From 468bd3b1e187ad511008b8bd7a6e3b5bd4792cbd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 9 Apr 2024 14:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-04-09T14:00:38.020013+00:00 --- CVE-2021/CVE-2021-286xx/CVE-2021-28656.json | 4 +- CVE-2022/CVE-2022-36xx/CVE-2022-3671.json | 27 +++- CVE-2022/CVE-2022-478xx/CVE-2022-47894.json | 4 +- CVE-2023/CVE-2023-10xx/CVE-2023-1082.json | 4 +- CVE-2023/CVE-2023-10xx/CVE-2023-1083.json | 4 +- CVE-2023/CVE-2023-508xx/CVE-2023-50821.json | 4 +- CVE-2024/CVE-2024-00xx/CVE-2024-0082.json | 8 +- CVE-2024/CVE-2024-00xx/CVE-2024-0083.json | 8 +- CVE-2024/CVE-2024-10xx/CVE-2024-1023.json | 6 +- CVE-2024/CVE-2024-12xx/CVE-2024-1233.json | 8 +- CVE-2024/CVE-2024-13xx/CVE-2024-1300.json | 6 +- CVE-2024/CVE-2024-16xx/CVE-2024-1664.json | 8 +- CVE-2024/CVE-2024-229xx/CVE-2024-22949.json | 8 +- CVE-2024/CVE-2024-22xx/CVE-2024-2223.json | 55 +++++++ CVE-2024/CVE-2024-22xx/CVE-2024-2224.json | 55 +++++++ CVE-2024/CVE-2024-230xx/CVE-2024-23078.json | 8 +- CVE-2024/CVE-2024-230xx/CVE-2024-23079.json | 8 +- CVE-2024/CVE-2024-230xx/CVE-2024-23081.json | 8 +- CVE-2024/CVE-2024-230xx/CVE-2024-23084.json | 8 +- CVE-2024/CVE-2024-230xx/CVE-2024-23085.json | 8 +- CVE-2024/CVE-2024-230xx/CVE-2024-23086.json | 8 +- CVE-2024/CVE-2024-235xx/CVE-2024-23584.json | 10 +- CVE-2024/CVE-2024-242xx/CVE-2024-24279.json | 8 +- CVE-2024/CVE-2024-256xx/CVE-2024-25646.json | 8 +- CVE-2024/CVE-2024-262xx/CVE-2024-26275.json | 4 +- CVE-2024/CVE-2024-262xx/CVE-2024-26276.json | 4 +- CVE-2024/CVE-2024-262xx/CVE-2024-26277.json | 4 +- CVE-2024/CVE-2024-276xx/CVE-2024-27630.json | 8 +- CVE-2024/CVE-2024-276xx/CVE-2024-27631.json | 8 +- CVE-2024/CVE-2024-276xx/CVE-2024-27632.json | 8 +- CVE-2024/CVE-2024-278xx/CVE-2024-27898.json | 8 +- CVE-2024/CVE-2024-278xx/CVE-2024-27899.json | 8 +- CVE-2024/CVE-2024-279xx/CVE-2024-27901.json | 8 +- CVE-2024/CVE-2024-279xx/CVE-2024-27983.json | 8 +- CVE-2024/CVE-2024-281xx/CVE-2024-28167.json | 8 +- CVE-2024/CVE-2024-282xx/CVE-2024-28224.json | 8 +- CVE-2024/CVE-2024-282xx/CVE-2024-28270.json | 8 +- CVE-2024/CVE-2024-29xx/CVE-2024-2975.json | 8 +- CVE-2024/CVE-2024-301xx/CVE-2024-30189.json | 4 +- CVE-2024/CVE-2024-301xx/CVE-2024-30190.json | 4 +- CVE-2024/CVE-2024-301xx/CVE-2024-30191.json | 4 +- CVE-2024/CVE-2024-302xx/CVE-2024-30214.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30215.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30216.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30217.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30218.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30676.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30678.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30679.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30680.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30681.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30683.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30684.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30686.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30687.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30688.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30690.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30691.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30692.json | 8 +- CVE-2024/CVE-2024-306xx/CVE-2024-30694.json | 4 +- CVE-2024/CVE-2024-306xx/CVE-2024-30695.json | 4 +- CVE-2024/CVE-2024-306xx/CVE-2024-30696.json | 4 +- CVE-2024/CVE-2024-306xx/CVE-2024-30697.json | 4 +- CVE-2024/CVE-2024-306xx/CVE-2024-30699.json | 4 +- CVE-2024/CVE-2024-307xx/CVE-2024-30701.json | 4 +- CVE-2024/CVE-2024-30xx/CVE-2024-3046.json | 4 +- CVE-2024/CVE-2024-310xx/CVE-2024-31047.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31365.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31366.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31367.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31368.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31369.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31370.json | 4 +- CVE-2024/CVE-2024-315xx/CVE-2024-31544.json | 20 +++ CVE-2024/CVE-2024-318xx/CVE-2024-31860.json | 4 +- CVE-2024/CVE-2024-318xx/CVE-2024-31862.json | 4 +- CVE-2024/CVE-2024-318xx/CVE-2024-31863.json | 4 +- CVE-2024/CVE-2024-319xx/CVE-2024-31978.json | 4 +- CVE-2024/CVE-2024-34xx/CVE-2024-3463.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3464.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3465.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3466.json | 8 +- README.md | 43 ++++-- _state.csv | 161 ++++++++++---------- 84 files changed, 622 insertions(+), 249 deletions(-) create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2223.json create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2224.json create mode 100644 CVE-2024/CVE-2024-315xx/CVE-2024-31544.json diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28656.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28656.json index 550e69a2e6e..4593dd24e86 100644 --- a/CVE-2021/CVE-2021-286xx/CVE-2021-28656.json +++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28656.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28656", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T10:15:07.610", - "lastModified": "2024-04-09T10:15:07.610", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json index 47ac20c7304..099a5bf41bd 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3671.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3671", "sourceIdentifier": "cna@vuldb.com", "published": "2022-10-26T17:15:10.080", - "lastModified": "2024-04-04T17:15:08.060", - "vulnStatus": "Modified", + "lastModified": "2024-04-09T13:20:32.987", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -84,6 +84,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -123,19 +133,26 @@ }, { "url": "https://vuldb.com/?ctiid.212014", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.212014", "source": "cna@vuldb.com", "tags": [ "Permissions Required", - "Third Party Advisory" + "VDB Entry" ] }, { "url": "https://vuldb.com/?submit.49576", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-478xx/CVE-2022-47894.json b/CVE-2022/CVE-2022-478xx/CVE-2022-47894.json index c5ca0260ff8..b48fc15b4f3 100644 --- a/CVE-2022/CVE-2022-478xx/CVE-2022-47894.json +++ b/CVE-2022/CVE-2022-478xx/CVE-2022-47894.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47894", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T10:15:08.343", - "lastModified": "2024-04-09T10:15:08.343", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1082.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1082.json index 329acc72735..06c7a122385 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1082.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1082.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1082", "sourceIdentifier": "info@cert.vde.com", "published": "2024-04-09T09:15:19.643", - "lastModified": "2024-04-09T09:15:19.643", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1083.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1083.json index 1ba6c65a445..9557a6132c6 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1083.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1083.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1083", "sourceIdentifier": "info@cert.vde.com", "published": "2024-04-09T09:15:19.937", - "lastModified": "2024-04-09T09:15:19.937", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50821.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50821.json index 45d31058277..249beb3f349 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50821.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50821.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50821", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:21.270", - "lastModified": "2024-04-09T09:15:21.270", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0082.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0082.json index 1e4698c781e..226f2f25e44 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0082.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0082.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0082", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-04-08T22:15:07.993", - "lastModified": "2024-04-08T22:15:07.993", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause improper privilege management by sending open file requests to the application. A successful exploit of this vulnerability might lead to local escalation of privileges, information disclosure, and data tampering" + }, + { + "lang": "es", + "value": "NVIDIA ChatRTX para Windows contiene una vulnerabilidad en la interfaz de usuario, donde un atacante puede provocar una gesti\u00f3n inadecuada de privilegios al enviar solicitudes de apertura de archivos a la aplicaci\u00f3n. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda conducir a una escalada local de privilegios, divulgaci\u00f3n de informaci\u00f3n y manipulaci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json index 534417cf865..b3b03083817 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0083.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0083", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-04-08T22:15:08.203", - "lastModified": "2024-04-08T22:15:08.203", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause a cross-site scripting error by network by running malicious scripts in users' browsers. A successful exploit of this vulnerability might lead to code execution, denial of service, and information disclosure." + }, + { + "lang": "es", + "value": "NVIDIA ChatRTX para Windows contiene una vulnerabilidad en la interfaz de usuario, donde un atacante puede provocar un error de cross site scripting en la red al ejecutar scripts maliciosos en los navegadores de los usuarios. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo, denegaci\u00f3n de servicio y divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1023.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1023.json index 0e7943ecc4a..6c12f949489 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1023.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1023.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1023", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-27T08:15:38.140", - "lastModified": "2024-04-04T16:15:08.140", + "lastModified": "2024-04-09T12:15:07.627", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:1662", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1706", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1023", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1233.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1233.json index b8eb3281615..d8bbbd1ff33 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1233.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1233.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1233", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-09T07:15:08.060", - "lastModified": "2024-04-09T07:15:08.060", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en `JwtValidator.resolvePublicKey` en JBoss EAP, donde el validador verifica jku y env\u00eda una solicitud HTTP. Durante este proceso, no se realiza ninguna lista blanca ni ning\u00fan otro comportamiento de filtrado en la direcci\u00f3n URL de destino, lo que puede provocar una vulnerabilidad Server-Side Request Forgery (SSRF)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1300.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1300.json index d428ba78264..5716f2fbef9 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1300.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1300.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1300", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-02T08:15:53.993", - "lastModified": "2024-04-04T16:15:08.410", + "lastModified": "2024-04-09T12:15:07.853", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:1662", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1706", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1300", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1664.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1664.json index eedb18ee23f..66c8cb0d912 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1664.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1664.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1664", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-09T05:15:47.703", - "lastModified": "2024-04-09T05:15:47.703", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Responsive Gallery Grid WordPress plugin before 2.3.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Responsive Gallery Grid de WordPress anterior a 2.3.11 no sanitiza ni escapa algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json index 957dccff33a..d00aec0774d 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22949.json @@ -2,12 +2,16 @@ "id": "CVE-2024-22949", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.647", - "lastModified": "2024-04-08T23:15:07.647", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /chart/annotations/CategoryLineAnnotation." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json new file mode 100644 index 00000000000..1f90e83d4a5 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2223.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2223", + "sourceIdentifier": "cve-requests@bitdefender.com", + "published": "2024-04-09T13:15:33.057", + "lastModified": "2024-04-09T13:15:33.057", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:\u00a0\n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for\u00a0 Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-185" + } + ] + } + ], + "references": [ + { + "url": "https://www.bitdefender.com/support/security-advisories/incorrect-regular-expression-in-gravityzone-update-server-va-11465/", + "source": "cve-requests@bitdefender.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json new file mode 100644 index 00000000000..0c21de433e1 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2224.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2224", + "sourceIdentifier": "cve-requests@bitdefender.com", + "published": "2024-04-09T13:15:33.357", + "lastModified": "2024-04-09T13:15:33.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: \n\nBitdefender Endpoint Security for Linux version 7.0.5.200089\nBitdefender Endpoint Security for Windows version 7.9.9.380\nGravityZone Control Center (On Premises) version 6.36.1\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.bitdefender.com/support/security-advisories/privilege-escalation-via-the-gravityzone-productmanager-updateserver-kitsmanager-api-va-11466/", + "source": "cve-requests@bitdefender.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json index 215039f5261..1aa59647848 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23078.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23078", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.500", - "lastModified": "2024-04-08T20:15:08.500", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json index 36acaa42942..39602546a81 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23079", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.703", - "lastModified": "2024-04-08T23:15:07.703", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json index 9a890ec8ec3..76864a714ff 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23081.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23081", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.757", - "lastModified": "2024-04-08T23:15:07.757", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente org.treeten.bp.LocalDate::compareTo(ChronoLocalDate)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json index 8744219b820..8507a398c37 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23084.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23084", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.803", - "lastModified": "2024-04-08T23:15:07.803", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[])." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una excepci\u00f3n ArrayIndexOutOfBoundsException a trav\u00e9s del componente org.apfloat.internal.DoubleCRTMath::add(double[], double[])." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json index 737a472e56b..227329053df 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23085.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23085", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.567", - "lastModified": "2024-04-08T20:15:08.567", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Apfloat v1.10.1 conten\u00eda una NullPointerException a trav\u00e9s del componente org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json index e49b627291d..51e85937eed 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23086.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23086", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.620", - "lastModified": "2024-04-08T20:15:08.620", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Apfloat v1.10.1 contiene un desbordamiento de pila a trav\u00e9s del componente org.apfloat.internal.DoubleModMath::modPow(double." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23584.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23584.json index 94516b7a644..833eaac9cf9 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23584.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23584.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23584", "sourceIdentifier": "psirt@hcl.com", "published": "2024-04-08T23:15:07.850", - "lastModified": "2024-04-08T23:15:07.850", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "The NMAP Importer service\u200b may expose data store credentials to authorized users of the Windows Registry.\n" + "value": "The NMAP Importer service? may expose data store credentials to authorized users of the Windows Registry.\n" + }, + { + "lang": "es", + "value": "El servicio NMAP Importer puede exponer las credenciales del almac\u00e9n de datos a usuarios autorizados del Registro de Windows." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json index 1dd99d4ee89..56eecaeb3af 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24279.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24279", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T20:15:08.673", - "lastModified": "2024-04-08T20:15:08.673", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue in secdiskapp 1.5.1 (management program for NewQ Fingerprint Encryption Super Speed Flash Disk) allows attackers to gain escalated privileges via vsVerifyPassword and vsSetFingerPrintPower functions." + }, + { + "lang": "es", + "value": "Un problema en secdiskapp 1.5.1 (programa de administraci\u00f3n para NewQ Fingerprint Encryption Super Speed Flash Disk) permite a los atacantes obtener privilegios elevados a trav\u00e9s de las funciones vsVerifyPassword y vsSetFingerPrintPower." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json index 2f9272a66be..36fb1e883b0 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json @@ -2,12 +2,16 @@ "id": "CVE-2024-25646", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:48.343", - "lastModified": "2024-04-09T01:15:48.343", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n" + }, + { + "lang": "es", + "value": "Debido a una validaci\u00f3n incorrecta, SAP BusinessObject Business Intelligence Launch Pad permite que un atacante autenticado acceda a informaci\u00f3n del sistema operativo mediante un documento manipulado. Una explotaci\u00f3n exitosa podr\u00eda tener un impacto considerable en la confidencialidad de la solicitud." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26275.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26275.json index b25104905c0..39d73147d6a 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26275.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26275", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:24.260", - "lastModified": "2024-04-09T09:15:24.260", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26276.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26276.json index 2a1bdea5799..10259a3c90f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26276.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26276", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:24.457", - "lastModified": "2024-04-09T09:15:24.457", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26277.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26277.json index 4cea38baa46..366c251b54d 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26277.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26277", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:24.670", - "lastModified": "2024-04-09T09:15:24.670", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27630.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27630.json index 28cec26a078..b6f53c48de5 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27630.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27630.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27630", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T21:15:09.983", - "lastModified": "2024-04-08T21:15:09.983", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function." + }, + { + "lang": "es", + "value": "La referencia directa a objetos inseguros (IDOR) en GNU Savane v.3.12 y anteriores permite a un atacante remoto eliminar archivos arbitrarios mediante una entrada manipulada en la funci\u00f3n trackers_data_delete_file." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27631.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27631.json index 63db47508ea..9564a9d6ff1 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27631.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27631.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27631", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T21:15:10.067", - "lastModified": "2024-04-08T21:15:10.067", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Request Forgery en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de siteadmin/usergroup.php" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27632.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27632.json index 74b2f54efe4..1d3f9a0912c 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27632.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27632.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27632", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T22:15:08.413", - "lastModified": "2024-04-08T22:15:08.413", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function." + }, + { + "lang": "es", + "value": "Un problema en GNU Savane v.3.12 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de form_id en la funci\u00f3n form_header()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json index 9fe60d3fc0b..a324808a22b 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27898", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:48.583", - "lastModified": "2024-04-09T01:15:48.583", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a\u00a0Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.\n\n" + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n SAP NetWeaver, debido a una validaci\u00f3n de entrada insuficiente, permite a un atacante enviar una solicitud manipulada desde una aplicaci\u00f3n web vulnerable dirigida a sistemas internos detr\u00e1s de firewalls que normalmente son inaccesibles para un atacante desde la red externa, lo que resulta en una vulnerabilidad Server-Side Request Forgery. Teniendo as\u00ed un bajo impacto en la confidencialidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json index 2c76cb41b3e..578d5e50cfd 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27899.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27899", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:48.777", - "lastModified": "2024-04-09T01:15:48.777", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Self-Registration\u00a0and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.\n\n" + }, + { + "lang": "es", + "value": "Self-Registration and Modify your own profile en User Admin Application de NetWeaver AS Java no exige requisitos de seguridad adecuados para el contenido de la respuesta de seguridad reci\u00e9n definida. Un atacante puede aprovechar esto para causar un profundo impacto en la confidencialidad y un bajo impacto tanto en la integridad como en la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json index 718d0e5433b..e231ae67d87 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27901.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27901", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:48.993", - "lastModified": "2024-04-09T01:15:48.993", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.\n\n" + }, + { + "lang": "es", + "value": "SAP Asset Accounting podr\u00eda permitir que un atacante con altos privilegios aproveche la validaci\u00f3n insuficiente de la informaci\u00f3n de ruta proporcionada por los usuarios y la pase a las API de archivos. Provocando as\u00ed un impacto considerable en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json index 6c9b91561b2..6ad7cac47f4 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27983.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27983", "sourceIdentifier": "support@hackerone.com", "published": "2024-04-09T01:15:49.197", - "lastModified": "2024-04-09T01:15:49.197", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition." + }, + { + "lang": "es", + "value": "Un atacante puede hacer que el servidor HTTP/2 de Node.js no est\u00e9 completamente disponible enviando una peque\u00f1a cantidad de paquetes de tramas HTTP/2 con algunas tramas HTTP/2 en su interior. Es posible dejar algunos datos en la memoria nghttp2 despu\u00e9s del reinicio cuando los encabezados con el frame de CONTINUATION HTTP/2 se env\u00edan al servidor y luego el cliente cierra abruptamente una conexi\u00f3n TCP activando el destructor Http2Session mientras los frames de encabezado a\u00fan se est\u00e1n procesando (y almacenando en la memoria) causando una condici\u00f3n de ejecuci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json index 36c1e0a82a2..515bfd24888 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28167.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28167", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:49.380", - "lastModified": "2024-04-09T01:15:49.380", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SAP Group Reporting Data Collection\u00a0does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.\n\n" + }, + { + "lang": "es", + "value": "SAP Group Reporting Data Collection no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Tras una explotaci\u00f3n exitosa, se pueden cambiar datos espec\u00edficos a trav\u00e9s de la aplicaci\u00f3n Ingresar datos del paquete, aunque el usuario no tiene autorizaci\u00f3n suficiente, lo que causa un alto impacto en la integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28224.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28224.json index 380ae6ad6fa..968403f34f9 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28224.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28224.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28224", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T19:15:07.353", - "lastModified": "2024-04-08T19:15:07.353", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Ollama before 0.1.29 has a DNS rebinding vulnerability that can inadvertently allow remote access to the full API, thereby letting an unauthorized user chat with a large language model, delete a model, or cause a denial of service (resource exhaustion)." + }, + { + "lang": "es", + "value": "Ollama anterior a 0.1.29 tiene una vulnerabilidad de vinculaci\u00f3n de DNS que puede permitir inadvertidamente el acceso remoto a la API completa, permitiendo as\u00ed que un usuario no autorizado converse con un modelo de lenguaje grande, elimine un modelo o provoque una denegaci\u00f3n de servicio (agotamiento de recursos)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28270.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28270.json index 68de264e5cb..2504a0d094f 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28270.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28270.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28270", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T19:15:07.417", - "lastModified": "2024-04-08T19:15:07.417", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue discovered in web-flash v3.0 allows attackers to reset passwords for arbitrary users via crafted POST request to /prod-api/user/resetPassword." + }, + { + "lang": "es", + "value": "Un problema descubierto en web-flash v3.0 permite a los atacantes restablecer contrase\u00f1as para usuarios arbitrarios mediante una solicitud POST manipulada /prod-api/user/resetPassword." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json index f544973a294..5380d92d3d3 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2975.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2975", "sourceIdentifier": "security@octopus.com", "published": "2024-04-09T01:15:49.583", - "lastModified": "2024-04-09T01:15:49.583", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A race condition was identified through which privilege escalation was possible in certain configurations." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una condici\u00f3n de ejecuci\u00f3n a trav\u00e9s de la cual era posible la escalada de privilegios en ciertas configuraciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30189.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30189.json index 876c4d93bc7..71e56a97243 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30189.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30189.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30189", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:24.873", - "lastModified": "2024-04-09T09:15:24.873", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30190.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30190.json index 41fbc6d512b..ed35be6ce5a 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30190.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30190.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30190", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:25.117", - "lastModified": "2024-04-09T09:15:25.117", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30191.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30191.json index 2ed7d3b47ca..66cbf89f052 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30191.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30191.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30191", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:25.317", - "lastModified": "2024-04-09T09:15:25.317", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json index 07ca0352abc..29008789e09 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30214.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30214", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:49.750", - "lastModified": "2024-04-09T01:15:49.750", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.\n\n" + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n permite que un atacante con privilegios elevados agregue un par\u00e1metro de consulta GET malicioso a las invocaciones del Servicio, que se reflejan en la respuesta del servidor. En determinadas circunstancias, si el par\u00e1metro contiene JavaScript, el script podr\u00eda procesarse en el lado del cliente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json index b41c000fbc6..aaeb2e0c871 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30215.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30215", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:49.953", - "lastModified": "2024-04-09T01:15:49.953", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However,\u00a0the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.\n\n" + }, + { + "lang": "es", + "value": "La p\u00e1gina Resource Settings permite a un atacante con altos privilegios cargar un payload explotable para almacenarlo y reflejarlo cada vez que un usuario visita la p\u00e1gina. En un ataque exitoso, se podr\u00eda obtener y/o modificar cierta informaci\u00f3n. Sin embargo, el atacante no tiene control sobre qu\u00e9 informaci\u00f3n obtiene, o la cantidad o tipo de p\u00e9rdida es limitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json index 80e12a6c48c..68a0e063a51 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30216.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30216", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:50.140", - "lastModified": "2024-04-09T01:15:50.140", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By\u00a0exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application.\u00a0Confidentiality and Availability are not impacted.\n\n" + }, + { + "lang": "es", + "value": "Cash Management en SAP S/4 HANA no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Al explotar esta vulnerabilidad, el atacante puede agregar notas en la solicitud de revisi\u00f3n con el estado \"completado\" que afecta la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json index 674ebb88a51..5891ec82bfd 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30217.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30217", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:50.353", - "lastModified": "2024-04-09T01:15:50.353", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.\n\n" + }, + { + "lang": "es", + "value": "Cash Management en SAP S/4 HANA no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Al explotar esta vulnerabilidad, un atacante puede aprobar o rechazar una solicitud de cuenta bancaria afectando la integridad de la aplicaci\u00f3n. La confidencialidad y la disponibilidad no se ven afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json index e304bd9c934..6c34fac1a5b 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30218", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:50.570", - "lastModified": "2024-04-09T01:15:50.570", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n" + }, + { + "lang": "es", + "value": "El servidor de aplicaciones ABAP de SAP NetWeaver, as\u00ed como la plataforma ABAP, permiten a un atacante impedir que usuarios leg\u00edtimos accedan a un servicio, ya sea bloqueando o inundando el servicio. Esto tiene un impacto considerable en la disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30676.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30676.json index dbbcf7e1ab6..3dbfc420911 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30676.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30676.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30676", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T03:15:07.763", - "lastModified": "2024-04-09T03:15:07.763", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en las versiones de ROS2 Iron Irwini donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3. Un usuario malintencionado podr\u00eda explotar esta vulnerabilidad de forma remota para bloquear los nodos ROS2, provocando as\u00ed una denegaci\u00f3n de servicio. La falla permite a un atacante provocar un comportamiento inesperado en el funcionamiento de los nodos ROS2, lo que provoca su falla e interrumpe el funcionamiento normal del sistema, haci\u00e9ndolo no disponible para los usuarios previstos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30678.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30678.json index 17e72cd0797..2c3c7dba1dc 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30678.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30678.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30678", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T03:15:07.830", - "lastModified": "2024-04-09T03:15:07.830", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, donde el sistema transmite mensajes en texto plano. Esta falla expone informaci\u00f3n confidencial, haci\u00e9ndola vulnerable a ataques de intermediario (MitM) y permitiendo a los atacantes interceptar y acceder a estos datos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30679.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30679.json index b71ed39e04d..909c2ac4289 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30679.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30679.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30679", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T04:15:10.087", - "lastModified": "2024-04-09T04:15:10.087", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las configuraciones predeterminadas de ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes no autenticados autenticarse utilizando credenciales predeterminadas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30680.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30680.json index a9e29e6e4e1..b1a00840122 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30680.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30680.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30680", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T04:15:10.583", - "lastModified": "2024-04-09T04:15:10.583", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n de Shell fue descubierta en ROS2 (Robot Operating System 2) Iron Irwini en las versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial debido a la forma en que ROS2 maneja la ejecuci\u00f3n de comandos de Shell en componentes como int\u00e9rpretes de comandos o interfaces que procesan entradas externas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30681.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30681.json index ddbc2b747c1..7734d285130 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30681.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30681.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30681", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T04:15:10.747", - "lastModified": "2024-04-09T04:15:10.747", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en ROS2 Iron Irwini versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del procesamiento de comandos o componentes de llamadas al sistema en ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30683.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30683.json index 54b468bbcee..ce33e634d0a 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30683.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30683.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30683", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T04:15:10.877", - "lastModified": "2024-04-09T04:15:10.877", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de desbordamiento de b\u00fafer en los componentes C++ de ROS2 Iron Irwini versiones ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante el manejo inadecuado de matrices o cadenas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30684.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30684.json index 252c7488ba4..0b9078dfb1e 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30684.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30684.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30684", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T05:15:47.807", - "lastModified": "2024-04-09T05:15:47.807", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de registro inseguro en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de medidas de seguridad inadecuadas implementadas dentro de los mecanismos de registro de ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30686.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30686.json index 3f45b10d92c..5cbf52dbb07 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30686.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30686.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30686", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T05:15:47.853", - "lastModified": "2024-04-09T05:15:47.853", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes o nodos dentro del sistema ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30687.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30687.json index 8d8058b485b..d3a92905e07 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30687.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30687.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30687", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T05:15:47.920", - "lastModified": "2024-04-09T05:15:47.920", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n insegura en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada para los componentes de serializaci\u00f3n y deserializaci\u00f3n de datos, los mecanismos de comunicaci\u00f3n entre procesos y las interfaces de comunicaci\u00f3n de red." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30688.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30688.json index 396e0d53fd0..e3eb829e528 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30688.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30688.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30688", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T05:15:47.980", - "lastModified": "2024-04-09T05:15:47.980", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad de carga de archivos arbitraria en las versiones ROS2 Iron Irwini ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el mecanismo de carga de archivos del sistema ROS2, incluida la funcionalidad del servidor para manejar la carga de archivos y los procesos de validaci\u00f3n asociados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30690.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30690.json index 78107ed27f8..e0178b23971 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30690.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30690.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30690", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T06:15:08.963", - "lastModified": "2024-04-09T06:15:08.963", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n de nodo no autorizada en las versiones ROS2 Galactic Geochelone donde ROS_VERSION es 2 y ROS_PYTHON_VERSION es 3, lo que permite a atacantes remotos escalar privilegios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30691.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30691.json index a9a79db419b..12b9d4df196 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30691.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30691.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30691", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T07:15:08.467", - "lastModified": "2024-04-09T07:15:08.467", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en ROS2 Galactic Geochelone en la versi\u00f3n ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios, obtener informaci\u00f3n confidencial y obtener acceso no autorizado a m\u00faltiples nodos ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30692.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30692.json index 8c8b6b5d611..f86bf2ae98a 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30692.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30692.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30692", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T07:15:08.560", - "lastModified": "2024-04-09T07:15:08.560", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en las versiones ROS2 Galactic Geochelone ROS_VERSION 2 y ROS_PYTHON_VERSION 3, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) en los nodos ROS2." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30694.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30694.json index 69104a01d0c..f24a959ba8c 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30694.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30694", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T08:15:07.420", - "lastModified": "2024-04-09T08:15:07.420", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30695.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30695.json index bffd745f81d..04175185d2a 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30695.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30695", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T08:15:07.530", - "lastModified": "2024-04-09T08:15:07.530", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30696.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30696.json index efd3c1837bc..142cc913eab 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30696.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30696", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T08:15:07.587", - "lastModified": "2024-04-09T08:15:07.587", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30697.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30697.json index fb0feb8f8bb..7e79986f794 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30697.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30697", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T08:15:07.663", - "lastModified": "2024-04-09T08:15:07.663", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30699.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30699.json index 15b948cae6a..415f76f6474 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30699.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30699", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T08:15:07.717", - "lastModified": "2024-04-09T08:15:07.717", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-307xx/CVE-2024-30701.json b/CVE-2024/CVE-2024-307xx/CVE-2024-30701.json index 7619e807e4f..a4caeffd1d7 100644 --- a/CVE-2024/CVE-2024-307xx/CVE-2024-30701.json +++ b/CVE-2024/CVE-2024-307xx/CVE-2024-30701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30701", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T08:15:07.770", - "lastModified": "2024-04-09T08:15:07.770", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json index fe75f6f88f5..d1f5ca8b8b4 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3046", "sourceIdentifier": "emo@eclipse.org", "published": "2024-04-09T10:15:08.600", - "lastModified": "2024-04-09T10:15:08.600", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json index 5507d50dbd8..61e934b0ffd 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31047.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31047", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:08.023", - "lastModified": "2024-04-08T23:15:08.023", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue in Academy Software Foundation openexr v.3.2.3 and before allows a local attacker to cause a denial of service (DoS) via the convert function of exrmultipart.cpp." + }, + { + "lang": "es", + "value": "Un problema en Academy Software Foundation openexr v.3.2.3 y anteriores permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n de conversi\u00f3n de exrmultipart.cpp." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json index eb17f6af857..63483858ffe 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31365.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31365", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T08:15:07.827", - "lastModified": "2024-04-09T08:15:07.827", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31366.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31366.json index 50ec6302766..aa8d94c445d 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31366.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31366", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T08:15:08.090", - "lastModified": "2024-04-09T08:15:08.090", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31367.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31367.json index 03cb81a72be..aafad835f26 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31367.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31367.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31367", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T09:15:25.520", - "lastModified": "2024-04-09T09:15:25.520", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json index 82cd951f547..c79c2f92039 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31368.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31368", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T09:15:25.710", - "lastModified": "2024-04-09T09:15:25.710", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json index 1e61c365973..936c735f33f 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31369.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31369", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T09:15:25.907", - "lastModified": "2024-04-09T09:15:25.907", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json index c8273addb3d..692b2d93c89 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31370", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-09T09:15:26.100", - "lastModified": "2024-04-09T09:15:26.100", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json new file mode 100644 index 00000000000..4983b169feb --- /dev/null +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31544.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-31544", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-09T13:15:33.557", + "lastModified": "2024-04-09T13:15:33.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in Computer Laboratory Management System v1.0 allows attackers to execute arbitrary JavaScript code by including malicious payloads into \u201cremarks\u201d, \u201cborrower_name\u201d, \u201cfaculty_department\u201d parameters in /classes/Master.php?f=save_record." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json index 44b5e6fb6d2..3dcb396b6ad 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31860", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T09:15:26.293", - "lastModified": "2024-04-09T09:15:26.293", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31862.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31862.json index a8a195f08f2..9e8bbbfdbb0 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31862.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31862", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T10:15:08.513", - "lastModified": "2024-04-09T10:15:08.513", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31863.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31863.json index 196a3e8eedd..34089aa278c 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31863.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31863", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T11:15:31.713", - "lastModified": "2024-04-09T11:15:31.713", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json index 905bb6570d3..ba005c2a633 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31978", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:26.387", - "lastModified": "2024-04-09T09:15:26.387", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3463.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3463.json index 9242ac13cf6..57d25c533c5 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3463.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3463.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3463", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T20:15:08.723", - "lastModified": "2024-04-08T20:15:08.723", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Laundry Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /karyawan/edit. The manipulation of the argument karyawan leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259744." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Laundry Management System 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /karyawan/edit. La manipulaci\u00f3n del argumento karyawan conduce a cross site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259744." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3464.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3464.json index 73bcf6c9f4d..d185c630388 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3464.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3464.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3464", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T20:15:08.990", - "lastModified": "2024-04-08T20:15:08.990", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Laundry Management System 1.0 and classified as critical. This issue affects the function laporan_filter of the file /application/controller/Pelanggan.php. The manipulation of the argument jeniskelamin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259745 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Laundry Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n laporan_filter del archivo /application/controller/Pelanggan.php. La manipulaci\u00f3n del argumento jeniskelamin conduce a la inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259745." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3465.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3465.json index 92aff4b8501..bb3cb060ace 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3465.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3465.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3465", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T21:15:10.163", - "lastModified": "2024-04-08T21:15:10.163", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been classified as critical. Affected is the function laporan_filter of the file /application/controller/Transaki.php. The manipulation of the argument dari/sampai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259746 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. La funci\u00f3n laporan_filter del archivo /application/controller/Pengeluaran.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dari/sampai conduce a la inyecci\u00f3n de SQL. El identificador asociado de esta vulnerabilidad es VDB-259747." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json index bfc4f4f85e1..6c5eccf0c94 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3466.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3466", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T21:15:10.587", - "lastModified": "2024-04-08T21:15:10.587", - "vulnStatus": "Received", + "lastModified": "2024-04-09T12:48:04.090", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function laporan_filter of the file /application/controller/Pengeluaran.php. The manipulation of the argument dari/sampai leads to sql injection. The associated identifier of this vulnerability is VDB-259747." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. La funci\u00f3n laporan_filter del archivo /application/controller/Pengeluaran.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dari/sampai conduce a la inyecci\u00f3n de SQL. El identificador asociado de esta vulnerabilidad es VDB-259747." } ], "metrics": { diff --git a/README.md b/README.md index 564315139af..8336d7bc549 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-09T12:00:30.567954+00:00 +2024-04-09T14:00:38.020013+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-09T11:15:31.713000+00:00 +2024-04-09T13:20:32.987000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -244545 +244548 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `3` -- [CVE-2021-28656](CVE-2021/CVE-2021-286xx/CVE-2021-28656.json) (`2024-04-09T10:15:07.610`) -- [CVE-2022-47894](CVE-2022/CVE-2022-478xx/CVE-2022-47894.json) (`2024-04-09T10:15:08.343`) -- [CVE-2024-3046](CVE-2024/CVE-2024-30xx/CVE-2024-3046.json) (`2024-04-09T10:15:08.600`) -- [CVE-2024-31862](CVE-2024/CVE-2024-318xx/CVE-2024-31862.json) (`2024-04-09T10:15:08.513`) -- [CVE-2024-31863](CVE-2024/CVE-2024-318xx/CVE-2024-31863.json) (`2024-04-09T11:15:31.713`) +- [CVE-2024-2223](CVE-2024/CVE-2024-22xx/CVE-2024-2223.json) (`2024-04-09T13:15:33.057`) +- [CVE-2024-2224](CVE-2024/CVE-2024-22xx/CVE-2024-2224.json) (`2024-04-09T13:15:33.357`) +- [CVE-2024-31544](CVE-2024/CVE-2024-315xx/CVE-2024-31544.json) (`2024-04-09T13:15:33.557`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `79` +- [CVE-2024-30688](CVE-2024/CVE-2024-306xx/CVE-2024-30688.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30690](CVE-2024/CVE-2024-306xx/CVE-2024-30690.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30691](CVE-2024/CVE-2024-306xx/CVE-2024-30691.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30692](CVE-2024/CVE-2024-306xx/CVE-2024-30692.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30694](CVE-2024/CVE-2024-306xx/CVE-2024-30694.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30695](CVE-2024/CVE-2024-306xx/CVE-2024-30695.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30696](CVE-2024/CVE-2024-306xx/CVE-2024-30696.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30697](CVE-2024/CVE-2024-306xx/CVE-2024-30697.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30699](CVE-2024/CVE-2024-306xx/CVE-2024-30699.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-30701](CVE-2024/CVE-2024-307xx/CVE-2024-30701.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31047](CVE-2024/CVE-2024-310xx/CVE-2024-31047.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31365](CVE-2024/CVE-2024-313xx/CVE-2024-31365.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31366](CVE-2024/CVE-2024-313xx/CVE-2024-31366.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31367](CVE-2024/CVE-2024-313xx/CVE-2024-31367.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31368](CVE-2024/CVE-2024-313xx/CVE-2024-31368.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31369](CVE-2024/CVE-2024-313xx/CVE-2024-31369.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31370](CVE-2024/CVE-2024-313xx/CVE-2024-31370.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31860](CVE-2024/CVE-2024-318xx/CVE-2024-31860.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31862](CVE-2024/CVE-2024-318xx/CVE-2024-31862.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31863](CVE-2024/CVE-2024-318xx/CVE-2024-31863.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-31978](CVE-2024/CVE-2024-319xx/CVE-2024-31978.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-3463](CVE-2024/CVE-2024-34xx/CVE-2024-3463.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-3464](CVE-2024/CVE-2024-34xx/CVE-2024-3464.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-3465](CVE-2024/CVE-2024-34xx/CVE-2024-3465.json) (`2024-04-09T12:48:04.090`) +- [CVE-2024-3466](CVE-2024/CVE-2024-34xx/CVE-2024-3466.json) (`2024-04-09T12:48:04.090`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9f984acebee..5add5f80a93 100644 --- a/_state.csv +++ b/_state.csv @@ -173244,7 +173244,7 @@ CVE-2021-28651,0,0,f93d5b14e9edfd0c7d6c1f20d832040462fce8e41449e94e4223abf4af0c4 CVE-2021-28652,0,0,3de577cd8b68362d13504ea8b7b94932e7446acae8c4f0c9b8ac01de5be255b4,2023-11-07T03:32:17.730000 CVE-2021-28653,0,0,bd516222c2739e55d76b929804ff1b5fe32a605eae16ed548f9480526e7a6107,2021-08-27T14:55:11.860000 CVE-2021-28655,0,0,f05025022982248c0aa0286bf9f5ea6d2b2662f6d8f66cb2a7c1478371d0b50e,2023-11-07T03:32:17.810000 -CVE-2021-28656,1,1,3998ee35a42c8f382056cbf4f173e6ecbd2d2c79955efb97a5daedf4e01fbc4f,2024-04-09T10:15:07.610000 +CVE-2021-28656,0,1,71da341e943fcbb2ca65abbeda1e2289896bc83652315b75220769e42c306657,2024-04-09T12:48:04.090000 CVE-2021-28657,0,0,edc846f7622359305d96151fb90be8e69037698b5a7084b0ba6857b492a35ec1,2023-11-07T03:32:17.897000 CVE-2021-28658,0,0,fd380e2c26dc7e10eb20d77575a858579041b141f61b8815462af50a61528fd0,2023-11-07T03:32:17.980000 CVE-2021-28660,0,0,3b585e9f34be9d91329d52a640684f2db5b2db983300a3c817e973f466e64e5e,2023-11-09T14:44:33.733000 @@ -202890,7 +202890,7 @@ CVE-2022-36706,0,0,de7477060184c6cff9abe4772c0125bf31cfc87765eb99a20d7df4da001db CVE-2022-36707,0,0,d3eb38d1feaf5dba4f0def739432283a3e2176588db034b2fcc0b995be314951,2023-11-07T03:49:40.277000 CVE-2022-36708,0,0,0ee8d1842750906a7976bf36ebb5bd60789abcd5e1b5240c681d954257433011,2022-09-01T13:18:10.467000 CVE-2022-36709,0,0,92fae72d3c833ddad9e9b7b60e9d4567e2afabc9b49dc9cd4f9748d67689c823,2022-09-01T06:50:41.003000 -CVE-2022-3671,0,0,1097dd73c4003e062a451bb08ad24b3944b5e839cd248e6b956b42ebbe490de4,2024-04-04T17:15:08.060000 +CVE-2022-3671,0,1,0e606a113cf0ddcfcfe175a68f5d875f8e162baaacd109c3b2794313d558e016,2024-04-09T13:20:32.987000 CVE-2022-36711,0,0,dd666c7309d4fb74ddbff83da0478e38903c8c81d015eb898fcb8c722302f377,2022-09-01T06:51:02.083000 CVE-2022-36712,0,0,f6ae50d102134447658290fabc690f8f9247c2bcae392cb109bce6cf6729ba9f,2022-09-01T06:54:01.957000 CVE-2022-36713,0,0,08280a195165695be47d2e8fbcf5379d9ea71cedafc4633a72176ddeec410351,2022-09-01T06:58:32.880000 @@ -210921,7 +210921,7 @@ CVE-2022-4789,0,0,f1d77b16a882c065a994d407ae15e8654000fcc23c0521f9bc89bbdc88d3ea CVE-2022-47891,0,0,6dedff18f34cc77291973ebe182b94d8c421b8c96c9ef4b91fe9f7e1c80b5399,2023-10-04T19:57:52.210000 CVE-2022-47892,0,0,014317681f4f5fd875b23ba58c6a9232c2ca925a78d6a53582cee8dc82bbb4ee,2023-10-04T19:57:39.830000 CVE-2022-47893,0,0,f4592b6a6c8fa73a0d0605e5be420354e5d9826474eb8090f0d7000aea6904f0,2023-10-04T19:57:30.303000 -CVE-2022-47894,1,1,593c201c592bb8bfc6cba8d413a478be24c5a715960f8d0740bdbdbe07cf6bd3,2024-04-09T10:15:08.343000 +CVE-2022-47894,0,1,e401d392b583da5e9b36ee551251ee1b3066ca7e899def4f14ac5436e3453044,2024-04-09T12:48:04.090000 CVE-2022-47895,0,0,4d2831ee9ad8f11acf52954a3507339b6bec3debec24ea17f62d0a6b882a629c,2022-12-29T16:26:24.367000 CVE-2022-47896,0,0,d4993944299a87a0e4bc5169c26adbdcc624a2649cd920d6690b1830154087bc,2022-12-29T17:28:18.063000 CVE-2022-4790,0,0,832b4d6df8a6dff865d108a14c28fb7677a8ffbd0bdcde0190157e99b5fef6c2,2023-11-07T03:58:56.803000 @@ -212557,8 +212557,8 @@ CVE-2023-1078,0,0,511609a0c59908bbbfd669b928235b7512f041dd9bdda4f9d4aa59bc0de4fc CVE-2023-1079,0,0,c957625d6e93673583754b046286151c3cd5fbd016a01d7a69f7d70a7c63b668,2023-05-03T14:15:21.417000 CVE-2023-1080,0,0,70bd3fc2fb1692dcf2fc26cf04bb9990210d8f3f5ec66f4981136378db9d3554,2023-11-07T04:02:27.867000 CVE-2023-1081,0,0,b273c9bef457fc15606daa02d3a072ec86e12d529c1024b5a0af4c11f428d418,2023-03-04T02:06:16.360000 -CVE-2023-1082,0,0,bacbdaede1f7d1854710c69a85c220f9a9520fa08806af5806104705d9d79b69,2024-04-09T09:15:19.643000 -CVE-2023-1083,0,0,ef22926887513db591d148973a6d60b2400d46ac1befd0a9cf1528d2b9aa0fce,2024-04-09T09:15:19.937000 +CVE-2023-1082,0,1,4345b71e2a00dccdd5682dbfac02460b2f62fd61aeda4f4e0a0937488d0f2bec,2024-04-09T12:48:04.090000 +CVE-2023-1083,0,1,9985565f9697f9654ec7713992afab1f5ac57e1c5ff8666d0e7287e85f87752f,2024-04-09T12:48:04.090000 CVE-2023-1084,0,0,3054e5242d362a68ea08e022b551d34084860b4abaaaa0f45ac4db023b69c389,2023-03-15T14:27:48.850000 CVE-2023-1086,0,0,702b24e8f7e0089ff9dc60e6d96d9d1b0b33917c9db0a213d103833ec4288284,2023-11-07T04:02:28.057000 CVE-2023-1087,0,0,b90e3b61ee499a3d5cc3c6de6c9f228b5f24fb833cd07f821e23e0c192544906,2023-11-07T04:02:28.193000 @@ -235272,7 +235272,7 @@ CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6d CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000 CVE-2023-50811,0,0,e11d12fe06d3263d13bd34dc62f9ff2fc3ab15ee416948ff7751555ca8a7212c,2024-03-20T13:00:16.367000 CVE-2023-5082,0,0,97172c8fbce61eac9fc72656ad386d4e72feed6ef36293b815eddf08e7cd3cf2,2023-11-14T15:33:18.273000 -CVE-2023-50821,0,0,ce9a5490e4bd92a4e5735140944ea2fae179ab96eb9556eadc633d2300cec72e,2024-04-09T09:15:21.270000 +CVE-2023-50821,0,1,44b671c824ee87794c64134a5584c1475710f239b2544f75ec4c23279577ebf1,2024-04-09T12:48:04.090000 CVE-2023-50822,0,0,8ee2c68da13959d83e13d29c60b1ba2257ab3db8a3826fb5c84c7b87338d1212,2024-01-02T20:54:13.893000 CVE-2023-50823,0,0,40af9a64fda216779fc94da775602fd54727f3bbddbba35015eaf0f9183e1c11,2023-12-29T04:10:31.830000 CVE-2023-50824,0,0,58a5beaa87c24d14af04b4cb9f3a0b2aa77e314a67ef35efeda046b2604b58de,2023-12-29T04:10:48.907000 @@ -238147,8 +238147,8 @@ CVE-2024-0078,0,0,65ef1b62c09f229e677e8506d114a0ad3f4b855306a2baa770a721ed0ba97b CVE-2024-0079,0,0,a48198aa8d1b8e21233ccb1563194a0dce57e3cb1ac8f4c28d49144e25d1a534,2024-03-28T02:01:13.303000 CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718c9,2024-04-08T18:49:25.863000 CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000 -CVE-2024-0082,0,0,ae991367e08225121157180c24a5fdbb166425d7192b60b9395f4a4f24a46bf6,2024-04-08T22:15:07.993000 -CVE-2024-0083,0,0,53d00967f7407453d60abb433b5aefae44d594b137a7afac7fbffae58a630f23,2024-04-08T22:15:08.203000 +CVE-2024-0082,0,1,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000 +CVE-2024-0083,0,1,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 @@ -238874,7 +238874,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5 CVE-2024-1020,0,0,4c2c67d1272a1241939200f4f72c9a4b440d9da781cef4eac80461cd259df11b,2024-03-21T02:51:32.967000 CVE-2024-1021,0,0,1eaf33062f30028d852272789fbe1f3c95b6597cfa3d193da2a9c2b146b71925,2024-03-21T02:51:33.050000 CVE-2024-1022,0,0,bf7c09b8fcc7f97c5a24a4c708297fbca74621e9fdb442e444ef6e47ad6eb0de,2024-03-21T02:51:33.147000 -CVE-2024-1023,0,0,9ee92eacbb88b3a332d00d2f435c33ab1fd5765d942fefa4d1a8192f971c38ba,2024-04-04T16:15:08.140000 +CVE-2024-1023,0,1,68bde2f3580eb45ab5d6f3ebb52c2d06f8d25be5075193a68e136d0ef3abff5b,2024-04-09T12:15:07.627000 CVE-2024-1024,0,0,7e6c1b50133d41206c0ea240e83269bb1fd6bdba3336e6ba3bdaf2e921f883f4,2024-03-21T02:51:33.253000 CVE-2024-1026,0,0,fa3a6e8906b5c145d772b6778f9660482bd1e1779e8012ee6ee53f0f577f7493,2024-03-21T02:51:33.340000 CVE-2024-1027,0,0,3c9d16741461ee6b8dbdb696da6c985fd26dd1ea5f6d61c74f8e0497827db059,2024-03-21T02:51:33.427000 @@ -239045,7 +239045,7 @@ CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041f CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000 CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000 CVE-2024-1232,0,0,81ffaff2fe8cf56a0d46a46e2b9143fea880c36e9a04adedcc45af5366b69d08,2024-03-25T13:47:14.087000 -CVE-2024-1233,0,0,66e9943f5b5e13d3ef1ae4141f8c5704521c004fb541b327a415bfaeb3b7fc3a,2024-04-09T07:15:08.060000 +CVE-2024-1233,0,1,71578d7fb30bc4f85d145f45b8ac30dca6f7b0255a469b5ec97436fd2fcdf196,2024-04-09T12:48:04.090000 CVE-2024-1234,0,0,10bf76d85736c4b378a9976629da6145bfb7982a9ab0c7c6ab2d12ef2ec14081,2024-03-13T18:16:18.563000 CVE-2024-1235,0,0,d2a82644fe0f13d7f102d5a1aae3143ef6375c6fdad53b56b8e4ac09c1d55fdb,2024-02-29T13:49:29.390000 CVE-2024-1236,0,0,88f351cdece6c13383e2ef64090741dd27c149d6d5fc4eae9681e06c5b4747c4,2024-02-29T13:49:29.390000 @@ -239095,7 +239095,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000 CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000 CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000 -CVE-2024-1300,0,0,719eaee7c93c572fb19b10a479f15b73430ece34c0a0712bc6a25cc9815e6c2b,2024-04-04T16:15:08.410000 +CVE-2024-1300,0,1,c053226189aff0bb246575256884750e37eeb25be7ab97ceb9ee36674f7e9ade,2024-04-09T12:15:07.853000 CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000 CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000 CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000 @@ -239332,7 +239332,7 @@ CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513a CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000 CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000 CVE-2024-1661,0,0,f00eb2f2c3ce60fab79d51162055435d68cf3cf34607838bd07b04f2f9625a7f,2024-03-21T02:51:44.103000 -CVE-2024-1664,0,0,d44b304f4d2e9fb868c37e41062a28e28d439c03500b6ce19eb20ded1c1b3e37,2024-04-09T05:15:47.703000 +CVE-2024-1664,0,1,c240cf09d136b8ae3766d60b95066ae5935a6052d7cd59ed400a537e65636ac2,2024-04-09T12:48:04.090000 CVE-2024-1668,0,0,5ab0efbb5f521102a265a18c62e4efdda2d28d47a9245ca5f6f130ff2a6275be,2024-03-13T18:15:58.530000 CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000 CVE-2024-1670,0,0,ae75c94f0b29c0a28e4a7c87bcbb408051ef24e0c713cce4805624b9b431840f,2024-02-26T16:27:52.643000 @@ -240484,6 +240484,7 @@ CVE-2024-22226,0,0,0d0a641f57bdd270587828a9a2bed46d21e4a42e20578c34da0758c83220e CVE-2024-22227,0,0,da75d9c9489c29f1cc0bee36d7764c9cdfb4cf2b057bac2e908e6263109bed68,2024-02-15T06:25:36.360000 CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778f85,2024-02-15T06:25:45.463000 CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000 +CVE-2024-2223,1,1,b9394b41c5ff25167dbdb41b6fa21ce84c4693127e445f9ee3172be3cb406ea8,2024-04-09T13:15:33.057000 CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000 CVE-2024-22233,0,0,0fe59b4b663f0c6d5b9043fb5ee923bedfa271d937aabb2465577a5f1e4e3b27,2024-01-29T17:24:16.230000 CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000 @@ -240492,6 +240493,7 @@ CVE-2024-22236,0,0,8201be843ca4fddc3e50d61ba00eee488c4be6cba8a9459a0251fd7b88b77 CVE-2024-22237,0,0,e71897597855cd1424c518c72383f574819812eafb673db1067e39ca6ce39465,2024-02-10T04:12:42.680000 CVE-2024-22238,0,0,7cde94c40824c59018efefacd980beca9642688e0bc3a9b4bd234ac24d76c945,2024-02-10T04:12:32.263000 CVE-2024-22239,0,0,bbc3a472e1d6ecc835cd57fa3021e572fa71f1c8c62196314a99a704e393b5ba,2024-02-10T04:12:18.850000 +CVE-2024-2224,1,1,a5f03c3b51882a76a16e4634523cdb70045bec8e9e82ca12ff3b0d02ee379833,2024-04-09T13:15:33.357000 CVE-2024-22240,0,0,9d0b72097aa3b0fcd2ce100bde56bd14382bcab6c31de68e5fe9354868ac9639,2024-02-10T04:11:57.463000 CVE-2024-22241,0,0,496f061bf551a3619640a70a8bba0bd7b22a646ffcd7631f69738ec433aa1245,2024-02-10T04:11:46.267000 CVE-2024-22243,0,0,cd5131de758a556ae754d98313ecfca987f6ffd9ea403d0f3d0f2e39b0761770,2024-02-23T16:14:43.447000 @@ -240783,7 +240785,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1 CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000 CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000 CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000 -CVE-2024-22949,0,0,9f50a76ffcc828af29dfdda45bb6ef0b8b7a02fa40b7a257176056a4d5139f2a,2024-04-08T23:15:07.647000 +CVE-2024-22949,0,1,5a39ec4e6a69cf95914d802d151998eb5762c2e80f80af227e65b64f7b64e313,2024-04-09T12:48:04.090000 CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000 CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000 CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000 @@ -240808,14 +240810,14 @@ CVE-2024-23059,0,0,1ae620a0d7759193ae34540a4455aa9c0a81f947f508fbecbd634aa926d83 CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000 CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000 CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000 -CVE-2024-23078,0,0,6ccdfef45001c815b1c8a321f5fdb93824801b7a858b705656dc577c4b59c206,2024-04-08T20:15:08.500000 -CVE-2024-23079,0,0,0dcc3d3975c6d390e57d0a9e44bbb6bb70a660da60e8f2c822dce166e4beb639,2024-04-08T23:15:07.703000 +CVE-2024-23078,0,1,9d7aaea68d8acb3538ca428049148f2dac206a89706e35d40108cb3eb8be6ee5,2024-04-09T12:48:04.090000 +CVE-2024-23079,0,1,c1744d41ef3d7ad1d99296d598f8fcec333fcf26813851f4f429e9678b14abb3,2024-04-09T12:48:04.090000 CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000 -CVE-2024-23081,0,0,f13f502b7e2e1db8066ddc5074d5b80e3cc891b8e742f30ea256fa56155c64d6,2024-04-08T23:15:07.757000 +CVE-2024-23081,0,1,9fa2a613be75462894d464b8e34e68b6da9b9d59d63e22685e547814dd9a5ab9,2024-04-09T12:48:04.090000 CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000 -CVE-2024-23084,0,0,cc3fe5e43e6cc3d4fe9878fcdf7855182620a14f9f8ea54d74f3c390c55eec58,2024-04-08T23:15:07.803000 -CVE-2024-23085,0,0,c8b0d35c4a557d6e919fb6d1242860cc216cbb10b6bb40b4d8c08dbe656610b0,2024-04-08T20:15:08.567000 -CVE-2024-23086,0,0,65368b69d6d0eef07e38824732b878b0b1f0c0abb48bc5df2794ee9fdf0b94d1,2024-04-08T20:15:08.620000 +CVE-2024-23084,0,1,82d7094530d5cd6c77dbe215344f65b7328c1ecf1670686e248abcdd712b3b36,2024-04-09T12:48:04.090000 +CVE-2024-23085,0,1,f435d93167b9f4a31bec2831629dfa7b34bb533a49bb29329c43fee636db5bac,2024-04-09T12:48:04.090000 +CVE-2024-23086,0,1,d8559a198e6f56b9e1a9a9c93fee6add743a34a70b05d723355a013a78276599,2024-04-09T12:48:04.090000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 @@ -241056,7 +241058,7 @@ CVE-2024-2355,0,0,3245d70a394465f76ff5f05fc26b95bf0c5d50d1856adb39bb340583679667 CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000 CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 -CVE-2024-23584,0,0,7c11631f47a9cd8d18bc29523d2c089eb4e039bce017c0ddd915e33188a191fd,2024-04-08T23:15:07.850000 +CVE-2024-23584,0,1,8c37acacf967b7c4f5ab4bd2dcef23f1fcd96f524843cdbf02653297c633df30,2024-04-09T12:48:04.090000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000 CVE-2024-23603,0,0,2b536971fe4d260603348583e5e85d59f5debd4cec090f729c87a6dbde3a5ce7,2024-02-14T18:04:45.380000 @@ -241414,7 +241416,7 @@ CVE-2024-24272,0,0,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99 CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000 CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000 CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000 -CVE-2024-24279,0,0,72cb9013f2c4652ca9f1c2703573803355b3f3c49810cb9ea2ecf22280c02f6e,2024-04-08T20:15:08.673000 +CVE-2024-24279,0,1,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000 CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000 CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000 @@ -242065,7 +242067,7 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000 CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000 CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000 -CVE-2024-25646,0,0,c75d00751fed3de8449144392cb0585f29e46e25016c4f17748ae725d45561c2,2024-04-09T01:15:48.343000 +CVE-2024-25646,0,1,4c3fff51352b6a263ea60efd6f0f793331eb0c3a48316710a84a88b50103400a,2024-04-09T12:48:04.090000 CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000 CVE-2024-2565,0,0,f29b341373f4135f8349505114db202bd5fab0820f3e8d9e62cea3dd3d097a89,2024-03-21T02:52:38.533000 CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000 @@ -242410,9 +242412,9 @@ CVE-2024-26268,0,0,5610a607715d86daa93e5e6c15868d417df615ed9f90516b74424ddbc8ecb CVE-2024-26269,0,0,a4fbc0291a87f253fbb7c7919e7305be398b5ac09a381b89bf9bf742bc0ec462,2024-02-22T19:07:37.840000 CVE-2024-2627,0,0,e625366ce2705b71a33576e7d95a513ed311d73cf47b2a264208ec2a1b01e605,2024-04-01T15:22:56.233000 CVE-2024-26270,0,0,d6490f7916a3708559119c4b06da9ae5a8dea9c128a10a8333261b0f96cb6dc3,2024-02-20T19:50:53.960000 -CVE-2024-26275,0,0,bd792bc6eb56b6e7ec3eac2d81482c0283901331aec1fa97e901a186b7a7de28,2024-04-09T09:15:24.260000 -CVE-2024-26276,0,0,94f5c130ffa7ec1db1ea02a18ad3648d5d206936fe00d856cdfec89b47b00b52,2024-04-09T09:15:24.457000 -CVE-2024-26277,0,0,2cba4478c6cc96839bc30a32054d0a70bd4f3f1e86aec08cbb43159a6e071a67,2024-04-09T09:15:24.670000 +CVE-2024-26275,0,1,86b20790c28ff2896463d7fcae3324befb2f565377793267b5441cdb88cff86c,2024-04-09T12:48:04.090000 +CVE-2024-26276,0,1,9407b59796cd800bb4fc38b36c1daee8f0b16fd5ac030c2517b1462502e4e4e5,2024-04-09T12:48:04.090000 +CVE-2024-26277,0,1,44875b5da9b930ec08e98ff27cae08f0f68e5cf4284f47d8347964e17c5a06a9,2024-04-09T12:48:04.090000 CVE-2024-2628,0,0,74f1b0a8f98a3a2a42e54dd1de06ce591c355dd248224902ad7ba323d1c0caa6,2024-04-01T15:23:07.793000 CVE-2024-26280,0,0,a0828ad55cf94cdecb18cb50b16af06fe51be781c3cc28d9a8b8b17c369261d0,2024-03-01T14:04:04.827000 CVE-2024-26281,0,0,d398cdbeaa123e10721276d9f64c2d88a8b8d78292a048222ab02485f2a77624,2024-02-22T19:07:27.197000 @@ -242993,9 +242995,9 @@ CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7 CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000 CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000 CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000 -CVE-2024-27630,0,0,1af794bd73a1a981369ee11a8d740d74c2d4ddaa2b8325a16bd8d015c271d702,2024-04-08T21:15:09.983000 -CVE-2024-27631,0,0,06f624de111450e75fa73f39020e095767cb778364bea9eef968fd43c313a3d4,2024-04-08T21:15:10.067000 -CVE-2024-27632,0,0,77b2fef9184238aa65b7a05f1fcf8e38cdd5d8baed8ae8b674ef90fb91227938,2024-04-08T22:15:08.413000 +CVE-2024-27630,0,1,195789d2e072cde29ac43f06437e13345453649751e3c98de08e7517dc132999,2024-04-09T12:48:04.090000 +CVE-2024-27631,0,1,5c7b748f9881499a0aa3a66c7dd109e168e9d5d652d44f11a3ecfbbe6581d87d,2024-04-09T12:48:04.090000 +CVE-2024-27632,0,1,c643ff3ecb619db3f75dd61e8c48e0ed3f8f47c2f793478e020545116177f32e,2024-04-09T12:48:04.090000 CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000 CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000 CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000 @@ -243059,10 +243061,10 @@ CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d7 CVE-2024-27895,0,0,e8e082e473ed76dea7e0db1fd0e0603d1d69d1ba5e6a1a82578100cdf406ffed,2024-04-08T18:48:40.217000 CVE-2024-27896,0,0,88fc4dc869bbb4cce477334b59754ef261ad68592aa0aa0ff71f89ccdf4b1875,2024-04-08T18:48:40.217000 CVE-2024-27897,0,0,6aeb0d28af447513b32ff29a7545806bc788b73261dbf5d52e00ce86aa2905c0,2024-04-08T18:48:40.217000 -CVE-2024-27898,0,0,29b0a9172a1eebfd24f6675c2ebbbf977083adceed455d2567ab962a2a31f8d6,2024-04-09T01:15:48.583000 -CVE-2024-27899,0,0,45f5f66a4e3da7332edf34d39ccf63b255c4cb8cac5cb60aac62b9fd2729ddf2,2024-04-09T01:15:48.777000 +CVE-2024-27898,0,1,6b8e108f960c2d2d873ea6b4d9ada44d0ac2f369e07f3417bafeadd038578ecc,2024-04-09T12:48:04.090000 +CVE-2024-27899,0,1,1e83e6ab0e8e2a789f3d6639693b1327c35e15b7468565754eff50891b540812,2024-04-09T12:48:04.090000 CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 -CVE-2024-27901,0,0,1f100058faa206f75a8299605708ec984f36533043410845917ace6aec0b805e,2024-04-09T01:15:48.993000 +CVE-2024-27901,0,1,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 CVE-2024-27905,0,0,3e20ed1ee55859457fccacd02ccfd33b203e184f29107e3c93e267df9f8d58a8,2024-03-21T02:52:20.520000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 @@ -243117,7 +243119,7 @@ CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d CVE-2024-27972,0,0,e0f7933a8078741e5e2cdbc1c8aaffaa42eca2ccffc4cf4f10a410272b4fcf47,2024-04-03T12:38:04.840000 CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000 CVE-2024-27981,0,0,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000 -CVE-2024-27983,0,0,462e2e83b9f399bcd91568acb26b09d2f5c5418ba921c90db44ae36772ba68d2,2024-04-09T01:15:49.197000 +CVE-2024-27983,0,1,5d8a6df11a15da2385f41c72a25a785a374e7614ce97421584556107f6abcf28,2024-04-09T12:48:04.090000 CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000 CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000 CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000 @@ -243224,7 +243226,7 @@ CVE-2024-28160,0,0,d3496ce06cdd6165787a1abcbf55db9c0fb2db641796e2cfba31e7190572a CVE-2024-28161,0,0,ac1d3f11953e0c8ea875284019208bd8e81c5e134926913a38bbbd0ca21cd968,2024-03-06T21:42:54.697000 CVE-2024-28162,0,0,9bc5df2476915a3318874e35bcdb7d25e1035d05316c0fdc6385663896a911e1,2024-03-06T21:42:54.697000 CVE-2024-28163,0,0,04503ad76f6d74637a8e6f8a7d443052dfa73d2acab964dffd0d8da32b69e3b5,2024-03-12T12:40:13.500000 -CVE-2024-28167,0,0,9a55ab4d6b3ad8b492f0fc017ea43d153c689b6906572f369d8da09ce3625626,2024-04-09T01:15:49.380000 +CVE-2024-28167,0,1,0d05aeb691ba11cae01e2ab2c399918da8edc50da4b1f7f29cffd4e2facff21d,2024-04-09T12:48:04.090000 CVE-2024-2817,0,0,e0fe06a461ef795accd74c0bb92d92dd98cb14b12292f98e359c857cfb17ef6d,2024-03-26T03:15:19.720000 CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000 CVE-2024-28173,0,0,542df716604f915101d48aeccfd0a59d896ed582a3774f62c0cc2b438bc897c4,2024-03-06T21:42:54.697000 @@ -243259,7 +243261,7 @@ CVE-2024-28216,0,0,81cb418e285cc210ffc29a8a25f8e508c54e8fe29c1cf038a851918d914b9 CVE-2024-28219,0,0,5d1482e6721cb93d62e502f1f8ab261cac73f35af60759ddf9b75d97f371a8d4,2024-04-03T12:38:04.840000 CVE-2024-2822,0,0,6ab09d9d7524c6d95c8d1ae5b3671b49edc27757385c7737f509e182267f103a,2024-03-22T19:02:10.300000 CVE-2024-28222,0,0,d419d3ada13caae27e6dde281d73cbc44d2f509d635642c67ccba01f063babd6,2024-03-07T13:52:27.110000 -CVE-2024-28224,0,0,ca6fb7a7c9cbb9514db5b85fb8e3fb3a2abd7539ce2617a6b42b50066d5c6494,2024-04-08T19:15:07.353000 +CVE-2024-28224,0,1,3152cc64dff1bcf9fde70fb8b36c735f55a1cb82cfb6f7caa3c629344bcaff59,2024-04-09T12:48:04.090000 CVE-2024-28226,0,0,60d2b317d558a952126fd2c59e7791a3132f61184750bcc6e4113640853620c0,2024-04-02T12:50:42.233000 CVE-2024-28228,0,0,93e315b7dd05da9d4781d208d18dece721536dd50c2af36c895e70dd0b3e07a4,2024-03-07T13:52:27.110000 CVE-2024-28229,0,0,b7d8e7d93c2ed37c18bd1a25a871516c477e14595693600c07d3d2bc4a74b7b4,2024-03-07T13:52:27.110000 @@ -243290,7 +243292,7 @@ CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697 CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000 CVE-2024-2826,0,0,ff0c97031e166398e323c72f1698e5c14d1d12a242f46c546169cb159379bfab,2024-03-25T01:51:01.223000 CVE-2024-2827,0,0,9d006cbe113c27e6d6059aaa0fb63202588562fcc2fd921cc358b89a10826fec,2024-03-25T01:51:01.223000 -CVE-2024-28270,0,0,d017c4a60c6fa3785f96b83454883f1210a6b60ed8d083822e1b67bb8a435e8b,2024-04-08T19:15:07.417000 +CVE-2024-28270,0,1,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000 CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000 CVE-2024-2828,0,0,b9daa0fecdf94306feb1c91247867bd7201c33280322b94bd8b3a21cf142beb1,2024-03-25T01:51:01.223000 CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0813,2024-03-20T13:00:16.367000 @@ -243722,7 +243724,7 @@ CVE-2024-29746,0,0,29af8006f9fbd7af7095512e80e5bf0ae4c64952a941d41acef3a04849082 CVE-2024-29747,0,0,87f4e304e93f8b6f286c656028c07dd1ca332ec61fa47e7ce7d137f30fe66b91,2024-04-08T18:49:25.863000 CVE-2024-29748,0,0,521433bbadcb400dfc92897155d667884ae0c1a8d67cb01db78baff427b50b49,2024-04-08T22:52:33.780000 CVE-2024-29749,0,0,33b9f39d00d5461e17b7d5a8f346443f168cc7b139342c04719e9f38cd1e308c,2024-04-08T18:49:25.863000 -CVE-2024-2975,0,0,bc6630236fbea59ea85108099a00f8d460e796c3dd2ded65943ede8bd6baee37,2024-04-09T01:15:49.583000 +CVE-2024-2975,0,1,6de0856746ca0e83e8c020b0c49b3d12b69bd33621171f2e1dc549a80a926408,2024-04-09T12:48:04.090000 CVE-2024-29750,0,0,cd8489f4573c543020a3b6e8b96290737b84849a080d45bc65ef0ff04a2c59f0,2024-04-08T18:49:25.863000 CVE-2024-29751,0,0,3bc4aa316cc8565894aaa2a9c412da7054d4f835fd37d50bf2ebd4a04ae9df25,2024-04-08T18:49:25.863000 CVE-2024-29752,0,0,8570c8346da874298f8f35ea2088404fb97ccfc316a51781a5f28a7a73ba2064,2024-04-08T18:49:25.863000 @@ -243915,10 +243917,10 @@ CVE-2024-30184,0,0,9f69bd3ca06ec5c9657f3c215f7efb6829cdd48e1fef7a80c5facbe90dd97 CVE-2024-30185,0,0,a781b9014abd19a00a8d62f1c673ab43addf79eb808bed01ac8422942c39fe67,2024-03-27T12:29:30.307000 CVE-2024-30186,0,0,fb11f40c5a3e049b4173bd5ffb37b55dd352f80bf009d46c6a7e0ed4bd19ac71,2024-03-27T12:29:30.307000 CVE-2024-30187,0,0,f8d37ff5304c8d102184c9586047a497264eab63488a1192b60bf85807ce2976,2024-03-25T13:47:14.087000 -CVE-2024-30189,0,0,8ab69d447623452a9c752bf4d46af011a09b5ba2fd0e47c4dee86f2e11c363ad,2024-04-09T09:15:24.873000 +CVE-2024-30189,0,1,3f4990ace311ce3f5f501a6dcf406cbed1780f0c03c898c2001b2eab67f70f47,2024-04-09T12:48:04.090000 CVE-2024-3019,0,0,7aa90b3371c248010d1ca2c86ac425a855d65b90f7f2b54c8215ff8d140c2475,2024-03-28T20:53:20.813000 -CVE-2024-30190,0,0,ab4efd5f3f31cb946f6b912beaf10a973ded8c88e1315cac8f4b04553dadecaf,2024-04-09T09:15:25.117000 -CVE-2024-30191,0,0,a194e02128d9f38a2120430edbf1f83fe06b1d7feff6edcf6b56e03bf2e1e81b,2024-04-09T09:15:25.317000 +CVE-2024-30190,0,1,51fa3b61b1a89cc1e5bfc291b48055ea6ae2c46214176899850afb7f6a1c269a,2024-04-09T12:48:04.090000 +CVE-2024-30191,0,1,ebc6f15da39286087c5d03b22d2078cfcc767238c4f5e6e7ea4485533eac454d,2024-04-09T12:48:04.090000 CVE-2024-30192,0,0,c058935b45ae3c1c682d0c8091f1486b6546bc2f278e4ebfa792d597067b45ed,2024-03-27T12:29:30.307000 CVE-2024-30193,0,0,33258fe7cf249072798e560677d7e50e03f9db8bbc27d72503f50ecb70812130,2024-03-27T12:29:30.307000 CVE-2024-30194,0,0,d5b499129c7beb5f42abcf7b4a34b45d5603a89c60af6322a93392ad7d164018,2024-03-27T12:29:30.307000 @@ -243933,11 +243935,11 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000 CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000 CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000 -CVE-2024-30214,0,0,9cbb84d5a31cde891755a74be46005a7ae14cc0fe7a81a16294b5e794e71b95b,2024-04-09T01:15:49.750000 -CVE-2024-30215,0,0,63c0103988a8a22d50b4f5920b1d344f44816b12c4a4bd2838f874c7170c27f7,2024-04-09T01:15:49.953000 -CVE-2024-30216,0,0,23e6330d5e67b3939a808dea3c48b015ea93ffe0e940d5e3db258ada971a742a,2024-04-09T01:15:50.140000 -CVE-2024-30217,0,0,dc05ee90d167762240bbfd4770ae1675986fb9f2999d716d3c5750c55a05cbce,2024-04-09T01:15:50.353000 -CVE-2024-30218,0,0,d0680a6e32010322311576701fff049a2fb3821324253bdcc8e519d58dbb41f6,2024-04-09T01:15:50.570000 +CVE-2024-30214,0,1,7c4820c684a267b228fa4a4665b794d39804e491dff54bd3f2105fbbb658d34b,2024-04-09T12:48:04.090000 +CVE-2024-30215,0,1,ab2bb7d1fb5a1429f982c34c6c343c5bdb990b01f1c65a84e0f966e88ca26da6,2024-04-09T12:48:04.090000 +CVE-2024-30216,0,1,b2a60633096c48481bfba33a475cbb1ec9bd028014eb767b662e1172ca558cda,2024-04-09T12:48:04.090000 +CVE-2024-30217,0,1,087a63819064c1c33ea0e545c53d87168995546f6e15f5d7be47bfdca70c5f13,2024-04-09T12:48:04.090000 +CVE-2024-30218,0,1,bbafd02e57188641c828b4e11afc10b08f46d298d16560a41cdffe88fac7fd66,2024-04-09T12:48:04.090000 CVE-2024-3022,0,0,f291c8130c561158256d7e5f236acfb4472a78c940a59eb4c1d015abd789d2b5,2024-04-04T12:48:41.700000 CVE-2024-30221,0,0,8c33faec8eecbd1bc4775ea7d226df03d8dec1186991b9fb17295c2b460f3a49,2024-03-28T12:42:56.150000 CVE-2024-30222,0,0,16d5c6200c88be9ed99126042f393681469af79a0a1fab7e0ddf18cd42a248eb,2024-03-28T12:42:56.150000 @@ -244077,7 +244079,7 @@ CVE-2024-30455,0,0,115244366736fad049cb2d568fd37bcd1f9387962814ae164a94d7f893776 CVE-2024-30456,0,0,58b7f6d9df0133114222c028c59aa68a983be02157b04b25b467f54970276f3b,2024-03-29T13:28:22.880000 CVE-2024-30457,0,0,0e1a5411ec4ddd12ef39ffb10d5b7f249bf382292e8158c3b3ccafeb0f7acbcd,2024-03-29T13:28:22.880000 CVE-2024-30458,0,0,138b6d21084a1b9981d25ac0a20e6d58c8531b97987312f29ce581613992ae6f,2024-03-29T13:28:22.880000 -CVE-2024-3046,1,1,6d7ca1977c621f17430aaec9ccc12aa503b8a49003e968ef0cfa49b8e286ea2f,2024-04-09T10:15:08.600000 +CVE-2024-3046,0,1,f64fd084b3316f52714630b8d9b76d007648387616e5814bf19d8a730782ba88,2024-04-09T12:48:04.090000 CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000 CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000 CVE-2024-30463,0,0,417553a6f74795aba1e180f9fa11122fb72f60b63e441eca3940c7cd28530a48,2024-04-01T01:12:59.077000 @@ -244206,25 +244208,25 @@ CVE-2024-30667,0,0,ff284e163d8506ead82a88e1e0195d7345f11e18d3b36d2dad51ac5fe6f1c CVE-2024-30672,0,0,5f03fe7211bd8d45b5928b91a5ac0350abcfb5c5194aa5b0296fc94c9e863bc2,2024-04-08T18:48:40.217000 CVE-2024-30674,0,0,6ed6c67e9f9314eaeb2be25e85ad7999c533cc1beb21c8cb467ab7a893f16710,2024-04-08T18:48:40.217000 CVE-2024-30675,0,0,8b91a2fb611ecb3c19dd6a14ce9d54a86e8a20f268f642c9f4e164c260b50edd,2024-04-08T18:48:40.217000 -CVE-2024-30676,0,0,2a073dd564e86e695eb2f919b139d388a2d6007b80e09fcf5430f574293c04d1,2024-04-09T03:15:07.763000 -CVE-2024-30678,0,0,ef2be53ace00dddfb9477c2105eab4a719d2b1864b4c7a0736a5393b059f1a2f,2024-04-09T03:15:07.830000 -CVE-2024-30679,0,0,6f05a7fd5aff6056f1cd0ac249bbcd7614976a073740a795bbdcf43e4db0951d,2024-04-09T04:15:10.087000 -CVE-2024-30680,0,0,0db6be591c415718737384ee863de3874b3c91f1f1f8d6ff4a25940f4a6fadbe,2024-04-09T04:15:10.583000 -CVE-2024-30681,0,0,8cce67f169b8935564837b759c0252e1d62dcd48e7bcfe48dfbbecb14ddf135e,2024-04-09T04:15:10.747000 -CVE-2024-30683,0,0,b7621d84f614230c0df5165592f4f5b9dfd62300b10a45fd3e9810b90ac95d0f,2024-04-09T04:15:10.877000 -CVE-2024-30684,0,0,9be1f5115249bab85819d159de79365c3e4b80b2ec8ce819e9edf872119e3ac8,2024-04-09T05:15:47.807000 -CVE-2024-30686,0,0,541ea82cba3076dc93b4cf3d209232d5820c095c8704cbaf1cc6fac7df5cb046,2024-04-09T05:15:47.853000 -CVE-2024-30687,0,0,d41d39118a6364deb76328cc8c97b0d3e4e72fc3b9af23bace5281a4fd92503f,2024-04-09T05:15:47.920000 -CVE-2024-30688,0,0,e87ed7a45faf17208575ce7e369e08e5fc2c6646724b14c3d5b68e746ee07a95,2024-04-09T05:15:47.980000 -CVE-2024-30690,0,0,0222a6f435cd9fb505f55b765c382ed4aec444e568410449029d68b1773bbda6,2024-04-09T06:15:08.963000 -CVE-2024-30691,0,0,f13d250264f36bef3c8a95114656bfe64d9507f8789a26c487d45d49087945de,2024-04-09T07:15:08.467000 -CVE-2024-30692,0,0,c6905b73ae908de6592f9715ae4c7f9220b4f9d69b13d5e3672318f490534072,2024-04-09T07:15:08.560000 -CVE-2024-30694,0,0,87e1e568f906c3259c4311246f7c7ebe93a858c6e8f9a9e735f5d0a51dc9e8fb,2024-04-09T08:15:07.420000 -CVE-2024-30695,0,0,ddcf4ca472b554b646b53740b242ba136463be85f78e6c2877882bbd5172d5c9,2024-04-09T08:15:07.530000 -CVE-2024-30696,0,0,54a5cff2071955408dfaf2a6059dc98713163ec675db342b730d4d4fed56e3b2,2024-04-09T08:15:07.587000 -CVE-2024-30697,0,0,584bacee4bbf15e3909c526c7e893ad2ccf0bf26a2ea73cbcc220faba83ace96,2024-04-09T08:15:07.663000 -CVE-2024-30699,0,0,bf016f0de32f7cb69bfb6c8fdc5d92c6c36d4e5c955c6e78080fe0f7706caad9,2024-04-09T08:15:07.717000 -CVE-2024-30701,0,0,0e5335693d286262e2a5cf9e2a6c9ca11c86e648dbf1aba9748ad53026829393,2024-04-09T08:15:07.770000 +CVE-2024-30676,0,1,af724672b3075823cc7ac023ff0bd01b6766fd74313e164540f52e1f670069a5,2024-04-09T12:48:04.090000 +CVE-2024-30678,0,1,28c2c42c15a87c8576562744982b7e6592c723e041b1251a726dc2914f0f31c2,2024-04-09T12:48:04.090000 +CVE-2024-30679,0,1,1652ad2d7f751aa883b92dadc3db45d6131582879ab3f0ce2ce9b68ca301473c,2024-04-09T12:48:04.090000 +CVE-2024-30680,0,1,07cf4672c6cb5c0d37b128ff6292cf9dcf1d064a6b724bb71fb28d8b540ff210,2024-04-09T12:48:04.090000 +CVE-2024-30681,0,1,ddbe0c69f9ab035c7a353186f3b3cfb547957dc7577d22a08e0cab4ca1d951a2,2024-04-09T12:48:04.090000 +CVE-2024-30683,0,1,95978317b9ff4fe100aa7b5187ca91600381e6090aadd857a6554499fc4fc767,2024-04-09T12:48:04.090000 +CVE-2024-30684,0,1,93873bb3f77c6d6c1129e83df71a0c5dab8044941f95a0a1a2446d06a1a663f9,2024-04-09T12:48:04.090000 +CVE-2024-30686,0,1,cecb3b359a2c306a651201a597cd44f73ed8fc5e2479bc1e16493cf1b000f3d9,2024-04-09T12:48:04.090000 +CVE-2024-30687,0,1,627c6f49d0e8696456211f5aadec2afbfb7309884605ed881f3f310eff8a28e0,2024-04-09T12:48:04.090000 +CVE-2024-30688,0,1,be62ee228899213efd589c12a1c4722b462ed6c7cea897018d539f4060eeaef6,2024-04-09T12:48:04.090000 +CVE-2024-30690,0,1,758c0e580a22afa6415e22d45eb180157d5e27c3f7c136b941a2ccea1a631afb,2024-04-09T12:48:04.090000 +CVE-2024-30691,0,1,23334283bdbb80ece84004a07a2d4f2fb30a9114f4de8009b41ca287700f7f5c,2024-04-09T12:48:04.090000 +CVE-2024-30692,0,1,ff1ce2f91a7b26c24b130e2b00e06d5a248a15e5d50cd434ef04e50387645828,2024-04-09T12:48:04.090000 +CVE-2024-30694,0,1,7755c230805c1909d0e94175233f36be70321ff270a75af58c50d43db7f1ff2d,2024-04-09T12:48:04.090000 +CVE-2024-30695,0,1,520c313ebed8e7aa062ef70d824f022571c815c409401bb881ea7203f9352df6,2024-04-09T12:48:04.090000 +CVE-2024-30696,0,1,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30889,2024-04-09T12:48:04.090000 +CVE-2024-30697,0,1,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000 +CVE-2024-30699,0,1,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000 +CVE-2024-30701,0,1,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,cde724dd3faba12829b2b6702d06fc6a91a021819aa4d3333d39ab34ce48e248,2024-03-29T13:28:22.880000 CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000 @@ -244275,7 +244277,7 @@ CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69 CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000 CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000 CVE-2024-31033,0,0,897cdecff344b121550f3f8e1b3cb821fdde5689eabf8f2834a81266f3e9da87,2024-04-03T03:15:10.670000 -CVE-2024-31047,0,0,c175d27ed17d4bf949120d8409b6dbaecb9c46ddadf7527ed65cef283f88c52d,2024-04-08T23:15:08.023000 +CVE-2024-31047,0,1,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000 CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000 CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000 CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000 @@ -244372,13 +244374,13 @@ CVE-2024-31348,0,0,cfc095c1fc0e4b141af08e05231276cb08ae09886eb38442cb07d948f68e6 CVE-2024-31349,0,0,8d1bd13d7c4f34f460e790c462e1e7791a20313dfd6a20b06dc021131d4e0db2,2024-04-08T18:48:40.217000 CVE-2024-3135,0,0,91954ab6e8bf3cb2f93a640035369c46334c6e185515d1b835de2161b0fd8f69,2024-04-02T12:50:42.233000 CVE-2024-31357,0,0,6d1a7933989bbcdba28fa02b8be4705197f66c46746bd7fe377d13c6e2cc0304,2024-04-08T18:48:40.217000 -CVE-2024-31365,0,0,fc6aa8a24f23c740987c3fb601f4d456d9d6cf819e248fd81f799c77ac72a671,2024-04-09T08:15:07.827000 -CVE-2024-31366,0,0,1af347fc8335406c907b3336b6d3a66c50b1e09309b87f82640d67931a4ad266,2024-04-09T08:15:08.090000 -CVE-2024-31367,0,0,f6f2a97ff3535c04779b4bbb5a660e3fec19f5874beb28ba57c65f95f6e7012f,2024-04-09T09:15:25.520000 -CVE-2024-31368,0,0,4768a6001b4157c13653e9e0c71fe74fd93d15447b50501403be5541d51f94cf,2024-04-09T09:15:25.710000 -CVE-2024-31369,0,0,3faf152bc141d887aeee588c78ce4ead16543f70cb1f6090ad9e82e7d4b5a75c,2024-04-09T09:15:25.907000 +CVE-2024-31365,0,1,c940557b1d8090d7c4b40b91442276e3021286d8a5d5418b8ff9252921cde6e4,2024-04-09T12:48:04.090000 +CVE-2024-31366,0,1,75b2b689edca4c4fe2cdb7df1b8ed82e64c11b89b9b73cbce127601f1ecfacae,2024-04-09T12:48:04.090000 +CVE-2024-31367,0,1,81120db09e405ceec023426aa5eb20efd22769d9230dda89ff3bacac48f33f54,2024-04-09T12:48:04.090000 +CVE-2024-31368,0,1,2075bbe380281b0997c3990fa2ac90c9c87c399d3ddf4c8c8d5afff7621d8b06,2024-04-09T12:48:04.090000 +CVE-2024-31369,0,1,d082a9ab615cec7280a5691a7d44e9570c42e7b3288086312b3cbea4bdb1dc8b,2024-04-09T12:48:04.090000 CVE-2024-3137,0,0,85619be4f983f97db1d6302bec8264dd546f884b93dfcad5f6be85034ffe5dcb,2024-04-02T12:50:42.233000 -CVE-2024-31370,0,0,31f745ddc020a1528c8f50fd91f1f415c182c8d12a6a2cd6331fd89dd72a9c49,2024-04-09T09:15:26.100000 +CVE-2024-31370,0,1,6f6e1dfc72d0841ebaadb7bdc4bbf124cf6313a520f59380c092d9365f2d4194,2024-04-09T12:48:04.090000 CVE-2024-31375,0,0,b0ef1f22f63ca31cfb2164ca0bddec7fc53a5ee9672cb520fcd2e704c7c6fdab,2024-04-08T18:48:40.217000 CVE-2024-3138,0,0,b2250a42d544b358de2555f1c668a77223939f10414766861d02ac21eac35bc6,2024-04-02T12:50:42.233000 CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000 @@ -244401,6 +244403,7 @@ CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8ef CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-3151,0,0,dbc1fd34b22356e776c12a200bc45c40de5eea60ac1974d151d7c1d279b32bb4,2024-04-02T18:12:16.283000 +CVE-2024-31544,1,1,88902b53c0f1eeb21e877882efe39d4af9f10efecf052310f4a64d08429f9d76,2024-04-09T13:15:33.557000 CVE-2024-3156,0,0,672d7786ba8482c7e78ab9597c9f5a6e717f264787edb700157c849ff3c9f687,2024-04-08T18:48:40.217000 CVE-2024-3158,0,0,d2414412e299d1c6c6fd5c25934ca9d016ec38ac6210ea884f5d6eabc2220b22,2024-04-08T18:48:40.217000 CVE-2024-3159,0,0,ab3d3fc3f58ff99c2f10e23574a75e665f3343c344ecfe71138e927973febb6e,2024-04-08T18:48:40.217000 @@ -244429,14 +244432,14 @@ CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4 CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000 CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000 CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000 -CVE-2024-31860,0,0,ccd55956f4b2085b6553adb9cab020d31d8243fded66ae1d53f39c274384f80b,2024-04-09T09:15:26.293000 -CVE-2024-31862,1,1,4585fe38c9c66a994786b1f605848fbf027d976add2e3b3ae014df8201a2eb70,2024-04-09T10:15:08.513000 -CVE-2024-31863,1,1,a0ed816379b99b301622b0a6ae840b8424f20e203b1335dda0f550bba90babf3,2024-04-09T11:15:31.713000 +CVE-2024-31860,0,1,55dd12597bf39ae8e0517c5d55b7ea30406697589bf4efd38a9030f7ffb75da9,2024-04-09T12:48:04.090000 +CVE-2024-31862,0,1,9f707e95c44d810f3a15296bc63963399801058986b2544d08155d8eb18bc340,2024-04-09T12:48:04.090000 +CVE-2024-31863,0,1,c0205d004a02751e8ee7ccf780094034f2d276095c68cc3f87551a74133406a8,2024-04-09T12:48:04.090000 CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000 CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a6fc,2024-04-08T18:48:40.217000 CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000 CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000 -CVE-2024-31978,0,0,d17ae3d50dbec3a18d72f4e719a353448c63c0888bf1d5847ef9832d4e66874b,2024-04-09T09:15:26.387000 +CVE-2024-31978,0,1,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000 CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000 CVE-2024-3203,0,0,50d63f401f7659abc3d4fe6662d0f1a519a0e385e123db03b5f1830a5a75ec57,2024-04-06T16:15:08.350000 CVE-2024-3204,0,0,f0ecaa4cd894fa75e44a48d7dd9614c107f33ee3ea503e315d2394814a086ab4,2024-04-06T16:15:08.530000 @@ -244540,7 +244543,7 @@ CVE-2024-3455,0,0,2a79458511cc023c776f69dd26438ba48a54ecc3ce4715cf5a2dbcf735d2bf CVE-2024-3456,0,0,1163b826cb31daaf8e489647ff09bfd19b3fb113321ed6ccdf58236f2b7e5e1b,2024-04-08T18:48:40.217000 CVE-2024-3457,0,0,11a1e136160c0247fcf615183184cef87c2f9a8ed0a4cc454a1baf664c38c18a,2024-04-08T18:48:40.217000 CVE-2024-3458,0,0,0dd3899ad6b0b4c44e22d6564bbd58a94d8615e4c6beb4dd695b6c049f1a5d9a,2024-04-08T18:48:40.217000 -CVE-2024-3463,0,0,eb5a7ce8cc9385684b6a9fd68b230a744dbb78bcc6779ff6338879cfe3292035,2024-04-08T20:15:08.723000 -CVE-2024-3464,0,0,2d1379cf9c8d2eb9f4330537cd1775de3998dec4b0ed303f13bb105970303bed,2024-04-08T20:15:08.990000 -CVE-2024-3465,0,0,ede59d298a2b744f6135f6cf5c4f90cf0f26e2b3aaaaf08836afca2893ea9114,2024-04-08T21:15:10.163000 -CVE-2024-3466,0,0,bcbc92c75c6ab2d66c5b61014acd484a84e91272d04e34af6de153eb326125f4,2024-04-08T21:15:10.587000 +CVE-2024-3463,0,1,b9a4be2f26f78b332674d83ef625297790907d08496665abbf73f7be270cf292,2024-04-09T12:48:04.090000 +CVE-2024-3464,0,1,9fc42ee7d400c682b0cca155c2130251f069e21de8abbf2c9cdbf132d840c5a9,2024-04-09T12:48:04.090000 +CVE-2024-3465,0,1,2c147ebdab1a9c2f236be45a5e3f17abf5dd87162f7d74a530cad5ba9d863bda,2024-04-09T12:48:04.090000 +CVE-2024-3466,0,1,4cdee9397ccb0cc6b86df3dd4a626bfe2bd945ea650bd37ea0096866891b044c,2024-04-09T12:48:04.090000