217a74c01672a3ebf64824c4f06,2024-04-10T13:23:38.787000 +CVE-2024-30713,0,1,1ea15ed5eb999cac822ad0963612cbe3e0ac75b03e995938d276ab7dceb0b420,2024-04-10T13:23:38.787000 +CVE-2024-30715,0,1,c6d6a66c34447a93ef4e3806c199a13ce413008b74664924d9f13ad17ec1bad5,2024-04-10T13:23:38.787000 +CVE-2024-30716,0,1,c8d02ea62b2a81fadb2c085275572631890a964a411aa3e38b7d9807a9c89406,2024-04-10T13:23:38.787000 +CVE-2024-30718,0,1,c3c8f848e7ce91e0db0795469c5673815e2dc3f2aef9ffc4f4c5cfe3789bf72e,2024-04-10T13:23:38.787000 +CVE-2024-30719,0,1,2ab41130a1f1d8af57e3751d73c8e49200b3a26712a4ceb97c60e965866ed2b9,2024-04-10T13:23:38.787000 +CVE-2024-30721,0,1,c9c4a3ec205ae2f63307bce6ae2041fa6e4e521d7e8beff369ee1def939fbf02,2024-04-10T13:23:38.787000 +CVE-2024-30722,0,1,f1b743243ef51905f5a69e57e83450ec308a10a6c99c18f3660e0a1ed2319cfc,2024-04-10T13:23:38.787000 +CVE-2024-30723,0,1,8996f93dfaaed8e23aa6debd8c12b2afe77e6a7b21f1f0730d1911cce29a98e4,2024-04-10T13:23:38.787000 +CVE-2024-30724,0,1,4f38dc845e7c5a71e1f72bf22c434ff841d0691dec59b228350c8b4add207cd4,2024-04-10T13:23:38.787000 +CVE-2024-30726,0,1,179999921d58fb8427778504dd54cd3e14892ff56ae91964a4792fd0c453d909,2024-04-10T13:23:38.787000 +CVE-2024-30727,0,1,c61e1b6f2d1e55c8917c64b6cfeec0caefe57a19906721ced8f4055cae43d9ff,2024-04-10T13:23:38.787000 +CVE-2024-30728,0,1,c69472c8b20279040095b50b4c82aac280960343c2108ff7feacc516c2e78cc9,2024-04-11T12:47:44.137000 +CVE-2024-30729,0,1,3db15a0f454ab7371106780b5269094cef011bcb946e2c90961032640236b6a1,2024-04-10T13:23:38.787000 +CVE-2024-30730,0,1,9de362248d7151dcf280f5c455ca27f80c8d88f03d513c7ce92921ff9be43c0c,2024-04-10T13:23:38.787000 +CVE-2024-30733,0,1,dcc298ef89ec2f47ba5ca9bc288354df95f6ca36f193b97dc43f17706f326999,2024-04-10T13:23:38.787000 +CVE-2024-30735,0,1,51d420414b7ea76cb3f688283497dabd90f20d0ab78e202194081996fc5bbb1e,2024-04-10T13:23:38.787000 +CVE-2024-30736,0,1,3b0d26e4cbcccf769f306562df6bb6546e4d250a8750d79f3bd8e26d64d190da,2024-04-10T13:23:38.787000 +CVE-2024-30737,0,1,4b32e2024557728b35c0cd106826400d2c35c0935259ff730f18e6b5f5b4da0b,2024-04-10T13:23:38.787000 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000 CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000 @@ -244865,7 +244865,7 @@ CVE-2024-30809,0,0,40751d191f9ee13ea0defe4c96fc4834cb0c82544cd8de5e25d1d00001842 CVE-2024-3081,0,0,eaf9a3b1546f12509096efb03067d93183d42d698f454ab86e3fca514e07d309,2024-04-11T01:25:53.020000 CVE-2024-3084,0,0,62ac9245d10a841fd1840ac1e3c7dc9559936072e020c624e95405bbb39b1228,2024-04-11T01:25:53.100000 CVE-2024-30845,0,0,9113965041be6194fffa5a72ece91f3d0dbc5b1a9fdbb57d65232d222341116b,2024-04-12T14:15:07.870000 -CVE-2024-30849,0,0,7b5f44f857a491a504ba5c8594af0e6700798260b9e3192b0dae6774fedb652e,2024-04-05T12:40:52.763000 +CVE-2024-30849,0,1,0e1a4138add90815a9b8d6a41668d72bf2ea04dc4bbeda2f4a50c70bff2a8e4c,2024-04-05T12:40:52.763000 CVE-2024-3085,0,0,5085f6259bd4d1908968638b16f14533956036f8bbee9b567c9970e9e940c577,2024-04-11T01:25:53.173000 CVE-2024-30850,0,0,e145f5a1f669362cb833973c2b9f1972b1377c7badd79d19ebe34b1d7ac4aea3,2024-04-12T12:43:46.210000 CVE-2024-30858,0,0,16878632bf0dd21efb8a79fb907fb3fd610dae344e4207e4821dadfd05b70fba,2024-04-02T12:50:42.233000 @@ -244892,18 +244892,18 @@ CVE-2024-30883,0,0,39bac2b059deaf000971e1bfbce5ce5c6c34180366ea55e22f11dd860abb7 CVE-2024-30884,0,0,f3a012fdbee7dcdfbc54fb994726741009310b51eecb5e393a9f37c21fbc6c9c,2024-04-11T12:47:44.137000 CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000 CVE-2024-3089,0,0,3fabfa41353ef448324a78880efdc147758ef8ec187a9149e265df8463410caf,2024-04-11T01:25:53.493000 -CVE-2024-30891,0,0,6288187f9f60f4f25d31df7f5ef76e595bcc7f1b47451b55a9d9d5f34746252d,2024-04-05T12:40:52.763000 +CVE-2024-30891,0,1,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000 CVE-2024-3090,0,0,1ed40e7cb1e30a4ce92e2079672b0e468d7f34e176dec853f1d60bd19ebc8837,2024-04-11T01:25:53.580000 CVE-2024-3091,0,0,2ae7c1b43ade453e63e12426e1c2a8ce72ad964ac1b86e004dbb22f9a3bc2a75,2024-04-11T01:25:53.663000 CVE-2024-30915,0,0,9a13183a0128e0ebba105aac6b4f16ab0a4a277d1597444f325eb278b416c302,2024-04-11T12:47:44.137000 CVE-2024-30916,0,0,a75ac013b4975103273f280feb4d1408231c0d93576fac2bd9f593ea396bd4d3,2024-04-11T12:47:44.137000 CVE-2024-30917,0,0,c44e8b8a426b1382e7b03152893a57378750ba3fe2425d8fdd5fd2662c53461b,2024-04-11T12:47:44.137000 CVE-2024-3092,0,0,cb7f2178928a426a0265657834f9aeb630ccb1ca35a9c66bd22fe30bfcb426f5,2024-04-12T12:43:57.400000 -CVE-2024-3093,0,0,eebb0093e73b814a9cc4726da2f030dc99349ca8f68010e017ede372ac325b36,2024-04-10T13:23:38.787000 +CVE-2024-3093,0,1,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000 CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000 CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000 CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000 -CVE-2024-3097,0,0,e69528d6f04fff5e13810e980be56f7c7b2a086aee45771182b437482bff65c2,2024-04-10T13:23:38.787000 +CVE-2024-3097,0,1,d36ff609a9c55f871c6ce5cee1ea4c5f261f1965e5780dc5607289e6057964d8,2024-04-10T13:23:38.787000 CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000 CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000 CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000 @@ -244975,8 +244975,8 @@ CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f6 CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1d2,2024-04-04T16:33:06.610000 CVE-2024-3117,0,0,5cfd272187006d856ef7162243290045436f0b0b42109be53aee5ea008fdca8a,2024-04-11T01:25:53.827000 CVE-2024-3118,0,0,9600b12c1bed90a06c567891d64400576dd46ef84328956c7b0762f081c0594a,2024-04-11T01:25:53.910000 -CVE-2024-3119,0,0,3053969c6e618948510a4e9e91acef899d39b564819d6c3fac5d04609f0a2e41,2024-04-10T13:23:38.787000 -CVE-2024-3120,0,0,9bf624a66e4c466a30d87e4236783d86541a5a33aaa0637594bdf6c586c6d126,2024-04-10T13:23:38.787000 +CVE-2024-3119,0,1,c9ebed2773ddbf745c504aabd30f479f39fcc6099045c2c447aecf409439659a,2024-04-10T13:23:38.787000 +CVE-2024-3120,0,1,678e8bc4b87d4bce8e1cd75fbd560a82d220d07586aef2e36f7eac2dd84ec5df,2024-04-10T13:23:38.787000 CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000 CVE-2024-31205,0,0,b253fd2658a692223bc8e40aabe86fdefb374b65b71659aad1a1d9f39a934ec9,2024-04-08T18:48:40.217000 CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000 @@ -245031,7 +245031,7 @@ CVE-2024-31279,0,0,87d16819f286deb0d813f3c7c872ae257594acf340770850ab5707b5f3e47 CVE-2024-3128,0,0,6f52776e31bd8f9fccf102ea0b23821681fc521ed79d94840ffa608fa9bd3f98,2024-04-11T01:25:54.180000 CVE-2024-31280,0,0,9e9b815bd712cdeca69ca5173415a6797e0b892c1fe0c623b9d101db7359150a,2024-04-08T18:48:40.217000 CVE-2024-31282,0,0,5936d2319178c50c30843c7ee4db925608db08d53e49d6aed7a5d5b8f4adeca5,2024-04-10T19:49:51.183000 -CVE-2024-31285,0,0,e5a5d611da77309f1bf857cc7bfd11cd52b3696e6a8eac00b4ed59efdbaa31e4,2024-04-11T13:30:38 +CVE-2024-31285,0,1,fbfb894bd06ff971ae688901838c64fa61bd6d98fae23eaccff9aa0a03fb58f3,2024-04-11T13:30:38 CVE-2024-31286,0,0,e1da10ca58ecb94e30ee69cf28bc9450f2f10eb7f9a84a3b3e2823a17dee6482,2024-04-08T18:48:40.217000 CVE-2024-31287,0,0,d3b9f66c99b69110f7dd9854d4eaa18fbf3158907931625a02e30c57de0c45d1,2024-04-10T19:49:51.183000 CVE-2024-31288,0,0,13535f8dee937d7662ab695698374962ab0e6755720cafc69b6c10df5e8fa97c,2024-04-08T18:48:40.217000 @@ -245067,9 +245067,9 @@ CVE-2024-31355,0,0,a5dea31bb77e2304134bdb1d51afef23705a4ddfdf5cc895a42a4a0b3df4a CVE-2024-31356,0,0,d1fb89c74ef35b55d35626ff0b96164cf14f53f3d140d53e498a9c6cfdf37218,2024-04-10T19:49:51.183000 CVE-2024-31357,0,0,6d1a7933989bbcdba28fa02b8be4705197f66c46746bd7fe377d13c6e2cc0304,2024-04-08T18:48:40.217000 CVE-2024-31358,0,0,6558c715d0691fb109d69acf906c307579e6fb555e946d8884919d7438b5b765,2024-04-10T19:49:51.183000 -CVE-2024-3136,0,0,16e180c3a4e8380e294a04323e77ae11557d2687dddc06a943019ed361c6cee2,2024-04-10T13:23:38.787000 +CVE-2024-3136,0,1,b36b01230f305cae55ccda83bfac11de31c616e423c2feb1e1e74724ea6567ea,2024-04-10T13:23:38.787000 CVE-2024-31360,0,0,0460a35b688e0f8644f84fdf3c0f2bd436c50cc176b830befbc6756562984672,2024-04-12T13:15:19.787000 -CVE-2024-31361,0,0,ef7165d9254766382e192b818bc1c2de6fd918d5607237fd9a828aa26d67c1ef,2024-04-11T13:30:38 +CVE-2024-31361,0,1,54b7a8e25813717c94d5927287f93d481a46dd500982f29ec2be0642b1f9b5bc,2024-04-11T13:30:38 CVE-2024-31362,0,0,4d93ca9262b902cfa96a7c9c59eec8cd1e4626b042a1823977e30161f6ae4d0f,2024-04-12T13:15:20.003000 CVE-2024-31363,0,0,473f32352e0616876144a814ff7859a2e71535dd63c30ac18edc88f4019db2d1,2024-04-12T13:15:20.207000 CVE-2024-31364,0,0,8f76779b54d24beed3359dacbaa0e22d68f42051e7f47e7ada2256f1871e09db,2024-04-12T13:15:20.400000 @@ -245086,7 +245086,7 @@ CVE-2024-31375,0,0,b0ef1f22f63ca31cfb2164ca0bddec7fc53a5ee9672cb520fcd2e704c7c6f CVE-2024-3138,0,0,952bef3e912c81d77b1f4b71c423532beae8fc55963465bb23e6cf3f92e09bdf,2024-04-11T01:25:54.493000 CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000 CVE-2024-31386,0,0,15fec49971ff13003aab552d95c7df7a6744ee4763b24dacb4b183ffe115ea40,2024-04-10T19:49:51.183000 -CVE-2024-31387,0,0,17f74c0a0abd1b62b72a9c701ac4bcd4b8a101eb98e9ec3658a2a206201f0cf8,2024-04-11T13:30:38 +CVE-2024-31387,0,1,ae479bfa1926a7fd40fb5cef5475ced5aee0d15930c68100ea8467ea55c88cb8,2024-04-11T13:30:38 CVE-2024-3139,0,0,c174ece4bd5366d5eddcb8afdcde0c6c7c4276d7790f9ff1f5e9ef5c069a0098,2024-04-11T01:25:54.583000 CVE-2024-31390,0,0,0875d8345a5b76d413fbbf2495b8c73d39cfd6ca77e21422f3300e66fa9097ad,2024-04-05T14:15:10.590000 CVE-2024-31391,0,0,b2475d8e5abd21f576cf2da27f3d94cb4d5a9bf3266cb07e681af798ed90da88,2024-04-12T15:15:26.157000 @@ -245098,29 +245098,29 @@ CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a CVE-2024-3142,0,0,8529c5b22168febaa4c102f0cc77312d61cb1e158b8728b8425cc2b98347c39d,2024-04-11T01:25:54.860000 CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000 CVE-2024-3143,0,0,53dfcfd3428380087fc9225bbe4504515f3fb2fad66077c3d039ee7ce70320a2,2024-04-11T01:25:54.943000 -CVE-2024-31430,0,0,0b8dcaab744a0db3ff83858f21f6d3957d1f2428b2de0f4bcdc2b290cc4e5f3c,2024-04-11T12:47:44.137000 +CVE-2024-31430,0,1,9ff8e1b4d98002eee761d6539ac29b9c01feb8ee307018a6ec587c0bf01b991e,2024-04-11T12:47:44.137000 CVE-2024-3144,0,0,7dc72f8f095a7cf1cb25c6f0b93af3672d10959c4dac8ef3a8b7a5ba03525aea,2024-04-11T01:25:55.020000 CVE-2024-31442,0,0,bd0c0777ffd79341352bfaf4bac13513052ca764dc9351410c56fde55ac0fa91,2024-04-08T18:48:40.217000 CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000 CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000 -CVE-2024-31453,0,0,0d4d7b97f8baac887347e95ef2d1eef82ca79c2b90dcc3d9073235416fcef485,2024-04-10T13:24:00.070000 -CVE-2024-31454,0,0,8db2bbe4132702219bc03641a810be94dad7efac0e2e91debb24c46ce5d5b0e6,2024-04-10T13:24:00.070000 -CVE-2024-31455,0,0,b40b7111c3a48ebfbdcdf983ca30b058e509485964899acad9986b778f0be984,2024-04-10T13:24:00.070000 -CVE-2024-31457,0,0,2a3df56afd0a6a9934427214a76e8de40165fd02e6f2532ac344e6e6c96b32d7,2024-04-10T13:24:00.070000 +CVE-2024-31453,0,1,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000 +CVE-2024-31454,0,1,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000 +CVE-2024-31455,0,1,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000 +CVE-2024-31457,0,1,aff1a7801fbb865d930cb2fb46573de892421c651bc9c2a65dfb3d401e53fdac,2024-04-10T13:24:00.070000 CVE-2024-3146,0,0,1cbea39c0b5c8d0d8af37ab4c1019f1ec3a190542aee7f2e86ced34d06f5796b,2024-04-11T01:25:55.180000 CVE-2024-31461,0,0,78d12ab3381b5c3fda69b1f5421edfe2ff30f397a9794d52b313ced0ec0ec1d3,2024-04-10T19:49:51.183000 CVE-2024-31462,0,0,ffec336beab32da0013759172ac1a993559e46741c900a03b9be41d3d33d85e4,2024-04-12T22:15:07.320000 CVE-2024-31464,0,0,0e334e051a2f53edc57cbce800fcc17540fa9d746f3833bb6b1e894dc6dae023,2024-04-10T19:49:51.183000 -CVE-2024-31465,0,0,7ae621b5bb3e2d5ca764c6c0d871f243fb170c90532de5ed0a082c19d20607c3,2024-04-11T12:47:44.137000 +CVE-2024-31465,0,1,f70429209ce72ff11ec51f35cb5d31673af53b3d766d75c0657593eff6ab185e,2024-04-11T12:47:44.137000 CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df3588d,2024-04-11T01:25:55.257000 CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000 -CVE-2024-31487,0,0,4f24e6db0f56a97932d1fcb48db397a06c0f937b932a453b76d90975be251d2c,2024-04-10T13:24:22.187000 -CVE-2024-31492,0,0,0fd2d64bb6a585b3de44def7ab6d30c061e7d16403fa2c6b10d1070ad75aaa41,2024-04-10T19:49:51.183000 +CVE-2024-31487,0,1,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000 +CVE-2024-31492,0,1,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 -CVE-2024-31506,0,0,f0c0ad036c0ec10b51b27d4f80333d06dd18714e702e791b36fead3cfeecf942,2024-04-10T13:24:00.070000 -CVE-2024-31507,0,0,7d44cb6bde5519ce1d24c40e1677aaa1b97fbc6767c1c209aa289332648eef75,2024-04-10T13:24:00.070000 +CVE-2024-31506,0,1,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 +CVE-2024-31507,0,1,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000 -CVE-2024-31544,0,0,66684c110e179f1773e7d3dfaef94b79d6587a52feb2f517dadcce12d45cb7ec,2024-04-10T13:24:22.187000 +CVE-2024-31544,0,1,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d6357c,2024-04-10T13:24:22.187000 CVE-2024-3156,0,0,672d7786ba8482c7e78ab9597c9f5a6e717f264787edb700157c849ff3c9f687,2024-04-08T18:48:40.217000 CVE-2024-3157,0,0,a48d898411742b6ba02e4eb44f80f58b23802453a93303af5f3aaf05d034570d,2024-04-10T19:49:51.183000 CVE-2024-3158,0,0,d2414412e299d1c6c6fd5c25934ca9d016ec38ac6210ea884f5d6eabc2220b22,2024-04-08T18:48:40.217000 @@ -245129,7 +245129,7 @@ CVE-2024-3160,0,0,f58561faca7869291dbd40f98b5207b12f048bddf4323b50e2fa0b0605fe77 CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000 CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000 CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000 -CVE-2024-3167,0,0,588aeff7b6a3f0765daeb7f9f263a3ad6de4b6b1df80e4179885c415f61ea66c,2024-04-10T13:23:38.787000 +CVE-2024-3167,0,1,f4a160a1382e038713f603968880deb87a3b362a15bab9fc55aa42721dc9dd6e,2024-04-10T13:23:38.787000 CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 @@ -245148,7 +245148,7 @@ CVE-2024-31815,0,0,30302ad414ab45baa3ec4e6cb3fe786fcebb8651723a135b55d05ee225238 CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21611,2024-04-08T18:48:40.217000 CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000 CVE-2024-31818,0,0,25ea78f8bfa9f141d6385203058e8f46dd97de2a067220f6e8af85d5bfe3594d,2024-04-12T13:15:20.590000 -CVE-2024-31819,0,0,38e498d0570206c0203f3af977a8de6ceaed3f9b34269dce35a3781d3462a082,2024-04-11T12:47:44.137000 +CVE-2024-31819,0,1,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000 CVE-2024-31839,0,0,45aff84f813253a9dfeed68f22c85eabdd41244e6746a454f2b16b2b0c949750,2024-04-12T14:15:07.947000 CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000 CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000 @@ -245159,29 +245159,29 @@ CVE-2024-31860,0,0,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75 CVE-2024-31861,0,0,2ef21b0cb7540121255e11559e1c009c67fcac815944858c998e249e0cd71735,2024-04-11T12:47:44.137000 CVE-2024-31862,0,0,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000 CVE-2024-31863,0,0,c0205d004a02751e8ee7ccf780094034f2d276095c68cc3f87551a74133406a8,2024-04-09T12:48:04.090000 -CVE-2024-31864,0,0,4a814b39f5338491c13eaf605abe937bee4a48eee5261e15ecb73c9d9641ad11,2024-04-10T13:24:22.187000 -CVE-2024-31865,0,0,04dfdf035e493f88bce65903e65f84e8599efae6e3af89abc0575aef7d503a8b,2024-04-10T13:24:22.187000 -CVE-2024-31866,0,0,bda197220172d5ac79fa5cdeff3a9ea320c7e12dbdccfabc3aa60eaf4bac8cc3,2024-04-10T13:24:22.187000 -CVE-2024-31867,0,0,a22bc2594272931d6311310ff7d8ee01a53e68438a4bb9f26b277ce07bc2d2c2,2024-04-10T13:24:00.070000 -CVE-2024-31868,0,0,fd424b6565f5ee96626749670c0de5218db966efe0621eaf47ff0a7c6e63316c,2024-04-10T13:24:22.187000 +CVE-2024-31864,0,1,f74cad963c764759bed2c53df172ae068d57f371a05d50837039083e93b89e3e,2024-04-10T13:24:22.187000 +CVE-2024-31865,0,1,55f6426de8554bc6f4da7fb7dfa9079a9656bfc67d2afbc128c56bec8f8ea2e2,2024-04-10T13:24:22.187000 +CVE-2024-31866,0,1,9d4ecb9aa9c29d85edac6e2052e365b7781227bb2f4fea81ddf721491f897e1e,2024-04-10T13:24:22.187000 +CVE-2024-31867,0,1,d9ca0aa9578216e078b0a79214f51d5fd012c5b9e5fcd78052a038316e3088f8,2024-04-10T13:24:00.070000 +CVE-2024-31868,0,1,a79f3943c68f02bd30297ac353bf9f000b38c0f07e44f3ffb16a4f3e82c12f40,2024-04-10T13:24:22.187000 CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a135,2024-04-10T19:49:51.183000 CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000 CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000 CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000 -CVE-2024-31924,0,0,f6b9db9f53cdffb6f393ef618d7b0bada6f867ced301e91b9a83cccba162e103,2024-04-10T19:49:51.183000 -CVE-2024-31925,0,0,9528eeca9640c21ca186d2af06dad1e4e5e76e79590d462a6f06c22b7d894a5a,2024-04-11T13:30:38 -CVE-2024-31926,0,0,ae90c849eae31b495a5daa06b19a5ecdf59b80a5141a0d5f75d01852754cc912,2024-04-11T13:30:38 -CVE-2024-31927,0,0,8be735bc1d98541f602db42114571078e3cdc9ede2eaa734f5a055c64d33ffba,2024-04-11T13:30:38 -CVE-2024-31928,0,0,99eeeab01d6e19ddb75c1989da4d301659ca7a40fe771dfcc31b59e3aec9eddb,2024-04-11T13:30:38 -CVE-2024-31929,0,0,de7a5e4e7c838e27065e05e3daf7bd33556389f6781baf3539472986fe04f5d7,2024-04-11T13:30:38 -CVE-2024-31930,0,0,6a4182a4dbdc529cabc98bf36c854b60eb67521e6eea5a5a7e10c05124be9304,2024-04-11T13:30:38 -CVE-2024-31931,0,0,6f32d14a1d69b6fbc70ac62c1a3fb63bedec0284871311f8f4e499b62adfc455,2024-04-11T13:30:38 -CVE-2024-31932,0,0,20b658a50b040f149e540f76412872d5f65ec6d66c5206fa25b7b8261b2ebf05,2024-04-11T13:30:38 -CVE-2024-31934,0,0,8147f95083d583151c645d615e1287919c85d04dddce37b8c68743895d1b44a1,2024-04-11T13:30:38 -CVE-2024-31935,0,0,9251451bbfd41e6b367e5dca579621d1f0a687221aa6e291979ba3a6c8797fc0,2024-04-11T13:30:38 -CVE-2024-31936,0,0,4c4fe52688f0399125afe719eaa4fceb8f8a44fa18eaf85e3ea14b862e46ec7e,2024-04-11T13:30:38 -CVE-2024-31937,0,0,2a735cae39dd8898b746658c81d08f2263b696b7c3b0f0894217872557148c55,2024-04-11T13:30:38 -CVE-2024-31939,0,0,51a04bdeddad5f3a99424c72890d43b292de2ba471a900f58b300aec3253a37c,2024-04-11T12:47:44.137000 +CVE-2024-31924,0,1,419e00ff087648b1d4f56b4d92d98291b21c0865a222da2fc6d212f80447c689,2024-04-10T19:49:51.183000 +CVE-2024-31925,0,1,b2c78ba095b8737ac1c9b9b6564a8d654820aa2e7725be4dd283113cacc4dd8c,2024-04-11T13:30:38 +CVE-2024-31926,0,1,5ea07bd781aaf165e7c249d84898bbaee298d70cc8e541e3b74d17ae8e2ec616,2024-04-11T13:30:38 +CVE-2024-31927,0,1,6cd17f97d47f2415c03c97ad66e9324a16977292b8eb97b821aae9ba7a0f2833,2024-04-11T13:30:38 +CVE-2024-31928,0,1,e6cc120c3629d81f3db9dcadc93c459e7b269490e6128fcc8be3997c3ef595e9,2024-04-11T13:30:38 +CVE-2024-31929,0,1,5359df4522faa8d2c46f605d48868a6939d06d35e038e5f3287851d0461688a3,2024-04-11T13:30:38 +CVE-2024-31930,0,1,628cb0e5103582aeccc9f3e33331b9dbe7dba70b3951389bc2f9327ad3b8f5ee,2024-04-11T13:30:38 +CVE-2024-31931,0,1,31bc6de522002d5fbdfc52e575ea088ef3d3fde1fc3f2ee4856692982b9dc2cf,2024-04-11T13:30:38 +CVE-2024-31932,0,1,cbdc79dc2f64dd5bef9877c31b5d39549faf66977f5313958012ec22e616327c,2024-04-11T13:30:38 +CVE-2024-31934,0,1,c0d0dcd1d33c627debfa8b285c50df77571cbba9a1c55991b643fde63f3e7d80,2024-04-11T13:30:38 +CVE-2024-31935,0,1,f466b4b7708852a91065ac3482d61ab28afcfeadb9ef15deb690167c92fced1b,2024-04-11T13:30:38 +CVE-2024-31936,0,1,41ae8d4679677e086c385533d0a63055153ebb271d32fb7547401292a6a57491,2024-04-11T13:30:38 +CVE-2024-31937,0,1,24fb14fc8c636ca322e17128cc4ef69cbdba60a9f579b74e55aed300a2f73ed6,2024-04-11T13:30:38 +CVE-2024-31939,0,1,dc9cc0dfd8ae0f6c4caa1a4775b1cc86559b00f81c6408b5f2a51c57007b5d9e,2024-04-11T12:47:44.137000 CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2dcc,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000 CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000 @@ -245189,20 +245189,20 @@ CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000 CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000 CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000 -CVE-2024-31981,0,0,e41cda146d4980520ec723f59c46554d3b13849703f30ca6a337e67488d5c4fe,2024-04-11T12:47:44.137000 -CVE-2024-31982,0,0,da62f65c826f366e265d474872bfa6fc871d2b2b73b062eb9d256ba3afbe2d99,2024-04-11T12:47:44.137000 -CVE-2024-31983,0,0,9364f3c3d5d556f870903342437d0634231cabe71695b1c38bee4b137376d7de,2024-04-11T12:47:44.137000 -CVE-2024-31984,0,0,492756aeab7a1528e03b783cf2acc91d16bf23e0469aa5672f93882fa5b54fc8,2024-04-11T12:47:44.137000 -CVE-2024-31985,0,0,d9d2d58b8e4b4f19668454a6ed088bbec0b43c1ab7c140b12acc852cf053d8b9,2024-04-11T12:47:44.137000 -CVE-2024-31986,0,0,d753e20004938c36a9ab77bf3cb1a34ac6c7e6606c76052b11e76f344a897bde,2024-04-11T12:47:44.137000 -CVE-2024-31987,0,0,1d3788e9d73b3bef1e98e4e5826cf679f106d8c287f7697eaabe668a9f99e0cf,2024-04-11T12:47:44.137000 -CVE-2024-31988,0,0,5b82e06f1eda6491277e696d6bd240d93a5c354404c795f5a0b042ec68616763,2024-04-11T12:47:44.137000 -CVE-2024-31995,0,0,0e5def9562ee94ed48a169892b3848eaf3f1290369f887e8c90b47252d203198,2024-04-11T12:47:44.137000 -CVE-2024-31996,0,0,e24d5f35520152a575d0b387a0e03b07f8f08674e8900a7785f4d664526f0cf9,2024-04-11T12:47:44.137000 -CVE-2024-31997,0,0,61dac244e651bc6c61af5e05e4f98d7a67ba974bf43d259012e51027543cefb5,2024-04-11T12:47:44.137000 -CVE-2024-31999,0,0,3d05e65777a23debeb414c98ba0a52ab93f79fb79d762dd13a2fa2b08be73de7,2024-04-11T12:47:44.137000 +CVE-2024-31981,0,1,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000 +CVE-2024-31982,0,1,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000 +CVE-2024-31983,0,1,04aafc38e27953c11e399edb313d7df5a8b5f3b11c0f563063bbf689c3f06f86,2024-04-11T12:47:44.137000 +CVE-2024-31984,0,1,e4a4c0ed2b94945397eb14802568460ee1926403a3fa635b3335a39b1342069e,2024-04-11T12:47:44.137000 +CVE-2024-31985,0,1,96eba814f8ffd38a0877505a36212af3b265e63db0ebdb3b6fe17b13401c04fb,2024-04-11T12:47:44.137000 +CVE-2024-31986,0,1,43afc54623bebf262d37dd906c7efd37eb56ded00de01504423bee1057bdc8a1,2024-04-11T12:47:44.137000 +CVE-2024-31987,0,1,60d0bda711bcaaea27f455d1e392e029e767cb7013c9064db5359f058621c0df,2024-04-11T12:47:44.137000 +CVE-2024-31988,0,1,51c3ab0f42083010a6201d8c5e43ded78b92f566d0bca12748a99bba4a186fcd,2024-04-11T12:47:44.137000 +CVE-2024-31995,0,1,66dfe11a273e9e10d102f877b390a578235479d84ca6da17689c27557fdb1258,2024-04-11T12:47:44.137000 +CVE-2024-31996,0,1,4bc228afb2f37b1ef8f323b1e059ab55f2f5ea66358ab4f20e2844a94396b7b8,2024-04-11T12:47:44.137000 +CVE-2024-31997,0,1,d95ca9b47538ea73a196934e9c1064ac6bfd03df35a75cfa6de5a54ba7f14856,2024-04-11T12:47:44.137000 +CVE-2024-31999,0,1,92063baa188f8d1eb46101bed0277138de32335b249687b065a40c476ebdada7,2024-04-11T12:47:44.137000 CVE-2024-32000,0,0,b04dc47293dea10741b41444c1d47c616114bf633039dc146c8dc9becc3f472e,2024-04-12T20:15:53.250000 -CVE-2024-32001,0,0,aec83e93c22b7562690e81525f06acd5c9d0a8b8d891e5c7df2b6774b872fec6,2024-04-11T12:47:44.137000 +CVE-2024-32001,0,1,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000 CVE-2024-32003,0,0,39f637f7b69fa4a76c60746a7f75f4944fee1e18bc092436acc9e8cdf6b6bf3b,2024-04-12T21:15:11.617000 CVE-2024-32005,0,0,8997601436b35b734a0763f2653e43aec0f032ee4b9b18916829a3d0114b212f,2024-04-12T21:15:11.823000 CVE-2024-32019,0,0,1c33789ce54afc68900434ffc0a69ad446dbaf9eddde6bd29cb94c877e484159,2024-04-12T21:15:12.133000 @@ -245212,22 +245212,22 @@ CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e891870298 CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000 CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000 CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000 -CVE-2024-3208,0,0,571cf0bd707052c17f4b6002cdaf78b03d17afeff78961ebdc1a6dd63f618a4c,2024-04-10T13:23:38.787000 +CVE-2024-3208,0,1,196d70ee776274b946f575baf309c4bfb9847b021c77ef0e52b4db8b7b04672f,2024-04-10T13:23:38.787000 CVE-2024-32080,0,0,befbebb6328b80f5ec4f8b2580b01e6e757ff2b9e89cbe3767b36fd22bbf0322,2024-04-11T12:47:44.137000 -CVE-2024-32083,0,0,ffb348b6d78fe6dab7f7e1d9a9775ca7755162b28cc1fed23d952f63037c9aa3,2024-04-11T13:30:38 +CVE-2024-32083,0,1,e66e40e26022a1e0763bc878bbdc8feaffe474b54f57196f3136bd80c107b035,2024-04-11T13:30:38 CVE-2024-3209,0,0,d114b57147d6f4c5650fa41aee8812b6b0f6764575b4c34b9a7aae06057b2d51,2024-04-12T02:15:06.703000 -CVE-2024-3210,0,0,151730181efcc568bc64336911613a04d4e3b614f2218efde039702cde2f5cdc,2024-04-10T13:23:38.787000 +CVE-2024-3210,0,1,a6a460fea8b6ba58742257acafa44ce127e49f675c10879da867fb65dd2cfc1b,2024-04-10T13:23:38.787000 CVE-2024-32105,0,0,14f3c307fe159fa2b4817fc42bb4e5becf74df81f12e854ac688d637ee1e6082,2024-04-12T12:44:04.930000 -CVE-2024-32106,0,0,657892b691bfdac6e494ae38fa5fc13decf2efe62a2803b89920606ad1cdc4d9,2024-04-11T13:30:38 -CVE-2024-32107,0,0,17ceff19a3d307cec6e0950bbc197fbc219a82062e65ab18f9c2e5dedf1e01c7,2024-04-11T13:30:38 -CVE-2024-32108,0,0,e5f1907011c4132156bac23550771124f6260e9a6dc8e26fa0b361d9e233dc56,2024-04-11T13:30:38 -CVE-2024-32109,0,0,d98e9340ca426895303f46409be82a676e4c83cd66e11346da406fd04277e8e0,2024-04-11T13:30:38 +CVE-2024-32106,0,1,2e3f5a57bd781bd3a30c937e8aa33ba1f212672a8df9850b791a63471fb05d63,2024-04-11T13:30:38 +CVE-2024-32107,0,1,b90c8135a82473fde7e5bf44c3c1cf9d7846ba95270115659d7d68306d87ca81,2024-04-11T13:30:38 +CVE-2024-32108,0,1,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193ee6e,2024-04-11T13:30:38 +CVE-2024-32109,0,1,e0a4e8c5f217571de21e69ff68b322f2becdcc662ae51f8c1b5dcaad24451a40,2024-04-11T13:30:38 CVE-2024-3211,0,0,54794b5c5e3c18fabed2b9971b38f38495032ad68cd1edd1eef302942016e9fd,2024-04-12T12:43:46.210000 -CVE-2024-32112,0,0,ea2c0d37cf01029ebf4bf26966e0705fb857fccc1f7b3e474eb0951714e406a2,2024-04-11T12:47:44.137000 -CVE-2024-3213,0,0,6f3e7d7b75cebe013a6b4c97df0c4a75297184b51024b4273e6e525d7e8e8681,2024-04-10T13:23:38.787000 -CVE-2024-3214,0,0,e7faf7d08ea8810657f6ef8ee7498174d5cfef4549343bb1fd0a7e8f9efa72e2,2024-04-10T13:23:38.787000 +CVE-2024-32112,0,1,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000 +CVE-2024-3213,0,1,ea3f20ff836368484318fafaf2de028dfc4fe493b01551892e8e53b852a2d76e,2024-04-10T13:23:38.787000 +CVE-2024-3214,0,1,d9b62addfa853a8ede1a8dcf4e065081d1f9021a8cffa0357e41cb2e91733c15,2024-04-10T13:23:38.787000 CVE-2024-3216,0,0,aac88e798ffbdaddd62ae90ecbece12fc58351de061defd8cac2a138eea1c35f,2024-04-08T18:49:25.863000 -CVE-2024-3217,0,0,4de075781ed27d9af99ed393e165df2d285dc08a6ed9934e378886c989fa51ff,2024-04-05T12:40:52.763000 +CVE-2024-3217,0,1,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,75e1c84ee83eb1d158244a2182789a8e99b92d3a400a75a7854fff9872030968,2024-04-11T01:25:56.290000 CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000 CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000 @@ -245236,8 +245236,8 @@ CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc76512942 CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000 CVE-2024-3226,0,0,d213b85d0cbf6ef26ba0599f6da2fa60a98a166b29d84dd0281911091a21b49d,2024-04-11T01:25:56.760000 CVE-2024-3227,0,0,0159675aa02206c3d84e4c8df37fb1381a8ad1f04bbe993fe609d30c45518b6a,2024-04-11T01:25:56.837000 -CVE-2024-3235,0,0,b6e95b414a31080bd68e550d406748d7444ca821ce003bd9d66bed206a577044,2024-04-10T13:23:38.787000 -CVE-2024-3244,0,0,8bd3aebf3f3b39e91d3378f57b5b70ce4244e67662a5a483100098ac5739fc96,2024-04-10T13:23:38.787000 +CVE-2024-3235,0,1,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000 +CVE-2024-3244,0,1,41f07d64e5df07a00734cb6bc3475e3d4435186d83188812dbaada30a0fff497,2024-04-10T13:23:38.787000 CVE-2024-3245,0,0,c103d82cc0c3a682d91f3a5e67c8e3d1b463ab0ae17fd9f39360a42d0fbee434,2024-04-08T18:49:25.863000 CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000 CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000 @@ -245253,27 +245253,27 @@ CVE-2024-3257,0,0,3c0b711c0035bcf8d4b92bcec7dfdb1ab21cf5c848bdfe1dfc7f34628ee0f7 CVE-2024-3258,0,0,00a0a017c084aafa026269300c69a9360444c24c6a4308e5e8f072ac33cf3451,2024-04-11T01:25:57.540000 CVE-2024-3259,0,0,3481f546c5fee878032df1d9aae401834d514bd5070dbdd69c5e7940d2e2efbe,2024-04-11T01:25:57.637000 CVE-2024-3262,0,0,758c253f08a1135a2d383be61db9b8d36970b2087c7788f9321bc534b0b4222c,2024-04-04T12:48:22.650000 -CVE-2024-3266,0,0,dfd07f3b10f1aaf31a6f0167d5bef13c90499bcaf6aaf487c621e7b15cb72f4b,2024-04-10T13:23:38.787000 -CVE-2024-3267,0,0,3fcaed995159f9f5f40917de5d7f4f0bd5c79e96e90660977368ca045dc9d265,2024-04-10T13:23:38.787000 +CVE-2024-3266,0,1,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000 +CVE-2024-3267,0,1,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-3270,0,0,6f3801d6fa573f4a130c8a1ad393f7345008a6cf48547c2d9608d260a00cb3bb,2024-04-11T01:25:57.753000 -CVE-2024-3272,0,0,641f194eefc67da9f9e2be39ce5aa0a66c6cf1149b97e5689524bd3bc059f893,2024-04-12T01:00:02.673000 -CVE-2024-3273,0,0,7c6caa4b34a73eafe05b95c36fc7695a27352f772b93bac3fda0569af913e747,2024-04-12T01:00:02.673000 +CVE-2024-3272,0,1,b37d483e7b1c435954b9e405fbf10a0c04d8a4260a277224f2231bfa37163f68,2024-04-12T01:00:02.673000 +CVE-2024-3273,0,1,588079336b4210586279024ace073226950043e46b14bc81c4fdbca51816ffae,2024-04-12T01:00:02.673000 CVE-2024-3274,0,0,21270603d98a8b3e4eb735d32ed5791b575a3fe053daf1cd79027e90bad6bb12,2024-04-11T01:25:57.997000 -CVE-2024-3281,0,0,25e1b157d3d06febc113760b0b676264898985898c3206c1611026e4fe7c0d04,2024-04-10T13:24:22.187000 +CVE-2024-3281,0,1,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000 CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 CVE-2024-3311,0,0,cc24f0e110212be66e02c71f4e3192ea09f47ae5e9090cac74e341e472a33c23,2024-04-11T01:25:58.140000 -CVE-2024-3313,0,0,34e45a1f177ced312c604df33df878985b0f6839566372881631ec84c50a1537,2024-04-10T13:23:38.787000 +CVE-2024-3313,0,1,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000 CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000 CVE-2024-3315,0,0,b04b498365bf550d192eb8f6355a94ceb3682fd952e63a5ca20359721d079b72,2024-04-11T01:25:58.317000 CVE-2024-3316,0,0,4e6c62f7daa2acc1b09b99a91d6183a3304f5f15a5196b646e7dca95270cc88c,2024-04-11T01:25:58.400000 CVE-2024-3320,0,0,ab85871ad052e5f4fcf422dcfe569e228d877013c1827b81abff88790a089460,2024-04-11T01:25:58.477000 CVE-2024-3321,0,0,d8a6bcfaefe4af3ab04feeb555f2bafb55cef6e6487d8794d3441d1d17abf104,2024-04-11T01:25:58.560000 -CVE-2024-3343,0,0,e53ea4a09777f1912b915aca2456cb2a51d8620a9831c4d3e1d4e05fa15520d4,2024-04-11T12:47:44.137000 -CVE-2024-3344,0,0,af101a9cd53664cf87ed1cad1c59c046d1528fb9835c822052be43d6212e756a,2024-04-11T12:47:44.137000 +CVE-2024-3343,0,1,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000 +CVE-2024-3344,0,1,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000 CVE-2024-3346,0,0,e1501efbca46250b1b984725e11942bb9306686e2cffb2edd3d8dd5b4c4ccc5c,2024-04-11T01:25:58.637000 CVE-2024-3347,0,0,f531aca6ac2c0d8c742afa906f1c675ed72b73f770b0dc5b59ea1d37af1ecdde,2024-04-11T01:25:58.723000 CVE-2024-3348,0,0,25c5a153d1148795607a2b1c3bff5dd76b89c464d7f7630dde394d2c2f4d4efd,2024-04-11T01:25:58.807000 @@ -245338,8 +245338,8 @@ CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a9 CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000 CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000 CVE-2024-3445,0,0,c9628f9221624aa27cf7f5ca164e4ed34c93be648ba2ac6a84e0908c02d87fc9,2024-04-11T01:26:03.137000 -CVE-2024-3446,0,0,9cc1a5df3a128fed250330ab35c2459b0a539ef5faab034b1ec88e40f4c9e7ad,2024-04-10T13:23:38.787000 -CVE-2024-3448,0,0,021c30870d8f8b1098b5af9846caa6063210970f245b043a7cdabf189d7ad22d,2024-04-10T19:49:51.183000 +CVE-2024-3446,0,1,c0a3792d28bb120cb23b962cb1280f6386526857c06b5c4bfe6072b3fea4955f,2024-04-10T13:23:38.787000 +CVE-2024-3448,0,1,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000 CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000 @@ -245348,35 +245348,35 @@ CVE-2024-3463,0,0,f35096c01e521c580de90ee225d8b67562638ead2824e5fc7702bc6c9f4524 CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe93,2024-04-11T01:26:03.617000 CVE-2024-3465,0,0,a42aecf57f43969ec60c90b90013ebe0e449783aa33103b39be184486d2b2ca9,2024-04-11T01:26:03.697000 CVE-2024-3466,0,0,06b3d0b5c629cfcd72994ab03bcc3d914522a60f9b439b6d13775db50704418a,2024-04-11T01:26:03.777000 -CVE-2024-3512,0,0,9fab09521defa3b929d660a9496a4af1fa0a4b7726e2f53df4217da43374507a,2024-04-10T13:23:38.787000 -CVE-2024-3514,0,0,54bd45bb35a78ed15c2c093fdd8b5ff049bcac91bf070aed86da588bcb0ce8d4,2024-04-10T13:23:38.787000 +CVE-2024-3512,0,1,0bde0dc5c2508608f7df2e92075f3b315e69961d5bc617a9cf046c486aab6ef4,2024-04-10T13:23:38.787000 +CVE-2024-3514,0,1,6b760aa2049aa25a8d1a8a27afd68abe75f99cb1cc8192949aefe4b5db8f51ce,2024-04-10T13:23:38.787000 CVE-2024-3515,0,0,e00618d71e1a083ddf0ca66b0d361b3d55577664b06455c8b00d0ef44e577e59,2024-04-10T19:49:51.183000 CVE-2024-3516,0,0,069f623e5dc9f62dfe7d0e2f8f12ef959f91df26982d5aa8df2384f36735ef9d,2024-04-10T19:49:51.183000 -CVE-2024-3521,0,0,1830a92c4fa7330e3106bd6cd2389f537e7610aa27923276e76faa7dac3d0cd1,2024-04-11T01:26:03.900000 -CVE-2024-3522,0,0,75e539d696b207cd5c3c336efc3514170bd335070384a769a196384a6106bacc,2024-04-11T01:26:03.977000 -CVE-2024-3523,0,0,33327f51404b83d3e85df2919e53354d094d33db89ae3b72052337ce65174c34,2024-04-11T01:26:04.057000 -CVE-2024-3524,0,0,5c12828bd83f9f7ac2bff69979cebe082adc98baee652c008c74385c4ebeb341,2024-04-11T01:26:04.140000 -CVE-2024-3525,0,0,e52b7c077b01f8fde287f75015412dea704eec1fd096a6f42df26afa5757a4d8,2024-04-11T01:26:04.223000 -CVE-2024-3526,0,0,f8e4210cff5473c8f2e27823a73ab91a2253585f3c2ea95746c3f97b2ae54c39,2024-04-11T01:26:04.297000 -CVE-2024-3528,0,0,797865c7dd2809b8c014ec5c708c52627b1a94ee58592c2b4e321d2807860e64,2024-04-11T01:26:04.380000 -CVE-2024-3529,0,0,ea6a89b6462015aa91bf9c7ad5db1c1a28c19d029d8256e8975c8937e56d757f,2024-04-11T01:26:04.450000 -CVE-2024-3530,0,0,9cdca16f170caf3d7b71599a51da02f79ee4d9a13614deec8b71d6d3991904b9,2024-04-11T01:26:04.530000 -CVE-2024-3531,0,0,744c59f8c3faa20a28aa45becfd11428af319feafbdf5dc5dc3e62224aba59a7,2024-04-11T01:26:04.613000 -CVE-2024-3532,0,0,6e32697c3f82847eea483e8317aaea9748f1339290a3ad364ef47a87649bf656,2024-04-11T01:26:04.690000 -CVE-2024-3533,0,0,5ee2ce8e575b8779e0c7e3643bffe3ff3cc034b0555416282814a206b1e117d5,2024-04-11T01:26:04.777000 -CVE-2024-3534,0,0,8bd18857b73fdd406a3846ad65c85829e7e4e3ee9a375a3273bfceebc5cb9f0d,2024-04-11T01:26:04.860000 -CVE-2024-3535,0,0,42ae1dee4a5d517ef46f540a87bd0fe7826d9eb8f193181d9092d4143f78de05,2024-04-11T01:26:04.940000 -CVE-2024-3536,0,0,7274e03a33342f5054940e739ba7a44a82502a6586ebb39d78dc528b2efdae50,2024-04-11T01:26:05.020000 -CVE-2024-3537,0,0,f5952b8de3e681720a6306cafbf2f807555a04628f275eddad7eb4cfc39de5d6,2024-04-11T01:26:05.100000 -CVE-2024-3538,0,0,4f45f8b5c0f32f767132511505733be072174190855065d386b4eeccc9b5ced4,2024-04-11T01:26:05.180000 -CVE-2024-3539,0,0,42baa714804192ad3583737a68676d166c675c83209f80742a949bc0db0d259e,2024-04-11T01:26:05.253000 -CVE-2024-3540,0,0,78b7e75357574396f627d4b5928b7e23e4cfb919d5982d45c7beeb1609b87bb6,2024-04-11T01:26:05.330000 -CVE-2024-3541,0,0,7cbf03ae9d3910cc8315d30c141db7c24e51251df979afd6d961b45cbc54897c,2024-04-11T01:26:05.407000 -CVE-2024-3542,0,0,d5b474e4cd5fab3c10645f83f4902bc574e6e364e4a0107b9f992f6ccb3b73b5,2024-04-11T01:26:05.483000 -CVE-2024-3545,0,0,e7befd85f678d936dfb5f44e5042228a61683aa4e34c39075402d6d0e1f187da,2024-04-10T13:23:38.787000 +CVE-2024-3521,0,1,e61d852c00114c6bd3f4a1b5eeb2ffc212b4c353a3c03a3453182d437a66b289,2024-04-11T01:26:03.900000 +CVE-2024-3522,0,1,2dd2aff8352737c957083bbb548feca94c6bc4d24050574d0269bbbcc566f409,2024-04-11T01:26:03.977000 +CVE-2024-3523,0,1,4bcdc0c2641557edee953608e7aa9e663000e70c847d90476983bd4354ae7983,2024-04-11T01:26:04.057000 +CVE-2024-3524,0,1,f5c20d0fc19e11f3f0e427692006f6e1456e3eadd96b93a72ad620941853e9e3,2024-04-11T01:26:04.140000 +CVE-2024-3525,0,1,52c902f02a9836b3ea2381754dd8c20a9f98c6dd8abb82a02bec9c230af89f22,2024-04-11T01:26:04.223000 +CVE-2024-3526,0,1,9a4950570a0a52318439239731a19aae36ee6485ffc5efa85f6529a0b887ed46,2024-04-11T01:26:04.297000 +CVE-2024-3528,0,1,c333d9bd478fe98907f2b2e1eb47ed504ddd7ed2e4d67444d03877139fb18bc2,2024-04-11T01:26:04.380000 +CVE-2024-3529,0,1,c4212cf73440dacda57c27e81871f59eefcace1e22cd23c49b68b49570a672da,2024-04-11T01:26:04.450000 +CVE-2024-3530,0,1,be6c844cb4c0d1a572314291d93f551b7e091d9c21c1f65b7049b954fa732b51,2024-04-11T01:26:04.530000 +CVE-2024-3531,0,1,09478aaaa4d403c87734f464f507a1513b13b6368f86fa9e28550ff0b5bcec93,2024-04-11T01:26:04.613000 +CVE-2024-3532,0,1,f3ffd2c0d7736031226e67c1ca1fad92f9564095974cd8d6d0d6adb3a34991db,2024-04-11T01:26:04.690000 +CVE-2024-3533,0,1,62c9e88fd4fa66eee57b269716d98be747e5c0d8f98ce3f33605af5e36ec001a,2024-04-11T01:26:04.777000 +CVE-2024-3534,0,1,3f4ca0a825f6a880e1c4df3aa666e80058b901b4d561d54d897c8eecf4f4f742,2024-04-11T01:26:04.860000 +CVE-2024-3535,0,1,7c416ce2b6f70c5b4a92bb967c75c536e6db1fe48cf7271242ad235d3e2008c7,2024-04-11T01:26:04.940000 +CVE-2024-3536,0,1,40715d2ef1e026ba9aa0b6ea53b3c1a1eef9dbe5de50137e5459caf4fdfe90f1,2024-04-11T01:26:05.020000 +CVE-2024-3537,0,1,0928d981efe98d44d67fd4a6780396610f783d8688c6e4a6522df2f70f2645b4,2024-04-11T01:26:05.100000 +CVE-2024-3538,0,1,c9f811e2db6b286c748c90f2c98ec4ecd6d42b16fd988869f67ad65ca2bf264e,2024-04-11T01:26:05.180000 +CVE-2024-3539,0,1,ca3c1ed8873a75e6872ced303156f58ed178a4c1443eeab14e1c9cd9449a32f6,2024-04-11T01:26:05.253000 +CVE-2024-3540,0,1,3b43ceba8d00e7cb12a7f5e69ec05089558408db933daa7fe1fc427d18c77d22,2024-04-11T01:26:05.330000 +CVE-2024-3541,0,1,8ef69c8e6da7ddd7e7450a9f158541d95c357cb1dd6df6b3a0f6b582158556c3,2024-04-11T01:26:05.407000 +CVE-2024-3542,0,1,4d97b2c4768d708eda9f830cb6de715802771123d52ff8ee61d741f1b848e5f9,2024-04-11T01:26:05.483000 +CVE-2024-3545,0,1,5bce2ec2b9cfe5866e6246067691b4f478da11354be249c7fe197f29a14875e8,2024-04-10T13:23:38.787000 CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000 CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000 -CVE-2024-3567,0,0,1af258b632f5894f7acbe467a6e60fcd03c7c24b1a6d5af3526bc195f6d9c620,2024-04-10T19:49:51.183000 +CVE-2024-3567,0,1,95d4f85888c7c90830bdb6bbe6ab9e66d33c542ba2d85efb396aaa8b077bff79,2024-04-10T19:49:51.183000 CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000 CVE-2024-3569,0,0,1713859ca5226d02b2325e4195882c2c405d5fa4ce56952eae5e58bc3dad6bde,2024-04-10T19:49:51.183000 CVE-2024-3570,0,0,df44050a6262c2969e286478660750960763247b24187b06070fe7dd6b9e3002,2024-04-10T19:49:51.183000 @@ -245414,4 +245414,4 @@ CVE-2024-3736,0,0,7e9c780d2e5209bba3dfbf4e2f44240946b4bc9083f1a1f1f4f9a42f3fc7d9 CVE-2024-3737,0,0,3ece3dc04e2a51c738908804fdc895437fedad772f68ffb6b51e1e486b0c00ab,2024-04-13T17:15:50.400000 CVE-2024-3738,0,0,09bc2e3a802ac8f6c70c5517ac81e7b57f06695f5612a81cd6c91a0a61213828,2024-04-13T18:15:07.390000 CVE-2024-3739,0,0,7ec4f828f90436048bb80fdf887bc8a60adc89dbf654d1396a79394bec55d21d,2024-04-13T19:15:53.757000 -CVE-2024-3740,1,1,cad4660a05c482b6800e402dcb0a2b908ba4751bb8506078e808ef0aee3e4761,2024-04-13T21:15:48.353000 +CVE-2024-3740,0,0,cad4660a05c482b6800e402dcb0a2b908ba4751bb8506078e808ef0aee3e4761,2024-04-13T21:15:48.353000