From 4a301a0f3d901c0d614766c14b6981e1f803c061 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 19 Jan 2025 03:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-01-19T03:00:20.175811+00:00 --- CVE-2015/CVE-2015-20xx/CVE-2015-2051.json | 2 +- CVE-2016/CVE-2016-16xx/CVE-2016-1646.json | 2 +- CVE-2016/CVE-2016-200xx/CVE-2016-20017.json | 2 +- CVE-2016/CVE-2016-23xx/CVE-2016-2386.json | 2 +- CVE-2016/CVE-2016-23xx/CVE-2016-2388.json | 2 +- CVE-2016/CVE-2016-30xx/CVE-2016-3088.json | 2 +- CVE-2016/CVE-2016-32xx/CVE-2016-3235.json | 2 +- CVE-2016/CVE-2016-32xx/CVE-2016-3298.json | 2 +- CVE-2016/CVE-2016-33xx/CVE-2016-3309.json | 2 +- CVE-2016/CVE-2016-33xx/CVE-2016-3351.json | 2 +- CVE-2016/CVE-2016-33xx/CVE-2016-3393.json | 2 +- CVE-2016/CVE-2016-34xx/CVE-2016-3427.json | 2 +- CVE-2016/CVE-2016-36xx/CVE-2016-3643.json | 2 +- CVE-2016/CVE-2016-37xx/CVE-2016-3714.json | 2 +- CVE-2016/CVE-2016-37xx/CVE-2016-3715.json | 2 +- CVE-2016/CVE-2016-37xx/CVE-2016-3718.json | 2 +- CVE-2016/CVE-2016-39xx/CVE-2016-3976.json | 2 +- CVE-2016/CVE-2016-41xx/CVE-2016-4117.json | 2 +- CVE-2016/CVE-2016-41xx/CVE-2016-4171.json | 2 +- CVE-2016/CVE-2016-44xx/CVE-2016-4437.json | 2 +- CVE-2016/CVE-2016-45xx/CVE-2016-4523.json | 2 +- CVE-2016/CVE-2016-46xx/CVE-2016-4655.json | 2 +- CVE-2016/CVE-2016-46xx/CVE-2016-4656.json | 2 +- CVE-2016/CVE-2016-46xx/CVE-2016-4657.json | 2 +- CVE-2016/CVE-2016-51xx/CVE-2016-5195.json | 2 +- CVE-2016/CVE-2016-51xx/CVE-2016-5198.json | 2 +- CVE-2016/CVE-2016-62xx/CVE-2016-6277.json | 2 +- CVE-2016/CVE-2016-63xx/CVE-2016-6366.json | 2 +- CVE-2016/CVE-2016-63xx/CVE-2016-6367.json | 2 +- CVE-2016/CVE-2016-64xx/CVE-2016-6415.json | 2 +- CVE-2016/CVE-2016-78xx/CVE-2016-7855.json | 2 +- CVE-2016/CVE-2016-78xx/CVE-2016-7892.json | 2 +- CVE-2016/CVE-2016-85xx/CVE-2016-8562.json | 2 +- CVE-2016/CVE-2016-87xx/CVE-2016-8735.json | 2 +- CVE-2016/CVE-2016-90xx/CVE-2016-9079.json | 2 +- CVE-2016/CVE-2016-95xx/CVE-2016-9563.json | 2 +- .../CVE-2017-10002xx/CVE-2017-1000253.json | 2 +- .../CVE-2017-10004xx/CVE-2017-1000486.json | 2 +- CVE-2017/CVE-2017-102xx/CVE-2017-10271.json | 2 +- CVE-2017/CVE-2017-109xx/CVE-2017-10930.json | 2 +- CVE-2017/CVE-2017-109xx/CVE-2017-10931.json | 2 +- CVE-2017/CVE-2017-109xx/CVE-2017-10932.json | 2 +- CVE-2017/CVE-2017-112xx/CVE-2017-11292.json | 2 +- CVE-2017/CVE-2017-113xx/CVE-2017-11317.json | 2 +- CVE-2017/CVE-2017-113xx/CVE-2017-11357.json | 2 +- CVE-2017/CVE-2017-121xx/CVE-2017-12149.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12231.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12232.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12233.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12234.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12235.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12237.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12238.json | 2 +- CVE-2017/CVE-2017-122xx/CVE-2017-12240.json | 2 +- CVE-2017/CVE-2017-123xx/CVE-2017-12319.json | 2 +- CVE-2017/CVE-2017-126xx/CVE-2017-12615.json | 2 +- CVE-2017/CVE-2017-126xx/CVE-2017-12617.json | 2 +- CVE-2017/CVE-2017-159xx/CVE-2017-15944.json | 2 +- CVE-2017/CVE-2017-166xx/CVE-2017-16651.json | 2 +- CVE-2017/CVE-2017-175xx/CVE-2017-17562.json | 2 +- CVE-2017/CVE-2017-183xx/CVE-2017-18362.json | 2 +- CVE-2017/CVE-2017-183xx/CVE-2017-18368.json | 2 +- CVE-2017/CVE-2017-35xx/CVE-2017-3506.json | 2 +- CVE-2017/CVE-2017-38xx/CVE-2017-3881.json | 2 +- CVE-2017/CVE-2017-50xx/CVE-2017-5030.json | 2 +- CVE-2017/CVE-2017-50xx/CVE-2017-5070.json | 2 +- CVE-2017/CVE-2017-55xx/CVE-2017-5521.json | 2 +- CVE-2017/CVE-2017-56xx/CVE-2017-5638.json | 2 +- CVE-2017/CVE-2017-56xx/CVE-2017-5689.json | 2 +- CVE-2017/CVE-2017-60xx/CVE-2017-6077.json | 2 +- CVE-2017/CVE-2017-63xx/CVE-2017-6316.json | 2 +- CVE-2017/CVE-2017-63xx/CVE-2017-6327.json | 2 +- CVE-2017/CVE-2017-63xx/CVE-2017-6334.json | 2 +- CVE-2017/CVE-2017-66xx/CVE-2017-6627.json | 2 +- CVE-2017/CVE-2017-66xx/CVE-2017-6663.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6736.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6737.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6738.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6739.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6740.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6742.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6743.json | 2 +- CVE-2017/CVE-2017-67xx/CVE-2017-6744.json | 2 +- CVE-2017/CVE-2017-68xx/CVE-2017-6862.json | 2 +- CVE-2017/CVE-2017-68xx/CVE-2017-6884.json | 2 +- CVE-2017/CVE-2017-72xx/CVE-2017-7269.json | 2 +- CVE-2017/CVE-2017-74xx/CVE-2017-7494.json | 2 +- CVE-2017/CVE-2017-82xx/CVE-2017-8291.json | 2 +- CVE-2017/CVE-2017-92xx/CVE-2017-9248.json | 2 +- CVE-2017/CVE-2017-97xx/CVE-2017-9791.json | 2 +- CVE-2017/CVE-2017-98xx/CVE-2017-9805.json | 2 +- CVE-2017/CVE-2017-98xx/CVE-2017-9822.json | 2 +- CVE-2017/CVE-2017-98xx/CVE-2017-9841.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0125.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0147.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0151.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0154.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0155.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0156.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0158.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0159.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0161.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0167.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0171.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0172.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0173.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0174.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0175.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0179.json | 2 +- CVE-2018/CVE-2018-01xx/CVE-2018-0180.json | 2 +- CVE-2018/CVE-2018-02xx/CVE-2018-0296.json | 2 +- .../CVE-2018-10008xx/CVE-2018-1000861.json | 2 +- CVE-2018/CVE-2018-105xx/CVE-2018-10561.json | 2 +- CVE-2018/CVE-2018-105xx/CVE-2018-10562.json | 2 +- CVE-2018/CVE-2018-111xx/CVE-2018-11138.json | 2 +- CVE-2018/CVE-2018-117xx/CVE-2018-11776.json | 2 +- CVE-2018/CVE-2018-12xx/CVE-2018-1273.json | 2 +- CVE-2018/CVE-2018-133xx/CVE-2018-13374.json | 2 +- CVE-2018/CVE-2018-133xx/CVE-2018-13379.json | 2 +- CVE-2018/CVE-2018-133xx/CVE-2018-13382.json | 2 +- CVE-2018/CVE-2018-133xx/CVE-2018-13383.json | 2 +- CVE-2018/CVE-2018-145xx/CVE-2018-14558.json | 2 +- CVE-2018/CVE-2018-146xx/CVE-2018-14628.json | 2 +- CVE-2018/CVE-2018-146xx/CVE-2018-14667.json | 2 +- CVE-2018/CVE-2018-148xx/CVE-2018-14839.json | 2 +- CVE-2018/CVE-2018-148xx/CVE-2018-14847.json | 2 +- CVE-2018/CVE-2018-151xx/CVE-2018-15133.json | 2 +- CVE-2018/CVE-2018-158xx/CVE-2018-15811.json | 2 +- CVE-2018/CVE-2018-159xx/CVE-2018-15961.json | 2 +- CVE-2018/CVE-2018-159xx/CVE-2018-15982.json | 2 +- CVE-2018/CVE-2018-174xx/CVE-2018-17463.json | 2 +- CVE-2018/CVE-2018-174xx/CVE-2018-17480.json | 2 +- CVE-2018/CVE-2018-183xx/CVE-2018-18325.json | 2 +- CVE-2018/CVE-2018-188xx/CVE-2018-18809.json | 2 +- CVE-2018/CVE-2018-193xx/CVE-2018-19320.json | 2 +- CVE-2018/CVE-2018-193xx/CVE-2018-19321.json | 2 +- CVE-2018/CVE-2018-193xx/CVE-2018-19322.json | 2 +- CVE-2018/CVE-2018-193xx/CVE-2018-19323.json | 2 +- CVE-2018/CVE-2018-200xx/CVE-2018-20062.json | 2 +- CVE-2018/CVE-2018-202xx/CVE-2018-20250.json | 2 +- CVE-2018/CVE-2018-207xx/CVE-2018-20753.json | 2 +- CVE-2018/CVE-2018-23xx/CVE-2018-2380.json | 2 +- CVE-2018/CVE-2018-251xx/CVE-2018-25106.json | 2 +- CVE-2018/CVE-2018-251xx/CVE-2018-25108.json | 2 +- CVE-2018/CVE-2018-26xx/CVE-2018-2628.json | 2 +- CVE-2018/CVE-2018-43xx/CVE-2018-4344.json | 2 +- CVE-2018/CVE-2018-48xx/CVE-2018-4878.json | 2 +- CVE-2018/CVE-2018-49xx/CVE-2018-4939.json | 2 +- CVE-2018/CVE-2018-49xx/CVE-2018-4990.json | 2 +- CVE-2018/CVE-2018-50xx/CVE-2018-5002.json | 2 +- CVE-2018/CVE-2018-54xx/CVE-2018-5430.json | 2 +- CVE-2018/CVE-2018-60xx/CVE-2018-6065.json | 2 +- CVE-2018/CVE-2018-65xx/CVE-2018-6530.json | 2 +- CVE-2018/CVE-2018-67xx/CVE-2018-6789.json | 2 +- CVE-2018/CVE-2018-68xx/CVE-2018-6882.json | 2 +- CVE-2018/CVE-2018-69xx/CVE-2018-6961.json | 2 +- CVE-2018/CVE-2018-74xx/CVE-2018-7445.json | 2 +- CVE-2018/CVE-2018-76xx/CVE-2018-7600.json | 2 +- CVE-2018/CVE-2018-76xx/CVE-2018-7602.json | 2 +- CVE-2018/CVE-2018-78xx/CVE-2018-7841.json | 2 +- CVE-2019/CVE-2019-01xx/CVE-2019-0193.json | 2 +- CVE-2019/CVE-2019-02xx/CVE-2019-0211.json | 2 +- CVE-2019/CVE-2019-03xx/CVE-2019-0344.json | 2 +- CVE-2019/CVE-2019-07xx/CVE-2019-0708.json | 2 +- CVE-2019/CVE-2019-08xx/CVE-2019-0808.json | 2 +- .../CVE-2019-10030xx/CVE-2019-1003029.json | 2 +- CVE-2019/CVE-2019-193xx/CVE-2019-19300.json | 2 +- CVE-2020/CVE-2020-128xx/CVE-2020-12819.json | 2 +- CVE-2020/CVE-2020-128xx/CVE-2020-12820.json | 2 +- CVE-2020/CVE-2020-159xx/CVE-2020-15934.json | 2 +- CVE-2020/CVE-2020-367xx/CVE-2020-36774.json | 2 +- CVE-2020/CVE-2020-80xx/CVE-2020-8094.json | 6 +- CVE-2021/CVE-2021-260xx/CVE-2021-26093.json | 2 +- CVE-2021/CVE-2021-261xx/CVE-2021-26102.json | 2 +- CVE-2021/CVE-2021-261xx/CVE-2021-26115.json | 2 +- CVE-2021/CVE-2021-296xx/CVE-2021-29669.json | 6 +- CVE-2022/CVE-2022-324xx/CVE-2022-32427.json | 2 +- CVE-2022/CVE-2022-343xx/CVE-2022-34321.json | 2 +- CVE-2022/CVE-2022-484xx/CVE-2022-48470.json | 2 +- CVE-2022/CVE-2022-486xx/CVE-2022-48624.json | 2 +- CVE-2023/CVE-2023-220xx/CVE-2023-22084.json | 2 +- CVE-2023/CVE-2023-237xx/CVE-2023-23775.json | 2 +- CVE-2023/CVE-2023-244xx/CVE-2023-24460.json | 2 +- CVE-2023/CVE-2023-256xx/CVE-2023-25646.json | 2 +- CVE-2023/CVE-2023-288xx/CVE-2023-28831.json | 4 +- CVE-2023/CVE-2023-351xx/CVE-2023-35192.json | 2 +- CVE-2023/CVE-2023-358xx/CVE-2023-35888.json | 2 +- CVE-2023/CVE-2023-379xx/CVE-2023-37929.json | 2 +- CVE-2023/CVE-2023-379xx/CVE-2023-37931.json | 6 +- CVE-2023/CVE-2023-379xx/CVE-2023-37936.json | 6 +- CVE-2023/CVE-2023-379xx/CVE-2023-37937.json | 6 +- CVE-2023/CVE-2023-394xx/CVE-2023-39469.json | 2 +- CVE-2023/CVE-2023-400xx/CVE-2023-40071.json | 2 +- CVE-2023/CVE-2023-410xx/CVE-2023-41014.json | 2 +- CVE-2023/CVE-2023-418xx/CVE-2023-41842.json | 2 +- CVE-2023/CVE-2023-419xx/CVE-2023-41961.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42225.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42226.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42227.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42228.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42229.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42230.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42231.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42232.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42233.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42234.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42235.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42236.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42237.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42238.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42239.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42240.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42241.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42242.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42243.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42244.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42245.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42246.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42247.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42248.json | 6 +- CVE-2023/CVE-2023-422xx/CVE-2023-42249.json | 2 +- CVE-2023/CVE-2023-422xx/CVE-2023-42250.json | 2 +- CVE-2023/CVE-2023-423xx/CVE-2023-42307.json | 2 +- CVE-2023/CVE-2023-434xx/CVE-2023-43489.json | 2 +- CVE-2023/CVE-2023-436xx/CVE-2023-43629.json | 2 +- CVE-2023/CVE-2023-437xx/CVE-2023-43748.json | 2 +- CVE-2023/CVE-2023-442xx/CVE-2023-44255.json | 2 +- CVE-2023/CVE-2023-457xx/CVE-2023-45705.json | 2 +- CVE-2023/CVE-2023-457xx/CVE-2023-45743.json | 2 +- CVE-2023/CVE-2023-467xx/CVE-2023-46715.json | 6 +- CVE-2023/CVE-2023-46xx/CVE-2023-4626.json | 2 +- CVE-2023/CVE-2023-471xx/CVE-2023-47178.json | 2 +- CVE-2023/CVE-2023-478xx/CVE-2023-47822.json | 2 +- CVE-2023/CVE-2023-503xx/CVE-2023-50380.json | 2 +- CVE-2023/CVE-2023-508xx/CVE-2023-50861.json | 2 +- CVE-2023/CVE-2023-508xx/CVE-2023-50886.json | 2 +- CVE-2023/CVE-2023-508xx/CVE-2023-50898.json | 2 +- CVE-2023/CVE-2023-513xx/CVE-2023-51369.json | 2 +- CVE-2023/CVE-2023-515xx/CVE-2023-51522.json | 2 +- CVE-2023/CVE-2023-522xx/CVE-2023-52226.json | 2 +- CVE-2023/CVE-2023-63xx/CVE-2023-6397.json | 2 +- CVE-2023/CVE-2023-63xx/CVE-2023-6398.json | 2 +- CVE-2023/CVE-2023-63xx/CVE-2023-6399.json | 2 +- CVE-2023/CVE-2023-67xx/CVE-2023-6764.json | 2 +- CVE-2023/CVE-2023-68xx/CVE-2023-6809.json | 2 +- CVE-2023/CVE-2023-68xx/CVE-2023-6825.json | 2 +- CVE-2023/CVE-2023-68xx/CVE-2023-6880.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6954.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6957.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6965.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6967.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6969.json | 2 +- CVE-2023/CVE-2023-69xx/CVE-2023-6999.json | 2 +- CVE-2023/CVE-2023-70xx/CVE-2023-7072.json | 2 +- CVE-2023/CVE-2023-72xx/CVE-2023-7263.json | 2 +- CVE-2024/CVE-2024-02xx/CVE-2024-0203.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0311.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0312.json | 2 +- CVE-2024/CVE-2024-03xx/CVE-2024-0313.json | 2 +- CVE-2024/CVE-2024-04xx/CVE-2024-0445.json | 2 +- CVE-2024/CVE-2024-05xx/CVE-2024-0591.json | 2 +- CVE-2024/CVE-2024-05xx/CVE-2024-0592.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0610.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0614.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0631.json | 2 +- CVE-2024/CVE-2024-06xx/CVE-2024-0692.json | 2 +- CVE-2024/CVE-2024-07xx/CVE-2024-0795.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0815.json | 55 +- CVE-2024/CVE-2024-08xx/CVE-2024-0816.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0817.json | 55 +- CVE-2024/CVE-2024-08xx/CVE-2024-0818.json | 2 +- CVE-2024/CVE-2024-08xx/CVE-2024-0860.json | 2 +- CVE-2024/CVE-2024-09xx/CVE-2024-0917.json | 2 +- CVE-2024/CVE-2024-102xx/CVE-2024-10253.json | 6 +- CVE-2024/CVE-2024-102xx/CVE-2024-10254.json | 6 +- CVE-2024/CVE-2024-102xx/CVE-2024-10284.json | 2 +- CVE-2024/CVE-2024-102xx/CVE-2024-10285.json | 2 +- CVE-2024/CVE-2024-102xx/CVE-2024-10294.json | 2 +- CVE-2024/CVE-2024-103xx/CVE-2024-10312.json | 2 +- CVE-2024/CVE-2024-103xx/CVE-2024-10360.json | 2 +- CVE-2024/CVE-2024-103xx/CVE-2024-10388.json | 2 +- CVE-2024/CVE-2024-104xx/CVE-2024-10497.json | 2 +- CVE-2024/CVE-2024-104xx/CVE-2024-10498.json | 2 +- CVE-2024/CVE-2024-105xx/CVE-2024-10508.json | 2 +- CVE-2024/CVE-2024-106xx/CVE-2024-10630.json | 6 +- CVE-2024/CVE-2024-107xx/CVE-2024-10775.json | 6 +- CVE-2024/CVE-2024-107xx/CVE-2024-10789.json | 6 +- CVE-2024/CVE-2024-107xx/CVE-2024-10799.json | 6 +- CVE-2024/CVE-2024-108xx/CVE-2024-10811.json | 6 +- CVE-2024/CVE-2024-109xx/CVE-2024-10970.json | 6 +- CVE-2024/CVE-2024-10xx/CVE-2024-1058.json | 104 +- CVE-2024/CVE-2024-10xx/CVE-2024-1070.json | 84 +- CVE-2024/CVE-2024-110xx/CVE-2024-11029.json | 2 +- CVE-2024/CVE-2024-110xx/CVE-2024-11069.json | 2 +- CVE-2024/CVE-2024-111xx/CVE-2024-11128.json | 6 +- CVE-2024/CVE-2024-111xx/CVE-2024-11139.json | 6 +- CVE-2024/CVE-2024-111xx/CVE-2024-11146.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11322.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11327.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11386.json | 6 +- CVE-2024/CVE-2024-113xx/CVE-2024-11396.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11425.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11452.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11497.json | 6 +- CVE-2024/CVE-2024-116xx/CVE-2024-11636.json | 2 +- CVE-2024/CVE-2024-117xx/CVE-2024-11734.json | 2 +- CVE-2024/CVE-2024-117xx/CVE-2024-11736.json | 2 +- CVE-2024/CVE-2024-117xx/CVE-2024-11740.json | 2 +- CVE-2024/CVE-2024-117xx/CVE-2024-11758.json | 6 +- CVE-2024/CVE-2024-117xx/CVE-2024-11768.json | 2 +- CVE-2024/CVE-2024-118xx/CVE-2024-11848.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11851.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11852.json | 2 +- CVE-2024/CVE-2024-118xx/CVE-2024-11863.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11864.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11870.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11874.json | 6 +- CVE-2024/CVE-2024-118xx/CVE-2024-11892.json | 6 +- CVE-2024/CVE-2024-119xx/CVE-2024-11915.json | 6 +- CVE-2024/CVE-2024-11xx/CVE-2024-1169.json | 2 +- CVE-2024/CVE-2024-11xx/CVE-2024-1170.json | 2 +- CVE-2024/CVE-2024-120xx/CVE-2024-12033.json | 2 +- CVE-2024/CVE-2024-120xx/CVE-2024-12083.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12084.json | 6 +- CVE-2024/CVE-2024-120xx/CVE-2024-12085.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12086.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12087.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12088.json | 4 + CVE-2024/CVE-2024-121xx/CVE-2024-12116.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12142.json | 2 +- CVE-2024/CVE-2024-122xx/CVE-2024-12203.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12204.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12211.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12222.json | 2 +- CVE-2024/CVE-2024-122xx/CVE-2024-12226.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12240.json | 2 +- CVE-2024/CVE-2024-122xx/CVE-2024-12274.json | 2 +- CVE-2024/CVE-2024-122xx/CVE-2024-12297.json | 6 +- CVE-2024/CVE-2024-122xx/CVE-2024-12298.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12304.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12316.json | 2 +- CVE-2024/CVE-2024-123xx/CVE-2024-12370.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12398.json | 6 +- CVE-2024/CVE-2024-123xx/CVE-2024-12399.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12403.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12404.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12407.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12412.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12423.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12427.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12466.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12472.json | 6 +- CVE-2024/CVE-2024-124xx/CVE-2024-12473.json | 4 + CVE-2024/CVE-2024-124xx/CVE-2024-12476.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12505.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12508.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12519.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12520.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12527.json | 6 +- CVE-2024/CVE-2024-125xx/CVE-2024-12566.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12567.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12568.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12587.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12593.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12598.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12606.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12627.json | 6 +- CVE-2024/CVE-2024-126xx/CVE-2024-12637.json | 6 +- CVE-2024/CVE-2024-127xx/CVE-2024-12703.json | 2 +- CVE-2024/CVE-2024-127xx/CVE-2024-12747.json | 4 + CVE-2024/CVE-2024-127xx/CVE-2024-12782.json | 2 +- CVE-2024/CVE-2024-128xx/CVE-2024-12818.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12847.json | 6 +- CVE-2024/CVE-2024-128xx/CVE-2024-12877.json | 6 +- CVE-2024/CVE-2024-129xx/CVE-2024-12919.json | 6 +- CVE-2024/CVE-2024-12xx/CVE-2024-1217.json | 74 +- CVE-2024/CVE-2024-12xx/CVE-2024-1218.json | 74 +- CVE-2024/CVE-2024-12xx/CVE-2024-1221.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1222.json | 2 +- CVE-2024/CVE-2024-12xx/CVE-2024-1234.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13145.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13156.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13158.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13159.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13160.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13161.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13162.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13163.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13164.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13165.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13166.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13167.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13168.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13169.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13170.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13171.json | 6 +- CVE-2024/CVE-2024-131xx/CVE-2024-13172.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13215.json | 2 +- CVE-2024/CVE-2024-133xx/CVE-2024-13318.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13323.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13333.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13334.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13348.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13351.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13355.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13366.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13367.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13377.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13378.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13386.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13387.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13394.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13398.json | 6 +- CVE-2024/CVE-2024-134xx/CVE-2024-13401.json | 6 +- CVE-2024/CVE-2024-134xx/CVE-2024-13434.json | 6 +- CVE-2024/CVE-2024-135xx/CVE-2024-13502.json | 2 +- CVE-2024/CVE-2024-135xx/CVE-2024-13503.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1343.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1344.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1345.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1346.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1382.json | 2 +- CVE-2024/CVE-2024-13xx/CVE-2024-1397.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1400.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1413.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1414.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1419.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1421.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1426.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1429.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1497.json | 2 +- CVE-2024/CVE-2024-14xx/CVE-2024-1499.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1505.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1506.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1507.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1508.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1534.json | 2 +- CVE-2024/CVE-2024-15xx/CVE-2024-1575.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1603.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1623.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1633.json | 2 +- CVE-2024/CVE-2024-16xx/CVE-2024-1645.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1713.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1720.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1761.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1773.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1795.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1796.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1882.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1883.json | 2 +- CVE-2024/CVE-2024-18xx/CVE-2024-1884.json | 2 +- CVE-2024/CVE-2024-19xx/CVE-2024-1991.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2021.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2022.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2028.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21493.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21494.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21495.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21497.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21499.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21752.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21758.json | 6 +- CVE-2024/CVE-2024-217xx/CVE-2024-21777.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21788.json | 2 +- CVE-2024/CVE-2024-217xx/CVE-2024-21797.json | 6 +- CVE-2024/CVE-2024-218xx/CVE-2024-21809.json | 2 +- CVE-2024/CVE-2024-218xx/CVE-2024-21837.json | 2 +- CVE-2024/CVE-2024-218xx/CVE-2024-21861.json | 2 +- CVE-2024/CVE-2024-218xx/CVE-2024-21862.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2106.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2107.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2126.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2131.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2136.json | 2 +- CVE-2024/CVE-2024-21xx/CVE-2024-2180.json | 2 +- CVE-2024/CVE-2024-220xx/CVE-2024-22062.json | 2 +- CVE-2024/CVE-2024-220xx/CVE-2024-22063.json | 2 +- CVE-2024/CVE-2024-220xx/CVE-2024-22064.json | 2 +- CVE-2024/CVE-2024-220xx/CVE-2024-22065.json | 2 +- CVE-2024/CVE-2024-220xx/CVE-2024-22068.json | 2 +- CVE-2024/CVE-2024-220xx/CVE-2024-22092.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22180.json | 2 +- CVE-2024/CVE-2024-221xx/CVE-2024-22184.json | 2 +- CVE-2024/CVE-2024-224xx/CVE-2024-22459.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2203.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2204.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2210.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2249.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2256.json | 2 +- CVE-2024/CVE-2024-231xx/CVE-2024-23106.json | 6 +- CVE-2024/CVE-2024-236xx/CVE-2024-23607.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23664.json | 2 +- CVE-2024/CVE-2024-236xx/CVE-2024-23666.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2395.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2399.json | 2 +- CVE-2024/CVE-2024-241xx/CVE-2024-24101.json | 2 +- CVE-2024/CVE-2024-245xx/CVE-2024-24581.json | 2 +- CVE-2024/CVE-2024-248xx/CVE-2024-24840.json | 2 +- CVE-2024/CVE-2024-249xx/CVE-2024-24966.json | 2 +- CVE-2024/CVE-2024-249xx/CVE-2024-24989.json | 2 +- CVE-2024/CVE-2024-249xx/CVE-2024-24990.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2406.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2409.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2411.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2455.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2478.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2479.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2480.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2481.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2482.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2495.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25097.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25099.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25101.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25153.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25154.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25155.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25156.json | 2 +- CVE-2024/CVE-2024-251xx/CVE-2024-25165.json | 2 +- CVE-2024/CVE-2024-252xx/CVE-2024-25227.json | 2 +- CVE-2024/CVE-2024-252xx/CVE-2024-25292.json | 2 +- CVE-2024/CVE-2024-253xx/CVE-2024-25371.json | 2 +- CVE-2024/CVE-2024-255xx/CVE-2024-25592.json | 2 +- CVE-2024/CVE-2024-255xx/CVE-2024-25593.json | 2 +- CVE-2024/CVE-2024-255xx/CVE-2024-25594.json | 2 +- CVE-2024/CVE-2024-255xx/CVE-2024-25596.json | 2 +- CVE-2024/CVE-2024-255xx/CVE-2024-25597.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25625.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25698.json | 2 +- CVE-2024/CVE-2024-256xx/CVE-2024-25699.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25705.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25708.json | 2 +- CVE-2024/CVE-2024-257xx/CVE-2024-25709.json | 2 +- CVE-2024/CVE-2024-258xx/CVE-2024-25865.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2503.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2547.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2558.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2559.json | 2 +- CVE-2024/CVE-2024-25xx/CVE-2024-2560.json | 2 +- CVE-2024/CVE-2024-260xx/CVE-2024-26012.json | 6 +- CVE-2024/CVE-2024-263xx/CVE-2024-26327.json | 2 +- CVE-2024/CVE-2024-263xx/CVE-2024-26328.json | 2 +- CVE-2024/CVE-2024-264xx/CVE-2024-26475.json | 2 +- CVE-2024/CVE-2024-270xx/CVE-2024-27097.json | 2 +- CVE-2024/CVE-2024-271xx/CVE-2024-27102.json | 2 +- CVE-2024/CVE-2024-271xx/CVE-2024-27135.json | 2 +- CVE-2024/CVE-2024-273xx/CVE-2024-27305.json | 2 +- CVE-2024/CVE-2024-273xx/CVE-2024-27317.json | 2 +- CVE-2024/CVE-2024-277xx/CVE-2024-27778.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27856.json | 2 +- CVE-2024/CVE-2024-278xx/CVE-2024-27894.json | 2 +- CVE-2024/CVE-2024-279xx/CVE-2024-27986.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2750.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2751.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2784.json | 2 +- CVE-2024/CVE-2024-27xx/CVE-2024-2785.json | 2 +- CVE-2024/CVE-2024-280xx/CVE-2024-28098.json | 2 +- CVE-2024/CVE-2024-281xx/CVE-2024-28153.json | 81 +- CVE-2024/CVE-2024-281xx/CVE-2024-28154.json | 81 +- CVE-2024/CVE-2024-281xx/CVE-2024-28155.json | 81 +- CVE-2024/CVE-2024-281xx/CVE-2024-28156.json | 81 +- CVE-2024/CVE-2024-281xx/CVE-2024-28192.json | 2 +- CVE-2024/CVE-2024-281xx/CVE-2024-28193.json | 2 +- CVE-2024/CVE-2024-282xx/CVE-2024-28222.json | 2 +- CVE-2024/CVE-2024-282xx/CVE-2024-28226.json | 2 +- CVE-2024/CVE-2024-282xx/CVE-2024-28236.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28951.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2891.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2892.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2893.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2894.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2895.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2896.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2897.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2898.json | 2 +- CVE-2024/CVE-2024-28xx/CVE-2024-2899.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29006.json | 2 +- CVE-2024/CVE-2024-298xx/CVE-2024-29834.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29920.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29970.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29971.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29972.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29973.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29974.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29975.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29976.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29979.json | 6 +- CVE-2024/CVE-2024-299xx/CVE-2024-29980.json | 6 +- CVE-2024/CVE-2024-29xx/CVE-2024-2900.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2901.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2902.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2903.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2966.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2991.json | 2 +- CVE-2024/CVE-2024-29xx/CVE-2024-2992.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30185.json | 2 +- CVE-2024/CVE-2024-303xx/CVE-2024-30335.json | 2 +- CVE-2024/CVE-2024-304xx/CVE-2024-30473.json | 2 +- CVE-2024/CVE-2024-304xx/CVE-2024-30487.json | 2 +- CVE-2024/CVE-2024-304xx/CVE-2024-30496.json | 2 +- CVE-2024/CVE-2024-305xx/CVE-2024-30530.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3037.json | 2 +- CVE-2024/CVE-2024-310xx/CVE-2024-31079.json | 2 +- CVE-2024/CVE-2024-314xx/CVE-2024-31488.json | 2 +- CVE-2024/CVE-2024-314xx/CVE-2024-31492.json | 2 +- CVE-2024/CVE-2024-314xx/CVE-2024-31493.json | 2 +- CVE-2024/CVE-2024-314xx/CVE-2024-31496.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3131.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3139.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3140.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3197.json | 2 +- CVE-2024/CVE-2024-31xx/CVE-2024-3199.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32115.json | 6 +- CVE-2024/CVE-2024-321xx/CVE-2024-32116.json | 2 +- CVE-2024/CVE-2024-321xx/CVE-2024-32117.json | 2 +- CVE-2024/CVE-2024-325xx/CVE-2024-32572.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32714.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32718.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32760.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32785.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3251.json | 2 +- CVE-2024/CVE-2024-332xx/CVE-2024-33297.json | 2 +- CVE-2024/CVE-2024-332xx/CVE-2024-33298.json | 2 +- CVE-2024/CVE-2024-332xx/CVE-2024-33299.json | 2 +- CVE-2024/CVE-2024-335xx/CVE-2024-33502.json | 6 +- CVE-2024/CVE-2024-335xx/CVE-2024-33503.json | 6 +- CVE-2024/CVE-2024-335xx/CVE-2024-33506.json | 2 +- CVE-2024/CVE-2024-335xx/CVE-2024-33568.json | 2 +- CVE-2024/CVE-2024-339xx/CVE-2024-33912.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3314.json | 2 +- CVE-2024/CVE-2024-341xx/CVE-2024-34161.json | 2 +- CVE-2024/CVE-2024-341xx/CVE-2024-34166.json | 6 +- CVE-2024/CVE-2024-343xx/CVE-2024-34373.json | 2 +- CVE-2024/CVE-2024-345xx/CVE-2024-34544.json | 6 +- CVE-2024/CVE-2024-345xx/CVE-2024-34562.json | 2 +- CVE-2024/CVE-2024-345xx/CVE-2024-34579.json | 6 +- CVE-2024/CVE-2024-34xx/CVE-2024-3423.json | 2 +- CVE-2024/CVE-2024-34xx/CVE-2024-3489.json | 2 +- CVE-2024/CVE-2024-351xx/CVE-2024-35171.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35200.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35201.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35273.json | 6 +- CVE-2024/CVE-2024-352xx/CVE-2024-35275.json | 6 +- CVE-2024/CVE-2024-352xx/CVE-2024-35276.json | 6 +- CVE-2024/CVE-2024-352xx/CVE-2024-35277.json | 6 +- CVE-2024/CVE-2024-352xx/CVE-2024-35278.json | 6 +- CVE-2024/CVE-2024-352xx/CVE-2024-35280.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36253.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36258.json | 6 +- CVE-2024/CVE-2024-362xx/CVE-2024-36272.json | 6 +- CVE-2024/CVE-2024-362xx/CVE-2024-36276.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36290.json | 6 +- CVE-2024/CVE-2024-362xx/CVE-2024-36294.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36295.json | 6 +- CVE-2024/CVE-2024-364xx/CVE-2024-36402.json | 6 +- CVE-2024/CVE-2024-364xx/CVE-2024-36403.json | 6 +- CVE-2024/CVE-2024-364xx/CVE-2024-36476.json | 2 +- CVE-2024/CVE-2024-364xx/CVE-2024-36482.json | 2 +- CVE-2024/CVE-2024-364xx/CVE-2024-36488.json | 2 +- CVE-2024/CVE-2024-364xx/CVE-2024-36493.json | 6 +- CVE-2024/CVE-2024-365xx/CVE-2024-36504.json | 6 +- CVE-2024/CVE-2024-365xx/CVE-2024-36506.json | 6 +- CVE-2024/CVE-2024-365xx/CVE-2024-36510.json | 6 +- CVE-2024/CVE-2024-365xx/CVE-2024-36512.json | 6 +- CVE-2024/CVE-2024-367xx/CVE-2024-36751.json | 6 +- CVE-2024/CVE-2024-36xx/CVE-2024-3695.json | 2 +- CVE-2024/CVE-2024-370xx/CVE-2024-37093.json | 2 +- CVE-2024/CVE-2024-370xx/CVE-2024-37094.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37181.json | 6 +- CVE-2024/CVE-2024-371xx/CVE-2024-37184.json | 6 +- CVE-2024/CVE-2024-371xx/CVE-2024-37186.json | 6 +- CVE-2024/CVE-2024-373xx/CVE-2024-37357.json | 6 +- CVE-2024/CVE-2024-375xx/CVE-2024-37512.json | 2 +- CVE-2024/CVE-2024-37xx/CVE-2024-3718.json | 2 +- CVE-2024/CVE-2024-382xx/CVE-2024-38266.json | 2 +- CVE-2024/CVE-2024-383xx/CVE-2024-38383.json | 2 +- CVE-2024/CVE-2024-384xx/CVE-2024-38485.json | 2 +- CVE-2024/CVE-2024-386xx/CVE-2024-38666.json | 6 +- CVE-2024/CVE-2024-386xx/CVE-2024-38668.json | 2 +- CVE-2024/CVE-2024-387xx/CVE-2024-38768.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3875.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3876.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3877.json | 2 +- CVE-2024/CVE-2024-38xx/CVE-2024-3878.json | 2 +- CVE-2024/CVE-2024-392xx/CVE-2024-39273.json | 6 +- CVE-2024/CVE-2024-392xx/CVE-2024-39280.json | 6 +- CVE-2024/CVE-2024-392xx/CVE-2024-39282.json | 2 +- CVE-2024/CVE-2024-392xx/CVE-2024-39288.json | 6 +- CVE-2024/CVE-2024-392xx/CVE-2024-39294.json | 6 +- CVE-2024/CVE-2024-392xx/CVE-2024-39299.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39357.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39358.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39359.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39360.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39363.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39367.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39370.json | 6 +- CVE-2024/CVE-2024-396xx/CVE-2024-39602.json | 6 +- CVE-2024/CVE-2024-396xx/CVE-2024-39603.json | 6 +- CVE-2024/CVE-2024-396xx/CVE-2024-39604.json | 6 +- CVE-2024/CVE-2024-396xx/CVE-2024-39608.json | 6 +- CVE-2024/CVE-2024-396xx/CVE-2024-39667.json | 2 +- CVE-2024/CVE-2024-397xx/CVE-2024-39754.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39756.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39757.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39759.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39760.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39761.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39762.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39763.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39764.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39765.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39768.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39769.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39770.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39773.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39774.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39781.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39782.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39783.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39784.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39785.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39786.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39787.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39788.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39789.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39790.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39793.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39794.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39795.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39798.json | 6 +- CVE-2024/CVE-2024-397xx/CVE-2024-39799.json | 6 +- CVE-2024/CVE-2024-398xx/CVE-2024-39800.json | 6 +- CVE-2024/CVE-2024-398xx/CVE-2024-39801.json | 6 +- CVE-2024/CVE-2024-398xx/CVE-2024-39802.json | 6 +- CVE-2024/CVE-2024-398xx/CVE-2024-39803.json | 6 +- CVE-2024/CVE-2024-399xx/CVE-2024-39967.json | 6 +- CVE-2024/CVE-2024-39xx/CVE-2024-3905.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3906.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3909.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3910.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3925.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3942.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3985.json | 2 +- CVE-2024/CVE-2024-405xx/CVE-2024-40513.json | 6 +- CVE-2024/CVE-2024-405xx/CVE-2024-40514.json | 6 +- CVE-2024/CVE-2024-405xx/CVE-2024-40587.json | 6 +- CVE-2024/CVE-2024-407xx/CVE-2024-40771.json | 2 +- CVE-2024/CVE-2024-408xx/CVE-2024-40839.json | 2 +- CVE-2024/CVE-2024-408xx/CVE-2024-40854.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4064.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4065.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4066.json | 2 +- CVE-2024/CVE-2024-411xx/CVE-2024-41149.json | 6 +- CVE-2024/CVE-2024-414xx/CVE-2024-41454.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41746.json | 6 +- CVE-2024/CVE-2024-417xx/CVE-2024-41787.json | 4 + CVE-2024/CVE-2024-419xx/CVE-2024-41932.json | 6 +- CVE-2024/CVE-2024-419xx/CVE-2024-41935.json | 6 +- CVE-2024/CVE-2024-41xx/CVE-2024-4166.json | 2 +- CVE-2024/CVE-2024-41xx/CVE-2024-4167.json | 2 +- CVE-2024/CVE-2024-41xx/CVE-2024-4168.json | 2 +- CVE-2024/CVE-2024-41xx/CVE-2024-4169.json | 2 +- CVE-2024/CVE-2024-41xx/CVE-2024-4170.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42168.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42169.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42170.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42171.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42172.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42173.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42174.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42175.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42179.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42180.json | 6 +- CVE-2024/CVE-2024-421xx/CVE-2024-42181.json | 6 +- CVE-2024/CVE-2024-424xx/CVE-2024-42444.json | 6 +- CVE-2024/CVE-2024-429xx/CVE-2024-42911.json | 6 +- CVE-2024/CVE-2024-42xx/CVE-2024-4227.json | 6 +- CVE-2024/CVE-2024-430xx/CVE-2024-43098.json | 6 +- CVE-2024/CVE-2024-43xx/CVE-2024-4359.json | 2 +- CVE-2024/CVE-2024-43xx/CVE-2024-4360.json | 2 +- CVE-2024/CVE-2024-441xx/CVE-2024-44136.json | 2 +- CVE-2024/CVE-2024-447xx/CVE-2024-44771.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4484.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4485.json | 2 +- CVE-2024/CVE-2024-450xx/CVE-2024-45061.json | 6 +- CVE-2024/CVE-2024-451xx/CVE-2024-45102.json | 6 +- CVE-2024/CVE-2024-453xx/CVE-2024-45326.json | 6 +- CVE-2024/CVE-2024-453xx/CVE-2024-45327.json | 2 +- CVE-2024/CVE-2024-453xx/CVE-2024-45331.json | 6 +- CVE-2024/CVE-2024-453xx/CVE-2024-45385.json | 2 +- CVE-2024/CVE-2024-456xx/CVE-2024-45627.json | 6 +- CVE-2024/CVE-2024-458xx/CVE-2024-45828.json | 6 +- CVE-2024/CVE-2024-462xx/CVE-2024-46210.json | 6 +- CVE-2024/CVE-2024-464xx/CVE-2024-46450.json | 6 +- CVE-2024/CVE-2024-464xx/CVE-2024-46479.json | 6 +- CVE-2024/CVE-2024-464xx/CVE-2024-46480.json | 6 +- CVE-2024/CVE-2024-464xx/CVE-2024-46481.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46664.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46665.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46666.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46667.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46668.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46669.json | 6 +- CVE-2024/CVE-2024-466xx/CVE-2024-46670.json | 6 +- CVE-2024/CVE-2024-468xx/CVE-2024-46887.json | 2 +- CVE-2024/CVE-2024-468xx/CVE-2024-46896.json | 6 +- CVE-2024/CVE-2024-469xx/CVE-2024-46919.json | 6 +- CVE-2024/CVE-2024-469xx/CVE-2024-46920.json | 6 +- CVE-2024/CVE-2024-469xx/CVE-2024-46921.json | 6 +- CVE-2024/CVE-2024-46xx/CVE-2024-4618.json | 2 +- CVE-2024/CVE-2024-46xx/CVE-2024-4643.json | 2 +- CVE-2024/CVE-2024-46xx/CVE-2024-4695.json | 2 +- CVE-2024/CVE-2024-470xx/CVE-2024-47002.json | 6 +- CVE-2024/CVE-2024-471xx/CVE-2024-47100.json | 2 +- CVE-2024/CVE-2024-471xx/CVE-2024-47140.json | 6 +- CVE-2024/CVE-2024-471xx/CVE-2024-47141.json | 6 +- CVE-2024/CVE-2024-471xx/CVE-2024-47143.json | 6 +- CVE-2024/CVE-2024-473xx/CVE-2024-47364.json | 2 +- CVE-2024/CVE-2024-473xx/CVE-2024-47383.json | 2 +- CVE-2024/CVE-2024-473xx/CVE-2024-47389.json | 2 +- CVE-2024/CVE-2024-473xx/CVE-2024-47392.json | 2 +- CVE-2024/CVE-2024-473xx/CVE-2024-47396.json | 2 +- CVE-2024/CVE-2024-474xx/CVE-2024-47408.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47517.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47518.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47519.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47520.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47566.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47571.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47572.json | 6 +- CVE-2024/CVE-2024-475xx/CVE-2024-47574.json | 2 +- CVE-2024/CVE-2024-476xx/CVE-2024-47605.json | 6 +- CVE-2024/CVE-2024-477xx/CVE-2024-47794.json | 6 +- CVE-2024/CVE-2024-477xx/CVE-2024-47796.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47809.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47894.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47895.json | 2 +- CVE-2024/CVE-2024-478xx/CVE-2024-47897.json | 2 +- CVE-2024/CVE-2024-47xx/CVE-2024-4712.json | 2 +- CVE-2024/CVE-2024-47xx/CVE-2024-4751.json | 2 +- CVE-2024/CVE-2024-481xx/CVE-2024-48121.json | 6 +- CVE-2024/CVE-2024-481xx/CVE-2024-48122.json | 6 +- CVE-2024/CVE-2024-481xx/CVE-2024-48123.json | 6 +- CVE-2024/CVE-2024-484xx/CVE-2024-48460.json | 6 +- CVE-2024/CVE-2024-487xx/CVE-2024-48760.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48854.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48855.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48856.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48857.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48858.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48873.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48875.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48876.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48881.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48883.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48885.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48886.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48890.json | 6 +- CVE-2024/CVE-2024-488xx/CVE-2024-48893.json | 6 +- CVE-2024/CVE-2024-491xx/CVE-2024-49105.json | 2 +- CVE-2024/CVE-2024-493xx/CVE-2024-49375.json | 6 +- CVE-2024/CVE-2024-495xx/CVE-2024-49568.json | 6 +- CVE-2024/CVE-2024-495xx/CVE-2024-49569.json | 6 +- CVE-2024/CVE-2024-495xx/CVE-2024-49571.json | 6 +- CVE-2024/CVE-2024-495xx/CVE-2024-49573.json | 6 +- CVE-2024/CVE-2024-497xx/CVE-2024-49785.json | 6 +- CVE-2024/CVE-2024-49xx/CVE-2024-4983.json | 2 +- CVE-2024/CVE-2024-500xx/CVE-2024-50051.json | 6 +- CVE-2024/CVE-2024-503xx/CVE-2024-50338.json | 6 +- CVE-2024/CVE-2024-503xx/CVE-2024-50349.json | 6 +- CVE-2024/CVE-2024-503xx/CVE-2024-50386.json | 2 +- CVE-2024/CVE-2024-504xx/CVE-2024-50453.json | 2 +- CVE-2024/CVE-2024-505xx/CVE-2024-50563.json | 2 +- CVE-2024/CVE-2024-505xx/CVE-2024-50564.json | 6 +- CVE-2024/CVE-2024-505xx/CVE-2024-50566.json | 6 +- CVE-2024/CVE-2024-506xx/CVE-2024-50603.json | 2 +- CVE-2024/CVE-2024-508xx/CVE-2024-50807.json | 2 +- CVE-2024/CVE-2024-508xx/CVE-2024-50857.json | 2 +- CVE-2024/CVE-2024-508xx/CVE-2024-50858.json | 2 +- CVE-2024/CVE-2024-508xx/CVE-2024-50859.json | 2 +- CVE-2024/CVE-2024-508xx/CVE-2024-50861.json | 2 +- CVE-2024/CVE-2024-509xx/CVE-2024-50953.json | 2 +- CVE-2024/CVE-2024-509xx/CVE-2024-50967.json | 2 +- CVE-2024/CVE-2024-514xx/CVE-2024-51456.json | 6 +- CVE-2024/CVE-2024-514xx/CVE-2024-51462.json | 6 +- CVE-2024/CVE-2024-514xx/CVE-2024-51491.json | 6 +- CVE-2024/CVE-2024-515xx/CVE-2024-51540.json | 2 +- CVE-2024/CVE-2024-517xx/CVE-2024-51729.json | 6 +- CVE-2024/CVE-2024-51xx/CVE-2024-5198.json | 2 +- CVE-2024/CVE-2024-520xx/CVE-2024-52005.json | 6 +- CVE-2024/CVE-2024-520xx/CVE-2024-52006.json | 6 +- CVE-2024/CVE-2024-523xx/CVE-2024-52319.json | 6 +- CVE-2024/CVE-2024-523xx/CVE-2024-52332.json | 6 +- CVE-2024/CVE-2024-523xx/CVE-2024-52333.json | 6 +- CVE-2024/CVE-2024-523xx/CVE-2024-52363.json | 6 +- CVE-2024/CVE-2024-525xx/CVE-2024-52534.json | 2 +- CVE-2024/CVE-2024-525xx/CVE-2024-52594.json | 6 +- CVE-2024/CVE-2024-526xx/CVE-2024-52602.json | 6 +- CVE-2024/CVE-2024-527xx/CVE-2024-52783.json | 6 +- CVE-2024/CVE-2024-527xx/CVE-2024-52791.json | 6 +- CVE-2024/CVE-2024-528xx/CVE-2024-52898.json | 6 +- CVE-2024/CVE-2024-529xx/CVE-2024-52935.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52936.json | 6 +- CVE-2024/CVE-2024-529xx/CVE-2024-52937.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52938.json | 2 +- CVE-2024/CVE-2024-529xx/CVE-2024-52963.json | 6 +- CVE-2024/CVE-2024-529xx/CVE-2024-52967.json | 6 +- CVE-2024/CVE-2024-529xx/CVE-2024-52969.json | 6 +- CVE-2024/CVE-2024-532xx/CVE-2024-53263.json | 6 +- CVE-2024/CVE-2024-532xx/CVE-2024-53277.json | 6 +- CVE-2024/CVE-2024-535xx/CVE-2024-53553.json | 6 +- CVE-2024/CVE-2024-535xx/CVE-2024-53561.json | 6 +- CVE-2024/CVE-2024-536xx/CVE-2024-53649.json | 2 +- CVE-2024/CVE-2024-536xx/CVE-2024-53680.json | 6 +- CVE-2024/CVE-2024-536xx/CVE-2024-53681.json | 2 +- CVE-2024/CVE-2024-536xx/CVE-2024-53682.json | 6 +- CVE-2024/CVE-2024-536xx/CVE-2024-53687.json | 6 +- CVE-2024/CVE-2024-536xx/CVE-2024-53690.json | 6 +- CVE-2024/CVE-2024-538xx/CVE-2024-53808.json | 2 +- CVE-2024/CVE-2024-53xx/CVE-2024-5341.json | 2 +- CVE-2024/CVE-2024-540xx/CVE-2024-54021.json | 6 +- CVE-2024/CVE-2024-540xx/CVE-2024-54031.json | 2 +- CVE-2024/CVE-2024-541xx/CVE-2024-54142.json | 6 +- CVE-2024/CVE-2024-541xx/CVE-2024-54193.json | 6 +- CVE-2024/CVE-2024-544xx/CVE-2024-54455.json | 6 +- CVE-2024/CVE-2024-544xx/CVE-2024-54470.json | 2 +- CVE-2024/CVE-2024-545xx/CVE-2024-54540.json | 2 +- CVE-2024/CVE-2024-546xx/CVE-2024-54660.json | 6 +- CVE-2024/CVE-2024-546xx/CVE-2024-54687.json | 2 +- CVE-2024/CVE-2024-547xx/CVE-2024-54730.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54846.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54847.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54848.json | 2 +- CVE-2024/CVE-2024-548xx/CVE-2024-54849.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54910.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54994.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54996.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54997.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54998.json | 2 +- CVE-2024/CVE-2024-549xx/CVE-2024-54999.json | 6 +- CVE-2024/CVE-2024-550xx/CVE-2024-55000.json | 6 +- CVE-2024/CVE-2024-555xx/CVE-2024-55511.json | 6 +- CVE-2024/CVE-2024-555xx/CVE-2024-55577.json | 6 +- CVE-2024/CVE-2024-555xx/CVE-2024-55593.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55639.json | 6 +- CVE-2024/CVE-2024-556xx/CVE-2024-55641.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55881.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55891.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55892.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55893.json | 6 +- CVE-2024/CVE-2024-558xx/CVE-2024-55894.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55920.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55921.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55922.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55923.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55924.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55945.json | 6 +- CVE-2024/CVE-2024-559xx/CVE-2024-55954.json | 6 +- CVE-2024/CVE-2024-560xx/CVE-2024-56065.json | 6 +- CVE-2024/CVE-2024-561xx/CVE-2024-56136.json | 6 +- CVE-2024/CVE-2024-561xx/CVE-2024-56138.json | 6 +- CVE-2024/CVE-2024-561xx/CVE-2024-56144.json | 6 +- CVE-2024/CVE-2024-562xx/CVE-2024-56254.json | 2 +- CVE-2024/CVE-2024-562xx/CVE-2024-56266.json | 2 +- CVE-2024/CVE-2024-562xx/CVE-2024-56295.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56301.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56323.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56368.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56372.json | 6 +- CVE-2024/CVE-2024-563xx/CVE-2024-56374.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56497.json | 6 +- CVE-2024/CVE-2024-565xx/CVE-2024-56511.json | 6 +- CVE-2024/CVE-2024-565xx/CVE-2024-56515.json | 6 +- CVE-2024/CVE-2024-567xx/CVE-2024-56780.json | 2 +- CVE-2024/CVE-2024-567xx/CVE-2024-56788.json | 6 +- CVE-2024/CVE-2024-568xx/CVE-2024-56841.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57011.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57012.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57013.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57014.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57015.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57016.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57017.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57018.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57019.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57020.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57021.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57022.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57023.json | 6 +- CVE-2024/CVE-2024-570xx/CVE-2024-57024.json | 6 +- CVE-2024/CVE-2024-570xx/CVE-2024-57025.json | 6 +- CVE-2024/CVE-2024-571xx/CVE-2024-57159.json | 6 +- CVE-2024/CVE-2024-571xx/CVE-2024-57160.json | 6 +- CVE-2024/CVE-2024-571xx/CVE-2024-57161.json | 6 +- CVE-2024/CVE-2024-572xx/CVE-2024-57212.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57213.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57214.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57222.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57223.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57224.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57225.json | 2 +- CVE-2024/CVE-2024-574xx/CVE-2024-57471.json | 6 +- CVE-2024/CVE-2024-574xx/CVE-2024-57473.json | 2 +- CVE-2024/CVE-2024-574xx/CVE-2024-57479.json | 2 +- CVE-2024/CVE-2024-574xx/CVE-2024-57480.json | 2 +- CVE-2024/CVE-2024-574xx/CVE-2024-57482.json | 6 +- CVE-2024/CVE-2024-574xx/CVE-2024-57483.json | 2 +- CVE-2024/CVE-2024-574xx/CVE-2024-57487.json | 6 +- CVE-2024/CVE-2024-574xx/CVE-2024-57488.json | 6 +- CVE-2024/CVE-2024-575xx/CVE-2024-57575.json | 6 +- CVE-2024/CVE-2024-575xx/CVE-2024-57583.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57611.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57623.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57628.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57629.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57630.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57631.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57632.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57633.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57634.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57635.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57636.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57637.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57654.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57661.json | 2 +- CVE-2024/CVE-2024-576xx/CVE-2024-57662.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57663.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57664.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57676.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57677.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57678.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57679.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57680.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57681.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57682.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57683.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57684.json | 6 +- CVE-2024/CVE-2024-576xx/CVE-2024-57686.json | 4 + CVE-2024/CVE-2024-576xx/CVE-2024-57687.json | 4 + CVE-2024/CVE-2024-577xx/CVE-2024-57703.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57704.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57757.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57760.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57761.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57762.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57763.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57764.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57765.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57766.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57767.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57769.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57770.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57771.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57772.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57773.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57774.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57775.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57776.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57784.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57785.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57791.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57792.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57793.json | 6 +- CVE-2024/CVE-2024-577xx/CVE-2024-57795.json | 2 +- CVE-2024/CVE-2024-577xx/CVE-2024-57798.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57800.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57801.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57802.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57804.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57805.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57806.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57809.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57822.json | 4 + CVE-2024/CVE-2024-578xx/CVE-2024-57823.json | 4 + CVE-2024/CVE-2024-578xx/CVE-2024-57838.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57839.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57841.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57843.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57844.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57849.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57850.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57857.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57874.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57875.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57876.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57877.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57878.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57879.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57880.json | 6 +- CVE-2024/CVE-2024-578xx/CVE-2024-57882.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57884.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57885.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57886.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57887.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57889.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57890.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57891.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57892.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57893.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57894.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57895.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57896.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57897.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57898.json | 2 +- CVE-2024/CVE-2024-578xx/CVE-2024-57899.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57900.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57901.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57902.json | 2 +- CVE-2024/CVE-2024-579xx/CVE-2024-57903.json | 2 +- CVE-2024/CVE-2024-57xx/CVE-2024-5743.json | 6 +- CVE-2024/CVE-2024-58xx/CVE-2024-5872.json | 6 +- CVE-2024/CVE-2024-63xx/CVE-2024-6342.json | 2 +- CVE-2024/CVE-2024-63xx/CVE-2024-6352.json | 6 +- CVE-2024/CVE-2024-64xx/CVE-2024-6437.json | 6 +- CVE-2024/CVE-2024-66xx/CVE-2024-6662.json | 6 +- CVE-2024/CVE-2024-68xx/CVE-2024-6880.json | 6 +- CVE-2024/CVE-2024-70xx/CVE-2024-7085.json | 6 +- CVE-2024/CVE-2024-70xx/CVE-2024-7095.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7142.json | 6 +- CVE-2024/CVE-2024-72xx/CVE-2024-7247.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7322.json | 6 +- CVE-2024/CVE-2024-73xx/CVE-2024-7344.json | 6 +- CVE-2024/CVE-2024-73xx/CVE-2024-7347.json | 2 +- CVE-2024/CVE-2024-76xx/CVE-2024-7606.json | 2 +- CVE-2024/CVE-2024-76xx/CVE-2024-7607.json | 2 +- CVE-2024/CVE-2024-76xx/CVE-2024-7634.json | 2 +- CVE-2024/CVE-2024-81xx/CVE-2024-8148.json | 2 +- CVE-2024/CVE-2024-81xx/CVE-2024-8149.json | 2 +- CVE-2024/CVE-2024-82xx/CVE-2024-8234.json | 2 +- CVE-2024/CVE-2024-86xx/CVE-2024-8603.json | 6 +- CVE-2024/CVE-2024-87xx/CVE-2024-8748.json | 2 +- CVE-2024/CVE-2024-90xx/CVE-2024-9058.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9131.json | 6 +- CVE-2024/CVE-2024-91xx/CVE-2024-9132.json | 6 +- CVE-2024/CVE-2024-91xx/CVE-2024-9133.json | 6 +- CVE-2024/CVE-2024-91xx/CVE-2024-9134.json | 6 +- CVE-2024/CVE-2024-91xx/CVE-2024-9161.json | 2 +- CVE-2024/CVE-2024-91xx/CVE-2024-9188.json | 6 +- CVE-2024/CVE-2024-91xx/CVE-2024-9197.json | 2 +- CVE-2024/CVE-2024-92xx/CVE-2024-9200.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9314.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9351.json | 2 +- CVE-2024/CVE-2024-93xx/CVE-2024-9352.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9586.json | 2 +- CVE-2024/CVE-2024-95xx/CVE-2024-9587.json | 2 +- CVE-2024/CVE-2024-96xx/CVE-2024-9628.json | 2 +- CVE-2024/CVE-2024-96xx/CVE-2024-9630.json | 2 +- CVE-2024/CVE-2024-96xx/CVE-2024-9636.json | 6 +- CVE-2024/CVE-2024-96xx/CVE-2024-9672.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9861.json | 2 +- CVE-2024/CVE-2024-98xx/CVE-2024-9862.json | 2 +- CVE-2025/CVE-2025-00xx/CVE-2025-0053.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0055.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0056.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0057.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0058.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0059.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0060.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0061.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0063.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0066.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0067.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0068.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0069.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0070.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0103.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0104.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0105.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0106.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0170.json | 6 +- CVE-2025/CVE-2025-01xx/CVE-2025-0193.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0215.json | 6 +- CVE-2025/CVE-2025-02xx/CVE-2025-0220.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0224.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0225.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0226.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0227.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0343.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0354.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0355.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0356.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0390.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0391.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0392.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0393.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0394.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0396.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0397.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0398.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0399.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0400.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0401.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0402.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0403.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0404.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0405.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0406.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0407.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0408.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0409.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0410.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0412.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0434.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0435.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0436.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0438.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0439.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0440.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0441.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0442.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0443.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0446.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0447.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0448.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0455.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0456.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0457.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0458.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0459.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0460.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0461.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0462.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0463.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0464.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0465.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0471.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0472.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0473.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0474.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0476.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0480.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0481.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0482.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0483.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0484.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0485.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0486.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0487.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0488.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0489.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0490.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0491.json | 6 +- CVE-2025/CVE-2025-04xx/CVE-2025-0492.json | 6 +- CVE-2025/CVE-2025-05xx/CVE-2025-0500.json | 6 +- CVE-2025/CVE-2025-05xx/CVE-2025-0501.json | 6 +- CVE-2025/CVE-2025-05xx/CVE-2025-0502.json | 6 +- CVE-2025/CVE-2025-05xx/CVE-2025-0518.json | 6 +- CVE-2025/CVE-2025-05xx/CVE-2025-0527.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0528.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0529.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0562.json | 141 + CVE-2025/CVE-2025-05xx/CVE-2025-0563.json | 145 + CVE-2025/CVE-2025-200xx/CVE-2025-20016.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20036.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20055.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20072.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20086.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20088.json | 6 +- CVE-2025/CVE-2025-206xx/CVE-2025-20620.json | 2 +- CVE-2025/CVE-2025-206xx/CVE-2025-20621.json | 6 +- CVE-2025/CVE-2025-206xx/CVE-2025-20630.json | 6 +- CVE-2025/CVE-2025-210xx/CVE-2025-21083.json | 6 +- CVE-2025/CVE-2025-210xx/CVE-2025-21088.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21101.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21122.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21127.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21133.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21135.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21136.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21137.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21138.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21139.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21171.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21172.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21173.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21176.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21178.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21186.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21187.json | 6 +- CVE-2025/CVE-2025-211xx/CVE-2025-21189.json | 10 +- CVE-2025/CVE-2025-211xx/CVE-2025-21193.json | 6 +- CVE-2025/CVE-2025-212xx/CVE-2025-21202.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21207.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21210.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21211.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21213.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21214.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21215.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21217.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21218.json | 6 +- CVE-2025/CVE-2025-212xx/CVE-2025-21219.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21220.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21223.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21224.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21225.json | 6 +- CVE-2025/CVE-2025-212xx/CVE-2025-21226.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21227.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21228.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21229.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21230.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21231.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21232.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21233.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21234.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21235.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21236.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21237.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21238.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21239.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21240.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21241.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21242.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21243.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21244.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21245.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21246.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21248.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21249.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21250.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21251.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21252.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21255.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21256.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21257.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21258.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21260.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21261.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21263.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21265.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21266.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21268.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21269.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21270.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21271.json | 6 +- CVE-2025/CVE-2025-212xx/CVE-2025-21272.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21273.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21274.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21275.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21276.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21277.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21278.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21280.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21281.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21282.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21284.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21285.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21286.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21287.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21288.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21289.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21290.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21291.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21292.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21293.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21294.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21295.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21296.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21297.json | 6 +- CVE-2025/CVE-2025-212xx/CVE-2025-21298.json | 10 +- CVE-2025/CVE-2025-212xx/CVE-2025-21299.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21300.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21301.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21302.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21303.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21304.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21305.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21306.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21307.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21308.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21309.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21310.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21311.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21312.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21313.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21314.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21315.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21316.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21317.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21318.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21319.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21320.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21321.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21323.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21324.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21325.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21326.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21327.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21328.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21329.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21330.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21331.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21332.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21333.json | 2 +- CVE-2025/CVE-2025-213xx/CVE-2025-21334.json | 4 +- CVE-2025/CVE-2025-213xx/CVE-2025-21335.json | 4 +- CVE-2025/CVE-2025-213xx/CVE-2025-21336.json | 8 +- CVE-2025/CVE-2025-213xx/CVE-2025-21338.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21339.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21340.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21341.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21343.json | 10 +- CVE-2025/CVE-2025-213xx/CVE-2025-21344.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21345.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21346.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21348.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21354.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21356.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21357.json | 6 +- CVE-2025/CVE-2025-213xx/CVE-2025-21374.json | 2 +- CVE-2025/CVE-2025-213xx/CVE-2025-21378.json | 2 +- CVE-2025/CVE-2025-213xx/CVE-2025-21382.json | 2 +- CVE-2025/CVE-2025-213xx/CVE-2025-21389.json | 2 +- CVE-2025/CVE-2025-214xx/CVE-2025-21402.json | 6 +- CVE-2025/CVE-2025-214xx/CVE-2025-21403.json | 6 +- CVE-2025/CVE-2025-214xx/CVE-2025-21409.json | 2 +- CVE-2025/CVE-2025-214xx/CVE-2025-21411.json | 2 +- CVE-2025/CVE-2025-214xx/CVE-2025-21413.json | 2 +- CVE-2025/CVE-2025-214xx/CVE-2025-21417.json | 2 +- CVE-2025/CVE-2025-216xx/CVE-2025-21629.json | 2 +- CVE-2025/CVE-2025-221xx/CVE-2025-22134.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22138.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22139.json | 2 +- CVE-2025/CVE-2025-221xx/CVE-2025-22142.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22143.json | 2 +- CVE-2025/CVE-2025-221xx/CVE-2025-22144.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22146.json | 6 +- CVE-2025/CVE-2025-221xx/CVE-2025-22152.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22314.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22317.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22329.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22337.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22344.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22346.json | 6 +- CVE-2025/CVE-2025-223xx/CVE-2025-22394.json | 6 +- CVE-2025/CVE-2025-224xx/CVE-2025-22498.json | 6 +- CVE-2025/CVE-2025-224xx/CVE-2025-22499.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22506.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22514.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22567.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22568.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22569.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22570.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22576.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22583.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22586.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22587.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22588.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22596.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22597.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22598.json | 6 +- CVE-2025/CVE-2025-225xx/CVE-2025-22599.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22600.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22613.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22614.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22615.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22616.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22617.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22618.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22619.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22724.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22729.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22731.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22734.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22736.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22737.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22738.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22742.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22743.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22744.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22745.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22746.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22747.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22748.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22749.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22750.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22751.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22752.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22753.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22754.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22755.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22758.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22759.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22760.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22761.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22762.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22764.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22765.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22766.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22769.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22773.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22776.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22777.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22778.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22779.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22780.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22781.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22782.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22784.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22785.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22786.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22787.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22788.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22793.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22795.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22797.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22798.json | 6 +- CVE-2025/CVE-2025-227xx/CVE-2025-22799.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22800.json | 6 +- CVE-2025/CVE-2025-228xx/CVE-2025-22828.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22905.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22906.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22907.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22912.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22913.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22916.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22949.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22963.json | 6 +- CVE-2025/CVE-2025-229xx/CVE-2025-22964.json | 6 +- CVE-2025/CVE-2025-229xx/CVE-2025-22968.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22976.json | 6 +- CVE-2025/CVE-2025-229xx/CVE-2025-22983.json | 6 +- CVE-2025/CVE-2025-229xx/CVE-2025-22984.json | 6 +- CVE-2025/CVE-2025-229xx/CVE-2025-22996.json | 2 +- CVE-2025/CVE-2025-229xx/CVE-2025-22997.json | 2 +- CVE-2025/CVE-2025-230xx/CVE-2025-23016.json | 4 + CVE-2025/CVE-2025-230xx/CVE-2025-23018.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23019.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23025.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23026.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23027.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23030.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23031.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23032.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23033.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23034.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23035.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23036.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23037.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23038.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23040.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23041.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23042.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23051.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23052.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23061.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23072.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23074.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23078.json | 2 +- CVE-2025/CVE-2025-230xx/CVE-2025-23079.json | 2 +- CVE-2025/CVE-2025-230xx/CVE-2025-23080.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23082.json | 2 +- CVE-2025/CVE-2025-231xx/CVE-2025-23108.json | 2 +- CVE-2025/CVE-2025-231xx/CVE-2025-23109.json | 2 +- CVE-2025/CVE-2025-231xx/CVE-2025-23110.json | 6 +- CVE-2025/CVE-2025-231xx/CVE-2025-23111.json | 6 +- CVE-2025/CVE-2025-231xx/CVE-2025-23112.json | 6 +- CVE-2025/CVE-2025-231xx/CVE-2025-23113.json | 6 +- CVE-2025/CVE-2025-231xx/CVE-2025-23198.json | 6 +- CVE-2025/CVE-2025-231xx/CVE-2025-23199.json | 6 +- CVE-2025/CVE-2025-232xx/CVE-2025-23200.json | 6 +- CVE-2025/CVE-2025-232xx/CVE-2025-23201.json | 6 +- CVE-2025/CVE-2025-233xx/CVE-2025-23366.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23423.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23424.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23426.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23429.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23430.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23432.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23434.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23435.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23436.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23438.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23442.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23444.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23445.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23452.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23453.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23455.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23456.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23463.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23467.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23470.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23471.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23476.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23483.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23497.json | 6 +- CVE-2025/CVE-2025-234xx/CVE-2025-23499.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23501.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23508.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23510.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23511.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23513.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23514.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23528.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23530.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23532.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23533.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23537.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23547.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23557.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23558.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23559.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23560.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23566.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23567.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23569.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23572.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23573.json | 6 +- CVE-2025/CVE-2025-235xx/CVE-2025-23577.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23617.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23618.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23620.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23623.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23627.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23639.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23640.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23641.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23642.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23644.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23649.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23654.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23659.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23660.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23661.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23662.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23664.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23665.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23673.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23675.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23677.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23689.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23690.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23691.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23692.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23693.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23694.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23698.json | 6 +- CVE-2025/CVE-2025-236xx/CVE-2025-23699.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23702.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23703.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23708.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23710.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23712.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23713.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23715.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23717.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23720.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23743.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23745.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23749.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23760.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23761.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23764.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23765.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23767.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23772.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23775.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23776.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23777.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23778.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23779.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23780.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23783.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23785.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23791.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23793.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23794.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23795.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23796.json | 6 +- CVE-2025/CVE-2025-237xx/CVE-2025-23797.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23800.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23801.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23802.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23804.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23805.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23807.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23808.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23810.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23815.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23816.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23817.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23818.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23820.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23821.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23822.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23823.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23824.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23825.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23826.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23827.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23828.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23830.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23831.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23832.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23833.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23841.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23842.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23844.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23848.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23854.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23856.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23859.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23860.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23861.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23862.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23863.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23864.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23865.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23868.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23869.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23870.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23871.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23872.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23873.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23875.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23876.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23877.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23878.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23880.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23884.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23886.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23887.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23890.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23891.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23892.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23893.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23895.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23896.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23897.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23898.json | 6 +- CVE-2025/CVE-2025-238xx/CVE-2025-23899.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23900.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23901.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23902.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23907.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23908.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23909.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23911.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23912.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23913.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23915.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23916.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23917.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23919.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23922.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23924.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23925.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23926.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23927.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23928.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23929.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23930.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23933.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23934.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23935.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23936.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23939.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23940.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23941.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23943.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23946.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23947.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23950.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23951.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23954.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23955.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23957.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23961.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23962.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23963.json | 6 +- CVE-2025/CVE-2025-239xx/CVE-2025-23965.json | 6 +- README.md | 40 +- _state.csv | 3544 +++++++++-------- 1774 files changed, 8776 insertions(+), 3808 deletions(-) create mode 100644 CVE-2025/CVE-2025-05xx/CVE-2025-0562.json create mode 100644 CVE-2025/CVE-2025-05xx/CVE-2025-0563.json diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json index ebc7545459f..c2f7b97a62c 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:08.320", "lastModified": "2025-01-06T15:15:08.723", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json b/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json index 26afae80b3b..f5f67958733 100644 --- a/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json +++ b/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2016-03-29T10:59:00.160", "lastModified": "2024-11-21T02:46:48.570", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json b/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json index 03f680f4c99..0118f391787 100644 --- a/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json +++ b/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-10-19T05:15:08.817", "lastModified": "2024-11-21T02:47:34.057", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-23xx/CVE-2016-2386.json b/CVE-2016/CVE-2016-23xx/CVE-2016-2386.json index a0857e62145..4db76beed8e 100644 --- a/CVE-2016/CVE-2016-23xx/CVE-2016-2386.json +++ b/CVE-2016/CVE-2016-23xx/CVE-2016-2386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-02-16T15:59:00.133", "lastModified": "2024-11-21T02:48:21.830", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-23xx/CVE-2016-2388.json b/CVE-2016/CVE-2016-23xx/CVE-2016-2388.json index 7f57c0027e8..752bfc0ec71 100644 --- a/CVE-2016/CVE-2016-23xx/CVE-2016-2388.json +++ b/CVE-2016/CVE-2016-23xx/CVE-2016-2388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-02-16T15:59:02.103", "lastModified": "2024-11-21T02:48:22.130", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-30xx/CVE-2016-3088.json b/CVE-2016/CVE-2016-30xx/CVE-2016-3088.json index f2d60c5d0d3..34283208332 100644 --- a/CVE-2016/CVE-2016-30xx/CVE-2016-3088.json +++ b/CVE-2016/CVE-2016-30xx/CVE-2016-3088.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-06-01T20:59:04.123", "lastModified": "2024-11-21T02:49:20.357", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-32xx/CVE-2016-3235.json b/CVE-2016/CVE-2016-32xx/CVE-2016-3235.json index 04c42dc8e96..e57a84f5c22 100644 --- a/CVE-2016/CVE-2016-32xx/CVE-2016-3235.json +++ b/CVE-2016/CVE-2016-32xx/CVE-2016-3235.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-06-16T01:59:36.983", "lastModified": "2024-11-21T02:49:38.880", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-32xx/CVE-2016-3298.json b/CVE-2016/CVE-2016-32xx/CVE-2016-3298.json index 85f5d2227a2..4cfb6d53c91 100644 --- a/CVE-2016/CVE-2016-32xx/CVE-2016-3298.json +++ b/CVE-2016/CVE-2016-32xx/CVE-2016-3298.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-10-14T02:59:13.893", "lastModified": "2024-11-21T02:49:45.317", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-33xx/CVE-2016-3309.json b/CVE-2016/CVE-2016-33xx/CVE-2016-3309.json index 7f7fb0c2643..048d5a39eec 100644 --- a/CVE-2016/CVE-2016-33xx/CVE-2016-3309.json +++ b/CVE-2016/CVE-2016-33xx/CVE-2016-3309.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-08-09T21:59:16.113", "lastModified": "2024-11-21T02:49:46.563", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-33xx/CVE-2016-3351.json b/CVE-2016/CVE-2016-33xx/CVE-2016-3351.json index bf9c5f976d7..c02d650d776 100644 --- a/CVE-2016/CVE-2016-33xx/CVE-2016-3351.json +++ b/CVE-2016/CVE-2016-33xx/CVE-2016-3351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-09-14T10:59:24.357", "lastModified": "2024-11-21T02:49:50.703", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-33xx/CVE-2016-3393.json b/CVE-2016/CVE-2016-33xx/CVE-2016-3393.json index 20331ccdce8..1e79b4463b8 100644 --- a/CVE-2016/CVE-2016-33xx/CVE-2016-3393.json +++ b/CVE-2016/CVE-2016-33xx/CVE-2016-3393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2016-10-14T02:59:30.290", "lastModified": "2024-11-21T02:49:55.143", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json b/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json index 1cdbbef1898..203a0a77511 100644 --- a/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json +++ b/CVE-2016/CVE-2016-34xx/CVE-2016-3427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2016-04-21T11:00:21.667", "lastModified": "2024-11-21T02:49:59.190", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-36xx/CVE-2016-3643.json b/CVE-2016/CVE-2016-36xx/CVE-2016-3643.json index e758c61c2d9..ea93d745693 100644 --- a/CVE-2016/CVE-2016-36xx/CVE-2016-3643.json +++ b/CVE-2016/CVE-2016-36xx/CVE-2016-3643.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-06-17T15:59:02.257", "lastModified": "2024-11-21T02:50:26.667", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-37xx/CVE-2016-3714.json b/CVE-2016/CVE-2016-37xx/CVE-2016-3714.json index da1067f6c4a..0a27be27ab5 100644 --- a/CVE-2016/CVE-2016-37xx/CVE-2016-3714.json +++ b/CVE-2016/CVE-2016-37xx/CVE-2016-3714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-05T18:59:03.273", "lastModified": "2024-11-21T02:50:33.420", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-37xx/CVE-2016-3715.json b/CVE-2016/CVE-2016-37xx/CVE-2016-3715.json index 64713bcade0..b11ed357827 100644 --- a/CVE-2016/CVE-2016-37xx/CVE-2016-3715.json +++ b/CVE-2016/CVE-2016-37xx/CVE-2016-3715.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-05T18:59:04.727", "lastModified": "2024-11-21T02:50:33.670", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-37xx/CVE-2016-3718.json b/CVE-2016/CVE-2016-37xx/CVE-2016-3718.json index 6b5de020f25..32286454aeb 100644 --- a/CVE-2016/CVE-2016-37xx/CVE-2016-3718.json +++ b/CVE-2016/CVE-2016-37xx/CVE-2016-3718.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-05-05T18:59:08.960", "lastModified": "2024-11-21T02:50:34.107", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-39xx/CVE-2016-3976.json b/CVE-2016/CVE-2016-39xx/CVE-2016-3976.json index a3a98cb7313..f5d84646df2 100644 --- a/CVE-2016/CVE-2016-39xx/CVE-2016-3976.json +++ b/CVE-2016/CVE-2016-39xx/CVE-2016-3976.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-04-07T23:59:10.797", "lastModified": "2024-11-21T02:51:04.187", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-41xx/CVE-2016-4117.json b/CVE-2016/CVE-2016-41xx/CVE-2016-4117.json index c040da1ca17..766d66ef45a 100644 --- a/CVE-2016/CVE-2016-41xx/CVE-2016-4117.json +++ b/CVE-2016/CVE-2016-41xx/CVE-2016-4117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-05-11T01:59:46.137", "lastModified": "2024-11-21T02:51:24.713", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-41xx/CVE-2016-4171.json b/CVE-2016/CVE-2016-41xx/CVE-2016-4171.json index 79a15851d1d..ddbcef2d1a5 100644 --- a/CVE-2016/CVE-2016-41xx/CVE-2016-4171.json +++ b/CVE-2016/CVE-2016-41xx/CVE-2016-4171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-06-16T14:59:51.017", "lastModified": "2024-11-21T02:51:32.637", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-44xx/CVE-2016-4437.json b/CVE-2016/CVE-2016-44xx/CVE-2016-4437.json index 05036eb606a..f6a83ca7f12 100644 --- a/CVE-2016/CVE-2016-44xx/CVE-2016-4437.json +++ b/CVE-2016/CVE-2016-44xx/CVE-2016-4437.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2016-06-07T14:06:13.247", "lastModified": "2024-11-21T02:52:11.663", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-45xx/CVE-2016-4523.json b/CVE-2016/CVE-2016-45xx/CVE-2016-4523.json index 651e55c7292..9d3597b8719 100644 --- a/CVE-2016/CVE-2016-45xx/CVE-2016-4523.json +++ b/CVE-2016/CVE-2016-45xx/CVE-2016-4523.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2016-06-09T10:59:04.073", "lastModified": "2024-11-21T02:52:23.737", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json index 643634c4777..51a0ac8cc8e 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:00.133", "lastModified": "2024-11-21T02:52:42.610", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json index ea0a96e7a54..89c117f4929 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:01.087", "lastModified": "2024-11-21T02:52:42.787", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json index b3ac11a3e2e..8d85b24eccf 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:02.150", "lastModified": "2024-11-21T02:52:42.907", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json b/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json index 94f297949e5..c8ee4aa9a3c 100644 --- a/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json +++ b/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2016-11-10T21:59:00.197", "lastModified": "2024-11-21T02:53:48.837", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json b/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json index ea0c5f644bc..4d94dcadcac 100644 --- a/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json +++ b/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-01-19T05:59:00.213", "lastModified": "2024-11-21T02:53:49.443", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-62xx/CVE-2016-6277.json b/CVE-2016/CVE-2016-62xx/CVE-2016-6277.json index ff91247c663..829e1892cc1 100644 --- a/CVE-2016/CVE-2016-62xx/CVE-2016-6277.json +++ b/CVE-2016/CVE-2016-62xx/CVE-2016-6277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-12-14T16:59:00.350", "lastModified": "2024-11-21T02:55:48.300", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json index accb0ecdc22..e20c022ddd6 100644 --- a/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json +++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6366.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-08-18T18:59:00.117", "lastModified": "2024-11-21T02:55:59.330", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json b/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json index a3540f37ae6..bff5059ad8e 100644 --- a/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json +++ b/CVE-2016/CVE-2016-63xx/CVE-2016-6367.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-08-18T18:59:01.463", "lastModified": "2024-11-21T02:55:59.507", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json b/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json index 8d336dfc60a..e1f12881630 100644 --- a/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json +++ b/CVE-2016/CVE-2016-64xx/CVE-2016-6415.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-09-19T01:59:06.167", "lastModified": "2024-11-21T02:56:05.187", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-78xx/CVE-2016-7855.json b/CVE-2016/CVE-2016-78xx/CVE-2016-7855.json index e53492bf52b..a8dacb69954 100644 --- a/CVE-2016/CVE-2016-78xx/CVE-2016-7855.json +++ b/CVE-2016/CVE-2016-78xx/CVE-2016-7855.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-11-01T22:59:00.167", "lastModified": "2024-11-21T02:58:35.730", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-78xx/CVE-2016-7892.json b/CVE-2016/CVE-2016-78xx/CVE-2016-7892.json index de63c5709f8..1051eebcfcf 100644 --- a/CVE-2016/CVE-2016-78xx/CVE-2016-7892.json +++ b/CVE-2016/CVE-2016-78xx/CVE-2016-7892.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2016-12-15T06:59:56.313", "lastModified": "2024-11-21T02:58:40.177", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-85xx/CVE-2016-8562.json b/CVE-2016/CVE-2016-85xx/CVE-2016-8562.json index ce268584fc9..5ae8f2ef234 100644 --- a/CVE-2016/CVE-2016-85xx/CVE-2016-8562.json +++ b/CVE-2016/CVE-2016-85xx/CVE-2016-8562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-11-18T21:59:02.033", "lastModified": "2024-11-21T02:59:34.477", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json b/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json index b8dd4b8ecbd..fc5aefaf2a1 100644 --- a/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json +++ b/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2017-04-06T21:59:00.243", "lastModified": "2024-11-21T02:59:57.203", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json b/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json index 6e725f35af0..dc96a2794e3 100644 --- a/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json +++ b/CVE-2016/CVE-2016-90xx/CVE-2016-9079.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2018-06-11T21:29:01.797", "lastModified": "2024-11-21T03:00:33.650", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json b/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json index 42558513efc..6b72f5afc83 100644 --- a/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json +++ b/CVE-2016/CVE-2016-95xx/CVE-2016-9563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2016-11-23T02:59:06.370", "lastModified": "2024-11-21T03:01:23.717", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-10002xx/CVE-2017-1000253.json b/CVE-2017/CVE-2017-10002xx/CVE-2017-1000253.json index 8be03a4210c..23fddadddde 100644 --- a/CVE-2017/CVE-2017-10002xx/CVE-2017-1000253.json +++ b/CVE-2017/CVE-2017-10002xx/CVE-2017-1000253.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-10-05T01:29:04.790", "lastModified": "2024-11-21T03:04:30.343", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json b/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json index 93871e62c35..b1a52adbc40 100644 --- a/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json +++ b/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-01-03T20:29:00.643", "lastModified": "2024-11-21T03:04:50.587", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json b/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json index da004ae06c1..7d1fbb50afd 100644 --- a/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json +++ b/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2017-10-19T17:29:01.747", "lastModified": "2024-11-21T03:05:47.717", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-109xx/CVE-2017-10930.json b/CVE-2017/CVE-2017-109xx/CVE-2017-10930.json index e666f06da9f..c623b1d24c1 100644 --- a/CVE-2017/CVE-2017-109xx/CVE-2017-10930.json +++ b/CVE-2017/CVE-2017-109xx/CVE-2017-10930.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2017-09-19T14:29:00.227", "lastModified": "2024-11-21T03:06:46.643", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-109xx/CVE-2017-10931.json b/CVE-2017/CVE-2017-109xx/CVE-2017-10931.json index 3886ce99a24..3103386a0ee 100644 --- a/CVE-2017/CVE-2017-109xx/CVE-2017-10931.json +++ b/CVE-2017/CVE-2017-109xx/CVE-2017-10931.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2017-09-19T14:29:00.273", "lastModified": "2024-11-21T03:06:46.763", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-109xx/CVE-2017-10932.json b/CVE-2017/CVE-2017-109xx/CVE-2017-10932.json index edd8cdcea87..76f9a0adee7 100644 --- a/CVE-2017/CVE-2017-109xx/CVE-2017-10932.json +++ b/CVE-2017/CVE-2017-109xx/CVE-2017-10932.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2017-09-28T01:29:00.997", "lastModified": "2024-11-21T03:06:46.880", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-112xx/CVE-2017-11292.json b/CVE-2017/CVE-2017-112xx/CVE-2017-11292.json index b11e3ee4e6b..adcd8550a29 100644 --- a/CVE-2017/CVE-2017-112xx/CVE-2017-11292.json +++ b/CVE-2017/CVE-2017-112xx/CVE-2017-11292.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2017-10-22T19:29:00.237", "lastModified": "2024-11-21T03:07:29.570", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-113xx/CVE-2017-11317.json b/CVE-2017/CVE-2017-113xx/CVE-2017-11317.json index bcf13fe1dc3..a74c275d23d 100644 --- a/CVE-2017/CVE-2017-113xx/CVE-2017-11317.json +++ b/CVE-2017/CVE-2017-113xx/CVE-2017-11317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-08-23T17:29:00.177", "lastModified": "2024-11-21T03:07:32.483", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json b/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json index a648f850f06..e4d98ff7e2d 100644 --- a/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json +++ b/CVE-2017/CVE-2017-113xx/CVE-2017-11357.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-08-23T17:29:00.227", "lastModified": "2024-11-21T03:07:38.507", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json b/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json index 1bed909805c..28ec7f1a503 100644 --- a/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json +++ b/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2017-10-04T21:01:00.180", "lastModified": "2024-11-21T03:08:56.070", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json index b604ff4aae5..6c8a01e0edb 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.747", "lastModified": "2024-11-21T03:09:05.157", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json index b7c211dd914..6d9160ff9a1 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12232.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.780", "lastModified": "2024-11-21T03:09:05.340", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json index 2e215e7a6c3..1fa1095bd6a 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.827", "lastModified": "2024-11-21T03:09:05.490", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json index 7c9428a8cd6..65e69ba3289 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.857", "lastModified": "2024-11-21T03:09:05.637", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json index 3b7add068de..d461743b8a0 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12235.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.890", "lastModified": "2024-11-21T03:09:05.773", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json index f779bfad450..190178b5164 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12237.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.967", "lastModified": "2024-11-21T03:09:06.030", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json index 5b152052a24..3edcd71ae23 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12238.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:48.997", "lastModified": "2024-11-21T03:09:06.197", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json index 914a52ae247..cca27eb0b26 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12240.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-29T01:34:49.077", "lastModified": "2024-11-21T03:09:06.497", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json b/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json index 3090bfacc3d..1affffd2984 100644 --- a/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json +++ b/CVE-2017/CVE-2017-123xx/CVE-2017-12319.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-27T09:29:00.280", "lastModified": "2024-11-21T03:09:18.213", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json index fa2cfd7da29..d558b712c8e 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2017-09-19T13:29:00.190", "lastModified": "2024-11-21T03:09:53.973", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json index 30d327b5357..c5aa465daad 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2017-10-04T01:29:02.120", "lastModified": "2024-11-21T03:09:54.273", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json b/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json index 165233cd448..92cd7bfcfd6 100644 --- a/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json +++ b/CVE-2017/CVE-2017-159xx/CVE-2017-15944.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-12-11T17:29:00.490", "lastModified": "2024-11-21T03:15:30.397", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-166xx/CVE-2017-16651.json b/CVE-2017/CVE-2017-166xx/CVE-2017-16651.json index 7cd9cb13e56..a7c18cdbf04 100644 --- a/CVE-2017/CVE-2017-166xx/CVE-2017-16651.json +++ b/CVE-2017/CVE-2017-166xx/CVE-2017-16651.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-11-09T14:29:00.267", "lastModified": "2024-11-21T03:16:45.910", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-175xx/CVE-2017-17562.json b/CVE-2017/CVE-2017-175xx/CVE-2017-17562.json index 7106957e635..93669652699 100644 --- a/CVE-2017/CVE-2017-175xx/CVE-2017-17562.json +++ b/CVE-2017/CVE-2017-175xx/CVE-2017-17562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-12-12T19:29:00.207", "lastModified": "2024-11-21T03:18:10.290", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json b/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json index 3d6611cd8ae..a5f88c6acd0 100644 --- a/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json +++ b/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-02-05T06:29:00.233", "lastModified": "2024-11-21T03:19:56.040", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json b/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json index 68db3676b95..4a57edeb070 100644 --- a/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json +++ b/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-05-02T17:29:00.287", "lastModified": "2024-11-21T03:19:56.860", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json b/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json index 4ae591fe692..e0d50177fda 100644 --- a/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json +++ b/CVE-2017/CVE-2017-35xx/CVE-2017-3506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2017-04-24T19:59:03.037", "lastModified": "2024-11-21T03:25:41.123", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json b/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json index 5ea0a00c82c..cb1af650e0f 100644 --- a/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json +++ b/CVE-2017/CVE-2017-38xx/CVE-2017-3881.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-03-17T22:59:00.640", "lastModified": "2024-11-21T03:26:18.337", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json index 34b1d189673..4030ad4a606 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-04-24T23:59:00.190", "lastModified": "2024-11-21T03:26:53.987", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json index 3ed0809f946..b62480ac6e1 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-10-27T05:29:00.847", "lastModified": "2024-11-21T03:26:59.100", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json b/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json index 5b4c99e041b..eb01f37fbcd 100644 --- a/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json +++ b/CVE-2017/CVE-2017-55xx/CVE-2017-5521.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-01-17T09:59:00.333", "lastModified": "2024-11-21T03:27:48.497", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json b/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json index bd8f4132caa..5beddd15fc9 100644 --- a/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json +++ b/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2017-03-11T02:59:00.150", "lastModified": "2024-11-21T03:28:04.340", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json b/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json index dad86e18f88..22eea4043fb 100644 --- a/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json +++ b/CVE-2017/CVE-2017-56xx/CVE-2017-5689.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2017-05-02T14:59:00.520", "lastModified": "2024-11-21T03:28:13.573", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-60xx/CVE-2017-6077.json b/CVE-2017/CVE-2017-60xx/CVE-2017-6077.json index 907877f5e59..345d37b76f8 100644 --- a/CVE-2017/CVE-2017-60xx/CVE-2017-6077.json +++ b/CVE-2017/CVE-2017-60xx/CVE-2017-6077.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-02-22T23:59:00.190", "lastModified": "2024-11-21T03:29:02.863", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-63xx/CVE-2017-6316.json b/CVE-2017/CVE-2017-63xx/CVE-2017-6316.json index 9115febab62..9a83051b3c0 100644 --- a/CVE-2017/CVE-2017-63xx/CVE-2017-6316.json +++ b/CVE-2017/CVE-2017-63xx/CVE-2017-6316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-07-20T04:29:00.423", "lastModified": "2024-11-21T03:29:33.000", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json b/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json index 9425f3a4b0b..9472f375ffb 100644 --- a/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json +++ b/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@symantec.com", "published": "2017-08-11T20:29:00.207", "lastModified": "2024-11-21T03:29:34.190", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-63xx/CVE-2017-6334.json b/CVE-2017/CVE-2017-63xx/CVE-2017-6334.json index 7145d99beb3..860cef82177 100644 --- a/CVE-2017/CVE-2017-63xx/CVE-2017-6334.json +++ b/CVE-2017/CVE-2017-63xx/CVE-2017-6334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-03-06T02:59:00.433", "lastModified": "2024-11-21T03:29:34.713", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json index d99df3985a3..fb8b0d0094a 100644 --- a/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json +++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6627.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-09-07T21:29:00.660", "lastModified": "2024-11-21T03:30:09.710", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json b/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json index a30dabdbfbf..6df4616d12c 100644 --- a/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json +++ b/CVE-2017/CVE-2017-66xx/CVE-2017-6663.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-08-07T06:29:00.230", "lastModified": "2024-11-21T03:30:15.107", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json index 2bc76ab8563..766a0656fa0 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6736.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.213", "lastModified": "2024-11-21T03:30:24.567", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json index a665ed36ea4..33ee91a9bc9 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6737.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.243", "lastModified": "2024-11-21T03:30:24.723", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json index fbf984ec11e..43b188f739e 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6738.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.290", "lastModified": "2024-11-21T03:30:24.867", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json index ddddbe00196..ec18ff7cfe2 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6739.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.337", "lastModified": "2024-11-21T03:30:25.010", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json index dd81c25391b..a0587e168d1 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6740.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.370", "lastModified": "2024-11-21T03:30:25.140", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json index 583db31b61e..d65a04def83 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6742.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.447", "lastModified": "2024-11-21T03:30:25.427", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json index 41de9673a1d..2270f735806 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6743.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.477", "lastModified": "2024-11-21T03:30:25.573", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json b/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json index e57699d742d..2406b10a182 100644 --- a/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json +++ b/CVE-2017/CVE-2017-67xx/CVE-2017-6744.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2017-07-17T21:29:00.510", "lastModified": "2024-11-21T03:30:25.710", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json b/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json index 6494b95d626..2f9620a905f 100644 --- a/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json +++ b/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "a2826606-91e7-4eb6-899e-8484bd4575d5", "published": "2017-05-26T20:29:00.177", "lastModified": "2024-11-21T03:30:41.180", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json b/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json index 1c7effd27f1..4ad6852c84c 100644 --- a/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json +++ b/CVE-2017/CVE-2017-68xx/CVE-2017-6884.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-04-06T17:59:00.163", "lastModified": "2024-11-21T03:30:43.330", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7269.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7269.json index e11990d4227..67ea9eb6ab8 100644 --- a/CVE-2017/CVE-2017-72xx/CVE-2017-7269.json +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7269.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-03-27T02:59:00.453", "lastModified": "2024-11-21T03:31:30.560", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-74xx/CVE-2017-7494.json b/CVE-2017/CVE-2017-74xx/CVE-2017-7494.json index d131910a0c1..4a28ad66ffc 100644 --- a/CVE-2017/CVE-2017-74xx/CVE-2017-7494.json +++ b/CVE-2017/CVE-2017-74xx/CVE-2017-7494.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2017-05-30T18:29:00.190", "lastModified": "2024-11-21T03:32:00.870", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-82xx/CVE-2017-8291.json b/CVE-2017/CVE-2017-82xx/CVE-2017-8291.json index 82f8d2ca2b9..e3140ea8d01 100644 --- a/CVE-2017/CVE-2017-82xx/CVE-2017-8291.json +++ b/CVE-2017/CVE-2017-82xx/CVE-2017-8291.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-04-27T01:59:02.057", "lastModified": "2024-11-21T03:33:42.733", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-92xx/CVE-2017-9248.json b/CVE-2017/CVE-2017-92xx/CVE-2017-9248.json index dbf403651b7..78fac67d89f 100644 --- a/CVE-2017/CVE-2017-92xx/CVE-2017-9248.json +++ b/CVE-2017/CVE-2017-92xx/CVE-2017-9248.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-07-03T19:29:00.270", "lastModified": "2024-11-21T03:35:40.520", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json b/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json index 06b02b855c2..b5808b7a06f 100644 --- a/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json +++ b/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2017-07-10T16:29:00.277", "lastModified": "2024-11-21T03:36:51.647", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json index b12e856c832..ee78ac97f80 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2017-09-15T19:29:00.237", "lastModified": "2024-11-21T03:36:53.557", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json index a0fb08a4d73..98886457379 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2017-07-20T12:29:00.233", "lastModified": "2024-11-21T03:36:55.967", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json index a2c901b4518..5ae4a9a34c1 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2017-06-27T17:29:00.177", "lastModified": "2024-11-21T03:36:57.930", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json index 1b37fb90d2d..3dd25bfd80f 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-02-08T07:29:00.570", "lastModified": "2024-11-21T03:37:34.360", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json index 0ce1cf46668..0a0eb08f0b8 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0147.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-08T07:29:00.377", "lastModified": "2024-11-21T03:37:36.570", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json index 031f41acd96..32e68be22f0 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0151.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.297", "lastModified": "2024-11-21T03:37:37.053", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json index ee02fd6a538..4d6b2374fca 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.373", "lastModified": "2024-11-21T03:37:37.330", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json index 44e71d77ad3..9df71b53bce 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.420", "lastModified": "2024-11-21T03:37:37.483", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json index 833b67c641c..f0a46c2c1f3 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.467", "lastModified": "2024-11-21T03:37:37.627", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json index 4f38c24be3c..2c5f971ad0c 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.547", "lastModified": "2024-11-21T03:37:37.910", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json index 6cfd9f23d48..2a2bddd1504 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.593", "lastModified": "2024-11-21T03:37:38.063", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json index a0af67692d8..a19c0195850 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.703", "lastModified": "2024-11-21T03:37:38.320", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json index ae58c3044cf..483ef5e478a 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0167.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:00.907", "lastModified": "2024-11-21T03:37:38.867", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json index de9a2909e9d..1d98d5c4769 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.063", "lastModified": "2024-11-21T03:37:39.277", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json index bced22f1758..690a7c35552 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.110", "lastModified": "2024-11-21T03:37:39.413", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json index 9958d71cde3..45887015c4e 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.170", "lastModified": "2024-11-21T03:37:39.563", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json index 370622dd1ac..fe8fbdbd1f1 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.233", "lastModified": "2024-11-21T03:37:39.727", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json index aafb802e647..1cf084765bc 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.280", "lastModified": "2024-11-21T03:37:39.897", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json index a4eb03a75b5..553cba8edda 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0179.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.467", "lastModified": "2024-11-21T03:37:40.420", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json index 355c8b95c63..37b938ecb4c 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.547", "lastModified": "2024-11-21T03:37:40.587", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json b/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json index 5031802bb86..e75cc178951 100644 --- a/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json +++ b/CVE-2018/CVE-2018-02xx/CVE-2018-0296.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-06-07T12:29:00.403", "lastModified": "2024-11-21T03:37:55.227", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json b/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json index 74444e7d7fa..ca6fd00fc20 100644 --- a/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json +++ b/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-12-10T14:29:01.417", "lastModified": "2024-11-21T03:40:31.030", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json b/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json index 326c6492e39..460feeb3836 100644 --- a/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json +++ b/CVE-2018/CVE-2018-105xx/CVE-2018-10561.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-05-04T03:29:00.227", "lastModified": "2024-11-21T03:41:33.423", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json b/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json index 59be2b01ac9..7da25ca65b2 100644 --- a/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json +++ b/CVE-2018/CVE-2018-105xx/CVE-2018-10562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-05-04T03:29:00.287", "lastModified": "2024-11-21T03:41:33.600", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-111xx/CVE-2018-11138.json b/CVE-2018/CVE-2018-111xx/CVE-2018-11138.json index 01cbbf192ae..424c469db49 100644 --- a/CVE-2018/CVE-2018-111xx/CVE-2018-11138.json +++ b/CVE-2018/CVE-2018-111xx/CVE-2018-11138.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-05-31T18:29:00.557", "lastModified": "2024-11-21T03:42:44.063", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json b/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json index f67a2ea22c5..1c2e0cd8181 100644 --- a/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json +++ b/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2018-08-22T13:29:00.753", "lastModified": "2024-11-21T03:44:00.740", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json b/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json index f4f6b647d34..ec97a775aa7 100644 --- a/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json +++ b/CVE-2018/CVE-2018-12xx/CVE-2018-1273.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2018-04-11T13:29:00.290", "lastModified": "2024-11-21T03:59:31.063", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json index 32f0c476938..9d805ac7bb3 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2019-01-22T14:29:00.220", "lastModified": "2024-11-21T03:46:58.687", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json index a42ee6b9af6..b8565eab181 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13379.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2019-06-04T21:29:00.233", "lastModified": "2024-11-21T03:46:59.250", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json index 422ce3356cd..acfa9a9b167 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2019-06-04T21:29:00.373", "lastModified": "2024-11-21T03:46:59.660", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json b/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json index 9d740e94709..3a9c3feb1d0 100644 --- a/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json +++ b/CVE-2018/CVE-2018-133xx/CVE-2018-13383.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2019-05-29T18:29:00.693", "lastModified": "2024-11-21T03:46:59.807", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json b/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json index d26eb6b9306..7f225fbbaa4 100644 --- a/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json +++ b/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-10-30T18:29:00.580", "lastModified": "2024-11-21T03:49:18.470", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-146xx/CVE-2018-14628.json b/CVE-2018/CVE-2018-146xx/CVE-2018-14628.json index 3336cf26a27..ca2338af19a 100644 --- a/CVE-2018/CVE-2018-146xx/CVE-2018-14628.json +++ b/CVE-2018/CVE-2018-146xx/CVE-2018-14628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-17T18:15:10.810", "lastModified": "2024-11-21T03:49:27.463", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json b/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json index 487a8bbd2ca..3f02daaf313 100644 --- a/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json +++ b/CVE-2018/CVE-2018-146xx/CVE-2018-14667.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2018-11-06T22:29:00.193", "lastModified": "2024-11-21T03:49:33.110", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-148xx/CVE-2018-14839.json b/CVE-2018/CVE-2018-148xx/CVE-2018-14839.json index 08ba0abcb2b..d32de3b8b92 100644 --- a/CVE-2018/CVE-2018-148xx/CVE-2018-14839.json +++ b/CVE-2018/CVE-2018-148xx/CVE-2018-14839.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-05-14T21:29:00.247", "lastModified": "2024-11-21T03:49:54.283", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json b/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json index 56b86589eea..ac89026980a 100644 --- a/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json +++ b/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-08-02T07:29:00.280", "lastModified": "2024-11-21T03:49:54.730", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json b/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json index c2c947505de..d2ac1b6ef3c 100644 --- a/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json +++ b/CVE-2018/CVE-2018-151xx/CVE-2018-15133.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-08-09T19:29:00.333", "lastModified": "2024-11-21T03:50:22.720", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json b/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json index 3b64dce9332..e0c2329e0c0 100644 --- a/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json +++ b/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-07-03T17:15:10.110", "lastModified": "2024-11-21T03:51:29.710", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json b/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json index d97ae8cb5a3..88ac5e21e72 100644 --- a/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json +++ b/CVE-2018/CVE-2018-159xx/CVE-2018-15961.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2018-09-25T13:29:01.567", "lastModified": "2024-11-21T03:51:48.683", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-159xx/CVE-2018-15982.json b/CVE-2018/CVE-2018-159xx/CVE-2018-15982.json index 6fc27c4f9eb..23e923eac45 100644 --- a/CVE-2018/CVE-2018-159xx/CVE-2018-15982.json +++ b/CVE-2018/CVE-2018-159xx/CVE-2018-15982.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2019-01-18T17:29:01.573", "lastModified": "2024-11-21T03:51:51.183", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json index 57aae92b719..53722cd6430 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:00.297", "lastModified": "2024-11-21T03:54:28.550", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json index 23a2c8023ff..521ab136c78 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-12-11T16:29:00.623", "lastModified": "2024-11-21T03:54:30.727", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json b/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json index 13b2fb268f7..519ee7204e9 100644 --- a/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json +++ b/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-07-03T17:15:10.250", "lastModified": "2024-11-21T03:55:42.947", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json b/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json index 1aefd983187..b8935f6eefc 100644 --- a/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json +++ b/CVE-2018/CVE-2018-188xx/CVE-2018-18809.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@tibco.com", "published": "2019-03-07T22:29:00.323", "lastModified": "2024-11-21T03:56:39.727", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json index 2463927fe65..9051c821bb7 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.493", "lastModified": "2024-11-21T03:57:43.017", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json index fab859b3bb6..9261c551330 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.573", "lastModified": "2024-11-21T03:57:43.190", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json index 05181cae342..055349b9e08 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.650", "lastModified": "2024-11-21T03:57:43.340", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json index 678ceb13b03..f54ee8d8eef 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.730", "lastModified": "2024-11-21T03:57:43.510", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json b/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json index 02584c086bf..8c4263a129a 100644 --- a/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json +++ b/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-12-11T18:29:00.197", "lastModified": "2024-11-21T04:00:49.783", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json b/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json index c4ae34186e4..f6406d9c915 100644 --- a/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json +++ b/CVE-2018/CVE-2018-202xx/CVE-2018-20250.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@checkpoint.com", "published": "2019-02-05T20:29:00.243", "lastModified": "2024-11-21T04:01:10.173", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json b/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json index 3291053d9f4..23bbaccee31 100644 --- a/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json +++ b/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2019-02-05T06:29:00.593", "lastModified": "2024-11-21T04:02:05.987", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json b/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json index a5120a73c99..4913ce740db 100644 --- a/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json +++ b/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2018-03-01T17:29:00.413", "lastModified": "2024-11-21T04:03:42.830", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25106.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25106.json index f236ec3e71d..d8388b4ef23 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25106.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-23T23:15:05.720", "lastModified": "2024-12-23T23:15:05.720", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25108.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25108.json index ab062b7502e..718fcd62010 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25108.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25108.json @@ -3,7 +3,7 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2025-01-16T11:15:06.850", "lastModified": "2025-01-16T11:15:06.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json b/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json index 690c38f7ab5..c428e61e9e6 100644 --- a/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json +++ b/CVE-2018/CVE-2018-26xx/CVE-2018-2628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-04-19T02:29:00.457", "lastModified": "2024-11-21T04:04:05.160", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json b/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json index 067883c9fd8..f3da4901547 100644 --- a/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json +++ b/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:09.173", "lastModified": "2024-11-21T04:07:14.067", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json b/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json index 95d92987672..c1abcd5437c 100644 --- a/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json +++ b/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2018-02-06T21:29:00.347", "lastModified": "2024-11-21T04:07:37.703", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json b/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json index 61ca3c8cb79..cb0081602d3 100644 --- a/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json +++ b/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2018-05-19T17:29:01.480", "lastModified": "2024-11-21T04:07:45.160", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json b/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json index f8562b0e798..d3f27817a69 100644 --- a/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json +++ b/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2018-07-09T19:29:03.327", "lastModified": "2024-11-21T04:07:51.767", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json b/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json index db5ffae6437..fe63b602af0 100644 --- a/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json +++ b/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2018-07-09T19:29:03.750", "lastModified": "2024-11-21T04:07:53.737", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json b/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json index a689ca8e7cf..93f7e6c7602 100644 --- a/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json +++ b/CVE-2018/CVE-2018-54xx/CVE-2018-5430.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@tibco.com", "published": "2018-04-17T18:29:00.293", "lastModified": "2024-11-21T04:08:47.187", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json b/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json index b26d4b2ba5a..1710db2c44f 100644 --- a/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json +++ b/CVE-2018/CVE-2018-60xx/CVE-2018-6065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:01.250", "lastModified": "2024-11-21T04:09:59.423", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json b/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json index 3ab2278eef5..a92141c0db6 100644 --- a/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json +++ b/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.987", "lastModified": "2024-11-21T04:10:50.700", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json b/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json index a366e855694..4bdf9ee0d85 100644 --- a/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json +++ b/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-02-08T23:29:01.170", "lastModified": "2024-11-21T04:11:12.213", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json b/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json index fb1f00a1ce0..72663b99a82 100644 --- a/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json +++ b/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-27T16:29:00.530", "lastModified": "2024-11-21T04:11:21.710", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json b/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json index c852547225e..b2775a0d602 100644 --- a/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json +++ b/CVE-2018/CVE-2018-69xx/CVE-2018-6961.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2018-06-11T22:29:00.230", "lastModified": "2024-11-21T04:11:29.293", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json b/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json index b8973d9f2d7..4da1ec74574 100644 --- a/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json +++ b/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2018-03-19T21:29:01.083", "lastModified": "2024-11-21T04:12:09.040", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json b/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json index e96a5602df0..6f5bd3e4785 100644 --- a/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json +++ b/CVE-2018/CVE-2018-76xx/CVE-2018-7600.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2018-03-29T07:29:00.260", "lastModified": "2024-11-21T04:12:25.880", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json b/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json index be3bbf27fd0..3948740027f 100644 --- a/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json +++ b/CVE-2018/CVE-2018-76xx/CVE-2018-7602.json @@ -3,7 +3,7 @@ "sourceIdentifier": "mlhess@drupal.org", "published": "2018-07-19T17:29:00.373", "lastModified": "2024-11-21T04:12:26.023", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json b/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json index 75a219179dc..e1110e0b3bc 100644 --- a/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json +++ b/CVE-2018/CVE-2018-78xx/CVE-2018-7841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2019-05-22T20:29:01.480", "lastModified": "2024-11-21T04:12:51.587", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json b/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json index f11fd11fa46..7a7b06a9f22 100644 --- a/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json +++ b/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2019-08-01T14:15:13.113", "lastModified": "2024-11-21T04:16:27.287", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json b/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json index af0298a7a99..2bc4b2bafe7 100644 --- a/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json +++ b/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2019-04-08T22:29:00.387", "lastModified": "2024-11-21T04:16:29.640", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json b/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json index b51bd3c3a64..0118569b825 100644 --- a/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json +++ b/CVE-2019/CVE-2019-03xx/CVE-2019-0344.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2019-08-14T14:15:16.463", "lastModified": "2024-11-21T04:16:42.990", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json b/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json index f62bc965b81..d67ada47ae9 100644 --- a/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json +++ b/CVE-2019/CVE-2019-07xx/CVE-2019-0708.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-05-16T19:29:00.427", "lastModified": "2024-11-21T04:17:08.487", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json index 059f061fbb2..bbcbd7fe70d 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T03:29:00.873", "lastModified": "2024-11-21T04:17:19.013", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json index f9a36dde8ea..916950e5b1c 100644 --- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json +++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json @@ -3,7 +3,7 @@ "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-03-08T21:29:00.297", "lastModified": "2024-11-21T04:17:46.197", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json b/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json index e3520705449..d90c832cccf 100644 --- a/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json +++ b/CVE-2019/CVE-2019-193xx/CVE-2019-19300.json @@ -87,7 +87,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-128xx/CVE-2020-12819.json b/CVE-2020/CVE-2020-128xx/CVE-2020-12819.json index 9ed6ce34a62..f222cbd6dff 100644 --- a/CVE-2020/CVE-2020-128xx/CVE-2020-12819.json +++ b/CVE-2020/CVE-2020-128xx/CVE-2020-12819.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T08:15:11.770", "lastModified": "2024-12-19T08:15:11.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-128xx/CVE-2020-12820.json b/CVE-2020/CVE-2020-128xx/CVE-2020-12820.json index fa4f3f11614..466d53fd9b5 100644 --- a/CVE-2020/CVE-2020-128xx/CVE-2020-12820.json +++ b/CVE-2020/CVE-2020-128xx/CVE-2020-12820.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T11:15:05.700", "lastModified": "2024-12-19T11:15:05.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-159xx/CVE-2020-15934.json b/CVE-2020/CVE-2020-159xx/CVE-2020-15934.json index 18e17ba0dda..42891daaf78 100644 --- a/CVE-2020/CVE-2020-159xx/CVE-2020-15934.json +++ b/CVE-2020/CVE-2020-159xx/CVE-2020-15934.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T11:15:06.930", "lastModified": "2024-12-19T11:15:06.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36774.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36774.json index 0bcf15d3093..6dc6b181f8b 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36774.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36774.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-19T02:15:47.690", "lastModified": "2024-11-21T05:30:16.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-80xx/CVE-2020-8094.json b/CVE-2020/CVE-2020-80xx/CVE-2020-8094.json index b73dd3c2e08..0b391738499 100644 --- a/CVE-2020/CVE-2020-80xx/CVE-2020-8094.json +++ b/CVE-2020/CVE-2020-80xx/CVE-2020-8094.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2025-01-15T17:15:09.810", "lastModified": "2025-01-15T17:15:09.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability in testinitsigs.exe as used in Bitdefender Antivirus Free 2020 allows a low-privilege attacker to execute code as SYSTEM via a specially crafted DLL file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de ruta de b\u00fasqueda no confiable en testinitsigs.exe, tal como se usa en Bitdefender Antivirus Free 2020, permite que un atacante con bajos privilegios ejecute c\u00f3digo como SYSTEM a trav\u00e9s de un archivo DLL especialmente manipulado." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-260xx/CVE-2021-26093.json b/CVE-2021/CVE-2021-260xx/CVE-2021-26093.json index 0749e80cd4d..48ddf564cda 100644 --- a/CVE-2021/CVE-2021-260xx/CVE-2021-26093.json +++ b/CVE-2021/CVE-2021-260xx/CVE-2021-26093.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T08:15:14.717", "lastModified": "2024-12-19T08:15:14.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-261xx/CVE-2021-26102.json b/CVE-2021/CVE-2021-261xx/CVE-2021-26102.json index 2bb8b13ace5..de42620fe8d 100644 --- a/CVE-2021/CVE-2021-261xx/CVE-2021-26102.json +++ b/CVE-2021/CVE-2021-261xx/CVE-2021-26102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T14:15:05.380", "lastModified": "2024-12-19T14:15:05.380", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-261xx/CVE-2021-26115.json b/CVE-2021/CVE-2021-261xx/CVE-2021-26115.json index ba0543f983d..6ade4919ed1 100644 --- a/CVE-2021/CVE-2021-261xx/CVE-2021-26115.json +++ b/CVE-2021/CVE-2021-261xx/CVE-2021-26115.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T11:15:07.103", "lastModified": "2024-12-19T11:15:07.103", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json b/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json index 992789eb57a..5e32bda5d77 100644 --- a/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json +++ b/CVE-2021/CVE-2021-296xx/CVE-2021-29669.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-12T02:15:18.750", "lastModified": "2025-01-12T02:15:18.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Jazz Foundation 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Jazz Foundation 6.0.6, 6.0.6.1, 7.0, 7.0.1 y 7.0.2 es vulnerable a ataques de Cross Site Scripting. Esta vulnerabilidad permite a los usuarios incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-324xx/CVE-2022-32427.json b/CVE-2022/CVE-2022-324xx/CVE-2022-32427.json index dbc3de577fa..108f1f034c6 100644 --- a/CVE-2022/CVE-2022-324xx/CVE-2022-32427.json +++ b/CVE-2022/CVE-2022-324xx/CVE-2022-32427.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2022-08-25T02:15:19.660", "lastModified": "2024-11-21T07:06:21.367", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json index d60137ecd60..29642d5f5a7 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-03-12T19:15:47.303", "lastModified": "2024-11-21T07:09:17.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json index 91813acfa84..3fde61b525f 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:19.087", "lastModified": "2024-12-28T07:15:19.087", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48624.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48624.json index 2b08fb3cc02..7dab8c46364 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48624.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-19T01:15:48.643", "lastModified": "2024-11-21T07:33:37.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json index 79587385278..8676aab6260 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:13.793", "lastModified": "2024-11-21T07:44:14.717", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json index 2bc5c3f59e1..e0212ac3a89 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23775.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-11T15:15:53.723", "lastModified": "2024-11-21T07:46:48.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24460.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24460.json index 5ccad08acb3..fcb16adc852 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24460.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24460.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:50.797", "lastModified": "2024-11-21T07:47:54.477", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json index 6da56e78fb7..3e856859a9e 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-06-20T07:15:41.340", "lastModified": "2024-11-21T07:49:51.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json index 66929f20607..dc0e78aefcc 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28831.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35192.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35192.json index bf357028206..ed5885e9e31 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35192.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35192.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:52.107", "lastModified": "2024-11-21T08:08:07.917", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json index 7eff39fb6b4..46170b5b7f8 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-20T14:15:08.183", "lastModified": "2024-11-21T08:08:55.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37929.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37929.json index c9d5b0e3e56..bc06813fc4d 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37929.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37929.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-05-21T02:15:08.470", "lastModified": "2024-11-21T08:12:29.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37931.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37931.json index a2f5a456537..2058f59464b 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37931.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37931.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:26.623", "lastModified": "2025-01-14T15:15:11.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an sql command ('sql injection') vulnerability [CWE-88] in FortiVoice Entreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to perform a blind sql injection attack via sending crafted HTTP or HTTPS requests" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('inyecci\u00f3n SQL') [CWE-88] en FortiVoice Entreprise versi\u00f3n 7.0.0 a 7.0.1 y anteriores a 6.4.8 permite que un atacante autenticado realice un ataque de inyecci\u00f3n Blind SQL mediante el env\u00edo de solicitudes HTTP o HTTPS manipulado" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37936.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37936.json index 25943987c14..38032a39683 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37936.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37936.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:26.790", "lastModified": "2025-01-14T14:15:26.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests." + }, + { + "lang": "es", + "value": "El uso de una clave criptogr\u00e1fica codificada en Fortinet FortiSwitch versi\u00f3n 7.4.0 y 7.2.0 a 7.2.5 y 7.0.0 a 7.0.7 y 6.4.0 a 6.4.13 y 6.2.0 a 6.2.7 y 6.0.0 a 6.0.7 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37937.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37937.json index e5ef9c7319c..9477e14501e 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37937.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37937.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:26.940", "lastModified": "2025-01-14T14:15:26.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via the FortiSwitch CLI." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiSwitch versi\u00f3n 7.4.0 y 7.2.0 a 7.2.5 y 7.0.0 a 7.0.7 y 6.4.0 a 6.4.13 y 6.2.0 a 6.2.7 y 6.0.0 a 6.0.7 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de la CLI de FortiSwitch." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39469.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39469.json index 481202918b7..2cc2e91e64e 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39469.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:12.730", "lastModified": "2024-11-21T08:15:29.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40071.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40071.json index f47f57dbe06..7af4313628d 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40071.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40071.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:53.847", "lastModified": "2024-11-21T08:18:42.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41014.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41014.json index d5166e60317..f373e12ea3c 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41014.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T09:15:38.157", "lastModified": "2024-11-21T08:20:24.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41842.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41842.json index d8045e399f3..cba5652f49c 100644 --- a/CVE-2023/CVE-2023-418xx/CVE-2023-41842.json +++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41842.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-03-12T15:15:45.920", "lastModified": "2024-11-21T08:21:46.927", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41961.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41961.json index d039ae9a64b..19d07fbf824 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41961.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41961.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:55.113", "lastModified": "2024-11-21T08:21:59.810", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json index 1fd108c0f5c..68292248fee 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42225.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.493", "lastModified": "2025-01-13T22:15:10.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the Attachment/DownloadTempFile function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Directory Traversal a trav\u00e9s de la funci\u00f3n Attachment/DownloadTempFile." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json index 9992e8a7346..6b0b549bc5b 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42226.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.620", "lastModified": "2025-01-13T22:15:10.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via Email/SaveAttachment function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Directory Traversal a trav\u00e9s de la funci\u00f3n Email/SaveAttachment." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json index f824ae1b3db..b14288eeab6 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42227.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.770", "lastModified": "2025-01-13T22:15:10.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the WSCView/Save function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Directory Traversal a trav\u00e9s de la funci\u00f3n WSCView/Save." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json index e214827e2b2..34e5a5bece5 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42228.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.887", "lastModified": "2025-01-13T22:15:10.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Incorrect Access Control. Low privileged users can edit their own ACL rules by sending a request to the \"AclList/SaveAclRules\" administrative function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a un control de acceso incorrecto. Los usuarios con pocos privilegios pueden editar sus propias reglas de ACL enviando una solicitud a la funci\u00f3n administrativa \"AclList/SaveAclRules\"." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json index 9518278a6d5..753e5b09363 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42229.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:10.993", "lastModified": "2025-01-13T22:15:10.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal. Arbitrary files can be created on the system via authenticated SOAP requests to the WSConnector service." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Directory Traversal. Se pueden crear archivos arbitrarios en sistema mediante solicitudes SOAP autenticadas al servicio WSConnector." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json index dc71b204b6f..1e7854bea17 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42230.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.110", "lastModified": "2025-01-14T15:15:11.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json index d198feb6eac..a5005d48519 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42231.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.233", "lastModified": "2025-01-13T22:15:11.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Incorrect Access Control. Low privileged users can delete admin users by sending a request to the \"WSCView/Delete\" function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a un control de acceso incorrecto. Los usuarios con pocos privilegios pueden eliminar usuarios administradores enviando una solicitud a la funci\u00f3n \"WSCView/Delete\"." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json index 79d3ee7b1b4..8bc66704d2d 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42232.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.353", "lastModified": "2025-01-13T22:15:11.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the Navigator/Index function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Directory Traversal a trav\u00e9s de la funci\u00f3n Navigator/Index." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json index 093b46d1dce..03d278802b4 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42233.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.480", "lastModified": "2025-01-14T15:15:12.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json index d4f7e03cf81..dc7579df734 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.593", "lastModified": "2025-01-13T22:15:11.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Request Forgery (CSRF) via the WSCView function." + }, + { + "lang": "es", + "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Cross Site Request Forgery (CSRF) a trav\u00e9s de la funci\u00f3n WSCView." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json index 6ba32171899..8c288cc3102 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42235.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.717", "lastModified": "2025-01-13T22:15:11.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple parameters of /monitor/s_normalizedtrans.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en varios par\u00e1metros de /monitor/s_normalizedtrans.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json index d410c155fcd..23e266725e9 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42236.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.830", "lastModified": "2025-01-13T22:15:11.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /common/ajaxfunction.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en un par\u00e1metro GET de /common/ajaxfunction.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json index 264c5689d86..2cb1595dcdf 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42237.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.953", "lastModified": "2025-01-13T22:15:11.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple GET parameters of /vam/vam_i_command.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en varios par\u00e1metros GET de /vam/vam_i_command.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json index 3053e43550d..abec754f9cd 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42238.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.080", "lastModified": "2025-01-13T22:15:12.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_eps.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en varios par\u00e1metros POST de /vam/vam_eps.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json index a76a0e4d2f3..622a045fccc 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42239.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.197", "lastModified": "2025-01-13T22:15:12.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_ep.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en varios par\u00e1metros POST de /vam/vam_ep.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json index 5466bf50d63..bb1d702249d 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42240.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.327", "lastModified": "2025-01-13T22:15:12.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /monitor/s_scheduledfile.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en varios par\u00e1metros POST de /monitor/s_scheduledfile.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json index f50daa2370f..4e5284b39fa 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42241.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.450", "lastModified": "2025-01-13T22:15:12.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_anagraphic.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en varios par\u00e1metros POST de /vam/vam_anagraphic.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json index e1ba8cd639a..e097fec6548 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42242.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.583", "lastModified": "2025-01-13T22:15:12.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /monitor/s_terminal.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede realizar una inyecci\u00f3n SQL en un par\u00e1metro GET de /monitor/s_terminal.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json index 98cdabae4eb..7e1381fddbe 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42243.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.690", "lastModified": "2025-01-13T22:15:12.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Selesta Visual Access Manager < 4.42.2, an authenticated user can access the administrative page /common/vam_Sql.php, which allows for arbitrary SQL queries." + }, + { + "lang": "es", + "value": "En Selesta Visual Access Manager < 4.42.2, un usuario autenticado puede acceder a la p\u00e1gina administrativa /common/vam_Sql.php, que permite realizar consultas SQL arbitrarias." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json index cf899f2d3f9..3c9ecbb1019 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42244.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.810", "lastModified": "2025-01-14T17:15:11.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json index c8bccea136c..b551f697701 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42245.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:12.950", "lastModified": "2025-01-14T15:15:12.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json index 6045b979e34..729f2a7d171 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42246.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.057", "lastModified": "2025-01-14T15:15:12.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json index eb58a28398a..7ddf5cbb493 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42247.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.177", "lastModified": "2025-01-14T15:15:12.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json index 82d87315a43..0bf9cab77f0 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42248.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.293", "lastModified": "2025-01-13T22:15:13.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page \"common/vam_Sql.php\"." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Selesta Visual Access Manager (VAM) anterior a la versi\u00f3n 4.42.2. Un atacante autenticado puede escribir archivos arbitrarios manipulando los par\u00e1metros POST de la p\u00e1gina \"common/vam_Sql.php\"." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json index 760288dac69..d1a5001f4eb 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.413", "lastModified": "2025-01-14T15:15:12.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json index c04a05f61f1..8cf234abafb 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42250.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:13.557", "lastModified": "2025-01-14T15:15:12.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json b/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json index af91ffda634..9a0c13913f1 100644 --- a/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json +++ b/CVE-2023/CVE-2023-423xx/CVE-2023-42307.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:55.703", "lastModified": "2024-11-21T08:22:25.240", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43489.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43489.json index 6a5ecd24261..cc674abc227 100644 --- a/CVE-2023/CVE-2023-434xx/CVE-2023-43489.json +++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43489.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:14.283", "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43629.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43629.json index 4dac26e50c5..96824c1be3d 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43629.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43629.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:56.147", "lastModified": "2024-11-21T08:24:30.083", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43748.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43748.json index 0f1763a21aa..8921d5875dc 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43748.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43748.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:56.580", "lastModified": "2024-11-21T08:24:42.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json index 0f840e5326f..03d7ceefbff 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:06.850", "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json index 578120b9e29..bc1a438aaaa 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45705.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2024-03-28T15:15:45.590", "lastModified": "2024-11-21T08:27:14.847", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45743.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45743.json index 5c3d70d2e24..5cb2fdf4b89 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45743.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45743.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:15:58.297", "lastModified": "2024-11-21T08:27:17.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46715.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46715.json index 2940a9b064a..0babeceb480 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46715.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46715.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:27.387", "lastModified": "2025-01-14T14:15:27.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An origin validation error [CWE-346] vulnerability in Fortinet FortiOS IPSec VPN version 7.4.0 through 7.4.1 and version 7.2.6 and below allows an authenticated IPSec VPN user with dynamic IP addressing to send (but not receive) packets spoofing the IP of another user via crafted network packets." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de error de validaci\u00f3n de origen [CWE-346] en Fortinet FortiOS IPSec VPN versi\u00f3n 7.4.0 a 7.4.1 y versi\u00f3n 7.2.6 y anteriores permite que un usuario de IPSec VPN autenticado con direcci\u00f3n IP din\u00e1mica env\u00ede (pero no reciba) paquetes que falsifican la IP de otro usuario a trav\u00e9s de paquetes de red manipulados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4626.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4626.json index 7fbae06f887..c8215cd632a 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4626.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4626.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T10:15:06.903", "lastModified": "2024-11-21T08:35:34.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json index fbd4f89beb4..4d7e687b329 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:10.853", "lastModified": "2024-11-21T08:29:54.607", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json index 9a876732bc5..9cd26c73ec4 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:31.253", "lastModified": "2024-12-09T13:15:31.253", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json index 5e6c14ab36c..826139902b4 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-02-27T17:15:11.300", "lastModified": "2024-11-21T08:36:56.310", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json index 43744ddc8f8..a1f24b6d007 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.207", "lastModified": "2024-11-21T08:37:25.820", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json index faf3aed63a4..020aff10954 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50886.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T15:15:08.107", "lastModified": "2024-11-21T08:37:28.667", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json index 2a234755c15..be83fd3ecba 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50898.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T15:15:08.330", "lastModified": "2024-11-21T08:37:30.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json index 19869c4a7ea..2d19b38de58 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51369.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T15:15:08.533", "lastModified": "2024-11-21T08:37:58.080", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json index f4dd7917d5d..eb9fa2fbafe 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51522.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T15:15:08.783", "lastModified": "2024-11-21T08:38:18.120", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json index 7f261c51499..57042ecbc22 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T17:15:08.150", "lastModified": "2025-01-08T17:01:20.007", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6397.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6397.json index b1ade00bc09..0e02b65c860 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6397.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6397.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-02-20T02:15:48.793", "lastModified": "2024-11-21T08:43:46.697", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6398.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6398.json index b6aa20651c2..2bbbfc90bf3 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6398.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6398.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-02-20T02:15:49.110", "lastModified": "2024-11-21T08:43:46.823", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6399.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6399.json index 9c1058fcaf3..77dcddaea49 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6399.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-02-20T02:15:49.407", "lastModified": "2024-11-21T08:43:46.957", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6764.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6764.json index 5b9c738ffc7..f2c8557fbeb 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6764.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6764.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-02-20T03:15:07.870", "lastModified": "2024-11-21T08:44:30.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6809.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6809.json index c1b60074d0e..319cf44eb68 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6809.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6809.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:08.640", "lastModified": "2024-11-21T08:44:36.137", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6825.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6825.json index 90b72ff40e3..02c5cbf9fd9 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6825.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6825.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:08.850", "lastModified": "2024-11-21T08:44:37.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6880.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6880.json index 1ace231f2c6..a8d04d5b87c 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6880.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6880.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.093", "lastModified": "2024-11-21T08:44:44.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6954.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6954.json index b9765816990..a14aee515a2 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6954.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.300", "lastModified": "2024-11-21T08:44:54.690", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json index 740a1748b18..54f19500843 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.517", "lastModified": "2024-11-21T08:44:55.140", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json index f26a6cebe15..d8d64e5ef8e 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.273", "lastModified": "2024-11-21T08:44:56.290", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json index 5f65f6a7470..50c99f1af0b 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.457", "lastModified": "2024-11-21T08:44:56.537", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6969.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6969.json index 66da28b83c7..e265cbf72f5 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6969.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6969.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.703", "lastModified": "2024-11-21T08:44:56.793", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json index 72b44743845..40f92245ad1 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.820", "lastModified": "2024-11-21T08:45:00.187", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json index f93256ddba2..1de5eb2bee3 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T23:15:46.267", "lastModified": "2024-11-21T08:45:11.407", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json index 2ae16aec5db..2bce15fbce8 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7263.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:19.580", "lastModified": "2024-12-28T07:15:19.580", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0203.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0203.json index 75aee00905d..a309810191f 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0203.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T20:15:50.293", "lastModified": "2024-11-21T08:46:03.503", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json index bda8cf88502..fbaf76821b2 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0311.json @@ -3,7 +3,7 @@ "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-03-14T09:15:46.580", "lastModified": "2024-11-21T08:46:17.950", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json index 37941abb1b5..9992a23992f 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0312.json @@ -3,7 +3,7 @@ "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-03-14T09:15:46.943", "lastModified": "2024-11-21T08:46:18.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json index ad993d6ff03..cddad3b9050 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0313.json @@ -3,7 +3,7 @@ "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-03-14T09:15:47.153", "lastModified": "2024-11-21T08:46:18.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json index 47151abfe2c..0e68728ae37 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T14:40:29.537", "lastModified": "2024-11-21T08:46:36.333", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json index 25614abb39f..060ad86613f 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0591.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:11.917", "lastModified": "2024-11-21T08:46:57.577", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json index e11445c5790..13c697145c7 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.147", "lastModified": "2024-11-21T08:46:57.690", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json index 66c61edc50e..ffae7e06df5 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0610.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-17T08:15:07.680", "lastModified": "2024-11-21T08:46:59.760", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0614.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0614.json index 94d6f4faf06..616da58b479 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0614.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0614.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.357", "lastModified": "2024-11-21T08:47:00.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0631.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0631.json index 68b1dfd0662..3a4ec7b776f 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0631.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:12.573", "lastModified": "2024-11-21T08:47:02.477", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0692.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0692.json index a5c66a3c302..f04ac4264e4 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0692.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0692.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-03-01T09:15:09.600", "lastModified": "2024-11-21T08:47:09.630", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json index f550cd79669..53acc0bc122 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-03-02T22:15:49.813", "lastModified": "2024-11-21T08:47:23.423", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json index ff828db7266..5de463a1c96 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0815", "sourceIdentifier": "security@huntr.dev", "published": "2024-03-07T04:15:07.143", - "lastModified": "2024-11-21T08:47:26.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:23:10.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paddlepaddle:paddlepaddle:2.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F71F54C3-4868-476D-B0D8-D5E0FEE9FE63" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0816.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0816.json index b55c1e71e0a..1ef0388a3c7 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0816.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-05-21T02:15:08.743", "lastModified": "2024-11-21T08:47:26.190", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json index 93b5ffe61d4..3bc6f4a2e7a 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0817", "sourceIdentifier": "security@huntr.dev", "published": "2024-03-07T02:15:51.660", - "lastModified": "2024-11-21T08:47:26.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:26:02.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paddlepaddle:paddlepaddle:2.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F71F54C3-4868-476D-B0D8-D5E0FEE9FE63" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json index 42297b3cac1..f8849553d52 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0818.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-03-07T13:15:07.203", "lastModified": "2024-11-21T08:47:26.437", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json index 3c35702b121..7b33875f4cc 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0860.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-14T21:15:50.640", "lastModified": "2024-11-21T08:47:31.523", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0917.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0917.json index cbba85c695e..b804b19bc6b 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0917.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0917.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-03-07T09:15:38.527", "lastModified": "2024-11-21T08:47:44.103", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10253.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10253.json index 5260938daa9..098654d303e 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10253.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10253.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2025-01-14T22:15:25.920", "lastModified": "2025-01-14T22:15:25.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential TOCTOU vulnerability was reported in PC Manager, Lenovo Browser, and Lenovo App Store that could allow a local attacker to cause a system crash." + }, + { + "lang": "es", + "value": " Se inform\u00f3 de una posible vulnerabilidad TOCTOU en PC Manager, Lenovo Browser y Lenovo App Store que podr\u00eda permitir que un atacante local provoque un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10254.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10254.json index 8ad08f68b6b..27f425a8499 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10254.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10254.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2025-01-14T22:15:26.110", "lastModified": "2025-01-14T22:15:26.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential buffer overflow vulnerability was reported in PC Manager, Lenovo Browser, and Lenovo App Store that could allow a local attacker to cause a system crash." + }, + { + "lang": "es", + "value": " Se inform\u00f3 de una posible vulnerabilidad de desbordamiento de b\u00fafer en PC Manager, Lenovo Browser y Lenovo App Store que podr\u00eda permitir que un atacante local provoque un bloqueo del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10284.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10284.json index 6ae027f8154..dcbaa1c578d 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10284.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10284.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-09T03:15:03.943", "lastModified": "2024-11-12T13:56:54.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10285.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10285.json index 63eb56d0ad6..5bb52f106ef 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10285.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-09T03:15:04.410", "lastModified": "2024-11-12T13:56:54.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json index 80dcaeaef15..ba4e6aa014b 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10294.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-09T03:15:04.647", "lastModified": "2024-11-12T13:56:54.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json index 842e80fb24b..73ba090d72b 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T08:15:12.330", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json index d384097961c..137244af94c 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.797", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10388.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10388.json index 25ba4f02988..0f90d95d42c 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10388.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10388.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-19T08:15:16.293", "lastModified": "2024-11-19T21:57:32.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10497.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10497.json index f198dda3c8b..8221ade5e33 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10497.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10497.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T11:15:06.980", "lastModified": "2025-01-17T11:15:06.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10498.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10498.json index fbd1d1ff067..f29e3bcbc8f 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10498.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10498.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T11:15:08.340", "lastModified": "2025-01-17T11:15:08.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10508.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10508.json index 3fdabd5b2c1..e58812d79a9 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10508.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10508.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-09T08:15:02.920", "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10630.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10630.json index ada18f8da8b..7d18dbbb840 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10630.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10630.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T17:15:13.857", "lastModified": "2025-01-14T17:15:13.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition in Ivanti Application Control Engine before version 10.14.4.0 allows a local authenticated attacker to bypass the application blocking functionality." + }, + { + "lang": "es", + "value": "Una condici\u00f3n de ejecuci\u00f3n en Ivanti Application Control Engine anterior a la versi\u00f3n 10.14.4.0 permite que un atacante autenticado local omita la funcionalidad de bloqueo de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10775.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10775.json index 0a5b5fa13db..7e694c95ad8 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10775.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10775.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T10:15:07.030", "lastModified": "2025-01-15T10:15:07.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.4.32 via the 'pafe-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento Piotnet Addons For Elementor para WordPress es vulnerable a la exposici\u00f3n de la informaci\u00f3n en todas las versiones hasta la 2.4.32 incluida a trav\u00e9s del c\u00f3digo corto 'pafe-template' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas o borradores creadas por Elementor a las que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10789.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10789.json index fa04cd0412e..60bb189c324 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10789.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10789.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T04:15:08.127", "lastModified": "2025-01-16T04:15:08.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP User Profile Avatar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.5. This is due to missing or incorrect nonce validation on the wpupa_user_admin() function. This makes it possible for unauthenticated attackers to update the plugins setting which controls access to the functionality via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP User Profile Avatar para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.0.5 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n wpupa_user_admin(). Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del complemento que controla el acceso a la funcionalidad a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10799.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10799.json index 66b4f78182a..8bd826bf228 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10799.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10799.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T06:15:14.847", "lastModified": "2025-01-17T06:15:14.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Eventer plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.9.7 via the eventer_woo_download_tickets() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": " El complemento Eventer para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 3.9.7 incluida a trav\u00e9s de la funci\u00f3n eventer_woo_download_tickets(). Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10811.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10811.json index 30fd44d6079..0a752972a59 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10811.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10811.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T17:15:14.007", "lastModified": "2025-01-14T17:15:14.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information." + }, + { + "lang": "es", + "value": "Absolute Path Traversal en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10970.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10970.json index 453e529a224..4e80cad2661 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10970.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10970.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T02:15:26.857", "lastModified": "2025-01-16T02:15:26.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Motors \u2013 Car Dealer, Classifieds & Listing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.4.43. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento The Motors \u2013 Car Dealer, Classifieds & Listing para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta la 1.4.43 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1058.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1058.json index e461fecd044..cadf7fdd694 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1058.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1058", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:38.890", - "lastModified": "2024-11-21T08:49:42.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:44:46.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,49 +36,129 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siteorigin:siteorigin_widgets_bundle:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.58.4", + "matchCriteriaId": "76C9D852-31BC-4A3A-A509-2124A39E3755" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.58.2/widgets/button/tpl/default.php#L22", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.58.3/base/base.php#L404", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3031864%40so-widgets-bundle%2Ftrunk&old=3027675%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3033967%40so-widgets-bundle%2Ftrunk&old=3031864%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffeb766f-3684-4eec-bacb-bbf0d434aba0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.58.2/widgets/button/tpl/default.php#L22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.58.3/base/base.php#L404", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3031864%40so-widgets-bundle%2Ftrunk&old=3027675%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3033967%40so-widgets-bundle%2Ftrunk&old=3031864%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffeb766f-3684-4eec-bacb-bbf0d434aba0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1070.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1070.json index 9e415ddd2e4..1ff3c2f3751 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1070.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1070.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1070", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:39.110", - "lastModified": "2024-11-21T08:49:43.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:47:09.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siteorigin:siteorigin_widgets_bundle:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.58.3", + "matchCriteriaId": "9F000732-AA0B-403E-84F8-C1CB8A035A60" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/widgets/features/tpl/default.php#L26", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3031864%40so-widgets-bundle%2Ftrunk&old=3027675%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b6dafb-7b2f-4459-95bd-eb7e147a4466?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/widgets/features/tpl/default.php#L26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3031864%40so-widgets-bundle%2Ftrunk&old=3027675%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b6dafb-7b2f-4459-95bd-eb7e147a4466?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11029.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11029.json index a9c1c758979..5f066693c7c 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11029.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11029.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-15T13:15:08.940", "lastModified": "2025-01-15T14:15:27.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11069.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11069.json index 5c6df52205f..7140af49046 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11069.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-11-19T08:15:16.577", "lastModified": "2024-11-19T21:57:32.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11128.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11128.json index 68eeec8e2d4..25fa85e2f2f 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11128.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11128.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2025-01-13T22:15:13.680", "lastModified": "2025-01-13T22:15:13.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the BitdefenderVirusScanner binary as used in\u00a0Bitdefender Virus Scanner for MacOS may allow .dynamic library injection\u00a0(DYLD injection) without being blocked by AppleMobileFileIntegrity (AMFI). This issue is caused by the absence of Hardened Runtime or Library Validation signing. This issue affects Bitdefender Virus Scanner versions before 3.18." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el binario BitdefenderVirusScanner que se utiliza en Bitdefender Virus Scanner para MacOS puede permitir la inyecci\u00f3n de Librer\u00eda din\u00e1mica (inyecci\u00f3n DYLD) sin que AppleMobileFileIntegrity (AMFI) la bloquee. Este problema se debe a la ausencia de la firma de validaci\u00f3n de Librer\u00eda de Hardened Runtime. Este problema afecta a las versiones de Bitdefender Virus Scanner anteriores a la 3.18." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11139.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11139.json index 706365274cc..8890c553a50 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11139.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11139.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T09:15:06.370", "lastModified": "2025-01-17T09:15:06.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that\ncould allow local attackers to exploit these issues to potentially execute arbitrary code when opening a\nmalicious project file." + }, + { + "lang": "es", + "value": " CWE-119: Existe una vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria que podr\u00eda permitir a atacantes locales explotar estos problemas para potencialmente ejecutar c\u00f3digo arbitrario al abrir un archivo de proyecto malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11146.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11146.json index f747598e327..1b880e155be 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11146.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11146.json @@ -3,7 +3,7 @@ "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2025-01-17T06:15:15.410", "lastModified": "2025-01-17T07:15:25.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", @@ -16,6 +16,10 @@ { "lang": "en", "value": "TrueFiling is a collaborative, web-based electronic filing system where attorneys, paralegals, court reporters and self-represented filers collect public legal documentation into cases. TrueFiling is an entirely cloud-hosted application. Prior to version 3.1.112.19, TrueFiling trusted some client-controlled identifiers passed in URL requests to retrieve information. Platform users must self-register for an account, and once authenticated, could manipulate those identifiers to gain partial access to case information and the ability to partially change user access to case information. This vulnerability was addressed in version 3.1.112.19 and all instances were updated by 2024-11-08." + }, + { + "lang": "es", + "value": "TrueFiling es un sistema colaborativo de presentaci\u00f3n electr\u00f3nica basado en la web en el que abogados, asistentes jur\u00eddicos, taqu\u00edgrafos judiciales y personas que presentan documentos por cuenta propia recopilan documentaci\u00f3n legal p\u00fablica para incluirla en los casos. TrueFiling es una aplicaci\u00f3n alojada completamente en la nube. Antes de la versi\u00f3n 3.1.112.19, TrueFiling confiaba en algunos identificadores controlados por el cliente que se pasaban en las solicitudes de URL para recuperar informaci\u00f3n. Los usuarios de la plataforma deben registrarse por s\u00ed mismos para obtener una cuenta y, una vez autenticados, pueden manipular esos identificadores para obtener acceso parcial a la informaci\u00f3n del caso y la capacidad de cambiar parcialmente el acceso del usuario a la informaci\u00f3n del caso. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 3.1.112.19 y todas las instancias se actualizaron antes del 8 de noviembre de 2024." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11322.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11322.json index 519d057005d..f19f982ce70 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11322.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11322.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vulnreport@tenable.com", "published": "2025-01-15T14:15:27.943", "lastModified": "2025-01-15T14:15:27.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial-of-service vulnerability exists in CyberPower PowerPanel Business (PPB) 4.11.0. \nAn unauthenticated remote attacker can restart the ppbd.exe process via the PowerPanel Business Service Watchdog service listening on TCP port 2003. The attacker can repeatedly restart ppbd.exe to render it unavailable." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en CyberPower PowerPanel Business (PPB) 4.11.0. Un atacante remoto no autenticado puede reiniciar el proceso ppbd.exe a trav\u00e9s del servicio PowerPanel Business Service Watchdog que escucha en el puerto TCP 2003. El atacante puede reiniciar repetidamente ppbd.exe para que no est\u00e9 disponible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11327.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11327.json index ee71ad577a1..7fd3e6c7e9a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11327.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11327.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T03:15:19.990", "lastModified": "2025-01-11T03:15:19.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ClickWhale \u2013 Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.4.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ClickWhale \u2013 Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado debido al uso de add_query_arg y remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.4.1 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11386.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11386.json index 78ce30f9bac..c07c642897a 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11386.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11386.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:23.613", "lastModified": "2025-01-11T08:15:23.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GatorMail SmartForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gatormailsmartform' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento GatorMail SmartForms para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'gatormailsmartform' del complemento en todas las versiones hasta la 1.1.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11396.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11396.json index 1ef57b30357..bcbb707735c 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11396.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11396.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T01:15:09.110", "lastModified": "2025-01-14T01:15:09.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Event Monster \u2013 Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number." + }, + { + "lang": "es", + "value": " El complemento Event Monster \u2013 Event Management, Tickets Booking, Upcoming Event para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.4.3 inclusive a trav\u00e9s del archivo Visitors List Export. Durante la exportaci\u00f3n, se crea un archivo CSV en la carpeta wp-content con un nombre de archivo codificado de forma r\u00edgida que es de acceso p\u00fablico. Esto permite que atacantes no autenticados extraigan datos sobre los visitantes del evento, que incluyen nombre y apellido, correo electr\u00f3nico y n\u00famero de tel\u00e9fono." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11425.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11425.json index 85e496ee542..6a220e155df 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11425.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11425.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T09:15:07.613", "lastModified": "2025-01-17T09:15:07.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-131: Incorrect Calculation of Buffer Size vulnerability exists that could cause Denial-of-Service of the\nproduct when an unauthenticated user is sending a crafted HTTPS packet to the webserver." + }, + { + "lang": "es", + "value": "CWE-131: Existe una vulnerabilidad de c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer que podr\u00eda provocar una denegaci\u00f3n de servicio del producto cuando un usuario no autenticado env\u00eda un paquete HTTPS manipulado espec\u00edficamente al servidor web." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11452.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11452.json index e0d07e77833..ac550db9a57 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11452.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11452.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T04:15:08.287", "lastModified": "2025-01-16T04:15:08.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'business_categories' shortcode in all versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Chamber Dashboard Business Directory para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'business_categories' del complemento en todas las versiones hasta la 3.3.8 incluida debido a una desinfecci\u00f3n de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11497.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11497.json index aa411bbb707..5ea0b293d42 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11497.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11497.json @@ -3,12 +3,16 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2025-01-14T14:15:27.720", "lastModified": "2025-01-14T14:15:27.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access." + }, + { + "lang": "es", + "value": "Un atacante autenticado puede utilizar esta vulnerabilidad para realizar una escalada de privilegios para obtener acceso root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11636.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11636.json index 63d3db33a63..f3cdf4b092f 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11636.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11636.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-13T06:15:08.693", "lastModified": "2025-01-13T15:15:07.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11734.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11734.json index 7a086d808b6..252b5a2f800 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11734.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11734.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T09:15:19.443", "lastModified": "2025-01-14T09:15:19.443", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11736.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11736.json index 87fe86e24b5..1b381500b71 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11736.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11736.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T09:15:20.750", "lastModified": "2025-01-14T09:15:20.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11740.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11740.json index 775e2638291..1bc47ebc1c0 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11740.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11740.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-19T06:15:21.243", "lastModified": "2024-12-19T06:15:21.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11758.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11758.json index 50ac37b31e5..9974260b74a 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11758.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11758.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:24.020", "lastModified": "2025-01-11T08:15:24.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP SPID Italia plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP SPID Italia para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto del complemento en todas las versiones hasta la 2.9 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11768.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11768.json index dcd41c6cfae..76e8ad7fd24 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11768.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11768.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-19T06:15:23.007", "lastModified": "2024-12-19T06:15:23.007", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11848.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11848.json index 8fd115e0b00..00af3feb594 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11848.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11848.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T12:15:25.303", "lastModified": "2025-01-15T12:15:25.303", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NitroPack plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'nitropack_dismiss_notice_forever' AJAX action in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options to a fixed value of '1' which can activate certain options (e.g., enable user registration) or modify certain options in a way that leads to a denial of service condition." + }, + { + "lang": "es", + "value": "El complemento NitroPack para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n AJAX 'nitropack_dismiss_notice_forever' en todas las versiones hasta la 1.17.0 inclusive. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen opciones arbitrarias a un valor fijo de '1' que puede activar ciertas opciones (por ejemplo, habilitar el registro de usuario) o modificar ciertas opciones de una manera que conduzca a una condici\u00f3n de denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11851.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11851.json index c196af9ad8a..15c6f4dd48e 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11851.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11851.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T12:15:25.630", "lastModified": "2025-01-15T12:15:25.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NitroPack plugin for WordPress is vulnerable to unauthorized arbitrary transient update due to a missing capability check on the nitropack_rml_notification function in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update arbitrary transients. Note, that these transients can only be updated to integers and not arbitrary values." + }, + { + "lang": "es", + "value": "El complemento NitroPack para WordPress es vulnerable a actualizaciones transitorias arbitrarias no autorizadas debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n nitropack_rml_notification en todas las versiones hasta la 1.17.0 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, actualicen valores transitorios arbitrarios. Tenga en cuenta que estos valores transitorios solo se pueden actualizar a n\u00fameros enteros y no a valores arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json index e506e40b9f2..a4eea410007 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-22T02:15:16.510", "lastModified": "2024-12-22T02:15:16.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11863.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11863.json index d2e1e577c99..12755468244 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11863.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11863.json @@ -3,12 +3,16 @@ "sourceIdentifier": "arm-security@arm.com", "published": "2025-01-14T14:15:27.927", "lastModified": "2025-01-14T18:15:24.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP" + }, + { + "lang": "es", + "value": "Los mensajes SCMI espec\u00edficamente manipulados enviados a un SCP que ejecuta versiones de firmware SCP hasta incluida 2.15.0 pueden provocar un error de uso y bloquear el SCP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11864.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11864.json index dbd91295e0d..fcd39ae4a65 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11864.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11864.json @@ -3,12 +3,16 @@ "sourceIdentifier": "arm-security@arm.com", "published": "2025-01-14T14:15:28.053", "lastModified": "2025-01-14T16:15:27.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP" + }, + { + "lang": "es", + "value": "Los mensajes SCMI espec\u00edficamente manipulados enviados a un SCP que ejecuta versiones de firmware SCP hasta incluida 2.15.0 pueden provocar un error de uso y bloquear el SCP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11870.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11870.json index 1f2bfb9ad3d..6fe4fa2f98a 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11870.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11870.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T08:15:25.633", "lastModified": "2025-01-15T08:15:25.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Event Registration Calendar By vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Event Registration Calendar de vcita para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 1.4.0 incluida, debido a una limpieza de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11874.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11874.json index 917a0aef2a0..74e543b5058 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11874.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11874.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:24.237", "lastModified": "2025-01-11T08:15:24.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Grid Accordion Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'grid_accordion' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Grid Accordion Lite para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'grid_accordion' del complemento en todas las versiones hasta la 1.5.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11892.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11892.json index 08257c9fb17..cf12121139f 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11892.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11892.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:24.463", "lastModified": "2025-01-11T08:15:24.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Accordion Slider Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'accordion_slider' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Accordion Slider Lite para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'accordion_slider' del complemento en todas las versiones hasta la 1.5.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11915.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11915.json index 1fbec081387..c1639a55a92 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11915.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11915.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:24.680", "lastModified": "2025-01-11T08:15:24.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RRAddons for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.0 via the Popup block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento RRAddons for Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.1.0 incluida a trav\u00e9s del bloque de ventanas emergentes debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas o borradores a los que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1169.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1169.json index f876b6b3bdb..419883c7199 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1169.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T11:15:06.943", "lastModified": "2024-11-21T08:49:57.153", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1170.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1170.json index 559b918274c..09e9f7dd1d7 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1170.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T11:15:07.643", "lastModified": "2024-11-21T08:49:57.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json index 3b3e243e844..3bd27bc90b6 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:23.900", "lastModified": "2025-01-07T12:15:23.900", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12083.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12083.json index e1ec19197d9..41179890786 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12083.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12083.json @@ -3,12 +3,16 @@ "sourceIdentifier": "bba440f9-ef23-4224-aa62-7ac0935d18d1", "published": "2025-01-14T01:15:09.267", "lastModified": "2025-01-14T01:15:09.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal Vulnerabilities (CWE-22) exist in NJ/NX-series Machine Automation Controllers. An attacker may use these vulnerabilities to perform unauthorized access and to execute unauthorized code remotely to the controller products." + }, + { + "lang": "es", + "value": " Existen vulnerabilidades de Path Traversal (CWE-22) en NJ/NX-series Machine Automation Controllers. Un atacante puede usar estas vulnerabilidades para realizar acceso no autorizado y ejecutar c\u00f3digo no autorizado de forma remota en los productos del controlador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json index fdcc0e13f66..ba2ab6e0838 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12084.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-15T15:15:10.537", "lastModified": "2025-01-15T15:15:10.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo de desbordamiento de b\u00fafer basado en mont\u00f3n en rsync daemon. Este problema se debe a un manejo inadecuado de las longitudes de suma de comprobaci\u00f3n controladas por el atacante (s2length) en el c\u00f3digo. Cuando MAX_DIGEST_LEN excede el valor fijo SUM_LENGTH (16 bytes), un atacante puede escribir fuera de los l\u00edmites en el b\u00fafer de sum2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json index eea2dcfea92..cccc433b668 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in the rsync daemon which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en rsync daemon que podr\u00eda activarse cuando rsync compara sumas de comprobaci\u00f3n de archivos. Este fallo permite a un atacante manipular la longitud de la suma de comprobaci\u00f3n (s2length) para provocar una comparaci\u00f3n entre una suma de comprobaci\u00f3n y una memoria no inicializada y filtrar un byte de datos de pila no inicializados a la vez." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12086.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12086.json index d40c5a5e827..6f58971cb68 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12086.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12086.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en rsync que podr\u00eda permitir que un servidor enumere el contenido de un archivo arbitrario de la m\u00e1quina del cliente. Este problema ocurre cuando se copian archivos de un cliente a un servidor. Durante este proceso, el servidor rsync enviar\u00e1 sumas de comprobaci\u00f3n de datos locales al cliente para que las compare y determine qu\u00e9 datos deben enviarse al servidor. Al enviar valores de suma de comprobaci\u00f3n especialmente creados para archivos arbitrarios, un atacante puede reconstruir los datos de esos archivos byte por byte en funci\u00f3n de las respuestas del cliente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json index 5fb511068c9..f9891d19957 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12087.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad Path Traversal en rsync. Se origina en un comportamiento habilitado por la opci\u00f3n `--inc-recursive`, una opci\u00f3n habilitada de manera predeterminada para muchas opciones de cliente y que puede ser habilitada por el servidor incluso si no est\u00e1 habilitada expl\u00edcitamente por el cliente. Al usar la opci\u00f3n `--inc-recursive`, la falta de una verificaci\u00f3n de enlace simb\u00f3lico adecuada junto con las comprobaciones de deduplicaci\u00f3n que se realizan en una lista de archivos por archivo podr\u00eda permitir que un servidor escriba archivos fuera del directorio de destino previsto del cliente. Un servidor malintencionado podr\u00eda escribir archivos malintencionados en ubicaciones arbitrarias con nombres de directorios/rutas v\u00e1lidos en el cliente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json index 1b544921cf4..21bf3262912 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12088.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in rsync. When using the `--safe-links` option, rsync fails to properly verify if a symbolic link destination contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en rsync. Al usar la opci\u00f3n `--safe-links`, rsync no verifica correctamente si un destino de enlace simb\u00f3lico contiene otro enlace simb\u00f3lico dentro de \u00e9l. Esto genera una vulnerabilidad de Path Traversal, que puede provocar la escritura arbitraria de archivos fuera del directorio deseado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12116.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12116.json index c3fbb501c59..d04d146cf18 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12116.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12116.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:24.867", "lastModified": "2025-01-11T08:15:24.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Unlimited Theme Addon For Elementor and WooCommerce plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.1 via the 'uta-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento Unlimited Theme Addon For Elementor and WooCommerce para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.2.1 incluida a trav\u00e9s del c\u00f3digo abreviado 'uta-template' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas o borradores creadas por Elementor a las que no deber\u00edan tener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12142.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12142.json index 90e67b3085a..d4b90fc6dcb 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12142.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12142.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T11:15:08.683", "lastModified": "2025-01-17T11:15:08.683", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12203.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12203.json index 6c84df87992..7e046e81091 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12203.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12203.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:25.990", "lastModified": "2025-01-17T07:15:25.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RSS Icon Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link_color\u2019 parameter in all versions up to, and including, 5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento RSS Icon Widget para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'link_color' en todas las versiones hasta la 5.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12204.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12204.json index 0439e7bc3f2..2bb6ba08d6c 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12204.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12204.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T03:15:20.997", "lastModified": "2025-01-11T03:15:20.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several functions in the class-cx-rest.php file in all versions up to, and including, 1.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create 100% off coupons, delete posts, delete leads, and update coupon statuses." + }, + { + "lang": "es", + "value": "El complemento Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups para WordPress es vulnerable al acceso no autorizado debido a la falta de comprobaciones de capacidad en varias funciones del archivo class-cx-rest.php en todas las versiones hasta la 1.3.5 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen cupones con un 100 % de descuento, eliminen publicaciones, eliminen clientes potenciales y actualicen estados de cupones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12211.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12211.json index 98b4d911959..950ecd371ab 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12211.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12211.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@pega.com", "published": "2025-01-13T17:15:16.243", "lastModified": "2025-01-13T18:15:15.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pega Platform versions 8.1 to Infinity 24.2.0 are affected by an Stored XSS issue with profile." + }, + { + "lang": "es", + "value": "Las versiones 8.1 a Infinity 24.2.0 de Pega Platform se ven afectadas por un problema de XSS almacenado con el perfil." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json index b9c334580a5..4bcd5fbea3e 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12222.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento Deliver via Shipos para WooCommerce para WordPress es vulnerable a ataques de secuencias de comandos reflejadas entre sitios a trav\u00e9s del par\u00e1metro 'dvsfw_bulk_label_url' en todas las versiones hasta la 2.1.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." + "value": "El complemento Deliver via Shipos para WooCommerce para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'dvsfw_bulk_label_url' en todas las versiones hasta la 2.1.7 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12226.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12226.json index ed43fd573c5..a5130dc9582 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12226.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12226.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@octopus.com", "published": "2025-01-16T07:15:26.333", "lastModified": "2025-01-16T07:15:26.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly." + }, + { + "lang": "es", + "value": "En las versiones afectadas del agente o trabajador de Octopus Kubernetes, se pod\u00edan escribir variables confidenciales en el registro del pod del script de Kubernetes en texto plano. Esto se identific\u00f3 en la versi\u00f3n 2, pero se determin\u00f3 que esto tambi\u00e9n se pod\u00eda lograr en la versi\u00f3n 1 y la soluci\u00f3n se aplic\u00f3 a ambas versiones en consecuencia." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12240.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12240.json index 762829c413c..e044cedf4ab 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12240.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12240.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T11:15:15.137", "lastModified": "2025-01-14T11:15:15.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12274.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12274.json index fdabae53d9b..9426b485016 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12274.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12274.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-13T06:15:10.000", "lastModified": "2025-01-13T15:15:07.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json index 55a37915763..483341467af 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12297.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@moxa.com", "published": "2025-01-15T10:15:07.237", "lastModified": "2025-01-15T10:15:07.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa\u2019s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device." + }, + { + "lang": "es", + "value": "El conmutador Ethernet de la serie EDS-508A de Moxa, que ejecuta la versi\u00f3n de firmware 3.11 y anteriores, es vulnerable a una omisi\u00f3n de autenticaci\u00f3n debido a fallos en su mecanismo de autorizaci\u00f3n. Aunque en el proceso intervienen tanto la verificaci\u00f3n del lado del cliente como la del servidor back-end, los atacantes pueden explotar las debilidades en su implementaci\u00f3n. Estas vulnerabilidades pueden permitir ataques de fuerza bruta para adivinar credenciales v\u00e1lidas o ataques de colisi\u00f3n MD5 para falsificar hashes de autenticaci\u00f3n, lo que podr\u00eda comprometer la seguridad del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12298.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12298.json index d0774bd5717..bb2d4e1dbec 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12298.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12298.json @@ -3,12 +3,16 @@ "sourceIdentifier": "bba440f9-ef23-4224-aa62-7ac0935d18d1", "published": "2025-01-14T01:15:09.423", "lastModified": "2025-01-14T01:15:09.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "We found a vulnerability Improper Restriction of XML External Entity Reference (CWE-611) in NB-series NX-Designer. Attackers may be able to abuse this vulnerability to disclose confidential data on a computer." + }, + { + "lang": "es", + "value": " Encontramos una vulnerabilidad de Restricci\u00f3n incorrecta de referencia de entidad externa XML (CWE-611) en NB-series NX-Designer. Los atacantes podr\u00edan aprovechar esta vulnerabilidad para divulgar datos confidenciales en un equipo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12304.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12304.json index 73322968df5..d06a53a3bc4 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12304.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12304.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T04:15:06.113", "lastModified": "2025-01-11T04:15:06.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via button block link in all versions up to, and including, 3.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks with AI de Kadence WP \u2013 Page Builder Features para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s de un enlace de bloque de bot\u00f3n en todas las versiones hasta la 3.4.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json index cef19641cf1..13b3a18bfcb 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:24.040", "lastModified": "2025-01-07T12:15:24.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12370.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12370.json index 9aaf017a431..c63fdc9bf7b 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12370.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12370.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T09:15:07.810", "lastModified": "2025-01-17T09:15:07.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Hotel Booking plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check when adding rooms in all versions up to, and including, 2.1.5. This makes it possible for unauthenticated attackers to add rooms with custom prices." + }, + { + "lang": "es", + "value": " El complemento WP Hotel Booking para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante al agregar habitaciones en todas las versiones hasta la 2.1.5 incluida. Esto hace posible que atacantes no autenticados agreguen habitaciones con precios personalizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12398.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12398.json index d396a2dc34c..4ad53481699 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12398.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12398.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2025-01-14T02:15:07.990", "lastModified": "2025-01-14T02:15:07.990", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper privilege management vulnerability in the web management interface of the Zyxel WBE530 firmware versions through 7.00(ACLE.3) and\u00a0WBE660S firmware versions through 6.70(ACGG.2) could allow an authenticated user with limited privileges to escalate their privileges to that of an administrator, enabling them to upload configuration files to a vulnerable device." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de administraci\u00f3n de privilegios inadecuada en la interfaz de administraci\u00f3n web de las versiones de firmware Zyxel WBE530 hasta 7.00 (ACLE.3) y las versiones de firmware WBE660S hasta 6.70 (ACGG.2) podr\u00eda permitir que un usuario autenticado con privilegios limitados aumente sus privilegios a los de administrador, lo que le permitir\u00eda cargar archivos de configuraci\u00f3n a un dispositivo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12399.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12399.json index dd7e0aedf3e..30942f3883b 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12399.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12399.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T10:15:06.697", "lastModified": "2025-01-17T10:15:06.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability\nexists that could cause partial loss of confidentiality, loss of integrity and availability of the HMI when attacker performs\nman in the middle attack by intercepting the communication." + }, + { + "lang": "es", + "value": "CWE-924: Existe una vulnerabilidad de aplicaci\u00f3n inadecuada de la integridad del mensaje durante la transmisi\u00f3n en un canal de comunicaci\u00f3n que podr\u00eda causar una p\u00e9rdida parcial de confidencialidad, p\u00e9rdida de integridad y disponibilidad de la HMI cuando el atacante realiza un ataque man in the middle interceptando la comunicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12403.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12403.json index 479eb1e22a7..2bc378c133f 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12403.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12403.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T10:15:07.433", "lastModified": "2025-01-15T10:15:07.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Image Gallery \u2013 Responsive Photo Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'awsmgallery' parameter in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Image Gallery \u2013 Responsive Photo Gallery para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'awsmgallery' en todas las versiones hasta la 1.0.5 incluida debido a una limpieza de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12404.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12404.json index d01f94b68f7..b4cae0b8627 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12404.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12404.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T03:15:21.140", "lastModified": "2025-01-11T03:15:21.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CF Internal Link Shortcode plugin for WordPress is vulnerable to SQL Injection via the 'post_title' parameter in all versions up to, and including, 1.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento CF Internal Link Shortcode para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'post_title' en todas las versiones hasta la 1.1.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12407.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12407.json index e4c533a4f35..88bb2c43445 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12407.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12407.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:25.093", "lastModified": "2025-01-11T08:15:25.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Push Notification for Post and BuddyPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'pushnotificationid' parameter in all versions up to, and including, 2.06 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Push Notification for Post y BuddyPress para WordPress es vulnerable a ataques de Cross Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'pushnotificationid' en todas las versiones hasta la 2.06 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12412.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12412.json index 1611af38ab3..3eba98d6a12 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12412.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12412.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:25.320", "lastModified": "2025-01-11T08:15:25.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Rental and Booking Manager for Bike, Car, Dress, Resort with WooCommerce Integration \u2013 WpRently | WordPress plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018active_tab\u2019 parameter in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Rental and Booking Manager for Bike, Car, Dress, Resort with WooCommerce Integration \u2013 WpRently | WordPress plugin para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'active_tab' en todas las versiones hasta la 2.2.1 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12423.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12423.json index eb1c384c023..48b6f37c76c 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12423.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12423.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T10:15:07.630", "lastModified": "2025-01-15T10:15:07.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post' parameter in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Contact Form 7 Redirect & Thank You Page para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'post' en todas las versiones hasta la 1.0.7 incluida debido a una limpieza de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json index 18191ac005f..a58a5a89690 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12427.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:07.243", "lastModified": "2025-01-16T10:15:07.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Multi Step Form plugin for WordPress is vulnerable to unauthorized limited file upload due to a missing capability check on the fw_upload_file AJAX action in all versions up to, and including, 1.7.23. This makes it possible for unauthenticated attackers to upload limited file types such as images." + }, + { + "lang": "es", + "value": "El complemento Multi Step Form para WordPress es vulnerable a la carga limitada de archivos no autorizada debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n AJAX fw_upload_file en todas las versiones hasta la 1.7.23 incluida. Esto permite que atacantes no autenticados carguen tipos de archivos limitados, como im\u00e1genes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12466.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12466.json index ac2436ccc87..9ba4316a4f1 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12466.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12466.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:26.203", "lastModified": "2025-01-17T07:15:26.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Proofreading plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El complemento Proofreading para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'nonce' en todas las versiones hasta la 1.2.1.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12472.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12472.json index 36edd55c104..d5af2955665 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12472.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12472.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T03:15:21.283", "lastModified": "2025-01-11T03:15:21.283", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post Duplicator plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the mtphr_duplicate_post() due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to by duplicating the post." + }, + { + "lang": "es", + "value": "El complemento Post Duplicator para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 2.36 incluida a trav\u00e9s de mtphr_duplicate_post() debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden duplicar. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones protegidas con contrase\u00f1a, privadas o borradores a los que no deber\u00edan tener acceso duplicando la publicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json index 8effe03d629..71a6b1954ef 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12473.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The AI Scribe \u2013 SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) plugin for WordPress is vulnerable to SQL Injection via the 'template_id' parameter of the 'article_builder_generate_data' shortcode in all versions up to, and including, 2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento AI Scribe \u2013 SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'template_id' del shortcode 'article_builder_generate_data' en todas las versiones hasta la 2.3 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12476.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12476.json index a78be9cfc0c..8b7589be93a 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12476.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12476.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T10:15:07.013", "lastModified": "2025-01-17T10:15:07.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could\ncause information disclosure, impacts workstation integrity and potential remote code execution on the\ncompromised computer, when specific crafted XML file is imported in the Web Designer configuration tool." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de restricci\u00f3n inadecuada de referencia de entidad externa XML que podr\u00eda causar la divulgaci\u00f3n de informaci\u00f3n, afectar la integridad de la estaci\u00f3n de trabajo y la posible ejecuci\u00f3n remota de c\u00f3digo en el equipo comprometido, cuando se importa un archivo XML espec\u00edficamente manipulado en la herramienta de configuraci\u00f3n de Web Designer." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12505.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12505.json index 3278b2442a7..e579489a825 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12505.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12505.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T03:15:21.430", "lastModified": "2025-01-11T03:15:21.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Trackserver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tsmap' shortcode in all versions up to, and including, 5.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Trackserver para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'tsmap' del complemento en todas las versiones hasta la 5.0.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12508.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12508.json index bdc80d41706..031822f18d3 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12508.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12508.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:26.387", "lastModified": "2025-01-17T07:15:26.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Glofox Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'glofox' and 'glofox_lead_capture ' shortcodes in all versions up to, and including, 2.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Glofox Shortcodes para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de los c\u00f3digos cortos 'glofox' y 'glofox_lead_capture' del complemento en todas las versiones hasta la 2.6 incluida, debido a una desinfecci\u00f3n de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12519.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12519.json index 2ee7e75d5a5..f5adbe32ab2 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12519.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12519.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:25.530", "lastModified": "2025-01-11T08:15:25.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TCBD Auto Refresher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbd_auto_refresh' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento TCBD Auto Refresher para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'tcbd_auto_refresh' del complemento en todas las versiones hasta la 2.0 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12520.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12520.json index 971afbc1916..e1f8ae16362 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12520.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12520.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:25.720", "lastModified": "2025-01-11T08:15:25.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Dominion \u2013 Domain Checker for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'dominion_shortcodes_domain_search_6' shortcode in all versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Dominion \u2013 Domain Checker para WPBakery para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'dominion_shortcodes_domain_search_6' del complemento en todas las versiones hasta la 2.2.2 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12527.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12527.json index c740a365fbf..64929c9bf6f 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12527.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12527.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:25.913", "lastModified": "2025-01-11T08:15:25.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Perfect Portal Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'perfect_portal_intake_form' shortcode in all versions up to, and including, 3.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Perfect Portal Widgets para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'perfect_portal_intake_form' del complemento en todas las versiones hasta la 3.0.3 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12566.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12566.json index 73fb8c9a000..5bc671def2f 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12566.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12566.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-13T06:15:10.130", "lastModified": "2025-01-13T15:15:07.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12567.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12567.json index ead9c37253b..28a1f852474 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12567.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12567.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-13T06:15:10.260", "lastModified": "2025-01-13T15:15:08.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12568.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12568.json index c0905f05471..46459ee0172 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12568.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12568.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-13T06:15:10.380", "lastModified": "2025-01-13T15:15:08.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json index 5404b07da74..67e32350b27 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-11T06:15:25.070", "lastModified": "2025-01-13T20:15:27.283", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12593.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12593.json index 38764de444c..a9901278104 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12593.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T12:15:25.790", "lastModified": "2025-01-15T12:15:25.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12598.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12598.json index ece931d4b41..4b0468881c1 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12598.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12598.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:26.577", "lastModified": "2025-01-17T07:15:26.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MyBookProgress by Stormhill Media plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018book\u2019 parameter in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento MyBookProgress de Stormhill Media para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'book' en todas las versiones hasta la 1.0.8 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json index 499a2844769..47d501567be 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12606.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The AI Scribe \u2013 SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the engine_request_data() function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin settings." + }, + { + "lang": "es", + "value": "El complemento AI Scribe \u2013 SEO AI Writer, Content Generator, Humanizer, Blog Writer, SEO Optimizer, DALLE-3, AI WordPress Plugin ChatGPT (GPT-4o 128K) para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n engine_request_data() en todas las versiones hasta la 2.3 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12627.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12627.json index 7c48304776e..667d8b38492 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12627.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12627.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T03:15:21.587", "lastModified": "2025-01-11T03:15:21.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.5 via deserialization of untrusted input from post content passed to the capture_email AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.3.5 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del contenido de la publicaci\u00f3n que se pasa a la acci\u00f3n AJAX capture_email. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12637.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12637.json index 3133e69c0bc..5e5eba97718 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12637.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12637.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:26.773", "lastModified": "2025-01-17T07:15:26.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Moving Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.05 via the export functionality. The JSON files are stored in predictable locations with guessable file names when exporting user data. This could allow unauthenticated attackers to extract sensitive user data, for instance, email addresses, hashed passwords, and IP addresses." + }, + { + "lang": "es", + "value": "El complemento Moving Users para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.05 incluida a trav\u00e9s de la funci\u00f3n de exportaci\u00f3n. Los archivos JSON se almacenan en ubicaciones predecibles con nombres de archivo que se pueden adivinar al exportar datos de usuario. Esto podr\u00eda permitir que atacantes no autenticados extraigan datos confidenciales de los usuarios, por ejemplo, direcciones de correo electr\u00f3nico, contrase\u00f1as cifradas y direcciones IP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12703.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12703.json index 65a63dd2831..67ec2748669 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12703.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12703.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@se.com", "published": "2025-01-17T11:15:08.903", "lastModified": "2025-01-17T11:15:08.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json index c94b11100f7..e285ebf680a 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12747.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en rsync. Esta vulnerabilidad surge de una condici\u00f3n de ejecuci\u00f3n durante el manejo de enlaces simb\u00f3licos por parte de rsync. El comportamiento predeterminado de rsync cuando encuentra enlaces simb\u00f3licos es omitirlos. Si un atacante reemplazaba un archivo normal con un enlace simb\u00f3lico en el momento adecuado, era posible omitir el comportamiento predeterminado y atravesar los enlaces simb\u00f3licos. Seg\u00fan los privilegios del proceso rsync, un atacante podr\u00eda filtrar informaci\u00f3n confidencial, lo que podr\u00eda llevar a una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12782.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12782.json index 1ee555f7e7f..8152c54fa48 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12782.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12782.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-19T13:15:05.900", "lastModified": "2024-12-27T08:15:04.917", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12818.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12818.json index 23a9b99f5fc..2f611893932 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12818.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12818.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T10:15:07.803", "lastModified": "2025-01-15T10:15:07.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Smart TV plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tv-video-player' shortcode in all versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Smart TV para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'tv-video-player' del complemento en todas las versiones hasta la 2.1.8 incluida, debido a una desinfecci\u00f3n de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12847.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12847.json index 2d2d22878c2..444895370f9 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12847.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12847.json @@ -3,12 +3,16 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-01-10T20:15:30.150", "lastModified": "2025-01-10T20:15:30.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017." + }, + { + "lang": "es", + "value": "NETGEAR DGN1000 anterior a la versi\u00f3n 1.1.00.48 es vulnerable a una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n. Un atacante remoto y no autenticado puede ejecutar comandos arbitrarios del sistema operativo como root enviando solicitudes HTTP manipuladas al endpoint setup.cgi. Esta vulnerabilidad ha sido explotada in situ desde al menos 2017." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12877.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12877.json index 07c9001a4b0..0f91f74a261 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12877.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12877.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-11T08:15:26.127", "lastModified": "2025-01-11T08:15:26.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like 'firstName'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server that makes remote code execution possible. Please note this was only partially patched in 3.19.3, a fully sufficient patch was not released until 3.19.4. However, another CVE was assigned by another CNA for version 3.19.3 so we will leave this as affecting 3.19.2 and before. We have recommended the vendor use JSON encoding to prevent any further deserialization vulnerabilities from being present." + }, + { + "lang": "es", + "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.19.2 incluida, a trav\u00e9s de la deserializaci\u00f3n de datos no confiables del formulario de donaci\u00f3n, como \"firstName\". Esto permite que atacantes no autenticados inyecten un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes eliminar archivos arbitrarios en el servidor, lo que hace posible la ejecuci\u00f3n remota de c\u00f3digo. Tenga en cuenta que esto solo se solucion\u00f3 parcialmente en la versi\u00f3n 3.19.3; no se lanz\u00f3 un parche completamente suficiente hasta la versi\u00f3n 3.19.4. Sin embargo, otro CNA asign\u00f3 otra CVE para la versi\u00f3n 3.19.3, por lo que dejaremos que esto afecte a la versi\u00f3n 3.19.2 y anteriores. Hemos recomendado al proveedor que utilice codificaci\u00f3n JSON para evitar que se presenten m\u00e1s vulnerabilidades de deserializaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json index d9200a432fd..0bd40b17442 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T10:15:07.250", "lastModified": "2025-01-14T10:15:07.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Paid Membership Subscriptions \u2013 Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site." + }, + { + "lang": "es", + "value": "El complemento Paid Membership Subscriptions \u2013 Effortless Memberships, Recurring Payments & Content Restriction para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 2.13.7 incluida. Esto se debe a que la funci\u00f3n pms_pb_payment_redirect_link utiliza el valor controlado por el usuario proporcionado a trav\u00e9s del par\u00e1metro 'pms_payment_id' para autenticar a los usuarios sin ninguna validaci\u00f3n de identidad adicional. Esto hace posible que los atacantes no autenticados con conocimiento de una identificaci\u00f3n de pago v\u00e1lida inicien sesi\u00f3n como cualquier usuario que haya realizado una compra en el sitio de destino." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1217.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1217.json index 83cfb838078..94a0b824a10 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1217.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1217", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:43.970", - "lastModified": "2024-11-21T08:50:03.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:51:21.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kaliforms:contact_form_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.42", + "matchCriteriaId": "EE5D510B-FDB6-4476-8558-136F28D17C24" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3036466/kali-forms/trunk?contextall=1&old=3029334&old_path=%2Fkali-forms%2Ftrunk", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7be75b0a-737d-4f0d-b024-e207af4573cd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3036466/kali-forms/trunk?contextall=1&old=3029334&old_path=%2Fkali-forms%2Ftrunk", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7be75b0a-737d-4f0d-b024-e207af4573cd?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1218.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1218.json index a80c49a3c32..f1921afc8e6 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1218.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1218", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:44.123", - "lastModified": "2024-11-21T08:50:04.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:53:15.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kaliforms:contact_form_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.41", + "matchCriteriaId": "0D9DE57C-806B-4D0C-A3A8-BB0FBAC6CBEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3036466/kali-forms/trunk?contextall=1&old=3029334&old_path=%2Fkali-forms%2Ftrunk", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed1aae32-6040-4c42-b8a7-4c3be371a8c0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3036466/kali-forms/trunk?contextall=1&old=3029334&old_path=%2Fkali-forms%2Ftrunk", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed1aae32-6040-4c42-b8a7-4c3be371a8c0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json index e7e55b7686f..f5545d72b22 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1221.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T03:15:06.607", "lastModified": "2024-11-21T08:50:04.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json index fb624f57884..11982aa096e 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T03:15:07.090", "lastModified": "2024-11-21T08:50:05.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1234.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1234.json index d4ec2a2fd3a..dadb2a9849c 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1234.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1234.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:18.390", "lastModified": "2024-11-21T08:50:07.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json index bdecbfb0684..e23b5127043 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13145.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-06T01:15:06.253", "lastModified": "2025-01-06T01:15:06.253", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13156.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13156.json index 6037ee089f7..513e3bc7f5d 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13156.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T09:15:20.910", "lastModified": "2025-01-14T09:15:20.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13158.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13158.json index 872b9a1391e..9b58a444c20 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13158.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13158.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:26.020", "lastModified": "2025-01-14T18:15:26.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unbounded resource search path in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution." + }, + { + "lang": "es", + "value": "Una ruta de b\u00fasqueda de recursos ilimitada en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024 a 2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante autenticado remoto con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13159.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13159.json index 852b218ff7d..6f4e7fdc192 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13159.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13159.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:26.243", "lastModified": "2025-01-14T18:15:26.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information." + }, + { + "lang": "es", + "value": "Absolute Path Traversal en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13160.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13160.json index 75d2a1a6b58..2bd1ddc71a4 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13160.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13160.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:26.447", "lastModified": "2025-01-14T18:15:26.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information." + }, + { + "lang": "es", + "value": "Absolute Path Traversal en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13161.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13161.json index 188bce220ed..5f779d29b8a 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13161.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13161.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:26.640", "lastModified": "2025-01-14T18:15:26.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information." + }, + { + "lang": "es", + "value": "Absolute Path Traversal en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado filtre informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13162.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13162.json index 5c614cc3759..7c9c8fa94c3 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13162.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13162.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:26.840", "lastModified": "2025-01-14T18:15:26.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution. This CVE addresses incomplete fixes from CVE-2024-32848." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de SQL en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024 y la actualizaci\u00f3n de seguridad de enero de 2025 de SU6 de 2022 permite que un atacante remoto autenticado con privilegios de administrador logre la ejecuci\u00f3n remota de c\u00f3digo. Esta CVE aborda correcciones incompletas de CVE-2024-32848." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13163.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13163.json index ced31ae746e..35f926779c7 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13163.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13163.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:27.033", "lastModified": "2025-01-14T18:15:27.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of untrusted data in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required." + }, + { + "lang": "es", + "value": "La deserializaci\u00f3n de datos no confiables en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024 a enero de 2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 a enero de 2025 permite que un atacante remoto no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo. Se requiere la interacci\u00f3n del usuario local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13164.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13164.json index f72fcf43025..44e87959fa3 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13164.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13164.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:27.257", "lastModified": "2025-01-14T18:15:27.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An uninitialized resource in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Un recurso no inicializado en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024 a 2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante autenticado local escale sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13165.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13165.json index 4a0df2b47bd..52f1bd80428 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13165.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13165.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:27.430", "lastModified": "2025-01-14T18:15:27.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en Ivanti EPM antes de la Actualizaci\u00f3n de seguridad de enero de 2024-2025 y la Actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13166.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13166.json index 6e071b3d98c..9507154d24e 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13166.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13166.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:27.620", "lastModified": "2025-01-14T18:15:27.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en Ivanti EPM antes de la Actualizaci\u00f3n de seguridad de enero de 2024-2025 y la Actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13167.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13167.json index 9c746d032c1..ebcdc9c7030 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13167.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13167.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:27.850", "lastModified": "2025-01-14T18:15:27.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en Ivanti EPM antes de la Actualizaci\u00f3n de seguridad de enero de 2024-2025 y la Actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13168.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13168.json index f445ccf2ef2..26100abeca9 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13168.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13168.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:28.317", "lastModified": "2025-01-14T18:15:28.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en Ivanti EPM antes de la Actualizaci\u00f3n de seguridad de enero de 2024-2025 y la Actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13169.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13169.json index 4e714270ca8..be9932b9533 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13169.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13169.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:28.557", "lastModified": "2025-01-14T18:15:28.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Una lectura fuera de los l\u00edmites en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024-2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante autenticado local escale sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13170.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13170.json index be6182a8dc1..372fed9d144 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13170.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:28.733", "lastModified": "2025-01-14T18:15:28.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to cause a denial of service." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en Ivanti EPM antes de la Actualizaci\u00f3n de seguridad de enero de 2024-2025 y la Actualizaci\u00f3n de seguridad de enero de 2022 SU6 permite que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13171.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13171.json index eb41ac0bace..80a6070d63f 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13171.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13171.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:28.913", "lastModified": "2025-01-14T18:15:28.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient filename validation in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required." + }, + { + "lang": "es", + "value": "La validaci\u00f3n insuficiente de nombres de archivo en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024 a enero de 2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 a enero de 2025 permite que un atacante remoto no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo. Se requiere la interacci\u00f3n del usuario local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13172.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13172.json index c15fb233477..0c7c633fac3 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13172.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13172.json @@ -3,12 +3,16 @@ "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-01-14T18:15:29.110", "lastModified": "2025-01-14T18:15:29.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper signature verification in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n de firmas incorrecta en Ivanti EPM antes de la actualizaci\u00f3n de seguridad de enero de 2024 a enero de 2025 y la actualizaci\u00f3n de seguridad de enero de 2022 SU6 a enero de 2025 permite que un atacante remoto no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo. Se requiere la interacci\u00f3n del usuario local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13215.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13215.json index f00e25c8dee..f32649cdec2 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13215.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T13:15:09.263", "lastModified": "2025-01-15T13:15:09.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json index a51e50be98d..33b4f2092ec 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13318.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Essential WP Real Estate plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the cl_delete_listing_func() function in all versions up to, and including, 1.1.3. This makes it possible for unauthenticated attackers to delete arbitrary pages and posts." + }, + { + "lang": "es", + "value": "El complemento Essential WP Real Estate para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n cl_delete_listing_func() en todas las versiones hasta la 1.1.3 incluida. Esto permite que atacantes no autenticados eliminen p\u00e1ginas y publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13323.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13323.json index 210a05ae07b..ecdb4797021 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13323.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13323.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T06:15:15.480", "lastModified": "2025-01-14T06:15:15.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'booking' shortcode in all versions up to, and including, 10.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Booking Calendar para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado \"booking\" del complemento en todas las versiones hasta la 10.9.2 incluida, debido a una desinfecci\u00f3n de entrada y escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13333.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13333.json index 09c33439123..c0309a3ea0d 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13333.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13333.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T06:15:15.663", "lastModified": "2025-01-17T06:15:15.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced File Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fma_local_file_system' function in versions 5.2.12 to 5.2.13. This makes it possible for authenticated attackers, with Subscriber-level access and above and upload permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. The function can be exploited only if the \"Display .htaccess?\" setting is enabled." + }, + { + "lang": "es", + "value": "El complemento Advanced File Manager para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'fma_local_file_system' en las versiones 5.2.12 a 5.2.13. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor o superior y permisos de carga otorgados por un administrador, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. La funci\u00f3n solo se puede explotar si la opci\u00f3n \"Display .htaccess?\" est\u00e1 habilitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13334.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13334.json index 0027478cc83..fb415dddaa5 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13334.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13334.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T04:15:19.720", "lastModified": "2025-01-15T04:15:19.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Car Demon plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_condition' parameter in all versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El complemento Car Demon para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'search_condition' en todas las versiones hasta la 1.8.1 incluida, debido a una limpieza de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13348.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13348.json index 225786a6293..e9df93248ee 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13348.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13348.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T04:15:09.200", "lastModified": "2025-01-14T04:15:09.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Smart Agenda \u2013 Prise de rendez-vous en ligne plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the smartagenda_options_page_html() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El complemento Smart Agenda \u2013 Prise de rendez-vous en ligne para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.7 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n smartagenda_options_page_html(). Esto permite que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13351.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13351.json index 5a24fd0a23e..affcb03c85e 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13351.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13351.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T10:15:07.993", "lastModified": "2025-01-15T10:15:07.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social proof testimonials and reviews by Repuso plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'rw_image_badge1' shortcode in all versions up to, and including, 5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Social proof testimonials and reviews by Repuso para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'rw_image_badge1' del complemento en todas las versiones hasta la 5.20 incluida, debido a una desinfecci\u00f3n de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13355.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13355.json index f64d600d14b..4cb88528caf 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13355.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13355.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:08.750", "lastModified": "2025-01-16T10:15:08.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to limited file uploads due to insufficient file type validation in the upload_file() function in all versions up to, and including, 13.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload files on the affected site's server which may make remote code execution possible and is confirmed to make Cross-Site Scripting possible." + }, + { + "lang": "es", + "value": "El complemento Admin and Customer Messages After Order for WooCommerce: OrderConvo para WordPress es vulnerable a la carga limitada de archivos debido a una validaci\u00f3n insuficiente del tipo de archivo en la funci\u00f3n upload_file() en todas las versiones hasta la 13.2 imcluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo y se ha confirmado que hace posible la ejecuci\u00f3n de Cross-Site Scripting." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13366.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13366.json index 6a5c8137741..dd8f806cfe1 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13366.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:26.947", "lastModified": "2025-01-17T07:15:26.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sandbox plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'debug' parameter in all versions up to, and including, 0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El complemento Sandbox para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'debug' en todas las versiones hasta la 0.4 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13367.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13367.json index 8793a0c6201..5d7cb4ab402 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13367.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13367.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:27.123", "lastModified": "2025-01-17T07:15:27.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sandbox plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the export_download action in all versions up to, and including, 0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download an entire copy of a sandbox environment which can contain sensitive information like the wp-config.php file." + }, + { + "lang": "es", + "value": "El complemento Sandbox para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n export_download en todas las versiones hasta la 0.4 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, descarguen una copia completa de un entorno sandbox que puede contener informaci\u00f3n confidencial como el archivo wp-config.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13377.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13377.json index dc24d494518..62311c4ddbd 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13377.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13377.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T10:15:07.240", "lastModified": "2025-01-17T10:15:07.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018alt\u2019 parameter in all versions up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gravity Forms para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro \"alt\" en todas las versiones hasta la 2.9.1.3 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13378.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13378.json index b9066c5545d..c16809e0b35 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13378.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13378.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T10:15:07.457", "lastModified": "2025-01-17T10:15:07.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018style_settings\u2019 parameter in versions 2.9.0.1 up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The attack is only successful in the Chrome web browser, and requires directly browsing the media file via the attachment post." + }, + { + "lang": "es", + "value": "El complemento Gravity Forms para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'style_settings' en las versiones 2.9.0.1 hasta 2.9.1.3 incluida debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. El ataque solo tiene \u00e9xito en el navegador web Chrome y requiere navegar directamente por el archivo multimedia a trav\u00e9s de la publicaci\u00f3n adjunta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13386.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13386.json index 8c44e3ebbdd..b11a1a70a28 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13386.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13386.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T07:15:27.300", "lastModified": "2025-01-17T07:15:27.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The quote-posttype-plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Author field in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento quote-posttype-plugin para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del campo Author en todas las versiones hasta la 1.2.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13387.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13387.json index 68cd90787af..451fbf20c1c 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13387.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13387.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:09.103", "lastModified": "2025-01-16T10:15:09.103", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Responsive Tabs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wprtabs' shortcode in all versions up to, and including, 1.2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento WP Responsive Tabs para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'wprtabs' del complemento en todas las versiones hasta la 1.2.9 incluida, debido a una desinfecci\u00f3n de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13394.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13394.json index 8cf2c48d929..446b2f441ab 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13394.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13394.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T06:15:16.150", "lastModified": "2025-01-15T06:15:16.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ViewMedica 9 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'viewmedica' shortcode in all versions up to, and including, 1.4.15 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento ViewMedica 9 para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'viewmedica' del complemento en todas las versiones hasta la 1.4.15 incluida, debido a una limpieza de entrada y escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13398.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13398.json index 8a3d2767748..3724f671a3a 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13398.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13398.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T05:15:08.613", "lastModified": "2025-01-17T05:15:08.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Checkout for PayPal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'checkout_for_paypal' shortcode in all versions up to, and including, 1.0.32 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Checkout for PayPal para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'checkout_for_paypal' del complemento en todas las versiones hasta la 1.0.32 incluida, debido a una desinfecci\u00f3n de entrada y a un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13401.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13401.json index 733a4c9765f..77bb71d9992 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13401.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13401.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T05:15:09.077", "lastModified": "2025-01-17T05:15:09.077", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Payment Button for PayPal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_paypal_checkout' shortcode in all versions up to, and including, 1.2.3.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Payment Button for PayPal para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'wp_paypal_checkout' del complemento en todas las versiones hasta la 1.2.3.35 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13434.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13434.json index 3492d1a4721..450aa663d51 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13434.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13434.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-17T05:15:09.290", "lastModified": "2025-01-17T05:15:09.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Inventory Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Inventory Manager para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'message' en todas las versiones hasta la 2.3.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json index e3241cf7845..5a7080fb9f6 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2025-01-17T14:15:31.147", "lastModified": "2025-01-17T14:15:31.147", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json index 807da6e93e0..744aa1d2e70 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13503.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vulnerability@ncsc.ch", "published": "2025-01-17T14:15:31.317", "lastModified": "2025-01-17T14:15:31.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1343.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1343.json index bdd9ff30bda..e1f5f275b15 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1343.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1343.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-19T12:15:44.413", "lastModified": "2024-11-21T08:50:22.433", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1344.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1344.json index 0c492e33a21..a4de00af4b6 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1344.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1344.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-19T12:15:44.617", "lastModified": "2024-11-21T08:50:22.543", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1345.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1345.json index 908732bcd51..542f9b6be76 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1345.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1345.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-19T12:15:44.803", "lastModified": "2024-11-21T08:50:22.667", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1346.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1346.json index fd6cd89ebc3..2f0015a2dea 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1346.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1346.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-19T12:15:45.000", "lastModified": "2024-11-21T08:50:22.793", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1382.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1382.json index c02dcfea8c8..32342ddfc37 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1382.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1382.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T09:15:38.723", "lastModified": "2024-11-21T08:50:27.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json index 3277fdec6f8..5bec5044927 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T23:15:46.480", "lastModified": "2024-11-21T08:50:29.823", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json index b23b0e3f938..b39d280b97e 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-11T22:15:54.490", "lastModified": "2024-11-21T08:50:30.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1413.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1413.json index 59217b5cf81..0dccb74beec 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1413.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1413.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:22.113", "lastModified": "2024-11-21T08:50:32.080", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1414.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1414.json index 9bdc464737e..40f472993ea 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1414.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1414.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:22.287", "lastModified": "2024-11-21T08:50:32.210", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json index cd10034b723..6bc8bf95afa 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T07:15:07.733", "lastModified": "2024-11-21T08:50:32.870", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json index a483239b636..853fc55a0c2 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T23:15:46.667", "lastModified": "2024-11-21T08:50:33.003", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1426.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1426.json index b40dfa88efb..67ff5600f48 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1426.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1426.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-18T05:15:47.787", "lastModified": "2024-11-21T08:50:33.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1429.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1429.json index dfe0c5fdb18..ffc47de57b5 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1429.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1429.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-18T05:15:48.010", "lastModified": "2024-11-21T08:50:33.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1497.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1497.json index cc715fa388c..709d2e94d44 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1497.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1497.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:23.547", "lastModified": "2024-11-21T08:50:42.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1499.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1499.json index d658ab71873..28582a6b818 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1499.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1499.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:23.723", "lastModified": "2024-11-21T08:50:42.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1505.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1505.json index 6b98592a037..42ca2969b42 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1505.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:23.893", "lastModified": "2024-11-21T08:50:43.523", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1506.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1506.json index e133ade2332..6cb24f26802 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1506.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T07:15:08.110", "lastModified": "2024-11-21T08:50:43.653", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1507.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1507.json index 8b1a5e4fd65..78eebcd32b3 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1507.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1507.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T14:15:07.347", "lastModified": "2024-11-21T08:50:43.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1508.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1508.json index e4be7bc4186..91574adeb08 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1508.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1508.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T14:15:07.540", "lastModified": "2024-11-21T08:50:43.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1534.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1534.json index de172cba0d1..237af664482 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1534.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1534.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T10:15:06.857", "lastModified": "2024-11-21T08:50:46.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json index a847a77d492..3c055f0eb7a 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-07-23T02:15:02.090", "lastModified": "2024-11-21T08:50:52.083", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json index 5c17206af2f..91327bc072f 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-03-23T19:15:07.283", "lastModified": "2024-11-21T08:50:55.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1623.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1623.json index fdbf1374f0e..5eb888cbd1b 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1623.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1623.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-14T13:15:53.397", "lastModified": "2024-11-21T08:50:56.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json index e90d9b86e2b..e32b7e35688 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@asrg.io", "published": "2024-02-19T17:15:08.347", "lastModified": "2024-11-21T08:50:58.023", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json index 03534b4d2e5..6293a3dd922 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1645.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-11T22:15:54.690", "lastModified": "2024-11-21T08:50:59.670", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1713.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1713.json index e087371179d..5551e8633e1 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1713.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1713.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@google.com", "published": "2024-03-14T21:15:50.840", "lastModified": "2024-11-21T08:51:08.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1720.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1720.json index 14021caa1b0..43d5fab0097 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1720.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1720.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T06:15:50.630", "lastModified": "2024-11-21T08:51:09.613", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1761.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1761.json index 722a4782dea..9ef1201c3f6 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1761.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1761.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T05:15:54.140", "lastModified": "2024-11-21T08:51:15.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json index 11710a1a579..6ef06df1c78 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1773.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T19:15:11.167", "lastModified": "2024-11-21T08:51:16.823", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1795.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1795.json index 6b2ba2c3b60..f6b422d8684 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1795.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-15T07:15:08.367", "lastModified": "2024-11-21T08:51:20.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1796.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1796.json index ec9f17ec77e..23150932a82 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1796.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-15T07:15:09.673", "lastModified": "2024-11-21T08:51:20.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json index 471d3e8c89d..2e3472540ca 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1882.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T04:15:08.003", "lastModified": "2024-11-21T08:51:31.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json index ae54b67720b..118b33de725 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1883.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T04:15:08.353", "lastModified": "2024-11-21T08:51:31.210", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json index 6cd7c0f0ad1..868344864f3 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1884.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-03-14T04:15:08.697", "lastModified": "2024-11-21T08:51:31.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json index e27edf07b7d..1f6d3c95b49 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:21.883", "lastModified": "2024-11-21T08:51:45.033", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2021.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2021.json index 6312f29a10c..fb2cdba57a1 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2021.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2021.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T00:15:52.070", "lastModified": "2024-11-21T09:08:49.797", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2022.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2022.json index 21be00f7b26..8a3971d7aff 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2022.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T00:15:52.290", "lastModified": "2024-11-21T09:08:50.000", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2028.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2028.json index 5af2312b860..93eabe8ac64 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2028.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2028.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:31.233", "lastModified": "2024-11-21T09:08:52.443", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json index f0d9ac0e3f1..13032239945 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21493.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-02-17T05:15:08.747", "lastModified": "2024-11-21T08:54:32.820", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json index 0da331e2d1c..a2825049159 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21494.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-02-17T05:15:09.077", "lastModified": "2024-11-21T08:54:32.973", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json index 801173dc16c..5dc89354585 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-02-17T05:15:09.343", "lastModified": "2024-11-21T08:54:33.127", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json index 58febf9e400..6228f98980c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21497.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-02-17T05:15:09.863", "lastModified": "2024-11-21T08:54:33.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json index 4d19a32e5c4..1094f078bae 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21499.json @@ -3,7 +3,7 @@ "sourceIdentifier": "report@snyk.io", "published": "2024-02-17T05:15:10.400", "lastModified": "2024-11-21T08:54:33.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json index 3059200094b..0e6644bdc8e 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21752.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T06:15:47.067", "lastModified": "2024-11-21T08:54:56.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21758.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21758.json index ba810a64d68..a64209cb612 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21758.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21758.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:28.597", "lastModified": "2025-01-14T15:15:13.843", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Fortinet FortiWeb versions 7.2.0 through 7.2.7, and 7.4.0 through 7.4.1 may allow a privileged user to execute arbitrary code via specially crafted CLI commands, provided the user is able to evade FortiWeb stack protections." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en pila en las versiones 7.2.0 a 7.2.7 y 7.4.0 a 7.4.1 de Fortinet FortiWeb puede permitir que un usuario privilegiado ejecute c\u00f3digo arbitrario a trav\u00e9s de comandos CLI especialmente manipulados, siempre que el usuario pueda evadir las protecciones de pila de FortiWeb." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21777.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21777.json index e9995bb1d2e..abb356f5f0d 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21777.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21777.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:02.377", "lastModified": "2024-11-21T08:54:59.163", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21788.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21788.json index b02d5ed145e..c71f1056ead 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21788.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21788.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:02.580", "lastModified": "2024-11-21T08:55:00.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21797.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21797.json index 3598e9afadb..49e5b50959b 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21797.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21797.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:14.070", "lastModified": "2025-01-14T16:15:28.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command execution vulnerability exists in the adm.cgi set_TR069() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos en la funci\u00f3n adm.cgi set_TR069() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21809.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21809.json index ff0b504d7f0..8d37c598dab 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21809.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21809.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:03.003", "lastModified": "2024-11-21T08:55:02.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21837.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21837.json index 9fa509864fc..2d0351d4bb2 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21837.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21837.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:04.690", "lastModified": "2024-11-21T08:55:05.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21861.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21861.json index c79fcb91eeb..ead25ecc501 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21861.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:05.367", "lastModified": "2024-11-21T08:55:08.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21862.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21862.json index ebf70de7a6d..ca653ce37d5 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21862.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:05.663", "lastModified": "2024-11-21T08:55:08.207", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2106.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2106.json index db08cfacb83..1480be3f915 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2106.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:31.703", "lastModified": "2024-11-21T09:09:02.737", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json index 69745356557..183765ebf7d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T22:15:07.470", "lastModified": "2024-11-21T09:09:02.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2126.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2126.json index defdf1fbb93..259d4a240e0 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2126.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2126.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:31.867", "lastModified": "2024-11-21T09:09:05.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json index 95b4e24e54d..6913cf7e464 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T02:15:47.300", "lastModified": "2024-11-21T09:09:05.730", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2136.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2136.json index 99bf2e58eea..6b0698fcf6f 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2136.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T09:15:38.910", "lastModified": "2024-11-21T09:09:06.403", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2180.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2180.json index 86546742d1d..ce611c0eaa0 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2180.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2024-03-15T05:15:06.393", "lastModified": "2024-11-21T09:09:12.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json index 7a85bc10e1e..65abebe3f3c 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-07-09T07:15:03.157", "lastModified": "2024-11-21T08:55:29.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22063.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22063.json index 797e0909a56..0716fd5c813 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22063.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22063.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-12-30T10:15:05.867", "lastModified": "2024-12-30T10:15:05.867", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json index 95afea3e9a6..e56bb1fa82b 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-05-14T14:56:40.160", "lastModified": "2024-11-21T08:55:29.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json index 2baf8429dfc..a86e1f846f9 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-10-29T02:15:06.933", "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json index 461d06f446c..0b31fa6cd0e 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-10-10T09:15:03.190", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json index 3733136cca3..97f99805070 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:41.700", "lastModified": "2024-11-21T08:55:33.710", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json index f5879e8d798..530f2ade5bc 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:42.340", "lastModified": "2024-11-21T08:55:44.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22184.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22184.json index 1cf9039b7ef..0323d9b1bdf 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22184.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-08-14T14:15:17.870", "lastModified": "2024-08-14T17:49:14.177", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22459.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22459.json index 8ec1b36c34f..8f96342afa2 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22459.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22459.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-28T09:15:43.877", "lastModified": "2024-11-21T08:56:19.873", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json index 7311eef6b29..17e8394aa6a 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T03:15:12.737", "lastModified": "2024-11-21T09:09:14.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2204.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2204.json index 03b48f16c24..a6fe41387bc 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2204.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "help@fluidattacks.com", "published": "2024-03-15T05:15:07.443", "lastModified": "2024-11-21T09:09:15.083", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json index a36cea0bdf8..537caeb7820 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T03:15:12.937", "lastModified": "2024-11-21T09:09:15.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2249.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2249.json index 2078d40007a..61fd35825f8 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2249.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-14T22:15:22.600", "lastModified": "2024-11-21T09:09:20.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2256.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2256.json index 893c876fb78..01b56f50d6e 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2256.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-14T21:15:51.050", "lastModified": "2024-11-21T09:09:21.633", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23106.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23106.json index d05b6c2c42d..5bc2c8fb775 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23106.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23106.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:28.747", "lastModified": "2025-01-14T15:15:14.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper restriction of excessive authentication attempts [CWE-307] in FortiClientEMS version 7.2.0 through 7.2.4 and before 7.0.10 allows an unauthenticated attacker to try a brute force attack against the FortiClientEMS console via crafted HTTP or HTTPS requests." + }, + { + "lang": "es", + "value": "Una restricci\u00f3n incorrecta de intentos de autenticaci\u00f3n excesivos [CWE-307] en FortiClientEMS versi\u00f3n 7.2.0 a 7.2.4 y anteriores a 7.0.10 permite que un atacante no autenticado intente un ataque de fuerza bruta contra la consola FortiClientEMS a trav\u00e9s de solicitudes HTTP o HTTPS manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json index d4edd7ab3d3..4dded7cf880 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:13.857", "lastModified": "2024-11-21T08:57:59.680", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json index a9a239e9611..905311fd42a 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:12.620", "lastModified": "2024-11-21T08:58:07.350", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json index 9d2723ee0b3..16307d0cddc 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:07.970", "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json index df576653dff..d54a4c92b08 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T22:15:07.640", "lastModified": "2024-11-21T09:09:39.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2399.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2399.json index 66963d5c47d..f6cf4796d67 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2399.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2399.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-15T07:15:09.993", "lastModified": "2024-11-21T09:09:40.213", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json index efbef128e80..9badefd2981 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T22:15:07.423", "lastModified": "2024-11-21T08:58:55.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json index 05a8d272a96..5d5a6eb3a76 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:42.560", "lastModified": "2024-11-21T08:59:28.120", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json index 5d1d424d7ff..95f858bb50b 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-23T15:15:07.600", "lastModified": "2024-11-21T08:59:49.863", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json index 464832d74b1..fe7f560b803 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:15.213", "lastModified": "2024-11-21T09:00:03.660", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json index 894ea481418..3636c06174b 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:15.513", "lastModified": "2024-11-21T09:00:05.640", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json index 776429f92c5..d32f24bf87d 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:15.713", "lastModified": "2024-11-21T09:00:05.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json index 151cc5404ed..4f4e8bdb2a2 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-12T21:15:59.713", "lastModified": "2024-11-21T09:09:41.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json index e7ca3c3222d..eb07a704847 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2409.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T09:15:07.733", "lastModified": "2024-11-21T09:09:41.593", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json index 1c045a7fd4c..aaf1c4b3287 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2411.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T09:15:07.943", "lastModified": "2024-11-21T09:09:41.837", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json index f131d75335e..7a9822478bd 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T13:15:10.493", "lastModified": "2024-08-01T14:04:01.833", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2478.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2478.json index 5744b120a07..b58aa664989 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2478.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2478.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T06:15:09.710", "lastModified": "2024-11-21T09:09:50.483", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json index 2baf5506dbe..785e40e30d2 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2479.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T06:15:10.460", "lastModified": "2024-11-21T09:09:50.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json index 35a6e53c676..50fbdbe6e3e 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T06:15:10.890", "lastModified": "2024-11-21T09:09:50.737", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2481.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2481.json index e45072b48a8..e1f3ec036b9 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2481.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2481.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T06:15:11.300", "lastModified": "2024-11-21T09:09:50.863", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2482.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2482.json index cb1140edc7a..bed1157bb66 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2482.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2482.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-15T07:15:10.250", "lastModified": "2024-11-21T09:09:51.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json index 71917b87e18..e9700404ed2 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2495.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-15T13:15:09.500", "lastModified": "2024-11-21T09:09:52.873", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25097.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25097.json index 0607ee73886..9cf343d1e68 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25097.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25097.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-13T16:15:29.450", "lastModified": "2024-11-21T09:00:15.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25099.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25099.json index dd5b9309e79..e4110f85366 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25099.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25099.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-13T16:15:29.650", "lastModified": "2024-11-21T09:00:15.380", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25101.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25101.json index da8eed97edd..5419af2a976 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25101.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25101.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-13T16:15:29.847", "lastModified": "2024-11-21T09:00:15.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25153.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25153.json index 04e06d41ac6..07e78b6b863 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25153.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25153.json @@ -3,7 +3,7 @@ "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-03-13T15:15:50.913", "lastModified": "2024-11-21T09:00:21.797", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25154.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25154.json index 6fa946477e7..1fa5c325ce8 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25154.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-03-13T15:15:51.307", "lastModified": "2024-11-21T09:00:21.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25155.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25155.json index 03ddbc05568..293cf5a2df3 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25155.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-03-13T15:15:51.700", "lastModified": "2024-11-21T09:00:22.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25156.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25156.json index ee0c48e1210..e2c56075aa9 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25156.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "published": "2024-03-14T14:15:07.857", "lastModified": "2024-11-21T09:00:22.203", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25165.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25165.json index 64132d307c0..bd77a658b41 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25165.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25165.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-14T20:15:46.057", "lastModified": "2024-11-21T09:00:22.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25227.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25227.json index 3b8f13dced4..8c6cabd25c9 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25227.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25227.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-15T06:15:08.603", "lastModified": "2024-11-21T09:00:30.813", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25292.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25292.json index f5372648892..1b653f695c8 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25292.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25292.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T07:15:07.513", "lastModified": "2024-11-21T09:00:34.680", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25371.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25371.json index 4a7e8682cf1..4a3b464d1cd 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25371.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T16:15:28.387", "lastModified": "2025-01-14T15:15:14.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json index 440a747b4a1..e827dfce584 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25592.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.550", "lastModified": "2024-11-21T09:01:02.277", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json index 2062fa35cce..d9be9c0dac4 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25593.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.787", "lastModified": "2024-11-21T09:01:02.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25594.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25594.json index 51dbf41ded1..f9d36c7c258 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25594.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25594.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T07:15:07.587", "lastModified": "2024-11-21T09:01:02.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json index 14b3bb7c2aa..99b35c00da9 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25596.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.990", "lastModified": "2024-11-21T09:01:02.780", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json index 2834b07fbe2..5590a82d716 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25597.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:08.220", "lastModified": "2024-11-21T09:01:02.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25625.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25625.json index 70c8044d3cb..9bca7c6df62 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25625.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25625.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-19T16:15:52.060", "lastModified": "2024-11-21T09:01:06.387", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json index 982187e05ef..c124c99517e 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25698.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:11.297", "lastModified": "2024-11-21T09:01:14.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json index fa779e87f14..a8e54bd9d9b 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25699.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:11.593", "lastModified": "2024-11-21T09:01:14.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json index baeeb58fa08..652eff38334 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:12.603", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25708.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25708.json index 453b759b175..df15d49c299 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25708.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25708.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:13.070", "lastModified": "2024-11-21T09:01:14.923", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json index cf2f8639a4d..20c07773588 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:13.340", "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25865.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25865.json index 9b27b5f1c1f..d4259296f82 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25865.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25865.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-02T22:15:50.293", "lastModified": "2024-11-21T09:01:28.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json index 2127815b217..be3f5a37061 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:17.810", "lastModified": "2024-11-21T09:09:53.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json index 1c2d97730e6..d65babc8a4e 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T04:15:06.750", "lastModified": "2024-11-21T09:09:59.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json index 709226367bd..adf2652ed29 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T09:15:07.253", "lastModified": "2024-11-21T09:10:00.450", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json index 20a30165a10..c524d2ea082 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T10:15:06.923", "lastModified": "2024-11-21T09:10:00.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json index aefaca21125..2f280810fb4 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T11:15:06.297", "lastModified": "2024-11-21T09:10:00.743", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26012.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26012.json index 41ba99f6af6..9085625d881 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26012.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26012.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:28.893", "lastModified": "2025-01-14T14:15:28.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiAP-S 6.2 todas las versiones y 6.4.0 a 6.4.9, FortiAP-W2 6.4 todas las versiones, 7.0 todas las versiones, 7.2.0 a 7.2.3 y 7.4.0 a 7.4.2, FortiAP 6.4 todas las versiones, 7.0 todas las versiones, 7.2.0 a 7.2.3 y 7.4.0 a 7.4.2 permite que un atacante autenticado local ejecute c\u00f3digo no autorizado a trav\u00e9s de la CLI." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json index 18476a36ee6..7d46a86ef30 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-19T05:15:22.527", "lastModified": "2024-11-21T09:02:21.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26328.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26328.json index 7638377d0ae..1cc15847b04 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26328.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26328.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-19T05:15:26.263", "lastModified": "2024-11-21T09:02:22.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26475.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26475.json index d962a132d75..883e5226a1c 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26475.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26475.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T22:15:22.490", "lastModified": "2024-11-21T09:02:28.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json index 827b7f0dde6..65e43609a1b 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27097.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:15:58.993", "lastModified": "2024-11-21T09:03:51.193", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json index 94841c9c3b7..3b4b03f58cf 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:15:59.590", "lastModified": "2024-11-21T09:03:51.810", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27135.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27135.json index 6486b1a57ef..6024abc953e 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27135.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27135.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-03-12T19:15:47.567", "lastModified": "2024-11-21T09:03:55.270", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27305.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27305.json index 593ed96b96d..56b6eb65e50 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27305.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27305.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T21:15:58.630", "lastModified": "2024-11-21T09:04:17.380", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27317.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27317.json index 08915d1be99..8cdbe144ae2 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27317.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-03-12T19:15:47.777", "lastModified": "2024-11-21T09:04:19.237", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27778.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27778.json index 874e3882c2f..91fcb3d124d 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27778.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27778.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.053", "lastModified": "2025-01-14T14:15:29.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 4.4.0 through 4.4.4, 4.2.0 through 4.2.6 and below 4.0.4 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando del sistema operativo [CWE-78] en Fortinet FortiSandbox versi\u00f3n 4.4.0 a 4.4.4, 4.2.0 a 4.2.6 y anteriores a 4.0.4 permite que un atacante autenticado con al menos permiso de solo lectura ejecute comandos no autorizados a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json index b9fb0256c74..2f674c6187c 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27856.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.483", "lastModified": "2025-01-16T15:15:13.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27894.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27894.json index 62456e5ad66..cb7b9c4a766 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27894.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27894.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-03-12T19:15:47.970", "lastModified": "2024-11-21T09:05:21.910", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json index bfb93709888..b7f2550147a 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-14T09:15:47.363", "lastModified": "2024-11-21T09:05:34.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2750.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2750.json index d78133bad22..a7142046db3 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2750.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2750.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:18.673", "lastModified": "2024-11-21T09:10:26.033", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2751.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2751.json index 8ab99670b30..7c2acd09e3e 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2751.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:18.870", "lastModified": "2024-11-21T09:10:26.150", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json index 4fdb55a1fcc..f15141d59df 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T05:15:09.620", "lastModified": "2024-11-21T09:10:30.660", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json index 0f9131b52a3..a1ba3ad11df 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:20:50.620", "lastModified": "2024-11-21T09:10:30.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28098.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28098.json index 293dae41f5d..dca32f34dfa 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28098.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28098.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-03-12T19:15:48.177", "lastModified": "2024-11-21T09:05:48.550", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json index 8157b215e56..33dfcda8014 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28153.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28153", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.687", - "lastModified": "2024-11-21T09:05:54.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:39:08.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,90 @@ "value": "El complemento Jenkins OWASP Dependency-Check 5.4.5 y versiones anteriores no escapa a los metadatos de vulnerabilidad de los informes Dependency-Check, lo que genera una vulnerabilidad de Cross-Site Scripting (XSS) almacenadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:owasp_dependency-check:*:*:*:*:*:jenkins:*:*", + "versionEndExcluding": "5.4.6", + "matchCriteriaId": "9267DD27-4B84-49DC-8761-CA7F7DBD0735" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3344", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3344", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json index 8dc5bec9dfe..eb7f3d362c3 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28154.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28154", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.733", - "lastModified": "2024-11-21T09:05:54.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:36:34.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,90 @@ "value": "Jenkins MQ Notifier Plugin 1.4.0 y versiones anteriores registran par\u00e1metros de compilaci\u00f3n potencialmente confidenciales como parte de la informaci\u00f3n de depuraci\u00f3n en los registros de compilaci\u00f3n de forma predeterminada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:mq_notifier:*:*:*:*:*:jenkins:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "901DACED-5F83-45F1-B5EC-F0C73BBAE52E" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3180", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3180", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json index 7e576f49ffb..d2776749b50 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28155.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28155", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.787", - "lastModified": "2024-11-21T09:05:54.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:29:23.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,90 @@ "value": "El complemento Jenkins AppSpider 1.0.16 y versiones anteriores no realiza comprobaciones de permisos en varios endpoints HTTP, lo que permite a los atacantes con permiso general/lectura obtener informaci\u00f3n sobre los nombres de configuraciones de escaneo disponibles, nombres de grupos de motores y nombres de clientes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:appspider:*:*:*:*:*:jenkins:*:*", + "versionEndExcluding": "1.0.17", + "matchCriteriaId": "003242BE-6D70-44C2-8D4B-6D3A758BEB5E" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3144", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3144", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json index 56dcf4fe04b..ffdee482ead 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28156", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.837", - "lastModified": "2024-11-21T09:05:55.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-19T02:27:21.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,90 @@ "value": "El complemento Jenkins Build Monitor View 1.14-860.vd06ef2568b_3f y versiones anteriores no escapa a los nombres de las vistas de Build Monitor, lo que genera una vulnerabilidad de Cross-Site Scripting (XSS) almacenadas que pueden explotar los atacantes capaces de configurar vistas de Build Monitor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:build_monitor_view:*:*:*:*:*:jenkins:*:*", + "versionEndIncluding": "1.14-860.vd06ef2568b_3f", + "matchCriteriaId": "949A4927-DF84-4CD9-87F3-C63CB65CFD00" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3280", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3280", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json index 66657cb09b5..50e664dd202 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.823", "lastModified": "2024-11-21T09:05:59.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json index d9031f49d3d..beb4f0b2b92 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:01.077", "lastModified": "2024-11-21T09:06:00.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28222.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28222.json index c07093d279c..67f0ffda8ba 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28222.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T07:15:08.377", "lastModified": "2024-11-21T09:06:02.470", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json index aff5d8f303f..b948573c26f 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:44.840", "lastModified": "2024-11-21T09:06:02.767", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28236.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28236.json index 0a4995bc5f2..c7a7cd31ca1 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28236.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28236.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T21:15:59.027", "lastModified": "2024-11-21T09:06:03.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json index 7a682f396fc..a16a1b13b6f 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:45.030", "lastModified": "2024-11-21T09:07:15.640", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json index ed0d755956e..f2b20bbecff 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T14:15:09.530", "lastModified": "2024-11-21T09:10:46.173", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json index 4522e79b187..570a9e807e5 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T16:15:13.853", "lastModified": "2024-11-21T09:10:46.323", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json index bd697341c1d..c323419fd89 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T17:15:47.810", "lastModified": "2024-11-21T09:10:46.457", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json index c5c2f0b2a30..049262a53cb 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T17:15:48.080", "lastModified": "2024-11-21T09:10:46.603", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json index d818606e4fb..5c3bc847835 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T18:15:10.893", "lastModified": "2024-11-21T09:10:46.743", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json index ecaed82bc4c..814da242324 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T18:15:11.543", "lastModified": "2024-11-21T09:10:46.883", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json index 031f62659ef..0135a0a4ce2 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T19:15:48.857", "lastModified": "2024-11-21T09:10:47.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json index 189146f8da1..37099767e32 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T19:15:49.130", "lastModified": "2024-11-21T09:10:47.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json index 7f94cdc94c6..4f47871b249 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T19:15:49.410", "lastModified": "2024-11-21T09:10:47.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json index b0ec7c31499..a7e6b6b6f51 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-04-04T08:15:06.810", "lastModified": "2024-11-21T09:07:21.387", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json index 469018e658e..ed5a8602a2b 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-04-02T20:15:09.607", "lastModified": "2024-11-21T09:08:26.233", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json index 0096083a765..3dc6cebc2dd 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T08:15:39.137", "lastModified": "2024-11-21T09:08:37.313", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29970.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29970.json index 2d744c931df..42dbd9be2fd 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29970.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29970.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T16:15:28.513", "lastModified": "2025-01-14T15:15:14.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29971.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29971.json index 16fccbcbdbf..60cdb8b07d5 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29971.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29971.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T16:15:28.630", "lastModified": "2025-01-14T15:15:15.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29972.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29972.json index d040deb4b3a..cd93d78da86 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29972.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29972.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-06-04T02:15:47.960", "lastModified": "2024-11-21T09:08:43.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29973.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29973.json index bc3a638e7bc..575c1752364 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29973.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29973.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-06-04T02:15:48.290", "lastModified": "2024-11-21T09:08:43.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29974.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29974.json index b4678606e77..4983a469355 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29974.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29974.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-06-04T02:15:48.517", "lastModified": "2024-11-21T09:08:43.847", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29975.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29975.json index 9162f215b4b..54ad91dbbc2 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29975.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29975.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-06-04T02:15:48.760", "lastModified": "2024-11-21T09:08:43.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29976.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29976.json index 4f6a3602595..064d3785dda 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29976.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29976.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-06-04T02:15:49.050", "lastModified": "2024-11-21T09:08:44.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29979.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29979.json index 276881c10c7..7ef44d9fe1b 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29979.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29979.json @@ -3,12 +3,16 @@ "sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "published": "2025-01-14T16:15:28.423", "lastModified": "2025-01-14T16:15:28.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334." + }, + { + "lang": "es", + "value": "La vulnerabilidad de verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en Phoenix SecureCore\u2122 para Intel Kaby Lake, Phoenix SecureCore\u2122 para Intel Coffee Lake, Phoenix SecureCore\u2122 para Intel Comet Lake y Phoenix SecureCore\u2122 para Intel Ice Lake permite la manipulaci\u00f3n de datos de entrada. Este problema afecta a SecureCore\u2122 para Intel Kaby Lake: anterior a 4.0.1.1012; SecureCore\u2122 para Intel Coffee Lake: anterior a 4.1.0.568; SecureCore\u2122 para Intel Comet Lake: anterior a 4.2.1.292; SecureCore\u2122 para Intel Ice Lake: anterior a 4.2.0.334." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29980.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29980.json index 771533f815e..8f1f313043c 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29980.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29980.json @@ -3,12 +3,16 @@ "sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "published": "2025-01-14T16:15:28.600", "lastModified": "2025-01-14T16:15:28.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334." + }, + { + "lang": "es", + "value": "La vulnerabilidad de verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en Phoenix SecureCore\u2122 para Intel Kaby Lake, Phoenix SecureCore\u2122 para Intel Coffee Lake, Phoenix SecureCore\u2122 para Intel Comet Lake y Phoenix SecureCore\u2122 para Intel Ice Lake permite la manipulaci\u00f3n de datos de entrada. Este problema afecta a SecureCore\u2122 para Intel Kaby Lake: anterior a 4.0.1.1012; SecureCore\u2122 para Intel Coffee Lake: anterior a 4.1.0.568; SecureCore\u2122 para Intel Comet Lake: anterior a 4.2.1.292; SecureCore\u2122 para Intel Ice Lake: anterior a 4.2.0.334." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json index 388511d0b9c..06dca378fce 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T20:15:10.500", "lastModified": "2024-11-21T09:10:47.473", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json index edbc6d04f64..6f46314517a 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T20:15:10.933", "lastModified": "2024-11-21T09:10:47.610", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json index b1c19643a50..ed0552dfcd0 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T20:15:11.203", "lastModified": "2024-11-21T09:10:47.757", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json index f2ea48217be..8d2f2e93958 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T21:15:53.343", "lastModified": "2024-11-21T09:10:47.910", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2966.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2966.json index f9f584214a4..5c467ea844a 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2966.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2966.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-04-11T08:15:50.310", "lastModified": "2024-11-21T09:10:57.000", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json index 5504c27ded4..350ce692189 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:49.940", "lastModified": "2024-11-21T09:11:00.327", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json index 11490e91b6c..96abe7fb432 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:50.173", "lastModified": "2024-11-21T09:11:00.473", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json index cf724e398df..3a8f17d2a72 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T12:15:13.710", "lastModified": "2024-11-21T09:11:23.273", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30335.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30335.json index 2559cbc35fb..fc54fac2c0b 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30335.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-02T18:15:12.110", "lastModified": "2024-11-21T09:11:43.017", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30473.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30473.json index ec951ac5c82..94c1f0d3aff 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30473.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-18T16:15:06.817", "lastModified": "2024-11-21T09:11:59.923", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30487.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30487.json index 0cb5f55082a..2991d5a2b14 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30487.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T14:15:10.960", "lastModified": "2024-11-21T09:12:01.317", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json index 1c0dcdf820b..edeba16d209 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T14:15:12.737", "lastModified": "2024-11-21T09:12:02.553", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json index 8c916a282c1..95398e322c7 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-31T20:15:08.490", "lastModified": "2024-11-21T09:12:06.883", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json index 13900f34d4e..ac87be8d88b 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-05-14T15:39:48.660", "lastModified": "2024-11-21T09:28:44.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json index a6ce9744589..92b173b3725 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:09.800", "lastModified": "2024-11-21T09:12:48.597", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31488.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31488.json index 2d3f3399884..726163bce2e 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31488.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-05-14T17:17:23.733", "lastModified": "2024-11-21T09:13:38.013", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json index acffbc042f5..7661e81db6f 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-04-10T13:51:38.607", "lastModified": "2024-11-21T09:13:38.490", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json index 0d59ccb3503..40ef18c1ecb 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T08:15:09.097", "lastModified": "2024-11-21T09:13:38.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json index b32c4e74d99..04b9f1a04dd 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:08.617", "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json index 17d32f53fdb..917f8298f1d 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T17:16:19.970", "lastModified": "2024-11-21T09:28:58.147", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json index d94aff0b47e..24fa283aa0f 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T23:15:08.733", "lastModified": "2024-11-21T09:28:58.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json index 6523a6cf47e..ceb6b9b043b 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T23:15:09.393", "lastModified": "2024-11-21T09:28:59.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3197.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3197.json index 0be9359cea2..2cf8b79a3a3 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3197.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:23.007", "lastModified": "2024-11-21T09:29:07.820", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3199.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3199.json index 073b9814898..0a3b6b82903 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3199.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3199.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:23.177", "lastModified": "2024-11-21T09:29:08.080", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32115.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32115.json index 1dc4166e7bd..4dd5f3a1d6b 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32115.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32115.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.200", "lastModified": "2025-01-14T15:15:15.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A relative path traversal vulnerability [CWE-23] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 allows a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad relativa Path Traversal [CWE-23] en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.2 y anteriores a 7.2.5 permite a un atacante privilegiado eliminar archivos del sistema de archivos subyacente a trav\u00e9s de solicitudes HTTP o HTTPS manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json index 81d4a33c448..41300206e73 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:08.860", "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json index 7e061581d45..406486472c2 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:09.073", "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32572.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32572.json index d2b0ef4d696..5eaaa8a8d43 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32572.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32572.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-18T10:15:11.840", "lastModified": "2024-11-21T09:15:12.467", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32714.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32714.json index 5a8db4910c7..e65755acc52 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32714.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32714.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T17:15:49.040", "lastModified": "2024-11-21T09:15:32.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32718.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32718.json index d7bd7276ba6..420dda0bea3 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32718.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32718.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T08:15:38.713", "lastModified": "2024-11-21T09:15:33.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json index ec7efe1985b..43c8be5de5f 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:10.043", "lastModified": "2024-11-21T09:15:40.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32785.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32785.json index 6a9f5f6b771..12a1566f78f 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32785.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32785.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-24T11:15:47.793", "lastModified": "2024-11-21T09:15:43.027", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json index 831b23b764c..8d160c86be8 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T10:15:09.257", "lastModified": "2024-11-21T09:29:14.820", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33297.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33297.json index 9d514e7da51..9a47df59fc7 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33297.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33297.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T20:15:30.443", "lastModified": "2025-01-14T16:15:28.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33298.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33298.json index d2df8214d62..3091135697c 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33298.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33298.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T20:15:30.563", "lastModified": "2025-01-13T16:15:16.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33299.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33299.json index d0ccdbcab6c..a5f606ab8ed 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33299.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33299.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T20:15:30.690", "lastModified": "2025-01-14T16:15:28.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33502.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33502.json index b48c128d5d7..6dcdfe379e0 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33502.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33502.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.360", "lastModified": "2025-01-14T14:15:29.360", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 allows attacker to execute unauthorized code or commands via crafted HTTP or HTTPs requests." + }, + { + "lang": "es", + "value": "Una limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en Fortinet FortiManager, FortiAnalyzer versiones 7.4.0 a 7.4.2 y 7.2.0 a 7.2.5 y 7.0.0 a 7.0.12 y 6.4.0 a 6.4.14 y 6.2.0 a 6.2.12 y 6.0.0 a 6.0.12 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP o HTTPS manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33503.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33503.json index 622e2c5d782..499d6837489 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33503.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33503.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.517", "lastModified": "2025-01-14T14:15:29.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper privilege management in Fortinet FortiManager version 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to escalation of privilege via specific shell commands" + }, + { + "lang": "es", + "value": "Una gesti\u00f3n de privilegios incorrecta en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.3, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14, FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14 permite a los atacantes escalar privilegios a trav\u00e9s de comandos de shell espec\u00edficos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json index 59cf4695eae..42a333c2f2c 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-10-08T15:15:14.717", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33568.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33568.json index fa075ca17c6..9b8334e7b7f 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33568.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33568.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T14:15:10.440", "lastModified": "2024-11-21T09:17:10.180", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33912.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33912.json index 0586bbdc47c..492d7cc62c9 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33912.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33912.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-06T19:15:07.000", "lastModified": "2024-11-21T09:17:43.477", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json index ff6fb6105e7..4d08412a191 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T21:15:17.203", "lastModified": "2024-11-21T09:29:22.533", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json index 03c968437e0..39ed8ae2b55 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:10.270", "lastModified": "2024-11-21T09:18:13.217", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34166.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34166.json index 160c1385576..fc1de5a4003 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34166.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34166.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:15.637", "lastModified": "2025-01-14T16:15:29.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An os command injection vulnerability exists in the touchlist_sync.cgi touchlistsync() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted set of HTTP requests can lead to arbitrary code execution. An attacker can send an HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n touchlistsync() de touchlist_sync.cgi de Wavlink AC3000 M33A8.V5030.210505. Un conjunto especial de solicitudes HTTP manipuladas puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una solicitud HTTP para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json index f2d32749341..2cf3099be80 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-06T19:15:08.333", "lastModified": "2024-11-21T09:18:32.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34544.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34544.json index 275ee54a9b8..89e5f7fb462 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34544.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34544.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:15.873", "lastModified": "2025-01-14T16:15:29.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability exists in the wireless.cgi AddMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n AddMac() de wireless.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json index db1abd520b0..32c50bbb0ca 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T11:15:24.193", "lastModified": "2024-11-21T09:18:56.500", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34579.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34579.json index de236617643..5015ef53e39 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34579.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34579.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-01-17T01:15:22.377", "lastModified": "2025-01-17T01:15:22.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fuji Electric Alpha5 SMART \n\nis vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." + }, + { + "lang": "es", + "value": " Fuji Electric Alpha5 SMART es vulnerable a un desbordamiento de b\u00fafer basado en pila, lo que puede permitir que un atacante ejecute c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json index f33213c0bb3..14850438b37 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-07T15:15:07.253", "lastModified": "2024-11-21T09:29:34.370", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3489.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3489.json index c2e5e0539c1..0d358f58c60 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3489.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3489.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:25.773", "lastModified": "2024-11-21T09:29:42.780", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json index a5cc38e6dc1..3b019a126ab 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:41.900", "lastModified": "2024-11-21T09:19:51.723", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json index 9bab275baba..c6309a32d8d 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:10.497", "lastModified": "2024-11-21T09:19:55.233", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json index 02e0441af99..e74cd4a864a 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35201.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:21.773", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35273.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35273.json index cfd60b0f6ff..0dae56586d0 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35273.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.663", "lastModified": "2025-01-14T14:15:29.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A out-of-bounds write in Fortinet FortiManager version 7.4.0 through 7.4.2, FortiAnalyzer version 7.4.0 through 7.4.2 allows attacker to escalation of privilege via specially crafted http requests." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en Fortinet FortiManager versi\u00f3n 7.4.0 a 7.4.2 y FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.2 permite a un atacante escalar privilegios a trav\u00e9s de solicitudes http especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35275.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35275.json index b3713f070d5..11309b89534 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35275.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35275.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.817", "lastModified": "2025-01-14T14:15:29.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, FortiManager version 7.4.0 through 7.4.2 allows attacker to escalation of privilege via specially crafted http requests." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando sql ('inyecci\u00f3n sql') en Fortinet FortiAnalyzer versi\u00f3n 7.4.0 a 7.4.2, FortiManager versi\u00f3n 7.4.0 a 7.4.2 permite a un atacante escalar privilegios a trav\u00e9s de solicitudes http especialmente manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35276.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35276.json index 5a5b7318fdc..a1a9946bcdf 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35276.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35276.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:29.973", "lastModified": "2025-01-14T14:15:29.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en pila en Fortinet FortiAnalyzer versiones 7.4.0 a 7.4.3, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14, FortiManager versiones 7.4.0 a 7.4.3, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14, FortiManager Cloud versiones 7.4.1 a 7.4.3, 7.2.1 a 7.2.5, 7.0.1 a 7.0.11, 6.4.1 a 6.4.7, FortiAnalyzer Cloud versiones 7.4.1 a 7.4.3, 7.2.1 a 7.2.5, 7.0.1 ...2, 6.4.0 a 6.4.14, FortiManager Cloud versiones 7.4.1 a 7.4.3, 7.2.1 a 7.2.5, 7.0.1 a 7.0.12, 7.0.11, 6.4.1 a 6.4.7 permite a los atacantes ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de paquetes especialmente manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35277.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35277.json index 5e0865e6a48..7bbb7a3f5ef 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35277.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35277.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:30.130", "lastModified": "2025-01-14T14:15:30.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing authentication for critical function in Fortinet FortiPortal version 6.0.0 through 6.0.15, FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to access to the configuration of the managed devices by sending specifically crafted packets" + }, + { + "lang": "es", + "value": "La falta de autenticaci\u00f3n para una funci\u00f3n cr\u00edtica en Fortinet FortiPortal versi\u00f3n 6.0.0 a 6.0.15, FortiManager versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.5, 7.0.0 a 7.0.12, 6.4.0 a 6.4.14 permite a un atacante acceder a la configuraci\u00f3n de los dispositivos administrados mediante el env\u00edo espec\u00edfico de paquetes manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35278.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35278.json index 7bc0778f1dc..a461bdc3b02 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35278.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35278.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:30.280", "lastModified": "2025-01-14T14:15:30.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.2.4 through 7.2.0 and 7.0.0 through 7.2.8 may allow an authenticated attacker to view the SQL query being run server-side when submitting an HTTP request, via including special elements in said request." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando sql ('sql injection') en Fortinet FortiPortal versiones 7.2.4 a 7.2.0 y 7.0.0 a 7.2.8 puede permitir que un atacante autenticado vea la consulta SQL que se ejecuta en el servidor al enviar una solicitud HTTP, a trav\u00e9s de elementos especiales incluida en dicha solicitud." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35280.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35280.json index eadf7b419dd..16cadb7f7c3 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35280.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-15T11:15:09.087", "lastModified": "2025-01-15T11:15:09.087", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json index efdfb19234a..b3e03a77b09 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36253.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:22.730", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36258.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36258.json index fa00eb78cbc..cce4c97f7e6 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36258.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36258.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:16.080", "lastModified": "2025-01-14T16:15:29.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the touchlist_sync.cgi touchlistsync() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send an HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n touchlistsync() de touchlist_sync.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una solicitud HTTP para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36272.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36272.json index 628abab6d80..56e2b2bd4e9 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36272.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36272.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:16.250", "lastModified": "2025-01-14T16:15:29.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the usbip.cgi set_info() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_info() de usbip.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json index 9aef6238fba..6f7d9725192 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36276.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:23.253", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36290.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36290.json index 5841f4d453f..3ac9a92f0c1 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36290.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36290.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:16.443", "lastModified": "2025-01-14T16:15:29.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the login.cgi Goto_chidx() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an unauthenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n Goto_chidx() de login.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP no autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json index def8a5233af..7d1f61be4fb 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36294.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.040", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36295.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36295.json index 9ca7d644216..b3408d4a798 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36295.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36295.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:16.627", "lastModified": "2025-01-14T16:15:29.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command execution vulnerability exists in the qos.cgi qos_sta() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos en la funci\u00f3n qos.cgi qos_sta() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json index bd604b058f9..7128312be60 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36402.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:32.047", "lastModified": "2025-01-16T20:15:32.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. MMR 1.3.5 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector. Though extremely limited, server operators can use more strict rate limits based on IP address as a partial workaround." + }, + { + "lang": "es", + "value": " Matrix Media Repo (MMR) es un repositorio multimedia para m\u00faltiples servidores dom\u00e9sticos altamente configurable para Matrix. La versi\u00f3n 1.3.5 de MMR permite, por dise\u00f1o, que los participantes remotos no autenticados activen una descarga y almacenamiento en cach\u00e9 de contenido multimedia remoto desde un servidor dom\u00e9stico remoto al repositorio multimedia local. Dicho contenido tambi\u00e9n se vuelve disponible para su descarga desde el servidor dom\u00e9stico local de manera no autenticada. La implicaci\u00f3n es que los adversarios remotos no autenticados pueden usar esta funcionalidad para introducir contenido problem\u00e1tico en el repositorio multimedia. MMR 1.3.5 introduce una mitigaci\u00f3n parcial en forma de nuevos endpoints que requieren autenticaci\u00f3n para las descargas multimedia. Los endpoints no autenticados se congelar\u00e1n en una versi\u00f3n futura, lo que cerrar\u00e1 el vector de ataque. Aunque son extremadamente limitados, los operadores de servidores pueden usar l\u00edmites de velocidad m\u00e1s estrictos basados en la direcci\u00f3n IP como workaround parcial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json index cb5f399e3ca..b1347e93974 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36403.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:32.197", "lastModified": "2025-01-16T20:15:32.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 is vulnerable to unbounded disk consumption, where an unauthenticated adversary can induce it to download and cache large amounts of remote media files. MMR's typical operating environment uses S3-like storage as a backend, with file-backed store as an alternative option. Instances using a file-backed store or those which self-host an S3 storage system are therefore vulnerable to a disk fill attack. Once the disk is full, authenticated users will be unable to upload new media, resulting in denial of service. For instances configured to use a cloud-based S3 storage option, this could result in high service fees instead of a denial of service. MMR 1.3.5 introduces a new default-on \"leaky bucket\" rate limit to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user's ability to request large amounts of data. Operators should note that the leaky bucket implementation introduced in MMR 1.3.5 requires the IP address associated with the request to be forwarded, to avoid mistakenly applying the rate limit to the reverse proxy instead. To avoid this issue, the reverse proxy should populate the X-Forwarded-For header when sending the request to MMR. Operators who cannot update may wish to lower the maximum file size they allow and implement harsh rate limits, though this can still lead to a large amount of data to be downloaded." + }, + { + "lang": "es", + "value": "Matrix Media Repo (MMR) es un repositorio multimedia para m\u00faltiples servidores dom\u00e9sticos altamente configurable para Matrix. MMR anterior a la versi\u00f3n 1.3.5 es vulnerable al consumo ilimitado de disco, donde un adversario no autenticado puede inducirlo a descargar y almacenar en cach\u00e9 grandes cantidades de archivos multimedia remotos. El entorno operativo t\u00edpico de MMR utiliza un almacenamiento similar a S3 como backend, con un almacenamiento respaldado por archivos como una opci\u00f3n alternativa. Las instancias que utilizan un almacenamiento respaldado por archivos o aquellas que alojan por s\u00ed mismas un sistema de almacenamiento S3 son, por lo tanto, vulnerables a un ataque de llenado de disco. Una vez que el disco est\u00e1 lleno, los usuarios autenticados no podr\u00e1n cargar nuevos medios, lo que resultar\u00e1 en una denegaci\u00f3n de servicio. Para las instancias configuradas para utilizar una opci\u00f3n de almacenamiento S3 basada en la nube, esto podr\u00eda resultar en altas tarifas de servicio en lugar de una denegaci\u00f3n de servicio. MMR 1.3.5 introduce un nuevo l\u00edmite de tasa de \"dep\u00f3sito con fugas\" predeterminado para reducir la cantidad de datos que un usuario puede solicitar a la vez. Esto no resuelve el problema por completo, pero limita la capacidad de un usuario no autenticado de solicitar grandes cantidades de datos. Los operadores deben tener en cuenta que la implementaci\u00f3n del contenedor con fugas introducida en MMR 1.3.5 requiere que se reenv\u00ede la direcci\u00f3n IP asociada con la solicitud, para evitar aplicar por error el l\u00edmite de velocidad al proxy inverso. Para evitar este problema, el proxy inverso debe completar el encabezado X-Forwarded-For al enviar la solicitud a MMR. Los operadores que no pueden actualizar pueden desear reducir el tama\u00f1o m\u00e1ximo de archivo que permiten e implementar l\u00edmites de velocidad estrictos, aunque esto puede dar lugar a que se descargue una gran cantidad de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36476.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36476.json index a015854b6eb..7c1a51982e1 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36476.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36476.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:09.460", "lastModified": "2025-01-15T13:15:09.460", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json index 8733eb28c66..deb1f53ede4 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36482.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.287", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json index 1d40b13daca..e3cc478f5e5 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:24.533", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36493.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36493.json index ed1277ec8cb..ef656940951 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36493.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36493.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:16.830", "lastModified": "2025-01-14T16:15:29.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the wireless.cgi set_wifi_basic() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n set_wifi_basic() de wireless.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36504.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36504.json index 4e33b8b2c99..1e34fd2623d 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36504.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36504.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:30.433", "lastModified": "2025-01-14T15:15:17.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability [CWE-125] in FortiOS SSLVPN web portal versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, 7.0 all verisons, and 6.4 all versions may allow an authenticated attacker to perform a denial of service on the SSLVPN web portal via a specially crafted URL." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de lectura fuera de los l\u00edmites [CWE-125] en las versiones 7.4.0 a 7.4.4, 7.2.0 a 7.2.8, 7.0 todas las versiones y 6.4 todas las versiones del portal web FortiOS SSLVPN puede permitir que un atacante autenticado realice una denegaci\u00f3n de servicio en el portal web SSLVPN a trav\u00e9s de una URL especialmente manipulada ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36506.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36506.json index bc3e515e270..61fecec5b89 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36506.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36506.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:30.590", "lastModified": "2025-01-14T14:15:30.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n incorrecta de la fuente de una vulnerabilidad del canal de comunicaci\u00f3n [CWE-940] en FortiClientEMS 7.4.0, 7.2.0 a 7.2.4, 7.0 todas las versiones, 6.4 todas las versiones puede permitir que un atacante remoto omita la funci\u00f3n de host confiable a trav\u00e9s de una conexi\u00f3n de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36510.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36510.json index d58b2820810..408f8f126e6 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36510.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36510.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:30.737", "lastModified": "2025-01-14T14:15:30.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An observable response discrepancy vulnerability [CWE-204] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, and FortiSOAR 7.5.0, 7.4.0 through 7.4.4, 7.3.0 through 7.3.2, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to enumerate valid users via observing login request responses." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de discrepancia de respuesta observable [CWE-204] en FortiClientEMS 7.4.0, 7.2.0 a 7.2.4, 7.0 todas las versiones, y FortiSOAR 7.5.0, 7.4.0 a 7.4.4, 7.3.0 a 7.3.2, 7.2 todas las versiones, 7.0 todas las versiones, 6.4 todas las versiones puede permitir que un atacante no autenticado enumere usuarios v\u00e1lidos mediante la observaci\u00f3n de las respuestas de las solicitudes de inicio de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36512.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36512.json index 22ca49c0fd2..e9058a7ec49 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36512.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36512.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:30.880", "lastModified": "2025-01-14T14:15:30.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager, FortiAnalyzer 7.4.0 through 7.4.3 and 7.2.0 through 7.2.5 and 7.0.2 through 7.0.12 and 6.2.10 through 6.2.13 allows attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests." + }, + { + "lang": "es", + "value": "Una limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en Fortinet FortiManager, FortiAnalyzer 7.4.0 a 7.4.3 y 7.2.0 a 7.2.5 y 7.0.2 a 7.0.12 y 6.2.10 a 6.2.13 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP o HTTPS manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json index 9042426ff03..566acf526b3 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T22:15:26.400", "lastModified": "2025-01-15T22:15:26.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in parse-uri v1.0.9 allows attackers to cause a Regular expression Denial of Service (ReDoS) via a crafted URL." + }, + { + "lang": "es", + "value": " Un problema en parse-uri v1.0.9 permite a los atacantes provocar una denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) a trav\u00e9s de una URL manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json index 024284d42f5..5163c571741 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-12T16:15:40.707", "lastModified": "2024-11-21T09:30:11.617", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json index 87a787ad093..ca13c3904a0 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:17.320", "lastModified": "2025-01-02T12:15:17.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json index dc4014d6431..7520dbb86a0 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T14:15:05.980", "lastModified": "2024-12-02T14:15:05.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37181.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37181.json index e646047be30..6d912181c5c 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37181.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37181.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@intel.com", "published": "2025-01-16T18:15:22.307", "lastModified": "2025-01-16T18:15:22.307", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Time-of-check time-of-use race condition in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable information disclosure via adjacent access." + }, + { + "lang": "es", + "value": " La condici\u00f3n de ejecuci\u00f3n de Time-of-check time-of-use en alg\u00fan software Intel\u00ae Neural Compressor anterior a la versi\u00f3n v3.0 puede permitir que un usuario autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso adyacente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37184.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37184.json index 1b2342c9e81..d69a3021bca 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37184.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37184.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:17.270", "lastModified": "2025-01-14T16:15:29.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the adm.cgi rep_as_bridge() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n rep_as_bridge() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37186.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37186.json index b774e44ac26..5b3866e5c33 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37186.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37186.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:17.470", "lastModified": "2025-01-14T16:15:29.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An os command injection vulnerability exists in the adm.cgi set_ledonoff() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_ledonoff() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37357.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37357.json index 830563ea322..4e72a002391 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37357.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37357.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:17.660", "lastModified": "2025-01-14T16:15:30.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the adm.cgi set_TR069() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_TR069() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37512.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37512.json index 2d3a5bb7102..2680ee2de1c 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37512.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37512.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-21T08:15:04.440", "lastModified": "2024-11-21T09:23:58.413", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3718.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3718.json index 2fc8be60e74..3e1f3b1cb82 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3718.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3718.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T06:15:09.100", "lastModified": "2024-11-21T09:30:14.200", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38266.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38266.json index aa4c8fd7d02..88e65a22b7a 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38266.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38266.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-09-24T02:15:02.220", "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json index 3f6288a0f9f..167db5d41b0 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38383.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:25.470", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json index 6061a240ff8..4e13375e7e9 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-09T15:15:14.110", "lastModified": "2024-12-09T15:15:14.110", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38666.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38666.json index 00f1080b3c9..887e8c8d9a3 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38666.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38666.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:17.847", "lastModified": "2025-01-14T16:15:30.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An external config control vulnerability exists in the openvpn.cgi openvpn_client_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de configuraci\u00f3n externa en la funci\u00f3n openvpn.cgi openvpn_client_setup() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json index b84acee5c87..6698497af84 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38668.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@intel.com", "published": "2024-11-13T21:15:26.500", "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38768.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38768.json index 60d6cb0b637..1e558457db4 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38768.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38768.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T21:15:27.637", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3875.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3875.json index b27e8d85c16..f3299e66a01 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3875.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3875.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T18:15:14.397", "lastModified": "2024-11-21T09:30:36.597", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json index ffb2a9d127a..659f2a71c42 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T18:15:14.623", "lastModified": "2024-11-21T09:30:36.723", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3877.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3877.json index 97d4f37ef37..b9674113e4e 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3877.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3877.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T19:15:07.667", "lastModified": "2024-11-21T09:30:36.857", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3878.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3878.json index 5dc0c52eb60..f74fa27a66a 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3878.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T19:15:07.920", "lastModified": "2024-11-21T09:30:36.983", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39273.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39273.json index 3a483c827b1..249c207e2a1 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39273.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:18.040", "lastModified": "2025-01-14T16:15:30.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A firmware update vulnerability exists in the fw_check.sh functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can perform a man-in-the-middle attack to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de actualizaci\u00f3n de firmware en la funci\u00f3n fw_check.sh de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar una actualizaci\u00f3n de firmware arbitraria. Un atacante puede realizar un ataque de intermediario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39280.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39280.json index 23ea5e5bcd6..db8bfafec1b 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39280.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39280.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:18.240", "lastModified": "2025-01-14T16:15:30.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An external config control vulnerability exists in the nas.cgi set_smb_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de configuraci\u00f3n externa en la funci\u00f3n set_smb_cfg() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json index 9fd64e1bfdb..168736c4ad7 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:09.740", "lastModified": "2025-01-15T13:15:09.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39288.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39288.json index 10319208e62..934ec58dd2e 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39288.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39288.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:18.413", "lastModified": "2025-01-14T16:15:30.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_add_routing() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39294.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39294.json index 7a05392f7c0..779d451493d 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39294.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39294.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:18.600", "lastModified": "2025-01-14T16:15:30.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the adm.cgi set_wzdgw4G() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_wzdgw4G() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39299.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39299.json index 4810bd93aec..b5e64b1eb13 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39299.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39299.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:18.773", "lastModified": "2025-01-14T16:15:30.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the qos.cgi qos_sta_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n qos.cgi qos_sta_settings() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39357.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39357.json index 12a5506cdeb..1238245a0ef 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39357.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39357.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:18.920", "lastModified": "2025-01-14T16:15:30.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the wireless.cgi SetName() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n SetName() de wireless.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39358.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39358.json index c94875fb510..3e78b62fca8 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39358.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39358.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.063", "lastModified": "2025-01-14T16:15:30.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the adm.cgi set_wzap() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_wzap() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39359.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39359.json index 58bb0a4ac67..d4403b5fd3f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39359.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39359.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.227", "lastModified": "2025-01-14T16:15:31.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the wireless.cgi DeleteMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n DeleteMac() de wireless.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39360.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39360.json index d67b07f8a7e..41b2b95785e 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39360.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39360.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.370", "lastModified": "2025-01-14T16:15:31.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An os command injection vulnerability exists in the nas.cgi remove_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n remove_dir() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39363.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39363.json index 486e17d426d..930edf74f8f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39363.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.517", "lastModified": "2025-01-14T16:15:31.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (xss) vulnerability exists in the login.cgi set_lang_CountryCode() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de secuencias de comandos entre sitios (XSS) en la funci\u00f3n set_lang_CountryCode() de login.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la divulgaci\u00f3n de informaci\u00f3n confidencial. Un atacante puede realizar una solicitud HTTP no autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39367.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39367.json index 52a9f14a6eb..ca813f3be54 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39367.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39367.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.677", "lastModified": "2025-01-14T16:15:31.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An os command injection vulnerability exists in the firewall.cgi iptablesWebsFilterRun() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n iptablesWebsFilterRun() de firewall.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39370.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39370.json index 2046f874c16..f39a2f839c9 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39370.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39370.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.827", "lastModified": "2025-01-14T16:15:31.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary code execution vulnerability exists in the adm.cgi set_MeshAp() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario en la funci\u00f3n set_MeshAp() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39602.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39602.json index 5e5d8b86ec4..50e7796b453 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39602.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39602.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:19.970", "lastModified": "2025-01-14T16:15:31.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An external config control vulnerability exists in the nas.cgi set_nas() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de configuraci\u00f3n externa en la funci\u00f3n set_nas() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39603.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39603.json index 34e73a88ca6..0d76e949835 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39603.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39603.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:20.120", "lastModified": "2025-01-14T16:15:31.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the wireless.cgi set_wifi_basic_mesh() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n set_wifi_basic_mesh() de wireless.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39604.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39604.json index 9c5e60bf8f9..f3cc63342a4 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39604.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39604.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:20.280", "lastModified": "2025-01-14T16:15:31.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command execution vulnerability exists in the update_filter_url.sh functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos en la funci\u00f3n update_filter_url.sh de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar un ataque de intermediario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39608.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39608.json index 20b9341fb1a..1d90669af85 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39608.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39608.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:20.433", "lastModified": "2025-01-14T16:15:31.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A firmware update vulnerability exists in the login.cgi functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can send an unauthenticated message to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de actualizaci\u00f3n de firmware en la funci\u00f3n login.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar una actualizaci\u00f3n de firmware arbitraria. Un atacante puede enviar un mensaje no autenticado para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39667.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39667.json index 8cf4db0623c..c9217f43eb9 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39667.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39667.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T22:15:28.323", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39754.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39754.json index 34559297512..c89c827465a 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39754.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39754.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:20.573", "lastModified": "2025-01-14T16:15:31.977", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A static login vulnerability exists in the wctrls functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted set of network packets can lead to root access. An attacker can send packets to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inicio de sesi\u00f3n est\u00e1tico en la funci\u00f3n wctrls de Wavlink AC3000 M33A8.V5030.210505. Un conjunto de paquetes de red manipulados especialmente puede generar acceso a root. Un atacante puede enviar paquetes para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39756.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39756.json index 7c76fa38efd..394bc43f22d 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39756.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39756.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:20.753", "lastModified": "2025-01-14T16:15:32.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the adm.cgi rep_as_router() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n rep_as_router() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39757.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39757.json index f145bdabf4c..d0af20712b7 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39757.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39757.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:20.903", "lastModified": "2025-01-14T16:15:32.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the wireless.cgi AddMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n AddMac() de wireless.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39759.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39759.json index 1786242d398..b94583b3d19 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39759.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39759.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.057", "lastModified": "2025-01-14T15:15:21.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_hour_value` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_sys_init() de login.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP no autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos dentro del par\u00e1metro POST `restart_hour_value`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39760.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39760.json index cc59f623c6f..2225704e872 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39760.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39760.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.213", "lastModified": "2025-01-14T15:15:21.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_min_value` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_sys_init() de login.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP no autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos dentro del par\u00e1metro POST `restart_min_value`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39761.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39761.json index 81fbabeef0b..728422f42fa 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39761.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39761.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.363", "lastModified": "2025-01-14T15:15:21.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_week_value` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_sys_init() de login.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP no autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos dentro del par\u00e1metro POST `restart_week_value`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39762.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39762.json index d302ad31f55..4d3cc79f5e3 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39762.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39762.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.513", "lastModified": "2025-01-14T15:15:21.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `netmask` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_add_routing() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `netmask`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39763.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39763.json index 614d8675c86..fcd55c34472 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39763.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39763.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.663", "lastModified": "2025-01-14T15:15:21.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `gateway` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_add_routing() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `gateway`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39764.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39764.json index 25bbfe82c9c..20e9f0755e2 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39764.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39764.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.813", "lastModified": "2025-01-14T15:15:21.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `dest` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_add_routing() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `dest`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39765.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39765.json index c6a6c85959a..cd6cf3bcaad 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39765.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39765.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:21.973", "lastModified": "2025-01-14T15:15:21.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `custom_interface` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n set_add_routing() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `custom_interface`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39768.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39768.json index 6442f011103..0420a426517 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39768.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39768.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:22.127", "lastModified": "2025-01-14T15:15:22.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflow vulnerabilities exist in the internet.cgi set_qos() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability exists in the `cli_name` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer en la funci\u00f3n set_qos() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Esta vulnerabilidad existe en el par\u00e1metro POST `cli_name`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39769.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39769.json index 58f03edcf3a..3c09b633f03 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39769.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39769.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:22.270", "lastModified": "2025-01-14T15:15:22.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflow vulnerabilities exist in the internet.cgi set_qos() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability exists in the `cli_mac` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer en la funci\u00f3n set_qos() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Esta vulnerabilidad existe en el par\u00e1metro POST `cli_mac`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39770.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39770.json index 2da92ecebe1..01d06ae60c7 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39770.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39770.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:22.430", "lastModified": "2025-01-14T15:15:22.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflow vulnerabilities exist in the internet.cgi set_qos() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability exists in the `en_enable` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer en la funci\u00f3n set_qos() de internet.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Esta vulnerabilidad existe en el par\u00e1metro POST `en_enable`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39773.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39773.json index be1a3179161..86c6b3975d7 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39773.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39773.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:22.583", "lastModified": "2025-01-14T16:15:32.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability exists in the testsave.sh functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la funci\u00f3n testsave.sh de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la divulgaci\u00f3n de informaci\u00f3n confidencial. Un atacante puede enviar una solicitud HTTP para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39774.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39774.json index dac5cf383e9..90a0af972b0 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39774.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39774.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:22.730", "lastModified": "2025-01-14T16:15:32.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability exists in the adm.cgi set_sys_adm() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_sys_adm() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39781.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39781.json index bb16e508907..24bdb722023 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39781.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39781.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:22.900", "lastModified": "2025-01-14T15:15:22.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_hour` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n sch_reboot() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `restart_hour`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39782.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39782.json index 3c64bb03642..482b4025e4c 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39782.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39782.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:23.090", "lastModified": "2025-01-14T15:15:23.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_min` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n sch_reboot() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `restart_min`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39783.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39783.json index 9102822346a..78c2dc87203 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39783.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39783.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:23.253", "lastModified": "2025-01-14T15:15:23.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo en la funci\u00f3n sch_reboot() de adm.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un c\u00f3digo arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST `restart_week`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39784.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39784.json index 05a558759e2..1492c5f350f 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39784.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39784.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:23.417", "lastModified": "2025-01-14T15:15:23.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the disk_part POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en la funci\u00f3n add_dir() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST disk_part." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39785.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39785.json index affca20d011..1ab5797980a 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39785.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39785.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:23.597", "lastModified": "2025-01-14T15:15:23.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the adddir_name POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en la funci\u00f3n add_dir() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro POST adddir_name." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39786.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39786.json index 530a3947fec..e85d1fcd682 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39786.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39786.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:23.777", "lastModified": "2025-01-14T15:15:23.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `adddir_name` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades Directory Traversal en la funcionalidad add_dir() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de Directory Traversal de directorio dentro del par\u00e1metro POST `adddir_name`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39787.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39787.json index 7790a299f75..3c0b578a67a 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39787.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39787.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:23.927", "lastModified": "2025-01-14T15:15:23.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `disk_part` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades Directory Traversal en la funcionalidad add_dir() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de Directory Traversal dentro del par\u00e1metro POST `disk_part`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39788.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39788.json index e4ecc2a8567..0bad349c721 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39788.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39788.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.073", "lastModified": "2025-01-14T15:15:24.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_name` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funci\u00f3n set_ftp_cfg() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n dentro del par\u00e1metro POST `ftp_name`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39789.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39789.json index ba3cdd1f295..bd78ffc9d25 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39789.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39789.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.227", "lastModified": "2025-01-14T15:15:24.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_port` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funci\u00f3n set_ftp_cfg() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n dentro del par\u00e1metro POST `ftp_port`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39790.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39790.json index 6a905131909..6c4ef21a2d8 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39790.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39790.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.367", "lastModified": "2025-01-14T15:15:24.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_max_sessions` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funci\u00f3n set_ftp_cfg() de nas.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n dentro del par\u00e1metro POST `ftp_max_sessions`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39793.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39793.json index c1b54034314..6bb6a1f741a 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39793.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39793.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.510", "lastModified": "2025-01-14T15:15:24.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_name` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funcionalidad nas.cgi set_nas() proftpd de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n en el par\u00e1metro POST `ftp_name`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39794.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39794.json index 3605a8aae18..101c1bddfa0 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39794.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39794.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.663", "lastModified": "2025-01-14T15:15:24.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_port` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funcionalidad nas.cgi set_nas() proftpd de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n en el par\u00e1metro POST `ftp_port`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39795.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39795.json index 13307a83a3d..668dd7942bc 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39795.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39795.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.817", "lastModified": "2025-01-14T15:15:24.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_max_sessions` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funcionalidad nas.cgi set_nas() proftpd de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la omisi\u00f3n de permisos. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n en el par\u00e1metro POST `ftp_max_sessions`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39798.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39798.json index 1a46aa831ce..71550d37a56 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39798.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39798.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:24.983", "lastModified": "2025-01-14T15:15:24.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_protocol` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funci\u00f3n openvpn.cgi openvpn_server_setup() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n en el par\u00e1metro POST `sel_open_protocol`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39799.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39799.json index 39ec542aebb..c1e4c3c2377 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39799.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39799.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:25.167", "lastModified": "2025-01-14T15:15:25.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `sel_open_interface` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funci\u00f3n openvpn.cgi openvpn_server_setup() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n en el par\u00e1metro POST `sel_open_interface`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39800.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39800.json index 8588ffdcaa4..4ba7cdca605 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39800.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39800.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:25.347", "lastModified": "2025-01-14T15:15:25.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `open_port` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de control de configuraci\u00f3n externa en la funci\u00f3n openvpn.cgi openvpn_server_setup() de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de inyecci\u00f3n de configuraci\u00f3n en el par\u00e1metro POST `open_port`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39801.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39801.json index 66234a85d26..0688c452c3b 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39801.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39801.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:25.510", "lastModified": "2025-01-14T15:15:25.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_bandwidth` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer en la funci\u00f3n qos_settings() de qos.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de desbordamiento de b\u00fafer en el par\u00e1metro POST `qos_bandwidth`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39802.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39802.json index 05b865c0455..7da3e8996b7 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39802.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39802.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:25.677", "lastModified": "2025-01-14T15:15:25.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer en la funci\u00f3n qos_settings() de qos.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de desbordamiento de b\u00fafer en el par\u00e1metro POST `qos_dat`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39803.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39803.json index b8eb12b321c..0388a5dfe08 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39803.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39803.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-14T15:15:25.840", "lastModified": "2025-01-14T15:15:25.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer en la funci\u00f3n qos_settings() de qos.cgi de Wavlink AC3000 M33A8.V5030.210505. Una solicitud HTTP manipulada especialmente puede provocar un desbordamiento de b\u00fafer basado en la pila. Un atacante puede realizar una solicitud HTTP autenticada para activar estas vulnerabilidades. Existe una vulnerabilidad de desbordamiento de b\u00fafer en el par\u00e1metro POST `sel_mode`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39967.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39967.json index f9ab9f1a764..2c4851bcac2 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39967.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39967.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T23:15:07.923", "lastModified": "2025-01-15T23:15:07.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in Aginode GigaSwitch v5 allows attackers to access sensitive information via using the SCP command." + }, + { + "lang": "es", + "value": " Los permisos inseguros en Aginode GigaSwitch v5 permiten a los atacantes acceder a informaci\u00f3n confidencial mediante el uso del comando SCP." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3905.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3905.json index 3d05404d749..ffc93a74839 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3905.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3905.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-17T11:15:11.620", "lastModified": "2024-11-21T09:30:40.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3906.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3906.json index 68d8aad713e..08cbc9c403b 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3906.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-17T11:15:11.947", "lastModified": "2024-11-21T09:30:40.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3909.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3909.json index cf0d12065a5..8a233a47000 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3909.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3909.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-17T12:15:07.853", "lastModified": "2024-11-21T09:30:40.570", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3910.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3910.json index 798a27fce58..0958df63116 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3910.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3910.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-17T12:15:08.070", "lastModified": "2024-11-21T09:30:40.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json index 5236da4b357..d4dd0cccb94 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-12T08:15:50.500", "lastModified": "2024-11-21T09:30:42.837", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3942.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3942.json index 2319b569699..ad4f9d997b9 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3942.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3942.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:32.750", "lastModified": "2024-11-21T09:30:45.017", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3985.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3985.json index 78f3a97f448..613ca34f6b5 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3985.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3985.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:33.083", "lastModified": "2024-11-21T09:30:49.757", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40513.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40513.json index 3c975c70e0d..4db3e313cd9 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40513.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40513.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:07.490", "lastModified": "2025-01-16T23:15:07.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in themesebrand Chatvia v.5.3.2 allows a remote attacker to execute arbitrary code via the User profile Upload image function." + }, + { + "lang": "es", + "value": " Un problema en themesebrand Chatvia v.5.3.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes del perfil de usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40514.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40514.json index 7c1b4947dd7..dff8f96aab6 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40514.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40514.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:07.600", "lastModified": "2025-01-16T23:15:07.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure Permissions vulnerability in themesebrand Chatvia v.5.3.2 allows a remote attacker to escalate privileges via the User profile name and image upload functions." + }, + { + "lang": "es", + "value": " La vulnerabilidad de permisos inseguros en themesebrand Chatvia v.5.3.2 permite a un atacante remoto escalar privilegios a trav\u00e9s del nombre del perfil de usuario y las funciones de carga de im\u00e1genes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40587.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40587.json index 603026f3213..d7b0f0793fd 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40587.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40587.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.027", "lastModified": "2025-01-14T14:15:31.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiVoice version 7.0.0 through 7.0.4 and before 6.4.9 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') [CWE-78] en Fortinet FortiVoice versi\u00f3n 7.0.0 a 7.0.4 y anteriores a 6.4.9 permite que un atacante privilegiado autenticado ejecute c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes CLI manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json index dcdcfbf8f45..a644507fca2 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40771.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.597", "lastModified": "2025-01-16T17:15:11.850", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json index 1165a4bc4b7..1568d832f95 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40839.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.700", "lastModified": "2025-01-16T17:15:12.017", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json index 3cd953b5a4e..7b2d9984b47 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40854.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.797", "lastModified": "2025-01-16T17:15:12.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json index 27834771aed..fcfd0969584 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T20:15:07.997", "lastModified": "2024-11-21T09:42:07.163", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json index 55885318d35..248439c2524 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T20:15:08.223", "lastModified": "2024-11-21T09:42:07.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json index 5507a694a62..d889543239a 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T21:15:49.040", "lastModified": "2024-11-21T09:42:07.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41149.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41149.json index 52f330ecf93..a53ae5fcd0f 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41149.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41149.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:19.973", "lastModified": "2025-01-11T13:15:19.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: avoid to reuse `hctx` not removed from cpuhp callback list\n\nIf the 'hctx' isn't removed from cpuhp callback list, we can't reuse it,\notherwise use-after-free may be triggered." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: evitar reutilizar `hctx` no eliminado de la lista de devoluci\u00f3n de llamadas de cpuhp Si 'hctx' no se elimina de la lista de devoluci\u00f3n de llamadas de cpuhp, no podemos reutilizarlo, de lo contrario, se puede activar el use after free." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41454.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41454.json index b01acb7b978..6f10900d478 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41454.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41454.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T23:15:09.130", "lastModified": "2025-01-15T23:15:09.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the UI login page logo upload function of Process Maker pm4core-docker 4.1.21-RC7 allows attackers to execute arbitrary code via uploading a crafted PHP or HTML file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de carga del logotipo de la p\u00e1gina de inicio de sesi\u00f3n de la interfaz de usuario de Process Maker pm4core-docker 4.1.21-RC7 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo PHP o HTML manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41746.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41746.json index af38be21d7e..4e84d196644 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41746.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41746.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-16T18:15:22.863", "lastModified": "2025-01-16T18:15:22.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM CICS TX Advanced 10.1, 11.1, and Standard 11.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM CICS TX Advanced 10.1, 11.1 y Standard 11.1 son vulnerables a cross-site scripting almacenado. Esta vulnerabilidad permite a los usuarios incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json index 8887e9a48f1..6edc051685e 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41787.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code." + }, + { + "lang": "es", + "value": "IBM Engineering Requirements Management DOORS Next 7.0.2 y 7.0.3 podr\u00eda permitir que un atacante remoto eluda las restricciones de seguridad provocadas por una condici\u00f3n de ejecuci\u00f3n. Al enviar una solicitud especialmente manipulada, un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo de forma remota." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41932.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41932.json index cbd6c2469ac..120bcab17a4 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41932.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41932.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:20.930", "lastModified": "2025-01-11T13:15:20.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: fix warning in sched_setaffinity\n\nCommit 8f9ea86fdf99b added some logic to sched_setaffinity that included\na WARN when a per-task affinity assignment races with a cpuset update.\n\nSpecifically, we can have a race where a cpuset update results in the\ntask affinity no longer being a subset of the cpuset. That's fine; we\nhave a fallback to instead use the cpuset mask. However, we have a WARN\nset up that will trigger if the cpuset mask has no overlap at all with\nthe requested task affinity. This shouldn't be a warning condition; its\ntrivial to create this condition.\n\nReproduced the warning by the following setup:\n\n- $PID inside a cpuset cgroup\n- another thread repeatedly switching the cpuset cpus from 1-2 to just 1\n- another thread repeatedly setting the $PID affinity (via taskset) to 2" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched: correcci\u00f3n de advertencia en sched_setaffinity El commit 8f9ea86fdf99b agreg\u00f3 algo de l\u00f3gica a sched_setaffinity que inclu\u00eda una ADVERTENCIA cuando una asignaci\u00f3n de afinidad por tarea compite con una actualizaci\u00f3n de cpuset. Espec\u00edficamente, podemos tener una ejecuci\u00f3n donde una actualizaci\u00f3n de cpuset da como resultado que la afinidad de la tarea ya no sea un subconjunto del cpuset. Eso est\u00e1 bien; tenemos una alternativa para usar la m\u00e1scara de cpuset. Sin embargo, tenemos una ADVERTENCIA configurada que se activar\u00e1 si la m\u00e1scara de cpuset no se superpone en absoluto con la afinidad de la tarea solicitada. Esto no deber\u00eda ser una condici\u00f3n de advertencia; es trivial crear esta condici\u00f3n. Se reprodujo la advertencia con la siguiente configuraci\u00f3n: - $PID dentro de un cgroup de cpuset - otro hilo que cambia repetidamente las CPU de cpuset de 1-2 a solo 1 - otro hilo que establece repetidamente la afinidad $PID (a trav\u00e9s del conjunto de tareas) en 2" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41935.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41935.json index bb191823ddb..9eaf554f860 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41935.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41935.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:21.083", "lastModified": "2025-01-11T13:15:21.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to shrink read extent node in batches\n\nWe use rwlock to protect core structure data of extent tree during\nits shrink, however, if there is a huge number of extent nodes in\nextent tree, during shrink of extent tree, it may hold rwlock for\na very long time, which may trigger kernel hang issue.\n\nThis patch fixes to shrink read extent node in batches, so that,\ncritical region of the rwlock can be shrunk to avoid its extreme\nlong time hold." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para reducir el nodo de extensi\u00f3n de lectura en lotes Usamos rwlock para proteger los datos de la estructura central del \u00e1rbol de extensi\u00f3n durante su reducci\u00f3n, sin embargo, si hay una gran cantidad de nodos de extensi\u00f3n en el \u00e1rbol de extensi\u00f3n, durante la reducci\u00f3n del \u00e1rbol de extensi\u00f3n, puede mantener rwlock durante mucho tiempo, lo que puede desencadenar un problema de bloqueo del kernel. Este parche corrige la reducci\u00f3n del nodo de extensi\u00f3n de lectura en lotes, de modo que la regi\u00f3n cr\u00edtica de rwlock se pueda reducir para evitar su retenci\u00f3n de tiempo extremadamente largo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4166.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4166.json index ebe4e81d745..b9479b67ac0 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4166.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4166.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T12:15:07.770", "lastModified": "2024-11-21T09:42:18.970", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4167.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4167.json index 8974e2aa7a6..f3194280ff6 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4167.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4167.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T12:15:07.990", "lastModified": "2024-11-21T09:42:19.103", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4168.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4168.json index dfecbf83b92..922063235d7 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4168.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T12:15:08.217", "lastModified": "2024-11-21T09:42:19.240", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4169.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4169.json index f75b2f25f4c..7f272c6f8c1 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4169.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T13:15:51.780", "lastModified": "2024-11-21T09:42:19.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4170.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4170.json index b2df07fc1d1..89cc2aa3845 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4170.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-25T13:15:51.993", "lastModified": "2024-11-21T09:42:19.523", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42168.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42168.json index 41e554031c8..989f41d37af 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42168.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42168.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T03:15:21.737", "lastModified": "2025-01-11T03:15:21.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by out-of-band resource load (HTTP) vulnerability. An attacker can deploy a web server that returns malicious content, and then induce the application to retrieve and process that content." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una vulnerabilidad de carga de recursos fuera de banda (HTTP). Un atacante puede implementar un servidor web que devuelva contenido malicioso y luego inducir a la aplicaci\u00f3n a recuperar y procesar ese contenido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42169.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42169.json index 1ad313b7e12..251eaee2e87 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42169.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42169.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T03:15:21.873", "lastModified": "2025-01-11T03:15:21.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by insecure direct object references. It occurs due to missing access control checks, which fail to verify whether a user should be allowed to access specific data." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por referencias a objetos directos inseguras. Esto ocurre debido a la falta de controles de acceso, que no verifican si se debe permitir a un usuario acceder a datos espec\u00edficos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42170.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42170.json index cac697cb46c..a25eb7dadbd 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42170.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T07:15:06.767", "lastModified": "2025-01-11T07:15:06.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by a session fixation vulnerability. Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n. Los cibercriminales pueden aprovecharla enviando URL manipuladas con un token de sesi\u00f3n para acceder a la sesi\u00f3n de inicio de sesi\u00f3n de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42171.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42171.json index b39b0d0d4d2..327a2826902 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42171.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42171.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T07:15:08.553", "lastModified": "2025-01-11T07:15:08.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by a session fixation vulnerability. Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n. Los cibercriminales pueden aprovecharla enviando URL manipuladas con un token de sesi\u00f3n para acceder a la sesi\u00f3n de inicio de sesi\u00f3n de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42172.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42172.json index af88c63d632..dcb0abe3c94 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42172.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42172.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T07:15:08.743", "lastModified": "2025-01-11T07:15:08.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by broken authentication. It allows attackers to compromise keys, passwords, and session tokens, potentially leading to identity theft and system control. This vulnerability arises from poor configuration, logic errors, or software bugs and can affect any application with access control, including databases, network infrastructure, and web applications." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una autenticaci\u00f3n fallida. Esto permite a los atacantes comprometer claves, contrase\u00f1as y tokens de sesi\u00f3n, lo que puede provocar robo de identidad y control del sistema. Esta vulnerabilidad surge de una configuraci\u00f3n deficiente, errores l\u00f3gicos o errores de software y puede afectar a cualquier aplicaci\u00f3n con control de acceso, incluidas bases de datos, infraestructura de red y aplicaciones web." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42173.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42173.json index 0c47fb40986..544b21acc46 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42173.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42173.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T07:15:08.927", "lastModified": "2025-01-11T07:15:08.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by an improper password policy implementation vulnerability. Weak passwords and lack of account lockout policies allow attackers to guess or brute-force passwords if the username is known." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una vulnerabilidad de implementaci\u00f3n de pol\u00edtica de contrase\u00f1as incorrecta. Las contrase\u00f1as d\u00e9biles y la falta de pol\u00edticas de bloqueo de cuentas permiten a los atacantes adivinar o forzar las contrase\u00f1as si se conoce el nombre de usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42174.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42174.json index d78bb9421f8..60fd1bf934a 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42174.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42174.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T07:15:09.110", "lastModified": "2025-01-11T07:15:09.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by username enumeration vulnerability. This allows a malicious user to perform enumeration of application users, and therefore\u00a0compile a list of valid usernames." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una vulnerabilidad de enumeraci\u00f3n de nombres de usuario. Esto permite que un usuario malintencionado realice una enumeraci\u00f3n de usuarios de la aplicaci\u00f3n y, por lo tanto, compile una lista de nombres de usuario v\u00e1lidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42175.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42175.json index db11214810e..f2c9a534683 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42175.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42175.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-11T08:15:26.343", "lastModified": "2025-01-11T08:15:26.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by a weak input validation vulnerability. The application accepts special characters and there is no length validation. This can lead to security vulnerabilities like SQL injection, XSS, and buffer overflow." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectada por una vulnerabilidad de validaci\u00f3n de entrada d\u00e9bil. La aplicaci\u00f3n acepta caracteres especiales y no hay validaci\u00f3n de longitud. Esto puede generar vulnerabilidades de seguridad como inyecci\u00f3n SQL, XSS y desbordamiento de b\u00fafer." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42179.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42179.json index f2ee31c7de1..26c9e041f69 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42179.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42179.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-12T22:15:05.923", "lastModified": "2025-01-12T22:15:05.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by sensitive information disclosure vulnerability. The HTTP response header exposes the Microsoft-HTTP API\u22152.0 as the server's name & version." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectado por una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n confidencial. El encabezado de respuesta HTTP expone la API Microsoft-HTTP?2.0 como el nombre y la versi\u00f3n del servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42180.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42180.json index e962a99e273..1469c9e2306 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42180.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42180.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-12T22:15:06.983", "lastModified": "2025-01-12T22:15:06.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by a malicious file upload vulnerability. The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectada por una vulnerabilidad de carga de archivos maliciosos. La aplicaci\u00f3n acepta cargas de archivos no v\u00e1lidas, incluidos tipos de contenido incorrectos, extensiones dobles, bytes nulos y caracteres especiales, lo que permite a los atacantes cargar y ejecutar archivos maliciosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42181.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42181.json index 5298b6c6ca7..49992751819 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42181.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42181.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@hcl.com", "published": "2025-01-12T22:15:07.120", "lastModified": "2025-01-12T22:15:07.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors." + }, + { + "lang": "es", + "value": "HCL MyXalytics se ve afectada por una vulnerabilidad de transmisi\u00f3n de informaci\u00f3n confidencial en texto plano. La aplicaci\u00f3n transmite datos confidenciales o cr\u00edticos para la seguridad en texto plano en un canal de comunicaci\u00f3n que puede ser interceptado por actores no autorizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42444.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42444.json index 3ce4669d586..b943f174d8a 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42444.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42444.json @@ -3,12 +3,16 @@ "sourceIdentifier": "biossecurity@ami.com", "published": "2025-01-14T15:15:25.997", "lastModified": "2025-01-14T15:15:25.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "APTIOV contains a vulnerability in BIOS where an attacker may cause a TOCTOU Race Condition by local means. Successful exploitation of this vulnerability may lead to execution of arbitrary code on the target device." + }, + { + "lang": "es", + "value": "APTIOV contiene una vulnerabilidad en BIOS donde un atacante puede provocar una condici\u00f3n TOCTOU ejecuci\u00f3n por medios locales. La explotaci\u00f3n exitosa de esta vulnerabilidad puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario en el dispositivo de destino." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42911.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42911.json index cab3f3e888a..0b7ca28d010 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42911.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42911.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T23:15:07.297", "lastModified": "2025-01-14T23:15:07.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ECOVACS Robotics Deebot T20 OMNI and T20e OMNI before 1.24.0 was discovered to contain a WiFi Remote Code Execution vulnerability." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que ECOVACS Robotics Deebot T20 OMNI y T20e OMNI anteriores a la versi\u00f3n 1.24.0 conten\u00edan una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo WiFi." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4227.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4227.json index e9319b65744..4a6b3032882 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4227.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4227.json @@ -3,12 +3,16 @@ "sourceIdentifier": "info@cert.vde.com", "published": "2025-01-15T08:15:25.983", "lastModified": "2025-01-15T08:15:25.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS." + }, + { + "lang": "es", + "value": " En Genivia gSOAP con una configuraci\u00f3n espec\u00edfica, un atacante remoto no autenticado puede generar una alta carga de CPU al forzar el an\u00e1lisis de un XML que tiene atributos de identificaci\u00f3n duplicados, lo que puede conducir a un DoS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43098.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43098.json index 3971beac219..98a87350335 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43098.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43098.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:21.240", "lastModified": "2025-01-11T13:15:21.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock\n\nA deadlock may happen since the i3c_master_register() acquires\n&i3cbus->lock twice. See the log below.\nUse i3cdev->desc->info instead of calling i3c_device_info() to\navoid acquiring the lock twice.\n\nv2:\n - Modified the title and commit message\n\n============================================\nWARNING: possible recursive locking detected\n6.11.0-mainline\n--------------------------------------------\ninit/1 is trying to acquire lock:\nf1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_bus_normaluse_lock\n\nbut task is already holding lock:\nf1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_register\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(&i3cbus->lock);\n lock(&i3cbus->lock);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n2 locks held by init/1:\n #0: fcffff809b6798f8 (&dev->mutex){....}-{3:3}, at: __driver_attach\n #1: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_register\n\nstack backtrace:\nCPU: 6 UID: 0 PID: 1 Comm: init\nCall trace:\n dump_backtrace+0xfc/0x17c\n show_stack+0x18/0x28\n dump_stack_lvl+0x40/0xc0\n dump_stack+0x18/0x24\n print_deadlock_bug+0x388/0x390\n __lock_acquire+0x18bc/0x32ec\n lock_acquire+0x134/0x2b0\n down_read+0x50/0x19c\n i3c_bus_normaluse_lock+0x14/0x24\n i3c_device_get_info+0x24/0x58\n i3c_device_uevent+0x34/0xa4\n dev_uevent+0x310/0x384\n kobject_uevent_env+0x244/0x414\n kobject_uevent+0x14/0x20\n device_add+0x278/0x460\n device_register+0x20/0x34\n i3c_master_register_new_i3c_devs+0x78/0x154\n i3c_master_register+0x6a0/0x6d4\n mtk_i3c_master_probe+0x3b8/0x4d8\n platform_probe+0xa0/0xe0\n really_probe+0x114/0x454\n __driver_probe_device+0xa0/0x15c\n driver_probe_device+0x3c/0x1ac\n __driver_attach+0xc4/0x1f0\n bus_for_each_dev+0x104/0x160\n driver_attach+0x24/0x34\n bus_add_driver+0x14c/0x294\n driver_register+0x68/0x104\n __platform_driver_register+0x20/0x30\n init_module+0x20/0xfe4\n do_one_initcall+0x184/0x464\n do_init_module+0x58/0x1ec\n load_module+0xefc/0x10c8\n __arm64_sys_finit_module+0x238/0x33c\n invoke_syscall+0x58/0x10c\n el0_svc_common+0xa8/0xdc\n do_el0_svc+0x1c/0x28\n el0_svc+0x50/0xac\n el0t_64_sync_handler+0x70/0xbc\n el0t_64_sync+0x1a8/0x1ac" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: Use i3cdev->desc->info en lugar de llamar a i3c_device_get_info() para evitar un bloqueo. Puede ocurrir un bloqueo porque i3c_master_register() adquiere &i3cbus->lock dos veces. Vea el registro a continuaci\u00f3n. Use i3cdev->desc->info en lugar de llamar a i3c_device_info() para evitar adquirir el bloqueo dos veces. v2: - Se modificaron el t\u00edtulo y el mensaje de confirmaci\u00f3n ============================================= ADVERTENCIA: se detect\u00f3 un posible bloqueo recursivo 6.11.0-mainline -------------------------------------------- init/1 is trying to acquire lock: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_bus_normaluse_lock but task is already holding lock: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_register other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&i3cbus->lock); lock(&i3cbus->lock); *** DEADLOCK *** May be due to missing lock nesting notation 2 locks held by init/1: #0: fcffff809b6798f8 (&dev->mutex){....}-{3:3}, at: __driver_attach #1: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_register stack backtrace: CPU: 6 UID: 0 PID: 1 Comm: init Call trace: dump_backtrace+0xfc/0x17c show_stack+0x18/0x28 dump_stack_lvl+0x40/0xc0 dump_stack+0x18/0x24 print_deadlock_bug+0x388/0x390 __lock_acquire+0x18bc/0x32ec lock_acquire+0x134/0x2b0 down_read+0x50/0x19c i3c_bus_normaluse_lock+0x14/0x24 i3c_device_get_info+0x24/0x58 i3c_device_uevent+0x34/0xa4 dev_uevent+0x310/0x384 kobject_uevent_env+0x244/0x414 kobject_uevent+0x14/0x20 device_add+0x278/0x460 device_register+0x20/0x34 i3c_master_register_new_i3c_devs+0x78/0x154 i3c_master_register+0x6a0/0x6d4 mtk_i3c_master_probe+0x3b8/0x4d8 platform_probe+0xa0/0xe0 really_probe+0x114/0x454 __driver_probe_device+0xa0/0x15c driver_probe_device+0x3c/0x1ac __driver_attach+0xc4/0x1f0 bus_for_each_dev+0x104/0x160 driver_attach+0x24/0x34 bus_add_driver+0x14c/0x294 driver_register+0x68/0x104 __platform_driver_register+0x20/0x30 init_module+0x20/0xfe4 do_one_initcall+0x184/0x464 do_init_module+0x58/0x1ec load_module+0xefc/0x10c8 __arm64_sys_finit_module+0x238/0x33c invoke_syscall+0x58/0x10c el0_svc_common+0xa8/0xdc do_el0_svc+0x1c/0x28 el0_svc+0x50/0xac el0t_64_sync_handler+0x70/0xbc el0t_64_sync+0x1a8/0x1ac " } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json index 0bad8a000d9..40f1e7c6068 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-12T13:38:36.593", "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json index ae0522265c1..528ee22e9e6 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-12T13:38:36.840", "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json index 09a2820e432..4bfee6e658d 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44136.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:27.923", "lastModified": "2025-01-16T15:15:13.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json index 4e3dfe44896..930a0d5b150 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44771.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T19:15:10.670", "lastModified": "2025-01-14T15:15:26.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4484.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4484.json index 68ca948b570..fb8a726227c 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4484.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4484.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:10.397", "lastModified": "2024-11-21T09:42:55.237", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4485.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4485.json index dd0774586f9..e937850d178 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4485.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:10.700", "lastModified": "2024-11-21T09:42:55.363", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45061.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45061.json index 70d1874144c..1350c30eb6e 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45061.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45061.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-15T15:15:11.730", "lastModified": "2025-01-15T17:15:15.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (xss) vulnerability exists in the weather map editor functionality of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) en la funci\u00f3n de edici\u00f3n de mapas meteorol\u00f3gicos de Observium CE 24.4.13528. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un c\u00f3digo JavaScript arbitrario. Un usuario autenticado tendr\u00eda que hacer clic en un enlace malicioso proporcionado por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45102.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45102.json index 61ae7a1a461..78aa7376b49 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45102.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45102.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2025-01-14T22:15:26.820", "lastModified": "2025-01-14T22:15:26.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability was discovered that could allow a valid, authenticated LXCA user to escalate their permissions for a connected XCC instance when using LXCA as a Single Sign On (SSO) provider for XCC instances." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de escalada de privilegios que podr\u00eda permitir que un usuario LXCA v\u00e1lido y autenticado aumente sus permisos para una instancia XCC conectada al usar LXCA como proveedor de inicio de sesi\u00f3n \u00fanico (SSO) para instancias XCC." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45326.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45326.json index b0aaa47f483..dc3173cc427 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45326.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45326.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.183", "lastModified": "2025-01-14T14:15:31.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Improper Access Control vulnerability [CWE-284] in FortiDeceptor version 6.0.0, version 5.3.3 and below, version 5.2.1 and below, version 5.1.0, version 5.0.0 may allow an authenticated attacker with none privileges to perform operations on the central management appliance via crafted requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado [CWE-284] en FortiDeceptor versi\u00f3n 6.0.0, versi\u00f3n 5.3.3 y anteriores, versi\u00f3n 5.2.1 y anteriores, versi\u00f3n 5.1.0, versi\u00f3n 5.0.0 puede permitir que un atacante autenticado sin privilegios realice operaciones en el dispositivo de administraci\u00f3n central a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json index 26d483e940e..00bbdffa3bd 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-09-11T10:15:02.023", "lastModified": "2024-09-11T16:26:11.920", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45331.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45331.json index ea333c4dffe..cbfcd6d17ad 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45331.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45331.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-16T09:15:06.500", "lastModified": "2025-01-16T09:15:06.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A incorrect privilege assignment in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, FortiManager versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, FortiAnalyzer Cloud versions 7.4.1 through 7.4.2, 7.2.1 through 7.2.6, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7 allows attacker to escalate privilege via specific shell commands" + }, + { + "lang": "es", + "value": "Una asignaci\u00f3n de privilegios incorrecta en las versiones 7.4.0 a 7.4.3, 7.2.0 a 7.2.5, 7.0.0 a 7.0.13, 6.4.0 a 6.4.15 de Fortinet FortiAnalyzer, las versiones 7.4.0 a 7.4.2, 7.2.0 a 7.2.5, 7.0.0 a 7.0.13, 6.4.0 a 6.4.15 de FortiManager, las versiones 7.4.1 a 7.4.2, 7.2.1 a 7.2.6, 7.0.1 a 7.0.13, 6.4.1 a 6.4.7 de FortiAnalyzer Cloud permite a un atacante escalar privilegios a trav\u00e9s de comandos de shell espec\u00edficos" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45385.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45385.json index 77f445313a3..125ce1a2327 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45385.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45385.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-01-14T11:15:15.750", "lastModified": "2025-01-14T11:15:15.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45627.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45627.json index 2ea7a54f6ce..b2e941ffbde 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45627.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45627.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-14T17:15:17.303", "lastModified": "2025-01-14T18:15:29.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Linkis <1.7.0, due to the lack of effective filtering\nof parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will \n\nallow the attacker to read arbitrary files from the Linkis server. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis < 1.7.0 will be affected. \nWe recommend users upgrade the version of Linkis to version 1.7.0." + }, + { + "lang": "es", + "value": "En Apache Linkis anterior a la 1.7.0, debido a la falta de un filtrado efectivo de par\u00e1metros, un atacante que configure par\u00e1metros JDBC de Mysql maliciosos en el m\u00f3dulo DataSource Manager permitir\u00e1 al atacante leer archivos arbitrarios del servidor Linkis. Por lo tanto, los par\u00e1metros en la URL JDBC de Mysql deben incluirse en la lista negra. Este ataque requiere que el atacante obtenga una cuenta autorizada de Linkis antes de poder llevarlo a cabo. Las versiones de Apache Linkis anteriores a la 1.7.0 se ver\u00e1n afectadas. Recomendamos a los usuarios que actualicen la versi\u00f3n de Linkis a la versi\u00f3n 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45828.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45828.json index d55f194e45a..39cff319242 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45828.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45828.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:21.450", "lastModified": "2025-01-11T13:15:21.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni3c: mipi-i3c-hci: Mask ring interrupts before ring stop request\n\nBus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when\nthe ring is being stopped. Depending on timing between ring stop request\ncompletion, interrupt handler removal and code execution this may lead\nto a NULL pointer dereference in hci_dma_irq_handler() if it gets to run\nafter the io_data pointer is set to NULL in hci_dma_cleanup().\n\nPrevent this my masking the ring interrupts before ring stop request." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: mipi-i3c-hci: Enmascarar interrupciones del anillo antes de la solicitud de detenci\u00f3n del anillo La ruta de desinfecci\u00f3n del bus en modo DMA puede activar una interrupci\u00f3n RING_OP_STAT cuando se detiene el anillo. Dependiendo del tiempo entre la finalizaci\u00f3n de la solicitud de detenci\u00f3n del anillo, la eliminaci\u00f3n del controlador de interrupciones y la ejecuci\u00f3n del c\u00f3digo, esto puede provocar una desreferencia de puntero NULL en hci_dma_irq_handler() si se ejecuta despu\u00e9s de que el puntero io_data se establezca en NULL en hci_dma_cleanup(). Evite esto enmascarando las interrupciones del anillo antes de la solicitud de detenci\u00f3n del anillo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46210.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46210.json index 1e123c1a32a..5a9a91f1eed 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46210.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46210.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T16:15:28.757", "lastModified": "2025-01-10T16:15:28.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the MediaPool module of Redaxo CMS v5.17.1 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el m\u00f3dulo MediaPool de Redaxo CMS v5.17.1 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json index 618ca518875..c6bf5ff80fc 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46450.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T22:15:39.840", "lastModified": "2025-01-16T22:15:39.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in Tenda AC1200 Smart Dual-Band WiFi Router Model AC6 v2.0 Firmware v15.03.06.50 allows attackers to bypass authentication via a crafted web request." + }, + { + "lang": "es", + "value": " El control de acceso incorrecto en el enrutador WiFi de doble banda inteligente Tenda AC1200 modelo AC6 v2.0 Firmware v15.03.06.50 permite a los atacantes omitir la autenticaci\u00f3n a trav\u00e9s de una solicitud web manipulada espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46479.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46479.json index 5edd4ce9ba5..b8095697390 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46479.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46479.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T18:15:18.003", "lastModified": "2025-01-13T18:15:18.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Venki Supravizio BPM through 18.0.1 was discovered to contain an arbitrary file upload vulnerability. An authenticated attacker may upload a malicious file, leading to remote code execution." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Venki Supravizio BPM hasta la versi\u00f3n 18.0.1 conten\u00eda una vulnerabilidad de carga de archivos arbitrarios. Un atacante autenticado podr\u00eda cargar un archivo malicioso, lo que provocar\u00eda la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json index b378ec41e74..c9527705f04 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46480.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T20:15:28.147", "lastModified": "2025-01-13T20:15:28.147", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An NTLM hash leak in Venki Supravizio BPM up to 18.0.1 allows authenticated attackers with Application Administrator access to escalate privileges on the underlying host system." + }, + { + "lang": "es", + "value": "Una fuga de hash NTLM en Venki Supravizio BPM hasta 18.0.1 permite a atacantes autenticados con acceso de administrador de aplicaciones escalar privilegios en el sistema host subyacente ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json index 8ac8ba2557d..f57b411c1e3 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46481.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T20:15:28.300", "lastModified": "2025-01-13T20:15:28.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The login page of Venki Supravizio BPM up to 18.1.1 is vulnerable to open redirect leading to reflected XSS." + }, + { + "lang": "es", + "value": "La p\u00e1gina de inicio de sesi\u00f3n de Venki Supravizio BPM hasta 18.1.1 es vulnerable a una redirecci\u00f3n abierta que genera XSS reflejado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46664.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46664.json index 90182fc2b52..1e7d24e6219 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46664.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46664.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.330", "lastModified": "2025-01-14T14:15:31.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A relative path traversal in Fortinet FortiRecorder [CWE-23] version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to read files from the underlying filesystem via crafted HTTP or HTTPs requests." + }, + { + "lang": "es", + "value": "Una Path Traversal relativa en Fortinet FortiRecorder [CWE-23] versi\u00f3n 7.2.0 a 7.2.1 y anteriores a 7.0.4 permite a un atacante privilegiado leer archivos del sistema de archivos subyacente a trav\u00e9s de solicitudes HTTP o HTTPS manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46665.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46665.json index 856cee7a97e..7f730662296 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46665.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46665.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.490", "lastModified": "2025-01-14T14:15:31.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados [CWE-201] en FortiOS 7.6.0, 7.4.0 a 7.4.4 puede permitir que un atacante en una posici\u00f3n intermedia recupere el secreto compartido del servidor de contabilidad RADIUS mediante la interceptaci\u00f3n de solicitudes de contabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json index 38cf65a4d8a..705784047c6 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.647", "lastModified": "2025-01-14T14:15:31.647", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An allocation of resources without limits or throttling [CWE-770] vulnerability in FortiOS versions 7.6.0, versions 7.4.4 through 7.4.0, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow a remote unauthenticated attacker to prevent access to the GUI via specially crafted requests directed at specific endpoints." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n [CWE-770] en FortiOS versiones 7.6.0, versiones 7.4.4 a 7.4.0, 7.2 todas las versiones, 7.0 todas las versiones, 6.4 todas las versiones puede permitir que un atacante remoto no autenticado evite el acceso a la GUI a trav\u00e9s de solicitudes especialmente manipuladas dirigidas a Endpoints espec\u00edficos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46667.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46667.json index 76606266025..7443089993f 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46667.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46667.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.797", "lastModified": "2025-01-14T15:15:26.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections." + }, + { + "lang": "es", + "value": "Una asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n en Fortinet FortiSIEM 5.3 todas las versiones, 5.4 todas las versiones, 6.x todas las versiones, 7.0 todas las versiones y 7.1.0 a 7.1.5 puede permitir que un atacante deniegue tr\u00e1fico TLS v\u00e1lido mediante el consumo de todas las conexiones asignadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46668.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46668.json index f6c8b27db3d..89c589b2ad0 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46668.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46668.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.950", "lastModified": "2025-01-14T14:15:31.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiOS versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, versions 7.0.0 through 7.0.15, and versions 6.4.0 through 6.4.15 may allow an unauthenticated remote user to consume all system memory via multiple large file uploads." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites o limitaci\u00f3n [CWE-770] en las versiones 7.4.0 a 7.4.4, 7.2.0 a 7.2.8, 7.0.0 a 7.0.15 y 6.4.0 a 6.4.15 de FortiOS puede permitir que un usuario remoto no autenticado consuma toda la memoria sistema a trav\u00e9s de m\u00faltiples cargas de archivos grandes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46669.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46669.json index 23a09c6fb32..4d80f78b36f 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46669.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46669.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:32.100", "lastModified": "2025-01-14T14:15:32.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Integer Overflow or Wraparound vulnerability [CWE-190] in version 7.4.4 and below, version 7.2.10 and below; FortiSASE version 23.4.b FortiOS tenant IPsec IKE service may allow an authenticated attacker to crash the IPsec tunnel via crafted requests, resulting in potential denial of service." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de enteros o de envoltura [CWE-190] en la versi\u00f3n 7.4.4 y anteriores, la versi\u00f3n 7.2.10 y anteriores; el servicio IKE IPsec del inquilino FortiOS de FortiSASE versi\u00f3n 23.4.b puede permitir que un atacante autenticado bloquee el t\u00fanel IPsec a trav\u00e9s de solicitudes manipuladas, lo que resulta en una posible denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46670.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46670.json index bfa61ea2548..fda15f18319 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46670.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46670.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:32.243", "lastModified": "2025-01-14T14:15:32.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An\u00a0Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de lectura fuera de los l\u00edmites [CWE-125] en FortiOS versi\u00f3n 7.6.0, versi\u00f3n 7.4.4 y anteriores, versi\u00f3n 7.2.9 y anteriores y el servicio IKE IPsec de la versi\u00f3n 24.3.b del inquilino FortiSASE FortiOS puede permitir que un atacante remoto no autenticado active el consumo de memoria, lo que lleva a una denegaci\u00f3n de servicio a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json index 697cbf56ec1..91ffca777c4 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46896.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46896.json index a6a09d3e7c4..dde300c7fdb 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46896.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46896.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:21.643", "lastModified": "2025-01-11T13:15:21.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: don't access invalid sched\n\nSince 2320c9e6a768 (\"drm/sched: memset() 'job' in drm_sched_job_init()\")\naccessing job->base.sched can produce unexpected results as the initialisation\nof (*job)->base.sched done in amdgpu_job_alloc is overwritten by the\nmemset.\n\nThis commit fixes an issue when a CS would fail validation and would\nbe rejected after job->num_ibs is incremented. In this case,\namdgpu_ib_free(ring->adev, ...) will be called, which would crash the\nmachine because the ring value is bogus.\n\nTo fix this, pass a NULL pointer to amdgpu_ib_free(): we can do this\nbecause the device is actually not used in this function.\n\nThe next commit will remove the ring argument completely.\n\n(cherry picked from commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: no acceder a sched no v\u00e1lido Desde 2320c9e6a768 (\"drm/sched: memset() 'job' en drm_sched_job_init()\") acceder a job->base.sched puede producir resultados inesperados ya que la inicializaci\u00f3n de (*job)->base.sched realizada en amdgpu_job_alloc es sobrescrita por memset. Esta confirmaci\u00f3n corrige un problema cuando un CS fallar\u00eda la validaci\u00f3n y ser\u00eda rechazado despu\u00e9s de que se incremente job->num_ibs. En este caso, se llamar\u00e1 a amdgpu_ib_free(ring->adev, ...), lo que bloquear\u00eda la m\u00e1quina porque el valor de ring es falso. Para corregir esto, pase un puntero NULL a amdgpu_ib_free(): podemos hacer esto porque el dispositivo en realidad no se usa en esta funci\u00f3n. La pr\u00f3xima confirmaci\u00f3n eliminar\u00e1 el argumento ring por completo. (seleccionado del commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json index fe456fbcacc..d2cd21206f6 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46919.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:16.833", "lastModified": "2025-01-13T20:15:28.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadOutputBuffers." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los procesadores m\u00f3viles Samsung Exynos 9820, 9825, 980, 990, 850, 1080, 2100 y 1280. La falta de una verificaci\u00f3n de longitud conduce a una escritura de pila fuera de los l\u00edmites en loadOutputBuffers." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json index 171651d9d72..71fde17b88d 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46920.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T18:15:18.517", "lastModified": "2025-01-13T20:15:28.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadInputBuffers." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los procesadores m\u00f3viles Samsung Exynos 9820, 9825, 980, 990, 850, 1080, 2100 y 1280. La falta de una verificaci\u00f3n de longitud conduce a una escritura de pila fuera de los l\u00edmites en loadInputBuffers." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json index c60d1096604..e5312f1d18e 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46921.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T19:15:10.903", "lastModified": "2025-01-13T19:15:10.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor and Modem Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W1000, Modem 5123, Modem 5300, Modem 5400. UE does not limit the number of attempts for the RRC Setup procedure in the 5G SA, leading to a denial of service (battery-drain attack)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador y m\u00f3dem m\u00f3vil Samsung Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W1000, m\u00f3dem 5123, m\u00f3dem 5300, m\u00f3dem 5400. La UE no limita la cantidad de intentos para el procedimiento de configuraci\u00f3n de RRC en la SA 5G, lo que genera una denegaci\u00f3n de servicio (ataque de descarga de bater\u00eda)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json index bd6c6b1dbd5..c99e231914e 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-15T02:15:10.333", "lastModified": "2024-11-21T09:43:13.690", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json index 41fbd2a30dc..5a8532f9636 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-02T10:16:00.770", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4695.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4695.json index 6d7b55a1b9a..598877f7413 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4695.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4695.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T10:15:10.820", "lastModified": "2024-11-21T09:43:23.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47002.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47002.json index 26ebe95711c..c478bf1cfb1 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47002.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47002.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-15T15:15:11.963", "lastModified": "2025-01-15T17:15:15.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A html code injection vulnerability exists in the vlan management part of Observium CE 24.4.13528. A specially crafted HTTP request can lead to an arbitrary html code. An authenticated user would need to click a malicious link provided by the attacker." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de c\u00f3digo HTML en la parte de administraci\u00f3n de VLAN de Observium CE 24.4.13528. Una solicitud HTTP manipulada especialmente puede generar un c\u00f3digo HTML arbitrario. Un usuario autenticado tendr\u00eda que hacer clic en un enlace malicioso proporcionado por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47100.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47100.json index c924be93f06..8544f3da8cc 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47100.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47100.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-01-14T11:15:16.573", "lastModified": "2025-01-14T11:15:16.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47140.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47140.json index 70a9196ed0e..a29f1277372 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47140.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47140.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-15T15:15:12.123", "lastModified": "2025-01-15T17:15:15.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (xss) vulnerability exists in the add_alert_check page of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) en la p\u00e1gina add_alert_check de Observium CE 24.4.13528. Una solicitud HTTP manipulada especialmente puede provocar la ejecuci\u00f3n de un c\u00f3digo JavaScript arbitrario. Un usuario autenticado tendr\u00eda que hacer clic en un enlace malicioso proporcionado por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47141.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47141.json index b47d488d68b..129003d5ac7 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47141.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47141.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:21.830", "lastModified": "2025-01-11T13:15:21.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinmux: Use sequential access to access desc->pinmux data\n\nWhen two client of the same gpio call pinctrl_select_state() for the\nsame functionality, we are seeing NULL pointer issue while accessing\ndesc->mux_owner.\n\nLet's say two processes A, B executing in pin_request() for the same pin\nand process A updates the desc->mux_usecount but not yet updated the\ndesc->mux_owner while process B see the desc->mux_usecount which got\nupdated by A path and further executes strcmp and while accessing\ndesc->mux_owner it crashes with NULL pointer.\n\nSerialize the access to mux related setting with a mutex lock.\n\n\tcpu0 (process A)\t\t\tcpu1(process B)\n\npinctrl_select_state() {\t\t pinctrl_select_state() {\n pin_request() {\t\t\t\tpin_request() {\n ...\n\t\t\t\t\t\t ....\n } else {\n desc->mux_usecount++;\n \t\t\t\t\t\tdesc->mux_usecount && strcmp(desc->mux_owner, owner)) {\n\n if (desc->mux_usecount > 1)\n return 0;\n desc->mux_owner = owner;\n\n }\t\t\t\t\t\t}" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinmux: usar acceso secuencial para acceder a los datos de desc->pinmux Cuando dos clientes del mismo gpio llaman a pinctrl_select_state() para la misma funcionalidad, vemos un problema de puntero NULL al acceder a desc->mux_owner. Digamos que dos procesos A, B se ejecutan en pin_request() para el mismo pin y el proceso A actualiza desc->mux_usecount pero a\u00fan no actualiza desc->mux_owner mientras que el proceso B ve desc->mux_usecount que fue actualizado por la ruta A y luego ejecuta strcmp y mientras accede a desc->mux_owner se bloquea con el puntero NULL. Serialice el acceso a la configuraci\u00f3n relacionada con mux con un bloqueo de mutex. cpu0 (proceso A) cpu1 (proceso B) pinctrl_select_state() { pinctrl_select_state() { pin_request() { pin_request() { ... .... } de lo contrario { desc->mux_usecount++; desc->mux_usecount && strcmp(desc->mux_owner, propietario)) { si (desc->mux_usecount > 1) devuelve 0; desc->mux_owner = propietario; } }" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47143.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47143.json index 957f248c2e6..a70bc9e3e0b 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47143.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47143.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.007", "lastModified": "2025-01-11T13:15:22.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-debug: fix a possible deadlock on radix_lock\n\nradix_lock() shouldn't be held while holding dma_hash_entry[idx].lock\notherwise, there's a possible deadlock scenario when\ndma debug API is called holding rq_lock():\n\nCPU0 CPU1 CPU2\ndma_free_attrs()\ncheck_unmap() add_dma_entry() __schedule() //out\n (A) rq_lock()\nget_hash_bucket()\n(A) dma_entry_hash\n check_sync()\n (A) radix_lock() (W) dma_entry_hash\ndma_entry_free()\n(W) radix_lock()\n // CPU2's one\n (W) rq_lock()\n\nCPU1 situation can happen when it extending radix tree and\nit tries to wake up kswapd via wake_all_kswapd().\n\nCPU2 situation can happen while perf_event_task_sched_out()\n(i.e. dma sync operation is called while deleting perf_event using\n etm and etr tmc which are Arm Coresight hwtracing driver backends).\n\nTo remove this possible situation, call dma_entry_free() after\nput_hash_bucket() in check_unmap()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-debug: corrige un posible bloqueo en radix_lock radix_lock() no se debe mantener mientras se mantiene dma_hash_entry[idx].lock de lo contrario, existe un posible escenario de bloqueo cuando se llama a la API de depuraci\u00f3n de dma manteniendo rq_lock(): CPU0 CPU1 CPU2 dma_free_attrs() check_unmap() add_dma_entry() __schedule() //out (A) rq_lock() get_hash_bucket() (A) dma_entry_hash check_sync() (A) radix_lock() (W) dma_entry_hash dma_entry_free() (W) radix_lock() // El \u00fanico rq_lock() de CPU2 (W) La situaci\u00f3n de CPU1 puede ocurrir cuando extiende el \u00e1rbol de radix e intenta despertar a kswapd a trav\u00e9s de wake_all_kswapd(). La situaci\u00f3n de CPU2 puede ocurrir mientras se ejecuta perf_event_task_sched_out() (es decir, se llama a la operaci\u00f3n de sincronizaci\u00f3n de dma mientras se elimina perf_event usando etm y etr tmc, que son backends del controlador hwtracing de Arm Coresight). Para eliminar esta posible situaci\u00f3n, llame a dma_entry_free() despu\u00e9s de put_hash_bucket() en check_unmap()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json index ca6f004dba0..b3fdf182f94 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-06T10:15:05.050", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json index 4a786652904..47e49152c22 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47383.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T15:15:14.697", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47389.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47389.json index 9fbc5e8b821..95f616b45f2 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47389.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47389.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T15:15:15.847", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json index 55f3f15f9dc..fc3e89f5117 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T15:15:16.407", "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47396.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47396.json index 06b29d77702..e43c4f7d47f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47396.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47396.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-01T02:15:09.933", "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47408.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47408.json index e6ed4a132e3..07a8e5ef850 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47408.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47408.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.220", "lastModified": "2025-01-11T13:15:22.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/smc: comprobar smcd_v2_ext_offset al recibir un mensaje de propuesta Al recibir un mensaje de propuesta en el servidor, el campo smcd_v2_ext_offset en el mensaje de propuesta es del cliente remoto y no se puede confiar completamente en \u00e9l. Una vez que el valor de smcd_v2_ext_offset excede el valor m\u00e1ximo, existe la posibilidad de acceder a una direcci\u00f3n incorrecta y puede ocurrir un bloqueo. Este parche verifica el valor de smcd_v2_ext_offset antes de usarlo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47517.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47517.json index acd886888cd..182ef4366fc 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47517.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47517.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:25.923", "lastModified": "2025-01-10T22:15:25.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access" + }, + { + "lang": "es", + "value": "Los tokens de autenticaci\u00f3n de administrador vencidos e inutilizables pueden ser revelados por unidades que han agotado el tiempo de acceso a ETM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47518.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47518.json index df6652de5a4..177ea58215a 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47518.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47518.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.053", "lastModified": "2025-01-10T22:15:26.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Specially constructed queries targeting ETM could discover active remote access sessions" + }, + { + "lang": "es", + "value": "Las consultas especialmente construidas dirigidas a ETM podr\u00edan descubrir sesiones de acceso remoto activas" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47519.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47519.json index 8d804abfcd9..23debc64ec5 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47519.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47519.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.177", "lastModified": "2025-01-10T22:15:26.177", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Backup uploads to ETM subject to man-in-the-middle interception" + }, + { + "lang": "es", + "value": "Las cargas de respaldo a ETM est\u00e1n sujetas a intercepci\u00f3n por intermediarios" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47520.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47520.json index 9eb93d0e215..4ac498bcd53 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47520.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47520.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.290", "lastModified": "2025-01-10T22:15:26.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A user with advanced report application access rights can perform actions for which they are not authorized" + }, + { + "lang": "es", + "value": "Un usuario con derechos de acceso a la aplicaci\u00f3n de informes avanzados puede realizar acciones para las que no est\u00e1 autorizado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47566.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47566.json index eb5dbb28054..67967c0b6c1 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47566.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47566.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:32.400", "lastModified": "2025-01-14T14:15:32.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper limitation of a pathname to a restricted directory ('path traversal') [CWE-23] in Fortinet FortiRecorder version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to delete files from the underlying filesystem via crafted CLI requests." + }, + { + "lang": "es", + "value": "Una limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') [CWE-23] en Fortinet FortiRecorder versi\u00f3n 7.2.0 a 7.2.1 y anteriores a 7.0.4 permite que un atacante privilegiado elimine archivos del sistema de archivos subyacente a trav\u00e9s de solicitudes CLI manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47571.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47571.json index 4aaf66a8486..43114b46994 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47571.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47571.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:32.560", "lastModified": "2025-01-14T15:15:26.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An operation on a resource after expiration or release in Fortinet FortiManager 6.4.12 through 7.4.0 allows an attacker to gain improper access to FortiGate via valid credentials." + }, + { + "lang": "es", + "value": "Una operaci\u00f3n en un recurso despu\u00e9s de su vencimiento o liberaci\u00f3n en Fortinet FortiManager 6.4.12 a 7.4.0 permite a un atacante obtener acceso indebido a FortiGate a trav\u00e9s de credenciales v\u00e1lidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47572.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47572.json index 8528c31fc51..ec86b911925 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47572.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47572.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:32.717", "lastModified": "2025-01-14T15:15:26.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of formula elements in a csv file in Fortinet FortiSOAR 7.2.1 through 7.4.1 allows attacker to execute unauthorized code or commands via manipulating csv file" + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos de f\u00f3rmula en un archivo csv en Fortinet FortiSOAR 7.2.1 a 7.4.1 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados mediante la manipulaci\u00f3n del archivo csv." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47574.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47574.json index 005ce05bddd..78cd7f69ccd 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47574.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-13T12:15:16.313", "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47605.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47605.json index fa88e7b8385..979ae31922a 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47605.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47605.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T23:15:08.270", "lastModified": "2025-01-14T23:15:08.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "silverstripe-asset-admin is a silverstripe assets gallery for asset management. When using the \"insert media\" functionality, the linked oEmbed JSON includes an HTML attribute which will replace the embed shortcode. The HTML is not sanitized before replacing the shortcode, allowing a script payload to be executed on both the CMS and the front-end of the website. This issue has been addressed in silverstripe/framework version 5.3.8 and users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "silverstripe-asset-admin es una galer\u00eda de recursos de silverstripe para la gesti\u00f3n de recursos. Al utilizar la funci\u00f3n \"insert media\", el JSON de oEmbed vinculado incluye un atributo HTML que reemplazar\u00e1 el c\u00f3digo abreviado de inserci\u00f3n. El HTML no se desinfecta antes de reemplazar el c\u00f3digo abreviado, lo que permite que se ejecute un payload de script tanto en el CMS como en el front-end del sitio web. Este problema se ha solucionado en la versi\u00f3n 5.3.8 de silverstripe/framework y se recomienda a los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47794.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47794.json index ffe4dda3c7a..98a2e6eab7e 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47794.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47794.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.390", "lastModified": "2025-01-11T13:15:22.390", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Prevent tailcall infinite loop caused by freplace\n\nThere is a potential infinite loop issue that can occur when using a\ncombination of tail calls and freplace.\n\nIn an upcoming selftest, the attach target for entry_freplace of\ntailcall_freplace.c is subprog_tc of tc_bpf2bpf.c, while the tail call in\nentry_freplace leads to entry_tc. This results in an infinite loop:\n\nentry_tc -> subprog_tc -> entry_freplace --tailcall-> entry_tc.\n\nThe problem arises because the tail_call_cnt in entry_freplace resets to\nzero each time entry_freplace is executed, causing the tail call mechanism\nto never terminate, eventually leading to a kernel panic.\n\nTo fix this issue, the solution is twofold:\n\n1. Prevent updating a program extended by an freplace program to a\n prog_array map.\n2. Prevent extending a program that is already part of a prog_array map\n with an freplace program.\n\nThis ensures that:\n\n* If a program or its subprogram has been extended by an freplace program,\n it can no longer be updated to a prog_array map.\n* If a program has been added to a prog_array map, neither it nor its\n subprograms can be extended by an freplace program.\n\nMoreover, an extension program should not be tailcalled. As such, return\n-EINVAL if the program has a type of BPF_PROG_TYPE_EXT when adding it to a\nprog_array map.\n\nAdditionally, fix a minor code style issue by replacing eight spaces with a\ntab for proper formatting." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Evitar bucle infinito de tailcall causado por freplace Existe un posible problema de bucle infinito que puede ocurrir al usar una combinaci\u00f3n de llamadas de cola y freplace. En una pr\u00f3xima autoprueba, el objetivo de conexi\u00f3n para entry_freplace de tailcall_freplace.c es subprog_tc de tc_bpf2bpf.c, mientras que la llamada de cola en entry_freplace conduce a entry_tc. Esto da como resultado un bucle infinito: entry_tc -> subprog_tc -> entry_freplace --tailcall-> entry_tc. El problema surge porque tail_call_cnt en entry_freplace se restablece a cero cada vez que se ejecuta entry_freplace, lo que hace que el mecanismo de llamada de cola nunca finalice, lo que finalmente conduce a un p\u00e1nico del kernel. Para solucionar este problema, la soluci\u00f3n es doble: 1. Evitar actualizar un programa extendido por un programa freplace a un mapa prog_array. 2. Evite extender un programa que ya es parte de un mapa prog_array con un programa freplace. Esto garantiza que: * Si un programa o su subprograma ha sido extendido por un programa freplace, ya no puede actualizarse a un mapa prog_array. * Si un programa ha sido agregado a un mapa prog_array, ni \u00e9l ni sus subprogramas pueden ser extendidos por un programa freplace. Adem\u00e1s, un programa de extensi\u00f3n no debe ser llamado al final. Como tal, devuelva -EINVAL si el programa tiene un tipo de BPF_PROG_TYPE_EXT al agregarlo a un mapa prog_array. Adem\u00e1s, solucione un problema menor de estilo de c\u00f3digo reemplazando ocho espacios con una tabulaci\u00f3n para un formato adecuado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47796.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47796.json index f59ff72c0b0..958b77122dd 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47796.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47796.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-13T15:15:08.540", "lastModified": "2025-01-13T16:15:17.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper array index validation vulnerability exists in the nowindow functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de validaci\u00f3n incorrecta del \u00edndice de matriz en la funcionalidad nowindow de OFFIS DCMTK 3.6.8. Un archivo DICOM manipulado especialmente puede provocar una escritura fuera de los l\u00edmites. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47809.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47809.json index 0b578be00e5..98022dd0afe 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47809.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47809.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.583", "lastModified": "2025-01-11T13:15:22.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndlm: fix possible lkb_resource null dereference\n\nThis patch fixes a possible null pointer dereference when this function is\ncalled from request_lock() as lkb->lkb_resource is not assigned yet,\nonly after validate_lock_args() by calling attach_lkb(). Another issue\nis that a resource name could be a non printable bytearray and we cannot\nassume to be ASCII coded.\n\nThe log functionality is probably never being hit when DLM is used in\nnormal way and no debug logging is enabled. The null pointer dereference\ncan only occur on a new created lkb that does not have the resource\nassigned yet, it probably never hits the null pointer dereference but we\nshould be sure that other changes might not change this behaviour and we\nactually can hit the mentioned null pointer dereference.\n\nIn this patch we just drop the printout of the resource name, the lkb id\nis enough to make a possible connection to a resource name if this\nexists." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dlm: arregla posible desreferencia nula de lkb_resource Este parche corrige una posible desreferencia de puntero nulo cuando se llama a esta funci\u00f3n desde request_lock() ya que lkb->lkb_resource a\u00fan no est\u00e1 asignado, solo despu\u00e9s de validar_lock_args() llamando a attached_lkb(). Otro problema es que un nombre de recurso podr\u00eda ser un bytearray no imprimible y no podemos asumir que est\u00e9 codificado en ASCII. Es probable que la funcionalidad de registro nunca se vea afectada cuando se usa DLM de forma normal y no se habilita ning\u00fan registro de depuraci\u00f3n. La desreferencia de puntero nulo solo puede ocurrir en un lkb creado recientemente que a\u00fan no tenga el recurso asignado, probablemente nunca llegue a la desreferencia de puntero nulo, pero debemos estar seguros de que otros cambios podr\u00edan no cambiar este comportamiento y realmente podemos llegar a la desreferencia de puntero nulo mencionada. En este parche simplemente omitimos la impresi\u00f3n del nombre del recurso, el id de lkb es suficiente para hacer una posible conexi\u00f3n con un nombre de recurso si existe." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47894.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47894.json index 368f280fc63..b5c19c78f44 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47894.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47894.json @@ -3,7 +3,7 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:08.223", "lastModified": "2025-01-13T18:15:18.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47895.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47895.json index a1cbc6a854d..842a8ce40c5 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47895.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47895.json @@ -3,7 +3,7 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:08.457", "lastModified": "2025-01-13T18:15:18.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47897.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47897.json index f8d8911f80d..d006572302a 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47897.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47897.json @@ -3,7 +3,7 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:08.600", "lastModified": "2025-01-13T18:15:19.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4712.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4712.json index 22f2e9e6d94..f0f2b377d8d 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4712.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4712.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-05-14T15:44:27.660", "lastModified": "2024-11-21T09:43:25.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4751.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4751.json index a1393bf3cea..58b532d7a38 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4751.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4751.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:13.297", "lastModified": "2024-11-21T09:43:31.213", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json index 204b923471b..87c756c9d23 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T21:15:13.063", "lastModified": "2025-01-15T21:15:13.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HI-SCAN 6040i Hitrax HX-03-19-I was discovered to transmit user credentials in cleartext over the GIOP protocol. This allows attackers to possibly gain access to sensitive information via a man-in-the-middle attack." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que el HI-SCAN 6040i Hitrax HX-03-19-I transmit\u00eda credenciales de usuario en texto plano a trav\u00e9s del protocolo GIOP. Esto permite a los atacantes obtener acceso a informaci\u00f3n confidencial a trav\u00e9s de un ataque man-in-the-middle." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json index 2f9e28581b6..38681d49519 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T21:15:13.200", "lastModified": "2025-01-15T21:15:13.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure default configurations in HI-SCAN 6040i Hitrax HX-03-19-I allow authenticated attackers with low-level privileges to escalate to root-level privileges." + }, + { + "lang": "es", + "value": " Las configuraciones predeterminadas inseguras en HI-SCAN 6040i Hitrax HX-03-19-I permiten que atacantes autenticados con privilegios de bajo nivel escalen a privilegios de nivel root." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json index 2ddd2b15865..60122b53534 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T21:15:13.340", "lastModified": "2025-01-15T21:15:13.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the USB Autorun function of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to execute arbitrary code via uploading a crafted script from a USB device." + }, + { + "lang": "es", + "value": " Un problema en la funci\u00f3n de ejecuci\u00f3n autom\u00e1tica USB del HI-SCAN 6040i Hitrax HX-03-19-I permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un script manipulado desde un dispositivo USB." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48460.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48460.json index 3464c236c3a..6260b56a690 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48460.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48460.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T22:15:39.973", "lastModified": "2025-01-16T22:15:39.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Eugeny Tabby 1.0.213 allows a remote attacker to obtain sensitive information via the server and sends the SSH username and password even when the host key verification fails." + }, + { + "lang": "es", + "value": "Un problema en Eugeny Tabby 1.0.213 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del servidor y env\u00eda el nombre de usuario y la contrase\u00f1a SSH incluso cuando falla la verificaci\u00f3n de la clave del host." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48760.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48760.json index c6ab50c64e0..cd888b45408 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48760.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48760.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:26.963", "lastModified": "2025-01-15T00:15:32.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution." + }, + { + "lang": "es", + "value": " Un problema en GestioIP v3.5.7 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de carga de archivos. El atacante puede cargar un archivo perlcmd.cgi malicioso que sobrescriba el archivo upload.cgi original, lo que permite la ejecuci\u00f3n remota de comandos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48854.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48854.json index 7e005c1e127..8c9fd05a107 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48854.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48854.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@blackberry.com", "published": "2025-01-14T19:15:31.267", "lastModified": "2025-01-14T19:15:31.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Off-by-one error in the TIFF image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause an information disclosure in the context of the process using the image codec." + }, + { + "lang": "es", + "value": "Un error de un d\u00edgito en el c\u00f3dec de imagen TIFF en las versiones 8.0, 7.1 y 7.0 de QNX SDP podr\u00eda permitir que un atacante no autenticado provoque una divulgaci\u00f3n de informaci\u00f3n en el contexto del proceso que utiliza el c\u00f3dec de imagen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48855.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48855.json index 8e0fd4757d4..38b8c20f281 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48855.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48855.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@blackberry.com", "published": "2025-01-14T19:15:31.413", "lastModified": "2025-01-14T19:15:31.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in the TIFF image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause an information disclosure in the context of the process using the image codec." + }, + { + "lang": "es", + "value": "La lectura de fuera de los l\u00edmites en el c\u00f3dec de imagen TIFF en las versiones 8.0, 7.1 y 7.0 de QNX SDP podr\u00eda permitir que un atacante no autenticado provoque una divulgaci\u00f3n de informaci\u00f3n en el contexto del proceso que utiliza el c\u00f3dec de imagen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48856.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48856.json index 508ecd0790a..efb89bc2b06 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48856.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48856.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@blackberry.com", "published": "2025-01-14T19:15:31.543", "lastModified": "2025-01-14T19:15:31.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el c\u00f3dec de imagen PCX en las versiones 8.0, 7.1 y 7.0 de QNX SDP podr\u00eda permitir que un atacante no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio o ejecute c\u00f3digo en el contexto del proceso que utiliza el c\u00f3dec de imagen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48857.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48857.json index d24e9e9920c..9a3a6a8995c 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48857.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48857.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@blackberry.com", "published": "2025-01-14T19:15:31.680", "lastModified": "2025-01-14T19:15:31.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition in the context of the process using the image codec." + }, + { + "lang": "es", + "value": "La desreferencia de puntero NULL en el c\u00f3dec de imagen PCX en las versiones 8.0, 7.1 y 7.0 de QNX SDP podr\u00eda permitir que un atacante no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio en el contexto del proceso que utiliza el c\u00f3dec de imagen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48858.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48858.json index 7f7e9068940..480ad33f7b6 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48858.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48858.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@blackberry.com", "published": "2025-01-14T20:15:28.373", "lastModified": "2025-01-14T20:15:28.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition in the context of the process using the image codec." + }, + { + "lang": "es", + "value": "Una validaci\u00f3n de entrada incorrecta en el c\u00f3dec de imagen PCX en las versiones 8.0, 7.1 y 7.0 de QNX SDP podr\u00eda permitir que un atacante no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio en el contexto del proceso que utiliza el c\u00f3dec de imagen." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48873.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48873.json index 969ed257267..7ad2a3db789 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48873.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48873.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.750", "lastModified": "2025-01-11T13:15:22.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: check return value of ieee80211_probereq_get() for RNR\n\nThe return value of ieee80211_probereq_get() might be NULL, so check it\nbefore using to avoid NULL pointer access.\n\nAddresses-Coverity-ID: 1529805 (\"Dereference null return value\")" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw89: comprobar el valor de retorno de ieee80211_probereq_get() para RNR El valor de retorno de ieee80211_probereq_get() podr\u00eda ser NULL, por lo que debe comprobarlo antes de usarlo para evitar el acceso al puntero NULL. Addresses-Coverity-ID: 1529805 (\"Desreferenciar valor de retorno nulo\")" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48875.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48875.json index f20556fc405..481e6c11a41 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48875.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48875.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.933", "lastModified": "2025-01-11T13:15:22.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don't take dev_replace rwsem on task already holding it\n\nRunning fstests btrfs/011 with MKFS_OPTIONS=\"-O rst\" to force the usage of\nthe RAID stripe-tree, we get the following splat from lockdep:\n\n BTRFS info (device sdd): dev_replace from /dev/sdd (devid 1) to /dev/sdb started\n\n ============================================\n WARNING: possible recursive locking detected\n 6.11.0-rc3-btrfs-for-next #599 Not tainted\n --------------------------------------------\n btrfs/2326 is trying to acquire lock:\n ffff88810f215c98 (&fs_info->dev_replace.rwsem){++++}-{3:3}, at: btrfs_map_block+0x39f/0x2250\n\n but task is already holding lock:\n ffff88810f215c98 (&fs_info->dev_replace.rwsem){++++}-{3:3}, at: btrfs_map_block+0x39f/0x2250\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(&fs_info->dev_replace.rwsem);\n lock(&fs_info->dev_replace.rwsem);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 1 lock held by btrfs/2326:\n #0: ffff88810f215c98 (&fs_info->dev_replace.rwsem){++++}-{3:3}, at: btrfs_map_block+0x39f/0x2250\n\n stack backtrace:\n CPU: 1 UID: 0 PID: 2326 Comm: btrfs Not tainted 6.11.0-rc3-btrfs-for-next #599\n Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n Call Trace:\n \n dump_stack_lvl+0x5b/0x80\n __lock_acquire+0x2798/0x69d0\n ? __pfx___lock_acquire+0x10/0x10\n ? __pfx___lock_acquire+0x10/0x10\n lock_acquire+0x19d/0x4a0\n ? btrfs_map_block+0x39f/0x2250\n ? __pfx_lock_acquire+0x10/0x10\n ? find_held_lock+0x2d/0x110\n ? lock_is_held_type+0x8f/0x100\n down_read+0x8e/0x440\n ? btrfs_map_block+0x39f/0x2250\n ? __pfx_down_read+0x10/0x10\n ? do_raw_read_unlock+0x44/0x70\n ? _raw_read_unlock+0x23/0x40\n btrfs_map_block+0x39f/0x2250\n ? btrfs_dev_replace_by_ioctl+0xd69/0x1d00\n ? btrfs_bio_counter_inc_blocked+0xd9/0x2e0\n ? __kasan_slab_alloc+0x6e/0x70\n ? __pfx_btrfs_map_block+0x10/0x10\n ? __pfx_btrfs_bio_counter_inc_blocked+0x10/0x10\n ? kmem_cache_alloc_noprof+0x1f2/0x300\n ? mempool_alloc_noprof+0xed/0x2b0\n btrfs_submit_chunk+0x28d/0x17e0\n ? __pfx_btrfs_submit_chunk+0x10/0x10\n ? bvec_alloc+0xd7/0x1b0\n ? bio_add_folio+0x171/0x270\n ? __pfx_bio_add_folio+0x10/0x10\n ? __kasan_check_read+0x20/0x20\n btrfs_submit_bio+0x37/0x80\n read_extent_buffer_pages+0x3df/0x6c0\n btrfs_read_extent_buffer+0x13e/0x5f0\n read_tree_block+0x81/0xe0\n read_block_for_search+0x4bd/0x7a0\n ? __pfx_read_block_for_search+0x10/0x10\n btrfs_search_slot+0x78d/0x2720\n ? __pfx_btrfs_search_slot+0x10/0x10\n ? lock_is_held_type+0x8f/0x100\n ? kasan_save_track+0x14/0x30\n ? __kasan_slab_alloc+0x6e/0x70\n ? kmem_cache_alloc_noprof+0x1f2/0x300\n btrfs_get_raid_extent_offset+0x181/0x820\n ? __pfx_lock_acquire+0x10/0x10\n ? __pfx_btrfs_get_raid_extent_offset+0x10/0x10\n ? down_read+0x194/0x440\n ? __pfx_down_read+0x10/0x10\n ? do_raw_read_unlock+0x44/0x70\n ? _raw_read_unlock+0x23/0x40\n btrfs_map_block+0x5b5/0x2250\n ? __pfx_btrfs_map_block+0x10/0x10\n scrub_submit_initial_read+0x8fe/0x11b0\n ? __pfx_scrub_submit_initial_read+0x10/0x10\n submit_initial_group_read+0x161/0x3a0\n ? lock_release+0x20e/0x710\n ? __pfx_submit_initial_group_read+0x10/0x10\n ? __pfx_lock_release+0x10/0x10\n scrub_simple_mirror.isra.0+0x3eb/0x580\n scrub_stripe+0xe4d/0x1440\n ? lock_release+0x20e/0x710\n ? __pfx_scrub_stripe+0x10/0x10\n ? __pfx_lock_release+0x10/0x10\n ? do_raw_read_unlock+0x44/0x70\n ? _raw_read_unlock+0x23/0x40\n scrub_chunk+0x257/0x4a0\n scrub_enumerate_chunks+0x64c/0xf70\n ? __mutex_unlock_slowpath+0x147/0x5f0\n ? __pfx_scrub_enumerate_chunks+0x10/0x10\n ? bit_wait_timeout+0xb0/0x170\n ? __up_read+0x189/0x700\n ? scrub_workers_get+0x231/0x300\n ? up_write+0x490/0x4f0\n btrfs_scrub_dev+0x52e/0xcd0\n ? create_pending_snapshots+0x230/0x250\n ? __pfx_btrfs_scrub_dev+0x10/0x10\n btrfs_dev_replace_by_ioctl+0xd69/0x1d00\n ? lock_acquire+0x19d/0x4a0\n ? __pfx_btrfs_dev_replace_by_ioctl+0x10/0x10\n ?\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: no tome dev_replace rwsem en la tarea que ya lo contiene Al ejecutar fstests btrfs/011 con MKFS_OPTIONS=\"-O rst\" para forzar el uso del \u00e1rbol de bandas RAID, obtenemos el siguiente mensaje de lockdep: Informaci\u00f3n de BTRFS (dispositivo sdd): dev_replace de /dev/sdd (devid 1) a /dev/sdb iniciado ============================================ ADVERTENCIA: se detect\u00f3 un posible bloqueo recursivo 6.11.0-rc3-btrfs-for-next #599 No contaminado -------------------------------------------- btrfs/2326 est\u00e1 intentando adquirir el bloqueo: ffff88810f215c98 (&fs_info->dev_replace.rwsem){++++}-{3:3}, en: btrfs_map_block+0x39f/0x2250 pero la tarea ya tiene el bloqueo: ffff88810f215c98 (&fs_info->dev_replace.rwsem){++++}-{3:3}, en: btrfs_map_block+0x39f/0x2250 otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock(&fs_info->dev_replace.rwsem); lock(&fs_info->dev_replace.rwsem); *** BLOQUEO INTERMEDIO *** Puede deberse a la falta de notaci\u00f3n de anidamiento de bloqueo 1 bloqueo mantenido por btrfs/2326: #0: ffff88810f215c98 (&fs_info->dev_replace.rwsem){++++}-{3:3}, en: btrfs_map_block+0x39f/0x2250 seguimiento de pila: CPU: 1 UID: 0 PID: 2326 Comm: btrfs No contaminado 6.11.0-rc3-btrfs-for-next #599 Nombre del hardware: Bochs Bochs, BIOS Bochs 01/01/2011 Seguimiento de llamadas: dump_stack_lvl+0x5b/0x80 __lock_acquire+0x2798/0x69d0 ? __pfx___lock_acquire+0x10/0x10 ? __pfx___lock_acquire+0x10/0x10 lock_acquire+0x19d/0x4a0 ? btrfs_map_block+0x39f/0x2250 ? __pfx_lock_acquire+0x10/0x10 ? find_held_lock+0x2d/0x110 ? lock_is_held_type+0x8f/0x100 down_read+0x8e/0x440 ? btrfs_map_block+0x39f/0x2250 ? __pfx_down_read+0x10/0x10 ? do_raw_read_unlock+0x44/0x70 ? kmem_cache_alloc_noprof+0x1f2/0x300 ? bvec_alloc+0xd7/0x1b0 ? bio_add_folio+0x171/0x270 ? __pfx_bio_add_folio+0x10/0x10 ? __kasan_check_read+0x20/0x20 btrfs_submit_bio+0x37/0x80 lectura_extensi\u00f3n_b\u00fafer_p\u00e1ginas+0x3df/0x6c0 btrfs_lectura_extensi\u00f3n_b\u00fafer+0x13e/0x5f0 lectura_\u00e1rbol_bloque+0x81/0xe0 lectura_bloque_para_b\u00fasqueda+0x4bd/0x7a0 ? __pfx_lectura_bloque_para_b\u00fasqueda+0x10/0x10 btrfs_b\u00fasqueda_slot+0x78d/0x2720 ? __pfx_btrfs_b\u00fasqueda_slot+0x10/0x10 ? bloqueo_se_retiene_tipo+0x8f/0x100 ? kasan_guardar_pista+0x14/0x30 ? __kasan_slab_alloc+0x6e/0x70 ? kmem_cache_alloc_noprof+0x1f2/0x300 btrfs_get_raid_extent_offset+0x181/0x820 ? __pfx_lock_acquire+0x10/0x10 ? __pfx_btrfs_get_raid_extent_offset+0x10/0x10 ? down_read+0x194/0x440 ? __pfx_down_read+0x10/0x10 ? do_raw_read_unlock+0x44/0x70 ? _raw_read_unlock+0x23/0x40 btrfs_map_block+0x5b5/0x2250 ? liberaci\u00f3n de bloqueo+0x20e/0x710 ? __pfx_scrub_stripe+0x10/0x10 ? __pfx_lock_release+0x10/0x10 ? hacer_desbloqueo_lectura_sin_encriptar+0x44/0x70 ? _desbloqueo_lectura_sin_encriptar+0x23/0x40 fragmento_de_scruzamiento+0x257/0x4a0 fragmento_de_scruzamiento_enumerar+0x64c/0xf70 ? __mutex_unlock_slowpath+0x147/0x5f0 ? __pfx_scrub_enumerar_chunks+0x10/0x10 ? tiempo_de_espera_bit+0xb0/0x170 ? __up_read+0x189/0x700 ? obtenci\u00f3n_trabajadores_de_scruzamiento+0x231/0x300 ? up_write+0x490/0x4f0 btrfs_scrub_dev+0x52e/0xcd0 ? create_pending_snapshots+0x230/0x250 ? __pfx_btrfs_scrub_dev+0x10/0x10 btrfs_dev_replace_by_ioctl+0xd69/0x1d00 ? lock_acquire+0x19d/0x4a0 ? __pfx_btrfs_dev_replace_by_ioctl+0x10/0x10 ? ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json index a4ca8e30c59..3d1c44c7efc 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48876.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:23.263", "lastModified": "2025-01-11T13:15:23.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nstackdepot: fix stack_depot_save_flags() in NMI context\n\nPer documentation, stack_depot_save_flags() was meant to be usable from\nNMI context if STACK_DEPOT_FLAG_CAN_ALLOC is unset. However, it still\nwould try to take the pool_lock in an attempt to save a stack trace in the\ncurrent pool (if space is available).\n\nThis could result in deadlock if an NMI is handled while pool_lock is\nalready held. To avoid deadlock, only try to take the lock in NMI context\nand give up if unsuccessful.\n\nThe documentation is fixed to clearly convey this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: stackdepot: se corrige stack_depot_save_flags() en el contexto NMI Seg\u00fan la documentaci\u00f3n, se supon\u00eda que stack_depot_save_flags() se pod\u00eda usar desde el contexto NMI si STACK_DEPOT_FLAG_CAN_ALLOC no est\u00e1 configurado. Sin embargo, a\u00fan intentar\u00eda tomar el pool_lock en un intento de guardar un seguimiento de pila en el pool actual (si hay espacio disponible). Esto podr\u00eda resultar en un bloqueo si se maneja un NMI mientras pool_lock ya est\u00e1 retenido. Para evitar el bloqueo, solo intente tomar el bloqueo en el contexto NMI y abandone si no tiene \u00e9xito. La documentaci\u00f3n se corrige para transmitir esto claramente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48881.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48881.json index dc116dc16f2..b3f704c44ed 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48881.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48881.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:23.437", "lastModified": "2025-01-11T13:15:23.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbcache: revert replacing IS_ERR_OR_NULL with IS_ERR again\n\nCommit 028ddcac477b (\"bcache: Remove unnecessary NULL point check in\nnode allocations\") leads a NULL pointer deference in cache_set_flush().\n\n1721 if (!IS_ERR_OR_NULL(c->root))\n1722 list_add(&c->root->list, &c->btree_cache);\n\n>From the above code in cache_set_flush(), if previous registration code\nfails before allocating c->root, it is possible c->root is NULL as what\nit is initialized. __bch_btree_node_alloc() never returns NULL but\nc->root is possible to be NULL at above line 1721.\n\nThis patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bcache: revertir el reemplazo de IS_ERR_OR_NULL con IS_ERR nuevamente. El commit 028ddcac477b (\"bcache: eliminar la comprobaci\u00f3n innecesaria del punto NULL en las asignaciones de nodos\") conduce a una deferencia de puntero NULL en cache_set_flush(). 1721 if (!IS_ERR_OR_NULL(c->root)) 1722 list_add(&c->root->list, &c->btree_cache); >Del c\u00f3digo anterior en cache_set_flush(), si el c\u00f3digo de registro anterior falla antes de asignar c->root, es posible que c->root sea NULL como lo que se inicializa. __bch_btree_node_alloc() nunca devuelve NULL, pero es posible que c->root sea NULL en la l\u00ednea 1721 anterior. Este parche reemplaza IS_ERR() por IS_ERR_OR_NULL() para solucionar esto." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json index d3ddb8c9a6d..693cd717b57 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48883.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:16.947", "lastModified": "2025-01-13T20:15:28.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, and Modem 5300. The UE incorrectly handles a malformed uplink scheduling message, resulting in an information leak of the UE." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador port\u00e1til y el m\u00f3dem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, el m\u00f3dem 5123 y el m\u00f3dem 5300. El UE maneja incorrectamente un mensaje de programaci\u00f3n de enlace ascendente mal formado, lo que resulta en una fuga de informaci\u00f3n del UE." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48885.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48885.json index 285e4cb53fd..09ca8c91a17 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48885.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48885.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-16T09:15:06.737", "lastModified": "2025-01-16T09:15:06.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets." + }, + { + "lang": "es", + "value": " Una limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\"path traversal\") en Fortinet FortiRecorder versiones 7.2.0 a 7.2.1, 7.0.0 a 7.0.4, FortiWeb versiones 7.6.0, 7.4.0 a 7.4.4, 7.2.0 a 7.2.10, 7.0.0 a 7.0.10, 6.4.0 a 6.4.3, FortiVoice versiones 7.0.0 a 7.0.4, 6.4.0 a 6.4.9, 6.0.0 a 6.0.12 permite a un atacante escalar privilegios a trav\u00e9s de paquetes especialmente manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48886.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48886.json index 67a790fca41..b3222b4e3c1 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48886.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48886.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.027", "lastModified": "2025-01-14T14:15:33.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack." + }, + { + "lang": "es", + "value": "Una autenticaci\u00f3n d\u00e9bil en Fortinet FortiOS versiones 7.4.0 a 7.4.4, 7.2.0 a 7.2.8, 7.0.0 a 7.0.15, 6.4.0 a 6.4.15, FortiProxy versiones 7.4.0 a 7.4.4, 7.2.0 a 7.2.10, 7.0.0 a 7.0.17, 2.0.0 a 2.0.14, FortiManager versiones 7.6.0 a 7.6.1, 7.4.1 a 7.4.3, FortiManager Cloud versiones 7.4.1 a 7.4.3 y FortiAnalyzer Cloud versiones 7.4.1 a 7.4.3 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados mediante un ataque de fuerza bruta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48890.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48890.json index c8c2122e1cc..671fd2f2004 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48890.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48890.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.187", "lastModified": "2025-01-14T14:15:33.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSOAR IMAP connector version 3.5.7 and below may allow an authenticated attacker to execute unauthorized code or commands via a specifically crafted playbook" + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') [CWE-78] en el conector IMAP de FortiSOAR versi\u00f3n 3.5.7 y anteriores puede permitir que un atacante autenticado ejecute c\u00f3digo o comandos no autorizados a trav\u00e9s de un playbook manipulado espec\u00edficamente" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48893.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48893.json index 2437500778e..7ae23d54951 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48893.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48893.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.333", "lastModified": "2025-01-14T14:15:33.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiSOAR 7.3.0 through 7.3.3, 7.2.1 through 7.2.2 may allow an authenticated attacker to perform a stored cross site scripting (XSS) attack via the creation of malicious playbook." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web [CWE-79] en FortiSOAR 7.3.0 a 7.3.3, 7.2.1 a 7.2.2 puede permitir que un atacante autenticado realice un ataque Cross Site Scripting (XSS) almacenado mediante la creaci\u00f3n de un playbook malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-491xx/CVE-2024-49105.json b/CVE-2024/CVE-2024-491xx/CVE-2024-49105.json index f43f872c4c9..b898e2609f8 100644 --- a/CVE-2024/CVE-2024-491xx/CVE-2024-49105.json +++ b/CVE-2024/CVE-2024-491xx/CVE-2024-49105.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el cliente de escritorio remoto" + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el cliente de escritorio remoto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49375.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49375.json index f2461a759d0..37e306314a1 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49375.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49375.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T19:15:31.813", "lastModified": "2025-01-14T19:15:31.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open source machine learning framework. A vulnerability has been identified in Rasa that enables an attacker who has the ability to load a maliciously crafted model remotely into a Rasa instance to achieve Remote Code Execution. The prerequisites for this are: 1. The HTTP API must be enabled on the Rasa instance eg with `--enable-api`. This is not the default configuration. 2. For unauthenticated RCE to be exploitable, the user must not have configured any authentication or other security controls recommended in our documentation. 3. For authenticated RCE, the attacker must posses a valid authentication token or JWT to interact with the Rasa API. This issue has been addressed in rasa version 3.6.21 and all users are advised to upgrade. Users unable to upgrade should ensure that they require authentication and that only trusted users are given access." + }, + { + "lang": "es", + "value": "Framework de aprendizaje autom\u00e1tico de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en Rasa que permite a un atacante que tiene la capacidad de cargar un modelo manipulado malintencionado de forma remota en una instancia de Rasa lograr la ejecuci\u00f3n remota de c\u00f3digo. Los requisitos previos para esto son: 1. La API HTTP debe estar habilitada en la instancia de Rasa, por ejemplo, con `--enable-api`. Esta no es la configuraci\u00f3n predeterminada. 2. Para que se pueda explotar una RCE no autenticada, el usuario no debe haber configurado ninguna autenticaci\u00f3n u otros controles de seguridad recomendados en nuestra documentaci\u00f3n. 3. Para una RCE autenticada, el atacante debe poseer un token de autenticaci\u00f3n v\u00e1lido o JWT para interactuar con la API de Rasa. Este problema se ha solucionado en la versi\u00f3n 3.6.21 de rasa y se recomienda a todos los usuarios que actualicen. Los usuarios que no puedan actualizar deben asegurarse de requerir autenticaci\u00f3n y de que solo los usuarios de confianza tengan acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49568.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49568.json index 216033f2113..1ce25d38c84 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49568.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49568.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:23.637", "lastModified": "2025-01-11T13:15:23.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg\n\nWhen receiving proposal msg in server, the fields v2_ext_offset/\neid_cnt/ism_gid_cnt in proposal msg are from the remote client\nand can not be fully trusted. Especially the field v2_ext_offset,\nonce exceed the max value, there has the chance to access wrong\naddress, and crash may happen.\n\nThis patch checks the fields v2_ext_offset/eid_cnt/ism_gid_cnt\nbefore using them." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/smc: comprobar v2_ext_offset/eid_cnt/ism_gid_cnt al recibir un mensaje de propuesta Al recibir un mensaje de propuesta en el servidor, los campos v2_ext_offset/eid_cnt/ism_gid_cnt en el mensaje de propuesta son del cliente remoto y no se puede confiar plenamente en ellos. Especialmente el campo v2_ext_offset, una vez que se excede el valor m\u00e1ximo, existe la posibilidad de acceder a una direcci\u00f3n incorrecta y puede producirse un bloqueo. Este parche comprueba los campos v2_ext_offset/eid_cnt/ism_gid_cnt antes de usarlos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49569.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49569.json index 0a262b9b295..a09b3f85f4b 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49569.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49569.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:23.840", "lastModified": "2025-01-11T13:15:23.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-rdma: unquiesce admin_q before destroy it\n\nKernel will hang on destroy admin_q while we create ctrl failed, such\nas following calltrace:\n\nPID: 23644 TASK: ff2d52b40f439fc0 CPU: 2 COMMAND: \"nvme\"\n #0 [ff61d23de260fb78] __schedule at ffffffff8323bc15\n #1 [ff61d23de260fc08] schedule at ffffffff8323c014\n #2 [ff61d23de260fc28] blk_mq_freeze_queue_wait at ffffffff82a3dba1\n #3 [ff61d23de260fc78] blk_freeze_queue at ffffffff82a4113a\n #4 [ff61d23de260fc90] blk_cleanup_queue at ffffffff82a33006\n #5 [ff61d23de260fcb0] nvme_rdma_destroy_admin_queue at ffffffffc12686ce\n #6 [ff61d23de260fcc8] nvme_rdma_setup_ctrl at ffffffffc1268ced\n #7 [ff61d23de260fd28] nvme_rdma_create_ctrl at ffffffffc126919b\n #8 [ff61d23de260fd68] nvmf_dev_write at ffffffffc024f362\n #9 [ff61d23de260fe38] vfs_write at ffffffff827d5f25\n RIP: 00007fda7891d574 RSP: 00007ffe2ef06958 RFLAGS: 00000202\n RAX: ffffffffffffffda RBX: 000055e8122a4d90 RCX: 00007fda7891d574\n RDX: 000000000000012b RSI: 000055e8122a4d90 RDI: 0000000000000004\n RBP: 00007ffe2ef079c0 R8: 000000000000012b R9: 000055e8122a4d90\n R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000004\n R13: 000055e8122923c0 R14: 000000000000012b R15: 00007fda78a54500\n ORIG_RAX: 0000000000000001 CS: 0033 SS: 002b\n\nThis due to we have quiesced admi_q before cancel requests, but forgot\nto unquiesce before destroy it, as a result we fail to drain the\npending requests, and hang on blk_mq_freeze_queue_wait() forever. Here\ntry to reuse nvme_rdma_teardown_admin_queue() to fix this issue and\nsimplify the code." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-rdma: anular la desactivaci\u00f3n de admin_q antes de destruirlo El kernel se bloquear\u00e1 al destruir admin_q mientras creamos un control fallido, como el siguiente calltrace: PID: 23644 TAREA: ff2d52b40f439fc0 CPU: 2 COMANDO: \"nvme\" #0 [ff61d23de260fb78] __schedule en ffffffff8323bc15 #1 [ff61d23de260fc08] schedule en ffffffff8323c014 #2 [ff61d23de260fc28] blk_mq_freeze_queue_wait en ffffffff82a3dba1 #3 [ff61d23de260fc78] blk_freeze_queue en ffffffff82a4113a #4 [ff61d23de260fc90] blk_cleanup_queue en ffffffff82a33006 #5 [ff61d23de260fcb0] nvme_rdma_destroy_admin_queue en ffffffffc12686ce #6 [ff61d23de260fcc8] nvme_rdma_setup_ctrl en ffffffffc1268ced #7 [ff61d23de260fd28] nvme_rdma_create_ctrl en ffffffffc126919b #8 [ff61d23de260fd68] nvmf_dev_write en ffffffffc024f362 #9 [ff61d23de260fe38] vfs_write en ffffffff827d5f25 RIP: 00007fda7891d574 RSP: 00007ffe2ef06958 RFLAGS: 00000202 RAX: ffffffffffffffda RBX: 000055e8122a4d90 RCX: 00007fda7891d574 RDX: 000000000000012b RSI: 000055e8122a4d90 RDI: 000000000000004 RBP: 00007ffe2ef079c0 R8: 000000000000012b R9: 000055e8122a4d90 R10: 00000000000000000 R11: 0000000000000202 R12: 0000000000000004 R13: 000055e8122923c0 R14: 000000000000012b R15: 00007fda78a54500 ORIG_RAX: 0000000000000001 CS: 0033 SS: 002b Esto se debe a que hemos silenciado admi_q antes de cancelar solicitudes, pero olvidamos reactivarlo antes de destruirlo, como resultado no podemos drenar las solicitudes pendientes y nos quedamos colgados en blk_mq_freeze_queue_wait() para siempre. Aqu\u00ed intente reutilizar nvme_rdma_teardown_admin_queue() para solucionar este problema y simplificar el c\u00f3digo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49571.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49571.json index 8ba5894152f..7025abdd636 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49571.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49571.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:24.027", "lastModified": "2025-01-11T13:15:24.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg\n\nWhen receiving proposal msg in server, the field iparea_offset\nand the field ipv6_prefixes_cnt in proposal msg are from the\nremote client and can not be fully trusted. Especially the\nfield iparea_offset, once exceed the max value, there has the\nchance to access wrong address, and crash may happen.\n\nThis patch checks iparea_offset and ipv6_prefixes_cnt before using them." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/smc: comprobar iparea_offset e ipv6_prefixes_cnt al recibir un mensaje de propuesta Al recibir un mensaje de propuesta en el servidor, el campo iparea_offset y el campo ipv6_prefixes_cnt en el mensaje de propuesta son del cliente remoto y no se puede confiar plenamente en ellos. Especialmente el campo iparea_offset, una vez que se excede el valor m\u00e1ximo, existe la posibilidad de acceder a una direcci\u00f3n incorrecta y puede producirse un bloqueo. Este parche comprueba iparea_offset e ipv6_prefixes_cnt antes de usarlos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49573.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49573.json index 1e70ad7e76c..18911f6ac92 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49573.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49573.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:24.223", "lastModified": "2025-01-11T13:15:24.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Fix NEXT_BUDDY\n\nAdam reports that enabling NEXT_BUDDY insta triggers a WARN in\npick_next_entity().\n\nMoving clear_buddies() up before the delayed dequeue bits ensures\nno ->next buddy becomes delayed. Further ensure no new ->next buddy\never starts as delayed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/fair: Fix NEXT_BUDDY Adam informa que habilitar NEXT_BUDDY instant\u00e1neamente activa una ADVERTENCIA en pick_next_entity(). Mover clear_buddies() hacia arriba antes de los bits de eliminaci\u00f3n de cola retrasados garantiza que ning\u00fan ->next buddy se retrase. Adem\u00e1s, aseg\u00farese de que ning\u00fan nuevo ->next buddy comience con retraso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json index 92a703b7234..9b8954c9a44 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49785.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-12T02:15:18.973", "lastModified": "2025-01-12T02:15:18.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM watsonx.ai 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM watsonx.ai 1.1 a 2.0.3 e IBM watsonx.ai en Cloud Pak for Data 4.8 a 5.0.3 son vulnerables a ataques de Cross Site Scripting. Esta vulnerabilidad permite que un usuario autenticado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, lo que altera la funcionalidad prevista y puede provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json index 014ccbafc82..1047408e024 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T09:15:09.840", "lastModified": "2024-11-21T09:44:00.070", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50051.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50051.json index 2c8cdf72181..1d69129ca9b 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50051.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50051.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:24.427", "lastModified": "2025-01-11T13:15:24.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: mpc52xx: Add cancel_work_sync before module remove\n\nIf we remove the module which will call mpc52xx_spi_remove\nit will free 'ms' through spi_unregister_controller.\nwhile the work ms->work will be used. The sequence of operations\nthat may lead to a UAF bug.\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in mpc52xx_spi_remove." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: mpc52xx: Agregar cancel_work_sync antes de eliminar el m\u00f3dulo Si eliminamos el m\u00f3dulo que llamar\u00e1 a mpc52xx_spi_remove, liberar\u00e1 'ms' a trav\u00e9s de spi_unregister_controller. mientras que se utilizar\u00e1 el trabajo ms->work. La secuencia de operaciones que puede provocar un error de UAF. Arr\u00e9glelo asegur\u00e1ndose de que el trabajo se cancele antes de continuar con la desinfecci\u00f3n en mpc52xx_spi_remove." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50338.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50338.json index 7b1f347efef..6895a5b0d57 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50338.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50338.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T19:15:31.967", "lastModified": "2025-01-14T19:15:31.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Git Credential Manager (GCM) is a secure Git credential helper built on .NET that runs on Windows, macOS, and Linux. The Git credential protocol is text-based over standard input/output, and consists of a series of lines of key-value pairs in the format `key=value`. Git's documentation restricts the use of the NUL (`\\0`) character and newlines to form part of the keys or values. When Git reads from standard input, it considers both LF and CRLF as newline characters for the credential protocol by virtue of calling `strbuf_getline` that calls to `strbuf_getdelim_strip_crlf`. Git also validates that a newline is not present in the value by checking for the presence of the line-feed character (LF, `\\n`), and errors if this is the case. This captures both LF and CRLF-type newlines. Git Credential Manager uses the .NET standard library `StreamReader` class to read the standard input stream line-by-line and parse the `key=value` credential protocol format. The implementation of the `ReadLineAsync` method considers LF, CRLF, and CR as valid line endings. This is means that .NET considers a single CR as a valid newline character, whereas Git does not. This mismatch of newline treatment between Git and GCM means that an attacker can craft a malicious remote URL. When a user clones or otherwise interacts with a malicious repository that requires authentication, the attacker can capture credentials for another Git remote. The attack is also heightened when cloning from repositories with submodules when using the `--recursive` clone option as the user is not able to inspect the submodule remote URLs beforehand. This issue has been patched in version 2.6.1 and all users are advised to upgrade. Users unable to upgrade should only interact with trusted remote repositories, and not clone with `--recursive` to allow inspection of any submodule URLs before cloning those submodules." + }, + { + "lang": "es", + "value": "Git Credential Manager (GCM) es un asistente seguro de credenciales de Git creado en .NET que se ejecuta en Windows, macOS y Linux. El protocolo de credenciales de Git se basa en texto sobre entrada/salida est\u00e1ndar y consta de una serie de l\u00edneas de pares clave-valor en el formato `clave=valor`. La documentaci\u00f3n de Git restringe el uso del car\u00e1cter NUL (`\\0`) y las nuevas l\u00edneas para formar parte de las claves o valores. Cuando Git lee desde la entrada est\u00e1ndar, considera tanto LF como CRLF como caracteres de nueva l\u00ednea para el protocolo de credenciales en virtud de la llamada a `strbuf_getline` que llama a `strbuf_getdelim_strip_crlf`. Git tambi\u00e9n valida que no haya una nueva l\u00ednea presente en el valor al verificar la presencia del car\u00e1cter de avance de l\u00ednea (LF, `\\n`) y genera errores si este es el caso. Esto captura las nuevas l\u00edneas de tipo LF y CRLF. Git Credential Manager utiliza la clase `StreamReader` Librer\u00eda est\u00e1ndar .NET para leer el flujo de entrada est\u00e1ndar l\u00ednea por l\u00ednea y analizar el formato del protocolo de credenciales `key=value`. La implementaci\u00f3n del m\u00e9todo `ReadLineAsync` considera LF, CRLF y CR como finales de l\u00ednea v\u00e1lidos. Esto significa que .NET considera un solo CR como un car\u00e1cter de nueva l\u00ednea v\u00e1lido, mientras que Git no lo hace. Esta falta de coincidencia en el tratamiento de las nuevas l\u00edneas entre Git y GCM significa que un atacante puede crear una URL remota maliciosa. Cuando un usuario clona o interact\u00faa de otro modo con un repositorio malicioso que requiere autenticaci\u00f3n, el atacante puede capturar las credenciales de otro repositorio remoto de Git. El ataque tambi\u00e9n se intensifica cuando se clona desde repositorios con subm\u00f3dulos cuando se usa la opci\u00f3n de clonaci\u00f3n `--recursive`, ya que el usuario no puede inspeccionar las URL remotas del subm\u00f3dulo de antemano. Este problema se ha corregido en la versi\u00f3n 2.6.1 y se recomienda a todos los usuarios que actualicen. Los usuarios que no puedan actualizar solo deben interactuar con repositorios remotos confiables y no clonar con `--recursive` para permitir la inspecci\u00f3n de cualquier URL de subm\u00f3dulo antes de clonar esos subm\u00f3dulos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50349.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50349.json index 444c89870d9..d43c2d552d6 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50349.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50349.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T19:15:32.157", "lastModified": "2025-01-14T19:15:32.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones." + }, + { + "lang": "es", + "value": "Git es un sistema de control de revisi\u00f3n distribuido, r\u00e1pido y escalable con un conjunto de comandos inusualmente rico que proporciona operaciones de alto nivel y acceso completo a los elementos internos. Cuando Git solicita credenciales a trav\u00e9s de un indicador de terminal (es decir, sin usar ning\u00fan asistente de credenciales), imprime el nombre de host para el que se espera que el usuario proporcione un nombre de usuario y/o una contrase\u00f1a. En esta etapa, todas las partes codificadas en URL ya han sido decodificadas y se imprimen textualmente. Esto permite a los atacantes crear URL que contienen secuencias de escape ANSI que la terminal interpreta para confundir a los usuarios, por ejemplo, para que proporcionen contrase\u00f1as para sitios de alojamiento de Git confiables cuando, de hecho, luego se env\u00edan a sitios que no son de confianza y que est\u00e1n bajo el control del atacante. Este problema se ha corregido mediante las confirmaciones `7725b81` y `c903985`, que est\u00e1n incluidas en las versiones de lanzamiento v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3 y v2.40.4. Se recomienda a los usuarios que actualicen la versi\u00f3n. Los usuarios que no puedan actualizar deben evitar la clonaci\u00f3n desde URL que no sean de confianza, especialmente clones recursivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json index 1192b0adc77..e0a5853f4ec 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-11-12T15:15:10.397", "lastModified": "2024-11-21T09:44:35.633", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json index 214a1834eeb..4ac6065da60 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:07.463", "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50563.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50563.json index c9f6f507178..de2c19d8b38 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50563.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-16T10:15:09.480", "lastModified": "2025-01-16T10:15:09.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json index 0950c905199..ed019d62195 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50564.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.490", "lastModified": "2025-01-14T14:15:33.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped." + }, + { + "lang": "es", + "value": "El uso de una clave criptogr\u00e1fica codificada en Fortinet FortiClientWindows versi\u00f3n 7.4.0, 7.2.x todas las versiones, 7.0.x todas las versiones y 6.4.x todas las versiones puede permitir que un usuario con pocos privilegios descifre la comunicaci\u00f3n entre procesos a trav\u00e9s de una canalizaci\u00f3n denominada monitoreo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50566.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50566.json index a8c8b5689ed..57ca43775b2 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50566.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50566.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.650", "lastModified": "2025-01-14T14:15:33.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager versions 7.6.0 through 7.6.1, versions 7.4.5 through 7.4.0, and versions 7.2.1 through 7.2.8, FortiManager Cloud versions 7.6.0 through 7.6.1, versions 7.4.0 through 7.4.4, and versions 7.2.2 through 7.2.7 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiManager versiones 7.6.0 a 7.6.1, versiones 7.4.5 a 7.4.0 y versiones 7.2.1 a 7.2.8, FortiManager Cloud versiones 7.6.0 a 7.6.1, versiones 7.4.0 a 7.4.4 y versiones 7.2.2 a 7.2.7 puede permitir que un atacante remoto autenticado ejecute c\u00f3digo no autorizado a trav\u00e9s de solicitudes FGFM manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json index 7e48349f357..9ec9c70a258 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50603.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-08T01:15:07.127", "lastModified": "2025-01-17T02:00:02.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50807.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50807.json index c8f6363328b..789782267fe 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50807.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50807.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T16:15:28.883", "lastModified": "2025-01-13T21:15:12.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50857.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50857.json index 8db33c85e02..fa7bf0a4e41 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50857.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50857.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:27.200", "lastModified": "2025-01-15T20:15:28.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50858.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50858.json index 28b1696aba3..af14571f3ad 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50858.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50858.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:27.330", "lastModified": "2025-01-15T17:15:16.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50859.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50859.json index 7d374d0045c..c5c4b065d09 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50859.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50859.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:27.453", "lastModified": "2025-01-15T20:15:28.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50861.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50861.json index 93a5c0c41b2..1b83eb5b0c1 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50861.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:27.577", "lastModified": "2025-01-15T17:15:16.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50953.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50953.json index e26efecd7cc..35d2689a1aa 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50953.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:16.413", "lastModified": "2025-01-16T16:15:31.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json index db47d6ba0fd..9b34a186c56 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50967.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T15:15:12.313", "lastModified": "2025-01-17T15:15:12.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51456.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51456.json index 5d1713ac3d9..8e948098665 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51456.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51456.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-12T14:15:06.550", "lastModified": "2025-01-12T14:15:06.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Robotic Process Automation 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19 could allow a remote attacker to obtain sensitive data that may be exposed through certain crypto-analytic attacks." + }, + { + "lang": "es", + "value": "IBM Robotic Process Automation 21.0.0 a 21.0.7.19 y 23.0.0 a 23.0.19 podr\u00edan permitir que un atacante remoto obtenga datos confidenciales que pueden quedar expuestos a trav\u00e9s de ciertos ataques criptoanal\u00edticos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51462.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51462.json index 4e76ace7c2a..cada4d89ad5 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51462.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51462.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-17T03:15:07.527", "lastModified": "2025-01-17T03:15:07.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM QRadar WinCollect Agent 10.0.0 through 10.1.12 could allow a remote attacker to inject XML data into parameter values due to improper input validation of assumed immutable data." + }, + { + "lang": "es", + "value": " IBM QRadar WinCollect Agent 10.0.0 a 10.1.12 podr\u00eda permitir que un atacante remoto inyecte datos XML en valores de par\u00e1metros debido a una validaci\u00f3n de entrada incorrecta de datos supuestamente inmutables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51491.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51491.json index 89d4930face..42d10b9a7a2 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51491.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T22:15:13.843", "lastModified": "2025-01-14T01:15:09.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab's security audit on the Certificate Revocation List (CRL) based revocation check feature.\nAfter retrieving the CRL, notation-go attempts to update the CRL cache using the os.Rename method. However, this operation may fail due to operating system-specific limitations, particularly when the source and destination paths are on different mount points. This failure could lead to an unexpected program termination. In method `crl.(*FileCache).Set`, a temporary file is created in the OS dedicated area (like /tmp for, usually, Linux/Unix). The file is written and then it is tried to move it to the dedicated `notation` cache directory thanks `os.Rename`. As specified in Go documentation, OS specific restriction may apply. When used with Linux OS, it is relying on rename syscall from the libc and as per the documentation, moving a file to a different mountpoint raises an EXDEV error, interpreted as Cross device link not permitted error. Some Linux distribution, like RedHat use a dedicated filesystem (tmpfs), mounted on a specific mountpoint (usually /tmp) for temporary files. When using such OS, revocation check based on CRL will repeatedly crash notation. As a result the signature verification process is aborted as process crashes. This issue has been addressed in version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "notion-go es una colecci\u00f3n de Librer\u00edas para respaldar la firma y verificaci\u00f3n de artefactos OCI. Basado en las especificaciones del Proyecto Notary. El problema se identific\u00f3 durante la auditor\u00eda de seguridad de Quarkslab sobre la funci\u00f3n de verificaci\u00f3n de revocaci\u00f3n basada en la Lista de revocaci\u00f3n de certificados (CRL). Despu\u00e9s de recuperar la CRL, notation-go intenta actualizar la cach\u00e9 de CRL utilizando el m\u00e9todo os.Rename. Sin embargo, esta operaci\u00f3n puede fallar debido a limitaciones espec\u00edficas de sistema operativo, en particular cuando las rutas de origen y destino est\u00e1n en diferentes puntos de montaje. Este fallo podr\u00eda provocar una finalizaci\u00f3n inesperada del programa. En el m\u00e9todo `crl.(*FileCache).Set`, se crea un archivo temporal en el \u00e1rea dedicada del SO (como /tmp para, por lo general, Linux/Unix). El archivo se escribe y luego se intenta moverlo al directorio de cach\u00e9 dedicado de `notation` gracias a `os.Rename`. Como se especifica en la documentaci\u00f3n de Go, pueden aplicarse restricciones espec\u00edficas del SO. Cuando se utiliza con el sistema operativo Linux, se basa en la llamada al sistema de cambio de nombre de la libc y, seg\u00fan la documentaci\u00f3n, mover un archivo a un punto de montaje diferente genera un error EXDEV, que se interpreta como un error de v\u00ednculo entre dispositivos no permitido. Algunas distribuciones de Linux, como RedHat, utilizan un sistema de archivos dedicado (tmpfs), montado en un punto de montaje espec\u00edfico (normalmente /tmp) para archivos temporales. Cuando se utiliza dicho sistema operativo, la comprobaci\u00f3n de revocaci\u00f3n basada en CRL bloquear\u00e1 repetidamente la notaci\u00f3n. Como resultado, el proceso de verificaci\u00f3n de firma se cancela a medida que el proceso se bloquea. Este problema se ha solucionado en la versi\u00f3n 1.3.0-rc.2 y se recomienda a todos los usuarios que actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json index d0191c4c444..b16aa278eb3 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-26T16:15:29.640", "lastModified": "2024-12-26T16:15:29.640", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51729.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51729.json index b64bb8b8625..8a629a6814e 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51729.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51729.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:24.650", "lastModified": "2025-01-11T13:15:24.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: use aligned address in copy_user_gigantic_page()\n\nIn current kernel, hugetlb_wp() calls copy_user_large_folio() with the\nfault address. Where the fault address may be not aligned with the huge\npage size. Then, copy_user_large_folio() may call\ncopy_user_gigantic_page() with the address, while\ncopy_user_gigantic_page() requires the address to be huge page size\naligned. So, this may cause memory corruption or information leak,\naddtional, use more obvious naming 'addr_hint' instead of 'addr' for\ncopy_user_gigantic_page()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: usar direcci\u00f3n alineada en copy_user_gigantic_page() En el kernel actual, hugetlb_wp() llama a copy_user_large_folio() con la direcci\u00f3n de error. Donde la direcci\u00f3n de error puede no estar alineada con el tama\u00f1o de p\u00e1gina enorme. Entonces, copy_user_large_folio() puede llamar a copy_user_gigantic_page() con la direcci\u00f3n, mientras que copy_user_gigantic_page() requiere que la direcci\u00f3n est\u00e9 alineada con el tama\u00f1o de p\u00e1gina enorme. Por lo tanto, esto puede causar corrupci\u00f3n de memoria o fuga de informaci\u00f3n. Adem\u00e1s, use un nombre m\u00e1s obvio 'addr_hint' en lugar de 'addr' para copy_user_gigantic_page()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json index 5ed80d62a28..6bcda706cdf 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@openvpn.net", "published": "2025-01-15T13:15:15.090", "lastModified": "2025-01-15T15:15:13.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52005.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52005.json index 0c699b533b1..f4678549484 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52005.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52005.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-15T18:15:24.130", "lastModified": "2025-01-15T18:15:24.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called \"sideband channel\". These messages will be prefixed with \"remote:\" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources." + }, + { + "lang": "es", + "value": "Git es una herramienta de gesti\u00f3n de c\u00f3digo fuente. Al clonar desde un servidor (o buscar o enviar), los mensajes de informaci\u00f3n o error se transportan desde el proceso Git remoto al cliente a trav\u00e9s del llamado \"sideband channel\". Estos mensajes tendr\u00e1n el prefijo \"remote:\" y se imprimir\u00e1n directamente en la salida de error est\u00e1ndar. Normalmente, esta salida de error est\u00e1ndar est\u00e1 conectada a una terminal que entiende las secuencias de escape ANSI, contra las que Git no protegi\u00f3. La mayor\u00eda de las terminales modernas admiten secuencias de control que pueden ser utilizadas por un actor malintencionado para ocultar y tergiversar informaci\u00f3n, o para enga\u00f1ar al usuario para que ejecute scripts no confiables. Como se solicit\u00f3 en la lista de correo git-security, los parches se est\u00e1n discutiendo en la lista de correo p\u00fablica. Se recomienda a los usuarios que actualicen lo antes posible. Los usuarios que no puedan actualizar deben evitar los clones recursivos a menos que sean de fuentes confiables." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52006.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52006.json index ec11b89ef39..8d9d906b39d 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52006.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52006.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T19:15:32.330", "lastModified": "2025-01-14T19:15:32.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones." + }, + { + "lang": "es", + "value": "Git es un sistema de control de revisi\u00f3n distribuido, escalable y r\u00e1pido con un conjunto de comandos inusualmente rico que proporciona operaciones de alto nivel y acceso completo a los elementos internos. Git define un protocolo basado en l\u00edneas que se utiliza para intercambiar informaci\u00f3n entre Git y los ayudantes de credenciales de Git. Algunos ecosistemas (en particular, .NET y node.js) interpretan los caracteres de retorno de carro individuales como nuevas l\u00edneas, lo que hace que las protecciones contra CVE-2020-5260 sean incompletas para los ayudantes de credenciales que tratan los retornos de carro de esta manera. Este problema se ha abordado en el Commit `b01b9b8`, que se incluye en las versiones de lanzamiento v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3 y v2.40.4. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben evitar la clonaci\u00f3n desde URL que no sean confiables, especialmente clones recursivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52319.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52319.json index 453fbf11dc0..1e869dc38fd 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52319.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52319.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:24.843", "lastModified": "2025-01-11T13:15:24.843", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: use aligned address in clear_gigantic_page()\n\nIn current kernel, hugetlb_no_page() calls folio_zero_user() with the\nfault address. Where the fault address may be not aligned with the huge\npage size. Then, folio_zero_user() may call clear_gigantic_page() with\nthe address, while clear_gigantic_page() requires the address to be huge\npage size aligned. So, this may cause memory corruption or information\nleak, addtional, use more obvious naming 'addr_hint' instead of 'addr' for\nclear_gigantic_page()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: usar direcci\u00f3n alineada en clear_gigantic_page() En el kernel actual, hugetlb_no_page() llama a folio_zero_user() con la direcci\u00f3n de error. Donde la direcci\u00f3n de error puede no estar alineada con el tama\u00f1o de p\u00e1gina enorme. Entonces, folio_zero_user() puede llamar a clear_gigantic_page() con la direcci\u00f3n, mientras que clear_gigantic_page() requiere que la direcci\u00f3n est\u00e9 alineada con el tama\u00f1o de p\u00e1gina enorme. Por lo tanto, esto puede causar corrupci\u00f3n de memoria o fuga de informaci\u00f3n. Adem\u00e1s, use un nombre m\u00e1s obvio 'addr_hint' en lugar de 'addr' para clear_gigantic_page()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52332.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52332.json index 1ff1f891945..119b9a7b2b4 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52332.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52332.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:25.070", "lastModified": "2025-01-11T13:15:25.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix potential invalid memory access in igb_init_module()\n\nThe pci_register_driver() can fail and when this happened, the dca_notifier\nneeds to be unregistered, otherwise the dca_notifier can be called when\nigb fails to install, resulting to invalid memory access." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igb: Se corrige un posible acceso no v\u00e1lido a la memoria en igb_init_module(). pci_register_driver() puede fallar y cuando esto sucede, se debe anular el registro de dca_notifier; de lo contrario, se puede llamar a dca_notifier cuando igb no se instala, lo que genera un acceso no v\u00e1lido a la memoria." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52333.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52333.json index 714254cd8a5..f6c7ae6a2e4 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52333.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52333.json @@ -3,12 +3,16 @@ "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-01-13T15:15:09.130", "lastModified": "2025-01-13T16:15:17.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper array index validation vulnerability exists in the determineMinMax functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de validaci\u00f3n incorrecta del \u00edndice de matriz en la funci\u00f3n determineMinMax de OFFIS DCMTK 3.6.8. Un archivo DICOM manipulado especialmente puede provocar una escritura fuera de los l\u00edmites. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json index 3b54c5f5300..25ef84d5e14 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-17T02:15:25.060", "lastModified": "2025-01-17T02:15:25.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system." + }, + { + "lang": "es", + "value": " IBM InfoSphere Information Server 11.7 podr\u00eda permitir que un atacante remoto recorra los directorios del sistema. Un atacante podr\u00eda enviar una solicitud URL especialmente manipulada que contenga secuencias de \"dot dot\" (/../) para ver archivos arbitrarios en el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json index a389e5497d4..2b26c8d58cc 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-25T16:15:21.997", "lastModified": "2024-12-25T16:15:21.997", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json index 0b1e25e0414..5bd76049e03 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52594.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T19:15:28.480", "lastModified": "2025-01-16T19:15:28.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Gomatrixserverlib is a Go library for matrix federation. Gomatrixserverlib is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. The commit `c4f1e01` fixes this issue. Users are advised to upgrade. Users unable to upgrade should use a local firewall to limit the network segments and hosts the service using gomatrixserverlib can access." + }, + { + "lang": "es", + "value": "Gomatrixserverlib es una librer\u00eda Go para la federaci\u00f3n de matrices. Gomatrixserverlib es vulnerable a server-side request forgery, ya que ofrece contenido desde una red privada a la que puede acceder, bajo ciertas condiciones. La confirmaci\u00f3n `c4f1e01` soluciona este problema. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben usar un firewall local para limitar los segmentos de red y los hosts a los que puede acceder el servicio que usa gomatrixserverlib." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json index f5db0cee711..d6c252dffb8 100644 --- a/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52602.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:32.503", "lastModified": "2025-01-16T20:15:32.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. Matrix Media Repo (MMR) is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. This is fixed in MMR v1.3.8. Users are advised to upgrade. Restricting which hosts MMR is allowed to contact via (local) firewall rules or a transparent proxy and may provide a workaround for users unable to upgrade." + }, + { + "lang": "es", + "value": "Matrix Media Repo (MMR) es un repositorio multimedia para m\u00faltiples servidores dom\u00e9sticos altamente configurable para Matrix. Matrix Media Repo (MMR) es vulnerable a server-side request forgery, ya que ofrece contenido desde una red privada a la que puede acceder, bajo ciertas condiciones. Esto se solucion\u00f3 en MMR v1.3.8. Se recomienda a los usuarios que actualicen. Restringir los hosts a los que MMR puede contactar mediante reglas de firewall (locales) o un proxy transparente puede proporcionar un workaround para los usuarios que no pueden actualizar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52783.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52783.json index 57e2e18f3e8..1fccaa5fb61 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52783.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52783.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:16.607", "lastModified": "2025-01-15T17:15:16.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in the XNetSocketClient component of XINJE XDPPro.exe v3.2.2 to v3.7.17c allows attackers to execute arbitrary code via modification of the configuration file." + }, + { + "lang": "es", + "value": "Los permisos inseguros en el componente XNetSocketClient de XINJE XDPPro.exe v3.2.2 a v3.7.17c permiten a los atacantes ejecutar c\u00f3digo arbitrario mediante la modificaci\u00f3n del archivo de configuraci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json index 2166f872867..9a4f7ac0239 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52791.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:32.667", "lastModified": "2025-01-16T20:15:32.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users." + }, + { + "lang": "es", + "value": "Matrix Media Repo (MMR) es un repositorio multimedia de m\u00faltiples servidores dom\u00e9sticos altamente configurable para Matrix. MMR realiza solicitudes a otros servidores como parte de la operaci\u00f3n normal, y estos propietarios de recursos pueden devolver grandes cantidades de JSON a MMR para su an\u00e1lisis. Durante el an\u00e1lisis, MMR puede consumir grandes cantidades de memoria y agotar la memoria disponible. Esto se solucion\u00f3 en MMR v1.3.8. Se recomienda a los usuarios que actualicen. Para los usuarios que no puedan actualizar, se pueden configurar servidores proxy de reenv\u00edo para bloquear solicitudes a hosts no seguros. Alternativamente, los procesos MMR se pueden configurar con l\u00edmites de memoria y reinicio autom\u00e1tico. Ejecutar varios procesos MMR simult\u00e1neamente puede ayudar a garantizar que un reinicio no afecte demasiado a los usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json index b35a5ec6f60..4dfad7f7fae 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52898.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-14T17:15:17.513", "lastModified": "2025-01-14T17:15:17.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD web console could allow a local user to obtain sensitive information when a detailed technical error message is returned." + }, + { + "lang": "es", + "value": "La consola web de IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS y 9.4 CD podr\u00eda permitir que un usuario local obtenga informaci\u00f3n confidencial cuando se devuelve un mensaje de error t\u00e9cnico detallado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json index 4c6f991ccc8..48bc7667162 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:08.743", "lastModified": "2025-01-13T19:15:10.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52936.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52936.json index 9e9cae852cf..50554c47efc 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52936.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52936.json @@ -3,12 +3,16 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:08.883", "lastModified": "2025-01-13T11:15:08.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to write data outside the Guest's virtualised GPU memory." + }, + { + "lang": "es", + "value": "El software del kernel instalado y ejecut\u00e1ndose dentro de una m\u00e1quina virtual invitada puede enviar comandos incorrectos al firmware de la GPU para escribir datos fuera de la memoria de la GPU virtualizada de la m\u00e1quina virtual invitada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52937.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52937.json index b69b3a44971..fb4e5100931 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52937.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52937.json @@ -3,7 +3,7 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T11:15:09.017", "lastModified": "2025-01-13T16:15:18.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52938.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52938.json index 50bf211f17a..23f7177dabd 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52938.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52938.json @@ -3,7 +3,7 @@ "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-13T12:15:06.873", "lastModified": "2025-01-13T15:15:09.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52963.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52963.json index 81b96baf7f4..262c4020af9 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52963.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52963.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.807", "lastModified": "2025-01-14T14:15:33.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A out-of-bounds write in Fortinet FortiOS versions 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15 allows attacker to trigger a denial of service via specially crafted packets." + }, + { + "lang": "es", + "value": "Una escritura fuera de los l\u00edmites en las versiones Fortinet FortiOS 7.6.0, 7.4.0 a 7.4.6, 7.2.0 a 7.2.10, 7.0.0 a 7.0.16, 6.4.0 a 6.4.15 permite a un atacante activar una denegaci\u00f3n de servicio a trav\u00e9s de paquetes especialmente manipulados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52967.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52967.json index 695d1954291..2ff656b4b5d 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52967.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52967.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:33.967", "lastModified": "2025-01-14T14:15:33.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of script-related html tags in a web page (basic xss) in Fortinet FortiPortal 6.0.0 through 6.0.14 allows attacker to execute unauthorized code or commands via html injection." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de las etiquetas HTML relacionadas con Script en una p\u00e1gina web (XSS b\u00e1sico) en Fortinet FortiPortal 6.0.0 a 6.0.14 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de la inyecci\u00f3n HTML." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52969.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52969.json index fc854a79ef0..843a27c1ff5 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52969.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52969.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:34.123", "lastModified": "2025-01-14T14:15:34.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') [CWE-89] en FortiSIEM versi\u00f3n 7.1.7 y anteriores, versi\u00f3n 7.1.0, versi\u00f3n 7.0.3 y anteriores, versi\u00f3n 6.7.9 y anteriores, 6.7.8, versi\u00f3n 6.6.5 y anteriores, versi\u00f3n 6.5.3 y anteriores, versi\u00f3n 6.4.4 y anteriores La funci\u00f3n Actualizar/Crear caso puede permitir que un atacante autenticado extraiga informaci\u00f3n de la base de datos a trav\u00e9s de solicitudes manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53263.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53263.json index c5a71df57d7..1daae0139e0 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53263.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53263.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:28.610", "lastModified": "2025-01-14T20:15:28.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time." + }, + { + "lang": "es", + "value": "Git LFS es una extensi\u00f3n de Git para controlar las versiones de archivos grandes. Cuando Git LFS solicita credenciales de Git para un host remoto, pasa partes de la URL del host al comando `git-credential(1)` sin verificar si hay caracteres de control de fin de l\u00ednea incrustados y luego env\u00eda las credenciales que recibe del asistente de credenciales de Git al host remoto. Al insertar caracteres de control codificados en la URL, como caracteres de avance de l\u00ednea (LF) o retorno de carro (CR), un atacante puede recuperar las credenciales de Git de un usuario. Este problema existe en todas las versiones anteriores y se solucion\u00f3 en la v3.6.1. Todos los usuarios deben actualizar a la v3.6.1. No se conocen Workarounds en este momento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53277.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53277.json index 1ff00d8d174..c49d1f37fc7 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53277.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53277.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T23:15:08.530", "lastModified": "2025-01-14T23:15:08.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Silverstripe Framework is a PHP framework which powers the Silverstripe CMS. In some cases, form messages can contain HTML markup. This is an intentional feature, allowing links and other relevant HTML markup for the given message. Some form messages include content that the user can provide. There are scenarios in the CMS where that content doesn't get correctly sanitised prior to being included in the form message, resulting in an XSS vulnerability. This issue has been addressed in silverstripe/framework version 5.3.8 and users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": " Silverstripe Framework es un framework PHP que impulsa el CMS Silverstripe. En algunos casos, los mensajes de formulario pueden contener marcado HTML. Se trata de una caracter\u00edstica intencional que permite enlaces y otro marcado HTML relevante para el mensaje en cuesti\u00f3n. Algunos mensajes de formulario incluyen contenido que el usuario puede proporcionar. Existen situaciones en el CMS en las que ese contenido no se desinfecta correctamente antes de incluirse en el mensaje de formulario, lo que da lugar a una vulnerabilidad XSS. Este problema se ha solucionado en la versi\u00f3n 5.3.8 de silverstripe/framework y se recomienda a los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53553.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53553.json index 0687babc39a..9e673b8d5fe 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53553.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53553.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:07.700", "lastModified": "2025-01-16T23:15:07.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 allows attackers to bypass authentication via crafted web requests." + }, + { + "lang": "es", + "value": " Un problema en OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 permite a los atacantes omitir la autenticaci\u00f3n a trav\u00e9s de solicitudes web manipuladas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53561.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53561.json index b341af47ad9..7aa30c8b8c1 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53561.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53561.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T17:15:17.667", "lastModified": "2025-01-14T17:15:17.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote code execution (RCE) vulnerability in Arcadyan Meteor 2 CPE FG360 Firmware ETV2.10 allows attackers to execute arbitrary code via a crafted request." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en Arcadyan Meteor 2 CPE FG360 Firmware ETV2.10 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53649.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53649.json index 81a74a8c15d..9f7b2a31330 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53649.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53649.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-01-14T11:15:16.820", "lastModified": "2025-01-14T11:15:16.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53680.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53680.json index b20968cf5f0..4ed3d9f583d 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53680.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53680.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:25.710", "lastModified": "2025-01-11T13:15:25.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()\n\nUnder certain kernel configurations when building with Clang/LLVM, the\ncompiler does not generate a return or jump as the terminator\ninstruction for ip_vs_protocol_init(), triggering the following objtool\nwarning during build time:\n\n vmlinux.o: warning: objtool: ip_vs_protocol_init() falls through to next function __initstub__kmod_ip_vs_rr__935_123_ip_vs_rr_init6()\n\nAt runtime, this either causes an oops when trying to load the ipvs\nmodule or a boot-time panic if ipvs is built-in. This same issue has\nbeen reported by the Intel kernel test robot previously.\n\nDigging deeper into both LLVM and the kernel code reveals this to be a\nundefined behavior problem. ip_vs_protocol_init() uses a on-stack buffer\nof 64 chars to store the registered protocol names and leaves it\nuninitialized after definition. The function calls strnlen() when\nconcatenating protocol names into the buffer. With CONFIG_FORTIFY_SOURCE\nstrnlen() performs an extra step to check whether the last byte of the\ninput char buffer is a null character (commit 3009f891bb9f (\"fortify:\nAllow strlen() and strnlen() to pass compile-time known lengths\")).\nThis, together with possibly other configurations, cause the following\nIR to be generated:\n\n define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #5 section \".init.text\" align 16 !kcfi_type !29 {\n %1 = alloca [64 x i8], align 16\n ...\n\n 14: ; preds = %11\n %15 = getelementptr inbounds i8, ptr %1, i64 63\n %16 = load i8, ptr %15, align 1\n %17 = tail call i1 @llvm.is.constant.i8(i8 %16)\n %18 = icmp eq i8 %16, 0\n %19 = select i1 %17, i1 %18, i1 false\n br i1 %19, label %20, label %23\n\n 20: ; preds = %14\n %21 = call i64 @strlen(ptr noundef nonnull dereferenceable(1) %1) #23\n ...\n\n 23: ; preds = %14, %11, %20\n %24 = call i64 @strnlen(ptr noundef nonnull dereferenceable(1) %1, i64 noundef 64) #24\n ...\n }\n\nThe above code calculates the address of the last char in the buffer\n(value %15) and then loads from it (value %16). Because the buffer is\nnever initialized, the LLVM GVN pass marks value %16 as undefined:\n\n %13 = getelementptr inbounds i8, ptr %1, i64 63\n br i1 undef, label %14, label %17\n\nThis gives later passes (SCCP, in particular) more DCE opportunities by\npropagating the undef value further, and eventually removes everything\nafter the load on the uninitialized stack location:\n\n define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #0 section \".init.text\" align 16 !kcfi_type !11 {\n %1 = alloca [64 x i8], align 16\n ...\n\n 12: ; preds = %11\n %13 = getelementptr inbounds i8, ptr %1, i64 63\n unreachable\n }\n\nIn this way, the generated native code will just fall through to the\nnext function, as LLVM does not generate any code for the unreachable IR\ninstruction and leaves the function without a terminator.\n\nZero the on-stack buffer to avoid this possible UB." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipvs: correcci\u00f3n de UB debido a acceso a pila no inicializado en ip_vs_protocol_init() En determinadas configuraciones del kernel al compilar con Clang/LLVM, el compilador no genera un retorno o salto como instrucci\u00f3n de terminaci\u00f3n para ip_vs_protocol_init(), lo que activa la siguiente advertencia de objtool durante el tiempo de compilaci\u00f3n: vmlinux.o: advertencia: objtool: ip_vs_protocol_init() pasa a la siguiente funci\u00f3n __initstub__kmod_ip_vs_rr__935_123_ip_vs_rr_init6() En tiempo de ejecuci\u00f3n, esto provoca un error al intentar cargar el m\u00f3dulo ipvs o un p\u00e1nico en el tiempo de arranque si ipvs est\u00e1 integrado. El robot de prueba del kernel de Intel ha informado anteriormente de este mismo problema. Al investigar m\u00e1s a fondo tanto en LLVM como en el c\u00f3digo del kernel, se revela que se trata de un problema de comportamiento indefinido. ip_vs_protocol_init() utiliza un b\u00fafer en pila de 64 caracteres para almacenar los nombres de protocolo registrados y lo deja sin inicializar despu\u00e9s de la definici\u00f3n. La funci\u00f3n llama a strnlen() al concatenar nombres de protocolo en el b\u00fafer. Con CONFIG_FORTIFY_SOURCE, strnlen() realiza un paso adicional para verificar si el \u00faltimo byte del b\u00fafer de caracteres de entrada es un car\u00e1cter nulo (commit 3009f891bb9f (\"fortify: Permitir que strlen() y strnlen() pasen longitudes conocidas en tiempo de compilaci\u00f3n\")). Esto, junto con posiblemente otras configuraciones, hace que se genere la siguiente IR: define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #5 section \".init.text\" align 16 !kcfi_type !29 { %1 = alloca [64 x i8], align 16 ... 14: ; preds = %11 %15 = getelementptr inbounds i8, ptr %1, i64 63 %16 = cargar i8, ptr %15, alinear 1 %17 = cola llamar i1 @llvm.is.constant.i8(i8 %16) %18 = icmp eq i8 %16, 0 %19 = seleccionar i1 %17, i1 %18, i1 falso br i1 %19, etiqueta %20, etiqueta %23 20: ; preds = %14 %21 = llamar i64 @strlen(ptr noundef nonnull dereferenceable(1) %1) #23 ... 23: ; preds = %14, %11, %20 %24 = call i64 @strnlen(ptr noundef nonnull dereferenceable(1) %1, i64 noundef 64) #24 ... } El c\u00f3digo anterior calcula la direcci\u00f3n del \u00faltimo car\u00e1cter en el b\u00fafer (valor %15) y luego carga desde \u00e9l (valor %16). Como el buffer nunca se inicializa, el paso GVN de LLVM marca el valor %16 como indefinido: %13 = getelementptr inbounds i8, ptr %1, i64 63 br i1 undef, label %14, label %17 Esto otorga a los pases posteriores (SCCP, en particular) m\u00e1s oportunidades de DCE al propagar m\u00e1s el valor indefinido y, eventualmente, elimina todo despu\u00e9s de la carga en la ubicaci\u00f3n de la pila no inicializada: define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #0 section \".init.text\" align 16 !kcfi_type !11 { %1 = alloca [64 x i8], align 16 ... 12: ; preds = %11 %13 = getelementptr inbounds i8, ptr %1, i64 63 unreachable } De esta manera, el c\u00f3digo nativo generado simplemente pasar\u00e1 a la siguiente funci\u00f3n, ya que LLVM no genera ning\u00fan c\u00f3digo para la instrucci\u00f3n IR inalcanzable y deja la funci\u00f3n sin un terminador. Ponga a cero el b\u00fafer en la pila para evitar este posible UB." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53681.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53681.json index 5be8aba2a0a..37d484bea71 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53681.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53681.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:10.963", "lastModified": "2025-01-15T13:15:10.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53682.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53682.json index 094a9e585b3..16cf8ce81dc 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53682.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53682.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:25.860", "lastModified": "2025-01-11T13:15:25.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: axp20x: AXP717: set ramp_delay\n\nAXP717 datasheet says that regulator ramp delay is 15.625 us/step,\nwhich is 10mV in our case.\n\nAdd a AXP_DESC_RANGES_DELAY macro and update AXP_DESC_RANGES macro to\nexpand to AXP_DESC_RANGES_DELAY with ramp_delay = 0\n\nFor DCDC4, steps is 100mv\n\nAdd a AXP_DESC_DELAY macro and update AXP_DESC macro to\nexpand to AXP_DESC_DELAY with ramp_delay = 0\n\nThis patch fix crashes when using CPU DVFS." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulador: axp20x: AXP717: establecer ramp_delay La hoja de datos de AXP717 dice que el retraso de rampa del regulador es 15,625 us/paso, que es 10 mV en nuestro caso. Agregue una macro AXP_DESC_RANGES_DELAY y actualice la macro AXP_DESC_RANGES para expandir a AXP_DESC_RANGES_DELAY con ramp_delay = 0 Para DCDC4, los pasos son 100 mv Agregue una macro AXP_DESC_DELAY y actualice la macro AXP_DESC para expandir a AXP_DESC_DELAY con ramp_delay = 0 Este parche corrige fallas al usar CPU DVFS." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json index 7560f9036dd..99bed0f3464 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53687.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:26.120", "lastModified": "2025-01-11T13:15:26.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: Fix IPIs usage in kfence_protect_page()\n\nflush_tlb_kernel_range() may use IPIs to flush the TLBs of all the\ncores, which triggers the following warning when the irqs are disabled:\n\n[ 3.455330] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520\n[ 3.456647] Modules linked in:\n[ 3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7-00010-g91d3de7240b8 #1\n[ 3.457416] Hardware name: QEMU QEMU Virtual Machine, BIOS\n[ 3.457633] epc : smp_call_function_many_cond+0x452/0x520\n[ 3.457736] ra : on_each_cpu_cond_mask+0x1e/0x30\n[ 3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50\n[ 3.457824] gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f\n[ 3.457859] t1 : ffffffff815221e0 t2 : 000000000000000f s0 : ff2000000000bc10\n[ 3.457920] s1 : 0000000000000040 a0 : ffffffff815221e0 a1 : 0000000000000001\n[ 3.457953] a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000\n[ 3.458006] a5 : 0000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000\n[ 3.458042] s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0\n[ 3.458076] s5 : ff600001ff950d00 s6 : 0000000200000120 s7 : 0000000000000001\n[ 3.458109] s8 : 0000000000000001 s9 : ff60000080841ef0 s10: 0000000000000001\n[ 3.458141] s11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0\n[ 3.458172] t5 : 0000000000000000 t6 : ff200000000236d0\n[ 3.458203] status: 0000000200000100 badaddr: ffffffff800b669a cause: 0000000000000003\n[ 3.458373] [] smp_call_function_many_cond+0x452/0x520\n[ 3.458593] [] on_each_cpu_cond_mask+0x1e/0x30\n[ 3.458625] [] __flush_tlb_range+0x118/0x1ca\n[ 3.458656] [] flush_tlb_kernel_range+0x1e/0x26\n[ 3.458683] [] kfence_protect+0xc0/0xce\n[ 3.458717] [] kfence_guarded_free+0xc6/0x1c0\n[ 3.458742] [] __kfence_free+0x62/0xc6\n[ 3.458764] [] kfree+0x106/0x32c\n[ 3.458786] [] detach_buf_split+0x188/0x1a8\n[ 3.458816] [] virtqueue_get_buf_ctx+0xb6/0x1f6\n[ 3.458839] [] virtqueue_get_buf+0xe/0x16\n[ 3.458880] [] virtblk_done+0x5c/0xe2\n[ 3.458908] [] vring_interrupt+0x6a/0x74\n[ 3.458930] [] __handle_irq_event_percpu+0x7c/0xe2\n[ 3.458956] [] handle_irq_event+0x3c/0x86\n[ 3.458978] [] handle_simple_irq+0x9e/0xbe\n[ 3.459004] [] generic_handle_domain_irq+0x1c/0x2a\n[ 3.459027] [] imsic_handle_irq+0xba/0x120\n[ 3.459056] [] generic_handle_domain_irq+0x1c/0x2a\n[ 3.459080] [] riscv_intc_aia_irq+0x24/0x34\n[ 3.459103] [] handle_riscv_irq+0x2e/0x4c\n[ 3.459133] [] call_on_irq_stack+0x32/0x40\n\nSo only flush the local TLB and let the lazy kfence page fault handling\ndeal with the faults which could happen when a core has an old protected\npte version cached in its TLB. That leads to potential inaccuracies which\ncan be tolerated when using kfence." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: Se corrige el uso de IPI en kfence_protect_page(). flush_tlb_kernel_range() puede usar IPI para vaciar las TLB de todos los n\u00facleos, lo que activa la siguiente advertencia cuando las irq est\u00e1n deshabilitadas: [ 3.455330] ADVERTENCIA: CPU: 1 PID: 0 en kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520 [ 3.456647] M\u00f3dulos vinculados en: [ 3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 No contaminado 6.12.0-rc7-00010-g91d3de7240b8 #1 [ 3.457416] Nombre del hardware: QEMU QEMU Virtual Machine, BIOS [ 3.457633] epc : funci\u00f3n_llamada_smp_muchas_cond+0x452/0x520 [ 3.457736] ra : en_cada_m\u00e1scara_cond_de_cpu+0x1e/0x30 [ 3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50 [ 3.457824] gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f [ 3.457859] t1 : ffffffff815221e0 t2 : 000000000000000f s0: ff2000000000bc10 [3.457920] s1: 0000000000000040 a0: ffffffff815221e0 a1: 0000000000000001 [3.457953] a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000 [ 3.458006] a5 : 00000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000 [ 3.458042] s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0 [ 3.458076] s5 : ff600001ff950d00 s6 : 0000000200000120 s7: 00000000000000001 [3.458109] s8: 0000000000000001 s9: ff60000080841ef0 s10: 0000000000000001 [ 3.458141] t11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0 [ 3.458172] t5 : 0000000000000000 t6 : ff200000000236d0 [ 3.458203] estado: 0000000200000100 direcci\u00f3n incorrecta: ffffffff800b669a causa: 0000000000000003 [ 3.458373] [] funci\u00f3n_llamada_smp_muchas_cond+0x452/0x520 [ 3.458593] [] en cada m\u00e1scara de condici\u00f3n de CPU+0x1e/0x30 [ 3.458625] [] __flush_tlb_range+0x118/0x1ca [ 3.458656] [] flush_tlb_kernel_range+0x1e/0x26 [ 3.458683] [] kfence_protect+0xc0/0xce [ 3.458717] [] kfence_guarded_free+0xc6/0x1c0 [ 3.458742] [] __kfence_free+0x62/0xc6 [ 3.458764] [] kfree+0x106/0x32c [ 3.458786] [] detach_buf_split+0x188/0x1a8 [ 3.458816] [] virtqueue_get_buf_ctx+0xb6/0x1f6 [ 3.458839] [] virtqueue_get_buf+0xe/0x16 [ 3.458880] [] virtblk_done+0x5c/0xe2 [ 3.458908] [] interrupci\u00f3n_de_vring+0x6a/0x74 [ 3.458930] [] __controlador_de_evento_irq_percpu+0x7c/0xe2 [ 3.458956] [] control_de_evento_irq+0x3c/0x86 [ 3.458978] [] control_de_irq_simple+0x9e/0xbe [ 3.459004] [] control_de_dominio_gen\u00e9rico_irq+0x1c/0x2a [ 3.459027] [] imsic_handle_irq+0xba/0x120 [ 3.459056] [] generic_handle_domain_irq+0x1c/0x2a [ 3.459080] [] riscv_intc_aia_irq+0x24/0x34 [ 3.459103] [] handle_riscv_irq+0x2e/0x4c [ 3.459133] [] call_on_irq_stack+0x32/0x40 Por lo tanto, solo limpie la TLB local y deje que el manejo de errores de p\u00e1gina de kfence se ocupe de los errores que podr\u00edan Esto ocurre cuando un n\u00facleo tiene una versi\u00f3n antigua de PTE protegida almacenada en cach\u00e9 en su TLB. Esto genera posibles imprecisiones que pueden tolerarse al usar kfence." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53690.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53690.json index 4dbe349c2bd..bf0c3b7416d 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53690.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53690.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:26.470", "lastModified": "2025-01-11T13:15:26.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: prevent use of deleted inode\n\nsyzbot reported a WARNING in nilfs_rmdir. [1]\n\nBecause the inode bitmap is corrupted, an inode with an inode number that\nshould exist as a \".nilfs\" file was reassigned by nilfs_mkdir for \"file0\",\ncausing an inode duplication during execution. And this causes an\nunderflow of i_nlink in rmdir operations.\n\nThe inode is used twice by the same task to unmount and remove directories\n\".nilfs\" and \"file0\", it trigger warning in nilfs_rmdir.\n\nAvoid to this issue, check i_nlink in nilfs_iget(), if it is 0, it means\nthat this inode has been deleted, and iput is executed to reclaim it.\n\n[1]\nWARNING: CPU: 1 PID: 5824 at fs/inode.c:407 drop_nlink+0xc4/0x110 fs/inode.c:407\n...\nCall Trace:\n \n nilfs_rmdir+0x1b0/0x250 fs/nilfs2/namei.c:342\n vfs_rmdir+0x3a3/0x510 fs/namei.c:4394\n do_rmdir+0x3b5/0x580 fs/namei.c:4453\n __do_sys_rmdir fs/namei.c:4472 [inline]\n __se_sys_rmdir fs/namei.c:4470 [inline]\n __x64_sys_rmdir+0x47/0x50 fs/namei.c:4470\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: evitar el uso de inodo eliminado syzbot inform\u00f3 una ADVERTENCIA en nilfs_rmdir. [1] Debido a que el mapa de bits del inodo est\u00e1 da\u00f1ado, un inodo con un n\u00famero de inodo que deber\u00eda existir como un archivo \".nilfs\" fue reasignado por nilfs_mkdir para \"file0\", lo que provoc\u00f3 una duplicaci\u00f3n de inodo durante la ejecuci\u00f3n. Y esto causa un desbordamiento de i_nlink en operaciones rmdir. El inodo es utilizado dos veces por la misma tarea para desmontar y eliminar los directorios \".nilfs\" y \"file0\", lo que activa una advertencia en nilfs_rmdir. Evite este problema, verifique i_nlink en nilfs_iget(), si es 0, significa que este inodo ha sido eliminado y se ejecuta iput para recuperarlo. [1] ADVERTENCIA: CPU: 1 PID: 5824 en fs/inode.c:407 drop_nlink+0xc4/0x110 fs/inode.c:407 ... Seguimiento de llamadas: nilfs_rmdir+0x1b0/0x250 fs/nilfs2/namei.c:342 vfs_rmdir+0x3a3/0x510 fs/namei.c:4394 do_rmdir+0x3b5/0x580 fs/namei.c:4453 __do_sys_rmdir fs/namei.c:4472 [en l\u00ednea] __se_sys_rmdir fs/namei.c:4470 [en l\u00ednea] __x64_sys_rmdir+0x47/0x50 fs/namei.c:4470 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json index 1827e039f5f..e3fed922fb3 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:23.233", "lastModified": "2024-12-06T14:15:23.233", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json index a21aca18cb7..2c5e844799f 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T06:15:09.490", "lastModified": "2024-11-21T09:47:27.407", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54021.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54021.json index 8b6b2ffc49d..6d1cb4a8757 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54021.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54021.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:34.287", "lastModified": "2025-01-14T14:15:34.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de las secuencias crlf en los encabezados http (\"divisi\u00f3n de respuesta http\") en Fortinet FortiOS 7.2.0 a 7.6.0, FortiProxy 7.2.0 a 7.4.5 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s del encabezado HTTP manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json index f4da40c98b5..bc661ad7c7f 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54031.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:11.203", "lastModified": "2025-01-15T13:15:11.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54142.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54142.json index 10018f9bb79..7d46cdb24a3 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54142.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54142.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T23:15:08.687", "lastModified": "2025-01-14T23:15:08.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Discourse AI is a Discourse plugin which provides a number of AI features. When sharing Discourse AI Bot conversations into posts, if the conversation had HTML entities those could leak into the Discourse application when a user visited a post with a onebox to said conversation. This issue has been addressed in commit `92f122c`. Users are advised to update. Users unable to update may remove all groups from `ai bot public sharing allowed groups` site setting." + }, + { + "lang": "es", + "value": " Discourse AI es un complemento de Discourse que proporciona una serie de funciones de inteligencia artificial. Al compartir conversaciones de Discourse AI Bot en publicaciones, si la conversaci\u00f3n ten\u00eda entidades HTML, estas podr\u00edan filtrarse en la aplicaci\u00f3n Discourse cuando un usuario visitara una publicaci\u00f3n con un cuadro \u00fanico para dicha conversaci\u00f3n. Este problema se ha solucionado en la confirmaci\u00f3n `92f122c`. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden eliminar todos los grupos de la configuraci\u00f3n del sitio `ai bot public sharing allowed groups`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54193.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54193.json index 0d9368620c4..96f626a400e 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54193.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54193.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:26.840", "lastModified": "2025-01-11T13:15:26.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal()\n\nMove pm_runtime_set_active() to ivpu_pm_init() so when\nivpu_ipc_send_receive_internal() is executed before ivpu_pm_enable()\nit already has correct runtime state, even if last resume was\nnot successful." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: accel/ivpu: Corregir WARN en ivpu_ipc_send_receive_internal() Mover pm_runtime_set_active() a ivpu_pm_init() para que cuando ivpu_ipc_send_receive_internal() se ejecute antes de ivpu_pm_enable() ya tenga el estado de tiempo de ejecuci\u00f3n correcto, incluso si la \u00faltima reanudaci\u00f3n no fue exitosa." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54455.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54455.json index 367ad9902a1..1623c95c3e3 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54455.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:26.970", "lastModified": "2025-01-11T13:15:26.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix general protection fault in ivpu_bo_list()\n\nCheck if ctx is not NULL before accessing its fields." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: accel/ivpu: corrige un error de protecci\u00f3n general en ivpu_bo_list(). Comprueba si ctx no es NULL antes de acceder a sus campos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json index d4cd7f0e3b3..a1c1519578a 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:28.520", "lastModified": "2025-01-16T17:15:12.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json index f87c7e7f28a..80bdbf05dc2 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-01-15T20:15:28.703", "lastModified": "2025-01-16T15:15:13.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54660.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54660.json index 6a556c97ff6..7da31bc686c 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54660.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54660.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T22:15:40.200", "lastModified": "2025-01-16T22:15:40.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A JNDI injection issue was discovered in Cloudera JDBC Connector for Hive before 2.6.26 and JDBC Connector for Impala before 2.6.35. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This could lead to remote code execution. JNDI injection is possible via the JDBC connection property krbJAASFile for the Java Authentication and Authorization Service (JAAS). Using untrusted parameters in the krbJAASFile and/or remote host can trigger JNDI injection in the JDBC URL through the krbJAASFile." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema de inyecci\u00f3n JNDI en Cloudera JDBC Connector para Hive antes de la versi\u00f3n 2.6.26 y JDBC Connector para Impala antes de la versi\u00f3n 2.6.35. Los atacantes pueden inyectar par\u00e1metros maliciosos en la URL de JDBC, lo que activa la inyecci\u00f3n JNDI durante el proceso cuando el controlador JDBC usa esta URL para conectarse a la base de datos. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. La inyecci\u00f3n JNDI es posible a trav\u00e9s de la propiedad de conexi\u00f3n JDBC krbJAASFile para el Servicio de autenticaci\u00f3n y autorizaci\u00f3n de Java (JAAS). El uso de par\u00e1metros no confiables en krbJAASFile o en el host remoto puede activar la inyecci\u00f3n JNDI en la URL de JDBC a trav\u00e9s de krbJAASFile." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json index 64c8fea680b..8f0df65c967 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54687.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:22.630", "lastModified": "2025-01-13T20:15:28.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json index bc1750ea4d6..f10395ba4e9 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T23:15:08.837", "lastModified": "2025-01-16T16:15:31.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54846.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54846.json index ba119cbd1b9..d931c568890 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54846.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54846.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:16.980", "lastModified": "2025-01-13T21:15:12.913", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54847.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54847.json index ef507399eed..a731890cbc6 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54847.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54847.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:17.090", "lastModified": "2025-01-13T21:15:13.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json index d3e218ac969..f4c8bb39fa6 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54848.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:17.197", "lastModified": "2025-01-13T21:15:13.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54849.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54849.json index 3ed7411afb7..bbe7259368a 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54849.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54849.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:17.300", "lastModified": "2025-01-13T21:15:13.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54910.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54910.json index 2394eb2014e..9faba8a7246 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54910.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54910.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T19:15:37.800", "lastModified": "2025-01-14T16:15:32.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54994.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54994.json index bf44c13dd28..4117ce12bc7 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54994.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54994.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T21:15:12.833", "lastModified": "2025-01-14T17:15:17.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54996.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54996.json index 974592038c7..303fc3d0c9b 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54996.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54996.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T21:15:12.963", "lastModified": "2025-01-13T16:15:18.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54997.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54997.json index 315015ce5a4..0bd97abfc28 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54997.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54997.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T21:15:13.083", "lastModified": "2025-01-13T22:15:13.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54998.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54998.json index 745c4322f5f..71287387c37 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54998.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54998.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T21:15:13.203", "lastModified": "2025-01-14T17:15:18.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54999.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54999.json index addfe87bcd3..44e78184872 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54999.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54999.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:17.057", "lastModified": "2025-01-13T21:15:13.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MonicaHQ v4.1.2 was discovered to contain a Client-Side Injection vulnerability via the last_name parameter the General Information module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MonicaHQ v4.1.2 contiene una vulnerabilidad de inyecci\u00f3n del lado del cliente a trav\u00e9s del par\u00e1metro last_name del m\u00f3dulo de Informaci\u00f3n general." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55000.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55000.json index d2a4614665a..d7de88d4a22 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55000.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55000.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T15:15:27.087", "lastModified": "2025-01-14T17:15:18.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcecodester House Rental Management system v1.0 is vulnerable to Cross Site Scripting (XSS) in rental/manage_categories.php." + }, + { + "lang": "es", + "value": "Sourcecodester House Rental Management system v1.0 es vulnerable a Cross Site Scripting (XSS) en rental/manage_categories.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json index 9223a733ad6..52b1fe64683 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T22:15:40.327", "lastModified": "2025-01-16T22:15:40.327", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A null pointer dereference vulnerability in Macrium Reflect prior to 8.1.8017 allows an attacker to elevate their privileges via executing a specially crafted executable." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de desreferencia de puntero nulo en Macrium Reflect anterior a 8.1.8017 permite a un atacante elevar sus privilegios mediante la ejecuci\u00f3n de un ejecutable especialmente manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55577.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55577.json index 6164c403d21..9227bea31bd 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55577.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55577.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-01-15T06:15:16.740", "lastModified": "2025-01-15T06:15:16.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow vulnerability exists in Linux Ratfor 1.06 and earlier. When the software processes a file which is specially crafted by an attacker, arbitrary code may be executed. As a result, the attacker may obtain or alter information of the user environment or cause the user environment to become unusable." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basado en pila en Linux Ratfor 1.06 y versiones anteriores. Cuando el software procesa un archivo especialmente manipulado por un atacante, se puede ejecutar c\u00f3digo arbitrario. Como resultado, el atacante puede obtener o alterar informaci\u00f3n del entorno del usuario o hacer que el entorno del usuario se vuelva inutilizable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55593.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55593.json index 1218778848b..cf4878fc598 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55593.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55593.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:34.610", "lastModified": "2025-01-14T14:15:34.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWeb versions 6.3.17 through 7.6.1 allows attacker to gain information disclosure via crafted SQL queries" + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('inyecci\u00f3n SQL') en las versiones 6.3.17 a 7.6.1 de Fortinet FortiWeb permite a un atacante obtener informaci\u00f3n a trav\u00e9s de consultas SQL manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55639.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55639.json index bbb4880fc92..1f6aac4fae8 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55639.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55639.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:27.663", "lastModified": "2025-01-11T13:15:27.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: renesas: rswitch: avoid use-after-put for a device tree node\n\nThe device tree node saved in the rswitch_device structure is used at\nseveral driver locations. So passing this node to of_node_put() after\nthe first use is wrong.\n\nMove of_node_put() for this node to exit paths." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: renesas: rswitch: evitar el uso posterior a la ejecuci\u00f3n de un nodo del \u00e1rbol de dispositivos El nodo del \u00e1rbol de dispositivos guardado en la estructura rswitch_device se utiliza en varias ubicaciones de controladores. Por lo tanto, pasar este nodo a of_node_put() despu\u00e9s del primer uso es incorrecto. Mueva of_node_put() para este nodo a las rutas de salida." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55641.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55641.json index 71a6ff7eec1..cf4115193c4 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55641.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55641.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:27.847", "lastModified": "2025-01-11T13:15:27.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: unlock inodes when erroring out of xfs_trans_alloc_dir\n\nDebugging a filesystem patch with generic/475 caused the system to hang\nafter observing the following sequences in dmesg:\n\n XFS (dm-0): metadata I/O error in \"xfs_imap_to_bp+0x61/0xe0 [xfs]\" at daddr 0x491520 len 32 error 5\n XFS (dm-0): metadata I/O error in \"xfs_btree_read_buf_block+0xba/0x160 [xfs]\" at daddr 0x3445608 len 8 error 5\n XFS (dm-0): metadata I/O error in \"xfs_imap_to_bp+0x61/0xe0 [xfs]\" at daddr 0x138e1c0 len 32 error 5\n XFS (dm-0): log I/O error -5\n XFS (dm-0): Metadata I/O Error (0x1) detected at xfs_trans_read_buf_map+0x1ea/0x4b0 [xfs] (fs/xfs/xfs_trans_buf.c:311). Shutting down filesystem.\n XFS (dm-0): Please unmount the filesystem and rectify the problem(s)\n XFS (dm-0): Internal error dqp->q_ino.reserved < dqp->q_ino.count at line 869 of file fs/xfs/xfs_trans_dquot.c. Caller xfs_trans_dqresv+0x236/0x440 [xfs]\n XFS (dm-0): Corruption detected. Unmount and run xfs_repair\n XFS (dm-0): Unmounting Filesystem be6bcbcc-9921-4deb-8d16-7cc94e335fa7\n\nThe system is stuck in unmount trying to lock a couple of inodes so that\nthey can be purged. The dquot corruption notice above is a clue to what\nhappened -- a link() call tried to set up a transaction to link a child\ninto a directory. Quota reservation for the transaction failed after IO\nerrors shut down the filesystem, but then we forgot to unlock the inodes\non our way out. Fix that." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfs: desbloquear inodos al generar un error fuera de xfs_trans_alloc_dir La depuraci\u00f3n de un parche del sistema de archivos con generic/475 provoc\u00f3 que el sistema se bloqueara despu\u00e9s de observar las siguientes secuencias en dmesg: XFS (dm-0): error de E/S de metadatos en \"xfs_imap_to_bp+0x61/0xe0 [xfs]\" en daddr 0x491520 len 32 error 5 XFS (dm-0): error de E/S de metadatos en \"xfs_btree_read_buf_block+0xba/0x160 [xfs]\" en daddr 0x3445608 len 8 error 5 XFS (dm-0): error de E/S de metadatos en \"xfs_imap_to_bp+0x61/0xe0 [xfs]\" en daddr 0x138e1c0 len 32 error 5 XFS (dm-0): error de E/S de registro -5 XFS (dm-0): Error de E/S de metadatos (0x1) detectado en xfs_trans_read_buf_map+0x1ea/0x4b0 [xfs] (fs/xfs/xfs_trans_buf.c:311). Apagando el sistema de archivos. XFS (dm-0): Desmonte el sistema de archivos y rectifique los problemas. XFS (dm-0): Error interno dqp->q_ino.reserved < dqp->q_ino.count en la l\u00ednea 869 del archivo fs/xfs/xfs_trans_dquot.c. Llamador xfs_trans_dqresv+0x236/0x440 [xfs] XFS (dm-0): Corrupci\u00f3n detectada. Desmontar y ejecutar xfs_repair XFS (dm-0): Desmontando el sistema de archivos be6bcbcc-9921-4deb-8d16-7cc94e335fa7 El sistema est\u00e1 atascado en el modo de desmontaje intentando bloquear un par de inodos para que puedan ser purgados. El aviso de corrupci\u00f3n de dquot anterior es una pista de lo que sucedi\u00f3: una llamada a link() intent\u00f3 configurar una transacci\u00f3n para vincular un hijo a un directorio. La reserva de cuota para la transacci\u00f3n fall\u00f3 despu\u00e9s de que los errores de E/S apagaran el sistema de archivos, pero luego olvidamos desbloquear los inodos al salir. Arreglen eso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55881.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55881.json index 69a992e3012..8d8798224b8 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55881.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55881.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:28.197", "lastModified": "2025-01-11T13:15:28.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Play nice with protected guests in complete_hypercall_exit()\n\nUse is_64_bit_hypercall() instead of is_64_bit_mode() to detect a 64-bit\nhypercall when completing said hypercall. For guests with protected state,\ne.g. SEV-ES and SEV-SNP, KVM must assume the hypercall was made in 64-bit\nmode as the vCPU state needed to detect 64-bit mode is unavailable.\n\nHacking the sev_smoke_test selftest to generate a KVM_HC_MAP_GPA_RANGE\nhypercall via VMGEXIT trips the WARN:\n\n ------------[ cut here ]------------\n WARNING: CPU: 273 PID: 326626 at arch/x86/kvm/x86.h:180 complete_hypercall_exit+0x44/0xe0 [kvm]\n Modules linked in: kvm_amd kvm ... [last unloaded: kvm]\n CPU: 273 UID: 0 PID: 326626 Comm: sev_smoke_test Not tainted 6.12.0-smp--392e932fa0f3-feat #470\n Hardware name: Google Astoria/astoria, BIOS 0.20240617.0-0 06/17/2024\n RIP: 0010:complete_hypercall_exit+0x44/0xe0 [kvm]\n Call Trace:\n \n kvm_arch_vcpu_ioctl_run+0x2400/0x2720 [kvm]\n kvm_vcpu_ioctl+0x54f/0x630 [kvm]\n __se_sys_ioctl+0x6b/0xc0\n do_syscall_64+0x83/0x160\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \n ---[ end trace 0000000000000000 ]---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Juega bien con invitados protegidos en complete_hypercall_exit() Usa is_64_bit_hypercall() en lugar de is_64_bit_mode() para detectar una hiperllamada de 64 bits al completar dicha hiperllamada. Para invitados con estado protegido, por ejemplo, SEV-ES y SEV-SNP, KVM debe asumir que la hiperllamada se realiz\u00f3 en modo de 64 bits, ya que el estado de vCPU necesario para detectar el modo de 64 bits no est\u00e1 disponible. Al piratear la autoprueba sev_smoke_test para generar una hiperllamada KVM_HC_MAP_GPA_RANGE a trav\u00e9s de VMGEXIT se activa el WARN: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 273 PID: 326626 en arch/x86/kvm/x86.h:180 complete_hypercall_exit+0x44/0xe0 [kvm] M\u00f3dulos vinculados en: kvm_amd kvm ... [\u00faltima descarga: kvm] CPU: 273 UID: 0 PID: 326626 Comm: sev_smoke_test No contaminado 6.12.0-smp--392e932fa0f3-feat #470 Nombre del hardware: Google Astoria/astoria, BIOS 0.20240617.0-0 17/06/2024 RIP: 0010:completar_hiperllamada_salida+0x44/0xe0 [kvm] Seguimiento de llamadas: kvm_arch_vcpu_ioctl_run+0x2400/0x2720 [kvm] kvm_vcpu_ioctl+0x54f/0x630 [kvm] __se_sys_ioctl+0x6b/0xc0 do_syscall_64+0x83/0x160 entry_SYSCALL_64_after_hwframe+0x76/0x7e ---[fin del seguimiento 0000000000000000 ]---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55891.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55891.json index 2a15e8b6b26..8654d96e3e7 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55891.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55891.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:28.773", "lastModified": "2025-01-14T20:15:28.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. It has been discovered that the install tool password has been logged as plaintext in case the password hashing mechanism used for the password was incorrect. Users are advised to update to TYPO3 versions 13.4.3 ELTS which fixes the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha descubierto que la contrase\u00f1a de la herramienta de instalaci\u00f3n se ha registrado como texto plano en caso de que el mecanismo de hash de contrase\u00f1as utilizado para la contrase\u00f1a fuera incorrecto. Se recomienda a los usuarios que actualicen a la versi\u00f3n 13.4.3 ELTS de TYPO3, que soluciona el problema descrito. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55892.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55892.json index 1569e08440e..9bc5812eca1 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55892.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55892.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:28.963", "lastModified": "2025-01-14T20:15:28.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. Applications that use `TYPO3\\CMS\\Core\\Http\\Uri` to parse externally provided URLs (e.g., via a query parameter) and validate the host of the parsed URL may be vulnerable to open redirect or SSRF attacks if the URL is used after passing the validation checks. Users are advised to update to TYPO3 versions 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 which fix the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Las aplicaciones que utilizan `TYPO3\\CMS\\Core\\Http\\Uri` para analizar URL proporcionadas externamente (por ejemplo, a trav\u00e9s de un par\u00e1metro de consulta) y validar el host de la URL analizada pueden ser vulnerables a ataques de redireccionamiento abierto o SSRF si la URL se utiliza despu\u00e9s de pasar las comprobaciones de validaci\u00f3n. Se recomienda a los usuarios que actualicen a las versiones 9.5.49 ELTS, 10.4.48 ELTS, 11.5.42 LTS, 12.4.25 LTS, 13.4.3 de TYPO3, que solucionan el problema descrito. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55893.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55893.json index 279785d9335..b8767a5de77 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55893.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55893.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:29.197", "lastModified": "2025-01-14T20:15:29.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component \u201cLog Module\u201d allows attackers to remove log entries. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que involucra enlaces profundos. Espec\u00edficamente, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP apropiado. La explotaci\u00f3n exitosa de esta vulnerabilidad requiere que la v\u00edctima tenga una sesi\u00f3n activa en la interfaz de usuario del backend y sea enga\u00f1ada para interactuar con una URL maliciosa dirigida al backend, lo que puede ocurrir bajo las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o ninguna. La vulnerabilidad en el componente posterior afectado \"M\u00f3dulo de registro\" permite a los atacantes eliminar entradas de registro. Se recomienda a los usuarios que actualicen a las versiones 11.5.42 ELTS, 12.4.25 LTS y 13.4.3 LTS de TYPO3, que solucionan el problema descrito. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55894.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55894.json index 0147fd4900d..803a4353ef1 100644 --- a/CVE-2024/CVE-2024-558xx/CVE-2024-55894.json +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55894.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:29.380", "lastModified": "2025-01-14T20:15:29.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component \u201cBackend User Module\u201d allows attackers to initiate password resets for other backend users or to terminate their user sessions. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que involucra enlaces profundos. Espec\u00edficamente, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP apropiado. La explotaci\u00f3n exitosa de esta vulnerabilidad requiere que la v\u00edctima tenga una sesi\u00f3n activa en la interfaz de usuario del backend y sea enga\u00f1ada para interactuar con una URL maliciosa dirigida al backend, lo que puede ocurrir bajo las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o ninguna. La vulnerabilidad en el componente posterior afectado \"Backend User Module\" permite a los atacantes iniciar restablecimientos de contrase\u00f1as para otros usuarios del backend o finalizar sus sesiones de usuario. Se recomienda a los usuarios actualizar a las versiones TYPO3 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS que solucionan el problema descrito." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55920.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55920.json index bbadd6864ad..9ffd8f319f3 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55920.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55920.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:29.613", "lastModified": "2025-01-14T20:15:29.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component \u201cDashboard Module\u201d allows attackers to manipulate the victim\u2019s dashboard configuration. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que implica enlaces profundos. En concreto, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP adecuado. Para explotar con \u00e9xito esta vulnerabilidad, la v\u00edctima debe tener una sesi\u00f3n activa en la interfaz de usuario del backend y ser enga\u00f1ada para que interact\u00fae con una URL maliciosa dirigida al backend, lo que puede ocurrir en las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o ninguna. La vulnerabilidad en el componente posterior afectado \"Dashboard Module\" permite a los atacantes manipular la configuraci\u00f3n del panel de la v\u00edctima. Se recomienda a los usuarios que actualicen a las versiones 11.5.42 ELTS, 12.4.25 LTS y 13.4.3 LTS de TYPO3, que solucionan el problema descrito. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55921.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55921.json index 187a47e1b54..5b1adfb74ef 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55921.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55921.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:29.847", "lastModified": "2025-01-14T20:15:29.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component \u201cExtension Manager Module\u201d allows attackers to retrieve and install 3rd party extensions from the TYPO3 Extension Repository - which can lead to remote code execution in the worst case. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que involucra enlaces profundos. Espec\u00edficamente, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP apropiado. La explotaci\u00f3n exitosa de esta vulnerabilidad requiere que la v\u00edctima tenga una sesi\u00f3n activa en la interfaz de usuario del backend y sea enga\u00f1ada para interactuar con una URL maliciosa dirigida al backend, lo que puede ocurrir bajo las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o ninguna. La vulnerabilidad en el componente afectado \u201cExtension Manager Module\u201d permite a los atacantes recuperar e instalar extensiones de terceros desde el repositorio de extensiones de TYPO3, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo en el peor de los casos. Se recomienda a los usuarios que actualicen a las versiones 11.5.42 ELTS, 12.4.25 LTS y 13.4.3 LTS de TYPO3, que solucionan el problema descrito." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55922.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55922.json index 47e5f129d68..c0d9668e7f3 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55922.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55922.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:30.033", "lastModified": "2025-01-14T20:15:30.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none The vulnerability in the affected downstream component \u201cForm Framework Module\u201d allows attackers to manipulate or delete persisted form definitions. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que involucra enlaces profundos. Espec\u00edficamente, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes descendentes aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP apropiado. La explotaci\u00f3n exitosa de esta vulnerabilidad requiere que la v\u00edctima tenga una sesi\u00f3n activa en la interfaz de usuario del backend y sea enga\u00f1ada para interactuar con una URL maliciosa dirigida al backend, lo que puede ocurrir bajo las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o none La vulnerabilidad en el componente descendente afectado \"FormFrameworkk Module\" permite a los atacantes manipular o eliminar definiciones de formularios persistentes. Se recomienda a los usuarios que actualicen a las versiones 11.5.42 ELTS, 12.4.25 LTS y 13.4.3 LTS de TYPO3, que solucionan el problema descrito. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55923.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55923.json index 656380e8b86..8b6765c478b 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55923.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55923.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:30.197", "lastModified": "2025-01-14T20:15:30.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component \u201cIndexed Search Module\u201d allows attackers to delete items of the component. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que implica enlaces profundos. En concreto, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP adecuado. Para explotar con \u00e9xito esta vulnerabilidad, la v\u00edctima debe tener una sesi\u00f3n activa en la interfaz de usuario del backend y ser enga\u00f1ada para que interact\u00fae con una URL maliciosa dirigida al backend, lo que puede ocurrir en las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o ninguna. La vulnerabilidad en el componente posterior afectado \"M\u00f3dulo de b\u00fasqueda indexada\" permite a los atacantes eliminar elementos del componente. Se recomienda a los usuarios que actualicen a las versiones 11.5.42 ELTS, 12.4.25 LTS y 13.4.3 LTS de TYPO3, que solucionan el problema descrito. No se conocen Workarounds para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55924.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55924.json index 9b69e5db4d6..3da6a04d39c 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55924.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55924.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:30.367", "lastModified": "2025-01-14T20:15:30.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component \u201cScheduler Module\u201d allows attackers to trigger pre-defined command classes - which can lead to unauthorized import or export of data in the worst case. Users are advised to update to TYPO3 versions 11.5.42 ELTS which fixes the problem described. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que involucra enlaces profundos. Espec\u00edficamente, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP apropiado. La explotaci\u00f3n exitosa de esta vulnerabilidad requiere que la v\u00edctima tenga una sesi\u00f3n activa en la interfaz de usuario del backend y sea enga\u00f1ada para interactuar con una URL maliciosa dirigida al backend, lo que puede ocurrir bajo las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en lax o ninguna. La vulnerabilidad en el componente afectado \u201cScheduler Module\u201d permite a los atacantes activar clases de comandos predefinidos, lo que puede provocar la importaci\u00f3n o exportaci\u00f3n no autorizada de datos en el peor de los casos. Se recomienda a los usuarios que actualicen a la versi\u00f3n 11.5.42 ELTS de TYPO3, que soluciona el problema descrito. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55945.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55945.json index 3a5b4083b80..fee5bbfe860 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55945.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55945.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T20:15:30.527", "lastModified": "2025-01-14T20:15:30.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to `lax` or `none`. The vulnerability in the affected downstream component \u201cDB Check Module\u201d allows attackers to manipulate data through unauthorized actions. Users are advised to update to TYPO3 versions 11.5.42 ELTS which fixes the problem described. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "TYPO3 es un framework gestor de contenidos gratuito y de c\u00f3digo abierto. Se ha identificado una vulnerabilidad en la funcionalidad de la interfaz de usuario del backend que implica enlaces profundos. En concreto, esta funcionalidad es susceptible a Cross-Site Request Forgery (CSRF). Adem\u00e1s, las acciones de cambio de estado en los componentes posteriores aceptaron incorrectamente los env\u00edos a trav\u00e9s de HTTP GET y no aplicaron el m\u00e9todo HTTP adecuado. Para explotar con \u00e9xito esta vulnerabilidad, la v\u00edctima debe tener una sesi\u00f3n activa en la interfaz de usuario del backend y ser enga\u00f1ada para que interact\u00fae con una URL maliciosa dirigida al backend, lo que puede ocurrir en las siguientes condiciones: El usuario abre un enlace malicioso, como uno enviado por correo electr\u00f3nico. El usuario visita un sitio web comprometido o manipulado mientras las siguientes configuraciones est\u00e1n mal configuradas: 1. La funci\u00f3n `security.backend.enforceReferrer` est\u00e1 deshabilitada, 2. La configuraci\u00f3n `BE/cookieSameSite` est\u00e1 establecida en `lax` o `none`. La vulnerabilidad en el componente posterior afectado \"DB Check Module\" permite a los atacantes manipular datos a trav\u00e9s de acciones no autorizadas. Se recomienda a los usuarios que actualicen a la versi\u00f3n 11.5.42 ELTS de TYPO3, que soluciona el problema descrito. No se conocen Workarounds para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json index a34419d52fa..70ea41ff4c0 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55954.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:32.890", "lastModified": "2025-01-16T20:15:32.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenObserve is a cloud-native observability platform. A vulnerability in the user management endpoint `/api/{org_id}/users/{email_id}` allows an \"Admin\" role user to remove a \"Root\" user from the organization. This violates the intended privilege hierarchy, enabling a non-root user to remove the highest-privileged account. Due to insufficient role checks, the `remove_user_from_org` function does not prevent an \"Admin\" user from removing a \"Root\" user. As a result, an attacker with an \"Admin\" role can remove critical \"Root\" users, potentially gaining effective full control by eliminating the highest-privileged accounts. The `DELETE /api/{org_id}/users/{email_id}` endpoint is affected. This issue has been addressed in release version `0.14.1` and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "OpenObserve es una plataforma de observaci\u00f3n nativa de la nube. Una vulnerabilidad en el punto de conexi\u00f3n de administraci\u00f3n de usuarios `/api/{org_id}/users/{email_id}` permite que un usuario con el rol \"Admin\" elimine a un usuario \"Root\" de la organizaci\u00f3n. Esto viola la jerarqu\u00eda de privilegios prevista, lo que permite que un usuario que no sea root elimine la cuenta con los privilegios m\u00e1s altos. Debido a que no se realizan suficientes comprobaciones de roles, la funci\u00f3n `remove_user_from_org` no impide que un usuario \"Admin\" elimine a un usuario \"Root\". Como resultado, un atacante con un rol \"Admin\" puede eliminar usuarios \"Root\" cr\u00edticos, lo que podr\u00eda generar un control total efectivo al eliminar las cuentas con los privilegios m\u00e1s altos. El punto de conexi\u00f3n `DELETE /api/{org_id}/users/{email_id}` se ve afectado. Este problema se ha solucionado en la versi\u00f3n de lanzamiento `0.14.1` y se recomienda a todos los usuarios que la actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56065.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56065.json index a4fd844e2d6..408fc1fbeaf 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56065.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56065.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:09.117", "lastModified": "2025-01-13T14:15:09.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder.biz Team WP2LEADS allows Reflected XSS.This issue affects WP2LEADS: from n/a through 3.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Saleswonder.biz Team WP2LEADS permite XSS reflejado. Este problema afecta a WP2LEADS: desde n/a hasta 3.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json index 85dd417cd2b..ac25df27722 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56136.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:33.047", "lastModified": "2025-01-16T20:15:33.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the `main` branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": " El servidor Zulip ofrece un chat de equipo de c\u00f3digo abierto que ayuda a los equipos a mantenerse productivos y concentrados. Zulip Server 7.0 y versiones posteriores son vulnerables a un ataque de divulgaci\u00f3n de informaci\u00f3n, en el que, si un servidor Zulip aloja varias organizaciones, un usuario no autenticado puede realizar una solicitud y determinar si un usuario est\u00e1 utilizando una direcci\u00f3n de correo electr\u00f3nico. Zulip Server 9.4 resuelve el problema, al igual que la rama \"principal\" de Zulip Server. Se recomienda a los usuarios que actualicen. No existen workarounds conocidos para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56138.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56138.json index 587f4ec45fc..564ca5b9f94 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56138.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56138.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T22:15:14.313", "lastModified": "2025-01-13T22:15:14.313", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "notion-go es una colecci\u00f3n de Librer\u00edas para respaldar la firma y verificaci\u00f3n de artefactos OCI. Basado en las especificaciones del Proyecto Notary. Este problema se identific\u00f3 durante la auditor\u00eda de Quarkslab de la caracter\u00edstica timestamp. Durante la generaci\u00f3n de la firma timestampp, no se verific\u00f3 el estado de revocaci\u00f3n de los certificados utilizados para generar la firma timestampmp. Durante la generaci\u00f3n de la firma timestampamp, notation-go no verific\u00f3 el estado de revocaci\u00f3n de la cadena de certificados utilizada por la TSA. Este descuido crea una vulnerabilidad que podr\u00eda explotarse a trav\u00e9s de un ataque Man-in-The-Middle. Un atacante podr\u00eda potencialmente usar un certificado de hoja comprometido, intermedio o revocado para generar una contrafirma maliciosa, que luego ser\u00eda aceptada y almacenada por `notation`. Esto podr\u00eda conducir a escenarios de denegaci\u00f3n de servicio, particularmente en entornos CI/CD durante los procesos de verificaci\u00f3n de firma, ya que la firma timestamptamp fallar\u00eda debido a la presencia de un certificado revocado que podr\u00eda interrumpir las operaciones. Este problema se ha solucionado en la versi\u00f3n 1.3.0-rc.2 y se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json index df7c74f0931..af993a6ed88 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:07.830", "lastModified": "2025-01-16T23:15:07.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display. Librenms versions up to 24.11.0 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.12.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "librenms es un sistema de monitorizaci\u00f3n de redes con licencia GPL basado en la comunidad. Las versiones afectadas est\u00e1n sujetas a XSS almacenado en los par\u00e1metros (Reemplace $DEVICE_ID con su valor $DEVICE_ID espec\u00edfico):`/device/$DEVICE_ID/edit` -> param: display. Las versiones de Librenms hasta la 24.11.0 permiten a atacantes remotos inyectar scripts maliciosos. Cuando un usuario ve o interact\u00faa con la p\u00e1gina que muestra los datos, el script malicioso se ejecuta inmediatamente, lo que lleva a posibles acciones no autorizadas o exposici\u00f3n de datos. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 24.12.0. Se recomienda a los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json index 7b7c694008a..391913468a4 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:27.247", "lastModified": "2025-01-02T12:15:27.247", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json index 8fc0cd2d0c1..95cd2e1bbe4 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:28.480", "lastModified": "2025-01-02T12:15:28.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56295.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56295.json index 3b8e4a219fa..52d889c1f6d 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56295.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56295.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:28.920", "lastModified": "2025-01-15T16:15:28.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 5.5.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Poll Maker Team Poll Maker permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Poll Maker: desde n/a hasta 5.5.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56301.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56301.json index bb9f5d601f5..2a9f994a337 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56301.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56301.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:09.887", "lastModified": "2025-01-13T14:15:09.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eniture Technology Distance Based Shipping Calculator allows Reflected XSS.This issue affects Distance Based Shipping Calculator: from n/a through 2.0.21." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eniture Technology Distance Based Shipping Calculator permite XSS reflejado. Este problema afecta a Distance Based Shipping Calculator: desde n/a hasta 2.0.21." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56323.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56323.json index b277a9c196c..92104190267 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56323.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56323.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T22:15:14.447", "lastModified": "2025-01-13T22:15:14.447", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenFGA is an authorization/permission engine. IN OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass under the following conditions: 1. calling Check API or ListObjects with a model that uses [conditions](https://openfga.dev/docs/modeling/conditions), and 2. calling Check API or ListObjects API with [contextual tuples](https://openfga.dev/docs/concepts#what-are-contextual-tuples) that include conditions and 3. OpenFGA is configured with caching enabled (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Users are advised to upgrade to v1.8.3. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "OpenFGA es un motor de autorizaci\u00f3n/permisos. En OpenFGA v1.3.8 a v1.8.2 (Helm chart openfga-0.1.38 a openfga-0.2.19, docker v1.3.8 a v.1.8.2) son vulnerables a la omisi\u00f3n de la autorizaci\u00f3n en las siguientes condiciones: 1. llamar a Check API o ListObjects con un modelo que usa [condiciones](https://openfga.dev/docs/modeling/conditions), y 2. llamar a Check API o ListObjects API con [tuplas contextuales](https://openfga.dev/docs/concepts#what-are-contextual-tuples) que incluyen condiciones y 3. OpenFGA est\u00e1 configurado con el almacenamiento en cach\u00e9 habilitado (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Se recomienda a los usuarios que actualicen a v1.8.3. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56368.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56368.json index baf76430245..0fbd6da615a 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56368.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56368.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:28.530", "lastModified": "2025-01-11T13:15:28.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix overflow in __rb_map_vma\n\nAn overflow occurred when performing the following calculation:\n\n nr_pages = ((nr_subbufs + 1) << subbuf_order) - pgoff;\n\nAdd a check before the calculation to avoid this problem.\n\nsyzbot reported this as a slab-out-of-bounds in __rb_map_vma:\n\nBUG: KASAN: slab-out-of-bounds in __rb_map_vma+0x9ab/0xae0 kernel/trace/ring_buffer.c:7058\nRead of size 8 at addr ffff8880767dd2b8 by task syz-executor187/5836\n\nCPU: 0 UID: 0 PID: 5836 Comm: syz-executor187 Not tainted 6.13.0-rc2-syzkaller-00159-gf932fb9b4074 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024\nCall Trace:\n \n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xc3/0x620 mm/kasan/report.c:489\n kasan_report+0xd9/0x110 mm/kasan/report.c:602\n __rb_map_vma+0x9ab/0xae0 kernel/trace/ring_buffer.c:7058\n ring_buffer_map+0x56e/0x9b0 kernel/trace/ring_buffer.c:7138\n tracing_buffers_mmap+0xa6/0x120 kernel/trace/trace.c:8482\n call_mmap include/linux/fs.h:2183 [inline]\n mmap_file mm/internal.h:124 [inline]\n __mmap_new_file_vma mm/vma.c:2291 [inline]\n __mmap_new_vma mm/vma.c:2355 [inline]\n __mmap_region+0x1786/0x2670 mm/vma.c:2456\n mmap_region+0x127/0x320 mm/mmap.c:1348\n do_mmap+0xc00/0xfc0 mm/mmap.c:496\n vm_mmap_pgoff+0x1ba/0x360 mm/util.c:580\n ksys_mmap_pgoff+0x32c/0x5c0 mm/mmap.c:542\n __do_sys_mmap arch/x86/kernel/sys_x86_64.c:89 [inline]\n __se_sys_mmap arch/x86/kernel/sys_x86_64.c:82 [inline]\n __x64_sys_mmap+0x125/0x190 arch/x86/kernel/sys_x86_64.c:82\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe reproducer for this bug is:\n\n------------------------8<-------------------------\n #include \n #include \n #include \n #include \n #include \n\n int main(int argc, char **argv)\n {\n\tint page_size = getpagesize();\n\tint fd;\n\tvoid *meta;\n\n\tsystem(\"echo 1 > /sys/kernel/tracing/buffer_size_kb\");\n\tfd = open(\"/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw\", O_RDONLY);\n\n\tmeta = mmap(NULL, page_size, PROT_READ, MAP_SHARED, fd, page_size * 5);\n }\n------------------------>8-------------------------" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ring-buffer: Corregir desbordamiento en __rb_map_vma Se produjo un desbordamiento al realizar el siguiente c\u00e1lculo: nr_pages = ((nr_subbufs + 1) << subbuf_order) - pgoff; Agregue una verificaci\u00f3n antes del c\u00e1lculo para evitar este problema. syzbot report\u00f3 esto como un slab-out-of-bounds en __rb_map_vma: ERROR: KASAN: slab-out-of-bounds en __rb_map_vma+0x9ab/0xae0 kernel/trace/ring_buffer.c:7058 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff8880767dd2b8 por la tarea syz-executor187/5836 CPU: 0 UID: 0 PID: 5836 Comm: syz-executor187 No contaminado 6.13.0-rc2-syzkaller-00159-gf932fb9b4074 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/11/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 imprimir_direcci\u00f3n_descripci\u00f3n mm/kasan/report.c:378 [en l\u00ednea] imprimir_report+0xc3/0x620 mm/kasan/report.c:489 kasan_report+0xd9/0x110 mm/kasan/report.c:602 __rb_map_vma+0x9ab/0xae0 kernel/trace/ring_buffer.c:7058 mapa_de_buffer_de_anillo+0x56e/0x9b0 kernel/trace/ring_buffer.c:7138 rastreo_buffers_mmap+0xa6/0x120 kernel/trace/trace.c:8482 llamada_mmap include/linux/fs.h:2183 [en l\u00ednea] archivo_mmap mm/internal.h:124 [en l\u00ednea] __mmap_nuevo_archivo_vma mm/vma.c:2291 [en l\u00ednea] __mmap_nuevo_vma mm/vma.c:2355 [en l\u00ednea] __mmap_region+0x1786/0x2670 mm/vma.c:2456 mmap_region+0x127/0x320 mm/mmap.c:1348 do_mmap+0xc00/0xfc0 mm/mmap.c:496 vm_mmap_pgoff+0x1ba/0x360 mm/util.c:580 ksys_mmap_pgoff+0x32c/0x5c0 mm/mmap.c:542 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:89 [en l\u00ednea] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:82 [en l\u00ednea] __x64_sys_mmap+0x125/0x190 arch/x86/kernel/sys_x86_64.c:82 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f El reproductor de este error es: ------------------------8<-------------------------- #include #include #include #include #include int main(int argc, char **argv) { int tama\u00f1o_p\u00e1gina = getpagesize(); int fd; void *meta; system(\"echo 1 > /sys/kernel/tracing/buffer_size_kb\"); fd = open(\"/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw\", O_RDONLY); meta = mmap(NULL, tama\u00f1o_p\u00e1gina, PROT_READ, MAP_SHARED, fd, tama\u00f1o_p\u00e1gina * 5); } ------------------------>8-------------------------" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56372.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56372.json index 23be334a05c..ba79e220e58 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56372.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56372.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:28.873", "lastModified": "2025-01-11T13:15:28.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tun: fix tun_napi_alloc_frags()\n\nsyzbot reported the following crash [1]\n\nIssue came with the blamed commit. Instead of going through\nall the iov components, we keep using the first one\nand end up with a malformed skb.\n\n[1]\n\nkernel BUG at net/core/skbuff.c:2849 !\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 UID: 0 PID: 6230 Comm: syz-executor132 Not tainted 6.13.0-rc1-syzkaller-00407-g96b6fcc0ee41 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024\n RIP: 0010:__pskb_pull_tail+0x1568/0x1570 net/core/skbuff.c:2848\nCode: 38 c1 0f 8c 32 f1 ff ff 4c 89 f7 e8 92 96 74 f8 e9 25 f1 ff ff e8 e8 ae 09 f8 48 8b 5c 24 08 e9 eb fb ff ff e8 d9 ae 09 f8 90 <0f> 0b 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90\nRSP: 0018:ffffc90004cbef30 EFLAGS: 00010293\nRAX: ffffffff8995c347 RBX: 00000000fffffff2 RCX: ffff88802cf45a00\nRDX: 0000000000000000 RSI: 00000000fffffff2 RDI: 0000000000000000\nRBP: ffff88807df0c06a R08: ffffffff8995b084 R09: 1ffff1100fbe185c\nR10: dffffc0000000000 R11: ffffed100fbe185d R12: ffff888076e85d50\nR13: ffff888076e85c80 R14: ffff888076e85cf4 R15: ffff888076e85c80\nFS: 00007f0dca6ea6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f0dca6ead58 CR3: 00000000119da000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n skb_cow_data+0x2da/0xcb0 net/core/skbuff.c:5284\n tipc_aead_decrypt net/tipc/crypto.c:894 [inline]\n tipc_crypto_rcv+0x402/0x24e0 net/tipc/crypto.c:1844\n tipc_rcv+0x57e/0x12a0 net/tipc/node.c:2109\n tipc_l2_rcv_msg+0x2bd/0x450 net/tipc/bearer.c:668\n __netif_receive_skb_list_ptype net/core/dev.c:5720 [inline]\n __netif_receive_skb_list_core+0x8b7/0x980 net/core/dev.c:5762\n __netif_receive_skb_list net/core/dev.c:5814 [inline]\n netif_receive_skb_list_internal+0xa51/0xe30 net/core/dev.c:5905\n gro_normal_list include/net/gro.h:515 [inline]\n napi_complete_done+0x2b5/0x870 net/core/dev.c:6256\n napi_complete include/linux/netdevice.h:567 [inline]\n tun_get_user+0x2ea0/0x4890 drivers/net/tun.c:1982\n tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2057\n do_iter_readv_writev+0x600/0x880\n vfs_writev+0x376/0xba0 fs/read_write.c:1050\n do_writev+0x1b6/0x360 fs/read_write.c:1096\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tun: fix tun_napi_alloc_frags() syzbot inform\u00f3 del siguiente fallo [1] El problema surgi\u00f3 con la confirmaci\u00f3n criticada. En lugar de pasar por todos los componentes de iov, seguimos usando el primero y terminamos con un skb mal formado. [1] \u00a1ERROR del kernel en net/core/skbuff.c:2849! Oops: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 6230 Comm: syz-executor132 No contaminado 6.13.0-rc1-syzkaller-00407-g96b6fcc0ee41 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/11/2024 RIP: 0010:__pskb_pull_tail+0x1568/0x1570 net/core/skbuff.c:2848 C\u00f3digo: 38 c1 0f 8c 32 f1 ff ff 4c 89 f7 e8 92 96 74 f8 e9 25 f1 ff ff e8 e8 ae 09 f8 48 8b 5c 24 08 e9 eb fb ff ff e8 d9 ae 09 f8 90 <0f> 0b 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90004cbef30 EFLAGS: 00010293 RAX: ffffffff8995c347 RBX: 00000000ffffff2 RCX: ffff88802cf45a00 RDX: 000000000000000 RSI: 00000000ffffff2 RDI: 000000000000000 RBP: ffff88807df0c06a R08: ffffffff8995b084 R09: 1ffff1100fbe185c R10: dffffc0000000000 R11: ffffed100fbe185d R12: ffff888076e85d50 R13: ffff888076e85c80 R14: ffff888076e85cf4 R15: ffff888076e85c80 FS: 00007f0dca6ea6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0dca6ead58 CR3: 00000000119da000 CR4: 000000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: skb_cow_data+0x2da/0xcb0 net/core/skbuff.c:5284 tipc_aead_decrypt net/tipc/crypto.c:894 [en l\u00ednea] tipc_crypto_rcv+0x402/0x24e0 net/tipc/crypto.c:1844 tipc_rcv+0x57e/0x12a0 net/tipc/node.c:2109 tipc_l2_rcv_msg+0x2bd/0x450 net/tipc/bearer.c:668 __netif_receive_skb_list_ptype net/core/dev.c:5720 [en l\u00ednea] __netif_receive_skb_list_core+0x8b7/0x980 net/core/dev.c:5762 __netif_receive_skb_list net/core/dev.c:5814 [en l\u00ednea] netif_receive_skb_list_internal+0xa51/0xe30 net/core/dev.c:5905 gro_normal_list include/net/gro.h:515 [en l\u00ednea] napi_complete_done+0x2b5/0x870 net/core/dev.c:6256 napi_complete include/linux/netdevice.h:567 [en l\u00ednea] tun_get_user+0x2ea0/0x4890 drivers/net/tun.c:1982 tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2057 do_iter_readv_writev+0x600/0x880 vfs_writev+0x376/0xba0 fs/read_write.c:1050 do_writev+0x1b6/0x360 fs/lectura_escritura.c:1096 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56374.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56374.json index 543b0395c0a..998facbd083 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56374.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56374.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T19:15:32.510", "lastModified": "2025-01-14T19:15:32.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 5.1 antes de 5.1.5, 5.0 antes de 5.0.11 y 4.2 antes de 4.2.18. La falta de aplicaci\u00f3n de un l\u00edmite superior en las cadenas que se pasan al realizar la validaci\u00f3n de IPv6 podr\u00eda provocar un posible ataque de denegaci\u00f3n de servicio. Las funciones privadas y no documentadas clean_ipv6_address e is_valid_ipv6_address son vulnerables, al igual que el campo de formulario django.forms.GenericIPAddressField. (El campo de modelo django.db.models.GenericIPAddressField no se ve afectado)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56497.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56497.json index 8befd3c7b19..2b64059d7b4 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56497.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56497.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:34.760", "lastModified": "2025-01-14T14:15:34.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiMail versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.6 and 6.4.0 through 6.4.7, FortiRecorder versions 7.0.0 and 6.4.0 through 6.4.4 allows attacker to execute unauthorized code or commands via the CLI." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('inyecci\u00f3n de comando del sistema operativo') en Fortinet FortiMail versiones 7.2.0 a 7.2.4 y 7.0.0 a 7.0.6 y 6.4.0 a 6.4.7, FortiRecorder versiones 7.0.0 y 6.4.0 a 6.4.4 permite a un atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de la CLI." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json index 38b817c5585..35fe67d0efe 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:29.510", "lastModified": "2025-01-10T16:15:29.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DataEase is an open source data visualization analysis tool. Prior to 2.10.4, there is a flaw in the authentication in the io.dataease.auth.filter.TokenFilter class, which can be bypassed and cause the risk of unauthorized access. In the io.dataease.auth.filter.TokenFilter class, \u201drequest.getRequestURI\u201c is used to obtain the request URL, and it is passed to the \"WhitelistUtils.match\" method to determine whether the URL request is an interface that does not require authentication. The \"match\" method filters semicolons, but this is not enough. When users set \"server.servlet.context-path\" when deploying products, there is still a risk of being bypassed, which can be bypassed by any whitelist prefix /geo/../context-path/. The vulnerability has been fixed in v2.10.4." + }, + { + "lang": "es", + "value": "DataEase es una herramienta de an\u00e1lisis de visualizaci\u00f3n de datos de c\u00f3digo abierto. Antes de la versi\u00f3n 2.10.4, existe una falla en la autenticaci\u00f3n en la clase io.dataease.auth.filter.TokenFilter, que se puede omitir y provocar el riesgo de acceso no autorizado. En la clase io.dataease.auth.filter.TokenFilter, se utiliza \"request.getRequestURI\" para obtener la URL de la solicitud y se pasa al m\u00e9todo \"WhitelistUtils.match\" para determinar si la solicitud de URL es una interfaz que no requiere autenticaci\u00f3n. El m\u00e9todo \"match\" filtra los puntos y comas, pero esto no es suficiente. Cuando los usuarios configuran \"server.servlet.context-path\" al implementar productos, a\u00fan existe el riesgo de ser ignorado, lo que se puede evitar con cualquier prefijo de lista blanca /geo/../context-path/. La vulnerabilidad se ha corregido en la versi\u00f3n 2.10.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json index 68cf367c339..85b2bdb089d 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56515.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T20:15:33.197", "lastModified": "2025-01-16T20:15:33.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. If SVG or JPEGXL thumbnailers are enabled (they are disabled by default), a user may upload a file which claims to be either of these types and request a thumbnail to invoke a different decoder in ImageMagick. In some ImageMagick installations, this includes the capability to run Ghostscript to decode the image/file. If MP4 thumbnailers are enabled (also disabled by default), the same issue as above may occur with the ffmpeg installation instead. MMR uses a number of other decoders for all other file types when preparing thumbnails. Theoretical issues are possible with these decoders, however in testing they were not possible to exploit. This is fixed in MMR v1.3.8. MMR now inspects the mimetype of media prior to thumbnailing, and picks a thumbnailer based on those results instead of relying on user-supplied values. This may lead to fewer thumbnails when obscure file shapes are used. This also helps narrow scope of theoretical issues with all decoders MMR uses for thumbnails. Users are advised to upgrade. Users unable to upgrade may disable the SVG, JPEGXL, and MP4 thumbnail types in the MMR config which prevents the decoders from being invoked. Further disabling uncommon file types on the server is recommended to limit risk surface. Containers and other similar technologies may also be used to limit the impact of vulnerabilities in external decoders, like ImageMagick and ffmpeg. Some installations of ImageMagick may disable \"unsafe\" file types, like PDFs, already. This option can be replicated to other environments as needed. ffmpeg may be compiled with limited decoders/codecs. The Docker image for MMR disables PDFs and similar formats by default." + }, + { + "lang": "es", + "value": "Matrix Media Repo (MMR) es un repositorio multimedia para m\u00faltiples servidores dom\u00e9sticos altamente configurable para Matrix. Si los generadores de miniaturas SVG o JPEGXL est\u00e1n habilitados (est\u00e1n deshabilitados de manera predeterminada), un usuario puede cargar un archivo que diga ser de cualquiera de estos tipos y solicitar una miniatura para invocar un decodificador diferente en ImageMagick. En algunas instalaciones de ImageMagick, esto incluye la capacidad de ejecutar Ghostscript para decodificar la imagen/archivo. Si los generadores de miniaturas MP4 est\u00e1n habilitados (tambi\u00e9n deshabilitados de manera predeterminada), puede ocurrir el mismo problema mencionado anteriormente con la instalaci\u00f3n de ffmpeg. MMR usa otros decodificadores para todos los dem\u00e1s tipos de archivos al preparar miniaturas. Es posible que surjan problemas te\u00f3ricos con estos decodificadores, sin embargo, en las pruebas no fue posible explotarlos. Esto se solucion\u00f3 en MMR v1.3.8. MMR ahora inspecciona el tipo MIME de los medios antes de crear miniaturas y elige un generador de miniaturas en funci\u00f3n de esos resultados en lugar de depender de los valores proporcionados por el usuario. Esto puede generar menos miniaturas cuando se usan formas de archivo poco conocidas. Esto tambi\u00e9n ayuda a limitar el alcance de los problemas te\u00f3ricos con todos los decodificadores que utiliza MMR para las miniaturas. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden deshabilitar los tipos de miniatura SVG, JPEGXL y MP4 en la configuraci\u00f3n de MMR, lo que evita que se invoquen los decodificadores. Se recomienda deshabilitar a\u00fan m\u00e1s los tipos de archivos poco comunes en el servidor para limitar la superficie de riesgo. Tambi\u00e9n se pueden usar contenedores y otras tecnolog\u00edas similares para limitar el impacto de las vulnerabilidades en decodificadores externos, como ImageMagick y ffmpeg. Algunas instalaciones de ImageMagick ya pueden deshabilitar los tipos de archivos \"inseguros\", como los PDF. Esta opci\u00f3n se puede replicar en otros entornos seg\u00fan sea necesario. ffmpeg se puede compilar con decodificadores/c\u00f3decs limitados. La imagen de Docker para MMR deshabilita los PDF y formatos similares de forma predeterminada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json index 7f75706bf66..ec6a42ca196 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: quota: vaciar quota_release_work al reescribir la cuota Una de las rutas desde las que se llama a la reescritura de cuota es: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots() Dado que actualmente no siempre vaciamos la cola quota_release_work en esta ruta, podemos terminar con la siguiente carrera: 1. dquot se agregan a la lista release_dquots durante las operaciones regulares. 2. FS Freeze comienza, sin embargo, esto no vac\u00eda la cola quota_release_work. 3. Freeze se completa. 4. El kernel finalmente intenta vaciar la cola de trabajo mientras FS est\u00e1 congelado, lo que genera un WARN_ON ya que la transacci\u00f3n se inicia durante el estado congelado: ext4_journal_check_start+0x28/0x110 [ext4] (no confiable) __ext4_journal_start_sb+0x64/0x1c0 [ext4] ext4_release_dquot+0x90/0x1d0 [ext4] quota_release_workfn+0x43c/0x4d0 Que es la siguiente l\u00ednea: WARN_ON(sb->s_writers.frozen == SB_FREEZE_COMPLETE); Lo que finalmente da como resultado que generic/390 falle debido al ruido de dmesg. Esto se detect\u00f3 en una m\u00e1quina PowerPC de 15 n\u00facleos. Para evitar esto, aseg\u00farese de vaciar la cola de trabajo durante dquot_writeback_dquots() para que no tengamos ning\u00fan elemento de trabajo pendiente despu\u00e9s del congelamiento." + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: quota: vaciar quota_release_work al reescribir la cuota Una de las rutas desde las que se llama a la reescritura de cuota es: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots() Dado que actualmente no siempre vaciamos la cola quota_release_work en esta ruta, podemos terminar con la siguiente ejecuci\u00f3n: 1. dquot se agregan a la lista release_dquots durante las operaciones regulares. 2. FS Freeze comienza, sin embargo, esto no vac\u00eda la cola quota_release_work. 3. Freeze se completa. 4. El kernel finalmente intenta vaciar la cola de trabajo mientras FS est\u00e1 congelado, lo que genera un WARN_ON ya que la transacci\u00f3n se inicia durante el estado congelado: ext4_journal_check_start+0x28/0x110 [ext4] (no confiable) __ext4_journal_start_sb+0x64/0x1c0 [ext4] ext4_release_dquot+0x90/0x1d0 [ext4] quota_release_workfn+0x43c/0x4d0 Que es la siguiente l\u00ednea: WARN_ON(sb->s_writers.frozen == SB_FREEZE_COMPLETE); Lo que finalmente da como resultado que generic/390 falle debido al ruido de dmesg. Esto se detect\u00f3 en una m\u00e1quina PowerPC de 15 n\u00facleos. Para evitar esto, aseg\u00farese de vaciar la cola de trabajo durante dquot_writeback_dquots() para que no tengamos ning\u00fan elemento de trabajo pendiente despu\u00e9s del congelamiento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json index 8d805369c7f..3be1f5b0031 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56788.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:29.090", "lastModified": "2025-01-11T13:15:29.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: oa_tc6: fix tx skb race condition between reference pointers\n\nThere are two skb pointers to manage tx skb's enqueued from n/w stack.\nwaiting_tx_skb pointer points to the tx skb which needs to be processed\nand ongoing_tx_skb pointer points to the tx skb which is being processed.\n\nSPI thread prepares the tx data chunks from the tx skb pointed by the\nongoing_tx_skb pointer. When the tx skb pointed by the ongoing_tx_skb is\nprocessed, the tx skb pointed by the waiting_tx_skb is assigned to\nongoing_tx_skb and the waiting_tx_skb pointer is assigned with NULL.\nWhenever there is a new tx skb from n/w stack, it will be assigned to\nwaiting_tx_skb pointer if it is NULL. Enqueuing and processing of a tx skb\nhandled in two different threads.\n\nConsider a scenario where the SPI thread processed an ongoing_tx_skb and\nit moves next tx skb from waiting_tx_skb pointer to ongoing_tx_skb pointer\nwithout doing any NULL check. At this time, if the waiting_tx_skb pointer\nis NULL then ongoing_tx_skb pointer is also assigned with NULL. After\nthat, if a new tx skb is assigned to waiting_tx_skb pointer by the n/w\nstack and there is a chance to overwrite the tx skb pointer with NULL in\nthe SPI thread. Finally one of the tx skb will be left as unhandled,\nresulting packet missing and memory leak.\n\n- Consider the below scenario where the TXC reported from the previous\ntransfer is 10 and ongoing_tx_skb holds an tx ethernet frame which can be\ntransported in 20 TXCs and waiting_tx_skb is still NULL.\n\ttx_credits = 10; /* 21 are filled in the previous transfer */\n\tongoing_tx_skb = 20;\n\twaiting_tx_skb = NULL; /* Still NULL */\n- So, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) becomes true.\n- After oa_tc6_prepare_spi_tx_buf_for_tx_skbs()\n\tongoing_tx_skb = 10;\n\twaiting_tx_skb = NULL; /* Still NULL */\n- Perform SPI transfer.\n- Process SPI rx buffer to get the TXC from footers.\n- Now let's assume previously filled 21 TXCs are freed so we are good to\ntransport the next remaining 10 tx chunks from ongoing_tx_skb.\n\ttx_credits = 21;\n\tongoing_tx_skb = 10;\n\twaiting_tx_skb = NULL;\n- So, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) becomes true again.\n- In the oa_tc6_prepare_spi_tx_buf_for_tx_skbs()\n\tongoing_tx_skb = NULL;\n\twaiting_tx_skb = NULL;\n\n- Now the below bad case might happen,\n\nThread1 (oa_tc6_start_xmit)\tThread2 (oa_tc6_spi_thread_handler)\n---------------------------\t-----------------------------------\n- if waiting_tx_skb is NULL\n\t\t\t\t- if ongoing_tx_skb is NULL\n\t\t\t\t- ongoing_tx_skb = waiting_tx_skb\n- waiting_tx_skb = skb\n\t\t\t\t- waiting_tx_skb = NULL\n\t\t\t\t...\n\t\t\t\t- ongoing_tx_skb = NULL\n- if waiting_tx_skb is NULL\n- waiting_tx_skb = skb\n\nTo overcome the above issue, protect the moving of tx skb reference from\nwaiting_tx_skb pointer to ongoing_tx_skb pointer and assigning new tx skb\nto waiting_tx_skb pointer, so that the other thread can't access the\nwaiting_tx_skb pointer until the current thread completes moving the tx\nskb reference safely." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: oa_tc6: arregla la condici\u00f3n de ejecuci\u00f3n de tx skb entre punteros de referencia Hay dos punteros skb para administrar los tx skb en cola desde la pila n/w. El puntero waiting_tx_skb apunta al tx skb que necesita ser procesado y el puntero progress_tx_skb apunta al tx skb que est\u00e1 siendo procesado. El hilo SPI prepara los fragmentos de datos de tx desde el tx skb apuntado por el puntero progress_tx_skb. Cuando se procesa el tx skb apuntado por progress_tx_skb, el tx skb apuntado por progress_tx_skb se asigna a progress_tx_skb y el puntero waiting_tx_skb se asigna con NULL. Siempre que haya un nuevo skb tx de la pila n/w, se asignar\u00e1 al puntero waiting_tx_skb si es NULL. Puesta en cola y procesamiento de un skb tx manejado en dos subprocesos diferentes. Considere un escenario donde el subproceso SPI proces\u00f3 un going_tx_skb y mueve el siguiente skb tx del puntero waiting_tx_skb al puntero going_tx_skb sin hacer ninguna comprobaci\u00f3n NULL. En este momento, si el puntero waiting_tx_skb es NULL, entonces el puntero going_tx_skb tambi\u00e9n se asigna con NULL. Despu\u00e9s de eso, si un nuevo skb tx se asigna al puntero waiting_tx_skb por la pila n/w y existe la posibilidad de sobrescribir el puntero skb tx con NULL en el subproceso SPI. Finalmente, uno de los skb tx quedar\u00e1 como sin manejar, lo que resultar\u00e1 en la p\u00e9rdida de paquetes y p\u00e9rdida de memoria. - Considere el siguiente escenario donde el TXC informado de la transferencia anterior es 10 y progress_tx_skb contiene una trama Ethernet de transmisi\u00f3n que se puede transportar en 20 TXC y waiting_tx_skb sigue siendo NULL. tx_credits = 10; /* 21 se completan en la transferencia anterior */ progress_tx_skb = 20; waiting_tx_skb = NULL; /* Sigue siendo NULL */ - Entonces, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) se vuelve verdadero. - Despu\u00e9s de oa_tc6_prepare_spi_tx_buf_for_tx_skbs() progress_tx_skb = 10; waiting_tx_skb = NULL; /* Sigue siendo NULL */ - Realizar transferencia SPI. - Procesar el b\u00fafer de recepci\u00f3n SPI para obtener el TXC de los pies de p\u00e1gina. - Ahora supongamos que los 21 TXC previamente completados se liberan, por lo que estamos listos para transportar los siguientes 10 fragmentos de tx restantes desde progress_tx_skb. tx_credits = 21; progress_tx_skb = 10; waiting_tx_skb = NULL; - Entonces, (tc6->ongoing_tx_skb || tc6->waiting_tx_skb) se vuelve verdadero nuevamente. - En oa_tc6_prepare_spi_tx_buf_for_tx_skbs() progress_tx_skb = NULL; waiting_tx_skb = NULL; - Ahora, el siguiente caso malo podr\u00eda ocurrir, Thread1 (oa_tc6_start_xmit) Thread2 (oa_tc6_spi_thread_handler) --------------------------- ----------------------------------- - si waiting_tx_skb es NULL - si going_tx_skb es NULL - going_tx_skb = waiting_tx_skb - waiting_tx_skb = skb - waiting_tx_skb = NULL ... - going_tx_skb = NULL - si waiting_tx_skb es NULL - waiting_tx_skb = skb Para superar el problema anterior, proteja el movimiento de la referencia tx skb del puntero waiting_tx_skb al puntero going_tx_skb y asigne el nuevo tx skb al puntero waiting_tx_skb, de modo que el otro hilo no pueda acceder al puntero waiting_tx_skb hasta que el hilo actual complete el movimiento de la referencia tx skb de manera segura." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56841.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56841.json index ac4c79d6dc3..0fd6fb1f62f 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56841.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2025-01-14T11:15:17.020", "lastModified": "2025-01-14T11:15:17.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json index b94e85ddb13..0cf0cb4686b 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.013", "lastModified": "2025-01-16T15:15:13.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json index d7f504a2b92..a4a0936d3e1 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57012.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.113", "lastModified": "2025-01-16T15:15:14.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json index 16975a4126e..2c435e99336 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57013.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.213", "lastModified": "2025-01-16T15:15:14.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json index 0fcdf9a25ff..dd785ba197b 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.307", "lastModified": "2025-01-16T15:15:14.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json index 0cb775a74b1..0c3bb9e5cd1 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57015.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.403", "lastModified": "2025-01-16T15:15:14.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json index 86b3fb11b60..8e4846509ff 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57016.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.500", "lastModified": "2025-01-16T15:15:14.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json index 1c01042d5da..a5d58a9c8c4 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57017.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.597", "lastModified": "2025-01-16T16:15:31.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json index 392c4cf8ada..50180bbed5e 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57018.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.693", "lastModified": "2025-01-16T16:15:31.823", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json index 151f62ccaf7..234746bd37c 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.797", "lastModified": "2025-01-16T16:15:31.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json index 09d89056daa..7ba6910b151 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.890", "lastModified": "2025-01-16T16:15:32.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json index 3fd2c2815cc..fd5e4233dad 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57021.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.987", "lastModified": "2025-01-16T16:15:32.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json index 06a6a63067c..1c8cb88aa04 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:18.083", "lastModified": "2025-01-16T16:15:32.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57023.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57023.json index f11bfa693ff..41d5226244a 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57023.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57023.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:18.183", "lastModified": "2025-01-15T17:15:18.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"week\" parameter in setWiFiScheduleCfg." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comando del sistema operativo a trav\u00e9s del par\u00e1metro \"week\" en setWiFiScheduleCfg." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57024.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57024.json index 5c79bb303ec..d42fec7b75c 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57024.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57024.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:18.280", "lastModified": "2025-01-15T17:15:18.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"eMinute\" parameter in setWiFiScheduleCfg." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comando del sistema operativo a trav\u00e9s del par\u00e1metro \"eMinute\" en setWiFiScheduleCfg." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57025.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57025.json index 47f08545e4b..7f663c81db5 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57025.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57025.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:18.377", "lastModified": "2025-01-15T17:15:18.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"desc\" parameter in setWiFiScheduleCfg." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0cu.2350_B20230313 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comando del sistema operativo a trav\u00e9s del par\u00e1metro \"desc\" en setWiFiScheduleCfg." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json index 2c8241c1756..49ec2229e74 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.700", "lastModified": "2025-01-16T16:15:32.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/add.html." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /erp.07fly.net:80/oa/OaWorkReport/add.html." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json index cec2a44f9ff..bdfe93262d3 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.817", "lastModified": "2025-01-16T16:15:32.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaTask/edit.html." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /erp.07fly.net:80/oa/OaTask/edit.html." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json index dd3442786ae..18847d1c05b 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.937", "lastModified": "2025-01-16T16:15:32.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via /erp.07fly.net:80/oa/OaWorkReport/edit.html" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /erp.07fly.net:80/oa/OaWorkReport/edit.html" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57212.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57212.json index 85a7a3c10a4..a3f46e64d06 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57212.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57212.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:17.953", "lastModified": "2025-01-14T16:15:33.120", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57213.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57213.json index ca9e0ef76ae..83ae42d372c 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57213.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57213.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:18.087", "lastModified": "2025-01-13T16:15:18.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57214.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57214.json index 9351394c155..328096085b4 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57214.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57214.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:18.197", "lastModified": "2025-01-14T17:15:19.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57222.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57222.json index e06eaa26147..a4b8aaeac13 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57222.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57222.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:24.807", "lastModified": "2025-01-14T17:15:19.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57223.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57223.json index de9dbc78eb6..f35a4f99e30 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57223.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57223.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:25.037", "lastModified": "2025-01-13T21:15:13.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57224.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57224.json index 2d8a45fa395..1db2ee8e6ba 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57224.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57224.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:25.277", "lastModified": "2025-01-13T21:15:13.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57225.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57225.json index 53ac7e809af..64b96006f41 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57225.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57225.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:25.433", "lastModified": "2025-01-13T21:15:13.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57471.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57471.json index 4eb85ae1545..cf9f965bd8d 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57471.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57471.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:28.250", "lastModified": "2025-01-14T22:15:28.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the 2.4G wireless network processing function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs." + }, + { + "lang": "es", + "value": " H3C N12 V100R005 contiene una vulnerabilidad de desbordamiento de b\u00fafer debido a la falta de verificaci\u00f3n de longitud en la funci\u00f3n de procesamiento de la red inal\u00e1mbrica 2.4G. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios enviando una solicitud POST a /bin/webs." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57473.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57473.json index 9c340bc58c3..976769b23e2 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57473.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T23:15:08.953", "lastModified": "2025-01-16T16:15:33.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json index bcf24ee6eb4..fcf0c6e8765 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:28.377", "lastModified": "2025-01-16T16:15:33.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57480.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57480.json index de71520dc42..0b50352f5e6 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57480.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:28.510", "lastModified": "2025-01-16T16:15:33.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57482.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57482.json index 566e80b98f3..fa8fd30d32d 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57482.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57482.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:28.627", "lastModified": "2025-01-14T22:15:28.627", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the 5G wireless network processing function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs." + }, + { + "lang": "es", + "value": " H3C N12 V100R005 contiene una vulnerabilidad de desbordamiento de b\u00fafer debido a la falta de verificaci\u00f3n de longitud en la funci\u00f3n de procesamiento de la red inal\u00e1mbrica 5G. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios enviando una solicitud POST a /bin/webs." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json index f4cf4786f5e..e75a7fdc6e8 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T23:15:09.060", "lastModified": "2025-01-16T16:15:33.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json index e0c544a9946..d7d7d0a2eb2 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57487.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:17.160", "lastModified": "2025-01-13T20:15:29.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server." + }, + { + "lang": "es", + "value": "En Code-Projects Online Car Rental System 1.0, la funci\u00f3n de carga de archivos no valida las extensiones de archivo o los tipos MIME, lo que permite a un atacante cargar un shell PHP sin ninguna restricci\u00f3n y ejecutar comandos en el servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json index 9d27ebb253f..d473aa20d17 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57488.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T17:15:17.263", "lastModified": "2025-01-13T20:15:29.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-Projects Online Car Rental System 1.0 is vulnerable to Cross Site Scripting (XSS) via the vehicalorcview parameter in /admin/edit-vehicle.php." + }, + { + "lang": "es", + "value": "Code-Projects Online Car Rental System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro vehicalorcview en /admin/edit-vehicle.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57575.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57575.json index 734162d2b5c..1d2cdf44fe5 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57575.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57575.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:16.537", "lastModified": "2025-01-16T21:15:16.537", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro ssid en la funci\u00f3n form_fast_setting_wifi_set." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json index 37fe659cf12..3d88645e41f 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57583.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.800", "lastModified": "2025-01-16T21:15:17.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC18 V15.03.05.19 was discovered to contain a command injection vulnerability via the usbName parameter in the formSetSambaConf function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro usbName en la funci\u00f3n formSetSambaConf." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json index 32f9b19b6b8..006ec028adb 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:33.893", "lastModified": "2025-01-16T16:15:33.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/doAdminAction.php?act=editShop&shopId." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de admin/doAdminAction.php?act=editShop&shopId." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57623.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57623.json index cb958e53850..cc69d43834e 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57623.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57623.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:10.710", "lastModified": "2025-01-14T19:15:32.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57628.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57628.json index 81e5eb59833..ccf03f3b6e1 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57628.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.267", "lastModified": "2025-01-14T17:15:19.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57629.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57629.json index 4e8317180ef..cce14d5e339 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57629.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57629.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.370", "lastModified": "2025-01-14T17:15:19.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57630.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57630.json index 3d5e5b5b41b..28b8104ebf4 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57630.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.480", "lastModified": "2025-01-14T17:15:19.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57631.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57631.json index fbe407da619..34382772426 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57631.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57631.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.603", "lastModified": "2025-01-14T17:15:20.093", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57632.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57632.json index 8be293d0825..7f8ff0cee8f 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57632.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57632.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.720", "lastModified": "2025-01-14T16:15:33.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57633.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57633.json index 76067bba3bf..a7b59f06db4 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57633.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57633.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.820", "lastModified": "2025-01-14T16:15:33.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57634.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57634.json index f97cc6d3e65..8f7bdbbfc13 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57634.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:11.940", "lastModified": "2025-01-14T16:15:33.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json index 7212253cc59..0ca6575ecc7 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57635.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.047", "lastModified": "2025-01-14T16:15:33.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json index ef2b443be4d..685cd51c33d 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57636.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.167", "lastModified": "2025-01-14T16:15:33.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json index 7733f5e96ae..4e2c06232f2 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57637.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:12.280", "lastModified": "2025-01-14T16:15:34.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json index 93a040cfda8..21e398fbfa7 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57654.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.217", "lastModified": "2025-01-14T17:15:20.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57661.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57661.json index 9c052608a3a..5f6da67869c 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57661.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57661.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.967", "lastModified": "2025-01-14T16:15:34.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57662.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57662.json index c5d020d954b..318c436bff2 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57662.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57662.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:15.087", "lastModified": "2025-01-14T01:15:15.087", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the sqlg_hash_source component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente sqlg_hash_source de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57663.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57663.json index ae6565ec305..2ea9ff10ab2 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57663.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57663.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:15.187", "lastModified": "2025-01-14T01:15:15.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the sqlg_place_dpipes component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente sqlg_place_dpipes de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57664.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57664.json index e54e002d73b..8b57540c506 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57664.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57664.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:15.300", "lastModified": "2025-01-14T01:15:15.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the sqlg_group_node component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." + }, + { + "lang": "es", + "value": " Un problema en el componente sqlg_group_node de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json index c3151ba8ddd..ac60aac3ee2 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57676.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:28.937", "lastModified": "2025-01-16T19:15:28.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente form2WlanBasicSetup.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados configurar el servicio WLAN 2.4G y 5G del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json index 28f470fdc06..adec475e0fb 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57677.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.033", "lastModified": "2025-01-16T19:15:29.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente form2Wan.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados configurar el servicio WAN del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json index c0df37106eb..b45e74e9767 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57678.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.130", "lastModified": "2025-01-16T19:15:29.130", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request." + }, + { + "lang": "es", + "value": "Un problema de control de acceso en el componente form2WlAc.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados establecer la lista de control de acceso mac 2.4G y 5G del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json index 81fb51fe8db..71d16bf69ed 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57679.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.220", "lastModified": "2025-01-16T19:15:29.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente form2RepeaterSetup.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados configurar el servicio de repetidor 2.4G y 5G del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json index 9baf630d6c4..715db8a425b 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57680.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.323", "lastModified": "2025-01-16T19:15:29.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente form2PortriggerRule.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados configurar el activador de puerto del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json index ffad683cf34..e45f5265e78 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57681.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.413", "lastModified": "2025-01-16T19:15:29.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente form2alg.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados configurar el servicio agl del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json index 9687cf25cbb..12ea0fc8106 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57682.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.513", "lastModified": "2025-01-16T19:15:29.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente d_status.asp de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados acceder a informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json index 008fa41be82..47cac2d841d 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57683.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.603", "lastModified": "2025-01-16T19:15:29.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component websURLFilterAddDel of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the filter settings of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente websURLFilterAddDel de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados establecer la configuraci\u00f3n de filtro del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json index a08a786c86e..6879a3e4898 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57684.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T19:15:29.700", "lastModified": "2025-01-16T20:15:33.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request." + }, + { + "lang": "es", + "value": " Un problema de control de acceso en el componente formDMZ.cgi de D-Link 816A2_FWv1.10CNB05_R1B011D88210 permite a atacantes no autenticados configurar el servicio DMZ del dispositivo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json index b14e544e313..dfaff3c0e43 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57686.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"pagetitle\" parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) en /landrecordsys/admin/contactus.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro \"pagetitle\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57687.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57687.json index e64dbf22017..16523c096b8 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57687.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57687.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"Cookie\" GET request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en /landrecordsys/admin/dashboard.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud GET \"Cookie\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json index 3a03f88e26a..884869e7818 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57703.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:08.003", "lastModified": "2025-01-16T23:15:08.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability. Affected by this vulnerability is the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedEndTime leads to stack-based buffer overflow." + }, + { + "lang": "es", + "value": " Tenda AC8v4 V16.03.34.06 tiene una vulnerabilidad de desbordamiento de pila. La funci\u00f3n setSchedWifi del archivo /goform/openSchedWifi se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento schedEndTime provoca un desbordamiento del b\u00fafer basado en la pila." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57704.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57704.json index b082ecf7897..ee826ed960c 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57704.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57704.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:08.113", "lastModified": "2025-01-16T23:15:08.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability. Affected by this vulnerability is the function setSchedWifi of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime leads to stack-based buffer overflow." + }, + { + "lang": "es", + "value": "Tenda AC8v4 V16.03.34.06 tiene una vulnerabilidad de desbordamiento de pila. La funci\u00f3n setSchedWifi del archivo /goform/openSchedWifi se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento schedStartTime provoca un desbordamiento del b\u00fafer basado en la pila." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json index b48821d02ff..50009daed3a 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57757.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:33.670", "lastModified": "2025-01-15T00:15:33.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JeeWMS before v2025.01.01 was discovered to contain a permission bypass in the component /interceptors/AuthInterceptor.cava." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que JeeWMS anterior a v2025.01.01 conten\u00eda una omisi\u00f3n de permisos en el componente /interceptors/AuthInterceptor.cava." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json index 3277c35d7c1..243588b9d41 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57760.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:33.780", "lastModified": "2025-01-15T00:15:33.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JeeWMS before v2025.01.01 was discovered to contain a SQL injection vulnerability via the ReportId parameter at /core/CGReportDao.java." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que JeeWMS anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro ReportId en /core/CGReportDao.java." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57761.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57761.json index 90fa0e14d03..9c2cedc6fdc 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57761.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57761.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:33.890", "lastModified": "2025-01-15T00:15:33.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the parserXML() method of JeeWMS before v2025.01.01 allows attackers to execute arbitrary code via uploading a crafted file." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de carga de archivos arbitrarios en el m\u00e9todo parserXML() de JeeWMS anterior a v2025.01.01 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57762.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57762.json index 8be11204635..51938bf78a7 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57762.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57762.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:33.997", "lastModified": "2025-01-15T00:15:33.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MSFM before v2025.01.01 was discovered to contain a deserialization vulnerability via the pom.xml configuration file." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MSFM anterior a v2025.01.01 conten\u00eda una vulnerabilidad de deserializaci\u00f3n a trav\u00e9s del archivo de configuraci\u00f3n pom.xml." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57763.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57763.json index 19b4f39be6b..1b1fd5bda58 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57763.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57763.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:34.110", "lastModified": "2025-01-15T00:15:34.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/addField." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MSFM anterior a 2025.01.01 conten\u00eda una vulnerabilidad de deserializaci\u00f3n fastjson a trav\u00e9s del componente system/table/addField." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57764.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57764.json index b3d5e27937b..a9487b823c0 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57764.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57764.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:34.217", "lastModified": "2025-01-15T00:15:34.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/add." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MSFM anterior a 2025.01.01 conten\u00eda una vulnerabilidad de deserializaci\u00f3n fastjson a trav\u00e9s del componente system/table/add." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57765.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57765.json index 2426f6c9f94..05137a14ee7 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57765.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57765.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:34.323", "lastModified": "2025-01-15T00:15:34.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MSFM before 2025.01.01 was discovered to contain a SQL injection vulnerability via the s_name parameter at table/list." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MSFM anterior a 2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro s_name en table/list." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57766.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57766.json index e43ec655841..3cf819940bb 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57766.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57766.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:34.433", "lastModified": "2025-01-15T00:15:34.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/editField." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MSFM anterior a 2025.01.01 conten\u00eda una vulnerabilidad de deserializaci\u00f3n fastjson a trav\u00e9s del componente system/table/editField." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57767.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57767.json index 29fda9da498..99e3444156e 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57767.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57767.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:34.543", "lastModified": "2025-01-15T00:15:34.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MSFM before v2025.01.01 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /file/download." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MSFM anterior a v2025.01.01 conten\u00eda Server-Side Request Forgery (SSRF) a trav\u00e9s del componente /file/download." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json index 892179c0927..4c869b4ef59 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.240", "lastModified": "2025-01-16T18:15:26.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component borrowmoney/listData?applyUser." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente borrowmoney/listData?applyUser." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json index 57806a9264e..1675c8de626 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.477", "lastModified": "2025-01-16T18:15:26.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component apply/save#oaContractApply.id." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente apply/save#oaContractApply.id." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json index 5fc4ad248c6..a66dc40b0fa 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57771.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.717", "lastModified": "2025-01-16T18:15:26.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the common/getEditPage?view interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en la interfaz common/getEditPage?view de JFinalOA anterior a v2025.01.01 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json index ccbaa5d760f..d3d52bca271 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57772.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.940", "lastModified": "2025-01-16T18:15:26.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the /bumph/getDraftListPage?type interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de cross-site scripting (XSS) en la interfaz /bumph/getDraftListPage?type de JFinalOA anterior a v2025.01.01 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json index 19dc365cca6..3d294b6b96a 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57773.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.173", "lastModified": "2025-01-16T18:15:27.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the openSelectManyUserPage?orgid interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de cross-site scripting (XSS) en la interfaz openSelectManyUserPage?orgid de JFinalOA anterior a v2025.01.01 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json index 184c6b0f284..e61e2207d1c 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57774.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.407", "lastModified": "2025-01-16T18:15:27.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the getBusinessUploadListPage?busid interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de cross-site scripting (XSS) en la interfaz getBusinessUploadListPage?busid de JFinalOA anterior a v2025.01.01 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json index 7699a1e6025..17419fbd081 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.633", "lastModified": "2025-01-16T18:15:27.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component getWorkFlowHis?insid." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente getWorkFlowHis?insid." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json index fcd5aa24639..a4e18abd89a 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57776.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.870", "lastModified": "2025-01-16T18:15:27.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the /apply/getEditPage?view interface of JFinalOA before v2025.01.01 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de cross-site scripting (XSS) en la interfaz /apply/getEditPage?view de JFinalOA anterior a v2025.01.01 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57784.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57784.json index ed5712aa3a8..ca3bb3a1c63 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57784.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57784.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:08.213", "lastModified": "2025-01-16T23:15:08.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the component /php/script_uploads.php of Zenitel AlphaWeb XE v11.2.3.10 allows attackers to execute a directory traversal." + }, + { + "lang": "es", + "value": " Un problema en el componente /php/script_uploads.php de Zenitel AlphaWeb XE v11.2.3.10 permite a los atacantes ejecutar directory traversal." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json index 8c9a4b02ece..1822a917d68 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57785.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T23:15:08.317", "lastModified": "2025-01-16T23:15:08.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zenitel AlphaWeb XE v11.2.3.10 was discovered to contain a local file inclusion vulnerability via the component amc_uploads.php." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Zenitel AlphaWeb XE v11.2.3.10 contiene una vulnerabilidad de inclusi\u00f3n de archivos locales a trav\u00e9s del componente amc_uploads.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57791.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57791.json index c805dc9a0eb..7cf38b4ced9 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57791.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57791.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:29.253", "lastModified": "2025-01-11T13:15:29.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check return value of sock_recvmsg when draining clc data\n\nWhen receiving clc msg, the field length in smc_clc_msg_hdr indicates the\nlength of msg should be received from network and the value should not be\nfully trusted as it is from the network. Once the value of length exceeds\nthe value of buflen in function smc_clc_wait_msg it may run into deadloop\nwhen trying to drain the remaining data exceeding buflen.\n\nThis patch checks the return value of sock_recvmsg when draining data in\ncase of deadloop in draining." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/smc: comprobar el valor de retorno de sock_recvmsg al drenar datos de clc Al recibir un mensaje de clc, la longitud del campo en smc_clc_msg_hdr indica que la longitud del mensaje debe recibirse de la red y que el valor no debe ser completamente confiable ya que es de la red. Una vez que el valor de la longitud excede el valor de buflen en la funci\u00f3n smc_clc_wait_msg, puede encontrarse con un bucle muerto al intentar drenar los datos restantes que exceden buflen. Este parche verifica el valor de retorno de sock_recvmsg al drenar datos en caso de un bucle muerto en el drenaje." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57792.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57792.json index 9fd3881d66e..ada841162be 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57792.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57792.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:29.420", "lastModified": "2025-01-11T13:15:29.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: gpio-charger: Fix set charge current limits\n\nFix set charge current limits for devices which allow to set the lowest\ncharge current limit to be greater zero. If requested charge current limit\nis below lowest limit, the index equals current_limit_map_size which leads\nto accessing memory beyond allocated memory." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: power: supply: gpio-charger: Fix set charge current limits Fix set charge current limits for devices which allow to set the lowest charge current limit to be mayor que cero. Si el l\u00edmite de corriente de carga solicitado es inferior al l\u00edmite inferior, el \u00edndice es igual a current_limit_map_size, lo que provoca el acceso a la memoria m\u00e1s all\u00e1 de la memoria asignada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json index bef515ea7d6..7ee2e49cf01 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57793.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:29.593", "lastModified": "2025-01-11T13:15:29.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirt: tdx-guest: Just leak decrypted memory on unrecoverable errors\n\nIn CoCo VMs it is possible for the untrusted host to cause\nset_memory_decrypted() to fail such that an error is returned\nand the resulting memory is shared. Callers need to take care\nto handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional\nor security issues.\n\nLeak the decrypted memory when set_memory_decrypted() fails,\nand don't need to print an error since set_memory_decrypted()\nwill call WARN_ONCE()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors En las m\u00e1quinas virtuales CoCo, es posible que el host no confiable haga que set_memory_decrypted() falle de modo que se devuelva un error y se comparta la memoria resultante. Los llamadores deben tener cuidado de manejar estos errores para evitar devolver memoria descifrada (compartida) al asignador de p\u00e1ginas, lo que podr\u00eda provocar problemas funcionales o de seguridad. Filtra la memoria descifrada cuando set_memory_decrypted() falla y no necesitas imprimir un error ya que set_memory_decrypted() llamar\u00e1 a WARN_ONCE()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57795.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57795.json index c724e3ecdde..3a1f5337d2e 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57795.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:11.563", "lastModified": "2025-01-15T13:15:11.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json index f1c06f13fde..9b34bfc3a23 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:29.743", "lastModified": "2025-01-11T13:15:29.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()\n\nWhile receiving an MST up request message from one thread in\ndrm_dp_mst_handle_up_req(), the MST topology could be removed from\nanother thread via drm_dp_mst_topology_mgr_set_mst(false), freeing\nmst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL.\nThis could lead to a NULL deref/use-after-free of mst_primary in\ndrm_dp_mst_handle_up_req().\n\nAvoid the above by holding a reference for mst_primary in\ndrm_dp_mst_handle_up_req() while it's used.\n\nv2: Fix kfreeing the request if getting an mst_primary reference fails." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/dp_mst: garantizar que el puntero mst_primary sea v\u00e1lido en drm_dp_mst_handle_up_req() Al recibir un mensaje de solicitud de activaci\u00f3n de MST de un hilo en drm_dp_mst_handle_up_req(), la topolog\u00eda de MST podr\u00eda eliminarse de otro hilo mediante drm_dp_mst_topology_mgr_set_mst(false), liberando mst_primary y estableciendo drm_dp_mst_topology_mgr::mst_primary en NULL. Esto podr\u00eda conducir a una desreferencia/use after free de NULL de mst_primary en drm_dp_mst_handle_up_req(). Evite lo anterior manteniendo una referencia para mst_primary en drm_dp_mst_handle_up_req() mientras se usa. v2: Se soluciona el problema de liberar la solicitud si falla la obtenci\u00f3n de una referencia mst_primary." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57800.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57800.json index 5211cb5e629..d67aff08de6 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57800.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57800.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:30.073", "lastModified": "2025-01-11T13:15:30.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: memalloc: prefer dma_mapping_error() over explicit address checking\n\nWith CONFIG_DMA_API_DEBUG enabled, the following warning is observed:\n\nDMA-API: snd_hda_intel 0000:03:00.1: device driver failed to check map error[device address=0x00000000ffff0000] [size=20480 bytes] [mapped as single]\nWARNING: CPU: 28 PID: 2255 at kernel/dma/debug.c:1036 check_unmap+0x1408/0x2430\nCPU: 28 UID: 42 PID: 2255 Comm: wireplumber Tainted: G W L 6.12.0-10-133577cad6bf48e5a7848c4338124081393bfe8a+ #759\ndebug_dma_unmap_page+0xe9/0xf0\nsnd_dma_wc_free+0x85/0x130 [snd_pcm]\nsnd_pcm_lib_free_pages+0x1e3/0x440 [snd_pcm]\nsnd_pcm_common_ioctl+0x1c9a/0x2960 [snd_pcm]\nsnd_pcm_ioctl+0x6a/0xc0 [snd_pcm]\n...\n\nCheck for returned DMA addresses using specialized dma_mapping_error()\nhelper which is generally recommended for this purpose by\nDocumentation/core-api/dma-api.rst." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: memalloc: prefer dma_mapping_error() over explicit address checking Con CONFIG_DMA_API_DEBUG habilitado, se observa la siguiente advertencia: DMA-API: snd_hda_intel 0000:03:00.1: el controlador del dispositivo no pudo verificar el mapa error[direcci\u00f3n del dispositivo=0x00000000ffff0000] [tama\u00f1o=20480 bytes] [mapped as single] ADVERTENCIA: CPU: 28 PID: 2255 en kernel/dma/debug.c:1036 check_unmap+0x1408/0x2430 CPU: 28 UID: 42 PID: 2255 Comm: wireplumber Tainted: GWL 6.12.0-10-133577cad6bf48e5a7848c4338124081393bfe8a+ #759 debug_dma_unmap_page+0xe9/0xf0 snd_dma_wc_free+0x85/0x130 [snd_pcm] snd_pcm_lib_free_pages+0x1e3/0x440 [snd_pcm] snd_pcm_common_ioctl+0x1c9a/0x2960 [snd_pcm] snd_pcm_ioctl+0x6a/0xc0 [snd_pcm] ... Verifique las direcciones DMA devueltas utilizando el asistente especializado dma_mapping_error() que generalmente se recomienda para este prop\u00f3sito en Documentation/core-api/dma-api.rst." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57801.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57801.json index 2b6ef3f7a76..ed9670bb238 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57801.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57801.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:11.713", "lastModified": "2025-01-15T13:15:11.713", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57802.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57802.json index 38f017338b7..bd47f3207b1 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57802.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57802.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:11.853", "lastModified": "2025-01-15T13:15:11.853", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57804.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57804.json index 9eea32330a8..7fe265e5ff3 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57804.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57804.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:30.233", "lastModified": "2025-01-11T13:15:30.233", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs\n\nThe driver, through the SAS transport, exposes a sysfs interface to\nenable/disable PHYs in a controller/expander setup. When multiple PHYs\nare disabled and enabled in rapid succession, the persistent and current\nconfig pages related to SAS IO unit/SAS Expander pages could get\ncorrupted.\n\nUse separate memory for each config request." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: mpi3mr: Se corrige el estado de PHY de las p\u00e1ginas de configuraci\u00f3n corruptas en sysfs El controlador, a trav\u00e9s del transporte SAS, expone una interfaz sysfs para habilitar o deshabilitar los PHY en una configuraci\u00f3n de controlador o expansor. Cuando se deshabilitan y habilitan varios PHY en r\u00e1pida sucesi\u00f3n, las p\u00e1ginas de configuraci\u00f3n persistentes y actuales relacionadas con la unidad SAS IO o las p\u00e1ginas del expansor SAS podr\u00edan corromperse. Utilice una memoria independiente para cada solicitud de configuraci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57805.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57805.json index acc7a2e4dd4..6806e80b155 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57805.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57805.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:30.420", "lastModified": "2025-01-11T13:15:30.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda-dai: Do not release the link DMA on STOP\n\nThe linkDMA should not be released on stop trigger since a stream re-start\nmight happen without closing of the stream. This leaves a short time for\nother streams to 'steal' the linkDMA since it has been released.\n\nThis issue is not easy to reproduce under normal conditions as usually\nafter stop the stream is closed, or the same stream is restarted, but if\nanother stream got in between the stop and start, like this:\naplay -Dhw:0,3 -c2 -r48000 -fS32_LE /dev/zero -d 120\nCTRL+z\naplay -Dhw:0,0 -c2 -r48000 -fS32_LE /dev/zero -d 120\n\nthen the link DMA channels will be mixed up, resulting firmware error or\ncrash." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: SOF: Intel: hda-dai: No libere el enlace DMA en STOP El linkDMA no debe liberarse en el disparador de detenci\u00f3n ya que podr\u00eda ocurrir un reinicio de transmisi\u00f3n sin cerrar la transmisi\u00f3n. Esto deja un corto tiempo para que otras transmisiones \"roben\" el linkDMA desde que se ha liberado. Este problema no es f\u00e1cil de reproducir en condiciones normales ya que generalmente despu\u00e9s de detener la transmisi\u00f3n se cierra, o se reinicia la misma transmisi\u00f3n, pero si otra transmisi\u00f3n se interpuso entre la detenci\u00f3n y el inicio, como esto: aplay -Dhw:0,3 -c2 -r48000 -fS32_LE /dev/zero -d 120 CTRL+z aplay -Dhw:0,0 -c2 -r48000 -fS32_LE /dev/zero -d 120 entonces los canales de enlace DMA se mezclar\u00e1n, lo que provocar\u00e1 un error o bloqueo del firmware." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57806.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57806.json index 4717e743cd7..18ec79990c7 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57806.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57806.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:30.597", "lastModified": "2025-01-11T13:15:30.597", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix transaction atomicity bug when enabling simple quotas\n\nSet squota incompat bit before committing the transaction that enables\nthe feature.\n\nWith the config CONFIG_BTRFS_ASSERT enabled, an assertion\nfailure occurs regarding the simple quota feature.\n\n [5.596534] assertion failed: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), in fs/btrfs/qgroup.c:365\n [5.597098] ------------[ cut here ]------------\n [5.597371] kernel BUG at fs/btrfs/qgroup.c:365!\n [5.597946] CPU: 1 UID: 0 PID: 268 Comm: mount Not tainted 6.13.0-rc2-00031-gf92f4749861b #146\n [5.598450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0\n [5.604303] \n [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.605538] ? exc_invalid_op+0x56/0x70\n [5.605775] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606066] ? asm_exc_invalid_op+0x1f/0x30\n [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0\n [5.607038] ? try_to_wake_up+0x317/0x760\n [5.607286] open_ctree+0xd9c/0x1710\n [5.607509] btrfs_get_tree+0x58a/0x7e0\n [5.608002] vfs_get_tree+0x2e/0x100\n [5.608224] fc_mount+0x16/0x60\n [5.608420] btrfs_get_tree+0x2f8/0x7e0\n [5.608897] vfs_get_tree+0x2e/0x100\n [5.609121] path_mount+0x4c8/0xbc0\n [5.609538] __x64_sys_mount+0x10d/0x150\n\nThe issue can be easily reproduced using the following reproducer:\n\n root@q:linux# cat repro.sh\n set -e\n\n mkfs.btrfs -q -f /dev/sdb\n mount /dev/sdb /mnt/btrfs\n btrfs quota enable -s /mnt/btrfs\n umount /mnt/btrfs\n mount /dev/sdb /mnt/btrfs\n\nThe issue is that when enabling quotas, at btrfs_quota_enable(), we set\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE at fs_info->qgroup_flags and persist\nit in the quota root in the item with the key BTRFS_QGROUP_STATUS_KEY, but\nwe only set the incompat bit BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA after we\ncommit the transaction used to enable simple quotas.\n\nThis means that if after that transaction commit we unmount the filesystem\nwithout starting and committing any other transaction, or we have a power\nfailure, the next time we mount the filesystem we will find the flag\nBTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE set in the item with the key\nBTRFS_QGROUP_STATUS_KEY but we will not find the incompat bit\nBTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA set in the superblock, triggering an\nassertion failure at:\n\n btrfs_read_qgroup_config() -> qgroup_read_enable_gen()\n\nTo fix this issue, set the BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA flag\nimmediately after setting the BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE.\nThis ensures that both flags are flushed to disk within the same\ntransaction." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: se corrige el error de atomicidad de transacciones al habilitar cuotas simples. Establezca el bit de incompatibilidad de squota antes de confirmar la transacci\u00f3n que habilita la funci\u00f3n. Con la configuraci\u00f3n CONFIG_BTRFS_ASSERT habilitada, se produce un error de afirmaci\u00f3n con respecto a la funci\u00f3n de cuota simple. [5.596534] Error de afirmaci\u00f3n: btrfs_fs_incompat(fs_info, SIMPLE_QUOTA), en fs/btrfs/qgroup.c:365 [5.597098] ------------[ corte aqu\u00ed ]------------ [5.597371] \u00a1ERROR del kernel en fs/btrfs/qgroup.c:365! [5.597946] CPU: 1 UID: 0 PID: 268 Comm: montaje No contaminado 6.13.0-rc2-00031-gf92f4749861b #146 [5.598450] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 01/04/2014 [5.599008] RIP: 0010:btrfs_read_qgroup_config+0x74d/0x7a0 [5.604303] [5.605230] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.605538] ? asm_exc_invalid_op+0x1f/0x30 [5.606441] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.606741] ? btrfs_read_qgroup_config+0x74d/0x7a0 [5.607038] ? intentar_activar+0x317/0x760 [5.607286] abrir_ctree+0xd9c/0x1710 [5.607509] btrfs_get_tree+0x58a/0x7e0 [5.608002] vfs_get_tree+0x2e/0x100 [5.608224] montaje_fc+0x16/0x60 [5.608420] btrfs_get_tree+0x2f8/0x7e0 [5.608897] vfs_get_tree+0x2e/0x100 [5.609121] montaje_ruta+0x4c8/0xbc0 [5.609538] __x64_sys_mount+0x10d/0x150 El problema se puede reproducir f\u00e1cilmente utilizando el siguiente reproductor: root@q:linux# cat repro.sh set -e mkfs.btrfs -q -f /dev/sdb mount /dev/sdb /mnt/btrfs btrfs quota enable -s /mnt/btrfs umount /mnt/btrfs mount /dev/sdb /mnt/btrfs El problema es que al habilitar cuotas, en btrfs_quota_enable(), configuramos BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE en fs_info->qgroup_flags y lo persistimos en la ra\u00edz de cuotas en el elemento con la clave BTRFS_QGROUP_STATUS_KEY, pero solo configuramos el bit de incompatibilidad BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA despu\u00e9s de que confirmamos la transacci\u00f3n utilizada para habilitar la cuota simple. Esto significa que si despu\u00e9s de esa confirmaci\u00f3n de transacci\u00f3n desmontamos el sistema de archivos sin iniciar y confirmar ninguna otra transacci\u00f3n, o tenemos un corte de energ\u00eda, la pr\u00f3xima vez que montemos el sistema de archivos encontraremos el indicador BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE establecido en el elemento con la clave BTRFS_QGROUP_STATUS_KEY pero no encontraremos el bit de incompatibilidad BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA establecido en el superbloque, lo que desencadena un error de aserci\u00f3n en: btrfs_read_qgroup_config() -> qgroup_read_enable_gen() Para solucionar este problema, configure el indicador BTRFS_FEATURE_INCOMPAT_SIMPLE_QUOTA inmediatamente despu\u00e9s de configurar BTRFS_QGROUP_STATUS_FLAG_SIMPLE_MODE. Esto garantiza que ambos indicadores se vac\u00eden en el disco dentro de la misma transacci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57809.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57809.json index 66ed4fd5d45..72070478c63 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57809.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57809.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T14:15:25.080", "lastModified": "2025-01-11T14:15:25.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: imx6: Fix suspend/resume support on i.MX6QDL\n\nThe suspend/resume functionality is currently broken on the i.MX6QDL\nplatform, as documented in the NXP errata (ERR005723):\n\n https://www.nxp.com/docs/en/errata/IMX6DQCE.pdf\n\nThis patch addresses the issue by sharing most of the suspend/resume\nsequences used by other i.MX devices, while avoiding modifications to\ncritical registers that disrupt the PCIe functionality. It targets the\nsame problem as the following downstream commit:\n\n https://github.com/nxp-imx/linux-imx/commit/4e92355e1f79d225ea842511fcfd42b343b32995\n\nUnlike the downstream commit, this patch also resets the connected PCIe\ndevice if possible. Without this reset, certain drivers, such as ath10k\nor iwlwifi, will crash on resume. The device reset is also done by the\ndriver on other i.MX platforms, making this patch consistent with\nexisting practices.\n\nUpon resuming, the kernel will hang and display an error. Here's an\nexample of the error encountered with the ath10k driver:\n\n ath10k_pci 0000:01:00.0: Unable to change power state from D3hot to D0, device inaccessible\n Unhandled fault: imprecise external abort (0x1406) at 0x0106f944\n\nWithout this patch, suspend/resume will fail on i.MX6QDL devices if a\nPCIe device is connected.\n\n[kwilczynski: commit log, added tag for stable releases]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: imx6: Se corrige la compatibilidad con suspender/reanudar en i.MX6QDL La funcionalidad de suspender/reanudar actualmente est\u00e1 rota en la plataforma i.MX6QDL, como se documenta en la errata de NXP (ERR005723): https://www.nxp.com/docs/en/errata/IMX6DQCE.pdf Este parche soluciona el problema al compartir la mayor\u00eda de las secuencias de suspensi\u00f3n/reanudaci\u00f3n utilizadas por otros dispositivos i.MX, al tiempo que evita las modificaciones en los registros cr\u00edticos que interrumpen la funcionalidad PCIe. Apunta al mismo problema que la siguiente confirmaci\u00f3n descendente: https://github.com/nxp-imx/linux-imx/commit/4e92355e1f79d225ea842511fcfd42b343b32995 A diferencia de la confirmaci\u00f3n descendente, este parche tambi\u00e9n restablece el dispositivo PCIe conectado si es posible. Sin este reinicio, ciertos controladores, como ath10k o iwlwifi, se bloquear\u00e1n al reanudar. El reinicio del dispositivo tambi\u00e9n lo realiza el controlador en otras plataformas i.MX, lo que hace que este parche sea coherente con las pr\u00e1cticas existentes. Al reanudar, el n\u00facleo se bloquear\u00e1 y mostrar\u00e1 un error. Aqu\u00ed hay un ejemplo del error encontrado con el controlador ath10k: ath10k_pci 0000:01:00.0: Unable to change power state from D3hot to D0, device inaccessible Unhandled fault: imprecise external abort (0x1406) at 0x0106f944 Sin este parche, la suspensi\u00f3n/reinicio fallar\u00e1 en los dispositivos i.MX6QDL si hay un dispositivo PCIe conectado. [kwilczynski: registro de confirmaciones, etiqueta agregada para versiones estables]" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json index 0cf615058a2..418ee8d4a01 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57822.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Raptor RDF Syntax Library through 2.0.16, there is a heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal()." + }, + { + "lang": "es", + "value": "En Raptor RDF Syntax Library hasta la versi\u00f3n 2.0.16, hay una sobrelectura de b\u00fafer basada en mont\u00f3n al analizar triples con el analizador nquads en raptor_ntriples_parse_term_internal()." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json index da2a79a6fd8..2e09159f767 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57823.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path()." + }, + { + "lang": "es", + "value": "En Raptor RDF Syntax Library hasta la versi\u00f3n 2.0.16, hay un desbordamiento de enteros al normalizar una URI con el analizador de tortugas en raptor_uri_normalize_path()." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57838.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57838.json index 104dc05c243..3c828fc43f7 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57838.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57838.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T14:15:25.940", "lastModified": "2025-01-11T14:15:25.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/entry: Mark IRQ entries to fix stack depot warnings\n\nThe stack depot filters out everything outside of the top interrupt\ncontext as an uninteresting or irrelevant part of the stack traces. This\nhelps with stack trace de-duplication, avoiding an explosion of saved\nstack traces that share the same IRQ context code path but originate\nfrom different randomly interrupted points, eventually exhausting the\nstack depot.\n\nFiltering uses in_irqentry_text() to identify functions within the\n.irqentry.text and .softirqentry.text sections, which then become the\nlast stack trace entries being saved.\n\nWhile __do_softirq() is placed into the .softirqentry.text section by\ncommon code, populating .irqentry.text is architecture-specific.\n\nCurrently, the .irqentry.text section on s390 is empty, which prevents\nstack depot filtering and de-duplication and could result in warnings\nlike:\n\nStack depot reached limit capacity\nWARNING: CPU: 0 PID: 286113 at lib/stackdepot.c:252 depot_alloc_stack+0x39a/0x3c8\n\nwith PREEMPT and KASAN enabled.\n\nFix this by moving the IO/EXT interrupt handlers from .kprobes.text into\nthe .irqentry.text section and updating the kprobes blacklist to include\nthe .irqentry.text section.\n\nThis is done only for asynchronous interrupts and explicitly not for\nprogram checks, which are synchronous and where the context beyond the\nprogram check is important to preserve. Despite machine checks being\nsomewhat in between, they are extremely rare, and preserving context\nwhen possible is also of value.\n\nSVCs and Restart Interrupts are not relevant, one being always at the\nboundary to user space and the other being a one-time thing.\n\nIRQ entries filtering is also optionally used in ftrace function graph,\nwhere the same logic applies." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/entry: Marcar entradas de IRQ para corregir advertencias del dep\u00f3sito de pila El dep\u00f3sito de pila filtra todo lo que est\u00e9 fuera del contexto de interrupci\u00f3n superior como una parte poco interesante o irrelevante de los seguimientos de pila. Esto ayuda con la desduplicaci\u00f3n del seguimiento de pila, evitando una explosi\u00f3n de seguimientos de pila guardados que comparten la misma ruta de c\u00f3digo de contexto de IRQ pero que se originan en diferentes puntos interrumpidos aleatoriamente, agotando eventualmente el dep\u00f3sito de pila. El filtrado utiliza in_irqentry_text() para identificar funciones dentro de las secciones .irqentry.text y .softirqentry.text, que luego se convierten en las \u00faltimas entradas del seguimiento de pila que se guardan. Si bien __do_softirq() se coloca en la secci\u00f3n .softirqentry.text por c\u00f3digo com\u00fan, completar .irqentry.text es espec\u00edfico de la arquitectura. Actualmente, la secci\u00f3n .irqentry.text en s390 est\u00e1 vac\u00eda, lo que impide el filtrado y la deduplicaci\u00f3n del dep\u00f3sito de pila y podr\u00eda generar advertencias como: El dep\u00f3sito de pila alcanz\u00f3 la capacidad l\u00edmite ADVERTENCIA: CPU: 0 PID: 286113 en lib/stackdepot.c:252 depot_alloc_stack+0x39a/0x3c8 con PREEMPT y KASAN habilitados. Solucione esto moviendo los controladores de interrupci\u00f3n IO/EXT de .kprobes.text a la secci\u00f3n .irqentry.text y actualizando la lista negra de kprobes para incluir la secci\u00f3n .irqentry.text. Esto se hace solo para interrupciones asincr\u00f3nicas y expl\u00edcitamente no para verificaciones de programa, que son sincr\u00f3nicas y donde es importante preservar el contexto m\u00e1s all\u00e1 de la verificaci\u00f3n de programa. A pesar de que las verificaciones de m\u00e1quina est\u00e1n algo en el medio, son extremadamente raras y preservar el contexto cuando sea posible tambi\u00e9n es valioso. Los SVC y las interrupciones de reinicio no son relevantes, uno siempre se encuentra en el l\u00edmite del espacio del usuario y el otro es algo que ocurre una sola vez. El filtrado de entradas IRQ tambi\u00e9n se utiliza de manera opcional en el gr\u00e1fico de funciones ftrace, donde se aplica la misma l\u00f3gica." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57839.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57839.json index b9824791d14..ee5ee3455ab 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57839.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57839.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.050", "lastModified": "2025-01-11T15:15:07.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"readahead: properly shorten readahead when falling back to do_page_cache_ra()\"\n\nThis reverts commit 7c877586da3178974a8a94577b6045a48377ff25.\n\nAnders and Philippe have reported that recent kernels occasionally hang\nwhen used with NFS in readahead code. The problem has been bisected to\n7c877586da3 (\"readahead: properly shorten readahead when falling back to\ndo_page_cache_ra()\"). The cause of the problem is that ra->size can be\nshrunk by read_pages() call and subsequently we end up calling\ndo_page_cache_ra() with negative (read huge positive) number of pages. \nLet's revert 7c877586da3 for now until we can find a proper way how the\nlogic in read_pages() and page_cache_ra_order() can coexist. This can\nlead to reduced readahead throughput due to readahead window confusion but\nthat's better than outright hangs." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"readahead: acortar correctamente el readahead al volver a do_page_cache_ra()\" Esto revierte el commit 7c877586da3178974a8a94577b6045a48377ff25. Anders y Philippe han informado de que los kernels recientes a veces se bloquean cuando se utilizan con NFS en el c\u00f3digo readahead. El problema se ha dividido en 7c877586da3 (\"readahead: acortar correctamente el readahead al volver a do_page_cache_ra()\"). La causa del problema es que ra->size se puede reducir mediante la llamada read_pages() y, posteriormente, terminamos llamando a do_page_cache_ra() con un n\u00famero de p\u00e1ginas negativo (leer positivo enorme). Revertiremos 7c877586da3 por ahora hasta que podamos encontrar una forma adecuada de que la l\u00f3gica en read_pages() y page_cache_ra_order() pueda coexistir. Esto puede provocar una reducci\u00f3n del rendimiento de lectura anticipada debido a la confusi\u00f3n de la ventana de lectura anticipada, pero es mejor que los bloqueos directos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57841.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57841.json index 93b6178d792..a7492c971e1 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57841.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57841.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:12.130", "lastModified": "2025-01-15T13:15:12.130", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57843.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57843.json index 100bef9ee57..a5debdbaddd 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57843.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57843.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.170", "lastModified": "2025-01-11T15:15:07.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: fix overflow inside virtnet_rq_alloc\n\nWhen the frag just got a page, then may lead to regression on VM.\nSpecially if the sysctl net.core.high_order_alloc_disable value is 1,\nthen the frag always get a page when do refill.\n\nWhich could see reliable crashes or scp failure (scp a file 100M in size\nto VM).\n\nThe issue is that the virtnet_rq_dma takes up 16 bytes at the beginning\nof a new frag. When the frag size is larger than PAGE_SIZE,\neverything is fine. However, if the frag is only one page and the\ntotal size of the buffer and virtnet_rq_dma is larger than one page, an\noverflow may occur.\n\nThe commit f9dac92ba908 (\"virtio_ring: enable premapped mode whatever\nuse_dma_api\") introduced this problem. And we reverted some commits to\nfix this in last linux version. Now we try to enable it and fix this\nbug directly.\n\nHere, when the frag size is not enough, we reduce the buffer len to fix\nthis problem." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio-net: se corrige el desbordamiento dentro de virtnet_rq_alloc Cuando el fragmento acaba de obtener una p\u00e1gina, puede provocar una regresi\u00f3n en la m\u00e1quina virtual. Especialmente si el valor de sysctl net.core.high_order_alloc_disable es 1, entonces el fragmento siempre obtiene una p\u00e1gina cuando se rellena. Lo que podr\u00eda provocar fallos fiables o fallos de SCP (enviar un archivo de 100 M de tama\u00f1o a la m\u00e1quina virtual). El problema es que virtnet_rq_dma ocupa 16 bytes al principio de un nuevo fragmento. Cuando el tama\u00f1o del fragmento es mayor que PAGE_SIZE, todo est\u00e1 bien. Sin embargo, si el fragmento es solo una p\u00e1gina y el tama\u00f1o total del b\u00fafer y virtnet_rq_dma es mayor que una p\u00e1gina, puede producirse un desbordamiento. El commit f9dac92ba908 (\"virtio_ring: habilitar el modo premapeado sea cual sea el uso de_dma_api\") introdujo este problema. Y revertimos algunas confirmaciones para solucionar este problema en la \u00faltima versi\u00f3n de Linux. Ahora intentamos habilitarlo y solucionar este error directamente. Aqu\u00ed, cuando el tama\u00f1o del fragmento no es suficiente, reducimos la longitud del b\u00fafer para solucionar este problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json index 2bcaa2781f2..916852913a0 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57844.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:12.277", "lastModified": "2025-01-15T13:15:12.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json index 3f46b1aedcc..71aacc159c7 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57849.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.290", "lastModified": "2025-01-11T15:15:07.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/cpum_sf: Handle CPU hotplug remove during sampling\n\nCPU hotplug remove handling triggers the following function\ncall sequence:\n\n CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu()\n ...\n CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu()\n\nThe s390 CPUMF sampling CPU hotplug handler invokes:\n\n s390_pmu_sf_offline_cpu()\n +--> cpusf_pmu_setup()\n +--> setup_pmc_cpu()\n +--> deallocate_buffers()\n\nThis function de-allocates all sampling data buffers (SDBs) allocated\nfor that CPU at event initialization. It also clears the\nPMU_F_RESERVED bit. The CPU is gone and can not be sampled.\n\nWith the event still being active on the removed CPU, the CPU event\nhotplug support in kernel performance subsystem triggers the\nfollowing function calls on the removed CPU:\n\n perf_event_exit_cpu()\n +--> perf_event_exit_cpu_context()\n +--> __perf_event_exit_context()\n\t +--> __perf_remove_from_context()\n\t +--> event_sched_out()\n\t +--> cpumsf_pmu_del()\n\t +--> cpumsf_pmu_stop()\n +--> hw_perf_event_update()\n\nto stop and remove the event. During removal of the event, the\nsampling device driver tries to read out the remaining samples from\nthe sample data buffers (SDBs). But they have already been freed\n(and may have been re-assigned). This may lead to a use after free\nsituation in which case the samples are most likely invalid. In the\nbest case the memory has not been reassigned and still contains\nvalid data.\n\nRemedy this situation and check if the CPU is still in reserved\nstate (bit PMU_F_RESERVED set). In this case the SDBs have not been\nreleased an contain valid data. This is always the case when\nthe event is removed (and no CPU hotplug off occured).\nIf the PMU_F_RESERVED bit is not set, the SDB buffers are gone." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/cpum_sf: Controlar la eliminaci\u00f3n de hotplug de la CPU durante el muestreo El manejo de la eliminaci\u00f3n de hotplug de la CPU activa la siguiente secuencia de llamada de funci\u00f3n: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() El controlador de hotplug de la CPU de muestreo s390 CPUMF invoca: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() Esta funci\u00f3n anula la asignaci\u00f3n de todos los b\u00faferes de datos de muestreo (SDB) asignados para esa CPU en la inicializaci\u00f3n del evento. Tambi\u00e9n borra el bit PMU_F_RESERVED. La CPU desaparece y no se puede muestrear. Mientras el evento sigue activo en la CPU eliminada, la compatibilidad con hot plug de eventos de CPU en el subsistema de rendimiento del n\u00facleo activa las siguientes llamadas de funci\u00f3n en la CPU eliminada: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del() +--> cpumsf_pmu_stop() +--> hw_perf_event_update() para detener y eliminar el evento. Durante la eliminaci\u00f3n del evento, el controlador del dispositivo de muestreo intenta leer las muestras restantes de los b\u00faferes de datos de muestra (SDB). Pero ya se han liberado (y es posible que se hayan reasignado). Esto puede provocar una situaci\u00f3n de use after free, en cuyo caso es muy probable que las muestras no sean v\u00e1lidas. En el mejor de los casos, la memoria no se ha reasignado y a\u00fan contiene datos v\u00e1lidos. Solucione esta situaci\u00f3n y compruebe si la CPU sigue en estado reservado (bit PMU_F_RESERVED activado). En este caso, los SDB no se han liberado y contienen datos v\u00e1lidos. Esto siempre ocurre cuando se elimina el evento (y no se ha producido ninguna desconexi\u00f3n en caliente de la CPU). Si el bit PMU_F_RESERVED no est\u00e1 activado, los b\u00faferes SDB desaparecen." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json index 452c3abca3d..e00a415dced 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57850.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.423", "lastModified": "2025-01-11T15:15:07.423", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Prevent rtime decompress memory corruption\n\nThe rtime decompression routine does not fully check bounds during the\nentirety of the decompression pass and can corrupt memory outside the\ndecompression buffer if the compressed data is corrupted. This adds the\nrequired check to prevent this failure mode." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jffs2: evitar la corrupci\u00f3n de la memoria de descompresi\u00f3n de rtime La rutina de descompresi\u00f3n de rtime no comprueba completamente los l\u00edmites durante la totalidad del paso de descompresi\u00f3n y puede da\u00f1ar la memoria fuera del b\u00fafer de descompresi\u00f3n si los datos comprimidos est\u00e1n da\u00f1ados. Esto agrega la verificaci\u00f3n requerida para evitar este modo de falla." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57857.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57857.json index 166d9624b04..7806907f028 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57857.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57857.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:12.403", "lastModified": "2025-01-15T13:15:12.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json index 3e3bc9cf206..6d854a265ff 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.680", "lastModified": "2025-01-11T15:15:07.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL\n\nCurrently tagged_addr_ctrl_set() doesn't initialize the temporary 'ctrl'\nvariable, and a SETREGSET call with a length of zero will leave this\nuninitialized. Consequently tagged_addr_ctrl_set() will consume an\narbitrary value, potentially leaking up to 64 bits of memory from the\nkernel stack. The read is limited to a specific slot on the stack, and\nthe issue does not provide a write mechanism.\n\nAs set_tagged_addr_ctrl() only accepts values where bits [63:4] zero and\nrejects other values, a partial SETREGSET attempt will randomly succeed\nor fail depending on the value of the uninitialized value, and the\nexposure is significantly limited.\n\nFix this by initializing the temporary value before copying the regset\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\nvalue of the tagged address ctrl will be retained.\n\nThe NT_ARM_TAGGED_ADDR_CTRL regset is only visible in the\nuser_aarch64_view used by a native AArch64 task to manipulate another\nnative AArch64 task. As get_tagged_addr_ctrl() only returns an error\nvalue when called for a compat task, tagged_addr_ctrl_get() and\ntagged_addr_ctrl_set() should never observe an error value from\nget_tagged_addr_ctrl(). Add a WARN_ON_ONCE() to both to indicate that\nsuch an error would be unexpected, and error handlnig is not missing in\neither case." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: arreglo de SETREGSET parcial para NT_ARM_TAGGED_ADDR_CTRL Actualmente, tagged_addr_ctrl_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, tagged_addr_ctrl_set() consumir\u00e1 un valor arbitrario, lo que potencialmente filtrar\u00e1 hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Como set_tagged_addr_ctrl() solo acepta valores donde los bits [63:4] sean cero y rechaza otros valores, un intento de SETREGSET parcial tendr\u00e1 \u00e9xito o fallar\u00e1 aleatoriamente dependiendo del valor del valor no inicializado, y la exposici\u00f3n es significativamente limitada. Solucione esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1 el valor existente de la direcci\u00f3n etiquetada ctrl. El conjunto de registros NT_ARM_TAGGED_ADDR_CTRL solo es visible en la vista user_aarch64_view utilizada por una tarea nativa de AArch64 para manipular otra tarea nativa de AArch64. Como get_tagged_addr_ctrl() solo devuelve un valor de error cuando se llama para una tarea de compatibilidad, tagged_addr_ctrl_get() y tagged_addr_ctrl_set() nunca deben observar un valor de error de get_tagged_addr_ctrl(). Agregue un WARN_ON_ONCE() a ambos para indicar que dicho error ser\u00eda inesperado y que el manejo de errores no falta en ninguno de los casos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57875.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57875.json index 3557d46c889..b07e2dafcd4 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57875.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57875.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.803", "lastModified": "2025-01-11T15:15:07.803", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: RCU protect disk->conv_zones_bitmap\n\nEnsure that a disk revalidation changing the conventional zones bitmap\nof a disk does not cause invalid memory references when using the\ndisk_zone_is_conv() helper by RCU protecting the disk->conv_zones_bitmap\npointer.\n\ndisk_zone_is_conv() is modified to operate under the RCU read lock and\nthe function disk_set_conv_zones_bitmap() is added to update a disk\nconv_zones_bitmap pointer using rcu_replace_pointer() with the disk\nzone_wplugs_lock spinlock held.\n\ndisk_free_zone_resources() is modified to call\ndisk_update_zone_resources() with a NULL bitmap pointer to free the disk\nconv_zones_bitmap. disk_set_conv_zones_bitmap() is also used in\ndisk_update_zone_resources() to set the new (revalidated) bitmap and\nfree the old one." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: RCU protege disk->conv_zones_bitmap Aseg\u00farese de que una revalidaci\u00f3n de disco que cambia el mapa de bits de las zonas convencionales de un disco no cause referencias de memoria no v\u00e1lidas cuando se usa el asistente disk_zone_is_conv() mediante la protecci\u00f3n por RCU del puntero disk->conv_zones_bitmap. disk_zone_is_conv() se modifica para que funcione bajo el bloqueo de lectura de RCU y se agrega la funci\u00f3n disk_set_conv_zones_bitmap() para actualizar un puntero conv_zones_bitmap de disco usando rcu_replace_pointer() con el bloqueo giratorio zone_wplugs_lock de disco retenido. disk_free_zone_resources() se modifica para llamar a disk_update_zone_resources() con un puntero de mapa de bits NULL para liberar el disco conv_zones_bitmap. disk_set_conv_zones_bitmap() tambi\u00e9n se utiliza en disk_update_zone_resources() para establecer el nuevo mapa de bits (revalidado) y liberar el antiguo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57876.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57876.json index d381d206526..d1c99c63fff 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57876.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57876.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.930", "lastModified": "2025-01-11T15:15:07.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Fix resetting msg rx state after topology removal\n\nIf the MST topology is removed during the reception of an MST down reply\nor MST up request sideband message, the\ndrm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset\nfrom one thread via drm_dp_mst_topology_mgr_set_mst(false), racing with\nthe reading/parsing of the message from another thread via\ndrm_dp_mst_handle_down_rep() or drm_dp_mst_handle_up_req(). The race is\npossible since the reader/parser doesn't hold any lock while accessing\nthe reception state. This in turn can lead to a memory corruption in the\nreader/parser as described by commit bd2fccac61b4 (\"drm/dp_mst: Fix MST\nsideband message body length check\").\n\nFix the above by resetting the message reception state if needed before\nreading/parsing a message. Another solution would be to hold the\ndrm_dp_mst_topology_mgr::lock for the whole duration of the message\nreception/parsing in drm_dp_mst_handle_down_rep() and\ndrm_dp_mst_handle_up_req(), however this would require a bigger change.\nSince the fix is also needed for stable, opting for the simpler solution\nin this patch." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/dp_mst: Se soluciona el restablecimiento del estado de recepci\u00f3n del mensaje despu\u00e9s de la eliminaci\u00f3n de la topolog\u00eda Si se elimina la topolog\u00eda MST durante la recepci\u00f3n de un mensaje de banda lateral de respuesta de baja de MST o de solicitud de subida de MST, los estados drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv podr\u00edan restablecerse desde un hilo mediante drm_dp_mst_topology_mgr_set_mst(false), compitiendo con la lectura/an\u00e1lisis del mensaje desde otro hilo mediante drm_dp_mst_handle_down_rep() o drm_dp_mst_handle_up_req(). La competencia es posible ya que el lector/analizador no mantiene ning\u00fan bloqueo mientras accede al estado de recepci\u00f3n. Esto, a su vez, puede provocar una corrupci\u00f3n de memoria en el lector/analizador, como se describe en el commit bd2fccac61b4 (\"drm/dp_mst: Fix MST sideband message body length check\"). Corrija lo anterior restableciendo el estado de recepci\u00f3n del mensaje si es necesario antes de leer/analizar un mensaje. Otra soluci\u00f3n ser\u00eda mantener el bloqueo drm_dp_mst_topology_mgr::lock durante toda la duraci\u00f3n de la recepci\u00f3n/an\u00e1lisis del mensaje en drm_dp_mst_handle_down_rep() y drm_dp_mst_handle_up_req(), sin embargo, esto requerir\u00eda un cambio mayor. Dado que la correcci\u00f3n tambi\u00e9n es necesaria para la versi\u00f3n estable, se opta por la soluci\u00f3n m\u00e1s simple en este parche." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json index b3b7d31ebd5..7ed3b4b17ec 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:08.063", "lastModified": "2025-01-11T15:15:08.063", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: ptrace: fix partial SETREGSET for NT_ARM_POE\n\nCurrently poe_set() doesn't initialize the temporary 'ctrl' variable,\nand a SETREGSET call with a length of zero will leave this\nuninitialized. Consequently an arbitrary value will be written back to\ntarget->thread.por_el0, potentially leaking up to 64 bits of memory from\nthe kernel stack. The read is limited to a specific slot on the stack,\nand the issue does not provide a write mechanism.\n\nFix this by initializing the temporary value before copying the regset\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\ncontents of POR_EL1 will be retained.\n\nBefore this patch:\n\n| # ./poe-test\n| Attempting to write NT_ARM_POE::por_el0 = 0x900d900d900d900d\n| SETREGSET(nt=0x40f, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_POE::por_el0\n| GETREGSET(nt=0x40f, len=8) read 8 bytes\n| Read NT_ARM_POE::por_el0 = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_POE (zero length)\n| SETREGSET(nt=0x40f, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_POE::por_el0\n| GETREGSET(nt=0x40f, len=8) read 8 bytes\n| Read NT_ARM_POE::por_el0 = 0xffff8000839c3d50\n\nAfter this patch:\n\n| # ./poe-test\n| Attempting to write NT_ARM_POE::por_el0 = 0x900d900d900d900d\n| SETREGSET(nt=0x40f, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_POE::por_el0\n| GETREGSET(nt=0x40f, len=8) read 8 bytes\n| Read NT_ARM_POE::por_el0 = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_POE (zero length)\n| SETREGSET(nt=0x40f, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_POE::por_el0\n| GETREGSET(nt=0x40f, len=8) read 8 bytes\n| Read NT_ARM_POE::por_el0 = 0x900d900d900d900d" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_POE Actualmente, poe_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target->thread.por_el0, lo que podr\u00eda provocar una fuga de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de POR_EL1. Antes de este parche: | # ./poe-test | Intentando escribir NT_ARM_POE::por_el0 = 0x900d900d900d900d | SETREGSET(nt=0x40f, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_POE::por_el0 = 0x900d900d900d900d | | Intentando escribir NT_ARM_POE (longitud cero) | SETREGSET(nt=0x40f, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Leer NT_ARM_POE::por_el0 = 0xffff8000839c3d50 Despu\u00e9s de este parche: | # ./poe-test | Intentando escribir NT_ARM_POE::por_el0 = 0x900d900d900d900d | SETREGSET(nt=0x40f, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Leer NT_ARM_POE::por_el0 = 0x900d900d900d900d | | Intentando escribir NT_ARM_POE (longitud cero) | SETREGSET(nt=0x40f, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) leer 8 bytes | Leer NT_ARM_POE::por_el0 = 0x900d900d900d900d" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json index f66473ac391..937a599951a 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:08.190", "lastModified": "2025-01-11T15:15:08.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR\n\nCurrently fpmr_set() doesn't initialize the temporary 'fpmr' variable,\nand a SETREGSET call with a length of zero will leave this\nuninitialized. Consequently an arbitrary value will be written back to\ntarget->thread.uw.fpmr, potentially leaking up to 64 bits of memory from\nthe kernel stack. The read is limited to a specific slot on the stack,\nand the issue does not provide a write mechanism.\n\nFix this by initializing the temporary value before copying the regset\nfrom userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,\nNT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing\ncontents of FPMR will be retained.\n\nBefore this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0xffff800083963d50\n\nAfter this patch:\n\n| # ./fpmr-test\n| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n| SETREGSET(nt=0x40e, len=8) wrote 8 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d\n|\n| Attempting to write NT_ARM_FPMR (zero length)\n| SETREGSET(nt=0x40e, len=0) wrote 0 bytes\n|\n| Attempting to read NT_ARM_FPMR::fpmr\n| GETREGSET(nt=0x40e, len=8) read 8 bytes\n| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_FPMR Actualmente, fpmr_set() no inicializa la variable temporal 'fpmr', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target->thread.uw.fpmr, lo que podr\u00eda provocar una p\u00e9rdida de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de FPMR. Antes de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0xffff800083963d50 Despu\u00e9s de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) leer 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57879.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57879.json index 1d8f193e455..6ce400af469 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57879.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57879.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:08.317", "lastModified": "2025-01-11T15:15:08.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: iso: Always release hdev at the end of iso_listen_bis\n\nSince hci_get_route holds the device before returning, the hdev\nshould be released with hci_dev_put at the end of iso_listen_bis\neven if the function returns with an error." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: iso: Siempre liberar hdev al final de iso_listen_bis Dado que hci_get_route retiene el dispositivo antes de regresar, el hdev debe liberarse con hci_dev_put al final de iso_listen_bis incluso si la funci\u00f3n regresa con un error." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57880.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57880.json index 4af96d7dec6..b5baa5e093c 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57880.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57880.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:08.440", "lastModified": "2025-01-11T15:15:08.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Add space for a terminator into DAIs array\n\nThe code uses the initialised member of the asoc_sdw_dailink struct to\ndetermine if a member of the array is in use. However in the case the\narray is completely full this will lead to an access 1 past the end of\nthe array, expand the array by one entry to include a space for a\nterminator." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: sof_sdw: Agregar espacio para un terminador en la matriz DAI El c\u00f3digo utiliza el miembro inicializado de la estructura asoc_sdw_dailink para determinar si un miembro de la matriz est\u00e1 en uso. Sin embargo, en el caso de que la matriz est\u00e9 completamente llena, esto provocar\u00e1 un acceso 1 m\u00e1s all\u00e1 del final de la matriz, expandir\u00e1 la matriz en una entrada para incluir un espacio para un terminador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57882.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57882.json index f093a6e57d9..2178823ebe5 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57882.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57882.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:12.510", "lastModified": "2025-01-15T13:15:12.510", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57884.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57884.json index f8e72d15942..b4b43fd6278 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57884.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57884.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:12.757", "lastModified": "2025-01-15T13:15:12.757", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57885.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57885.json index 7f44b75c86d..d73d1f53e36 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57885.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:12.893", "lastModified": "2025-01-15T13:15:12.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57886.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57886.json index 67ce6197be0..81de3af5baf 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57886.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57886.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.010", "lastModified": "2025-01-15T13:15:13.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57887.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57887.json index b56569e900b..59018699ca9 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57887.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57887.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.130", "lastModified": "2025-01-17T14:15:32.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57889.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57889.json index 2fce41ee4bb..cee9c7e26ab 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57889.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57889.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.347", "lastModified": "2025-01-15T13:15:13.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57890.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57890.json index 2b51b974697..2ecffbe746a 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57890.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57890.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.473", "lastModified": "2025-01-15T13:15:13.473", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57891.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57891.json index 6ffbd8d0979..f9262d44d4f 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57891.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57891.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.590", "lastModified": "2025-01-15T13:15:13.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57892.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57892.json index 26d86991d81..b367ec56568 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57892.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57892.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.710", "lastModified": "2025-01-17T14:15:32.740", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json index 2fd5e4890b9..29bbc299348 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57893.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.820", "lastModified": "2025-01-15T13:15:13.820", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57894.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57894.json index 346ea6e8e1d..6068187edc1 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57894.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57894.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:13.943", "lastModified": "2025-01-15T13:15:13.943", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57895.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57895.json index 0f7daedbb78..fd4e21b8233 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57895.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57895.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.060", "lastModified": "2025-01-15T13:15:14.060", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57896.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57896.json index e046c90a670..7f53617188c 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57896.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57896.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.200", "lastModified": "2025-01-15T13:15:14.200", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57897.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57897.json index b18468fb048..3140f7bcadc 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57897.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57897.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.317", "lastModified": "2025-01-15T13:15:14.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57898.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57898.json index 2857b59cffb..8ee78f54f35 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57898.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57898.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.427", "lastModified": "2025-01-15T13:15:14.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57899.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57899.json index 068896a73bd..19dc11ab29c 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57899.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57899.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.540", "lastModified": "2025-01-15T13:15:14.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57900.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57900.json index 133c4f9cbd5..a48cd9d4b08 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57900.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57900.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.633", "lastModified": "2025-01-15T13:15:14.633", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json index 50e1c5216e9..2b332c08c7c 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57901.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.747", "lastModified": "2025-01-15T13:15:14.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json index b9f43db735c..5dca548ddd2 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57902.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.867", "lastModified": "2025-01-15T13:15:14.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57903.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57903.json index 65f29060b33..7cdef23fbd6 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57903.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57903.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:14.973", "lastModified": "2025-01-15T13:15:14.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5743.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5743.json index 4f8ac939710..9fe653999af 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5743.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5743.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-01-13T18:15:19.517", "lastModified": "2025-01-13T18:15:19.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker could exploit the 'Use of Password Hash With Insufficient Computational Effort' vulnerability in EveHome Eve Play to execute arbitrary code.\n\nThis issue affects Eve Play: through 1.1.42." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda aprovechar la vulnerabilidad \"Uso de hash de contrase\u00f1a con esfuerzo computacional insuficiente\" en EveHome Eve Play para ejecutar c\u00f3digo arbitrario. Este problema afecta a Eve Play: hasta la versi\u00f3n 1.1.42." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5872.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5872.json index 93f724ba50e..09aae123eeb 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5872.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5872.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T21:15:13.367", "lastModified": "2025-01-10T21:15:13.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "On affected platforms running Arista EOS, a specially crafted packet with incorrect VLAN tag might be copied to CPU, which may cause incorrect control plane behavior related to the packet, such as route flaps, multicast routes learnt, etc." + }, + { + "lang": "es", + "value": "En las plataformas afectadas que ejecutan Arista EOS, es posible que se copie en la CPU un paquete especialmente manipulado con una etiqueta VLAN incorrecta, lo que puede provocar un comportamiento incorrecto del plano de control relacionado con el paquete, como fluctuaciones de ruta, rutas de multidifusi\u00f3n aprendidas, etc." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6342.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6342.json index 36544a7fba4..b9d84d7af82 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6342.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6342.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-09-10T02:15:10.063", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6352.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6352.json index 0362c2cffce..b9444e25152 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6352.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6352.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@silabs.com", "published": "2025-01-13T17:15:17.367", "lastModified": "2025-01-13T18:15:19.887", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malformed packet can cause a buffer overflow in the APS layer of the Ember ZNet stack and lead to an assert" + }, + { + "lang": "es", + "value": "Un paquete malformado puede provocar un desbordamiento de b\u00fafer en la capa APS de la pila Ember ZNet y generar una aserci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6437.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6437.json index db79fdfb7a2..a552b923d49 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6437.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6437.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T20:15:30.817", "lastModified": "2025-01-10T20:15:30.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "On affected platforms running Arista EOS with one of the following features configured to redirect IP traffic to a next hop: policy-based routing (PBR), BGP Flowspec, or interface traffic policy -- certain IP traffic such as IPv4 packets with IP options may bypass the feature's set nexthop\u00a0action and be slow-path forwarded (FIB routed) by the kernel as the packets are trapped to the CPU instead of following the redirect action's destination." + }, + { + "lang": "es", + "value": "En las plataformas afectadas que ejecutan Arista EOS con una de las siguientes funciones configuradas para redirigir el tr\u00e1fico IP a un siguiente salto: enrutamiento basado en pol\u00edticas (PBR), BGP Flowspec o pol\u00edtica de tr\u00e1fico de interfaz, cierto tr\u00e1fico IP, como los paquetes IPv4 con opciones IP, pueden omitir la acci\u00f3n de siguiente salto establecida por la funci\u00f3n y ser reenviados por ruta lenta (enrutados FIB) por el kernel a medida que los paquetes quedan atrapados en la CPU en lugar de seguir el destino de la acci\u00f3n de redirecci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6662.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6662.json index 859726292f9..fb68bf49b33 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6662.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6662.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cvd@cert.pl", "published": "2025-01-10T18:15:26.140", "lastModified": "2025-01-10T18:15:26.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Websites managed by MegaBIP in versions below 5.15 are vulnerable to Cross-Site Request Forgery (CSRF) as the form available under\u00a0\"/edytor/index.php?id=7,7,0\" lacks protection mechanisms.\nA user could be tricked into visiting a malicious website, which would send POST request to this endpoint. If the victim is a logged in administrator, this could lead to creation of new accounts and granting of administrative permissions." + }, + { + "lang": "es", + "value": "Los sitios web administrados por MegaBIP en versiones anteriores a la 5.15 son vulnerables a Cross-Site Request Forgery (CSRF), ya que el formulario disponible en \"/edytor/index.php?id=7,7,0\" carece de mecanismos de protecci\u00f3n. Se podr\u00eda enga\u00f1ar a un usuario para que visite un sitio web malicioso, que enviar\u00eda una solicitud POST a este endpoint. Si la v\u00edctima es un administrador conectado, esto podr\u00eda dar lugar a la creaci\u00f3n de nuevas cuentas y la concesi\u00f3n de permisos administrativos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6880.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6880.json index 03d55a79737..ef142eebbb6 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6880.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6880.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cvd@cert.pl", "published": "2025-01-10T18:15:26.350", "lastModified": "2025-01-10T18:15:26.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "During MegaBIP installation process, a user is encouraged to change a default path to administrative portal, as keeping it secret is listed by the author as one of the protection mechanisms.\u00a0\nPublicly available source code of \"/registered.php\" discloses that path, allowing an attacker to attempt further attacks.\u00a0\u00a0\n\nThis issue affects MegaBIP software versions below 5.15" + }, + { + "lang": "es", + "value": "Durante el proceso de instalaci\u00f3n de MegaBIP, se recomienda al usuario cambiar la ruta predeterminada al portal administrativo, ya que el autor indica que mantenerla en secreto es uno de los mecanismos de protecci\u00f3n. El c\u00f3digo fuente disponible p\u00fablicamente de \"/registered.php\" revela esa ruta, lo que permite a un atacante intentar realizar m\u00e1s ataques. Este problema afecta a las versiones de software de MegaBIP anteriores a la 5.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7085.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7085.json index 2cd3f141d05..cde3aaad0b6 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7085.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7085.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@opentext.com", "published": "2025-01-15T17:15:18.773", "lastModified": "2025-01-15T17:15:18.773", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText\u2122 Solutions Business Manager (SBM) allows Stored XSS.\u00a0\n\nThe vulnerability could result in the exposure of private information to an unauthorized actor. \n\nThis issue affects Solutions Business Manager (SBM): through 12.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en OpenText\u2122 Solutions Business Manager (SBM) permite XSS almacenado. La vulnerabilidad podr\u00eda provocar la exposici\u00f3n de informaci\u00f3n privada a un actor no autorizado. Este problema afecta a Solutions Business Manager (SBM): hasta la versi\u00f3n 12.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7095.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7095.json index 32e06881f34..5c6b68fccc2 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7095.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7095.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T21:15:13.570", "lastModified": "2025-01-14T15:15:27.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7142.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7142.json index ba10fe9e0e5..238762bfaea 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7142.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7142.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.403", "lastModified": "2025-01-10T22:15:26.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Arista CloudVision Appliance (CVA) affected releases running on appliances that support hardware disk encryption (DCA-350E-CV only), the disk encryption might not be successfully performed. This results in the disks remaining unsecured and data on them" + }, + { + "lang": "es", + "value": "En las versiones afectadas de Arista CloudVision Appliance (CVA) que se ejecutan en dispositivos que admiten el cifrado de discos de hardware (solo DCA-350E-CV), es posible que el cifrado de discos no se realice correctamente. Esto hace que los discos permanezcan sin protecci\u00f3n y los datos que contienen" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json index ac0a1328119..c85679136e4 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-13T06:15:05.777", "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7322.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7322.json index 07fa8727ffd..c61c393bc9c 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7322.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7322.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@silabs.com", "published": "2025-01-15T08:15:26.177", "lastModified": "2025-01-15T08:15:26.177", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted rejoin response is received, this change\u00a0in node ID causes Denial of Service (DoS). To recover from this DoS, the network must be re-established" + }, + { + "lang": "es", + "value": "Un coordinador, enrutador o dispositivo final de ZigBee puede cambiar su ID de nodo cuando recibe una respuesta de reincorporaci\u00f3n cifrada no solicitada. Este cambio en la ID del nodo provoca una denegaci\u00f3n de servicio (DoS). Para recuperarse de esta denegaci\u00f3n de servicio, se debe restablecer la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7344.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7344.json index 2d987bc6a0d..5e99c5f21d3 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7344.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7344.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cret@cert.org", "published": "2025-01-14T14:15:34.930", "lastModified": "2025-01-14T17:15:20.383", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Howyar UEFI Application \"Reloader\" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n Howyar UEFI Application \"Reloader\" (32 bits y 64 bits) es vulnerable a la ejecuci\u00f3n de software no firmado en una ruta codificada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7347.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7347.json index a88da43294f..84accd55bf7 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7347.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-14T15:15:31.870", "lastModified": "2024-11-21T09:51:20.560", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7606.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7606.json index 22d4b01b2a4..930b00b754a 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7606.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7606.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-29T11:15:28.757", "lastModified": "2024-08-30T15:43:41.773", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7607.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7607.json index 1824012994a..c74c4d2e569 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7607.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7607.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-29T11:15:28.963", "lastModified": "2024-08-30T15:41:02.407", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json index 54e57aa52eb..71fe8418225 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json @@ -3,7 +3,7 @@ "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-22T18:15:10.553", "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8148.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8148.json index 26e84128301..10ded4c6c4d 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8148.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8148.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:08.633", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8149.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8149.json index e2ede265283..ab8e69d027c 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8149.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8149.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:08.833", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8234.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8234.json index c34eb71aa85..0e3d70b108f 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8234.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8234.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-08-30T01:15:03.797", "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8603.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8603.json index 11b8f8cb317..2ef0cc9f4a3 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8603.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8603.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-01-15T16:15:32.190", "lastModified": "2025-01-15T16:15:32.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A \u201cUse of a Broken or Risky Cryptographic Algorithm\u201d vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services on impacted devices." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de \u201cUso de un algoritmo criptogr\u00e1fico roto o arriesgado\u201d en el componente SSL/TLS utilizado en versiones de B&R Automation Runtime anteriores a 6.1 y en versiones de B&R mapp View anteriores a 6.1 podr\u00eda ser aprovechada por atacantes no autenticados basados ??en la red para hacerse pasar por servicios en los dispositivos afectados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8748.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8748.json index 86823c84cf0..2e11cbbda30 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8748.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8748.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-12-03T02:15:17.620", "lastModified": "2024-12-03T02:15:17.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json index 68ef7dfb3d0..93bdcf0d8ad 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-12-03T07:15:04.230", "lastModified": "2024-12-03T07:15:04.230", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9131.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9131.json index b56d8c00ce7..631c9a7a0b8 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9131.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9131.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.667", "lastModified": "2025-01-10T22:15:26.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A user with administrator privileges can perform command injection" + }, + { + "lang": "es", + "value": "Un usuario con privilegios de administrador puede realizar la inyecci\u00f3n de comandos" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9132.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9132.json index d980ef116da..223796c506e 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9132.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9132.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.783", "lastModified": "2025-01-10T22:15:26.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrator is able to configure an insecure captive portal script" + }, + { + "lang": "es", + "value": "El administrador puede configurar un script de portal cautivo inseguro" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9133.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9133.json index 527f24e8454..094f9665a5f 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9133.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9133.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:26.907", "lastModified": "2025-01-10T22:15:26.907", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A user with administrator privileges is able to retrieve authentication tokens" + }, + { + "lang": "es", + "value": "Un usuario con privilegios de administrador puede recuperar tokens de autenticaci\u00f3n" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9134.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9134.json index 230a02daf5e..1ea8676bdd6 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9134.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9134.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:27.033", "lastModified": "2025-01-10T22:15:27.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL Injection vulnerabilities exist in the reporting application. A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges." + }, + { + "lang": "es", + "value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en la aplicaci\u00f3n de informes. Un usuario con derechos de acceso avanzados a la aplicaci\u00f3n de informes puede aprovechar la inyecci\u00f3n SQL, lo que le permitir\u00e1 ejecutar comandos en el sistema operativo subyacente con privilegios elevados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json index 0a45e9d8c22..7788da052b2 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-05T12:15:02.897", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9188.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9188.json index bc7c89350fd..2b9156560ca 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9188.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9188.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@arista.com", "published": "2025-01-10T22:15:27.150", "lastModified": "2025-01-10T22:15:27.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Specially constructed queries cause cross platform scripting leaking administrator tokens" + }, + { + "lang": "es", + "value": "Las consultas especialmente construidas provocan que los tokens de administrador se filtren en secuencias de comandos multiplataforma" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9197.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9197.json index 0c3b3941f1b..654a1e4d7ff 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9197.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-12-03T02:15:17.773", "lastModified": "2024-12-03T02:15:17.773", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9200.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9200.json index ef784febe2c..1546a5c9f9b 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9200.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9200.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-12-03T02:15:17.913", "lastModified": "2024-12-03T02:15:17.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json index 1b1675c6737..2d0524b8b59 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9314.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-05T12:15:03.103", "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json index 566ff454816..1e7c03ba100 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T06:15:03.433", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json index bef3364e49f..222d060e216 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T06:15:03.850", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json index 85664193b32..5eb7d60d71f 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:19.823", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json index 122357cf562..333e346990f 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:20.043", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9628.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9628.json index 133bb2b6cfe..8676cbd5089 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9628.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9628.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-25T08:15:03.457", "lastModified": "2024-10-25T16:15:10.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9630.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9630.json index 8a498892e99..ec6576583e0 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9630.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9630.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-25T08:15:03.657", "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9636.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9636.json index bb3bddc1a20..b174ea83979 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9636.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9636.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T10:15:08.607", "lastModified": "2025-01-15T10:15:08.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post Grid and Gutenberg Blocks plugin for WordPress is vulnerable to privilege escalation in versions 2.2.85 to 2.3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator." + }, + { + "lang": "es", + "value": "El complemento Post Grid y Gutenberg Blocks para WordPress es vulnerable a la escalada de privilegios en las versiones 2.2.85 a 2.3.3. Esto se debe a que el complemento no restringe adecuadamente qu\u00e9 metadatos de usuario se pueden actualizar durante el registro del perfil. Esto hace posible que atacantes no autenticados se registren en el sitio como administradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9672.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9672.json index d36762ce2bc..8eaffbc27e5 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9672.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9672.json @@ -3,7 +3,7 @@ "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-12-10T00:15:22.893", "lastModified": "2024-12-10T00:15:22.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json index 7a5a0a297bd..9cc7a1c2ad7 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:03.493", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json index dbe29c44abe..a7f9f2e0d77 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:03.767", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0053.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0053.json index 9faa0259439..bc3b4a3558e 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0053.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0053.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:15.403", "lastModified": "2025-01-14T01:15:15.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker to gain unauthorized access to system information. By using a specific URL parameter, an unauthenticated attacker could retrieve details such as system configuration. This has a limited impact on the confidentiality of the application and may be leveraged to facilitate further attacks or exploits." + }, + { + "lang": "es", + "value": " SAP NetWeaver Application Server para ABAP y la plataforma ABAP permite a un atacante obtener acceso no autorizado a la informaci\u00f3n del sistema. Al utilizar un par\u00e1metro de URL espec\u00edfico, un atacante no autenticado podr\u00eda recuperar detalles como la configuraci\u00f3n del sistema. Esto tiene un impacto limitado en la confidencialidad de la aplicaci\u00f3n y puede aprovecharse para facilitar otros ataques o exploits." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0055.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0055.json index 6702be07c95..fc075695022 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0055.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0055.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:15.570", "lastModified": "2025-01-14T01:15:15.570", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP GUI for Windows stores user input on the client PC to improve usability. Under very specific circumstances an attacker with administrative privileges or access to the victim\ufffds user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application." + }, + { + "lang": "es", + "value": "SAP GUI para Windows almacena la informaci\u00f3n ingresada por el usuario en la PC del cliente para mejorar la usabilidad. En circunstancias muy espec\u00edficas, un atacante con privilegios administrativos o acceso al directorio de usuarios de la v\u00edctima en el nivel del sistema operativo podr\u00eda leer estos datos. Dependiendo de la informaci\u00f3n ingresada por el usuario en las transacciones, los datos divulgados podr\u00edan variar desde datos no cr\u00edticos hasta datos altamente sensibles, lo que causar\u00eda un alto impacto en la confidencialidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0056.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0056.json index 7ece466c562..4c0429ac807 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0056.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0056.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:15.730", "lastModified": "2025-01-14T01:15:15.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP GUI for Java saves user input on the client PC to improve usability. An attacker with administrative privileges or access to the victim\ufffds user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application." + }, + { + "lang": "es", + "value": " SAP GUI para Java guarda la informaci\u00f3n ingresada por el usuario en la PC del cliente para mejorar la usabilidad. Un atacante con privilegios administrativos o acceso al directorio de usuarios de la v\u00edctima en el nivel del sistema operativo podr\u00eda leer estos datos. Dependiendo de la informaci\u00f3n ingresada por el usuario en las transacciones, los datos divulgados podr\u00edan variar desde datos no cr\u00edticos hasta datos altamente sensibles, lo que causa un alto impacto en la confidencialidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0057.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0057.json index 82328a2a745..9a04a429b0c 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0057.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0057.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:15.883", "lastModified": "2025-01-14T01:15:15.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver AS JAVA (User Admin Application) is vulnerable to stored cross site scripting vulnerability. An attacker posing as an admin can upload a photo with malicious JS content. When a victim visits the vulnerable component, the attacker can read and modify information within the scope of victim's web browser." + }, + { + "lang": "es", + "value": "SAP NetWeaver AS JAVA (User Admin Application) es vulnerable a una vulnerabilidad de Cross-Site Scripting almacenado. Un atacante que se hace pasar por un administrador puede cargar una foto con contenido JS malicioso. Cuando una v\u00edctima visita el componente vulnerable, el atacante puede leer y modificar informaci\u00f3n dentro del alcance del navegador web de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0058.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0058.json index 11c8917f503..b116ab06756 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0058.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0058.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.040", "lastModified": "2025-01-14T01:15:16.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SAP Business Workflow and SAP Flexible Workflow, an authenticated attacker can manipulate a parameter in an otherwise legitimate resource request to view sensitive information that should otherwise be restricted. The attacker does not have the ability to modify the information or to make the information unavailable." + }, + { + "lang": "es", + "value": " En SAP Business Workflow y SAP Flexible Workflow, un atacante autenticado puede manipular un par\u00e1metro en una solicitud de recursos leg\u00edtima para ver informaci\u00f3n confidencial que, de otro modo, deber\u00eda estar restringida. El atacante no tiene la capacidad de modificar la informaci\u00f3n ni de hacer que no est\u00e9 disponible." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0059.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0059.json index 95d7baa6b74..c2fe4cb342b 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0059.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0059.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.190", "lastModified": "2025-01-14T01:15:16.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim\ufffds user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application." + }, + { + "lang": "es", + "value": " Las aplicaciones basadas en SAP GUI para HTML en SAP NetWeaver Application Server ABAP almacenan la informaci\u00f3n ingresada por el usuario en el almacenamiento local del navegador para mejorar la usabilidad. Un atacante con privilegios administrativos o acceso al directorio de usuarios de la v\u00edctima en el nivel del sistema operativo podr\u00eda leer estos datos. Dependiendo de la informaci\u00f3n ingresada por el usuario en las transacciones, los datos divulgados podr\u00edan variar desde datos no cr\u00edticos hasta datos altamente sensibles, lo que causa un alto impacto en la confidencialidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0060.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0060.json index e286ba4e9a5..b9f433185ce 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0060.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0060.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.350", "lastModified": "2025-01-14T01:15:16.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP BusinessObjects Business Intelligence Platform allows an authenticated user with restricted access to inject malicious JS code which can read sensitive information from the server and send it to the attacker. The attacker could further use this information to impersonate as a high privileged user causing high impact on confidentiality and integrity of the application." + }, + { + "lang": "es", + "value": " SAP BusinessObjects Business Intelligence Platform permite que un usuario autenticado con acceso restringido inyecte c\u00f3digo JS malicioso que puede leer informaci\u00f3n confidencial del servidor y enviarla al atacante. El atacante podr\u00eda utilizar esta informaci\u00f3n para hacerse pasar por un usuario con privilegios elevados, lo que causar\u00eda un gran impacto en la confidencialidad e integridad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0061.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0061.json index d17bd2d29e9..6e564042006 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0061.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0061.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.500", "lastModified": "2025-01-14T01:15:16.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application." + }, + { + "lang": "es", + "value": " SAP BusinessObjects Business Intelligence Platform permite a un atacante no autenticado secuestrar sesiones a trav\u00e9s de la red sin interacci\u00f3n del usuario, debido a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. El atacante puede acceder y modificar todos los datos de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0063.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0063.json index 4dffacd2ffe..05fd3a7bac9 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0063.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0063.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.633", "lastModified": "2025-01-14T01:15:16.633", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability." + }, + { + "lang": "es", + "value": "SAP NetWeaver AS ABAP y ABAP Platform no comprueban la autorizaci\u00f3n cuando un usuario ejecuta algunos m\u00f3dulos de funciones RFC. Esto podr\u00eda llevar a un atacante con privilegios de usuario b\u00e1sicos a obtener el control de los datos en la base de datos Informix, lo que provocar\u00eda un compromiso total de la confidencialidad, la integridad y la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0066.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0066.json index 15e51ccf227..9ef013e4c9e 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0066.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0066.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.783", "lastModified": "2025-01-14T01:15:16.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application" + }, + { + "lang": "es", + "value": " En determinadas circunstancias, SAP NetWeaver AS para ABAP y la plataforma ABAP (Internet Communication Framework) permite a un atacante acceder a informaci\u00f3n restringida debido a controles de acceso d\u00e9biles. Esto puede tener un impacto significativo en la confidencialidad, integridad y disponibilidad de una aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0067.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0067.json index 8cdce706446..781ef80fed4 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0067.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0067.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:16.950", "lastModified": "2025-01-14T01:15:16.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to a missing authorization check on service endpoints in the SAP NetWeaver Application Server Java, an attacker with standard user role can create JCo connection entries, which are used for remote function calls from or to the application server. This could lead to low impact on confidentiality, integrity, and availability of the application." + }, + { + "lang": "es", + "value": " Debido a la falta de una verificaci\u00f3n de autorizaci\u00f3n en los endpoints de servicio en SAP NetWeaver Application Server Java, un atacante con un rol de usuario est\u00e1ndar puede crear entradas de conexi\u00f3n JCo, que se utilizan para llamadas de funciones remotas desde o hacia el servidor de aplicaciones. Esto podr\u00eda tener un impacto bajo en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0068.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0068.json index 8a7f1d39150..58ec4056806 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0068.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0068.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:17.107", "lastModified": "2025-01-14T01:15:17.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An obsolete functionality in SAP NetWeaver Application Server ABAP did not perform necessary authorization checks. Because of this, an authenticated attacker could obtain information that would otherwise be restricted. It has no impact on integrity or availability on the application." + }, + { + "lang": "es", + "value": "Una funcionalidad obsoleta en SAP NetWeaver Application Server ABAP no realizaba las comprobaciones de autorizaci\u00f3n necesarias. Debido a esto, un atacante autenticado podr\u00eda obtener informaci\u00f3n que de otro modo estar\u00eda restringida. No tiene ning\u00fan impacto en la integridad o disponibilidad de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0069.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0069.json index 04b10bb6dd2..abf2828f7a1 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0069.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0069.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:17.257", "lastModified": "2025-01-14T01:15:17.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to DLL injection vulnerability in SAPSetup, an attacker with either local user privileges or with access to a compromised corporate user\ufffds Windows account could gain higher privileges. With this, he could move laterally within the network and further compromise the active directory of a company. This leads to high impact on confidentiality, integrity and availability of the Windows server." + }, + { + "lang": "es", + "value": " Debido a la vulnerabilidad de inyecci\u00f3n de DLL en SAPSetup, un atacante con privilegios de usuario local o con acceso a la cuenta de Windows de un usuario corporativo comprometido podr\u00eda obtener mayores privilegios. Con esto, podr\u00eda moverse lateralmente dentro de la red y comprometer a\u00fan m\u00e1s el directorio activo de una empresa. Esto genera un gran impacto en la confidencialidad, integridad y disponibilidad del servidor Windows." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0070.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0070.json index f25e9276c51..85701cb5ffe 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0070.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0070.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@sap.com", "published": "2025-01-14T01:15:17.427", "lastModified": "2025-01-14T01:15:17.427", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to obtain illegitimate access to the system by exploiting improper authentication checks, resulting in privilege escalation. On successful exploitation, this can result in potential security concerns. This results in a high impact on confidentiality, integrity, and availability." + }, + { + "lang": "es", + "value": "SAP NetWeaver Application Server para ABAP y la plataforma ABAP permite que un atacante autenticado obtenga acceso ileg\u00edtimo al sistema mediante la explotaci\u00f3n de comprobaciones de autenticaci\u00f3n incorrectas, lo que da lugar a una escalada de privilegios. Si se explota con \u00e9xito, esto puede dar lugar a posibles problemas de seguridad y tiene un gran impacto en la confidencialidad, la integridad y la disponibilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0103.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0103.json index 6d29635f107..03d2ba4a091 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0103.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0103.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-01-11T03:15:22.020", "lastModified": "2025-01-11T03:15:22.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "psirt@paloaltonetworks.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en Palo Alto Networks Expedition permite a un atacante autenticado revelar el contenido de la base de datos de Expedition, como hashes de contrase\u00f1as, nombres de usuario, configuraciones de dispositivos y claves API de dispositivos. Esta vulnerabilidad tambi\u00e9n permite a los atacantes crear y leer archivos arbitrarios en el sistema Expedition." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0104.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0104.json index 6ee3310c3ab..937f32a3e6b 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0104.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0104.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-01-11T03:15:22.183", "lastModified": "2025-01-11T03:15:22.183", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "psirt@paloaltonetworks.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition enables attackers to execute malicious JavaScript code in the context of an authenticated Expedition user\u2019s browser if that authenticated user clicks a malicious link that allows phishing attacks and could lead to Expedition browser-session theft." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) reflejado en Palo Alto Networks Expedition permite a los atacantes ejecutar c\u00f3digo JavaScript malicioso en el contexto del navegador de un usuario autenticado de Expedition si ese usuario autenticado hace clic en un enlace malicioso que permite ataques de phishing y podr\u00eda conducir al robo de la sesi\u00f3n del navegador de Expedition." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0105.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0105.json index b159ce08ab9..9a3e1b02117 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0105.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-01-11T03:15:22.317", "lastModified": "2025-01-11T03:15:22.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "psirt@paloaltonetworks.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An arbitrary file deletion vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host filesystem." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos en Palo Alto Networks Expedition permite a un atacante no autenticado eliminar archivos arbitrarios accesibles al usuario www-data en el sistema de archivos del host." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0106.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0106.json index 56330e7597a..daa0a671a1b 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0106.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-01-11T03:15:22.490", "lastModified": "2025-01-11T03:15:22.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "psirt@paloaltonetworks.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A wildcard expansion vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to enumerate files on the host filesystem." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de expansi\u00f3n de comodines en Palo Alto Networks Expedition permite a un atacante no autenticado enumerar archivos en el sistema de archivos del host." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0170.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0170.json index 9f1e090593a..7f28d311173 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0170.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0170.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T02:15:27.043", "lastModified": "2025-01-16T02:15:27.043", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DWT - Directory & Listing WordPress Theme is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping on the 'sort_by' and 'token' parameters. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El tema de WordPress DWT - Directory & Listing es vulnerable a Cross-Site Scripting reflejado en versiones hasta la 3.3.3 incluida debido a una limpieza de entrada y escape de salida insuficiente en los par\u00e1metros 'sort_by' y 'token'. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0193.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0193.json index 8c33ad153d2..9301d13440d 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0193.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0193.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@moxa.com", "published": "2025-01-15T11:15:09.280", "lastModified": "2025-01-15T11:15:09.280", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0215.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0215.json index 845bd82d290..c844f6a0494 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0215.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0215.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-15T23:15:10.453", "lastModified": "2025-01-15T23:15:10.453", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the showdata and initiate_restore parameters in all versions up to, and including, 1.24.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an admin user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": " El complemento UpdraftPlus: WP Backup & Migration Plugin para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s de los par\u00e1metros showdata e attempt_restore en todas las versiones hasta la 1.24.12 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario administrador para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json index 64c9be303c6..f87cf1ce1cd 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0220.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T13:15:05.850", "lastModified": "2025-01-05T13:15:05.850", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json index 3186d0cac6d..99bfecab53e 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0224.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T17:15:06.027", "lastModified": "2025-01-05T17:15:06.027", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json index e493418d0be..4723527b23d 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0225.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T17:15:06.620", "lastModified": "2025-01-05T17:15:06.620", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json index 6013a27ad80..de3266a6e21 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T18:15:05.573", "lastModified": "2025-01-05T18:15:05.573", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json index c22f0e70e8c..988fcdb09fc 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0227.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-05T18:15:06.570", "lastModified": "2025-01-05T18:15:06.570", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0343.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0343.json index fec357c63f9..b19548fcd69 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0343.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0343.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@forums.swift.org", "published": "2025-01-15T01:15:13.673", "lastModified": "2025-01-15T15:15:13.953", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0354.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0354.json index ae98c482c1a..ea99e537b05 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0354.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0354.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2025-01-15T08:15:26.330", "lastModified": "2025-01-15T08:15:26.330", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to inject an arbitrary script via the internet." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Scripting en NEC Corporation Aterm WG2600HS Ver.1.7.2 y anteriores, WG2600HP4 Ver.1.4.2 y anteriores, WG2600HM4 Ver.1.4.2 y anteriores, WG2600HS2 Ver.1.3.2 y anteriores, WX3000HP Ver.2.4.2 y anteriores y WX4200D5 Ver.1.2.4 y anteriores permite a un atacante inyectar un script arbitrario a trav\u00e9s de Internet." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0355.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0355.json index 6f79f679d7d..ccfda2e961c 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0355.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0355.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2025-01-15T08:15:26.493", "lastModified": "2025-01-15T08:15:26.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authentication for Critical Function vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WF1200CRS Ver.1.6.0 and earlier, WG1200CRS Ver.1.5.0 and earlier, GB1200PE Ver.1.3.0 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to get a Wi-Fi password via the internet." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en NEC Corporation Aterm WG2600HS Ver.1.7.2 y anteriores, WF1200CRS Ver.1.6.0 y anteriores, WG1200CRS Ver.1.5.0 y anteriores, GB1200PE Ver.1.3.0 y anteriores, WG2600HP4 Ver.1.4.2 y anteriores, WG2600HM4 Ver.1.4.2 y anteriores, WG2600HS2 Ver.1.3.2 y anteriores, WX3000HP Ver.2.4.2 y anteriores y WX4200D5 Ver.1.2.4 y anteriores permite a un atacante obtener una contrase\u00f1a de Wi-Fi a trav\u00e9s de Internet." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0356.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0356.json index f863af357fe..8e4154f89fc 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0356.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0356.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt-info@cyber.jp.nec.com", "published": "2025-01-15T08:15:26.650", "lastModified": "2025-01-15T08:15:26.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NEC Corporation Aterm WX1500HP Ver.1.4.2 and earlier and WX3600HP Ver.1.5.3 and earlier allows a attacker to execute arbitrary OS commands via the internet." + }, + { + "lang": "es", + "value": " NEC Corporation Aterm WX1500HP Ver.1.4.2 y anteriores y WX3600HP Ver.1.5.3 y anteriores permite a un atacante ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de Internet." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0390.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0390.json index 228c3d1600b..d97a6508d8e 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0390.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0390.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-11T08:15:26.527", "lastModified": "2025-01-11T08:15:26.527", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This vulnerability affects unknown code of the file /wmOmNoticeHController.do. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Guangzhou Huayi Intelligent Technology Jeewms hasta 20241229. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /wmOmNoticeHController.do. La manipulaci\u00f3n conduce a la navegaci\u00f3n por la ruta: '../filedir'. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 20250101 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0391.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0391.json index e953f749c8c..248a820c4c6 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0391.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0391.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-11T09:15:05.937", "lastModified": "2025-01-11T09:15:05.937", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This issue affects the function saveOrUpdate of the file org/jeecgframework/web/cgform/controller/build/CgFormBuildController. java. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en Guangzhou Huayi Intelligent Technology Jeewms hasta 20241229. Este problema afecta a la funci\u00f3n saveOrUpdate del archivo org/jeecgframework/web/cgform/controller/build/CgFormBuildController.java. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 20250101 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0392.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0392.json index 8f4563bc20e..2e470a4092f 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0392.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0392.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-11T11:15:06.657", "lastModified": "2025-01-11T11:15:06.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. Affected is the function datagridGraph of the file /graphReportController.do. The manipulation of the argument store_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Guangzhou Huayi Intelligent Technology Jeewms hasta 20241229. La funci\u00f3n datagridGraph del archivo /graphReportController.do est\u00e1 afectada. La manipulaci\u00f3n del argumento store_code provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 20250101 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0393.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0393.json index 8da71777a30..62c3570ad2f 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0393.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T09:15:21.263", "lastModified": "2025-01-14T09:15:21.263", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0394.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0394.json index 591e21450f5..af40beb8753 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0394.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0394.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T09:15:21.430", "lastModified": "2025-01-14T09:15:21.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0396.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0396.json index 08f466ff997..b61e7f8e6ad 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0396.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0396.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-12T12:15:17.963", "lastModified": "2025-01-12T12:15:17.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in exelban stats up to 2.11.21. This issue affects the function shouldAcceptNewConnection of the component XPC Service. The manipulation leads to command injection. It is possible to launch the attack on the local host. Upgrading to version 2.11.22 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en exelban stats hasta la versi\u00f3n 2.11.21. Este problema afecta a la funci\u00f3n shouldAcceptNewConnection del componente XPC Service. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos. Es posible lanzar el ataque en el host local. La actualizaci\u00f3n a la versi\u00f3n 2.11.22 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0397.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0397.json index 3ea98d0eeec..53685ae10d5 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0397.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0397.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-12T13:15:07.333", "lastModified": "2025-01-12T13:15:07.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en reckcn SPPanAdmin 1.0. Se trata de una funci\u00f3n desconocida del archivo /;/admin/role/edit. La manipulaci\u00f3n del nombre del argumento provoca Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0398.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0398.json index bd4ed0f13af..fc478f14a8c 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0398.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0398.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-12T14:15:08.993", "lastModified": "2025-01-12T14:15:08.993", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in longpi1 warehouse 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /resources/..;/inport/updateInport of the component Backend. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en longpi1 warehouse 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /resources/..;/inport/updateInport del componente Backend. La manipulaci\u00f3n del argumento remark conduce a Cross Site Scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0399.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0399.json index 5e47c4da3ac..a5e35d6582d 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0399.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0399.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-12T23:15:07.050", "lastModified": "2025-01-12T23:15:07.050", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been declared as critical. This vulnerability affects the function UploadController of the file src/main/java/com/siro/mall/controller/common/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en StarSea99 starsea-mall 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n UploadController del archivo src/main/java/com/siro/mall/controller/common/uploadController.java. La manipulaci\u00f3n del archivo de argumentos permite la carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0400.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0400.json index 8f904020c7c..1deb4d58892 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0400.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0400.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-12T23:15:07.260", "lastModified": "2025-01-12T23:15:07.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/categories/update. The manipulation of the argument categoryName leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en StarSea99 starsea-mall 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /admin/categories/update. La manipulaci\u00f3n del argumento categoryName provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0401.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0401.json index d617239c7d4..c7c24f97979 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0401.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0401.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T00:15:06.807", "lastModified": "2025-01-13T00:15:06.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1902756969 reggie 1.0. La funci\u00f3n de descarga del archivo src/main/java/com/itheima/reggie/controller/CommonController.java se ve afectada. La manipulaci\u00f3n del nombre del argumento provoca un path traversal. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0402.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0402.json index 150c500345a..936c6260336 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0402.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0402.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T00:15:07.707", "lastModified": "2025-01-13T00:15:07.707", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in 1902756969 reggie 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1902756969 reggie 1.0. Esta vulnerabilidad afecta la funci\u00f3n de carga del archivo src/main/java/com/itheima/reggie/controller/CommonController.java. La manipulaci\u00f3n del archivo de argumentos permite una carga sin restricciones. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0403.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0403.json index c90b7d309ae..4ecfd6f90a0 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0403.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0403.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T00:15:07.873", "lastModified": "2025-01-13T00:15:07.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in 1902756969 reggie 1.0. Affected by this issue is some unknown functionality of the file /user/sendMsg of the component Phone Number Validation Handler. The manipulation of the argument code leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en 1902756969 reggie 1.0. Este problema afecta a una funcionalidad desconocida del archivo /user/sendMsg del componente Phone Number Validation Handler. La manipulaci\u00f3n del c\u00f3digo de argumentos conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0404.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0404.json index 98ecbbf93ea..9199048ee1f 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0404.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0404.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T01:15:07.227", "lastModified": "2025-01-13T01:15:07.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in liujianview gymxmjpa 1.0 and classified as critical. This vulnerability affects the function CoachController of the file src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. The manipulation of the argument coachName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en liujianview gymxmjpa 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n CoachController del archivo src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. La manipulaci\u00f3n del argumento coachName conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json index 29b9c2d7957..c9839c3d426 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T01:15:07.430", "lastModified": "2025-01-13T19:15:11.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json index 14e34cb27e8..beba95fc3f8 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T02:15:07.490", "lastModified": "2025-01-13T18:15:20.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json index 4f67a6942ed..d4c2e3724ca 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0407.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T02:15:07.667", "lastModified": "2025-01-13T18:15:21.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json index 9a5a1def716..09b987591dd 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T02:15:07.840", "lastModified": "2025-01-13T14:15:10.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json index c99d54f1c6e..9244b7915f1 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0409.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T03:15:06.667", "lastModified": "2025-01-13T18:15:21.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json index 2220c41db53..bd81ec85fce 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0410.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-13T03:15:06.847", "lastModified": "2025-01-13T18:15:21.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0412.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0412.json index b9a40d50260..284d1e68774 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0412.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0412.json @@ -3,12 +3,16 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-13T04:15:06.477", "lastModified": "2025-01-13T04:15:06.477", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Luxion KeyShot Viewer KSP File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22139." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por corrupci\u00f3n de memoria en el an\u00e1lisis de archivos KSP de Luxion KeyShot Viewer. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Luxion KeyShot Viewer. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el procesamiento de archivos KSP. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una condici\u00f3n de corrupci\u00f3n de memoria. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-22139." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0434.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0434.json index 2ff004399cb..5134aef4d45 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0434.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0434.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.470", "lastModified": "2025-01-15T15:15:14.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0435.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0435.json index 62ad817db8a..25ce81f0f20 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0435.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0435.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.580", "lastModified": "2025-01-15T15:15:14.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json index b18b0d78e93..41c1ed41758 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.673", "lastModified": "2025-01-15T15:15:14.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json index 8cfb3021693..1f73a3ff125 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0438.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.930", "lastModified": "2025-01-15T15:15:14.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0439.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0439.json index f7b28f18554..c5c40a99b86 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0439.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0439.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.060", "lastModified": "2025-01-15T15:15:15.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0440.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0440.json index 9c0dae0c2f8..05300c6a796 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0440.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0440.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.187", "lastModified": "2025-01-15T15:15:15.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json index c0faca4bb2d..105e77beb57 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.287", "lastModified": "2025-01-15T15:15:15.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0442.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0442.json index 9dcbbdc8489..9f572a9dc94 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0442.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0442.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.383", "lastModified": "2025-01-15T15:15:15.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json index 580c1fc2790..06abd5eea69 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0443.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.483", "lastModified": "2025-01-15T15:15:15.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0446.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0446.json index afc20a9aa41..2fc3b67080e 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0446.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0446.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.580", "lastModified": "2025-01-15T15:15:15.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0447.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0447.json index 37ca65134d5..117b3eb2729 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0447.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0447.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.673", "lastModified": "2025-01-15T15:15:16.123", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0448.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0448.json index cd39c276c19..dcdfb21c03e 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0448.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0448.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.763", "lastModified": "2025-01-15T15:15:16.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0455.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0455.json index 920cf115597..7415090edde 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0455.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-01-16T02:15:27.203", "lastModified": "2025-01-16T02:15:27.203", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The airPASS from NetVision Information has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents." + }, + { + "lang": "es", + "value": "El airPASS de NetVision Information tiene una vulnerabilidad de inyecci\u00f3n SQL, que permite a atacantes remotos no autenticados inyectar comandos SQL arbitrarios para leer, modificar y eliminar contenidos de bases de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0456.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0456.json index d79083f5888..6b201ee5ce7 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0456.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0456.json @@ -3,12 +3,16 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-01-16T02:15:27.387", "lastModified": "2025-01-16T02:15:27.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The airPASS from NetVision Information has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access the specific administrative functionality to retrieve * all accounts and passwords." + }, + { + "lang": "es", + "value": " El airPASS de NetVision Information tiene una vulnerabilidad de autenticaci\u00f3n faltante, que permite a atacantes remotos no autenticados acceder a la funcionalidad administrativa espec\u00edfica para recuperar * todas las cuentas y contrase\u00f1as." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0457.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0457.json index 0b127fbdf2e..25f05dd2116 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0457.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0457.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-01-16T02:15:27.553", "lastModified": "2025-01-16T02:15:27.553", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0458.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0458.json index 312da1ae4be..d86355d85a7 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0458.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0458.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T16:15:34.397", "lastModified": "2025-01-14T16:15:34.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Virtual Computer Vysual RH Solution 2024.12.1. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Panel. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Virtual Computer Vysual RH Solution 2024.12.1. Esta vulnerabilidad afecta una funcionalidad desconocida del archivo /index.php del componente Login Panel. La manipulaci\u00f3n del argumento page conduce a Cross Site Scripting. El ataque se puede lanzar de forma remota. El exploit se ha revelado al p\u00fablico y puede usarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0459.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0459.json index 81b3fe821b2..18ac966d140 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0459.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0459.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T16:15:34.617", "lastModified": "2025-01-14T16:15:34.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in libretro RetroArch up to 1.19.1 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll of the component Startup. The manipulation leads to untrusted search path. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en libretro RetroArch hasta la versi\u00f3n 1.19.1 en Windows. Este problema afecta a una funcionalidad desconocida en Librer\u00eda profapi.dll del componente Startup. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda no confiable. El ataque debe abordarse localmente. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0460.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0460.json index e42353a1600..dbe1959a8c5 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0460.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0460.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T16:15:34.800", "lastModified": "2025-01-14T16:15:34.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Blog Botz para Journal Theme 1.0 en OpenCart. Afecta a una parte desconocida del archivo /index.php?route=extension/module/blog_add. La manipulaci\u00f3n del argumento image permite la carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0461.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0461.json index fcb027ec17a..fb6befb945c 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0461.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0461.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T16:15:34.997", "lastModified": "2025-01-14T16:15:34.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as problematic. This vulnerability affects unknown code of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. The manipulation of the argument pathfile leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en el CRM Lingdang de Shanghai Lingdang Information Technology hasta la versi\u00f3n 8.6.0.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. La manipulaci\u00f3n del argumento pathfile conduce a Path Traversal. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0462.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0462.json index fa690a2a22d..2db33245f84 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0462.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0462.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T17:15:21.040", "lastModified": "2025-01-14T17:15:21.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as critical. This issue affects some unknown processing of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1. The manipulation of the argument searchcontent leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Shanghai Lingdang Information Technology Lingdang CRM hasta la versi\u00f3n 8.6.0.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1. La manipulaci\u00f3n del argumento searchcontent conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0463.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0463.json index 7c57ecda4c5..24806da2578 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0463.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0463.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T17:15:21.210", "lastModified": "2025-01-14T17:15:21.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0. It has been classified as critical. Affected is an unknown function of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. The manipulation of the argument name leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Shanghai Lingdang Information Technology Lingdang CRM hasta la versi\u00f3n 8.6.0.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. La manipulaci\u00f3n del argumento name permite una carga sin restricciones. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0464.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0464.json index c3070fa56dd..2cc521d6861 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0464.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0464.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T17:15:21.387", "lastModified": "2025-01-14T17:15:21.387", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Maintenance Section. The manipulation of the argument System Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Task Reminder System 1.0. Se la ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente Maintenance Section. La manipulaci\u00f3n del argumento System Name conduce a Cross Site Scripting. El ataque se puede lanzar de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0465.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0465.json index eb27cc76f65..b0095f1d46a 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0465.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0465.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-14T18:15:29.883", "lastModified": "2025-01-14T18:15:29.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in AquilaCMS 1.412.13. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/v2/categories. The manipulation of the argument PostBody.populate leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en AquilaCMS 1.412.13. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /api/v2/categories. La manipulaci\u00f3n del argumento PostBody.populate provoca la deserializaci\u00f3n. El ataque puede ejecutarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json index c026724e91f..bf7aa877ff6 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0471.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-16T13:15:06.973", "lastModified": "2025-01-16T13:15:06.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json index bef80cff90d..9df01519337 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0472.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-16T13:15:07.353", "lastModified": "2025-01-16T13:15:07.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json index 100c98b1ed9..2af54bccb2d 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0473.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-01-16T13:15:07.540", "lastModified": "2025-01-16T13:15:07.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0474.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0474.json index 1902a8866e5..78f363516ae 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0474.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0474.json @@ -3,12 +3,16 @@ "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-01-14T19:15:32.930", "lastModified": "2025-01-14T19:15:32.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Invoice Ninja is vulnerable to authenticated Server-Side Request Forgery (SSRF) allowing for arbitrary file read and network resource requests as the application user.\nThis issue affects Invoice Ninja: from 5.8.56 through 5.11.23." + }, + { + "lang": "es", + "value": "Invoice Ninja es vulnerable a Server-Side Request Forgery (SSRF) autenticado, lo que permite la lectura arbitraria de archivos y solicitudes de recursos de red como usuario de la aplicaci\u00f3n. Este problema afecta a Invoice Ninja: desde la versi\u00f3n 5.8.56 hasta la 5.11.23." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json index b0521f1e744..e41ea1e922f 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0476.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-16T00:15:25.217", "lastModified": "2025-01-16T00:15:25.217", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Mobile Apps versions <=2.22.0 fail to properly handle specially crafted attachment names, which allows an attacker to crash the mobile app for any user who opened a channel containing the specially crafted attachment" + }, + { + "lang": "es", + "value": " Las versiones de aplicaciones m\u00f3viles de Mattermost <=2.22.0 no pueden manejar correctamente los nombres de archivos adjuntos especialmente manipulados, lo que permite que un atacante bloquee la aplicaci\u00f3n m\u00f3vil para cualquier usuario que haya abierto un canal que contenga el archivo adjunto especialmente manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0480.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0480.json index 210a7247f18..e7cd07bc221 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0480.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0480.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T18:15:24.457", "lastModified": "2025-01-15T18:15:24.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in wuzhicms 4.1.0. This affects the function test of the file coreframe/app/search/admin/config.php. The manipulation of the argument sphinxhost/sphinxport leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en wuzhicms 4.1.0. Afecta a la prueba de funcionamiento del archivo coreframe/app/search/admin/config.php. La manipulaci\u00f3n del argumento sphinxhost/sphinxport provoca server-side request forgery. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0481.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0481.json index d7a327b4d64..c3bd58f76f3 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0481.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0481.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T19:15:26.807", "lastModified": "2025-01-15T19:15:26.807", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in D-Link DIR-878 1.03. Affected is an unknown function of the file /dllog.cgi of the component HTTP POST Request Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en D-Link DIR-878 1.03. Se trata de una funci\u00f3n desconocida del archivo /dllog.cgi del componente HTTP POST Request Handler. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json index 2d514bcb5b3..0b9d384a732 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:28.863", "lastModified": "2025-01-15T21:15:14.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Fanli2012 native-php-cms 1.0. Afecta a una parte desconocida del archivo /fladmin/user_recoverpwd.php. La manipulaci\u00f3n lleva al uso de credenciales predeterminadas. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0483.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0483.json index 184ed90801a..8349f51b2ce 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0483.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0483.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:29.040", "lastModified": "2025-01-15T20:15:29.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Fanli2012 native-php-cms 1.0 and classified as problematic. This vulnerability affects unknown code of the file /fladmin/jump.php. The manipulation of the argument message/error leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Fanli2012 native-php-cms 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /fladmin/jump.php. La manipulaci\u00f3n del argumento message/error provoca cross site scripting. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json index 98b94948f18..de2780da497 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:29.227", "lastModified": "2025-01-15T20:15:29.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Fanli2012 native-php-cms 1.0 and classified as critical. This issue affects some unknown processing of the file /fladmin/sysconfig_doedit.php of the component Backend. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en Fanli2012 native-php-cms 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /fladmin/sysconfig_doedit.php del componente Backend. La manipulaci\u00f3n conduce a una autorizaci\u00f3n incorrecta. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json index e786f6e4e35..099da6b0f63 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:29.400", "lastModified": "2025-01-15T20:15:29.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Fanli2012 native-php-cms 1.0. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo /fladmin/sysconfig_doedit.php. La manipulaci\u00f3n del argumento info provoca ataques de cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json index 88cf2697ee5..0fd7f09efe8 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T21:15:14.960", "lastModified": "2025-01-15T21:15:14.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Fanli2012 native-php-cms 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /fladmin/login.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json index dfb9adfa4bc..41d2770bd78 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T21:15:15.160", "lastModified": "2025-01-15T21:15:15.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en Fanli2012 native-php-cms 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /fladmin/cat_edit.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json index 1507cf0c135..128fc21f2de 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T21:15:15.380", "lastModified": "2025-01-16T16:15:35.347", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json index 01479e01cf7..e883dae9f6e 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:26.660", "lastModified": "2025-01-16T16:15:35.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json index 1491d2eef66..b0734b899fe 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:26.820", "lastModified": "2025-01-16T16:15:35.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json index e122d9ef906..c615336932c 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:26.990", "lastModified": "2025-01-15T22:15:26.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Fanli2012 native-php-cms 1.0. Se trata de una funci\u00f3n desconocida del archivo /fladmin/cat_dodel.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json index a486d363387..1c9678019f3 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:27.157", "lastModified": "2025-01-15T22:15:27.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en D-Link DIR-823X 240126/240802 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n FUN_00412244. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero null. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0500.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0500.json index ec1eab8179b..6ab842be96e 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0500.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0500.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2025-01-15T19:15:27.003", "lastModified": "2025-01-15T19:15:27.003", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the native clients for Amazon WorkSpaces, Amazon AppStream 2.0, and Amazon DCV Clients may allow an attacker to access remote sessions via man-in-the-middle." + }, + { + "lang": "es", + "value": " Un problema en los clientes nativos de Amazon WorkSpaces, Amazon AppStream 2.0 y Amazon DCV Clients puede permitir que un atacante acceda a sesiones remotas a trav\u00e9s de un man-in-the-middle." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0501.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0501.json index a65956e3b93..50aace26da2 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0501.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0501.json @@ -3,12 +3,16 @@ "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2025-01-15T19:15:27.190", "lastModified": "2025-01-15T19:15:27.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the native clients for Amazon WorkSpaces Clients when running PCoIP protocol may allow an attacker to access remote sessions via man-in-the-middle." + }, + { + "lang": "es", + "value": " Un problema en los clientes nativos de Amazon WorkSpaces Clients cuando se ejecuta el protocolo PCoIP puede permitir que un atacante acceda a sesiones remotas a trav\u00e9s de un man-in-the-middle." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0502.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0502.json index 7684c795d82..63785bf0749 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0502.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0502.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@craftersoftware.com", "published": "2025-01-15T18:15:24.650", "lastModified": "2025-01-15T18:15:24.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transmission of Private Resources into a New Sphere ('Resource Leak') vulnerability in CrafterCMS Engine on Linux, MacOS, x86, Windows, 64 bit, ARM allows Directory Indexing, Resource Leak Exposure.This issue affects CrafterCMS: from 4.0.0 before 4.0.8, from 4.1.0 before 4.1.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de transmisi\u00f3n de recursos privados a una nueva esfera ('fuga de recursos') en CrafterCMS Engine en Linux, MacOS, x86, Windows, 64 bit, ARM permite la indexaci\u00f3n de directorios y la exposici\u00f3n de fugas de recursos. Este problema afecta a CrafterCMS: desde la versi\u00f3n 4.0.0 hasta la 4.0.8, desde la versi\u00f3n 4.1.0 hasta la 4.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0518.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0518.json index 04beb8013ad..8ba81e684a5 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0518.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0518.json @@ -3,12 +3,16 @@ "sourceIdentifier": "96148269-fe82-4198-b1bf-3a73ce8bc92e", "published": "2025-01-16T17:15:12.577", "lastModified": "2025-01-16T17:15:12.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg allows Read Sensitive Constants Within an Executable. This vulnerability is associated with program files https://github.Com/FFmpeg/FFmpeg/blob/master/libavfilter/af_pan.C .\n\nThis issue affects FFmpeg: 7.1.\n\nIssue was fixed:\u00a0 https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a\n\n https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a This issue was discovered by: Simcha Kosman" + }, + { + "lang": "es", + "value": "La vulnerabilidad de lectura fuera de los l\u00edmites y valor de retorno sin verificar en FFmpeg permite leer constantes sensibles dentro de un ejecutable. Esta vulnerabilidad est\u00e1 asociada con los archivos de programa https://github.Com/FFmpeg/FFmpeg/blob/master/libavfilter/af_pan.C . Este problema afecta a FFmpeg: 7.1. El problema se solucion\u00f3: https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a Este problema fue descubierto por: Simcha Kosman" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json index 7aebfe2600f..013cc29b143 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T14:15:32.840", "lastModified": "2025-01-17T14:15:32.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json index 7f4254575cf..d68bcb01a3a 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T15:15:12.430", "lastModified": "2025-01-17T15:15:12.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json index 505a3ec8bb9..a4fd7b027e7 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T15:15:12.670", "lastModified": "2025-01-17T15:15:12.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json new file mode 100644 index 00000000000..51976f7f226 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0562", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-19T02:15:24.380", + "lastModified": "2025-01-19T02:15:24.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LiuSir5211314/-sir/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292523", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292523", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.484184", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json new file mode 100644 index 00000000000..c1924516672 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0563", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-19T02:15:24.560", + "lastModified": "2025-01-19T02:15:24.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/LiuSir5211314/-sir/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292524", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292524", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.484185", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20016.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20016.json index 9611dd329bc..059b49a079d 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20016.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20016.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-01-14T10:15:07.500", "lastModified": "2025-01-14T10:15:07.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340/D440 provided by Y'S corporation. A user with an administrative privilege who logged in to the web management page of the affected product may execute an arbitrary OS command." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en los servidores de almacenamiento en red STEALTHONE D220/D340/D440 de Y'S Corporation. Un usuario con privilegios administrativos que haya iniciado sesi\u00f3n en la p\u00e1gina de administraci\u00f3n web del producto afectado puede ejecutar un comando arbitrario del sistema operativo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20036.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20036.json index a01e2194f34..949866f3532 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20036.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20036.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-15T17:15:18.950", "lastModified": "2025-01-15T17:15:18.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Mobile Apps versions <=2.22.0 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post." + }, + { + "lang": "es", + "value": "Las versiones <=2.22.0 de las aplicaciones m\u00f3viles de Mattermost no logran validar correctamente las propiedades de las publicaciones, lo que permite que un usuario autenticado malintencionado provoque un bloqueo a trav\u00e9s de una publicaci\u00f3n maliciosa." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20055.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20055.json index d61a3bbae78..7a7c039eb8e 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20055.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20055.json @@ -3,12 +3,16 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-01-14T10:15:07.710", "lastModified": "2025-01-14T10:15:07.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en los servidores de almacenamiento en red STEALTHONE D220/D340 de Y'S Corporation. Un atacante que pueda acceder al producto afectado puede ejecutar un comando arbitrario del sistema operativo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20072.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20072.json index 8e949595e19..80da800ee87 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20072.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20072.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-16T18:15:28.517", "lastModified": "2025-01-16T18:15:28.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Mobile versions <= 2.22.0 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the mobile via crafted malicious input." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost Mobile <= 2.22.0 no pueden validar correctamente el estilo del proto suministrado al estilo de una acci\u00f3n en post.props.attachments, lo que permite a un atacante bloquear el m\u00f3vil a trav\u00e9s de una entrada maliciosa manipulada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20086.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20086.json index 77decc795c0..b5e2f0f5f5e 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20086.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20086.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-15T17:15:19.107", "lastModified": "2025-01-15T17:15:19.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no logran validar correctamente las propiedades de las publicaciones, lo que permite que un usuario autenticado malintencionado provoque un bloqueo a trav\u00e9s de una publicaci\u00f3n maliciosa." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20088.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20088.json index 26272291743..91298ca188b 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20088.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20088.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-15T17:15:19.243", "lastModified": "2025-01-15T17:15:19.243", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no logran validar correctamente las propiedades de las publicaciones, lo que permite que un usuario autenticado malintencionado provoque un bloqueo a trav\u00e9s de una publicaci\u00f3n maliciosa." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20620.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20620.json index 422a376258c..8d395c5a904 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20620.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20620.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-01-14T10:15:07.860", "lastModified": "2025-01-14T10:15:07.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json index 4813e01a18f..ff74b6e7a38 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20621.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-16T19:15:29.960", "lastModified": "2025-01-16T19:15:29.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the webapp to crash via creating and sending such a post to a channel." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no manejan adecuadamente las publicaciones con archivos adjuntos que contienen campos que no se pueden convertir a una cadena, lo que permite a un atacante hacer que la aplicaci\u00f3n web se bloquee al crear y enviar dicha publicaci\u00f3n a un canal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json index ad2c4c15d8e..d26b986a723 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20630.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-16T19:15:30.110", "lastModified": "2025-01-16T19:15:30.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Mobile versions <=2.22.0 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the mobile to crash via creating and sending such a post to a channel." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost Mobile <=2.22.0 no manejan adecuadamente las publicaciones con archivos adjuntos que contienen campos que no se pueden convertir a una cadena, lo que permite a un atacante provocar que el m\u00f3vil se bloquee al crear y enviar dicha publicaci\u00f3n a un canal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21083.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21083.json index ad3a177ecef..80d162785e5 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21083.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21083.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-15T17:15:19.393", "lastModified": "2025-01-15T17:15:19.393", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Mobile Apps versions <=2.22.0 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post." + }, + { + "lang": "es", + "value": "Las versiones <=2.22.0 de las aplicaciones m\u00f3viles de Mattermost no logran validar correctamente las propiedades de las publicaciones, lo que permite que un usuario autenticado malintencionado provoque un bloqueo a trav\u00e9s de una publicaci\u00f3n maliciosa." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21088.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21088.json index f3c7cc693f2..a32f0f038d3 100644 --- a/CVE-2025/CVE-2025-210xx/CVE-2025-21088.json +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21088.json @@ -3,12 +3,16 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2025-01-15T16:15:32.413", "lastModified": "2025-01-15T16:15:32.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the frontend via crafted malicious input." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 no logran validar correctamente el estilo del proto suministrado al estilo de una acci\u00f3n en post.props.attachments, lo que permite que un atacante bloquee el frontend a trav\u00e9s de una entrada maliciosa manipulada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json index 61acdc1aff2..f532f6ace92 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21101.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-15T05:15:09.097", "lastModified": "2025-01-15T05:15:09.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Display Manager, versions prior to 2.3.2.20, contain a race condition vulnerability.\nA local malicious user could potentially exploit this vulnerability during installation, leading to arbitrary folder or file deletion." + }, + { + "lang": "es", + "value": " Las versiones anteriores a la 2.3.2.20 de Dell Display Manager contienen una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n. Un usuario malintencionado local podr\u00eda aprovechar esta vulnerabilidad durante la instalaci\u00f3n, lo que provocar\u00eda la eliminaci\u00f3n arbitraria de carpetas o archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21122.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21122.json index ba29bab6338..3725ea49b3f 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21122.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21122.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T19:15:33.070", "lastModified": "2025-01-14T19:15:33.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.12, 26.1 y anteriores de Photoshop Desktop se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21127.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21127.json index 6bcddc69409..e7c1a4db0e5 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21127.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21127.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T19:15:33.230", "lastModified": "2025-01-14T19:15:33.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could lead to arbitrary code execution. An attacker could manipulate the search path environment variable to point to a malicious library, resulting in the execution of arbitrary code when the application loads. Exploitation of this issue requires user interaction in that a victim must run the vulnerable application." + }, + { + "lang": "es", + "value": "Las versiones 25.12, 26.1 y anteriores de Photoshop Desktop se ven afectadas por una vulnerabilidad del elemento uncontrolled search path que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante podr\u00eda manipular la variable de entorno de la ruta de b\u00fasqueda para que apunte a una librer\u00eda maliciosa, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario cuando se carga la aplicaci\u00f3n. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe ejecutar la aplicaci\u00f3n vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21133.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21133.json index a7cb30c1e16..13c87222d3a 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21133.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21133.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T19:15:34.187", "lastModified": "2025-01-14T19:15:34.187", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.7 y anteriores de Illustrator para iPad se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21135.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21135.json index 3df385fb2f9..fe2d5d8e9b9 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21135.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21135.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T20:15:30.853", "lastModified": "2025-01-14T20:15:30.853", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.6, 23.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.6, 23.0.9 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de enteros (Wrap o Wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21136.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21136.json index 86aa5950f13..ac35ea885cf 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21136.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21136.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T20:15:31.007", "lastModified": "2025-01-14T20:15:31.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Designer versions 14.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 14.0 y anteriores de Substance3D - Designer se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21137.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21137.json index da7a40d2c82..2d6068936bf 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21137.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21137.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T20:15:31.157", "lastModified": "2025-01-14T20:15:31.157", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Designer versions 14.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 14.0 y anteriores de Substance3D - Designer se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21138.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21138.json index dbd29c677f3..be7216674b5 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21138.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21138.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T20:15:31.300", "lastModified": "2025-01-14T20:15:31.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Designer versions 14.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 14.0 y anteriores de Substance3D - Designer se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21139.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21139.json index 59cf1950916..42b1e3d352e 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21139.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21139.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-01-14T20:15:31.457", "lastModified": "2025-01-14T20:15:31.457", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Designer versions 14.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 14.0 y anteriores de Substance3D - Designer se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basado en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json index 3516b6bc8dd..3cb2b04c53c 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.100", "lastModified": "2025-01-14T18:15:30.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en .NET" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json index c28682226b5..fe5c56ce543 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.300", "lastModified": "2025-01-14T18:15:30.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET and Visual Studio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en .NET y Visual Studio" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json index 00cf02c9cc4..e04846eb196 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.480", "lastModified": "2025-01-14T19:15:34.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en .NET" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json index 835c535ab27..d04eb3434f0 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.650", "lastModified": "2025-01-14T18:15:30.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en .NET, .NET Framework y Visual Studio" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json index c64abeca666..99a31383b0d 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.847", "lastModified": "2025-01-14T18:15:30.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Visual Studio" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json index 79c419d0c96..daf499ff91a 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.020", "lastModified": "2025-01-14T18:15:31.020", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Access" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json index 8b021bdf2d9..89c34c74415 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.187", "lastModified": "2025-01-14T18:15:31.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Power Automate Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Power Automate" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json index ba029b0af33..df93484d026 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.377", "lastModified": "2025-01-14T18:15:31.377", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MapUrlToZone Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json index 01ff94b9539..b6211a10e23 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.637", "lastModified": "2025-01-14T18:15:31.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Active Directory Federation Server Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Active Directory Federation Server" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json index 2b38563ca78..23916d99d58 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.827", "lastModified": "2025-01-14T18:15:31.827", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Recovery Environment Agent Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Windows Recovery Environment Agent" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json index 6a81637e5b7..a6122fb0d03 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.027", "lastModified": "2025-01-14T18:15:32.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Connected Devices Platform Service (Cdpsvc)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json index ec4a48afd13..f9ff8d651a7 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.207", "lastModified": "2025-01-14T18:15:32.207", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows BitLocker Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de BitLocker en Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json index 4f5a24a0b36..9defb9b7235 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.410", "lastModified": "2025-01-14T18:15:32.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de Secure Boot" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json index 3f837c5f7dc..e76d9155cc0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.600", "lastModified": "2025-01-14T18:15:32.600", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de Secure Boot" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json index 4a031b4ebfb..33994bea417 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.777", "lastModified": "2025-01-14T18:15:32.777", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows BitLocker Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de BitLocker en Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json index 25fcd2f7d63..876f3ea6a06 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.973", "lastModified": "2025-01-14T18:15:32.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Secure Boot Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad de Secure Boot" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json index 046fec666c1..3059e21102d 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.193", "lastModified": "2025-01-14T18:15:33.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows NTLM Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad NTLM en Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json index a95ce3e8fd9..bb6c93c4e44 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.370", "lastModified": "2025-01-14T18:15:33.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kerberos Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Kerberos en Windows" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json index 888d37b900b..db0a97c55e0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.547", "lastModified": "2025-01-14T18:15:33.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MapUrlToZone Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json index 987efb74225..14a0b2723c3 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.750", "lastModified": "2025-01-14T18:15:33.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Microsoft Message Queuing" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json index 09f28e72682..a0983957fe9 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.947", "lastModified": "2025-01-14T18:15:33.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json index df276841d43..818319836d5 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.150", "lastModified": "2025-01-14T18:15:34.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el servicio Windows Line Printer Daemon (LPD)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json index 2d7c7eb59a1..a3da4e89669 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.367", "lastModified": "2025-01-14T18:15:34.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en la puerta de enlace de escritorio remoto de Windows (RD Gateway)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json index 3e999fc625c..003e38b2e0a 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.560", "lastModified": "2025-01-14T18:15:34.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json index c06e9c0ebfb..814d64e1492 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.753", "lastModified": "2025-01-14T18:15:34.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json index d1a082f2aaa..9ddc493b95c 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.950", "lastModified": "2025-01-14T18:15:34.950", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json index 35170022333..0f1e03ba267 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.153", "lastModified": "2025-01-14T18:15:35.153", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json index a4d5bdac806..91d2b7217a3 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.333", "lastModified": "2025-01-14T18:15:35.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json index 0125c422bfd..8f23aacbb98 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.513", "lastModified": "2025-01-14T18:15:35.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IP Helper Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de IP Helper" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21232.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21232.json index cc025366303..e02293327c9 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21232.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21232.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.690", "lastModified": "2025-01-14T18:15:35.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21233.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21233.json index 6334aab9b2c..1202c25f6d4 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21233.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21233.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.870", "lastModified": "2025-01-14T18:15:35.870", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21234.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21234.json index 6a94f757d78..8b31c9f8d5b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21234.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21234.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:36.080", "lastModified": "2025-01-14T18:15:36.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows PrintWorkflowUserSvc" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21235.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21235.json index 3c005d86224..e1aad7909a0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21235.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21235.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:36.320", "lastModified": "2025-01-14T18:15:36.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows PrintWorkflowUserSvc" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21236.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21236.json index 60d25c66b2d..7c98b90e85c 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21236.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21236.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:36.667", "lastModified": "2025-01-14T18:15:36.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21237.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21237.json index 22ecc64fe56..a78f300d7bc 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21237.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21237.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:36.983", "lastModified": "2025-01-14T18:15:36.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21238.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21238.json index a144f100daa..130356d20c9 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21238.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21238.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:37.407", "lastModified": "2025-01-14T18:15:37.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21239.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21239.json index cdb4f297cc2..3d4db318cd4 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21239.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21239.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:38.010", "lastModified": "2025-01-14T18:15:38.010", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21240.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21240.json index 3298972d7f0..254fa7fe90f 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21240.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21240.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:38.770", "lastModified": "2025-01-14T18:15:38.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21241.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21241.json index 36af9d0f4a3..b68e76cbe9b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21241.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21241.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:39.490", "lastModified": "2025-01-14T18:15:39.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21242.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21242.json index 77874dff8a2..13b11c12ec7 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21242.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21242.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:39.867", "lastModified": "2025-01-14T18:15:39.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kerberos Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Kerberos en Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21243.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21243.json index 4d402dcdd3f..0d01b7cfea8 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21243.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21243.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:40.180", "lastModified": "2025-01-14T18:15:40.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21244.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21244.json index 626e3ee0cf3..3caf2b634f7 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21244.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21244.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:40.487", "lastModified": "2025-01-14T18:15:40.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21245.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21245.json index f057c9c2787..81fbe2fb71b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21245.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21245.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:41.100", "lastModified": "2025-01-14T18:15:41.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21246.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21246.json index d6c2bf9a7c3..366f84c62e5 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21246.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21246.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:41.790", "lastModified": "2025-01-14T18:15:41.790", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21248.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21248.json index 8126746afe1..d04c9659376 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21248.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21248.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:42.107", "lastModified": "2025-01-14T18:15:42.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21249.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21249.json index 3386e328c31..fdbdcb1aa8e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21249.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21249.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:42.360", "lastModified": "2025-01-14T18:15:42.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21250.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21250.json index 2ab1a16a186..7cb3e5fb8b8 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21250.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21250.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:42.593", "lastModified": "2025-01-14T18:15:42.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21251.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21251.json index dda9c920010..f7ed21219c8 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21251.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21251.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:42.867", "lastModified": "2025-01-14T18:15:42.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21252.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21252.json index e33406d5974..9fd7eea95b6 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21252.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21252.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.180", "lastModified": "2025-01-14T18:15:43.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json index b13b543dc68..5260992d78b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.437", "lastModified": "2025-01-14T18:15:43.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json index a6260e964f0..afef9e4c8a6 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.730", "lastModified": "2025-01-14T18:15:43.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json index 464b1be5ed8..f57949384e7 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.990", "lastModified": "2025-01-14T18:15:43.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows WLAN AutoConfig Service Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servicio de Windows WLAN AutoConfig" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json index 4fc775e9c14..ec0879783a8 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:44.660", "lastModified": "2025-01-14T18:15:44.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json index 5147633e2a0..387e2ef1282 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:44.927", "lastModified": "2025-01-14T18:15:44.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json index 2dd5961ae58..b3eaf91fa74 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.137", "lastModified": "2025-01-14T18:15:45.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json index 954bdd3a092..8c0e003ac6e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.337", "lastModified": "2025-01-14T18:15:45.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json index 416d80263b0..b0788a6a88e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.583", "lastModified": "2025-01-14T18:15:45.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json index be9b8a85174..452aa67bb21 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.797", "lastModified": "2025-01-14T18:15:45.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json index 43d8b6dc56a..28368c9a474 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.023", "lastModified": "2025-01-14T18:15:46.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MapUrlToZone Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json index d7cec8af356..5b85d3bef2e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.290", "lastModified": "2025-01-14T18:15:46.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows HTML Platforms Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad en Windows HTML Platforms" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json index 449284f7890..3b6edb1a784 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.503", "lastModified": "2025-01-14T18:15:46.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json index 54848503567..e7267476a3e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.747", "lastModified": "2025-01-14T18:15:46.747", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Cloud Files Mini Filter Driver" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json index 22a30a91d1d..4fe7543cc44 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.987", "lastModified": "2025-01-14T18:15:46.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows COM Server Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Windows COM Server" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json index 5a7cb50fe65..58e747f79ea 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:47.240", "lastModified": "2025-01-14T18:15:47.240", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json index 043068cba6a..76abb284180 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:47.487", "lastModified": "2025-01-14T18:15:47.487", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Event Tracing Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en Windows Event Tracing" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json index 5134ed54947..2eb3d9a19ea 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:47.723", "lastModified": "2025-01-14T18:15:47.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows App Package Installer Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows App Package Installer" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json index ae58c5327b3..837c8586e21 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.013", "lastModified": "2025-01-14T18:15:48.013", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows MapUrlToZone Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en Windows MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json index a2cacd8488b..8f9350ad91c 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.260", "lastModified": "2025-01-14T18:15:48.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json index c7b0674571f..0e237e58d07 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.480", "lastModified": "2025-01-14T18:15:48.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio en la puerta de enlace de escritorio remoto de Windows (RD Gateway)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json index 3442e7c7daf..6f92944c92b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.690", "lastModified": "2025-01-14T18:15:48.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Virtual Trusted Platform Module Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Virtual Trusted Platform Module" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json index 53a61ef4d5e..f409f1206a6 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.897", "lastModified": "2025-01-14T18:15:48.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft COM for Windows Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft COM para Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json index 0dc5fee856c..70afc9eb9a6 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.110", "lastModified": "2025-01-14T18:15:49.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json index 5e7c0f47510..2316a8cb7cf 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.317", "lastModified": "2025-01-14T18:15:49.317", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Virtual Trusted Platform Module Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Virtual Trusted Platform Module" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21285.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21285.json index f92a2650064..3ee1affa517 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21285.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21285.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.530", "lastModified": "2025-01-14T18:15:49.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21286.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21286.json index fcd4a5f92ad..5caafed61c6 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21286.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21286.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.760", "lastModified": "2025-01-14T18:15:49.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21287.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21287.json index 61cd28a8241..e75feece803 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21287.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21287.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.947", "lastModified": "2025-01-14T18:15:49.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Installer Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Installer" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21288.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21288.json index a3590cea064..8b3c5b9aa1b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21288.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21288.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:50.173", "lastModified": "2025-01-14T18:15:50.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows COM Server Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Windows COM Server" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21289.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21289.json index f74e1d4dd54..12f3329f2d2 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21289.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21289.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:50.363", "lastModified": "2025-01-14T18:15:50.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21290.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21290.json index d7411ab6cb8..83968b9c27f 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21290.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21290.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:50.587", "lastModified": "2025-01-14T18:15:50.587", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft Message Queuing (MSMQ)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21291.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21291.json index 945493d6222..a503f315d9e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21291.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21291.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:50.767", "lastModified": "2025-01-14T18:15:50.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Direct Show Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Direct Show" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21292.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21292.json index 8b7162f5592..11d597312cf 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21292.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21292.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:50.927", "lastModified": "2025-01-14T18:15:50.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Search Service Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Search Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21293.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21293.json index b0e85b071db..364086cda2c 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21293.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21293.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:51.110", "lastModified": "2025-01-14T18:15:51.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Active Directory Domain Services Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Active Directory Domain Services" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21294.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21294.json index cdcffe404b5..ad75de32f27 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21294.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21294.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:51.320", "lastModified": "2025-01-14T18:15:51.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Digest Authentication Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la autenticaci\u00f3n de Microsoft Digest" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21295.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21295.json index 295fea8d9ea..7ea4b7e935e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21295.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21295.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:51.520", "lastModified": "2025-01-14T18:15:51.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del mecanismo de seguridad de SPNEGO Extended Negotiation (NEGOEX)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21296.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21296.json index d326b6e7ae0..737726f68d9 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21296.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21296.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:51.710", "lastModified": "2025-01-14T18:15:51.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "BranchCache Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en BranchCache" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21297.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21297.json index 171f8fda545..7453ba5ef24 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21297.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21297.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:51.890", "lastModified": "2025-01-14T18:15:51.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Services Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Remote Desktop Services" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21298.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21298.json index 02b0e63709b..cfc3debfff0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21298.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21298.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:52.080", "lastModified": "2025-01-14T18:15:52.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows OLE Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows OLE" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21299.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21299.json index 7efb4b20d7f..7c070d776d0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21299.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21299.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:52.270", "lastModified": "2025-01-14T18:15:52.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kerberos Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad Kerberos de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21300.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21300.json index 5c9d5881a91..a4ed5f6640f 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21300.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21300.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:52.463", "lastModified": "2025-01-14T18:15:52.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows upnphost.dll Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio upnphost.dll en Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21301.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21301.json index 3d6056a3700..ab4831ec720 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21301.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21301.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:52.660", "lastModified": "2025-01-14T18:15:52.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Geolocation Service Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Windows Geolocation Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21302.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21302.json index deea1813920..c11922c03aa 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21302.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21302.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:52.840", "lastModified": "2025-01-14T18:15:52.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21303.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21303.json index 8d5d39c5016..2caf896f52e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21303.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21303.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:53.047", "lastModified": "2025-01-14T18:15:53.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21304.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21304.json index f024f0af33c..d16be6092fb 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21304.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21304.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:53.237", "lastModified": "2025-01-14T18:15:53.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft DWM Core Library Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft DWM Core Library" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21305.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21305.json index 85e8016560d..3402ba79f3c 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21305.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21305.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:53.450", "lastModified": "2025-01-14T18:15:53.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21306.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21306.json index a1e3378f713..071d2f641b5 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21306.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21306.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:53.630", "lastModified": "2025-01-14T18:15:53.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21307.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21307.json index f10a0403453..4b6801e8661 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21307.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21307.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:53.837", "lastModified": "2025-01-14T18:15:53.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Reliable Multicast Transport Driver (RMCAST)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21308.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21308.json index f6b26251a40..1741ef7db3f 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21308.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21308.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:54.030", "lastModified": "2025-01-14T18:15:54.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Themes Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de Windows Themes" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21309.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21309.json index a4e259745ba..02a5ddf9765 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21309.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21309.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:54.210", "lastModified": "2025-01-14T18:15:54.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Services Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Remote Desktop Services" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21310.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21310.json index 717431ed6b4..ce9e687a7d5 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21310.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21310.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:54.380", "lastModified": "2025-01-14T18:15:54.380", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21311.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21311.json index 73dd656c8f2..d60bdcbdcb1 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21311.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21311.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:54.567", "lastModified": "2025-01-14T18:15:54.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows NTLM V1 Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows NTLM V1" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21312.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21312.json index ce3bf04c58b..8ec355e8e8b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21312.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21312.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:54.770", "lastModified": "2025-01-14T18:15:54.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Smart Card Reader Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Windows Smart Card Reader" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json index 1ae35057c65..9cb6e965a02 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.007", "lastModified": "2025-01-14T18:15:55.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Security Account Manager (SAM) Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Security Account Manager (SAM)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json index 69c31ccff9d..0b82318868a 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.163", "lastModified": "2025-01-14T18:15:55.163", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows SmartScreen Spoofing Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Windows SmartScreen" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json index 874b82146bb..24b41c0863b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21315.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.343", "lastModified": "2025-01-14T18:15:55.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Brokering File System Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft Brokering File System" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json index c81d61ebb16..55cc4e0986a 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21316.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.510", "lastModified": "2025-01-14T18:15:55.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json index 80964dd3412..6ec95b4b5cb 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21317.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.697", "lastModified": "2025-01-14T18:15:55.697", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json index 79af5217ed1..0445379b02b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21318.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.880", "lastModified": "2025-01-14T18:15:55.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json index 252f2951f0c..7c916f1ab35 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21319.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.090", "lastModified": "2025-01-14T18:15:56.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json index 9273f875de6..ffc47f587cb 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21320.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.297", "lastModified": "2025-01-14T18:15:56.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json index c5179e095d6..12834e66538 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21321.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.533", "lastModified": "2025-01-14T18:15:56.533", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json index 3681e379458..844c6e44356 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21323.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.760", "lastModified": "2025-01-14T18:15:56.760", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Kernel Memory Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de memoria del kernel de Windows" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json index 74b50d0e7d1..ce715ea7f89 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21324.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:56.970", "lastModified": "2025-01-14T18:15:56.970", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json index 95a788b205a..37a922495b1 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-17T01:15:31.073", "lastModified": "2025-01-17T01:15:31.073", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Secure Kernel Mode" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json index c19085520a4..75680a19173 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21326.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.170", "lastModified": "2025-01-14T18:15:57.170", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Internet Explorer Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Internet Explorer" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json index 001c1d6b06d..adcc070e0b0 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21327.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.340", "lastModified": "2025-01-14T18:15:57.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json index 9d703409e94..c87c8c95f3d 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21328.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.530", "lastModified": "2025-01-14T18:15:57.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MapUrlToZone Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21329.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21329.json index fcb60151d48..f8ad73a7d04 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21329.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21329.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.733", "lastModified": "2025-01-14T18:15:57.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MapUrlToZone Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21330.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21330.json index d784976c84a..9ff0b1fcdd6 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21330.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21330.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:57.940", "lastModified": "2025-01-14T18:15:57.940", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Remote Desktop Services\u00a0Denial of Service Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Windows Remote Desktop Services" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21331.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21331.json index 0c13251199a..83b2b0973d8 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21331.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21331.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:58.120", "lastModified": "2025-01-14T18:15:58.120", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Installer Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Installer" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21332.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21332.json index 96aa68acd60..3b3ccfae1f0 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21332.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21332.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:58.307", "lastModified": "2025-01-14T18:15:58.307", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MapUrlToZone Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de la funci\u00f3n de seguridad MapUrlToZone" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json index c2b38321f64..e12cc741290 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21333.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21334.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21334.json index 2581b6caa61..3a9ea174aaf 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21334.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21334.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -46,7 +46,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21335.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21335.json index 4522b2ac848..05ad4a48782 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21335.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21335.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -46,7 +46,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21336.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21336.json index 2852eab9282..06c2d57bfcf 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21336.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21336.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:59.143", "lastModified": "2025-01-14T18:15:59.143", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Cryptographic Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Windows Cryptographic" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21338.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21338.json index d7c5f473bc7..f9e83de5d0a 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21338.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21338.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:59.300", "lastModified": "2025-01-14T18:15:59.300", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GDI+ Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en GDI+" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21339.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21339.json index 813349d164f..c931534b7fd 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21339.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21339.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:59.480", "lastModified": "2025-01-14T18:15:59.480", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Telephony Service Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Windows Telephony Service" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21340.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21340.json index eeadbd542f3..aebbc93950f 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21340.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21340.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:59.673", "lastModified": "2025-01-14T18:15:59.673", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad de Windows Virtualization-Based Security (VBS)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21341.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21341.json index 2f7f6a96821..50ad27a43d1 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21341.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21341.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:59.853", "lastModified": "2025-01-14T18:15:59.853", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Digital Media Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Digital Media" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21343.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21343.json index d85b95500bb..26d6d6e83d6 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21343.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21343.json @@ -3,19 +3,23 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:00.053", "lastModified": "2025-01-14T18:16:00.053", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Web Threat Defense User Service Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servicio de usuario de Windows Web Threat Defense" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21344.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21344.json index 7d0357e8c03..6b13495353c 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21344.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21344.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:00.227", "lastModified": "2025-01-14T18:16:00.227", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft SharePoint Server" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21345.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21345.json index 74169126878..6f357082531 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21345.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21345.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:00.437", "lastModified": "2025-01-14T18:16:00.437", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office Visio" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21346.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21346.json index 3ffee249d97..2541aa99966 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21346.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21346.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:00.607", "lastModified": "2025-01-14T18:16:00.607", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad de Microsoft Office" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21348.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21348.json index f4ab2d4e48c..18a29d3ffe6 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21348.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21348.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:00.780", "lastModified": "2025-01-14T18:16:00.780", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft SharePoint Server" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21354.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21354.json index 94267b3ba3b..b2869ff0032 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21354.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21354.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:00.947", "lastModified": "2025-01-15T00:15:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Excel Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Excel" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21356.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21356.json index fa9681d490c..1e90988e511 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21356.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21356.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:01.130", "lastModified": "2025-01-14T18:16:01.130", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office Visio Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office Visio" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21357.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21357.json index 7083a331e58..a46d14765f6 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21357.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21357.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:01.293", "lastModified": "2025-01-14T18:16:01.293", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Outlook Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Outlook" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21374.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21374.json index e25c43f7b51..bed2f28cb4d 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21374.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21374.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21378.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21378.json index 7d73c27de9f..22550fced23 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21378.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21378.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21382.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21382.json index 7d0c1d45ccb..9e0e4e53885 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21382.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21382.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21389.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21389.json index 5f76c145fcd..3e22fe45223 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21389.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21389.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json index 1dc07dca709..babc7c9c63e 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:04.190", "lastModified": "2025-01-14T18:16:04.190", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Office OneNote Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft Office OneNote" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json index 91009d9087f..538d1654b31 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:04.350", "lastModified": "2025-01-14T18:16:04.350", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "On-Premises Data Gateway Information Disclosure Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en On-Premises Data Gateway" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json index 9a693555f07..d4e017a37d1 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21409.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json index 1ad620df62b..a12f9ac5046 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21411.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json index d6d0fa55765..f011b7c6aa5 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21413.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json index 23fe7064780..8f5d61c8185 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21417.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21629.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21629.json index 8e98c1a1d0c..3805ecb906d 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21629.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21629.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-15T13:15:15.220", "lastModified": "2025-01-15T13:15:15.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22134.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22134.json index eefed9cbbd8..1eafb6975e1 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22134.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22134.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:14.333", "lastModified": "2025-01-13T21:15:14.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When switching to other buffers using the :all command and visual mode still being active, this may cause a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try to access a position if the position is greater than the corresponding buffer line. Impact is medium since the user must have switched on visual mode when executing the :all ex command. The Vim project would like to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch v9.1.1003" + }, + { + "lang": "es", + "value": "Al cambiar a otros buffers usando el comando :all y el modo visual a\u00fan est\u00e1 activo, esto puede causar un desbordamiento del b\u00fafer de mont\u00f3n, porque Vim no finaliza correctamente el modo visual y, por lo tanto, puede intentar acceder m\u00e1s all\u00e1 del final de una l\u00ednea en un b\u00fafer. En el parche 9.1.1003, Vim restablecer\u00e1 correctamente el modo visual antes de abrir otras ventanas y b\u00faferes y, por lo tanto, solucionar\u00e1 este error. Adem\u00e1s, verifica que no intentar\u00e1 acceder a una posici\u00f3n si la posici\u00f3n es mayor que la l\u00ednea del b\u00fafer correspondiente. El impacto es medio ya que el usuario debe haber activado el modo visual al ejecutar el comando :all ex. El proyecto Vim desea agradecer al usuario de Github gandalf4a por informar este problema. El problema se ha solucionado a partir del parche de Vim v9.1.1003" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22138.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22138.json index 980ef05b9c0..33839caf33c 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22138.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22138.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:14.500", "lastModified": "2025-01-13T21:15:14.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "@codidact/qpixel is a Q&A-based community knowledge-sharing software. In affected versions when a category is set to private or limited-visibility within QPixel's admin tools, suggested edits within this category can still be viewed by unprivileged or anonymous users via the suggested edit queue. This issue has not yet been patched and no workarounds are available. Users are advised to follow the development repo for updates.\n\n### Patches\nNot yet patched.\n\n### Workarounds\nNone available. Private or limited-visibility categories should not be considered ways to store sensitive information.\n\n### References\nInternal: [SUPPORT-114](https://codidact.atlassian.net/issues/SUPPORT-114)" + }, + { + "lang": "es", + "value": "@codidact/qpixel es un software de intercambio de conocimientos basado en preguntas y respuestas. En las versiones afectadas, cuando una categor\u00eda se configura como privada o con visibilidad limitada dentro de las herramientas de administraci\u00f3n de QPixel, los usuarios sin privilegios o an\u00f3nimos a\u00fan pueden ver las ediciones sugeridas dentro de esta categor\u00eda a trav\u00e9s de la cola de ediciones sugeridas. Este problema a\u00fan no se ha solucionado y no hay Workarounds disponibles. Se recomienda a los usuarios que sigan el repositorio de desarrollo para obtener actualizaciones. ### Parches A\u00fan no se han solucionado. ### WWorkaroundsNo hay ninguno disponible. Las categor\u00edas privadas o con visibilidad limitada no deben considerarse formas de almacenar informaci\u00f3n confidencial. ### Referencias Interno: [SUPPORT-114](https://codidact.atlassian.net/issues/SUPPORT-114)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json index 3ee231082b5..f4618bf81fa 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22139.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "WeGIA es un administrador web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint configuracao_geral.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro msg_c. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.8." + "value": "WeGIA es un administrador web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en el endpoint configuracao_geral.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro msg_c. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json index 0c947c3e5d9..22cd9c02f46 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22142.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T20:15:29.677", "lastModified": "2025-01-13T21:15:14.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "NamelessMC es un software de sitios web gratuito, f\u00e1cil de usar y potente para servidores de Minecraft. En las versiones afectadas, un administrador puede agregar la capacidad de que los usuarios completen un campo adicional y los usuarios pueden inyectar c\u00f3digo javascript en \u00e9l que se activar\u00eda una vez que un miembro del personal visite el perfil del usuario en el panel del personal. Como resultado, un atacante puede ejecutar c\u00f3digo javascript en la ordenador del miembro del personal. Este problema se ha solucionado en la versi\u00f3n 2.1.3 y se recomienda a todos los usuarios que actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json index 7564e6a7b67..4123a4e1445 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22143.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint listar_permissoes.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro msg_e. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en el endpoint listar_permissoes.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar secuencias de comandos maliciosas en el par\u00e1metro msg_e. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json index 144dd8e236b..2747afc8797 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22144.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T20:15:29.817", "lastModified": "2025-01-13T21:15:14.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "NamelessMC es un software gratuito, f\u00e1cil de usar y potente para servidores de Minecraft. Un usuario con permisos admincp.core.emails o admincp.users.edit puede validar usuarios y un atacante puede restablecer sus contrase\u00f1as. Cuando la cuenta se aprueba correctamente por correo electr\u00f3nico, el c\u00f3digo de restablecimiento es NULL, pero cuando la cuenta es validada manualmente por un usuario con permisos admincp.core.emails o admincp.users.edit, el c\u00f3digo de restablecimiento ya no ser\u00e1 NULL, sino que estar\u00e1 vac\u00edo. Un atacante puede solicitar http://localhost/nameless/index.php?route=/forgot_password/&c= y restablecer la contrase\u00f1a. Como resultado, un atacante puede comprometer la contrase\u00f1a de otro usuario y tomar el control de su cuenta. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 2.1.3 y se recomienda a todos los usuarios que la actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22146.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22146.json index 2062148dfe8..a71eb466e38 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22146.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22146.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-15T20:15:30.557", "lastModified": "2025-01-15T20:15:30.557", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring tool. A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. The Sentry SaaS fix was deployed on Jan 14, 2025. For self hosted users; if only a single organization is allowed `(SENTRY_SINGLE_ORGANIZATION = True)`, then no action is needed. Otherwise, users should upgrade to version 25.1.0 or higher. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Sentry es una herramienta de seguimiento de errores y monitoreo de rendimiento dise\u00f1ada para desarrolladores. Se descubri\u00f3 una vulnerabilidad cr\u00edtica en la implementaci\u00f3n de SSO SAML de Sentry. Se nos inform\u00f3 a trav\u00e9s de nuestro programa privado de recompensas por errores. La vulnerabilidad permite a un atacante tomar el control de cualquier cuenta de usuario mediante el uso de un proveedor de identidad SAML malicioso y otra organizaci\u00f3n en la misma instancia de Sentry. Se debe conocer la direcci\u00f3n de correo electr\u00f3nico de la v\u00edctima para explotar esta vulnerabilidad. La correcci\u00f3n de Sentry SaaS se implement\u00f3 el 14 de enero de 2025. Para usuarios alojados en el servidor propio; si solo se permite una \u00fanica organizaci\u00f3n `(SENTRY_SINGLE_ORGANIZATION = True)`, no se necesita ninguna acci\u00f3n. De lo contrario, los usuarios deben actualizar a la versi\u00f3n 25.1.0 o superior. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22152.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22152.json index 9d32c87f618..0cf78fd5260 100644 --- a/CVE-2025/CVE-2025-221xx/CVE-2025-22152.json +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22152.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:29.910", "lastModified": "2025-01-10T16:15:29.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Atheos is a self-hosted browser-based cloud IDE. Prior to v600, the $path and $target parameters are not properly validated across multiple components, allowing an attacker to read, modify, or execute arbitrary files on the server. These vulnerabilities can be exploited through various attack vectors present in multiple PHP files. This vulnerability is fixed in v600." + }, + { + "lang": "es", + "value": "Atheos es un IDE en la nube basado en navegador y alojado por el usuario. Antes de la versi\u00f3n v600, los par\u00e1metros $path y $target no se validaban correctamente en varios componentes, lo que permit\u00eda a un atacante leer, modificar o ejecutar archivos arbitrarios en el servidor. Estas vulnerabilidades se pueden explotar a trav\u00e9s de varios vectores de ataque presentes en varios archivos PHP. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n v600." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22314.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22314.json index b3b5f601aef..02846ab0212 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22314.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22314.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:10.270", "lastModified": "2025-01-13T14:15:10.270", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Scripts Food Store \u2013 Online Food Delivery & Pickup allows Reflected XSS.This issue affects Food Store \u2013 Online Food Delivery & Pickup: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Scripts Food Store \u2013 Online Food Delivery & Pickup permite XSS reflejado. Este problema afecta a Food Store \u2013 Online Food Delivery & Pickup: desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22317.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22317.json index 610bd1bf3d3..a8c4bd9854c 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22317.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22317.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:34.590", "lastModified": "2025-01-15T16:15:34.590", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in galleryape Photo Gallery \u2013 Image Gallery by Ape allows Reflected XSS.This issue affects Photo Gallery \u2013 Image Gallery by Ape: from n/a through 2.2.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en galleryape Photo Gallery \u2013 Image Gallery by Ape permite XSS reflejado. Este problema afecta a Photo Gallery \u2013 Image Gallery by Ape: desde n/a hasta 2.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22329.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22329.json index 1ec41027396..ad7a7d6aec5 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22329.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22329.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:34.763", "lastModified": "2025-01-15T16:15:34.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AGILELOGIX Free Google Maps allows Stored XSS.This issue affects Free Google Maps: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AGILELOGIX Free Google Maps permite XSS almacenado. Este problema afecta a Free Google Maps: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22337.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22337.json index 2f3c372eefe..240dfb8313d 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22337.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22337.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:10.440", "lastModified": "2025-01-13T14:15:10.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Infosoft Consultant Order Audit Log for WooCommerce allows Reflected XSS.This issue affects Order Audit Log for WooCommerce: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Infosoft Consultant Order Audit Log for WooCommerce permite XSS reflejado. Este problema afecta a Order Audit Log for WooCommerce: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22344.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22344.json index 3b4e7386d0f..4e13c5fb274 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22344.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22344.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:10.613", "lastModified": "2025-01-13T14:15:10.613", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Convoy Media Category Library allows Reflected XSS.This issue affects Media Category Library: from n/a through 2.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Convoy Media Category Library permite XSS reflejado. Este problema afecta a Media Category Library: desde n/a hasta 2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22346.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22346.json index 1c2e5dd13f2..9b2b65c36a8 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22346.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22346.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:34.923", "lastModified": "2025-01-15T16:15:34.923", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Faizaan Gagan Course Migration for LearnDash allows Server Side Request Forgery.This issue affects Course Migration for LearnDash: from 1.0.2 through n/a." + }, + { + "lang": "es", + "value": "La vulnerabilidad Server-Side Request Forgery (SSRF) en Faizaan Gagan Course Migration for LearnDash permite Server Side Request Forgery. Este problema afecta a Course Migration for LearnDash: desde 1.0.2 hasta n/a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json index 5eaecc83653..57cc6dc26d5 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22394.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-15T05:15:10.343", "lastModified": "2025-01-15T05:15:10.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Display Manager, versions prior to 2.3.2.18, contain a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to code execution and possibly privilege escalation." + }, + { + "lang": "es", + "value": " Dell Display Manager, versiones anteriores a la 2.3.2.18, contiene una vulnerabilidad de Time-of-check Time-of-use (TOCTOU). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo y posiblemente la escalada de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22498.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22498.json index eb4b2cffa62..1955d6b8d3b 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22498.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22498.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:10.787", "lastModified": "2025-01-13T14:15:10.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en New Normal LLC LucidLMS permite XSS reflejado. Este problema afecta a LucidLMS: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22499.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22499.json index 2e665664bf4..9a9155ece96 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22499.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22499.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:10.960", "lastModified": "2025-01-13T14:15:10.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FAKTOR VIER F4 Post Tree allows Reflected XSS.This issue affects F4 Post Tree: from n/a through 1.1.18." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en FAKTOR VIER F4 Post Tree permite XSS reflejado. Este problema afecta a F4 Post Tree: desde n/a hasta 1.1.18." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22506.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22506.json index 706f5f6a9eb..93038691001 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22506.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22506.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:11.127", "lastModified": "2025-01-13T14:15:11.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SmartAgenda Smart Agenda allows Stored XSS.This issue affects Smart Agenda: from n/a through 4.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SmartAgenda Smart Agenda permite XSS almacenado. Este problema afecta a Smart Agenda: desde n/a hasta 4.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22514.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22514.json index 22b1af6ca40..c7c168605e5 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22514.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22514.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:11.290", "lastModified": "2025-01-13T14:15:11.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Tatheer KNR Author List Widget allows Reflected XSS.This issue affects KNR Author List Widget: from n/a through 3.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Yamna Tatheer KNR Author List Widget permite XSS reflejado. Este problema afecta a KNR Author List Widget: desde n/a hasta 3.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22567.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22567.json index 0ce34bde851..cd91ffcf458 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22567.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22567.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:11.460", "lastModified": "2025-01-13T14:15:11.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in trustist TRUSTist REVIEWer allows Reflected XSS.This issue affects TRUSTist REVIEWer: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Trustist TRUSTist REVIEWer permite XSS reflejado. Este problema afecta a TRUSTist REVIEWer: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22568.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22568.json index 741ad391c0f..c997654c2d9 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22568.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22568.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:11.610", "lastModified": "2025-01-13T14:15:11.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paramveer Singh for Arete IT Private Limited Post And Page Reactions allows Reflected XSS.This issue affects Post And Page Reactions: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Paramveer Singh para Arete IT Private Limited Post And Page Reactions permite XSS reflejado. Este problema afecta a Post And Page Reactions: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22569.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22569.json index a21d89bf1ca..b4b0a52f6ee 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22569.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22569.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:11.787", "lastModified": "2025-01-13T14:15:11.787", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grandslambert Featured Page Widget allows Reflected XSS.This issue affects Featured Page Widget: from n/a through 2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en grandslambert Featured Page Widget permite XSS reflejado. Este problema afecta a Featured Page Widget: desde n/a hasta 2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22570.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22570.json index 301f3a04d01..8eb7b122e25 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22570.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22570.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:11.940", "lastModified": "2025-01-13T14:15:11.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Milo\u0161 \u0110eki\u0107 Inline Tweets allows Stored XSS.This issue affects Inline Tweets: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Milo\u0161 ?eki? Inline Tweets permite XSS almacenado. Este problema afecta a Inline Tweets: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22576.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22576.json index 2c3c82c8159..b00c3b05a84 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22576.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22576.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:12.117", "lastModified": "2025-01-13T14:15:12.117", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcus Downing Site PIN allows Reflected XSS.This issue affects Site PIN: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Marcus Downing Site PIN permite XSS reflejado. Este problema afecta a Site PIN: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22583.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22583.json index fb3a2bdbb21..de67deb434d 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22583.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22583.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:12.300", "lastModified": "2025-01-13T14:15:12.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anshul Sojatia Scan External Links allows Reflected XSS.This issue affects Scan External Links: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Anshul Sojatia Scan External Links permite XSS reflejado. Este problema afecta a Scan External Links: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22586.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22586.json index ab64b77a917..27fd6ca5df1 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22586.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22586.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:12.490", "lastModified": "2025-01-13T14:15:12.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Detlef St\u00f6ver WPEX Replace DB Urls allows Reflected XSS.This issue affects WPEX Replace DB Urls: from n/a through 0.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPEX Replace DB Urls de Detlef St\u00f6ver permite XSS reflejado. Este problema afecta a WPEX Replace DB Urls: desde n/a hasta 0.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22587.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22587.json index 89bc2d9f49c..f2201e48a3a 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22587.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22587.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:35.097", "lastModified": "2025-01-15T16:15:35.097", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NCiphers SEO Bulk Editor allows Stored XSS.This issue affects SEO Bulk Editor: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NCiphers SEO Bulk Editor permite XSS almacenado. Este problema afecta a SEO Bulk Editor: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22588.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22588.json index 45100049781..0fdbe235080 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22588.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22588.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:12.660", "lastModified": "2025-01-13T14:15:12.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scanventory.net Scanventory allows Reflected XSS.This issue affects Scanventory: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Scanventory.net Scanventory permite XSS reflejado. Este problema afecta a Scanventory: desde n/a hasta 1.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22596.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22596.json index 9062259b4e4..ddce3a80b1c 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22596.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22596.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:30.143", "lastModified": "2025-01-10T16:15:30.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the modulos_visiveis.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un administrador web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en el endpoint modulos_visiveis.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro msg_c. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22597.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22597.json index 1c96e497a03..79c963f5e05 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22597.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22597.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:30.343", "lastModified": "2025-01-10T16:15:30.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the CobrancaController.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado en el endpoint CobrancaController.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro local_recepcao. Los scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22598.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22598.json index cdd9c15d0e5..669b5503152 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22598.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22598.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:30.540", "lastModified": "2025-01-10T16:15:30.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the cadastrarSocio.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se ha identificado una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado en el endpoint cadastrarSocio.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro local_recepcao. Los scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22599.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22599.json index bbd6103c681..cfbc90098d8 100644 --- a/CVE-2025/CVE-2025-225xx/CVE-2025-22599.json +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22599.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:30.737", "lastModified": "2025-01-10T16:15:30.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the home.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un administrador web para instituciones de beneficencia. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en el endpoint home.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro msg_c. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22600.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22600.json index 467cde4acab..7427f6c4a26 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22600.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22600.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:30.940", "lastModified": "2025-01-10T16:15:30.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the avulso parameter. This vulnerability is fixed in 3.2.8." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting (XSS) Reflejado en el endpoint configuracao_doacao.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro avulso. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22613.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22613.json index 34097153089..c380d07dfb6 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22613.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22613.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:14.837", "lastModified": "2025-01-14T01:15:17.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `informacao_adicional.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `informacao_adicional.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad Cross-Site Scripting Almacenado (XSS) en el `informacao_adicional.php` Endpoint de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar Scripts maliciosos en el par\u00e1metro `descricao`. Los Scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. La aplicaci\u00f3n no puede validar y desinfectar correctamente las entradas del usuario en el par\u00e1metro `informacao_adicional.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar Scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el Payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos del usuario y sistema. Este problema se ha solucionado en la versi\u00f3n 3.2.6 y se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22614.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22614.json index 033198dab3e..6136050c2aa 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22614.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22614.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:14.967", "lastModified": "2025-01-13T21:15:14.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `dependente_editarInfoPessoal.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `nome` and `SobrenomeForm`parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `dependente_editarInfoPessoal.php` parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross-Site Scripting \nalmacenado (XSS) en el endpoint `dependente_editarInfoPessoal.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en los par\u00e1metros `nome` y `SobrenomeForm`. Los scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en los par\u00e1metros `dependente_editarInfoPessoal.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, la carga maliciosa se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22615.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22615.json index 637ec212662..bd0ab4e0d51 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22615.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22615.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:15.110", "lastModified": "2025-01-13T21:15:15.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `Cadastro_Atendido.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `cpf` parameter. The application fails to validate and sanitize user inputs in the `cpf` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint `Cadastro_Atendido.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `cpf`. La aplicaci\u00f3n no puede validar ni desinfectar las entradas del usuario en el par\u00e1metro `cpf`. Esta falta de validaci\u00f3n permite la inyecci\u00f3n de payloads maliciosos, que se reflejan en el navegador del usuario en la respuesta del servidor y se ejecutan dentro del contexto del navegador de la v\u00edctima. Este problema se ha solucionado en la versi\u00f3n 3.2.6 y se recomienda a todos los usuarios que la actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22616.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22616.json index 1682ca938d4..5fb1f8c0377 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22616.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22616.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:15.237", "lastModified": "2025-01-13T21:15:15.237", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `dependente_parentesco_adicionar.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `dependente_parentesco_adicionar.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad Cross-Site Scripting Almacenado (XSS) en el `dependente_parentesco_adicionar.php` Endpoint de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar Scripts malicioso en el par\u00e1metro `descricao`. Los Scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. La aplicaci\u00f3n no puede validar y Desinfectar correctamente las entradas del usuario en el par\u00e1metro `dependente_parentesco_adicionar.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar Scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el Payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos del usuario y sistema. Este problema se ha solucionado en la versi\u00f3n 3.2.6 y se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22617.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22617.json index 6ec063d5309..d64b5f2b519 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22617.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22617.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:15.370", "lastModified": "2025-01-13T21:15:15.370", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `editar_socio.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `socio` parameter. The application fails to validate and sanitize user inputs in the `socio` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad Cross-Site Scripting Reflejado (XSS) en el `editar_socio.php` Endpoint de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar Scripts maliciosos en el par\u00e1metro `socio`. La aplicaci\u00f3n no puede validar y Desinfectar las entradas del usuario en el par\u00e1metro `socio`. Esta falta de validaci\u00f3n permite la inyecci\u00f3n de Payloads maliciosos, que se reflejan en el navegador del usuario en la respuesta del servidor y se ejecutan dentro del contexto del navegador de la v\u00edctima. Este problema se ha solucionado en la versi\u00f3n 3.2.7 y se recomienda a todos los usuarios que actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22618.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22618.json index ce9471be297..10568e1adaf 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22618.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22618.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:15.500", "lastModified": "2025-01-13T21:15:15.500", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_cargo.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `cargo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_cargo.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in release version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad Cross-Site Scripting Almacenado (XSS) en el `adicionar_cargo.php` Endpoint de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar Scripts maliciosos en el par\u00e1metro `cargo`. Los Scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad significativo. La aplicaci\u00f3n no puede validar y Desinfectar correctamente las entradas del usuario en el par\u00e1metro `adicionar_cargo.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar Scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el Payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos del usuario y sistema. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 3.2.6 y se recomienda a todos los usuarios que la actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22619.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22619.json index 8b040cfdd24..6b57393be17 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22619.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22619.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T21:15:15.620", "lastModified": "2025-01-13T21:15:15.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `editar_permissoes.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `msg_c` parameter. The application fails to validate and sanitize user inputs in the `msg_c` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in release version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad Cross-Site Scripting Reflejado (XSS) en el `editar_permissoes.php` Endpoint de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar Scripts maliciosos en el par\u00e1metro `msg_c`. La aplicaci\u00f3n no puede validar y Desinfectar las entradas del usuario en el par\u00e1metro `msg_c`. Esta falta de validaci\u00f3n permite la inyecci\u00f3n de Payloads maliciosos, que se reflejan en el navegador del usuario en la respuesta del servidor y se ejecutan dentro del contexto del navegador de la v\u00edctima. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22724.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22724.json index d213069a60a..6c161520574 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22724.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22724.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:35.250", "lastModified": "2025-01-15T16:15:35.250", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MojofyWP Product Carousel For WooCommerce \u2013 WoorouSell allows Stored XSS.This issue affects Product Carousel For WooCommerce \u2013 WoorouSell: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en MojofyWP Product Carousel For WooCommerce \u2013 WoorouSell permite XSS almacenado. Este problema afecta a Product Carousel For WooCommerce \u2013 WoorouSell: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22729.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22729.json index 7ca71667aec..db4cc09c714 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22729.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22729.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:35.400", "lastModified": "2025-01-15T16:15:35.400", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Infomaniak Staff VOD Infomaniak allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VOD Infomaniak: from n/a through 1.5.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Infomaniak Staff VOD Infomaniak permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a VOD Infomaniak: desde n/a hasta 1.5.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22731.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22731.json index b84a202076c..9316662ad24 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22731.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22731.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:35.550", "lastModified": "2025-01-15T16:15:35.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in silverplugins217 Build Private Store For Woocommerce allows Cross Site Request Forgery.This issue affects Build Private Store For Woocommerce: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad Cross-Site Request Forgery (CSRF) en silverplugins217 Build Private Store For Woocommerce permite Cross Site Request Forgery. Este problema afecta a Build Private Store For Woocommerce: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22734.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22734.json index b3a313a690e..08032a1979b 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22734.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22734.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:35.703", "lastModified": "2025-01-15T16:15:35.703", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Data443 Posts Footer Manager allows Stored XSS.This issue affects Posts Footer Manager: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Data443 Posts Footer Manager permite XSS almacenado. Este problema afecta a Posts Footer Manager: desde n/a hasta 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22736.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22736.json index 958f6c50e23..c0de929d965 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22736.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22736.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:35.877", "lastModified": "2025-01-15T16:15:35.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in WPExperts User Management allows Privilege Escalation.This issue affects User Management: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en WPExperts User Management permite la escalada de privilegios. Este problema afecta a User Management: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22737.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22737.json index ff639626a7b..13801256d40 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22737.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22737.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.030", "lastModified": "2025-01-15T16:15:36.030", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in MagePeople Team WpTravelly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WpTravelly: from n/a through 1.8.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en MagePeople Team WpTravelly permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WpTravelly: desde n/a hasta 1.8.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22738.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22738.json index 14121b6d14e..45bf422ae0a 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22738.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22738.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.187", "lastModified": "2025-01-15T16:15:36.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechnoWich WP ULike allows Stored XSS.This issue affects WP ULike: from n/a through 4.7.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en TechnoWich WP ULike permite XSS almacenado. Este problema afecta a WP ULike: desde n/a hasta 4.7.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22742.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22742.json index 8989cd30219..ff14c1f494d 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22742.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22742.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.350", "lastModified": "2025-01-15T16:15:36.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in falldeaf WP ViewSTL allows DOM-Based XSS.This issue affects WP ViewSTL: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en falldeaf WP ViewSTL permite XSS basado en DOM. Este problema afecta a WP ViewSTL: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22743.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22743.json index 0360103cac0..a6350b194aa 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22743.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22743.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.503", "lastModified": "2025-01-15T16:15:36.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohsin Rasool Twitter Bootstrap Collapse aka Accordian Shortcode allows DOM-Based XSS.This issue affects Twitter Bootstrap Collapse aka Accordian Shortcode: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mohsin Rasool Twitter Bootstrap Collapse, tambi\u00e9n conocido como Accordian Shortcode, permite XSS basado en DOM. Este problema afecta a Twitter Bootstrap Collapse, tambi\u00e9n conocido como Accordian Shortcode: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22744.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22744.json index d34b85836bf..54d5b8860c1 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22744.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22744.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.657", "lastModified": "2025-01-15T16:15:36.657", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob von Bothmer / SeoDev S-DEV SEO allows Stored XSS.This issue affects S-DEV SEO: from n/a through 1.88." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Rob von Bothmer / SeoDev S-DEV SEO permite XSS almacenado. Este problema afecta a S-DEV SEO: desde n/a hasta 1.88." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22745.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22745.json index fa7daf1b84f..edd6e4cf83b 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22745.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22745.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.810", "lastModified": "2025-01-15T16:15:36.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bj\u00f6rn Weinbrenner Navigation Du Lapin Blanc allows DOM-Based XSS.This issue affects Navigation Du Lapin Blanc: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bj\u00f6rn Weinbrenner Navigation Du Lapin Blanc permite XSS basado en DOM. Este problema afecta a Navigation Du Lapin Blanc: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22746.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22746.json index 7be406616ec..0ac9e5d8930 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22746.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22746.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:36.980", "lastModified": "2025-01-15T16:15:36.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HireHive HireHive Job Plugin allows Stored XSS.This issue affects HireHive Job Plugin: from n/a through 2.9.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en HireHive HireHive Job Plugin permite XSS almacenado. Este problema afecta a HireHive Job Plugin: desde n/a hasta 2.9.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22747.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22747.json index 48bb620b5ae..461851b5e99 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22747.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22747.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:37.150", "lastModified": "2025-01-15T16:15:37.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tor Morten Jensen Foundation Columns allows Stored XSS.This issue affects Foundation Columns: from n/a through 0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tor Morten Jensen Foundation Columns permite XSS almacenado. Este problema afecta a Foundation Columns: desde n/a hasta 0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22748.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22748.json index 92d9f198713..bfef03c825a 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22748.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22748.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:37.300", "lastModified": "2025-01-15T16:15:37.300", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SetMore Appointments SetMore Theme \u2013 Custom Post Types allows Stored XSS.This issue affects SetMore Theme \u2013 Custom Post Types: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en SetMore Appointments SetMore Theme \u2013 Custom Post Types permite XSS almacenado. Este problema afecta a SetMore Theme \u2013 Custom Post Types: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22749.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22749.json index 49f650e9ac5..728cde88490 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22749.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22749.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:37.450", "lastModified": "2025-01-15T16:15:37.450", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AwoThemes Social Media Engine allows Stored XSS.This issue affects Social Media Engine: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AwoThemes Social Media Engine permite XSS almacenado. Este problema afecta a Social Media Engine: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22750.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22750.json index 8c79f09fedd..4fdf22b78c2 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22750.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22750.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:37.610", "lastModified": "2025-01-15T16:15:37.610", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel Post Carousel & Slider allows Reflected XSS.This issue affects Post Carousel & Slider: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tarak Patel Post Carousel & Slider permite XSS reflejado. Este problema afecta a Post Carousel & Slider: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22751.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22751.json index 6bbe9ca92a3..9c08fbfd6a5 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22751.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22751.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:37.770", "lastModified": "2025-01-15T16:15:37.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mighty Digital Partners allows Reflected XSS.This issue affects Partners: from n/a through 0.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mighty Digital Partners permite XSS reflejado. Este problema afecta a Partners: desde n/a hasta 0.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22752.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22752.json index 184a9a161a0..c8f597172c2 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22752.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22752.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:37.933", "lastModified": "2025-01-15T16:15:37.933", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GSheetConnector GSheetConnector for Forminator Forms allows Reflected XSS.This issue affects GSheetConnector for Forminator Forms: from n/a through 1.0.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en GSheetConnector GSheetConnector para Forminator Forms permite XSS reflejado. Este problema afecta a GSheetConnector para Forminator Forms: desde n/a hasta 1.0.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22753.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22753.json index edd12f1c3ca..9f3914105a3 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22753.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22753.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:38.090", "lastModified": "2025-01-15T16:15:38.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dueclic turboSMTP allows Reflected XSS.This issue affects turboSMTP: from n/a through 4.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en turboSMTP de dueclic permite XSS reflejado. Este problema afecta a turboSMTP: desde n/a hasta 4.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22754.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22754.json index 36427c37f9c..8e049e36cdb 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22754.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22754.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:38.260", "lastModified": "2025-01-15T16:15:38.260", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berkman Center for Internet & Society Amber allows Reflected XSS.This issue affects Amber: from n/a through 1.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Berkman Center for Internet & Society Amber permite XSS reflejado. Este problema afecta a Amber: desde n/a hasta 1.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22755.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22755.json index 0ff71738f06..df3979880fc 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22755.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22755.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:38.417", "lastModified": "2025-01-15T16:15:38.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in James Bavington WP Headmaster allows Reflected XSS.This issue affects WP Headmaster: from n/a through 0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Headmaster de James Bavington que permite XSS reflejado. Este problema afecta a WP Headmaster: desde n/a hasta 0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22758.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22758.json index a2a634c1ad7..6038688f4eb 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22758.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22758.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:38.577", "lastModified": "2025-01-15T16:15:38.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aiwp Elementor AI Addons allows DOM-Based XSS.This issue affects Elementor AI Addons: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en aiwp Elementor AI Addons permite XSS basado en DOM. Este problema afecta a Elementor AI Addons: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22759.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22759.json index c070870416e..fece5610533 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22759.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22759.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:38.733", "lastModified": "2025-01-15T16:15:38.733", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldGrid Post and Page Builder by BoldGrid \u2013 Visual Drag and Drop Editor allows Stored XSS.This issue affects Post and Page Builder by BoldGrid \u2013 Visual Drag and Drop Editor: from n/a through 1.27.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en BoldGrid Post and Page Builder de BoldGrid \u2013 Visual Drag and Drop Editor permite XSS almacenado. Este problema afecta a Post and Page Builder de BoldGrid \u2013 Visual Drag and Drop Editor: desde n/a hasta 1.27.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22760.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22760.json index b2764995d84..e19dc812fc2 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22760.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22760.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:38.890", "lastModified": "2025-01-15T16:15:38.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Reflected XSS.This issue affects CodeBard Help Desk: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CodeBard CodeBard Help Desk permite XSS reflejado. Este problema afecta a CodeBard Help Desk: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22761.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22761.json index 283526a30b3..da08c7cba48 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22761.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22761.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:39.053", "lastModified": "2025-01-15T16:15:39.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through 1.2.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Olaf Lederer Ajax Contact Form permite XSS almacenado. Este problema afecta a Ajax Contact Form: desde n/a hasta 1.2.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22762.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22762.json index a8997e7dff3..aabb5e5a997 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22762.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22762.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:39.227", "lastModified": "2025-01-15T16:15:39.227", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Octrace Studio WordPress HelpDesk & Support Ticket System Plugin \u2013 Octrace Support allows Stored XSS.This issue affects WordPress HelpDesk & Support Ticket System Plugin \u2013 Octrace Support: from n/a through 1.2.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Octrace Studio WordPress HelpDesk & Support Ticket System Plugin \u2013 Octrace Support permite XSS almacenado. Este problema afecta a WordPress HelpDesk & Support Ticket System Plugin \u2013 Octrace Support: desde n/a hasta 1.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22764.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22764.json index 3a27e7b6eb3..38cccc6a0ec 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22764.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22764.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:39.373", "lastModified": "2025-01-15T16:15:39.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpwebs Team - VA Jariwala WP Post Corrector allows Reflected XSS.This issue affects WP Post Corrector: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wpwebs Team - VA Jariwala WP Post Corrector permite XSS reflejado. Este problema afecta a WP Post Corrector: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22765.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22765.json index 93f1b3de16b..19f64b7b913 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22765.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22765.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:39.543", "lastModified": "2025-01-15T16:15:39.543", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uri Weil WP Order By allows Reflected XSS.This issue affects WP Order By: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Uri Weil WP Order By permite XSS reflejado. Este problema afecta a WP Order By: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22766.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22766.json index e8e3d2841ad..4696aa77f85 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22766.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22766.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:39.700", "lastModified": "2025-01-15T16:15:39.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Masoud Amini Zarinpal Paid Download allows Reflected XSS.This issue affects Zarinpal Paid Download: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Masoud Amini Zarinpal Paid Download permite XSS reflejado. Este problema afecta a Zarinpal Paid Download: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22769.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22769.json index fa9fcfd496f..b3efb552e40 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22769.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22769.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:39.860", "lastModified": "2025-01-15T16:15:39.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Brahma Multifox allows Stored XSS.This issue affects Multifox: from n/a through 1.3.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Creative Brahma Multifox permite XSS almacenado. Este problema afecta a Multifox: desde n/a hasta 1.3.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22773.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22773.json index 47fbecfcca2..b0501825e5f 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22773.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22773.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.027", "lastModified": "2025-01-15T16:15:40.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en un archivo o directorio de acceso externo en WPChill Htaccess File Editor permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Htaccess File Editor: desde n/a hasta 1.0.19." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22776.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22776.json index caf5c33dc61..aaea746c669 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22776.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22776.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.193", "lastModified": "2025-01-15T16:15:40.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jay Carter WP Bulletin Board allows Reflected XSS.This issue affects WP Bulletin Board: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jay Carter WP Bulletin Board permite XSS reflejado. Este problema afecta a WP Bulletin Board: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json index 92dc77bfed8..8a34ddd3a33 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22777.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:12.900", "lastModified": "2025-01-13T18:15:22.000", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in GiveWP GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.19.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en GiveWP GiveWP permite la inyecci\u00f3n de objetos. Este problema afecta a GiveWP: desde n/a hasta 3.19.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22778.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22778.json index 9d693309aee..dbb6f40eeb9 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22778.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22778.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.350", "lastModified": "2025-01-15T16:15:40.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lijit Networks Inc. and Crowd Favorite Lijit Search allows Reflected XSS.This issue affects Lijit Search: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Lijit Networks Inc. y Crowd Favorite Lijit Search permite XSS reflejado. Este problema afecta a Lijit Search: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22779.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22779.json index 97bbf89a030..a4c470a692e 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22779.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22779.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.510", "lastModified": "2025-01-15T16:15:40.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Ugur CELIK WP News Sliders allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP News Sliders: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Ugur CELIK WP News Sliders permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP News Sliders: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22780.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22780.json index 91a43abfc1b..8ade0868d91 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22780.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22780.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.660", "lastModified": "2025-01-15T16:15:40.660", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexey Yuzhakov wp-pano allows Stored XSS.This issue affects wp-pano: from n/a through 1.17." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wp-pano de Alexey Yuzhakov permite XSS almacenado. Este problema afecta a wp-pano: desde n/a hasta 1.17." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22781.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22781.json index daa6f2fb747..cba04288f33 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22781.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22781.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.813", "lastModified": "2025-01-15T16:15:40.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nativery Developer Nativery allows DOM-Based XSS.This issue affects Nativery: from n/a through 0.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nativery Developer Nativery permite XSS basado en DOM. Este problema afecta a Nativery: desde n/a hasta 0.1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22782.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22782.json index 4a16e1f9b3a..3ae1241942c 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22782.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22782.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:40.973", "lastModified": "2025-01-15T16:15:40.973", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Web Ready Now WR Price List Manager For Woocommerce allows Upload a Web Shell to a Web Server.This issue affects WR Price List Manager For Woocommerce: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Web Ready Now WR Price List Manager For Woocommerce permite cargar un Web Shell a un servidor web. Este problema afecta a WR Price List Manager For Woocommerce: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22784.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22784.json index fe823df5f62..69747674e01 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22784.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22784.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:41.127", "lastModified": "2025-01-15T16:15:41.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Johan Str\u00f6m Background Control allows Path Traversal.This issue affects Background Control: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad Cross-Site Request Forgery (CSRF) en Johan Str\u00f6m Background Control permite Path Traversal. Este problema afecta a Background Control: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22785.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22785.json index 78185be2f1f..ce74740222a 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22785.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22785.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:41.290", "lastModified": "2025-01-15T16:15:41.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ComMotion Course Booking System allows SQL Injection.This issue affects Course Booking System: from n/a through 6.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en ComMotion Course Booking System permite la inyecci\u00f3n SQL. Este problema afecta a Course Booking System desde n/a hasta 6.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22786.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22786.json index 9530e1ef357..51d819547b8 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22786.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22786.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:41.440", "lastModified": "2025-01-15T16:15:41.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad Path Traversal en ElementInvader ElementInvader Addons para Elementor permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a ElementInvader Addons para Elementor: desde n/a hasta 1.2.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22787.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22787.json index 1b4000206d6..f801573b43d 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22787.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22787.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:41.603", "lastModified": "2025-01-15T16:15:41.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in bPlugins LLC Button Block allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Button Block: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en bPlugins LLC Button Block permite acceder a funciones que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Button Block: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22788.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22788.json index 1b3c0b6c8bd..13daaf130ae 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22788.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22788.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:41.750", "lastModified": "2025-01-15T16:15:41.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codexpert, Inc CoDesigner WooCommerce Builder for Elementor allows Stored XSS.This issue affects CoDesigner WooCommerce Builder for Elementor: from n/a through 4.7.17.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CoDesigner WooCommerce Builder for Elementor de Codexpert, Inc. permite XSS almacenado. Este problema afecta a CoDesigner WooCommerce Builder for Elementor: desde n/a hasta 4.7.17.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22793.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22793.json index addeb668109..5959448fb6f 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22793.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22793.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:41.897", "lastModified": "2025-01-15T16:15:41.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bold Bold pagos en linea allows DOM-Based XSS.This issue affects Bold pagos en linea: from n/a through 3.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bold Bold pagos en linea permite XSS basado en DOM. Este problema afecta a Bold pagos en linea: desde n/a hasta 3.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22795.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22795.json index 7238f4575ac..4d9694d4a07 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22795.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22795.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:42.053", "lastModified": "2025-01-15T16:15:42.053", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thorsten Krug Multilang Contact Form allows Reflected XSS.This issue affects Multilang Contact Form: from n/a through 1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Thorsten Krug Multilang Contact Form permite XSS reflejado. Este problema afecta a Multilang Contact Form: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22797.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22797.json index ce002758636..c8f6c60355b 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22797.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22797.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:42.200", "lastModified": "2025-01-15T16:15:42.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in O\u011fulcan \u00d6z\u00fcgen\u00e7 Gallery and Lightbox allows Stored XSS.This issue affects Gallery and Lightbox: from n/a through 1.0.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en O?ulcan \u00d6z\u00fcgen\u00e7 Gallery y Lightbox permite XSS almacenado. Este problema afecta a Gallery y Lightbox: desde n/a hasta 1.0.14." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22798.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22798.json index 3503630447f..d02269801b2 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22798.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22798.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:42.343", "lastModified": "2025-01-15T16:15:42.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CHR Designer Responsive jQuery Slider allows Stored XSS.This issue affects Responsive jQuery Slider: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CHR Designer Responsive jQuery Slider permite XSS almacenado. Este problema afecta a Responsive jQuery Slider: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22799.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22799.json index dc6cda7e9f4..d045cad9706 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22799.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22799.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-15T16:15:42.490", "lastModified": "2025-01-15T16:15:42.490", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Vertim Coders Neon Product Designer allows SQL Injection.This issue affects Neon Product Designer: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Neon Product Designer de Vertim Coders permite la inyecci\u00f3n SQL. Este problema afecta a Neon Product Designer: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json index 94cc6c9040e..b9e7e3b6695 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22800.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-13T14:15:13.067", "lastModified": "2025-01-13T14:15:13.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Post SMTP Post SMTP permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Post SMTP: desde n/a hasta 2.9.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json index b95c2b30723..27aeac1b18d 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22828.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2025-01-13T13:16:12.233", "lastModified": "2025-01-13T19:15:11.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22905.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22905.json index 22785fe92f3..7248dfe6ebe 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22905.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22905.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.430", "lastModified": "2025-01-16T15:15:15.180", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22906.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22906.json index 6ba06ec6be3..c6af9ef124d 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22906.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22906.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.530", "lastModified": "2025-01-16T15:15:15.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json index b516057c583..6c10f86b7ca 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22907.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.630", "lastModified": "2025-01-16T15:15:15.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json index 62b09651ef4..326c614ed23 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22912.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.723", "lastModified": "2025-01-16T15:15:15.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json index 9f362289af6..ca4b8497337 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22913.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.850", "lastModified": "2025-01-16T15:15:15.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22916.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22916.json index b18147c1e06..a16fc5544ba 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22916.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22916.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T03:15:06.970", "lastModified": "2025-01-16T15:15:16.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22949.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22949.json index 776c397ed36..499b98905b4 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22949.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22949.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T16:15:31.137", "lastModified": "2025-01-14T15:15:28.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22963.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22963.json index 92809a0ee05..27d41281021 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22963.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22963.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T16:15:19.367", "lastModified": "2025-01-13T16:15:19.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin." + }, + { + "lang": "es", + "value": "Teedy hasta 1.11 permite CSRF para la toma de control de cuentas a trav\u00e9s de POST /api/user/admin." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22964.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22964.json index e6e7cb5385b..64bdcabb7dd 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22964.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22964.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T23:15:10.650", "lastModified": "2025-01-15T23:15:10.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in DDSN Net Pty Ltd (DDSN Interactive) DDSN Interactive cm3 Acora CMS 10.1.1 allows an attacker to execute arbitrary code via the table parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en DDSN Net Pty Ltd (DDSN Interactive) DDSN Interactive cm3 Acora CMS 10.1.1 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro table." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22968.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22968.json index c69a2b7bdc7..e1196f2c5a9 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22968.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22968.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T16:15:42.657", "lastModified": "2025-01-16T16:15:35.917", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22976.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22976.json index cb8d555daa8..e643d227b15 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22976.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22976.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T23:15:10.783", "lastModified": "2025-01-15T23:15:10.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in dingfanzuCMS v.1.0 allows a local attacker to execute arbitrary code via not filtering the content correctly at the \"checkOrder.php\" shopId module." + }, + { + "lang": "es", + "value": " La vulnerabilidad de inyecci\u00f3n SQL en dingfanzuCMS v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario al no filtrar correctamente el contenido en el m\u00f3dulo shopId \"checkOrder.php\"." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22983.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22983.json index 7d3b720139a..b51b2eba8f9 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22983.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22983.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T16:15:35.603", "lastModified": "2025-01-14T16:15:35.603", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component /square/getAllSquare/circle of iceCMS v2.2.0 allows unauthenticated attackers to access sensitive information." + }, + { + "lang": "es", + "value": "Un problema de control de acceso en el componente /square/getAllSquare/circle de iceCMS v2.2.0 permite a atacantes no autenticados acceder a informaci\u00f3n confidencial." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22984.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22984.json index 5bfa6605ea3..29509e8dff7 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22984.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22984.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T16:15:35.710", "lastModified": "2025-01-14T16:15:35.710", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component /api/squareComment/DelectSquareById of iceCMS v2.2.0 allows unauthenticated attackers to access sensitive information." + }, + { + "lang": "es", + "value": "Un problema de control de acceso en el componente /api/squareComment/DelectSquareById de iceCMS v2.2.0 permite que atacantes no autenticados accedan a informaci\u00f3n confidencial." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json index 1aaaea3bff9..38fedb56dfe 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22996.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:45.053", "lastModified": "2025-01-15T17:15:21.837", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json index 0e10a874089..5e2b92b4b7c 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22997.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T00:15:45.167", "lastModified": "2025-01-15T17:15:22.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json index 0fda416d8f8..4cfab5e9ac9 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c." + }, + { + "lang": "es", + "value": "FastCGI fcgi2 (tambi\u00e9n conocido como fcgi) 2.x a 2.4.4 tiene un desbordamiento de enteros (y el desbordamiento de b\u00fafer basado en el mont\u00f3n resultante) a trav\u00e9s de valores nameLen o valueLen manipulados en los datos del socket IPC. Esto ocurre en ReadParams en fcgiapp.c." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23018.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23018.json index 3e8f147d4dd..2af41de5105 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23018.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23018.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T20:15:32.440", "lastModified": "2025-01-14T20:15:32.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136." + }, + { + "lang": "es", + "value": "La tunelizaci\u00f3n de IPv4 en IPv6 e IPv6 en IPv6 (RFC 2473) no requiere la validaci\u00f3n o verificaci\u00f3n del origen de un paquete de red, lo que permite a un atacante falsificar y enrutar tr\u00e1fico arbitrario a trav\u00e9s de una interfaz de red expuesta. Este es un problema similar a CVE-2020-10136." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23019.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23019.json index a2b728e62e8..1fd66c6ed04 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23019.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23019.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T20:15:32.577", "lastModified": "2025-01-14T20:15:32.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof and route traffic via an exposed network interface." + }, + { + "lang": "es", + "value": "La tunelizaci\u00f3n IPv6 en IPv4 (RFC 4213) permite a un atacante falsificar y enrutar el tr\u00e1fico a trav\u00e9s de una interfaz de red expuesta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23025.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23025.json index d8b95ba3af5..cd0898cf5a2 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23025.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23025.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T18:16:05.650", "lastModified": "2025-01-14T18:16:05.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. NOTE: The Realtime WYSIWYG Editor extension was **experimental**, and thus **not recommended**, in the versions affected by this vulnerability. It has become enabled by default, and thus recommended, starting with XWiki 16.9.0. A user with only **edit right** can join a realtime editing session where others, that where already there or that may join later, have **script** or **programming** access rights. This user can then insert **script rendering macros** that are executed for those users in the realtime session that have script or programming rights. The inserted scripts can be used to gain more access rights. This vulnerability has been patched in XWiki 15.10.2, 16.4.1 and 16.6.0-rc-1. Users are advised to upgrade. Users unable to upgrade may either disable the realtime WYSIWYG editing by disabling the ``xwiki-realtime`` CKEditor plugin from the WYSIWYG editor administration section or uninstall the Realtime WYSIWYG Editorextension (org.xwiki.platform:xwiki-platform-realtime-wysiwyg-ui)." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de tiempo de ejecuci\u00f3n para aplicaciones creado sobre ella. NOTA: La extensi\u00f3n Realtime WYSIWYG Editor era **experimental**, y por lo tanto **no recomendada**, en las versiones afectadas por esta vulnerabilidad. Se ha habilitado de forma predeterminada, y por lo tanto se recomienda, a partir de XWiki 16.9.0. Un usuario con solo **derecho de edici\u00f3n** puede unirse a una sesi\u00f3n de edici\u00f3n en tiempo real en la que otros, que ya estaban all\u00ed o que se unir\u00e1n m\u00e1s tarde, tienen **derechos de acceso de MASK15**** o **programaci\u00f3n**. Este usuario puede insertar Script macros de renderizado** que se ejecutan para esos usuarios en la sesi\u00f3n en tiempo real mediante el script MASK13** o los derechos de programaci\u00f3n. Los Scripts insertados se pueden utilizar para obtener m\u00e1s derechos de acceso. Esta vulnerabilidad se ha corregido en XWiki 15.10.2, 16.4.1 y 16.6.0-rc-1. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden deshabilitar la edici\u00f3n WYSIWYG en tiempo real deshabilitando el complemento CKEditor ``xwiki-realtime`` desde la secci\u00f3n de administraci\u00f3n del editor WYSIWYG o desinstalar la extensi\u00f3n Realtime WYSIWYG Editor (org.xwiki.platform:xwiki-platform-realtime-wysiwyg-ui)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json index 43c94346ea8..91bdbe7a37b 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23026.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T20:15:30.003", "lastModified": "2025-01-13T21:15:15.897", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "jte (Java Template Engine) es un motor de plantillas ligero y seguro para Java y Kotlin. En las versiones afectadas, las plantillas HTML de Jte con etiquetas `Script` y atributos MASK13**ript que incluyen una cadena de plantilla de Javascript (comillas invertidas) est\u00e1n sujetas a XSS. Los m\u00e9todos `javaScriptBlock` y `javaScriptAttribute` en la clase `Escape` no escapan las comillas invertidas, que se utilizan para cadenas de plantilla de Javascript. Los signos de d\u00f3lar en las cadenas de plantilla tambi\u00e9n deben escaparse para evitar una interpolaci\u00f3n no deseada. Las plantillas HTML renderizadas por `OwaspHtmlTemplateOutput` de Jte en versiones menores o iguales a `3.1.15Script `scriScriptgs o los atributos de script que contienen cadenas de plantilla de Javascript (comillas invertidas) son vulnerables. Se recomienda a los usuarios que actualicen a la versi\u00f3n 3.1.16 o posterior para resolver este problema. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json index 8eb28995775..dee41e66f41 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23027.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-13T20:15:30.150", "lastModified": "2025-01-13T20:15:30.150", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "next-forge is a Next.js project boilerplate for modern web application. The BASEHUB_TOKEN commited in apps/web/.env.example. Users should avoid use of this token and should remove any access it may have in their systems." + }, + { + "lang": "es", + "value": "next-forge es un proyecto Next.js para aplicaciones web modernas. El BASEHUB_TOKEN se incluye en apps/web/.env.example. Los usuarios deben evitar el uso de este token y deben eliminar cualquier acceso que pueda tener en sus sistemas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23030.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23030.json index 8e6b599c934..0ff00e4b005 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23030.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23030.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:17.690", "lastModified": "2025-01-14T01:15:17.690", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `cadastro_funcionario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `cpf` parameter. The application fails to validate and sanitize user inputs in the `cpf` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": " WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint `cadastro_funcionario.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `cpf`. La aplicaci\u00f3n no puede validar ni desinfectar las entradas del usuario en el par\u00e1metro `cpf`. Esta falta de validaci\u00f3n permite la inyecci\u00f3n de payloads maliciosos, que se reflejan en el navegador del usuario en la respuesta del servidor y se ejecutan dentro del contexto del navegador de la v\u00edctima. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen la versi\u00f3n. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23031.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23031.json index f804a3a02fc..2718447bab9 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23031.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23031.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:17.833", "lastModified": "2025-01-14T01:15:17.833", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_alergia.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `nome` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_alergia.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": " WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en el endpoint `adicionar_alergia.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `nome`. Las scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en el par\u00e1metro `adicionar_alergia.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23032.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23032.json index d77df0ae7f5..467a3bef1d1 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23032.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23032.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:17.980", "lastModified": "2025-01-14T01:15:17.980", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_escala.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `escala` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_escala.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": " WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en el endpoint `adicionar_escala.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `escala`. Las scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en el par\u00e1metro `adicionar_escala.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23033.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23033.json index e9b0098ca5c..72f5c127636 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23033.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23033.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:18.127", "lastModified": "2025-01-14T01:15:18.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_situacao.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `situacao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_situacao.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en el endpoint `adicionar_situacao.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `adicionar_situacao`. Las scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en el par\u00e1metro `adicionar_situacao.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23034.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23034.json index 143531a3208..5c2bb0704b2 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23034.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23034.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:18.273", "lastModified": "2025-01-14T01:15:18.273", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `tags.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `msg_e` parameter. The application fails to validate and sanitize user inputs in the `msg_e` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": " WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint `tags.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `msg_e`. La aplicaci\u00f3n no puede validar ni desinfectar las entradas del usuario en el par\u00e1metro `msg_e`. Esta falta de validaci\u00f3n permite la inyecci\u00f3n de payloads maliciosos, que se reflejan en el navegador del usuario en la respuesta del servidor y se ejecutan dentro del contexto del navegador de la v\u00edctima. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23035.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23035.json index 1ed8b1bbc5e..207505d1513 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23035.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23035.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:18.413", "lastModified": "2025-01-14T01:15:18.413", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_tipo_quadro_horario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `tipo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_tipo_quadro_horario.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross-Site Scripting almacenado (XSS) en el endpoint `adicionar_tipo_quadro_horario.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `tipo`. Las scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un riesgo de seguridad importante. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en el par\u00e1metro `adicionar_tipo_quadro_horario.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23036.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23036.json index 7bd62606749..086f3aadc3c 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23036.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23036.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:18.563", "lastModified": "2025-01-14T01:15:18.563", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `pre_cadastro_funcionario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `msg_e` parameter. The application fails to validate and sanitize user inputs in the `msg_e` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.7. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de tipo XSS (Cross-Site Scripting Reflejado) en el endpoint `pre_cadastro_funcionario.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `msg_e`. La aplicaci\u00f3n no puede validar ni desinfectar las entradas del usuario en el par\u00e1metro `msg_e`. Esta falta de validaci\u00f3n permite la inyecci\u00f3n de payloads maliciosos, que se reflejan en el navegador del usuario en la respuesta del servidor y se ejecutan dentro del contexto del navegador de la v\u00edctima. Este problema se ha solucionado en la versi\u00f3n 3.2.7. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23037.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23037.json index de12182090f..af92096b5b7 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23037.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23037.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:18.717", "lastModified": "2025-01-14T01:15:18.717", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `control.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `cargo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `control.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en el endpoint `control.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `cargo`. Las scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un importante riesgo de seguridad. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en el par\u00e1metro `control.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23038.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23038.json index 83de52d2911..983b0123f05 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23038.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23038.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T01:15:18.867", "lastModified": "2025-01-14T01:15:18.867", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `remuneracao.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `remuneracao.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un gestor web de c\u00f3digo abierto centrado en el idioma portugu\u00e9s y las instituciones ben\u00e9ficas. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en el endpoint `remuneracao.php` de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite a los atacantes inyectar scripts maliciosos en el par\u00e1metro `descricao`. Las scripts inyectados se almacenan en el servidor y se ejecutan autom\u00e1ticamente cada vez que los usuarios acceden a la p\u00e1gina afectada, lo que supone un importante riesgo de seguridad. La aplicaci\u00f3n no puede validar ni desinfectar correctamente las entradas del usuario en el par\u00e1metro `remuneracao.php`. Esta falta de validaci\u00f3n permite a los atacantes inyectar scripts maliciosos, que luego se almacenan en el servidor. Cada vez que se accede a la p\u00e1gina afectada, el payload malicioso se ejecuta en el navegador de la v\u00edctima, lo que puede comprometer los datos y el sistema del usuario. Este problema se ha solucionado en la versi\u00f3n 3.2.6. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23040.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23040.json index c1feba9e301..91e6c715644 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23040.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23040.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-15T18:15:24.797", "lastModified": "2025-01-15T18:15:24.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GitHub Desktop is an open-source Electron-based GitHub app designed for git development. An attacker convincing a user to clone a repository directly or through a submodule can allow the attacker access to the user's credentials through the use of maliciously crafted remote URL. GitHub Desktop relies on Git to perform all network related operations (such as cloning, fetching, and pushing). When a user attempts to clone a repository GitHub Desktop will invoke `git clone` and when Git encounters a remote which requires authentication it will request the credentials for that remote host from GitHub Desktop using the git-credential protocol. Using a maliciously crafted URL it's possible to cause the credential request coming from Git to be misinterpreted by Github Desktop such that it will send credentials for a different host than the host that Git is currently communicating with thereby allowing for secret exfiltration. GitHub username and OAuth token, or credentials for other Git remote hosts stored in GitHub Desktop could be improperly transmitted to an unrelated host. Users should update to GitHub Desktop 3.4.12 or greater which fixes this vulnerability. Users who suspect they may be affected should revoke any relevant credentials." + }, + { + "lang": "es", + "value": "GitHub Desktop es una aplicaci\u00f3n de GitHub de c\u00f3digo abierto basada en Electron dise\u00f1ada para el desarrollo de Git. Un atacante que convenza a un usuario de clonar un repositorio directamente o a trav\u00e9s de un subm\u00f3dulo puede permitirle acceder a las credenciales del usuario mediante el uso de una URL remota creada con fines malintencionados. GitHub Desktop depende de Git para realizar todas las operaciones relacionadas con la red (como clonar, obtener y enviar). Cuando un usuario intenta clonar un repositorio, GitHub Desktop invocar\u00e1 `git clone` y cuando Git encuentre un host remoto que requiera autenticaci\u00f3n, solicitar\u00e1 las credenciales para ese host remoto de GitHub Desktop utilizando el protocolo git-credential. Si se utiliza una URL creada con fines malintencionados, es posible hacer que Github Desktop malinterprete la solicitud de credenciales que proviene de Git, de modo que env\u00ede las credenciales para un host diferente al host con el que Git se est\u00e1 comunicando actualmente, lo que permite la exfiltraci\u00f3n secreta. El nombre de usuario y el token OAuth de GitHub, o las credenciales de otros hosts remotos de Git almacenados en GitHub Desktop, podr\u00edan transmitirse incorrectamente a un host no relacionado. Los usuarios deben actualizar a GitHub Desktop 3.4.12 o una versi\u00f3n posterior, que corrige esta vulnerabilidad. Los usuarios que sospechen que pueden verse afectados deben revocar las credenciales pertinentes." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23041.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23041.json index ae8caffd89e..b1cd55fd0f8 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23041.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23041.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T19:15:44.713", "lastModified": "2025-01-14T19:15:44.713", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Umbraco.Forms is a web form framework written for the nuget ecosystem. Character limits configured by editors for short and long answer fields are validated only client-side, not server-side. This issue has been patched in versions 8.13.16, 10.5.7, 13.2.2, and 14.1.2. Users are advised to upgrade. There are no known workarounds for this issue." + }, + { + "lang": "es", + "value": "Umbraco.Forms es un formulario web Framework escrito para el ecosistema NuGet. Los l\u00edmites de caracteres configurados por los editores para los campos de respuesta cortos y largos se validan solo en el lado del cliente, no en el lado del servidor. Este problema se ha corregido en las versiones 8.13.16, 10.5.7, 13.2.2 y 14.1.2. Se recomienda a los usuarios que actualicen. No se conocen Workarounds para este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23042.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23042.json index a5fc171ad9d..b17519b33a6 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23042.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23042.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-14T19:15:44.863", "lastModified": "2025-01-14T19:15:44.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. This issue has been addressed in release version 5.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Gradio es un paquete de Python de c\u00f3digo abierto que permite la creaci\u00f3n r\u00e1pida de demostraciones y aplicaciones web para modelos de aprendizaje autom\u00e1tico, API o cualquier funci\u00f3n arbitraria de Python. La lista de control de acceso (ACL) de Gradio para rutas de archivos se puede omitir modificando el uso de may\u00fasculas y min\u00fasculas de una ruta de archivo o directorio bloqueada. Esta vulnerabilidad surge debido a la falta de normalizaci\u00f3n de may\u00fasculas y min\u00fasculas en la l\u00f3gica de validaci\u00f3n de rutas de archivos. En sistemas de archivos que no distinguen entre may\u00fasculas y min\u00fasculas, como los que utilizan Windows y macOS, Este fallo permite a los atacantes omitir las restricciones de seguridad y acceder a archivos confidenciales que deber\u00edan estar protegidos. Este problema puede provocar un acceso no autorizado a los datos, lo que expone informaci\u00f3n confidencial y socava la integridad del modelo de seguridad de Gradio. Dada la popularidad de Gradio para la creaci\u00f3n de aplicaciones web, en particular en el aprendizaje autom\u00e1tico y la IA, esta vulnerabilidad puede representar una amenaza importante si se explota en entornos de producci\u00f3n. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 5.6.0. Se recomienda a los usuarios que actualicen. No se conocen Workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23051.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23051.json index 6e55afd1b64..f7e2606fb40 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23051.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23051.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-14T18:16:05.813", "lastModified": "2025-01-14T18:16:05.813", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated parameter injection vulnerability exists\u00a0in the web-based management interface of the AOS-8 and AOS-10\u00a0Operating Systems. Successful exploitation could allow an\u00a0authenticated user to leverage parameter injection to overwrite\u00a0arbitrary system files." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de par\u00e1metros autenticados en la interfaz de administraci\u00f3n basada en web de los sistemas operativos AOS-8 y AOS-10. Una explotaci\u00f3n exitosa podr\u00eda permitir que un usuario autenticado aproveche la inyecci\u00f3n de par\u00e1metros para sobrescribir archivos sistema arbitrarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23052.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23052.json index 64a759f2fc0..e66c46728a0 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23052.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23052.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-alert@hpe.com", "published": "2025-01-14T18:16:05.960", "lastModified": "2025-01-14T18:16:05.960", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated command injection vulnerability in the command\u00a0line interface of a network management service. Successful\u00a0exploitation of this vulnerability could allow an attacker to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n de comandos autenticados en la interfaz de l\u00ednea de comandos de un servicio de administraci\u00f3n de red. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar comandos arbitrarios como un usuario privilegiado en el sistema operativo subyacente ." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23061.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23061.json index c72c603ee22..13855dbc77b 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23061.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23061.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T05:15:10.517", "lastModified": "2025-01-15T05:15:10.517", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mongoose before 8.9.5 can improperly use a nested $where filter with a populate() match, leading to search injection. NOTE: this issue exists because of an incomplete fix for CVE-2024-53900." + }, + { + "lang": "es", + "value": "Mongoose anterior a la versi\u00f3n 8.9.5 puede usar incorrectamente un filtro $where anidado con una coincidencia populate(), lo que provoca una inyecci\u00f3n de b\u00fasqueda. NOTA: este problema existe debido a una correcci\u00f3n incompleta de CVE-2024-53900." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23072.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23072.json index 7a7c8111f42..96da9ce9d1e 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23072.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23072.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2025-01-14T19:15:45.007", "lastModified": "2025-01-14T19:15:45.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - RefreshSpecial Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - RefreshSpecial Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en la extensi\u00f3n Mediawiki - RefreshSpecial de Wikimedia Foundation que permite Cross-Site Scripting (XSS). Este problema afecta a Mediawiki - RefreshSpecial Extension: desde 1.39.X hasta 1.39.11, desde 1.41.X hasta 1.41.3, desde 1.42.X hasta 1.42.2." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23074.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23074.json index 3e6edb8e587..79acf724a56 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23074.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23074.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2025-01-14T19:15:45.223", "lastModified": "2025-01-14T19:15:45.223", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - SocialProfile Extension allows Functionality Misuse.This issue affects Mediawiki - SocialProfile Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en la extensi\u00f3n Mediawiki - SocialProfile de Wikimedia Foundation permite un uso indebido de la funcionalidad. Este problema afecta a la extensi\u00f3n Mediawiki - SocialProfile: desde 1.39.X hasta 1.39.11, desde 1.41.X hasta 1.41.3, desde 1.42.X hasta 1.42.2." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json index 6d2a4262f0a..af84c67dce6 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23078.json @@ -3,7 +3,7 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2025-01-10T18:15:26.877", "lastModified": "2025-01-13T19:15:11.540", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23079.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23079.json index 3eebd3edb56..c3bd18b141f 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23079.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23079.json @@ -3,7 +3,7 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2025-01-10T19:15:38.353", "lastModified": "2025-01-13T18:15:22.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23080.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23080.json index 1dbcbaec4f4..45ce25f6074 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23080.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23080.json @@ -3,12 +3,16 @@ "sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc", "published": "2025-01-14T17:15:21.620", "lastModified": "2025-01-14T18:16:06.110", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - OpenBadges Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - OpenBadges Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - OpenBadges Extension que permite Cross-Site Scripting (XSS). Este problema afecta a Mediawiki - OpenBadges Extension: desde 1.39.X hasta 1.39.11, desde 1.41.X hasta 1.41.3, desde 1.42.X hasta 1.42.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23082.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23082.json index 0aa04265fea..60d1b452312 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23082.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "support@hackerone.com", "published": "2025-01-14T02:15:08.163", "lastModified": "2025-01-14T16:15:36.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23108.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23108.json index b5ad4b14c55..8b9f61ff97a 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23108.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23108.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-01-11T04:15:06.280", "lastModified": "2025-01-13T18:15:22.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23109.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23109.json index 37c805196c4..dc471e2a0f6 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23109.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23109.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2025-01-11T04:15:06.367", "lastModified": "2025-01-13T18:15:22.903", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23110.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23110.json index 7039cfb3e39..5f6d053f3de 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23110.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23110.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T22:15:27.550", "lastModified": "2025-01-10T22:15:27.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in REDCap 14.9.6. A Reflected cross-site scripting (XSS) vulnerability in the email-subject field exists while performing an upload of a CSV file containing a list of alert configurations. An attacker can send the victim a CSV file containing the XSS payload in the email-subject. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim clicks on the email-subject value, it triggers the XSS payload." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en REDCap 14.9.6. Existe una vulnerabilidad de cross-site scripting (XSS) reflejado en el campo de asunto del correo electr\u00f3nico al cargar un archivo CSV que contiene una lista de configuraciones de alerta. Un atacante puede enviar a la v\u00edctima un archivo CSV que contiene el payload XSS en el asunto del correo electr\u00f3nico. Una vez que la v\u00edctima carga el archivo, autom\u00e1ticamente llega a una p\u00e1gina para ver los datos cargados. Si la v\u00edctima hace clic en el valor del asunto del correo electr\u00f3nico, se activa el payload XSS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23111.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23111.json index cb5f54d0b07..77d3b20d958 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23111.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23111.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T22:15:27.723", "lastModified": "2025-01-10T22:15:27.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in REDCap 14.9.6. It allows HTML Injection via the Survey field name, exposing users to a redirection to a phishing website. An attacker can exploit this to trick the user that receives the survey into clicking on the field name, which redirects them to a phishing website. Thus, this allows malicious actions to be executed without user consent." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en REDCap 14.9.6 que permite la inyecci\u00f3n de HTML a trav\u00e9s del nombre del campo de la encuesta, lo que expone a los usuarios a una redirecci\u00f3n a un sitio web de phishing. Un atacante puede aprovechar esto para enga\u00f1ar al usuario que recibe la encuesta para que haga clic en el nombre del campo, lo que lo redirige a un sitio web de phishing. Por lo tanto, esto permite que se ejecuten acciones maliciosas sin el consentimiento del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23112.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23112.json index c376ea4c047..6dc779d9346 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23112.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23112.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T22:15:27.863", "lastModified": "2025-01-10T22:15:27.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in REDCap 14.9.6. A stored cross-site scripting (XSS) vulnerability allows authenticated users to inject malicious scripts into the Survey field name of Survey. When a user receive the survey, if he clicks on the field name, it triggers the XSS payload." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en REDCap 14.9.6. Una vulnerabilidad de cross-site scripting almacenado permite que los usuarios autenticados inyecten scripts maliciosos en el nombre del campo de la encuesta. Cuando un usuario recibe la encuesta, si hace clic en el nombre del campo, se activa el payload XSS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23113.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23113.json index c64ea0abfb9..fb49a486c9a 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23113.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23113.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T22:15:28.023", "lastModified": "2025-01-10T23:15:08.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in REDCap 14.9.6. It has an action=myprojects&logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en REDCap 14.9.6. Tiene un problema CSRF action=myprojects&logout=1 en el t\u00edtulo de alerta mientras se carga un archivo CSV que contiene una lista de configuraciones de alerta. Un atacante puede enviar a la v\u00edctima un archivo CSV que contiene un payload de inyecci\u00f3n HTML en el t\u00edtulo de alerta. Una vez que la v\u00edctima carga el archivo, autom\u00e1ticamente llega a una p\u00e1gina para ver los datos cargados. Si la v\u00edctima hace clic en el valor del t\u00edtulo de alerta, puede activar una solicitud de cierre de sesi\u00f3n y finalizar su sesi\u00f3n, o redirigirla a un sitio web de phishing. Esta vulnerabilidad se debe a la ausencia de protecciones CSRF en la funcionalidad de cierre de sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json index 7a5de31d629..f7a00188e3b 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:08.410", "lastModified": "2025-01-16T23:15:08.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "librenms es un sistema de monitorizaci\u00f3n de redes con licencia GPL basado en la comunidad. Las versiones afectadas est\u00e1n sujetas a XSS almacenado en los par\u00e1metros (Reemplace $DEVICE_ID con su valor $DEVICE_ID espec\u00edfico):`/device/$DEVICE_ID/edit` -> param: display. Las versiones de Librenms hasta la 24.10.1 permiten a atacantes remotos inyectar scripts maliciosos. Cuando un usuario ve o interact\u00faa con la p\u00e1gina que muestra los datos, el script malicioso se ejecuta inmediatamente, lo que lleva a posibles acciones no autorizadas o exposici\u00f3n de datos. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 24.11.0. Se recomienda a los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23199.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23199.json index 4dd59aa15ca..798766b8685 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23199.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23199.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:08.567", "lastModified": "2025-01-16T23:15:08.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameter: `/ajax_form.php` -> param: descr. Librenms version up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "librenms es un sistema de monitorizaci\u00f3n de redes con licencia GPL basado en la comunidad. Las versiones afectadas est\u00e1n sujetas a XSS almacenado en el par\u00e1metro: `/ajax_form.php` -> param: descr. Las versiones de Librenms hasta la 24.10.1 permiten a atacantes remotos inyectar scripts maliciosos. Cuando un usuario visualiza o interact\u00faa con la p\u00e1gina que muestra los datos, el script malicioso se ejecuta inmediatamente, lo que lleva a posibles acciones no autorizadas o exposici\u00f3n de datos. Este problema se ha solucionado en la versi\u00f3n 24.11.0. Se recomienda a los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23200.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23200.json index c690cd57568..db7aca934db 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23200.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23200.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:08.720", "lastModified": "2025-01-16T23:15:08.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameter: `ajax_form.php` -> param: state. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "librenms es un sistema de monitorizaci\u00f3n de redes con licencia GPL basado en la comunidad. Las versiones afectadas est\u00e1n sujetas a XSS almacenado en el par\u00e1metro: `ajax_form.php` -> param: state. Las versiones de Librenms hasta la 24.10.1 permiten a atacantes remotos inyectar scripts maliciosos. Cuando un usuario visualiza o interact\u00faa con la p\u00e1gina que muestra los datos, el script malicioso se ejecuta inmediatamente, lo que lleva a posibles acciones no autorizadas o exposici\u00f3n de datos. Este problema se ha solucionado en la versi\u00f3n 24.11.0. Se recomienda a los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json index 797ff138d3c..ff7e25e70b8 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:08.880", "lastModified": "2025-01-16T23:15:08.880", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to Cross-site Scripting (XSS) on the parameters:`/addhost` -> param: community. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": " librenms es un sistema de monitorizaci\u00f3n de redes con licencia GPL basado en la comunidad. Las versiones afectadas est\u00e1n sujetas a Cross-site Scripting (XSS) en los par\u00e1metros: `/addhost` -> param: community. Las versiones de Librenms hasta la 24.10.1 permiten a atacantes remotos inyectar scripts maliciosos. Cuando un usuario visualiza o interact\u00faa con la p\u00e1gina que muestra los datos, el script malicioso se ejecuta inmediatamente, lo que lleva a posibles acciones no autorizadas o exposici\u00f3n de datos. Este problema se ha solucionado en la versi\u00f3n 24.11.0. Se recomienda a los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23366.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23366.json index 5fd8de38e64..ac2017015d4 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23366.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23366.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:16:06.290", "lastModified": "2025-01-14T18:16:06.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups \u201cSuperUser\u201d, \u201cAdmin\u201d, or \u201cMaintainer\u201d." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en la consola HAL del componente Wildfly, que no neutraliza o neutraliza incorrectamente la entrada controlable por el usuario antes de colocarla en la salida utilizada como una p\u00e1gina web que se muestra a otros usuarios. El atacante debe estar autenticado como un usuario que pertenece a los grupos de administraci\u00f3n \u201cSuperUser\u201d, \u201cAdmin\u201d o \u201cMaintainer\u201d." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json index a19078948ec..23b053946fe 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23423.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:33.573", "lastModified": "2025-01-16T20:15:33.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Smackcoders SendGrid for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SendGrid for WordPress: from n/a through 1.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en SendGrid para WordPress de Smackcoders permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a SendGrid para WordPress: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json index 378c8ec3ae2..6e828beabeb 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23424.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:33.723", "lastModified": "2025-01-16T20:15:33.723", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Brian Novotny \u2013 Creative Software Design Solutions Marquee Style RSS News Ticker allows Cross Site Request Forgery.This issue affects Marquee Style RSS News Ticker: from n/a through 3.2.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Brian Novotny \u2013 Creative Software Design Solutions Marquee Style RSS News Ticker permite Cross-Site Request Forgery. Este problema afecta a Marquee Style RSS News Ticker: desde n/a hasta 3.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json index cf1a78641eb..ac25a04f1c2 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23426.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:33.877", "lastModified": "2025-01-16T20:15:33.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wizcrew Technologies go Social allows Stored XSS.This issue affects go Social: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en go Social de Wizcrew Technologies permite XSS almacenado. Este problema afecta a go Social: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json index 9e9dda13777..c41a87d27f3 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23429.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:34.057", "lastModified": "2025-01-16T20:15:34.057", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in altimawebsystems.com Altima Lookbook Free for WooCommerce allows Reflected XSS.This issue affects Altima Lookbook Free for WooCommerce: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en altimawebsystems.com Altima Lookbook Free para WooCommerce permite XSS reflejado. Este problema afecta a Altima Lookbook Free para WooCommerce: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json index 7a3186c0b45..503a484554c 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23430.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:34.287", "lastModified": "2025-01-16T20:15:34.287", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oren Yomtov Mass Custom Fields Manager allows Reflected XSS.This issue affects Mass Custom Fields Manager: from n/a through 1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Oren Yomtov Mass Custom Fields Manager permite XSS reflejado. Este problema afecta a Mass Custom Fields Manager: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json index 9091e7ca218..98e43a0d596 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23432.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:34.467", "lastModified": "2025-01-16T20:15:34.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlTi5 AlT Report allows Reflected XSS.This issue affects AlT Report: from n/a through 1.12.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AlTi5 AlT Report permite XSS reflejado. Este problema afecta a AlT Report: desde n/a hasta 1.12.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json index ba5cf46197b..04e65e05481 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23434.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:34.607", "lastModified": "2025-01-16T20:15:34.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Albertolabs.com Easy EU Cookie law allows Stored XSS.This issue affects Easy EU Cookie law: from n/a through 1.3.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Albertolabs.com Easy EU Cookie law permite XSS almacenados. Este problema afecta a Easy EU Cookie law: desde n/a hasta 1.3.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json index c6ab8d101b9..d54850d7e59 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23435.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:34.770", "lastModified": "2025-01-16T20:15:34.770", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in David Marcucci Password Protect Plugin for WordPress allows Stored XSS.This issue affects Password Protect Plugin for WordPress: from n/a through 0.8.1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en David Marcucci Password Protect Plugin for WordPress para WordPress permite XSS almacenado. Este problema afecta a Password Protect Plugin for WordPress: desde n/a hasta 0.8.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json index 123e9987c3d..fbce4fded93 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23436.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:34.920", "lastModified": "2025-01-16T20:15:34.920", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Capa Wp-Scribd-List allows Stored XSS.This issue affects Wp-Scribd-List: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Capa Wp-Scribd-List permite XSS almacenado. Este problema afecta a Wp-Scribd-List: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json index 07c7e0d2664..5195c323001 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23438.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:35.067", "lastModified": "2025-01-16T20:15:35.067", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MarvinLabs WP PT-Viewer allows Reflected XSS.This issue affects WP PT-Viewer: from n/a through 2.0.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en MarvinLabs WP PT-Viewer permite XSS reflejado. Este problema afecta a WP PT-Viewer: desde n/a hasta 2.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json index b923afc54ab..d834183c0cc 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23442.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:35.210", "lastModified": "2025-01-16T20:15:35.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in matias s Shockingly Big IE6 Warning allows Stored XSS.This issue affects Shockingly Big IE6 Warning: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en matias s Shockingly Big IE6 Warning permite XSS almacenado. Este problema afecta a Shockingly Big IE6 Warning: desde n/a hasta 1.6.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json index de49272cf7a..0a7977d20db 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23444.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:35.360", "lastModified": "2025-01-16T20:15:35.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nasir Scroll Top Advanced allows Stored XSS.This issue affects Scroll Top Advanced: from n/a through 2.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nasir Scroll Top Advanced permite XSS almacenado. Este problema afecta a Scroll Top Advanced: desde n/a hasta 2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json index e495853965c..0b877f2d6e4 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23445.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:35.513", "lastModified": "2025-01-16T20:15:35.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Scott Swezey Easy Tynt allows Cross Site Request Forgery.This issue affects Easy Tynt: from n/a through 0.2.5.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Scott Swezey Easy Tynt permite Cross-Site Request Forgery. Este problema afecta a Easy Tynt: desde n/a hasta 0.2.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json index ba387ce7b71..31c7051c499 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23452.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:35.730", "lastModified": "2025-01-16T20:15:35.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EditionGuard Dev Team EditionGuard for WooCommerce \u2013 eBook Sales with DRM allows Reflected XSS.This issue affects EditionGuard for WooCommerce \u2013 eBook Sales with DRM: from n/a through 3.4.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en EditionGuard Dev Team EditionGuard for WooCommerce \u2013 eBook Sales with DRM permite XSS reflejado. Este problema afecta a EditionGuard for WooCommerce \u2013 eBook Sales with DRM: desde n/a hasta 3.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json index c2868c71452..34d37eab0fc 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23453.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:35.883", "lastModified": "2025-01-16T20:15:35.883", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Myriad Solutionz Stars SMTP Mailer allows Reflected XSS.This issue affects Stars SMTP Mailer: from n/a through 1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Myriad Solutionz Stars SMTP Mailer permite XSS reflejado. Este problema afecta a Stars SMTP Mailer: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json index 7ed8a6ee795..715078c82a7 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.033", "lastModified": "2025-01-16T20:15:36.033", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in mastersoftwaresolutions WP VTiger Synchronization allows Stored XSS.This issue affects WP VTiger Synchronization: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en mastersoftwaresolutions WP VTiger Synchronization permite XSS almacenado. Este problema afecta a WP VTiger Synchronization: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json index 7b8061696d2..37adfd0103d 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23456.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.247", "lastModified": "2025-01-16T20:15:36.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Somethinkodd.com Development Team EmailShroud allows Reflected XSS.This issue affects EmailShroud: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Somethinkodd.com Development Team EmailShroud permite XSS reflejado. Este problema afecta a EmailShroud: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json index 8a429d72922..0cc91672c98 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23463.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.397", "lastModified": "2025-01-16T20:15:36.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mukesh Dak MD Custom content after or before of post allows Stored XSS.This issue affects MD Custom content after or before of post: from n/a through 1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mukesh Dak MD Custom content after or before of post que permite XSS almacenado. Este problema afecta a MD Custom content after or before of post: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json index 79ecee01edd..23448a18d69 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23467.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.547", "lastModified": "2025-01-16T20:15:36.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vimal Ghorecha RSS News Scroller allows Stored XSS.This issue affects RSS News Scroller: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Vimal Ghorecha RSS News Scroller permite XSS almacenado. Este problema afecta a RSS News Scroller: desde n/a hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json index 48be15f3ea3..eed92b98e44 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23470.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.700", "lastModified": "2025-01-16T20:15:36.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in X Villamuera Visit Site Link enhanced allows Stored XSS.This issue affects Visit Site Link enhanced: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en X Villamuera Visit Site Link enhanced permite XSS almacenado. Este problema afecta a Visit Site Link enhanced: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json index 6aeb9c122a1..d1bdf4a6e8b 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23471.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.840", "lastModified": "2025-01-16T20:15:36.840", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Andy Chapman ECT Add to Cart Button allows Stored XSS.This issue affects ECT Add to Cart Button: from n/a through 1.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Andy Chapman ECT Add to Cart Button permite XSS almacenado. Este problema afecta a ECT add to Cart Button: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json index 408d1459222..9ad15f30219 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23476.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:36.990", "lastModified": "2025-01-16T20:15:36.990", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in isnowfy my-related-posts allows Stored XSS.This issue affects my-related-posts: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en my-related-posts de isnowfy permite XSS almacenado. Este problema afecta a my-related-posts: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json index 2c302c7cbc5..d4a91ca5132 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23483.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:37.133", "lastModified": "2025-01-16T20:15:37.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Niklas Olsson Universal Analytics Injector allows Stored XSS.This issue affects Universal Analytics Injector: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Niklas Olsson Universal Analytics Injector permite XSS almacenado. Este problema afecta a Universal Analytics Injector: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json index cc0e1e231fd..680b1bcbfec 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23497.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:37.293", "lastModified": "2025-01-16T20:15:37.293", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Albdesign Simple Project Manager allows Stored XSS.This issue affects Simple Project Manager: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Albdesign Simple Project Manager permite XSS almacenado. Este problema afecta a Simple Project Manager: desde n/a hasta 1.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json index 328fa9e0abb..beaa57eb994 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23499.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:37.440", "lastModified": "2025-01-16T20:15:37.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier Board Election allows Stored XSS.This issue affects Board Election: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Pascal Casier Board Election permite XSS almacenado. Este problema afecta a Board Election: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json index 46d32f0ecc6..507776ab9bf 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23501.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:37.593", "lastModified": "2025-01-16T20:15:37.593", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in SpruceJoy Cookie Consent & Autoblock for GDPR/CCPA allows Stored XSS.This issue affects Cookie Consent & Autoblock for GDPR/CCPA: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en SpruceJoy Cookie Consent & Autoblock para GDPR/CCPA permite XSS almacenado. Este problema afecta a Cookie Consent & Autoblock para GDPR/CCPA: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json index c8c4dde622e..94c41d8634a 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23508.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:37.737", "lastModified": "2025-01-16T20:15:37.737", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in EdesaC Extra Options \u2013 Favicons allows Stored XSS.This issue affects Extra Options \u2013 Favicons: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en EdesaC Extra Options \u2013 Favicons permite XSS almacenado. Este problema afecta a Extra Options \u2013 Favicons: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json index a67f9e43ebd..7fc8fc6e9d5 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23510.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:37.890", "lastModified": "2025-01-16T20:15:37.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Zaantar WordPress Logging Service allows Stored XSS.This issue affects WordPress Logging Service: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Zaantar WordPress Logging Service permite XSS almacenado. Este problema afecta a WordPress Logging Service: desde n/a hasta 1.5.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json index e1bd5524a6f..b7f2eda92b4 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23511.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.040", "lastModified": "2025-01-16T20:15:38.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Viktoria Rei Bauer WP-BlackCheck allows Stored XSS.This issue affects WP-BlackCheck: from n/a through 2.7.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP-BlackCheck de Viktoria Rei Bauer permite XSS almacenado. Este problema afecta a WP-BlackCheck: desde n/a hasta 2.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json index b11806bcd39..127740b4513 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23513.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.193", "lastModified": "2025-01-16T20:15:38.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Joshua Wieczorek Bible Embed allows Stored XSS.This issue affects Bible Embed: from n/a through 0.0.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Joshua Wieczorek Bible Embed permite XSS almacenado. Este problema afecta a Bible Embed: desde n/a hasta 0.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json index 3521c9ca136..8eb7ff078a5 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23514.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.337", "lastModified": "2025-01-16T20:15:38.337", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Sanjaysolutions Loginplus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Loginplus: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Sanjaysolutions Loginplus permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a Loginplus: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json index a32732f6b0f..d78f4c37c1b 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23528.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.480", "lastModified": "2025-01-16T20:15:38.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Wouter Dijkstra DD Roles allows Privilege Escalation.This issue affects DD Roles: from n/a through 4.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Wouter Dijkstra DD Roles permite la escalada de privilegios. Este problema afecta a DD Roles: desde n/a hasta 4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json index a9b42e1232c..479b4b09eaa 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23530.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.630", "lastModified": "2025-01-16T20:15:38.630", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Yonatan Reinberg of Social Ink Custom Post Type Lockdown allows Privilege Escalation.This issue affects Custom Post Type Lockdown: from n/a through 1.11." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Yonatan Reinberg de Social Ink Custom Post Type Lockdown permite la escalada de privilegios. Este problema afecta a Custom Post Type Lockdown: desde n/a hasta 1.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json index b22bffd5b0d..f57b7e33d3e 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23532.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.783", "lastModified": "2025-01-16T20:15:38.783", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Regios MyAnime Widget allows Privilege Escalation.This issue affects MyAnime Widget: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Regios MyAnime Widget permite la escalada de privilegios. Este problema afecta al widget MyAnime: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json index 715e564d6fd..2682ef22317 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23533.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:38.930", "lastModified": "2025-01-16T20:15:38.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Adrian Moreno WP Lyrics allows Stored XSS.This issue affects WP Lyrics: from n/a through 0.4.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Lyrics de Adrian Moreno permite XSS almacenado. Este problema afecta a WP Lyrics: desde n/a hasta 0.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json index 1a2ed60027b..41ef102eaa1 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23537.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.070", "lastModified": "2025-01-16T20:15:39.070", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oren hahiashvili add custom google tag manager allows Stored XSS.This issue affects add custom google tag manager: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Oren hahiashvili add custom google tag manager permite XSS almacenado. Este problema afecta a add custom google tag manager: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json index c2e62285e57..473e17ab2b4 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23547.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.220", "lastModified": "2025-01-16T20:15:39.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Shaw LH Login Page allows Reflected XSS.This issue affects LH Login Page: from n/a through 2.14." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Peter Shaw LH Login Page permite XSS reflejado. Este problema afecta a LH Login Page: desde n/a hasta 2.14." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json index 0fe46a51003..21ef289a512 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23557.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.363", "lastModified": "2025-01-16T20:15:39.363", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kathleen Malone Find Your Reps allows Stored XSS.This issue affects Find Your Reps: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Find Your Reps de Kathleen Malone permite XSS almacenado. Este problema afecta a Find Your Reps: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json index 1c42de9eb43..d070e8b7f36 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23558.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.503", "lastModified": "2025-01-16T20:15:39.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in digfish Geotagged Media allows Stored XSS.This issue affects Geotagged Media: from n/a through 0.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en digfish Geotagged Media permite XSS almacenado. Este problema afecta a Geotagged Media: desde n/a hasta 0.3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json index b94ff858406..166e65e6676 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23559.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.650", "lastModified": "2025-01-16T20:15:39.650", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en MemeOne de Stepan Stepasyuk permite XSS almacenado. Este problema afecta a MemeOne: desde n/a hasta 2.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json index 0c6654f81ef..b3820604380 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23560.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.797", "lastModified": "2025-01-16T20:15:39.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Elke Hinze, Plumeria Web Design Web Testimonials allows Stored XSS.This issue affects Web Testimonials: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Elke Hinze, Plumeria Web Design Web Testimonials permite XSS almacenado. Este problema afecta a Web Testimonials: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json index def10167306..a7c122af14c 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23566.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:39.947", "lastModified": "2025-01-16T20:15:39.947", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Syed Amir Hussain Custom Post allows Stored XSS.This issue affects Custom Post: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Syed Amir Hussain Custom Post permite XSS almacenado. Este problema afecta a Custom Post: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json index 7da24a615d8..d279dee43b1 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23567.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:40.090", "lastModified": "2025-01-16T20:15:40.090", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Intuitive Design GDReseller allows Stored XSS.This issue affects GDReseller: from n/a through 1.6." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Intuitive Design GDReseller permite XSS almacenado. Este problema afecta a GDReseller: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json index 7d951739aa6..b5146eca531 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23569.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:40.230", "lastModified": "2025-01-16T20:15:40.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kelvin Ng Shortcode in Comment allows Stored XSS.This issue affects Shortcode in Comment: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Kelvin Ng Shortcode in Comment permite XSS almacenado. Este problema afecta a Shortcode in Comment: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json index 95b0b423ad4..b508dd3c16e 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23572.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:40.403", "lastModified": "2025-01-16T20:15:40.403", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dave Konopka, Martin Scharm UpDownUpDown allows Stored XSS.This issue affects UpDownUpDown: from n/a through 1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Dave Konopka, Martin Scharm UpDownUpDown permite XSS almacenado. Este problema afecta a UpDownUpDown: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json index 9d26ef6fa76..b8698631fd0 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23573.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:40.740", "lastModified": "2025-01-16T20:15:40.740", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sam Burdge WP Background Tile allows Stored XSS.This issue affects WP Background Tile: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Sam Burdge WP Background Tile permite XSS almacenado. Este problema afecta a WP Background Tile: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json index 81989dbf0ac..2d1a0c9be1b 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23577.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:40.877", "lastModified": "2025-01-16T20:15:40.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sourov Amin Word Freshener allows Stored XSS.This issue affects Word Freshener: from n/a through 1.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Sourov Amin Word Freshener permite XSS almacenado. Este problema afecta a Word Freshener: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json index f748ffe09f4..8704ab9aa98 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23617.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.027", "lastModified": "2025-01-16T20:15:41.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal Floatbox Plus allows Stored XSS.This issue affects Floatbox Plus: from n/a through 1.4.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Oliver Schaal Floatbox Plus permite XSS almacenado. Este problema afecta a Floatbox Plus: desde n/a hasta 1.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json index 7c0d77a6581..71f5a7c3e9e 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23618.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.193", "lastModified": "2025-01-16T20:15:41.193", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Andrea Brandi Twitter Shortcode allows Stored XSS.This issue affects Twitter Shortcode: from n/a through 0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Andrea Brandi Twitter Shortcode permite XSS almacenado. Este problema afecta a Twitter Shortcode: desde n/a hasta 0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json index a1cf846e101..d349b8d0e7d 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23620.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.340", "lastModified": "2025-01-16T20:15:41.340", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexey Trofimov Captchelfie \u2013 Captcha by Selfie allows Reflected XSS.This issue affects Captchelfie \u2013 Captcha by Selfie: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Alexey Trofimov Captchelfie \u2013 Captcha by Selfie permite XSS reflejado. Este problema afecta a Captchelfie \u2013 Captcha by Selfie: desde n/a hasta 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json index 3bef36ac560..ffb6f277c83 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23623.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.480", "lastModified": "2025-01-16T20:15:41.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Bisen Contact Form 7 \u2013 CCAvenue Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 CCAvenue Add-on: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mahesh Bisen Contact Form 7 \u2013 CCAvenue Add-on permite XSS reflejado. Este problema afecta a Contact Form 7 \u2013 CCAvenue Add-on: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json index 74fd5321f91..5f05d58cef4 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23627.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.617", "lastModified": "2025-01-16T20:15:41.617", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Gordon French Comment-Emailer allows Stored XSS.This issue affects Comment-Emailer: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Gordon French Comment-Emailer permite XSS almacenado. Este problema afecta a Comment-Emailer: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json index 97681effbe9..f77582a0ca2 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23639.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.763", "lastModified": "2025-01-16T20:15:41.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan MDC YouTube Downloader allows Stored XSS.This issue affects MDC YouTube Downloader: from n/a through 3.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Nazmul Ahsan MDC YouTube Downloader permite XSS almacenado. Este problema afecta a MDC YouTube Downloader: desde n/a hasta 3.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json index 4a08ce2ff90..fa04a91051e 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23640.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:41.900", "lastModified": "2025-01-16T20:15:41.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan Rename Author Slug allows Stored XSS.This issue affects Rename Author Slug: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Nazmul Ahsan Rename Author Slug permite XSS almacenado. Este problema afecta a Rename Author Slug: desde n/a hasta 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json index ab72b9d68e8..8a62d48b6c2 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23641.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.037", "lastModified": "2025-01-16T20:15:42.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thomas Ehrhardt Powie's pLinks PagePeeker allows DOM-Based XSS.This issue affects Powie's pLinks PagePeeker: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en pLinks PagePeeker de Thomas Ehrhardt Powie permite XSS basado en DOM. Este problema afecta a pLinks PagePeeker de Powie: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json index 2d56dabaf8d..611f4f28818 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23642.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.190", "lastModified": "2025-01-16T20:15:42.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pflonk Sidebar-Content from Shortcode allows DOM-Based XSS.This issue affects Sidebar-Content from Shortcode: from n/a through 2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en pflonk Sidebar-Content de Shortcode permite XSS basado en DOM. Este problema afecta a Sidebar-Content de Shortcode: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json index 30b26f7031e..90211a8b367 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23644.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.323", "lastModified": "2025-01-16T20:15:42.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Kuepper QuoteMedia Tools allows DOM-Based XSS.This issue affects QuoteMedia Tools: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en QuoteMedia Tools de Justin Kuepper permite XSS basado en DOM. Este problema afecta a QuoteMedia Tools: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json index 87f312ee731..ac1e6e605cd 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23649.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.463", "lastModified": "2025-01-16T20:15:42.463", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kreg Steppe Auphonic Importer allows Stored XSS.This issue affects Auphonic Importer: from n/a through 1.5.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Kreg Steppe Auphonic Importer permite XSS almacenado. Este problema afecta a Auphonic Importer: desde n/a hasta 1.5.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json index d711582a824..62050e6e00b 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23654.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.607", "lastModified": "2025-01-16T20:15:42.607", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vin\u00edcius Krolow Twitter Post allows Stored XSS.This issue affects Twitter Post: from n/a through 0.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Vin\u00edcius Krolow Twitter Post permite XSS almacenado. Este problema afecta a Twitter Post: desde n/a hasta la 0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json index 14f186393ef..c3de2cd39e6 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23659.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.750", "lastModified": "2025-01-16T20:15:42.750", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Hernan Javier Hegykozi MercadoLibre Integration allows Stored XSS.This issue affects MercadoLibre Integration: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Hernan Javier Hegykozi MercadoLibre Integration permite XSS almacenado. Este problema afecta a MercadoLibre Integration: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json index 7cc166fe382..dd4a74c31ea 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23660.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:42.893", "lastModified": "2025-01-16T20:15:42.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Walter Cerrudo MFPlugin allows Stored XSS.This issue affects MFPlugin: from n/a through 1.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Walter Cerrudo MFPlugin permite XSS almacenado. Este problema afecta a MFPlugin: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json index 7754401be5f..7a400cf3015 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23661.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.037", "lastModified": "2025-01-16T20:15:43.037", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana NV Slider allows Stored XSS.This issue affects NV Slider: from n/a through 1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ryan Sutana NV Slider permite XSS almacenado. Este problema afecta a NV Slider: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json index 321c6748e42..93951e55fbe 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23662.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.167", "lastModified": "2025-01-16T20:15:43.167", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana WP Panoramio allows Stored XSS.This issue affects WP Panoramio: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Panoramio de Ryan Sutana permite XSS almacenado. Este problema afecta a WP Panoramio: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json index e83ffb5f65a..fc372c3a207 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23664.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.320", "lastModified": "2025-01-16T20:15:43.320", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Real Seguro Viagem Real Seguro Viagem allows Stored XSS.This issue affects Real Seguro Viagem: from n/a through 2.0.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Real Seguro Viagem Real Seguro Viagem permite XSS almacenado. Este problema afecta a Real Seguro Viagem: desde n/a hasta 2.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json index 9318a0e8481..a8fffeabc9b 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23665.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.460", "lastModified": "2025-01-16T20:15:43.460", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Rapid Sort RSV GMaps allows Stored XSS.This issue affects RSV GMaps: from n/a through 1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Rapid Sort RSV GMaps permite XSS almacenado. Este problema afecta a RSV GMaps: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json index 92f33c2e2d8..3402eec5fae 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23673.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.620", "lastModified": "2025-01-16T20:15:43.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Don Kukral Email on Publish allows Stored XSS.This issue affects Email on Publish: from n/a through 1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Don Kukral Email on Publish permite XSS almacenado. Este problema afecta a Email on Publish: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json index 7a3e9ba071a..5d176bd59d3 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23675.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.753", "lastModified": "2025-01-16T20:15:43.753", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in SandyIN Import Users to MailChimp allows Stored XSS.This issue affects Import Users to MailChimp: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en SandyIN Import Users to MailChimp permite XSS almacenado. Este problema afecta a Import Users to MailChimp: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json index 5251b006af7..8d6d41b8074 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23677.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:43.900", "lastModified": "2025-01-16T20:15:43.900", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in DSmidgy HTTP to HTTPS link changer by Eyga.net allows Stored XSS.This issue affects HTTP to HTTPS link changer by Eyga.net: from n/a through 0.2.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en DSmidgy HTTP to HTTPS link changer by Eyga.net permite XSS almacenado. Este problema afecta a HTTP to HTTPS link changer by Eyga.net: desde n/a hasta 0.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json index 45177704892..d45deafcedd 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23689.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.040", "lastModified": "2025-01-16T20:15:44.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Poco Blogger Image Import allows Stored XSS.This issue affects Blogger Image Import: from 2.1 through n/a." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Poco Blogger Image Import permite XSS almacenado. Este problema afecta a Blogger Image Import: desde 2.1 hasta n/a." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json index f5c04779656..b3bb61ce1c5 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23690.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.197", "lastModified": "2025-01-16T20:15:44.197", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ArtkanMedia Book a Place allows Stored XSS.This issue affects Book a Place: from n/a through 0.7.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en ArtkanMedia Book a Place permite XSS almacenado. Este problema afecta a Book a Place: desde n/a hasta 0.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json index fb190cb7eaa..4d87be1b7e0 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23691.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.353", "lastModified": "2025-01-16T20:15:44.353", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Braulio Aquino Garc\u00eda Send to Twitter allows Stored XSS.This issue affects Send to Twitter: from n/a through 1.7.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Send to Twitter de Braulio Aquino Garc\u00eda permite XSS almacenado. Este problema afecta a Send to Twitter: desde n/a hasta 1.7.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json index 8386d438849..9dc5cadb6b0 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23692.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.503", "lastModified": "2025-01-16T20:15:44.503", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Slider for Writers allows Stored XSS.This issue affects Slider for Writers: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Slider for Writers de Artem Anikeev permite XSS almacenado. Este problema afecta a Slider for Writers: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json index 7968d54619f..2edf48e0018 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23693.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.637", "lastModified": "2025-01-16T20:15:44.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stanis\u0142aw Skonieczny Secure CAPTCHA allows Stored XSS.This issue affects Secure CAPTCHA: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Stanis?aw Skonieczny Secure CAPTCHA permite XSS almacenado. Este problema afecta a Secure CAPTCHA: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json index 6da36558945..e9f70638056 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23694.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.780", "lastModified": "2025-01-16T20:15:44.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shabbos Commerce Shabbos and Yom Tov allows Stored XSS.This issue affects Shabbos and Yom Tov: from n/a through 1.9." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Shabbos Commerce Shabbos y Yom Tov permiten XSS almacenados. Este problema afecta a Shabbos y Yom Tov: desde n/a hasta 1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json index 848901ec099..6100465135c 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23698.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:44.910", "lastModified": "2025-01-16T20:15:44.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Iv\u00e1n R. Delgado Mart\u00ednez WP Custom Google Search allows Stored XSS.This issue affects WP Custom Google Search: from n/a through 1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Custom Google Search de Iv\u00e1n R. Delgado Mart\u00ednez permite XSS almacenado. Este problema afecta a WP Custom Google Search: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json index efdb0bcc4b1..89aaa80a894 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23699.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.060", "lastModified": "2025-01-16T20:15:45.060", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechMix Event Countdown Timer Plugin by TechMix allows Reflected XSS.This issue affects Event Countdown Timer Plugin by TechMix: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en el complemento TechMix Event Countdown Timer de TechMix permite XSS reflejado. Este problema afecta al complemento Event Countdown Timer de TechMix: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json index 62623965413..e505d67940c 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23702.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.213", "lastModified": "2025-01-16T20:15:45.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Schalk Burger Anonymize Links allows Stored XSS.This issue affects Anonymize Links: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Schalk Burger Anonymize Links permite XSS almacenado. Este problema afecta a Anonymize Links: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json index d5367c6dd6b..373a98bca26 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23703.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.350", "lastModified": "2025-01-16T20:15:45.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in CS : ABS-Hosting.nl / Walchum.net Free MailClient FMC allows Stored XSS.This issue affects Free MailClient FMC: from n/a through 1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en CS: ABS-Hosting.nl / Walchum.net Free MailClient FMC permite XSS almacenado. Este problema afecta a Free MailClient FMC: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json index f3b9914077d..65038191f80 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23708.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.493", "lastModified": "2025-01-16T20:15:45.493", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dominic Fallows DF Draggable allows Stored XSS.This issue affects DF Draggable: from n/a through 1.13.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en DF Draggable de Dominic Fallows permite XSS almacenado. Este problema afecta a DF Draggable: desde n/a hasta 1.13.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json index 835c947adb8..43afa1decee 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23710.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.643", "lastModified": "2025-01-16T20:15:45.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mayur Sojitra Flying Twitter Birds allows Stored XSS.This issue affects Flying Twitter Birds: from n/a through 1.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mayur Sojitra Flying Twitter Birds permite XSS almacenado. Este problema afecta a Flying Twitter Birds: desde n/a hasta 1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json index f3dbb34c0da..39a8405e8ac 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23712.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.800", "lastModified": "2025-01-16T20:15:45.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kapost Kapost allows Stored XSS.This issue affects Kapost: from n/a through 2.2.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Kapost Kapost permite XSS almacenado. Este problema afecta a Kapost: desde n/a hasta 2.2.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json index e956e305d09..3c3a1fd9ed7 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23713.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:45.940", "lastModified": "2025-01-16T20:15:45.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Hack me if you can allows Stored XSS.This issue affects Hack me if you can: from n/a through 1.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Artem Anikeev Hack me if you can permite XSS almacenado. Este problema afecta a Hack me if you can: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json index 9a0beb9064e..4786d6a00b1 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23715.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.083", "lastModified": "2025-01-16T20:15:46.083", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in RaymondDesign Post & Page Notes allows Stored XSS.This issue affects Post & Page Notes: from n/a through 0.1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en RaymondDesign Post & Page Notes permite XSS almacenado. Este problema afecta a Post & Page Notes: desde n/a hasta 0.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json index b1b6aa214eb..8e1963863e1 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23717.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.247", "lastModified": "2025-01-16T20:15:46.247", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in ITMOOTI Theme My Ontraport Smartform allows Stored XSS.This issue affects Theme My Ontraport Smartform: from n/a through 1.2.11." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Theme My Ontraport Smartform de ITMOOTI permite XSS almacenado. Este problema afecta a Theme My Ontraport Smartform: desde n/a hasta 1.2.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json index 33030c22e97..65f4d501ddb 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23720.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.397", "lastModified": "2025-01-16T20:15:46.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mozilla Web Push allows Stored XSS.This issue affects Web Push: from n/a through 1.4.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mozilla Web Push permite XSS almacenado. Este problema afecta a Web Push: desde n/a hasta 1.4.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json index a6e84b7d53b..3330a689179 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23743.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.550", "lastModified": "2025-01-16T20:15:46.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Martijn Scheybeler Social Analytics allows Stored XSS.This issue affects Social Analytics: from n/a through 0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Martijn Scheybeler Social Analytics permite XSS almacenado. Este problema afecta a Social Analytics: desde n/a hasta 0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json index a16c9cd2a3f..67bb6feabc5 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23745.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.687", "lastModified": "2025-01-16T20:15:46.687", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tussendoor internet & marketing Call me Now allows Stored XSS.This issue affects Call me Now: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Tussendoor internet & marketing Call me Now permite XSS almacenado. Este problema afecta a Call me Now: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json index 382406f50e8..99fb7717030 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23749.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.830", "lastModified": "2025-01-16T20:15:46.830", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mahdi Khaksar mybb Last Topics allows Stored XSS.This issue affects mybb Last Topics: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mahdi Khaksar mybb Last Topics permite XSS almacenado. Este problema afecta a mybb Last Topics: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23760.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23760.json index f2e421d8960..0df893bccae 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23760.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23760.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:18.257", "lastModified": "2025-01-16T21:15:18.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Volkov Chatter allows Stored XSS. This issue affects Chatter: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Alex Volkov Chatter permite XSS almacenado. Este problema afecta a Chatter: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23761.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23761.json index 60d12a7c375..a1dd656f963 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23761.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23761.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:18.410", "lastModified": "2025-01-16T21:15:18.410", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Alex Volkov Woo Tuner allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Woo Tuner: from n/a through 0.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Woo Tuner de Alex Volkov permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Woo Tuner desde la versi\u00f3n n/a hasta la 0.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23764.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23764.json index 02f78292f8f..4a4dadb51cd 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23764.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23764.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:18.550", "lastModified": "2025-01-16T21:15:18.550", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Ujjaval Jani Copy Move Posts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Copy Move Posts: from n/a through 1.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de falta de autorizaci\u00f3n en Copy Move Posts de Ujjaval Jani permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Copy Move Posts: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23765.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23765.json index db4e9ec999f..2ac49f7b7dd 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23765.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23765.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:18.700", "lastModified": "2025-01-16T21:15:18.700", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER allows Cross Site Request Forgery.This issue affects W3SPEEDSTER: from n/a through 7.33." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en W3speedster W3SPEEDSTER permite Cross-Site Request Forgery. Este problema afecta a W3SPEEDSTER: desde n/a hasta 7.33." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json index d2c839c22d9..99b4a324e39 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23767.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:46.967", "lastModified": "2025-01-16T20:15:46.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Revolutionart Marmoset Viewer allows Stored XSS.This issue affects Marmoset Viewer: from n/a through 1.9.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Revolutionart Marmoset Viewer permite XSS almacenado. Este problema afecta a Marmoset Viewer: desde n/a hasta 1.9.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23772.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23772.json index 52ebf26fe52..4fa1d353548 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23772.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23772.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:18.860", "lastModified": "2025-01-16T21:15:18.860", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eugenio Petull\u00e0 imaGenius allows Stored XSS.This issue affects imaGenius: from n/a through 1.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eugenio Petull\u00e0 imaGenius permite XSS almacenado. Este problema afecta a imaGenius: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23775.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23775.json index 3791ce6de17..f4145dadd0c 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23775.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23775.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.007", "lastModified": "2025-01-16T21:15:19.007", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WWP GMAPS for WPBakery Page Builder Free allows Stored XSS.This issue affects GMAPS for WPBakery Page Builder Free: from n/a through 1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WWP GMAPS para WPBakery Page Builder Free permite XSS almacenado. Este problema afecta a GMAPS para WPBakery Page Builder Free: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23776.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23776.json index 93eeaba72d1..4b5c75a12e8 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23776.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23776.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.160", "lastModified": "2025-01-16T21:15:19.160", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Thorn Technologies LLC Cache Sniper for Nginx allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cache Sniper for Nginx: from n/a through 1.0.4.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Thorn Technologies LLC Cache Sniper para Nginx permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Cache Sniper para Nginx: desde n/a hasta 1.0.4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23777.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23777.json index 79bcff93b61..6f279cb9ee2 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23777.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23777.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.323", "lastModified": "2025-01-16T21:15:19.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Willows Consulting Ltd. GDPR Personal Data Reports allows Stored XSS.This issue affects GDPR Personal Data Reports: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Willows Consulting Ltd. GDPR Personal Data Reports que permiten XSS almacenados. Este problema afecta a GDPR Personal Data Reports: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23778.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23778.json index 636dd0bff22..415dd278054 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23778.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23778.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.483", "lastModified": "2025-01-16T21:15:19.483", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Pravin Durugkar User Sync ActiveCampaign allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Sync ActiveCampaign: from n/a through 1.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Pravin Durugkar User Sync ActiveCampaign permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a User Sync ActiveCampaign: desde n/a hasta 1.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23779.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23779.json index 23242bdd315..6c3ffc067b8 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23779.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23779.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.640", "lastModified": "2025-01-16T21:15:19.640", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in web-mv.de ResAds allows SQL Injection.This issue affects ResAds: from n/a through 2.0.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en web-mv.de ResAds permite la inyecci\u00f3n SQL. Este problema afecta a ResAds: desde n/a hasta 2.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23780.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23780.json index cda2c2dabd6..8b827666571 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23780.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23780.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.800", "lastModified": "2025-01-16T21:15:19.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AlphaBPO Easy Code Snippets allows SQL Injection.This issue affects Easy Code Snippets: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Easy Code Snippets de AlphaBPO permite la inyecci\u00f3n SQL. Este problema afecta a Easy Code Snippets: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json index def52a61336..e1dd4dbd113 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23783.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T20:15:47.100", "lastModified": "2025-01-16T20:15:47.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in carrotbits Greek Namedays Widget From Eortologio.Net allows Stored XSS.This issue affects Greek Namedays Widget From Eortologio.Net: from n/a through 20191113." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en carrotbits Greek Namedays Widget From Eortologio.Net permite XSS almacenado. Este problema afecta a Greek Namedays Widget From Eortologio.Net: desde n/a hasta el 13/11/2019." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23785.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23785.json index 8faf6c90995..3d94b53c7ed 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23785.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23785.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:19.967", "lastModified": "2025-01-16T21:15:19.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in August Infotech AI Responsive Gallery Album allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AI Responsive Gallery Album: from n/a through 1.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en August Infotech AI Responsive Gallery Album permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a AI Responsive Gallery Album: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23791.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23791.json index ef96a8ef3e0..d2e62643916 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23791.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23791.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:20.113", "lastModified": "2025-01-16T21:15:20.113", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RocaPress Horizontal Line Shortcode allows Stored XSS.This issue affects Horizontal Line Shortcode: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en RocaPress Horizontal Line Shortcode permite XSS almacenado. Este problema afecta a Horizontal Line Shortcode: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23793.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23793.json index b183614df84..c4327aaa7a3 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23793.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23793.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:20.267", "lastModified": "2025-01-16T21:15:20.267", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Auto FTP allows Stored XSS. This issue affects Auto FTP: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Turcu Ciprian Auto FTP permite XSS almacenado. Este problema afecta a Auto FTP: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23794.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23794.json index e31c9fa1b31..eb4590314f2 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23794.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23794.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:20.397", "lastModified": "2025-01-16T21:15:20.397", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rccoder wp_amaps allows Stored XSS.This issue affects wp_amaps: from n/a through 1.7." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en rccoder wp_amaps permite XSS almacenado. Este problema afecta a wp_amaps: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23795.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23795.json index f0bcc274bed..15809483dd9 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23795.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23795.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:20.567", "lastModified": "2025-01-16T21:15:20.567", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gold Plugins Easy FAQs allows Stored XSS.This issue affects Easy FAQs: from n/a through 3.2.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Gold Plugins Easy FAQs permite XSS almacenado. Este problema afecta a Easy FAQs: desde n/a hasta 3.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23796.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23796.json index 94ff87d965d..08cbc4e5e30 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23796.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23796.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:20.727", "lastModified": "2025-01-16T21:15:20.727", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tushar Patel Easy Portfolio allows Stored XSS.This issue affects Easy Portfolio: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tushar Patel Easy Portfolio permite XSS almacenado. Este problema afecta a Easy Portfolio: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23797.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23797.json index 989afcf6748..bc94797d33c 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23797.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23797.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:20.877", "lastModified": "2025-01-16T21:15:20.877", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mike Selander WP Options Editor allows Privilege Escalation.This issue affects WP Options Editor: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Options Editor de Mike Selander permite la escalada de privilegios. Este problema afecta a WP Options Editor: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23800.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23800.json index 0e5f5a89bc2..61d76ebaaf4 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23800.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23800.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.040", "lastModified": "2025-01-16T21:15:21.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in David Hamilton OrangeBox allows Cross Site Request Forgery.This issue affects OrangeBox: from n/a through 3.0.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en David Hamilton OrangeBox permite Cross-Site Request Forgery. Este problema afecta a OrangeBox: desde n/a hasta 3.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23801.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23801.json index e171012060a..badaf53faca 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23801.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23801.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.190", "lastModified": "2025-01-16T21:15:21.190", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Benjamin Guy Style Admin allows Stored XSS.This issue affects Style Admin: from n/a through 1.4.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Benjamin Guy Style Admin permite XSS almacenado. Este problema afecta a Style Admin: desde n/a hasta 1.4.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23802.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23802.json index ab2ced333e9..fd7885bbdd6 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23802.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23802.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.350", "lastModified": "2025-01-16T21:15:21.350", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Steven Soehl WP-Revive Adserver allows Stored XSS.This issue affects WP-Revive Adserver: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP-Revive Adserver de Steven Soehl permite XSS almacenado. Este problema afecta a WP-Revive Adserver: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23804.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23804.json index 5a499f7f8d5..55f3cd586d6 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23804.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23804.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.497", "lastModified": "2025-01-16T21:15:21.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shiv Prakash Tiwari WP Service Payment Form With Authorize.net allows Reflected XSS.This issue affects WP Service Payment Form With Authorize.net: from n/a through 2.6.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en WP Service Payment Form With Authorize.net de Shiv Prakash Tiwari permite XSS reflejado. Este problema afecta a WP Service Payment Form With Authorize.net: desde n/a hasta 2.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23805.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23805.json index 5b909883f88..f293abb0ca0 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23805.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23805.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.643", "lastModified": "2025-01-16T21:15:21.643", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in SEOReseller Team SEOReseller Partner allows Cross Site Request Forgery.This issue affects SEOReseller Partner: from n/a through 1.3.15." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en SEOReseller Team SEOReseller Partner permite Cross-Site Request Forgery. Este problema afecta a SEOReseller Partner: desde n/a hasta 1.3.15." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23807.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23807.json index 7a1fd1f5930..042eb60d132 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23807.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23807.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.800", "lastModified": "2025-01-16T21:15:21.800", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jimmy Hu Spiderpowa Embed PDF allows Stored XSS.This issue affects Spiderpowa Embed PDF: from n/a through 1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jimmy Hu Spiderpowa Embed PDF permite XSS almacenado. Este problema afecta a Spiderpowa Embed PDF: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23808.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23808.json index b84013d6cfe..ce2c57f0890 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23808.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23808.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:21.957", "lastModified": "2025-01-16T21:15:21.957", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Matt van Andel Custom List Table Example allows Reflected XSS.This issue affects Custom List Table Example: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Matt van Andel Custom List Table Example permite XSS reflejado. Este problema afecta a la versi\u00f3n de Custom List Table Example: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23810.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23810.json index 36ba0e0d7a0..00608389ae1 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23810.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23810.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.107", "lastModified": "2025-01-16T21:15:22.107", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Sazonov Len Slider allows Reflected XSS.This issue affects Len Slider: from n/a through 2.0.11." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Len Slider de Igor Sazonov permite XSS reflejado. Este problema afecta a Len Slider: desde n/a hasta 2.0.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23815.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23815.json index 0dfc005c068..438a92b1a87 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23815.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23815.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.257", "lastModified": "2025-01-16T21:15:22.257", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in linickx root Cookie allows Cross Site Request Forgery. This issue affects root Cookie: from n/a through 1.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en linickx root Cookie permite Cross-Site Request Forgery. Este problema afecta a root Cookie: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23816.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23816.json index 7f5e70efd64..fb12ad77e4b 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23816.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23816.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.407", "lastModified": "2025-01-16T21:15:22.407", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in metaphorcreations Metaphor Widgets allows Stored XSS. This issue affects Metaphor Widgets: from n/a through 2.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Metaphor Widgets de methodologycreations que permite XSS almacenado. Este problema afecta a Metaphor Widgets: desde n/a hasta 2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23817.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23817.json index deafc3a6779..1a56a27c613 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23817.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23817.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.560", "lastModified": "2025-01-16T21:15:22.560", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mahadir Ahmad MHR-Custom-Anti-Copy allows Stored XSS.This issue affects MHR-Custom-Anti-Copy: from n/a through 2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Mahadir Ahmad MHR-Custom-Anti-Copy permite XSS almacenado. Este problema afecta a MHR-Custom-Anti-Copy: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23818.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23818.json index 61c5c60848b..d64a805b0b4 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23818.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23818.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.693", "lastModified": "2025-01-16T21:15:22.693", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Peggy Kuo More Link Modifier allows Stored XSS.This issue affects More Link Modifier: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Peggy Kuo More Link Modifier permite XSS almacenado. Este problema afecta a More Link Modifier: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23820.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23820.json index 31634352712..24b158f7dc4 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23820.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23820.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.847", "lastModified": "2025-01-16T21:15:22.847", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Laxman Thapa Content Security Policy Pro allows Cross Site Request Forgery.This issue affects Content Security Policy Pro: from n/a through 1.3.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Laxman Thapa Content Security Policy Pro permite Cross-Site Request Forgery. Este problema afecta a Content Security Policy Pro: desde n/a hasta 1.3.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23821.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23821.json index b4bebe9feaf..ffa564734a0 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23821.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23821.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:22.997", "lastModified": "2025-01-16T21:15:22.997", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aleapp WP Cookies Alert allows Cross Site Request Forgery.This issue affects WP Cookies Alert: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Aleapp WP Cookies Alert permite Cross-Site Request Forgery. Este problema afecta a WP Cookies Alert: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23822.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23822.json index cf09103c811..7bde534c961 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23822.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23822.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:23.143", "lastModified": "2025-01-16T21:15:23.143", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Cornea Alexandru Category Custom Fields allows Cross Site Request Forgery.This issue affects Category Custom Fields: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Cornea Alexandru Category Custom Fields permite Cross-Site Request Forgery. Este problema afecta a Category Custom Fields: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23823.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23823.json index 13610193570..e9b71af257e 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23823.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23823.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:23.297", "lastModified": "2025-01-16T21:15:23.297", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in jprintf CNZZ&51LA for WordPress allows Cross Site Request Forgery.This issue affects CNZZ&51LA for WordPress: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en jprintf CNZZ&51LA para WordPress permite Cross-Site Request Forgery. Este problema afecta a CNZZ&51LA para WordPress: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23824.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23824.json index 2f8e31d04ed..d2515ea7a0a 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23824.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23824.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:23.437", "lastModified": "2025-01-16T21:15:23.437", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexander Weleczka FontAwesome.io ShortCodes allows Stored XSS.This issue affects FontAwesome.io ShortCodes: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en FontAwesome.io ShortCodes de Alexander Weleczka permite XSS almacenado. Este problema afecta a FontAwesome.io ShortCodes: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23825.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23825.json index 56b921aaff6..5d8390b45a8 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23825.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23825.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:23.577", "lastModified": "2025-01-16T21:15:23.577", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Thorpe Easy Shortcode Buttons allows Stored XSS.This issue affects Easy Shortcode Buttons: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Easy Shortcode Buttons de Alex Thorpe permite XSS almacenado. Este problema afecta a Easy Shortcode Buttons: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23826.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23826.json index 90cf3372c87..a2fefdd961c 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23826.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23826.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:23.720", "lastModified": "2025-01-16T21:15:23.720", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Predrag Supurovi\u0107 Stop Comment Spam allows Stored XSS.This issue affects Stop Comment Spam: from n/a through 0.5.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Predrag Supurovi? Stop Comment Spam permite XSS almacenado. Este problema afecta a Stop Comment Spam: desde n/a hasta 0.5.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23827.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23827.json index eba10a71c15..b5e1c5f1027 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23827.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23827.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:23.873", "lastModified": "2025-01-16T21:15:23.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Strx Strx Magic Floating Sidebar Maker allows Stored XSS.This issue affects Strx Magic Floating Sidebar Maker: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Strx Strx Magic Floating Sidebar Maker permite XSS almacenado. Este problema afecta a Strx Magic Floating Sidebar Maker: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23828.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23828.json index 89e3d11bf9f..1150f3f6922 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23828.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23828.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.047", "lastModified": "2025-01-16T21:15:24.047", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OriginalTips.com WordPress Data Guard allows Stored XSS.This issue affects WordPress Data Guard: from n/a through 8." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en OriginalTips.com WordPress Data Guard permite XSS almacenado. Este problema afecta a WordPress Data Guard: desde n/a hasta 8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23830.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23830.json index cf3407ad571..3fbcad64d36 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23830.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23830.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.213", "lastModified": "2025-01-16T21:15:24.213", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jobair JB Horizontal Scroller News Ticker allows DOM-Based XSS.This issue affects JB Horizontal Scroller News Ticker: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jobair JB Horizontal Scroller News Ticker permite XSS basado en DOM. Este problema afecta a JB Horizontal Scroller News Ticker: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23831.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23831.json index e9bd02f99bb..9c69a8c27d4 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23831.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23831.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.360", "lastModified": "2025-01-16T21:15:24.360", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rene Hermenau QR Code Generator allows DOM-Based XSS.This issue affects QR Code Generator: from n/a through 1.2.6." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Rene Hermenau QR Code Generator permite XSS basado en DOM. Este problema afecta a QR Code Generator: desde n/a hasta 1.2.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23832.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23832.json index 8790123fa19..ae53a9999d8 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23832.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23832.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.510", "lastModified": "2025-01-16T21:15:24.510", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Matt Gibbs Admin Cleanup allows Stored XSS.This issue affects Admin Cleanup: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Matt Gibbs Admin Cleanup permite XSS almacenado. Este problema afecta a Admin Cleanup: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23833.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23833.json index 17acb0c4299..1cf98477e34 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23833.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23833.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.653", "lastModified": "2025-01-16T21:15:24.653", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RaminMT Links/Problem Reporter allows DOM-Based XSS.This issue affects Links/Problem Reporter: from n/a through 2.6.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en RaminMT Links/Problem Reporter permite XSS basado en DOM. Este problema afecta a Links/Problem Reporter: desde n/a hasta 2.6.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23841.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23841.json index c5e699f44be..184a1bac97e 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23841.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23841.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.793", "lastModified": "2025-01-16T21:15:24.793", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nikos M. Top Flash Embed allows Stored XSS.This issue affects Top Flash Embed: from n/a through 0.3.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nikos M. Top Flash Embed permite XSS almacenado. Este problema afecta a Top Flash Embed: desde n/a hasta 0.3.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23842.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23842.json index b296975014c..39e17b19cbb 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23842.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23842.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:24.940", "lastModified": "2025-01-16T21:15:24.940", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Nilesh Shiragave WordPress Gallery Plugin allows Cross Site Request Forgery.This issue affects WordPress Gallery Plugin: from n/a through 1.4." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Nilesh Shiragave WordPress Gallery Plugin permite Cross-Site Request Forgery. Este problema afecta a WordPress Gallery Plugin: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23844.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23844.json index 5d904b2769a..dbfce1152fd 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23844.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23844.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.080", "lastModified": "2025-01-16T21:15:25.080", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in wellwisher Custom Widget Classes allows Cross Site Request Forgery.This issue affects Custom Widget Classes: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en wellwisher Custom Widget Classes permite Cross-Site Request Forgery. Este problema afecta a Custom Widget Classes: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23848.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23848.json index 4d1edfb1806..eb5935223c0 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23848.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23848.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.220", "lastModified": "2025-01-16T21:15:25.220", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Hotspots Analytics allows Stored XSS.This issue affects Hotspots Analytics: from n/a through 4.0.12." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Daniel Powney Hotspots Analytics permite XSS almacenado. Este problema afecta a Hotspots Analytics: desde n/a hasta 4.0.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23854.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23854.json index 83ac30418c7..14ea7f3cd42 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23854.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23854.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.357", "lastModified": "2025-01-16T21:15:25.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YesStreaming.com Shoutcast and Icecast Internet Radio Hosting Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com allows Stored XSS.This issue affects Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com: from n/a through 3.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en YesStreaming.com Shoutcast and Icecast Internet Radio Hosting Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com permite XSS almacenado. Este problema afecta a Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com: desde n/a hasta 3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23856.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23856.json index b54dc811a8c..e856c5f8fa3 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23856.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23856.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.507", "lastModified": "2025-01-16T21:15:25.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alessandro Staniscia Simple Vertical Timeline allows DOM-Based XSS.This issue affects Simple Vertical Timeline: from n/a through 0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Alessandro Staniscia Simple Vertical Timeline permite XSS basado en DOM. Este problema afecta a Simple Vertical Timeline: desde n/a hasta 0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23859.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23859.json index 56bf82bf5c3..b67137cff53 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23859.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23859.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.667", "lastModified": "2025-01-16T21:15:25.667", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joshua Wieczorek Daily Proverb allows Stored XSS.This issue affects Daily Proverb: from n/a through 2.0.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Daily Proverb de Joshua Wieczorek permite XSS almacenado. Este problema afecta a Daily Proverb: desde n/a hasta 2.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23860.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23860.json index d9548c8cdd3..a6c6f5ff13a 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23860.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23860.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.810", "lastModified": "2025-01-16T21:15:25.810", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eyouth { rob.panes } Charity-thermometer allows Stored XSS.This issue affects Charity-thermometer: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eyouth { rob.panes } Charity-thermometer permite XSS almacenado. Este problema afecta a Charity-thermometer: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23861.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23861.json index 7dbe1106b30..e29287f1e4a 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23861.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23861.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:25.967", "lastModified": "2025-01-16T21:15:25.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Katz Web Services, Inc. Debt Calculator allows Cross Site Request Forgery.This issue affects Debt Calculator: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Katz Web Services, Inc. Debt Calculator permite Cross-Site Request Forgery. Este problema afecta a Debt Calculator: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23862.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23862.json index 903b3cc726e..dfaf5e90d79 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23862.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23862.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:26.127", "lastModified": "2025-01-16T21:15:26.127", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in SzMake Contact Form 7 Anti Spambot allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form 7 Anti Spambot: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en SzMake Contact Form 7 Anti Spambot permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Contact Form 7 Anti Spambot: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23863.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23863.json index d5637527e38..2778a9d2a53 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23863.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23863.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:26.290", "lastModified": "2025-01-16T21:15:26.290", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eiji \u2018Sabaoh\u2019 Yamada Rollover Tab allows Stored XSS.This issue affects Rollover Tab: from n/a through 1.3.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Eiji 'Sabaoh' Yamada Rollover Tab permite XSS almacenado. Este problema afecta a Rollover Tab: desde n/a hasta 1.3.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23864.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23864.json index c2654c98319..737db952f15 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23864.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23864.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:26.430", "lastModified": "2025-01-16T21:15:26.430", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Code Snippets (Luke America) WCS QR Code Generator allows Stored XSS.This issue affects WCS QR Code Generator: from n/a through 1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Code Snippets (Luke America) WCS QR Code Generator permite XSS almacenado. Este problema afecta a WCS QR Code Generator: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23865.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23865.json index bd53318f928..5ac13cbedd8 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23865.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23865.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:26.583", "lastModified": "2025-01-16T21:15:26.583", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pressfore Winning Portfolio allows Stored XSS.This issue affects Winning Portfolio: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pressfore Winning Portfolio permite XSS almacenado. Este problema afecta a Winning Portfolio: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23868.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23868.json index d1c8aa514cf..8d51b289bbc 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23868.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23868.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:26.730", "lastModified": "2025-01-16T21:15:26.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Markus Liebelt Chess Tempo Viewer allows Stored XSS.This issue affects Chess Tempo Viewer: from n/a through 0.9.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Markus Liebelt Chess Tempo Viewer permite XSS almacenado. Este problema afecta a Chess Tempo Viewer: desde n/a hasta 0.9.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23869.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23869.json index 74bf9d6a18a..913d3895475 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23869.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23869.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:26.893", "lastModified": "2025-01-16T21:15:26.893", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shibu Lijack a.k.a CyberJack CJ Custom Content allows Stored XSS.This issue affects CJ Custom Content: from n/a through 2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Shibu Lijack a.k.a CyberJack CJ Custom Content, permite XSS almacenado. Este problema afecta a CJ Custom Content: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23870.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23870.json index 56fc14b6771..259b9a4cc16 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23870.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23870.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:27.040", "lastModified": "2025-01-16T21:15:27.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Robert Nicholson Copyright Safeguard Footer Notice allows Stored XSS.This issue affects Copyright Safeguard Footer Notice: from n/a through 3.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en el aviso de pie de p\u00e1gina de Copyright Safeguard de Robert Nicholson permite XSS almacenado. Este problema afecta a Copyright Safeguard Footer Notice: desde n/a hasta 3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23871.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23871.json index 7340f8eecc7..4f7c96fbe2c 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23871.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23871.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:27.200", "lastModified": "2025-01-16T21:15:27.200", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Bas Matthee LSD Google Maps Embedder allows Cross Site Request Forgery.This issue affects LSD Google Maps Embedder: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Bas Matthee LSD Google Maps Embedder permite Cross-Site Request Forgery. Este problema afecta a LSD Google Maps Embedder: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23872.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23872.json index d88a585e7fb..4656e1aedb7 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23872.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23872.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:27.357", "lastModified": "2025-01-16T21:15:27.357", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in PayForm PayForm allows Stored XSS.This issue affects PayForm: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en PayForm PayForm permite XSS almacenado. Este problema afecta a PayForm: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23873.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23873.json index e8faacff2b5..6c60e19ead3 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23873.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23873.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:27.863", "lastModified": "2025-01-16T21:15:27.863", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anshi Solutions Category D3 Tree allows Stored XSS.This issue affects Category D3 Tree: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Anshi Solutions Category D3 Tree permite XSS almacenado. Este problema afecta a Category D3 Tree: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23875.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23875.json index bf2f08e95db..5544bb7c375 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23875.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23875.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:28.323", "lastModified": "2025-01-16T21:15:28.323", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tim Ridgway Better Protected Pages allows Stored XSS.This issue affects Better Protected Pages: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Tim Ridgway Better Protected Pages permite XSS almacenado. Este problema afecta a Better Protected Pages: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23876.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23876.json index 15fbbe253cf..7af6dac68ff 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23876.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23876.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:28.763", "lastModified": "2025-01-16T21:15:28.763", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jens Remus WP krpano allows Stored XSS.This issue affects WP krpano: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Jens Remus WP krpano permite XSS almacenado. Este problema afecta a WP krpano: desde n/a hasta 1.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23877.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23877.json index 919581862c5..a6b59c6d96f 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23877.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23877.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:28.963", "lastModified": "2025-01-16T21:15:28.963", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nitethemes Nite Shortcodes allows Stored XSS.This issue affects Nite Shortcodes: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Nitethemes Nite Shortcodes permite XSS almacenado. Este problema afecta a Nite Shortcodes: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23878.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23878.json index 8bb06b09a89..83e8b04424b 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23878.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23878.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:29.140", "lastModified": "2025-01-16T21:15:29.140", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Post-to-Post Links allows Stored XSS.This issue affects Post-to-Post Links: from n/a through 4.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Scott Reilly Post-to-Post Links permite XSS almacenado. Este problema afecta a Post-to-Post Links: desde n/a hasta 4.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23880.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23880.json index a42658b5a96..5c34153dbdc 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23880.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23880.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:29.310", "lastModified": "2025-01-16T21:15:29.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in anmari amr personalise allows Cross Site Request Forgery.This issue affects amr personalise: from n/a through 2.10." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en anmari amr personalise permite Cross-Site Request Forgery. Este problema afecta a amr personalise: desde n/a hasta 2.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23884.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23884.json index 3908bb7559c..f1113ae93ce 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23884.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23884.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:29.730", "lastModified": "2025-01-16T21:15:29.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chris Roberts Annie allows Cross Site Request Forgery.This issue affects Annie: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Chris Roberts Annie permite Cross-Site Request Forgery. Este problema afecta a Annie: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23886.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23886.json index 1c0d884bb34..52fa73f8263 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23886.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23886.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:29.927", "lastModified": "2025-01-16T21:15:29.927", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chris Roberts Annie allows Stored XSS.This issue affects Annie: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Chris Roberts Annie permite XSS almacenado. Este problema afecta a Annie: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23887.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23887.json index 5f2481f8c63..eaebfdb4133 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23887.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23887.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:30.087", "lastModified": "2025-01-16T21:15:30.087", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Allan Wallick Blog Summary allows Stored XSS.This issue affects Blog Summary: from n/a through 0.1.2 \u03b2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Scott Allan Wallick Blog Summary permite XSS almacenado. Este problema afecta a Blog Summary desde n/a hasta 0.1.2 ?." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23890.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23890.json index fc31ad5903d..7384eb23b9d 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23890.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23890.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:30.253", "lastModified": "2025-01-16T21:15:30.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tom Ewer and Tito Pandu Easy Tweet Embed allows DOM-Based XSS.This issue affects Easy Tweet Embed: from n/a through 1.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tom Ewer y Tito Pandu Easy Tweet Embed permite XSS basado en DOM. Este problema afecta a Easy Tweet Embed: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23891.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23891.json index c81a72bdad9..374c4d3dd30 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23891.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23891.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:30.417", "lastModified": "2025-01-16T21:15:30.417", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vincent Loy Yet Another Countdown allows DOM-Based XSS.This issue affects Yet Another Countdown: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Vincent Loy Yet Another Countdown permite XSS basado en DOM. Este problema afecta a Yet Another Countdown: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23892.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23892.json index a348993c53d..dfcb9420331 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23892.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23892.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:30.580", "lastModified": "2025-01-16T21:15:30.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Furr and Simon Ward Progress Tracker allows DOM-Based XSS.This issue affects Progress Tracker: from n/a through 0.9.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Alex Furr y Simon Ward Progress Tracker permite XSS basado en DOM. Este problema afecta a Progress Tracker: desde n/a hasta 0.9.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23893.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23893.json index e3f0b9ce914..b3b4a8d60be 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23893.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23893.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:30.797", "lastModified": "2025-01-16T21:15:30.797", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Manuel Costales GMap Shortcode allows DOM-Based XSS.This issue affects GMap Shortcode: from n/a through 2.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Manuel Costales GMap Shortcode permite XSS basado en DOM. Este problema afecta a GMap Shortcode: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23895.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23895.json index 7b5de0573ab..392db6c377a 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23895.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23895.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:30.967", "lastModified": "2025-01-16T21:15:30.967", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS allows Stored XSS.This issue affects Add RSS: from n/a through 1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Add RSS de Dan Cameron permite XSS almacenado. Este problema afecta a Add RSS: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23896.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23896.json index e7422a0545d..3afc501b87a 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23896.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23896.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:31.137", "lastModified": "2025-01-16T21:15:31.137", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oncle Tom Mindmeister Shortcode allows DOM-Based XSS.This issue affects Mindmeister Shortcode: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Oncle Tom Mindmeister Shortcode permite XSS basado en DOM. Este problema afecta a Mindmeister Shortcode: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23897.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23897.json index 1a6c111627a..48d258cae31 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23897.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23897.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:31.310", "lastModified": "2025-01-16T21:15:31.310", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivo Brett \u2013 ApplyMetrics Apply with LinkedIn buttons allows DOM-Based XSS.This issue affects Apply with LinkedIn buttons: from n/a through 2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ivo Brett \u2013 ApplyMetrics Apply with LinkedIn buttons permiten XSS basado en DOM. Este problema afecta a Apply with LinkedIn buttons: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23898.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23898.json index f2bf62cacba..8909472cb82 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23898.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23898.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:31.497", "lastModified": "2025-01-16T21:15:31.497", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ivo Brett \u2013 ApplyMetrics Apply with LinkedIn buttons allows Stored XSS.This issue affects Apply with LinkedIn buttons: from n/a through 2.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ivo Brett \u2013 ApplyMetrics Apply with LinkedIn buttons permiten XSS almacenado. Este problema afecta a Apply with LinkedIn buttons: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23899.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23899.json index 67efa9a8038..ea975e045eb 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23899.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23899.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:31.680", "lastModified": "2025-01-16T21:15:31.680", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BnB Select Ltd Bookalet allows Stored XSS.This issue affects Bookalet: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Bookalet de BnB Select Ltd permite XSS almacenado. Este problema afecta a Bookalet: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23900.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23900.json index b4b5499fbd6..436d6bdaf7c 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23900.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23900.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:31.857", "lastModified": "2025-01-16T21:15:31.857", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Genkisan Genki Announcement allows Cross Site Request Forgery.This issue affects Genki Announcement: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Genkisan Genki Announcement permite Cross-Site Request Forgery. Este problema afecta a Genki Announcement: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23901.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23901.json index 600a7c87476..e27fe1808da 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23901.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23901.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.027", "lastModified": "2025-01-16T21:15:32.027", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal GravatarLocalCache allows Cross Site Request Forgery.This issue affects GravatarLocalCache: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en GravatarLocalCache de Oliver Schaal permite Cross-Site Request Forgery. Este problema afecta a GravatarLocalCache: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23902.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23902.json index d19f7df64fe..407ae77e028 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23902.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23902.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.173", "lastModified": "2025-01-16T21:15:32.173", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through 0.2.7." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Taras Dashkevych Error Notification permite Cross-Site Request Forgery. Este problema afecta a Error Notification: desde n/a hasta 0.2.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23907.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23907.json index edc9dcc2304..e697360dfeb 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23907.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23907.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.333", "lastModified": "2025-01-16T21:15:32.333", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in closed SOCIAL.NINJA allows Stored XSS. This issue affects SOCIAL.NINJA: from n/a through 0.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en closed SOCIAL.NINJA permite XSS almacenado. Este problema afecta a SOCIAL.NINJA: desde n/a hasta 0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23908.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23908.json index 8f49bdf8710..22b850c8d28 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23908.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23908.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.480", "lastModified": "2025-01-16T21:15:32.480", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rami Yushuvaev Pastebin allows Stored XSS.This issue affects Pastebin: from n/a through 1.5." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Pastebin de Rami Yushuvaev permite XSS almacenado. Este problema afecta a Pastebin: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23909.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23909.json index 87acbbbd1a5..ad4a9744176 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23909.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23909.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.637", "lastModified": "2025-01-16T21:15:32.637", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Common Ninja Compare Ninja allows Stored XSS.This issue affects Compare Ninja: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Common Ninja Compare Ninja permite XSS almacenado. Este problema afecta a Compare Ninja: desde n/a hasta 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23911.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23911.json index 0a40bfdad74..b3472a61f18 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23911.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23911.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.780", "lastModified": "2025-01-16T21:15:32.780", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Solidres Team Solidres \u2013 Hotel booking plugin allows SQL Injection.This issue affects Solidres \u2013 Hotel booking plugin: from n/a through 0.9.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Solidres Team Solidres \u2013 Hotel booking plugin permite inyecci\u00f3n SQL. Este problema afecta a Solidres \u2013 Hotel booking plugin: desde n/a hasta 0.9.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23912.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23912.json index 9ed287db0df..ebfda06d75e 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23912.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23912.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:32.930", "lastModified": "2025-01-16T21:15:32.930", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Typomedia Foundation WordPress Custom Sidebar allows Blind SQL Injection.This issue affects WordPress Custom Sidebar: from n/a through 2.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Typomedia Foundation WordPress Custom Sidebar permite la inyecci\u00f3n SQL ciega. Este problema afecta a WordPress Custom Sidebar: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23913.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23913.json index 1e97633e956..d3c3e51323d 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23913.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23913.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:33.100", "lastModified": "2025-01-16T21:15:33.100", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in pankajpragma, rahulpragma WordPress Google Map Professional allows SQL Injection.This issue affects WordPress Google Map Professional: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en pankajpragma, rahulpragma WordPress Google Map Professional permite la inyecci\u00f3n SQL. Este problema afecta a WordPress Google Map Professional: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23915.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23915.json index 3f6b37397d8..ce5888f2efa 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23915.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23915.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:33.253", "lastModified": "2025-01-16T21:15:33.253", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roninwp FAT Event Lite allows PHP Local File Inclusion.This issue affects FAT Event Lite: from n/a through 1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Roninwp FAT Event Lite permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a FAT Event Lite: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23916.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23916.json index 57a44939e7b..72fd08d9787 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23916.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23916.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:33.433", "lastModified": "2025-01-16T21:15:33.433", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Nuanced Media WP Meetup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Meetup: from n/a through 2.3.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Nuanced Media WP Meetup permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP Meetup: desde n/a hasta 2.3.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23917.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23917.json index 1d43b53ebb0..a08544b63d5 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23917.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23917.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:33.580", "lastModified": "2025-01-16T21:15:33.580", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Chandrika Guntur, Morgan Kay Chamber Dashboard Business Directory allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chamber Dashboard Business Directory: from n/a through 3.3.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Chandrika Guntur, Morgan Kay Chamber Dashboard Business Directory permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Chamber Dashboard Business Directory: desde n/a hasta 3.3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23919.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23919.json index 02037adefe2..587e6329296 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23919.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23919.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:33.743", "lastModified": "2025-01-16T21:15:33.743", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Ella van Durpe Slides & Presentations allows Code Injection.This issue affects Slides & Presentations: from n/a through 0.0.39." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de etiquetas HTML relacionadas con scripts en una p\u00e1gina web (XSS b\u00e1sico) en Ella van Durpe Slides & Presentations permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Slides & Presentations: desde n/a hasta 0.0.39." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23922.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23922.json index 3dfdd81e9b9..893383dacb3 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23922.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23922.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:33.890", "lastModified": "2025-01-16T21:15:33.890", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Harsh iSpring Embedder allows Upload a Web Shell to a Web Server.This issue affects iSpring Embedder: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Harsh iSpring Embedder permite cargar un shell web a un servidor web. Este problema afecta a iSpring Embedder: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23924.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23924.json index 401e484259f..be0f595a965 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23924.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23924.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.040", "lastModified": "2025-01-16T21:15:34.040", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J\u00e9r\u00e9my Heleine WP Photo Sphere allows Stored XSS.This issue affects WP Photo Sphere: from n/a through 3.8." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en J\u00e9r\u00e9my Heleine WP Photo Sphere permite XSS almacenado. Este problema afecta a WP Photo Sphere: desde n/a hasta 3.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23925.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23925.json index 40553253c4d..7ec9bf8a4fd 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23925.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23925.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.187", "lastModified": "2025-01-16T21:15:34.187", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jimmy Pe\u00f1a Feedburner Optin Form allows Stored XSS.This issue affects Feedburner Optin Form: from n/a through 0.2.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') enJimmy Pe\u00f1a Feedburner Optin Form permite XSS almacenado. Este problema afecta a Feedburner Optin Form: desde n/a hasta 0.2.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23926.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23926.json index c5825e10c55..21a573e9e1b 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23926.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23926.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.343", "lastModified": "2025-01-16T21:15:34.343", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TC Ajax WP Query Search Filter allows Stored XSS.This issue affects Ajax WP Query Search Filter: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en TC Ajax WP Query Search Filter permite XSS almacenado. Este problema afecta a Ajax WP Query Search Filter: desde n/a hasta 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23927.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23927.json index 5f96bd0febc..813984c5ced 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23927.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23927.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.507", "lastModified": "2025-01-16T21:15:34.507", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Massimo Serpilli Incredible Font Awesome allows Stored XSS.This issue affects Incredible Font Awesome: from n/a through 1.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Massimo Serpilli Incredible Font Awesome permite XSS almacenado. Este problema afecta a Incredible Font Awesome: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23928.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23928.json index cea97d1f0b1..28d610e4064 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23928.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23928.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.663", "lastModified": "2025-01-16T21:15:34.663", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Arsovski Google Org Chart allows Stored XSS.This issue affects Google Org Chart: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Google Org Chart de Aleksandar Arsovski permite XSS almacenado. Este problema afecta a Google Org Chart: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23929.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23929.json index 3c6c169dcd1..935c3c83489 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23929.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23929.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.817", "lastModified": "2025-01-16T21:15:34.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in wishfulthemes Email Capture & Lead Generation allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Email Capture & Lead Generation: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en wishfulthemes Email Capture & Lead Generation permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Email Capture & Lead Generation: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23930.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23930.json index 0dbd743180d..995d0a65551 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23930.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23930.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:34.987", "lastModified": "2025-01-16T21:15:34.987", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in iTechArt-Group PayPal Marketing Solutions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PayPal Marketing Solutions: from n/a through 1.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en iTechArt-Group PayPal Marketing Solutions permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a PayPal Marketing Solutions: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23933.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23933.json index 96a1893817c..0efc0947c9f 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23933.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23933.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:35.210", "lastModified": "2025-01-16T21:15:35.210", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WpFreeware WpF Ultimate Carousel allows Stored XSS.This issue affects WpF Ultimate Carousel: from n/a through 1.0.11." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WpFreeware WpF Ultimate Carousel permite XSS almacenado. Este problema afecta a WpF Ultimate Carousel: desde n/a hasta 1.0.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23934.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23934.json index 9ee76048f83..e15e03ddee2 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23934.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23934.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:35.367", "lastModified": "2025-01-16T21:15:35.367", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PromoSimple Giveaways and Contests by PromoSimple allows Stored XSS.This issue affects Giveaways and Contests by PromoSimple: from n/a through 1.24." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en PromoSimple Giveaways and Contests by PromoSimple permite XSS almacenado. Este problema afecta a Giveaways and Contests by PromoSimple: desde n/a hasta 1.24." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23935.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23935.json index 1697d363072..d1be2f99d58 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23935.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23935.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:35.513", "lastModified": "2025-01-16T21:15:35.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magic Plugin Factory Magic Google Maps allows Stored XSS.This issue affects Magic Google Maps: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Magic Plugin Factory Magic Google Maps permite XSS almacenado. Este problema afecta a Magic Google Maps: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23936.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23936.json index fc040e0959d..7544c51f495 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23936.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23936.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:35.677", "lastModified": "2025-01-16T21:15:35.677", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Harun R. Rayhan (Cr@zy Coder) CC Circle Progress Bar allows Stored XSS.This issue affects CC Circle Progress Bar: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Harun R. Rayhan (Cr@zy Coder) CC Circle Progress Bar permite XSS almacenado. Este problema afecta a CC Circle Progress Bar: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23939.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23939.json index 6b70815bd68..5db09c2fc91 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23939.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23939.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:35.910", "lastModified": "2025-01-16T21:15:35.910", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiem Khan Image Switcher allows Stored XSS.This issue affects Image Switcher: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Saiem Khan Image Switcher permite XSS almacenado. Este problema afecta a Image Switcher: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23940.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23940.json index 17357b46e0c..860b29c6ba0 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23940.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23940.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.087", "lastModified": "2025-01-16T21:15:36.087", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiem Khan Image Switcher allows Stored XSS.This issue affects Image Switcher: from n/a through 0.1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Saiem Khan Image Switcher permite XSS almacenado. Este problema afecta a Image Switcher: desde n/a hasta 0.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23941.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23941.json index 708fedf6022..f7cf7b8efc4 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23941.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23941.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.230", "lastModified": "2025-01-16T21:15:36.230", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meinturnierplan.de Team MeinTurnierplan.de Widget Viewer allows Stored XSS.This issue affects MeinTurnierplan.de Widget Viewer: from n/a through 1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Meinturnierplan.de Team MeinTurnierplan.de Widget Viewer permite XSS almacenado. Este problema afecta a MeinTurnierplan.de Widget Viewer: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23943.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23943.json index c8be67effaf..0c82c4fa5f1 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23943.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23943.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.373", "lastModified": "2025-01-16T21:15:36.373", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in arul PDF.js Shortcode allows Stored XSS.This issue affects PDF.js Shortcode: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en arul PDF.js Shortcode permite XSS almacenado. Este problema afecta a PDF.js Shortcode: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23946.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23946.json index d84661e63ab..fa4415d0acf 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23946.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23946.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.520", "lastModified": "2025-01-16T21:15:36.520", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in le Pixel Solitaire Enhanced YouTube Shortcode allows Stored XSS.This issue affects Enhanced YouTube Shortcode: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en le Pixel Solitaire Enhanced YouTube Shortcode permite XSS almacenado. Este problema afecta a Enhanced YouTube Shortcode: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23947.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23947.json index f10a1431acc..4c4c843b669 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23947.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23947.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.670", "lastModified": "2025-01-16T21:15:36.670", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M.J WP-Player allows Stored XSS.This issue affects WP-Player: from n/a through 2.6.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en MJ WP-Player permite XSS almacenado. Este problema afecta a WP-Player: desde n/a hasta 2.6.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23950.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23950.json index 3497c5f95bf..c24b16f1c38 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23950.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23950.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.817", "lastModified": "2025-01-16T21:15:36.817", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Said Shiripour EZPlayer allows Stored XSS.This issue affects EZPlayer: from n/a through 1.0.10." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Said Shiripour EZPlayer permite XSS almacenado. Este problema afecta a EZPlayer: desde n/a hasta 1.0.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23951.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23951.json index a921a332e4c..24d9b4d49ff 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23951.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23951.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:36.983", "lastModified": "2025-01-16T21:15:36.983", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DivEngine Gallery: Hybrid \u2013 Advanced Visual Gallery allows Stored XSS.This issue affects Gallery: Hybrid \u2013 Advanced Visual Gallery: from n/a through 1.4.0.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en DivEngine Gallery: Hybrid \u2013 Advanced Visual Gallery permite XSS almacenado. Este problema afecta a Gallery: Hybrid \u2013 Advanced Visual Gallery: desde n/a hasta 1.4.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23954.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23954.json index 5c3eee3a45b..5ac8785eea3 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23954.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23954.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:37.133", "lastModified": "2025-01-16T21:15:37.133", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in AWcode & KingfisherFox Salvador \u2013 AI Image Generator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Salvador \u2013 AI Image Generator: from n/a through 1.0.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en AWcode y KingfisherFox Salvador \u2013 AI Image Generator permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Salvador \u2013 AI Image Generator: desde n/a hasta 1.0.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23955.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23955.json index 7b9dad07c5d..fb6db3bd84f 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23955.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23955.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:37.277", "lastModified": "2025-01-16T21:15:37.277", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in xola.com Xola allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Xola: from n/a through 1.6." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en xola.com Xola permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Xola: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23957.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23957.json index 1641a6b371d..da65b74ee98 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23957.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23957.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:37.420", "lastModified": "2025-01-16T21:15:37.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Sur.ly Sur.ly allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sur.ly: from n/a through 3.0.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en Sur.ly Sur.ly permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Sur.ly: desde n/a hasta 3.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23961.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23961.json index 84690d30781..6cb282b2c70 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23961.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23961.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:37.573", "lastModified": "2025-01-16T21:15:37.573", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WP Tasker WordPress Graphs & Charts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Graphs & Charts: from n/a through 2.0.8." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Tasker WordPress Graphs & Charts permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WordPress Graphs & Charts: desde n/a hasta 2.0.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23962.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23962.json index 1fc6a53dcbc..6b27e20cfe3 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23962.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23962.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:37.730", "lastModified": "2025-01-16T21:15:37.730", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Goldstar Goldstar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Goldstar: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Goldstar Goldstar permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Goldstar: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23963.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23963.json index bd18e53e920..a24d35ec2ac 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23963.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23963.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:37.873", "lastModified": "2025-01-16T21:15:37.873", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Sven Hofmann & Michael Schoenrock Mark Posts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mark Posts: from n/a through 2.2.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Mark Posts de Sven Hofmann y Michael Schoenrock permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Mark Posts: desde n/a hasta 2.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23965.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23965.json index 84a391f07b1..f3646fc9dbb 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23965.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23965.json @@ -3,12 +3,16 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-16T21:15:38.023", "lastModified": "2025-01-16T21:15:38.023", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kopatheme Kopa Nictitate Toolkit allows Stored XSS.This issue affects Kopa Nictitate Toolkit: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Kopatheme Kopa Nictitate Toolkit permite XSS almacenado. Este problema afecta a Kopa Nictitate Toolkit: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/README.md b/README.md index 9738c346b33..ffe56f6c3ef 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-19T00:55:20.721303+00:00 +2025-01-19T03:00:20.175811+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-19T00:15:25.077000+00:00 +2025-01-19T02:53:15.150000+00:00 ``` ### Last Data Feed Release @@ -27,26 +27,52 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-01-18T01:00:04.365588+00:00 +2025-01-19T01:00:04.361223+00:00 ``` ### Total Number of included CVEs ```plain -278059 +278061 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -- [CVE-2025-0561](CVE-2025/CVE-2025-05xx/CVE-2025-0561.json) (`2025-01-19T00:15:25.077`) +- [CVE-2025-0562](CVE-2025/CVE-2025-05xx/CVE-2025-0562.json) (`2025-01-19T02:15:24.380`) +- [CVE-2025-0563](CVE-2025/CVE-2025-05xx/CVE-2025-0563.json) (`2025-01-19T02:15:24.560`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1770` +- [CVE-2025-23925](CVE-2025/CVE-2025-239xx/CVE-2025-23925.json) (`2025-01-16T21:15:34.187`) +- [CVE-2025-23926](CVE-2025/CVE-2025-239xx/CVE-2025-23926.json) (`2025-01-16T21:15:34.343`) +- [CVE-2025-23927](CVE-2025/CVE-2025-239xx/CVE-2025-23927.json) (`2025-01-16T21:15:34.507`) +- [CVE-2025-23928](CVE-2025/CVE-2025-239xx/CVE-2025-23928.json) (`2025-01-16T21:15:34.663`) +- [CVE-2025-23929](CVE-2025/CVE-2025-239xx/CVE-2025-23929.json) (`2025-01-16T21:15:34.817`) +- [CVE-2025-23930](CVE-2025/CVE-2025-239xx/CVE-2025-23930.json) (`2025-01-16T21:15:34.987`) +- [CVE-2025-23933](CVE-2025/CVE-2025-239xx/CVE-2025-23933.json) (`2025-01-16T21:15:35.210`) +- [CVE-2025-23934](CVE-2025/CVE-2025-239xx/CVE-2025-23934.json) (`2025-01-16T21:15:35.367`) +- [CVE-2025-23935](CVE-2025/CVE-2025-239xx/CVE-2025-23935.json) (`2025-01-16T21:15:35.513`) +- [CVE-2025-23936](CVE-2025/CVE-2025-239xx/CVE-2025-23936.json) (`2025-01-16T21:15:35.677`) +- [CVE-2025-23939](CVE-2025/CVE-2025-239xx/CVE-2025-23939.json) (`2025-01-16T21:15:35.910`) +- [CVE-2025-23940](CVE-2025/CVE-2025-239xx/CVE-2025-23940.json) (`2025-01-16T21:15:36.087`) +- [CVE-2025-23941](CVE-2025/CVE-2025-239xx/CVE-2025-23941.json) (`2025-01-16T21:15:36.230`) +- [CVE-2025-23943](CVE-2025/CVE-2025-239xx/CVE-2025-23943.json) (`2025-01-16T21:15:36.373`) +- [CVE-2025-23946](CVE-2025/CVE-2025-239xx/CVE-2025-23946.json) (`2025-01-16T21:15:36.520`) +- [CVE-2025-23947](CVE-2025/CVE-2025-239xx/CVE-2025-23947.json) (`2025-01-16T21:15:36.670`) +- [CVE-2025-23950](CVE-2025/CVE-2025-239xx/CVE-2025-23950.json) (`2025-01-16T21:15:36.817`) +- [CVE-2025-23951](CVE-2025/CVE-2025-239xx/CVE-2025-23951.json) (`2025-01-16T21:15:36.983`) +- [CVE-2025-23954](CVE-2025/CVE-2025-239xx/CVE-2025-23954.json) (`2025-01-16T21:15:37.133`) +- [CVE-2025-23955](CVE-2025/CVE-2025-239xx/CVE-2025-23955.json) (`2025-01-16T21:15:37.277`) +- [CVE-2025-23957](CVE-2025/CVE-2025-239xx/CVE-2025-23957.json) (`2025-01-16T21:15:37.420`) +- [CVE-2025-23961](CVE-2025/CVE-2025-239xx/CVE-2025-23961.json) (`2025-01-16T21:15:37.573`) +- [CVE-2025-23962](CVE-2025/CVE-2025-239xx/CVE-2025-23962.json) (`2025-01-16T21:15:37.730`) +- [CVE-2025-23963](CVE-2025/CVE-2025-239xx/CVE-2025-23963.json) (`2025-01-16T21:15:37.873`) +- [CVE-2025-23965](CVE-2025/CVE-2025-239xx/CVE-2025-23965.json) (`2025-01-16T21:15:38.023`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 27df7fdddf8..78bc9cb0f2b 100644 --- a/_state.csv +++ b/_state.csv @@ -75532,7 +75532,7 @@ CVE-2015-2047,0,0,2704a69c5415cf0032ffb800fb0c5fbb11a6ac1ee9bf8c1864588d2de549b4 CVE-2015-2048,0,0,fd99c803aeaa4b05fb164e9b853997f754d242468c30cf8c99e13e009614e1c9,2024-11-21T02:26:39.240000 CVE-2015-2049,0,0,f8f0d997bb37ec8639cbb7da18049aa17a872025f2b7d884b4feee0b321bac52,2024-11-21T02:26:39.380000 CVE-2015-2050,0,0,bbe386a91567e56321126dc93dd5386a1a9bae2855ee91c5ac823ca6c6018b67,2024-11-21T02:26:39.523000 -CVE-2015-2051,0,0,ec2aa2784c152072929e487d1eef8fce9f1e75342c96535d90a9da9a4f5726f1,2025-01-06T15:15:08.723000 +CVE-2015-2051,0,1,2ec6c4bce6413bd4b263a63ecdb49620305af2959028a8ad366cba4ee229d9b6,2025-01-06T15:15:08.723000 CVE-2015-2052,0,0,2cb54fe3b8bbacbfd68bc37cc687e8615315e5eb691c09dcebceefecfb956e93,2024-11-21T02:26:39.887000 CVE-2015-2053,0,0,1cbb13193c9c15b7fffcd8a775c59016be05e9754e77d71097206817982b21d9,2024-11-21T02:26:40.020000 CVE-2015-2054,0,0,b4572a1920f607058a9b730c111e2615651825e83a65bb44f719ba29841028de,2024-11-21T02:26:40.163000 @@ -85029,7 +85029,7 @@ CVE-2016-1642,0,0,66841ee498ca853ea6b5936c383c57d7698ce1fabf9c8ee7451137702466df CVE-2016-1643,0,0,42a0f14881456f59b972cc3a93852e36631b4c9be928ccf9872f9dd28f88d14f,2024-11-21T02:46:48.240000 CVE-2016-1644,0,0,b3b28a4b3543f909beb5109e758edb8e660120ad9a32629ead0d455446752dab,2024-11-21T02:46:48.350000 CVE-2016-1645,0,0,c6fd969932556e60d0bd2093779d4a9531ece63c642981335df9f0ae9ef57939,2024-11-21T02:46:48.453000 -CVE-2016-1646,0,0,586607e7cb6116a5f1818d1741bd7eef75612a4e78f621ab79f9cb07c976a74a,2024-11-21T02:46:48.570000 +CVE-2016-1646,0,1,9de571230ec09f6f4bb12bd7445bdcc262a9419c5e243ad2cdce33b72f29202a,2024-11-21T02:46:48.570000 CVE-2016-1647,0,0,e08338c6621bdf3b997998680f254b4dd517410fe6cc2425120e41567d57f615,2024-11-21T02:46:48.697000 CVE-2016-1648,0,0,774476717a95c723bbddd1c1af5822e5c17b3d5d970f0feb63f42e149e060d29,2024-11-21T02:46:48.807000 CVE-2016-1649,0,0,3906b2c16ac489a143a7354ad8ab0a053bc66d60da97153cc6f9deacbf4ffa8b,2024-11-21T02:46:48.917000 @@ -85381,7 +85381,7 @@ CVE-2016-20013,0,0,375320b34d7018855a9779d603a6ae72facbdf8000d800760a7d6696a1bf6 CVE-2016-20014,0,0,0d0e88405755cd5416acec12272996d3000114689b324596c137a83cb6b43b50,2024-11-21T02:47:33.570000 CVE-2016-20015,0,0,544e3fe1a43c79d69f18f0bacada7b20f9d7703455a23788c0f3779fe655c7fb,2024-11-21T02:47:33.733000 CVE-2016-20016,0,0,54f70016458b236626396e47c463c1e033cbf3b421bafdf8cccc59797a185287,2024-11-21T02:47:33.900000 -CVE-2016-20017,0,0,0265f54b35182119652f1d5a99c73366f5536eff7d08612abc7f779efb097f94,2024-11-21T02:47:34.057000 +CVE-2016-20017,0,1,c2b45452f9eca0ff5bdb670b83ac535aa18f887942b09096060af6bd239bb42a,2024-11-21T02:47:34.057000 CVE-2016-20018,0,0,62c09eb5dba9905cc98613f73c036000dc23cdec0f8a6845db0dc239c7ec6f18,2024-11-21T02:47:34.203000 CVE-2016-2002,0,0,89e5eea0bca0712faf6111a41600c6c5c1134e38594a6c5c17b21dd0ccc512d3,2024-11-21T02:47:34.963000 CVE-2016-20021,0,0,ddf15001084ec81189844eec1b1019cd1afd4763fd6f96fb5217f33cd8b25ba3,2024-11-21T02:47:34.367000 @@ -85740,9 +85740,9 @@ CVE-2016-2381,0,0,d360eb004004e75fbd9905060949f2113a0cbcfecfdf0c07ed6fff32574210 CVE-2016-2383,0,0,02039d35ec0bdb9017259a31bc51d5685f5914fc5296ce1f53ccdafcc1bd8a2f,2024-11-21T02:48:21.383000 CVE-2016-2384,0,0,a8572d798763c5441ded8c7b34ac76617bf32e4f6ca1a49dcc1d18ae97b576e8,2024-11-21T02:48:21.510000 CVE-2016-2385,0,0,dc82a4bf915062c035ceb6e72fd02f1e2990bd2e5347eaafb255df73a7aa5d14,2024-11-21T02:48:21.667000 -CVE-2016-2386,0,0,cc79f70ba6fb573f9e719d13c38b242dd5e4a3a32b80b3379ab1ee997fb142a1,2024-11-21T02:48:21.830000 +CVE-2016-2386,0,1,4d78fb0baaeb55edb74500ad0ab583df55d650f967e7c7045da1717139bbf979,2024-11-21T02:48:21.830000 CVE-2016-2387,0,0,e92bd50658d3cfc7e56ca55cff68e01b58521ba64d8a5e44cf5459b40b04bdea,2024-11-21T02:48:21.987000 -CVE-2016-2388,0,0,7828ee57a94386c2f128e9c06ce507b6e7713b2538c4eb26f98b37d04ae73a56,2024-11-21T02:48:22.130000 +CVE-2016-2388,0,1,c745a9b16d60906135460b4bd0f07aa839e8e86a1a318592fcf383e8293603fc,2024-11-21T02:48:22.130000 CVE-2016-2389,0,0,57df4bd8cf6515fa04f2c753dd903d2bae9f5f8e9255565cc39182da83c0c80f,2024-11-21T02:48:22.307000 CVE-2016-2390,0,0,5f6bc17f23c1890dda7d06c6c5c501d61fdbe198106233655411cb6dc7c40801,2024-11-21T02:48:22.447000 CVE-2016-2391,0,0,d2f6fc0b0799ac2ea0d99c62b493c16431fe79f1e6f7b7bb36d980fa1238bd8c,2024-11-21T02:48:22.600000 @@ -86389,7 +86389,7 @@ CVE-2016-3084,0,0,25e3e713743b201b6e03b6363be051dc3f604dabf81882e48cafcee0d19fa7 CVE-2016-3085,0,0,f0368fb38e853a9db5547055d38f26557d9239b54602c082e0b8d13e28e71eb3,2024-11-21T02:49:20.027000 CVE-2016-3086,0,0,59633a3f418d14c3d438a3bf51c98c30a8cd099e807b004b2d43536f6616785c,2024-11-21T02:49:20.120000 CVE-2016-3087,0,0,21d4cb01cf897d7c3a159c08d06be41302c1e753c0803ad8da3b6543f996201f,2024-11-21T02:49:20.233000 -CVE-2016-3088,0,0,bb8569c66cc1e9c04fe14a97d90f99e123b47c95ca014162f00483d57cdd1f38,2024-11-21T02:49:20.357000 +CVE-2016-3088,0,1,6d636f071e30ad84342fe7c6efbdd657990af33576c2bfb6a5aaad35911f3ee3,2024-11-21T02:49:20.357000 CVE-2016-3089,0,0,c6402560615d14f4514f1660f87517bf7f4221b884bfa5da46462e64dd48fa81,2024-11-21T02:49:20.490000 CVE-2016-3090,0,0,f0f5970104443f7d32d03042b275bbb19b617588eea12627e43949a7cb8a4447,2024-11-21T02:49:20.620000 CVE-2016-3091,0,0,358705bf70c14d2c8244998cb7781e733436939df7c5e0d4c2d3d4555f3f40d8,2024-11-21T02:49:20.747000 @@ -86525,7 +86525,7 @@ CVE-2016-3231,0,0,1b8994d34616231f8b2629e144b9c83fced1dcd28656d4b30fe8f59b6539bc CVE-2016-3232,0,0,db4c30ad4fc286ac92f1983dad78c347148ccec9509b0b98bd5d718221a615d3,2024-11-21T02:49:38.557000 CVE-2016-3233,0,0,576aec2de861097213f61e3ebf81e01b2126377ccceda00e38bbc3cc54ace1a8,2024-11-21T02:49:38.657000 CVE-2016-3234,0,0,74c3a797857929d232599ac0e7c16a46c2770d425b20625643d216fce4e200eb,2024-11-21T02:49:38.760000 -CVE-2016-3235,0,0,c43c6efa51f7720a2ffb85e9a1861381da7a598a079d757c3dd473a67db82ded,2024-11-21T02:49:38.880000 +CVE-2016-3235,0,1,b19321d7295d5bb13cf6f8e06a3cfd3e8d1c11bbcc6834854672bf14cd970847,2024-11-21T02:49:38.880000 CVE-2016-3236,0,0,74efd0a7920309837d6ee90a95feee2f77951868b4987abaa5775121f95c0200,2024-11-21T02:49:39.010000 CVE-2016-3237,0,0,7917f86dd5920f7ccb411d6e64ecda62f67b50f1667f8344ec9016cc62d2c3a2,2024-11-21T02:49:39.117000 CVE-2016-3238,0,0,43aa7e3e55884598e8aeb168106d150403ba258f8c9b1866a99e297dd1a40e45,2024-11-21T02:49:39.233000 @@ -86588,7 +86588,7 @@ CVE-2016-3294,0,0,0d2dca08aaf94a45941dfc23f8220305633f05a53b056ab037526ea1181c29 CVE-2016-3295,0,0,876a0990cd3283957e60bb272a85affb953ee9b98079533a1ce07488a6f0bf0e,2024-11-21T02:49:44.970000 CVE-2016-3296,0,0,748ee55d36db3b5b94621881749d0604908f96ebb9fbf34d99c3c2576fc0f247,2024-11-21T02:49:45.083000 CVE-2016-3297,0,0,fabb107b3d72b0299e4c4de873ce89b1e35c5ca36f99da7182d0d940fdfdf45b,2024-11-21T02:49:45.200000 -CVE-2016-3298,0,0,56a4743b1ea982c693aa6a22e5757108b18d32684fa2f2dea9045d12c3d1d6db,2024-11-21T02:49:45.317000 +CVE-2016-3298,0,1,70b58e4bb8ccb018c221407f4eb6fd2b6d22b98612dbfad4b1244578378988ba,2024-11-21T02:49:45.317000 CVE-2016-3299,0,0,51950c2c80c1b0efa5118283fe26fa8c980a4d00b6bb33a05f75103809a18638,2024-11-21T02:49:45.450000 CVE-2016-3300,0,0,84d18bd8b4037fdf0de017bcf3ddd4036253b98861059de64753d930b5356da0,2024-11-21T02:49:45.577000 CVE-2016-3301,0,0,5b1f7cc7741fe7edc91bde5ed52e53bc3812ef0aae23336ef962ac17c4621055,2024-11-21T02:49:45.703000 @@ -86599,7 +86599,7 @@ CVE-2016-3305,0,0,02a908aae6166a138ba1f8f12b42f2bdd7e54a07e7d08419a131c2dfdd34ac CVE-2016-3306,0,0,9873c13060926bf0f474b8d365fff9ae13b1c5332200a7d4c39afc90d2a663b3,2024-11-21T02:49:46.300000 CVE-2016-3307,0,0,99073aee719387e70a28f875a7af8b1163249e7072ed298b0e88be214a437ede,2023-11-07T02:32:15.973000 CVE-2016-3308,0,0,2db34a3a4bb8ff09d435b464ab2769827624330871488d59fdfe975b052f76f6,2024-11-21T02:49:46.443000 -CVE-2016-3309,0,0,9d42f949cd4392c336141fb16197ef6e8c65b40cb3f74acbb609fbbf81e4f4f5,2024-11-21T02:49:46.563000 +CVE-2016-3309,0,1,ff3ad3500f8b340e0f34620f5635603dbe9a56fcaabb50c17a8ac48e3bde13c8,2024-11-21T02:49:46.563000 CVE-2016-3310,0,0,6f5c8e40e865d982ccefe1b509a4bd32ec3cc9323fc3bb74c30165d908c504aa,2024-11-21T02:49:46.697000 CVE-2016-3311,0,0,a02fb44b3a08feefe0c38831a45cc9da76c5d591fbbc26e16088ec7dabe595f3,2024-11-21T02:49:46.823000 CVE-2016-3312,0,0,4544c74bf0460529c87593ab335e7a61940bf83114e7d143339713344f24b8d2,2024-11-21T02:49:46.940000 @@ -86641,7 +86641,7 @@ CVE-2016-3347,0,0,3b568e712df77cf1f06910c638e7ead9940658acd277c3ed992aeac2620c6e CVE-2016-3348,0,0,ea34b0548f18647a9da780368ace2c7e88970f575527953172eae4efd6a83243,2024-11-21T02:49:50.403000 CVE-2016-3349,0,0,5c36e8700dedd9989b755ac2536a14dbf87747a0fa865aec7d9e2c91c468333e,2024-11-21T02:49:50.510000 CVE-2016-3350,0,0,a28a03ba2d18d5913f9999585014ef056c685a32bd13907f5d35c3f9790f7266,2024-11-21T02:49:50.607000 -CVE-2016-3351,0,0,741715ecfcb899a283ad5a191ea3be0d6729949ff222048e9b7b719fad2ad502,2024-11-21T02:49:50.703000 +CVE-2016-3351,0,1,2fc4de76b2de51d70c4b42f24fd5ca5ceb0778adc90d18e5bf87a7bfd0eb9512,2024-11-21T02:49:50.703000 CVE-2016-3352,0,0,1e3e435200d3512ea9725c14b654e8b40fe381a9f602b6134fd20cb24d7982b5,2024-11-21T02:49:50.823000 CVE-2016-3353,0,0,98d1280ae7a66bc5d4ea0f791f6fc383bbbe4f7e9f26dad34b9afc4d717a2ec1,2024-11-21T02:49:50.920000 CVE-2016-3354,0,0,cfc5edc326e2f59d1cd62f9cfc1ed24a4ee1c2acfd49f19ea484ed09e6bd7ac2,2024-11-21T02:49:51.023000 @@ -86683,7 +86683,7 @@ CVE-2016-3389,0,0,795da1b2d2a33bdab675485c2e18b59e7cf76680a298afc76f16049b5d8bea CVE-2016-3390,0,0,d8c15cb9ba7ab1118f9f7239ade2a6a8c1f8f548816f8782ee66bd9a1734a2fd,2024-11-21T02:49:54.813000 CVE-2016-3391,0,0,1f70c143400de91e6c7f02d7ca2f8da2d7032dbd3a86d9a60afb2d6059d419cf,2024-11-21T02:49:54.923000 CVE-2016-3392,0,0,62f92c5bbc0338508e0201964747d344e0cb9942852692584c7cb0dc2431e516,2024-11-21T02:49:55.033000 -CVE-2016-3393,0,0,ac1f4ddbd6f2d979d1f4b5c8404c970a55c7c2a73e7caffaeb46a2f3b431f72b,2024-11-21T02:49:55.143000 +CVE-2016-3393,0,1,7278e6c4a0fe086622dfd2f00e829d62ffe75e2f0f86a28f9e058a8e6b5ac49e,2024-11-21T02:49:55.143000 CVE-2016-3394,0,0,7e99c4ea2e0a86e9886d5868f29d9ce69260ede59677ae2733a74b59d4067f0a,2023-11-07T02:32:18.753000 CVE-2016-3395,0,0,45519b5d321d74661c9d0f78c5e1c8bfd350d0fdf5da9fb776b47cb63b1f2f96,2023-11-07T02:32:18.990000 CVE-2016-3396,0,0,5b51e61bff71eb7dc141c717b6d4c5d5fb6c4d0f5f237322b7cd07853d039485,2024-11-21T02:49:55.293000 @@ -86715,7 +86715,7 @@ CVE-2016-3423,0,0,b818f3800e642d8a1dc24ad05b2ac0351d15d98d68ec112f4ae29367f650dc CVE-2016-3424,0,0,f2a564bfaff9c286c0b9401e35d76cb598b73c3961bef1cf5190b8abae28b1b1,2024-11-21T02:49:58.767000 CVE-2016-3425,0,0,38ae095774ef9fabdcee736398c28bc10c47ce2874442960d9dfcbfd70a488cf,2024-11-21T02:49:58.893000 CVE-2016-3426,0,0,54487d4b235e16096b5efba7b3f574e41dbe517cf1e9fe34131c2000082ea43e,2024-11-21T02:49:59.030000 -CVE-2016-3427,0,0,926a79b99f5a78d7a59600d921a71074ce6916933826b78e07cd9ef37d495003,2024-11-21T02:49:59.190000 +CVE-2016-3427,0,1,64372b289dd260d1389623e8d034981127ceb8facb3a7d9fa77660d48d9a488c,2024-11-21T02:49:59.190000 CVE-2016-3428,0,0,cf58498bd13dad6a8c1f3ba79620f40bce24489cf93a2ce8641b8b79c4b0ee70,2024-11-21T02:49:59.513000 CVE-2016-3429,0,0,7d60c760d78d0abc486c21d8e515f0f54d291c0ad33cbc15f775c8cd23a48bec,2024-11-21T02:49:59.613000 CVE-2016-3431,0,0,22b89124cc525d85f97db806c5676dc2ae2b199f5867fd7c6e808a33efd51536,2024-11-21T02:49:59.720000 @@ -86924,7 +86924,7 @@ CVE-2016-3638,0,0,7d10d08a9c330e8186c8b1df8131ce4ada33f48ecfa9a498b77a809b275d50 CVE-2016-3639,0,0,421db73e8a71b5ada97776de5bc41fde15eb5c7dd19ee95fa07e640c7c6c7281,2024-11-21T02:50:26.267000 CVE-2016-3640,0,0,cb1598d890a5236b6bcfc0dbf4eb736e3623e2422c26299b356149123bffa0a0,2024-11-21T02:50:26.407000 CVE-2016-3642,0,0,163b466ec35987c6c4ff6c7c3a6b6420d30f51d42875bea496195e99af2ad6a1,2024-11-21T02:50:26.543000 -CVE-2016-3643,0,0,a77b504f939e75080cb03c5c38354d0dde5904e1b21cf48739cf2f1b1e3fe110,2024-11-21T02:50:26.667000 +CVE-2016-3643,0,1,64d594b40f4471bce24122c410e03de05c16fd2afcc242469ddc654c35bae787,2024-11-21T02:50:26.667000 CVE-2016-3644,0,0,2f773b2080e944e29a7225da4cf2b1e15544f83aaacfce580e0be10986def148,2024-11-21T02:50:26.800000 CVE-2016-3645,0,0,e6ec797e2c73b3d4d9d38cafe825c448b9919243611ff39d36902ebe02db13f1,2024-11-21T02:50:26.927000 CVE-2016-3646,0,0,218a224d61f25a41e628ededad2ee6951c5f8d9d725370ab342b10c8c7355e56,2024-11-21T02:50:27.047000 @@ -86984,11 +86984,11 @@ CVE-2016-3710,0,0,de10537e2b33e229fb40bd75b03eb52740c4bbc4938a69e5e46c380d1cee17 CVE-2016-3711,0,0,9790a921b61f09b1c3ecdc814ddae7e8bf09f655f643f0512f5328ca8e2691fe,2024-11-21T02:50:33.090000 CVE-2016-3712,0,0,6a7022fd9b0205ca1ccbbe7e43b24320fa24485e3875f0fc4d672702b3366210,2024-11-21T02:50:33.190000 CVE-2016-3713,0,0,d33c4cb9e1b43d2b8d52f56893351827f4bfafb64f39ea1e7696a8413bf2a14c,2024-11-21T02:50:33.313000 -CVE-2016-3714,0,0,79886f5fcccc638d5c37dead54b2f6e08ed93c30a7d5c9540dd57186a0ffe83b,2024-11-21T02:50:33.420000 -CVE-2016-3715,0,0,8e90f92ae8b5decda37ce38763bb055a4bb49101ce195f7fe7c6bb8e71032b1c,2024-11-21T02:50:33.670000 +CVE-2016-3714,0,1,c217dfd48415a835195778993b5dbd79d7f582e4a73a6ebb3d0f30240517f7af,2024-11-21T02:50:33.420000 +CVE-2016-3715,0,1,c02df6aae5e71ccb67b4fd39ea4477ad9d3934441fff3f5e6b52dc6195f4c3ed,2024-11-21T02:50:33.670000 CVE-2016-3716,0,0,f61b251f5875dca14e4c1eb77b0a6e92c1e277fd042d559a4e87be7fb1c6861f,2024-11-21T02:50:33.823000 CVE-2016-3717,0,0,f1e44b3d2ef462485a6b9f2d553269c3229028b52e3b8a4b92f442b963b343ab,2024-11-21T02:50:33.967000 -CVE-2016-3718,0,0,f8c0780d4fc8e8f1e0e410580159f1fef3969d334b7eb0b29f25ff2abfbad3f9,2024-11-21T02:50:34.107000 +CVE-2016-3718,0,1,7aca806484e725c26e3a15ad577d1ebafb3421de8360612c5018ab42bb5f9976,2024-11-21T02:50:34.107000 CVE-2016-3719,0,0,06298023ce26190463946472029ea0cb30a258e565da712e8d83d7855e5af9f0,2023-11-07T02:32:25.260000 CVE-2016-3720,0,0,134e5ebb136d9c02318eba80e6f2e060ebf4806dcf3d61b8128ab888c98c5353,2024-11-21T02:50:34.280000 CVE-2016-3721,0,0,4361fcaa0db0102e6eb6c0feb77ca63b9439ca949c16d2edf59f4f949f808530,2024-11-21T02:50:34.390000 @@ -87239,7 +87239,7 @@ CVE-2016-3972,0,0,142b5864b63bfc280b9196f5dc10503afea2cd42fdc57440f77dfb1cc02f80 CVE-2016-3973,0,0,64b61a4e20dfcc6c3ca1ba6b7b37a7cf1299a0185d89781ada0686a1dc724993,2024-11-21T02:51:03.727000 CVE-2016-3974,0,0,c34eaf17f1393560453bbf29c4145a745a6efb4dd9cd76f0f2476130f2bf1c7f,2024-11-21T02:51:03.880000 CVE-2016-3975,0,0,83aa673a7d7d02e9b9867fcdc1d69825fd51722f6c6ca0d8082474b374cc969a,2024-11-21T02:51:04.037000 -CVE-2016-3976,0,0,185bdda71b646f3bf99051235cfc913a9a09b289473e5ee8722c57410c412ed6,2024-11-21T02:51:04.187000 +CVE-2016-3976,0,1,3a60cb1a99a2f983405ba1707fd3407031aa9eece9b74271a423aea890a6458e,2024-11-21T02:51:04.187000 CVE-2016-3977,0,0,30f3cd031e35dcbff31cbff191ebde45d75518c8acbc78d2827f448275345ded,2024-11-21T02:51:04.350000 CVE-2016-3978,0,0,12d9a451bb9f3a35f8fee4c8b8f336e7e3c81c968d06ffa2e28fc8caa37e3896,2024-11-21T02:51:04.520000 CVE-2016-3979,0,0,76d258813b652f5ee36eb61ddb3e21ddd4346c3001992c892299908e0589135b,2024-11-21T02:51:04.670000 @@ -87369,7 +87369,7 @@ CVE-2016-4113,0,0,aee42e937048ad401b0bf28011a2c16c1e1482de4845f31579a5310f42a76a CVE-2016-4114,0,0,8a432b2e374b0800feb081f574a7d6d22147090edff6ea04e927a0bf95966b8c,2024-11-21T02:51:24.353000 CVE-2016-4115,0,0,c8614d3f2764d62264b825cdac885b6828638f3e48dbea9883e24453f08842c1,2024-11-21T02:51:24.483000 CVE-2016-4116,0,0,5eeaa33d2bca991eeb29801965da29d87468d5fc02a20cd316fe1538c10a0e3b,2024-11-21T02:51:24.597000 -CVE-2016-4117,0,0,2c3ad829e685311d289f16ca2259d5c81554d1633254e15a0747c61d97ff1962,2024-11-21T02:51:24.713000 +CVE-2016-4117,0,1,b8ae54eeb83a55343d6b1925c007c4ca535b7530008cca75d4927c4cf1d181b5,2024-11-21T02:51:24.713000 CVE-2016-4118,0,0,22a53398b2e803ea995706746eb29d3c59e525cb420800e40dd0459a0d0c9b03,2024-11-21T02:51:24.860000 CVE-2016-4119,0,0,51068c52eebfaa56efaaf1f30ce5bd3d341ed65f479447c89aa000f15a4a4495,2024-11-21T02:51:24.970000 CVE-2016-4120,0,0,bdacbe945ccf6a4c8f45fbd1cbdd05774c5fa0a0e5e18941695164e3630e8665,2024-11-21T02:51:25.080000 @@ -87423,7 +87423,7 @@ CVE-2016-4167,0,0,a986e88cdb8b0dfe577e3b85fd946d03acaf502108ef6ca3f5d58c26490e3f CVE-2016-4168,0,0,ba95041ae0562e96bbe921108ee98dabd10b5791e686349fc9e950c2a71b879b,2024-11-21T02:51:32.247000 CVE-2016-4169,0,0,3467042b210d44adbcd95667030c7d5be5ab7b12767a1009405d3ea8b4bf3c3d,2024-11-21T02:51:32.387000 CVE-2016-4170,0,0,eb9d2217f5f597ffe90889f63389b971411ec470ac61492975362dcddc06f736,2024-11-21T02:51:32.507000 -CVE-2016-4171,0,0,872a98c34d7a9a577198f732fc289619898b3afa7a51304db0e0a5096549806f,2024-11-21T02:51:32.637000 +CVE-2016-4171,0,1,812482b1094667a083c8478ac01baeeda61d6a656a258b4a2d925d1f5df6691a,2024-11-21T02:51:32.637000 CVE-2016-4172,0,0,d653d5feb21d86cfde269e706e5af2d21cedfb3d7fc60edc6d0fa2e90b28866c,2024-11-21T02:51:32.830000 CVE-2016-4173,0,0,03344291242f6e12504e926afbe9b54df9d558618ff0f9e61f5fc60d481d676f,2024-11-21T02:51:33.037000 CVE-2016-4174,0,0,eb1bb8eff59bae3347a871bd65ece68cb2eeddd03e18937b23b8a36a039e3260,2024-11-21T02:51:33.227000 @@ -87677,7 +87677,7 @@ CVE-2016-4433,0,0,d81af4d050501425d493077f4c3f988224895ea29faa807fa982f788a11f96 CVE-2016-4434,0,0,78b8f26d9d81a875ed7a6ec4edec7ecd92d12f3c8f65a3011206ac4c18cf0ffd,2024-11-21T02:52:10.617000 CVE-2016-4435,0,0,45254d83767a3fcf73f069e3a8610026958815464b73a72d5a6f4bb72a77aef9,2024-11-21T02:52:11.303000 CVE-2016-4436,0,0,74b0fcf41020bf3e6e28f116e50d64bf32fe6667f8bf65aa53ed26b826107d1b,2024-11-21T02:52:11.490000 -CVE-2016-4437,0,0,a4e7645d186a34771839328f89b8c3bac723e9cdf32e381353ae6ffab9b339eb,2024-11-21T02:52:11.663000 +CVE-2016-4437,0,1,cb70f10aea89abac805893620259b2487354f91b7a2e464359c1483915fc8615,2024-11-21T02:52:11.663000 CVE-2016-4438,0,0,572edfd13e63854eb7bfd29f186b87eaf0cde6cf688fdcf159fa05d02c35f85d,2024-11-21T02:52:11.850000 CVE-2016-4439,0,0,e0b2ffa85c916211e338a645d507ad27f8f8e5c8ebb0f2ecbfa6ffc817e869d4,2024-11-21T02:52:12.033000 CVE-2016-4440,0,0,baaae3ac6286c8adb64184d8c5f721cf64fa89dd250fbe7ba507ef77e352e458,2024-11-21T02:52:12.230000 @@ -87760,7 +87760,7 @@ CVE-2016-4519,0,0,c5b70b67666a961a00804327e40f3ac1c218a36fbf31a37786da9ea1bc01e2 CVE-2016-4520,0,0,2406e24abd34f637b10673f224bb644210fcab7420eb1d51c73a53ab9a51c0c5,2024-11-21T02:52:23.400000 CVE-2016-4521,0,0,89e83db1ab938a9e35786e70470ce5eb8f6651900996864d67458602d00dc929,2024-11-21T02:52:23.513000 CVE-2016-4522,0,0,c2e058d2d5e6bdcf8d345e7d61fe6080df60daa1accca7b33edf50985354bd96,2024-11-21T02:52:23.627000 -CVE-2016-4523,0,0,8b688776ad1d59a62e454e9bb888449c8e39d353071c140e90a3db3c6fbd9ef8,2024-11-21T02:52:23.737000 +CVE-2016-4523,0,1,bb8d5d1f9ed34033919bcb331cc201eb3e828be89cb5fc88c8b94003eca75ceb,2024-11-21T02:52:23.737000 CVE-2016-4524,0,0,e081aaab2695eea668ff43171cb10bdd554ba5b142cb107070098389777276ac,2024-11-21T02:52:23.873000 CVE-2016-4525,0,0,8af5b6d43f0aeb0096ca96002db5f1138ef1573038074ff94eea8117e26741b2,2024-11-21T02:52:24.450000 CVE-2016-4526,0,0,0a0f5ec0c3eb07585f38f677ba557bc11c43c3c5749b8c6b32655a871e9c3705,2024-11-21T02:52:24.560000 @@ -87888,9 +87888,9 @@ CVE-2016-4651,0,0,dca5547f743c2102d5c273c0cfc92f0004d345db9d49185b4aebc67c38f148 CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e998902,2024-11-21T02:52:42.207000 CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000 CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000 -CVE-2016-4655,0,0,7fc6b2fc61837ca31619905f2b7d10b2dc7a7732e4a6b6bff35dd44350624c1f,2024-11-21T02:52:42.610000 -CVE-2016-4656,0,0,660dfae77f03c3472ae3a4e539c376b4b623ff9ec0c74f9435a7730f16a4fbac,2024-11-21T02:52:42.787000 -CVE-2016-4657,0,0,6aaf55b24388e3841b961976c6adc50936f5f721483f9bc61077d91198854a39,2024-11-21T02:52:42.907000 +CVE-2016-4655,0,1,6e6aa3e349d6404f461bd6bccdb74ed9541983c977f11c30ffcb5854a6361dd4,2024-11-21T02:52:42.610000 +CVE-2016-4656,0,1,126d2b1c10bfab23f4c14b7121ba869da7833dd266e08171da23511016bd356f,2024-11-21T02:52:42.787000 +CVE-2016-4657,0,1,1e4d61765b827ae45dceabe3a935599eafb92bfca2b3e53931c4fb16bc1a6589,2024-11-21T02:52:42.907000 CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000 CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000 CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000 @@ -88397,10 +88397,10 @@ CVE-2016-5191,0,0,e832a2fb565762fab465e468041eda30d89e55480b8578c32f1baf2cfe1248 CVE-2016-5192,0,0,7757e47b18dd071c8f5f898dfe4dfaed0fb7a2163f8c74dc19911d16258132a3,2024-11-21T02:53:48.470000 CVE-2016-5193,0,0,2605ee92a09a71c4845c3613185e94857066a09aa717d01fe88e85d455273b3a,2024-11-21T02:53:48.593000 CVE-2016-5194,0,0,8185033d9012165cc31acb2382c5db14cc153b70b8e1ec74f008137fb7447233,2024-11-21T02:53:48.713000 -CVE-2016-5195,0,0,834b4de332f39ce0eed1dbb359bf2b1bc36eead4fac1ae71e2e89f81651751a7,2024-11-21T02:53:48.837000 +CVE-2016-5195,0,1,f0b4be49fa9770226199d784ceada460919bf058967572d0db80b3c88cf2c68a,2024-11-21T02:53:48.837000 CVE-2016-5196,0,0,85d60c53c34b34a94d1179275edd2dbc1908adaf314ce782eec74fdc214d2790,2024-11-21T02:53:49.200000 CVE-2016-5197,0,0,74734dde4ecc6b3409ed55059c42eca7f8eadfb7f8d2fce0bff152caf355fae2,2024-11-21T02:53:49.310000 -CVE-2016-5198,0,0,b1205f2c5cbd0d6b9c02737f1739c97a459f4b2b63abdacea85836f59b4d13fe,2024-11-21T02:53:49.443000 +CVE-2016-5198,0,1,0a4c677215f76c041fe93d04f27d4bf74c0cb7acdaa12b90aa6024776230ece4,2024-11-21T02:53:49.443000 CVE-2016-5199,0,0,af7b883c8a25a0fc5ef58d60a01c24f776d4e2af270560d9047cac249fd826e1,2024-11-21T02:53:49.563000 CVE-2016-5200,0,0,1d9761eb86b4904ddf3bd2084d1f12a47f7ac16df3c584bddaa4d78dfb4b4351,2024-11-21T02:53:49.680000 CVE-2016-5201,0,0,49d7d942f4c2bb57ec7aa33d38d6bb1a8c5b2ba43e61df8ba5cec080a29e6c6c,2024-11-21T02:53:49.790000 @@ -89302,7 +89302,7 @@ CVE-2016-6271,0,0,fb9e2823b04114eb3463ec2f5a4a08531dc5c73061d0ce790dbb6586a866e5 CVE-2016-6272,0,0,e4a1fa2c7c9e788352e316ed4b77b0f3c5cef7661742689140332c8062829200,2024-11-21T02:55:47.837000 CVE-2016-6273,0,0,3a81161d3c74bc3acc4220c1f65e5c70889acbe8fb25dc6fc68d3927b147e579,2024-11-21T02:55:47.983000 CVE-2016-6276,0,0,d7d7f0d164d74ca4e86848ec5f23d2db8a34395041b5c5ffe60bbd38c6b58d15,2024-11-21T02:55:48.153000 -CVE-2016-6277,0,0,8670ea44745405d6492a445f727a7fcde449208bd238c0a10b5903abfc0a0314,2024-11-21T02:55:48.300000 +CVE-2016-6277,0,1,35a5d1157c22ac536f884e43daa34d4e389d7f21fe2c4a9ba523a93c2f3d8a0b,2024-11-21T02:55:48.300000 CVE-2016-6283,0,0,2b447f7411e9fd0386680fe029af4f55603a1ed2bee0db846ac85fdcfb7e4d82,2024-11-21T02:55:48.477000 CVE-2016-6285,0,0,d87b51a57660e83d6faf187e398defa0987895ccb6626d56ec595386f539e13d,2024-11-21T02:55:48.630000 CVE-2016-6286,0,0,e483bf726c7299ab7f52ebced31e9c6f64e72d0455b5fcdafd133a5a80e0c96c,2024-11-21T02:55:48.780000 @@ -89385,8 +89385,8 @@ CVE-2016-6362,0,0,acf8484126a2b429d8f634e9683ed1a7d4499d370d812815bb880abe6e9020 CVE-2016-6363,0,0,5ada98b42617fafa5cc7c74ee303747d45590b4df04acf60bb1342ba1778ea0d,2024-11-21T02:55:59 CVE-2016-6364,0,0,b3a55b2da97f460069e58eca2e0f996b83346daf9c06f4b97b4112e09737c782,2024-11-21T02:55:59.110000 CVE-2016-6365,0,0,6aa8b3f474f359fa370ec0a4f768115994f9709d5ec548bb002514f9b3e620e1,2024-11-26T16:09:02.407000 -CVE-2016-6366,0,0,017eaa8e13b5c9d30d3a5bea1e10aaa3d28b327e104c640fdf22466e3ebd2155,2024-11-21T02:55:59.330000 -CVE-2016-6367,0,0,259aa3bacd0c8178cf7f5da0ddd136338fd3f558246415b661d308b8fca291dd,2024-11-21T02:55:59.507000 +CVE-2016-6366,0,1,c15b398ed378d4d051ea09e89143a7d6f2a7cdaef4e976d3156437868cf6a7eb,2024-11-21T02:55:59.330000 +CVE-2016-6367,0,1,6bfe2a5874a5f4aa5667e143fe4117622727294cfb097ff164c0e4c4bedf4305,2024-11-21T02:55:59.507000 CVE-2016-6368,0,0,f442902792b633368f9577d020d6d8707f89e814488ceabe3d48441b7e281ae6,2024-11-26T16:09:02.407000 CVE-2016-6369,0,0,93268cabc36fabec6220bc7478470f676cd847a49202e7777c507fe735c6e6af,2024-11-21T02:55:59.783000 CVE-2016-6370,0,0,2910ca88a7055c71390cdd29376b29f022e5517d3357cadaeafd6c546b118a86,2024-11-21T02:55:59.903000 @@ -89433,7 +89433,7 @@ CVE-2016-6411,0,0,678d73e5e30146e83090fc5ea2a0b83cda82bc1303d52310f32d8e19eafa47 CVE-2016-6412,0,0,94d6a84e996244e668d9885de48521550461644de073ddab0b550d6b6bf52df8,2024-11-21T02:56:04.863000 CVE-2016-6413,0,0,81ad53df830946b115f79cfded917733e7c8bf16d746492628c56d8557a0248c,2024-11-21T02:56:04.973000 CVE-2016-6414,0,0,272ab62386e9b16949434043d30046a778e298e177d7faaa992b227d71eb18ac,2024-11-21T02:56:05.077000 -CVE-2016-6415,0,0,fecf8ed5ac69a1449ceaaeb9f18c29c2e5995db4bdaa9d093662da4cb8df9863,2024-11-21T02:56:05.187000 +CVE-2016-6415,0,1,6c9833cb2815560990e054095421e0f82279ef5a85eeb3215cf88561899cc4af,2024-11-21T02:56:05.187000 CVE-2016-6416,0,0,2637e97e7cf6439cafea132214e7faac92866e77b8c675ddfdd001a5ed46afc8,2024-11-21T02:56:05.307000 CVE-2016-6417,0,0,43ee75f6e1b5dd48dd03cfe1d989ead9f0df6ff693ee74f5e8448f431b4daa9b,2024-11-21T02:56:05.433000 CVE-2016-6418,0,0,907589833ec7c018495139a7c8186e22de3f5cb887f3c27c4f4e9556aa246776,2024-11-21T02:56:05.557000 @@ -90774,7 +90774,7 @@ CVE-2016-7851,0,0,86a1347ae7bb0a1ecdce6abec0a0b19406aefb57b15e1c1710946de3dc3084 CVE-2016-7852,0,0,697c546ef6d65628b909db5d7c5cefb3415f50f0fa5c28e53f65bf67dc1c79e8,2024-11-21T02:58:35.403000 CVE-2016-7853,0,0,7e03226e4a8e0223cb8826621520d31e1d1d7330f08c4aaa60a81fc7f5e4573a,2024-11-21T02:58:35.510000 CVE-2016-7854,0,0,ab6a83894af15a8a9eaba7ca273e6894aaff6cec4c08ae12e7d7025775bd3a5d,2024-11-21T02:58:35.623000 -CVE-2016-7855,0,0,e7db2f19e12255ede27c06f3dbf99443a3e9ccd4a596704b02f99e967b98812a,2024-11-21T02:58:35.730000 +CVE-2016-7855,0,1,7bddcf0452f3b28a95d53ba2c31249491a3e0ec300c67f17f3ce413032c5488d,2024-11-21T02:58:35.730000 CVE-2016-7856,0,0,92408a4d7d23cde010da1748f0a20b75829bbd128fe77bd7d3e825691fc4f417,2024-11-21T02:58:35.860000 CVE-2016-7857,0,0,b48e0b945f4284d47b58869d43c00c55bb6a99b218da32ffc5f1000049bb8c82,2024-11-21T02:58:35.970000 CVE-2016-7858,0,0,3aec9b24904c5bbd416d0b5d04aba541c207f4067c3e4cf561a8996aba73423e,2024-11-21T02:58:36.090000 @@ -90811,7 +90811,7 @@ CVE-2016-7888,0,0,9b65ba33af06748772e47518716d265123a2b4e6198aa54b12c94ca9279f30 CVE-2016-7889,0,0,7e3f5aef7817a8ff0a8ce3ced701caed366424032d0ffda5799a7597dfd1ab88,2024-11-21T02:58:39.830000 CVE-2016-7890,0,0,9fdaa1f263b5c0923800d292a524d020dcd1eee80d8fc85cdecdc474f1b20508,2024-11-21T02:58:39.933000 CVE-2016-7891,0,0,76b5e57a211058943d5a878e01b6d009f1911d48ddde84b875d83b4b56fe9a61,2024-11-21T02:58:40.060000 -CVE-2016-7892,0,0,a71ef57dc6f63d54f74600ca18048517f8193af53576b031af77ae917f61e94f,2024-11-21T02:58:40.177000 +CVE-2016-7892,0,1,26f3d6f59cc123364fb289a36765814ce50e33d1aa26c9ef45fc74093b675285,2024-11-21T02:58:40.177000 CVE-2016-7893,0,0,68c172adaa96c29e27a95b900cfe332a55590be779e170a8d148e65071cf27d0,2023-11-07T02:35:14.113000 CVE-2016-7894,0,0,959b04cf70685680096701a392525fe8be7296711e7bf63a368c2c211fb382c8,2023-11-07T02:35:14.403000 CVE-2016-7895,0,0,daf13de1b334ac8d6974c5d7b9dfad665d5d57e8457b0c33a90349a64698e5bd,2023-11-07T02:35:14.637000 @@ -91465,7 +91465,7 @@ CVE-2016-8558,0,0,c0386e67518591e3cc2af7b4e2644d52b0f07098ed11c5d85dcd7bc9d8b40b CVE-2016-8559,0,0,302640d7237672fdce48df4dbcfae041b69efa0b75a03e3c6fd724e8991cf771,2023-11-07T02:36:22.373000 CVE-2016-8560,0,0,76e294367d379b6f33f382fa9feedfb41186243e74cebc434f3478f779d94846,2023-11-07T02:36:22.633000 CVE-2016-8561,0,0,bcc9107bb0e8d33b2edd106ef446db1539c633abe6e75163866a87ac38fae717,2024-11-21T02:59:34.320000 -CVE-2016-8562,0,0,1011c266b286b39e6dcfdb3a8c0b417de883ef9ada6420df6baaa13990dd0406,2024-11-21T02:59:34.477000 +CVE-2016-8562,0,1,beca7c3623ada9b4fc9419ede7680e2766301c697d01e35492a2df0d48c956c5,2024-11-21T02:59:34.477000 CVE-2016-8563,0,0,bcb2a691dad8b142a25f27044e30ffa2ddce1a802dede969aa7b53206d4f44a1,2024-11-21T02:59:34.637000 CVE-2016-8564,0,0,37d2f1cf24fcbe065a227ca28ad4821fce1c455d794a2df322f0218638e5443d,2024-11-21T02:59:34.790000 CVE-2016-8565,0,0,b5746d20172238cb67312cceca7e695c637cd309a89955bcfd20945cb696a0cc,2024-11-21T02:59:34.933000 @@ -91629,7 +91629,7 @@ CVE-2016-8731,0,0,4b5a4b7270b1d783a5182f53c74c9402e3fee3b65002227693aa108d7368ea CVE-2016-8732,0,0,b8f44a391aeaa0c559fc9e1fc16b5bb91c9dcfcfc5784757bd230430783be38a,2024-11-21T02:59:56.797000 CVE-2016-8733,0,0,2397012de3e99c7803ae7e8415e5a5b21fdd6f131a449c3bd48b294aaf6ce6c7,2024-11-21T02:59:56.923000 CVE-2016-8734,0,0,ed71876a8c1141fe2ad4f00528e5a90d9a1ca49f900f7f26049d837fc30b90ff,2024-11-21T02:59:57.043000 -CVE-2016-8735,0,0,5774fca9d5fe41b459fdd387c90d1d6a51bb3ebd7d3968e0200d3a70e11c1700,2024-11-21T02:59:57.203000 +CVE-2016-8735,0,1,5d12812fc2a273546c9661a83c4ae17284b58a0f8f3df28734b3efb2db14805c,2024-11-21T02:59:57.203000 CVE-2016-8736,0,0,8508cb191ea8aac7ef32cafe60f49f42b9fe66a81b63a0000a07c40edbe4c449,2024-11-21T02:59:57.493000 CVE-2016-8737,0,0,838a4926c9ee6d5b0ab6534bb50616c0210ca354b7d128775929b291c5488ef2,2024-11-21T02:59:57.613000 CVE-2016-8738,0,0,34e4ba0edc5d9094557f9a9c1975b2df3518f83d63a94ab128fc973786393e7f,2024-11-21T02:59:57.737000 @@ -91922,7 +91922,7 @@ CVE-2016-9075,0,0,168f1c59c885f3885bb78fd2b76cf056cff6d12f8c804371db620091355e2b CVE-2016-9076,0,0,81bbcea1c54a439550d043d9e9fa4d0db28232566098ae3cdeaaf4db56235e73,2024-11-21T03:00:33.260000 CVE-2016-9077,0,0,02a16089e3da372270da5309cecf93add178d7b2e43b375026d8852cfe1593f9,2024-11-21T03:00:33.387000 CVE-2016-9078,0,0,2e87a808a06254d0cd5ec71afbdd41530d9c2fa2edf716222104b75bdcd90004,2024-11-21T03:00:33.517000 -CVE-2016-9079,0,0,c118ea3b5df687ba9f31998c690b057ad8ad9ec3f5d7d4ffd3e93211b56f1dd9,2024-11-21T03:00:33.650000 +CVE-2016-9079,0,1,19af617c64b850787711c28753ac56eb3eae0fa4d7b9f25f99c432669d153b58,2024-11-21T03:00:33.650000 CVE-2016-9080,0,0,dab65143378c210db67d67980bc24a5da53bc6ff28cc71a502428feaa8aff1e8,2024-11-21T03:00:33.793000 CVE-2016-9081,0,0,1968c82cedc463cab8a62fdf2904c701596c0f127bdb89eb362b56688164aaad,2024-11-21T03:00:33.920000 CVE-2016-9082,0,0,f5ef5ef3bda293aebce5b8fd342446d7b79745a97ec244d34e773ee897aa14e9,2024-11-21T03:00:34.097000 @@ -92373,7 +92373,7 @@ CVE-2016-9559,0,0,a7010547834d6ab30c7d8e179dd4fc1bdb8062961ec59c4ce741de5c84f18c CVE-2016-9560,0,0,70ea191d47d67aa9c6f668c100aba81b0c194b2ce52d54543d7f15c56e6dc872,2024-11-21T03:01:23.267000 CVE-2016-9561,0,0,c6f906457f134eb3041741d487234df29a89489bb28e2c41f32992592b5261d7,2024-11-21T03:01:23.433000 CVE-2016-9562,0,0,8477dd83c38c3fce3133e193ed40faf3b8ea0ba8837245435eb8a192b9e39d87,2024-11-21T03:01:23.573000 -CVE-2016-9563,0,0,298f9c84b7886275f83d6a6da2601bf1d14a2752521219784f0fbe02a4a1e015,2024-11-21T03:01:23.717000 +CVE-2016-9563,0,1,9e5aa81e9fc720a3cdd13f1568e988b9d163aec27597af528d394e411f1e2498,2024-11-21T03:01:23.717000 CVE-2016-9564,0,0,7c5a3b98746ae2912d3f71ecb03a505b1d39e78900f0c6cd56ad002ed7848af1,2024-11-21T03:01:23.863000 CVE-2016-9565,0,0,30154a1e8cbf62a9fecd7ce051fa021dc460efcf0686ade50a90d3d8c71b7c6c,2024-11-21T03:01:24.010000 CVE-2016-9566,0,0,2d2e78a44f5f22d9375593f6cdb7acac673dfb9c3c3b7ecbb9a2b73237afb179,2024-11-21T03:01:24.177000 @@ -93931,7 +93931,7 @@ CVE-2017-1000249,0,0,5b47202649970b4d104c32d59f6abfb5d00ef5c2ca09798380eac9b5362 CVE-2017-1000250,0,0,8bb4232dafaa040eca8fec01d4c23ccee1fac5170421b029c433043673b8fd2d,2024-11-21T03:04:29.377000 CVE-2017-1000251,0,0,9ffa49f7933009f67fd2422855ab5bf0d15f987bf0ea6ae8a18f3016bfa9ea19,2024-11-21T03:04:29.930000 CVE-2017-1000252,0,0,4704e86abe7df636329d9f7ad88685886a16efb803f21ef49277ad9776a3b129,2024-11-21T03:04:30.143000 -CVE-2017-1000253,0,0,0e4b4d18a95f412961db84f6be2ec000bcd4a5749a8e0495aa3b236f9d81b8cf,2024-11-21T03:04:30.343000 +CVE-2017-1000253,0,1,29e72dc2fe70862bdf9f51a886985d9649ff47a5d2bb4e9a86f3bc24876d7768,2024-11-21T03:04:30.343000 CVE-2017-1000254,0,0,9ce1b9baee6715e8de6487084a5404ac4ffeaa192d79f353901fb7b03d9ceea3,2024-11-21T03:04:30.613000 CVE-2017-1000255,0,0,cf2216d770919876ac48fa698d7e5c7a6add24071c95600719cfafa21ab3330c,2024-11-21T03:04:30.800000 CVE-2017-1000256,0,0,edb4ed6e0b28e097db5d30255c733782211e9bb5f77e53195c2e3265b341e7d7,2024-11-21T03:04:30.953000 @@ -94071,7 +94071,7 @@ CVE-2017-1000482,0,0,f56be1a1c490db8d7470b6562288751e5bc0dd569231a1a8d892f0d500f CVE-2017-1000483,0,0,4e8157222e73fa2cdd841e8be2a43b2be2d8ca049382b26da848dbaa8322d416,2024-11-21T03:04:50.133000 CVE-2017-1000484,0,0,089607fe827c8679474ac0e4c2290a7e0bb1cf131223536fde7739934ad59470,2024-11-21T03:04:50.290000 CVE-2017-1000485,0,0,f697c00177fb17803f06afda7928b9b4707bed01c6c6e6333631b5d3f7b9705c,2024-11-21T03:04:50.443000 -CVE-2017-1000486,0,0,171e7ff1f70e4a79b6ef2d170eab9466c93053ce8447986bfc6e9fa4903c589a,2024-11-21T03:04:50.587000 +CVE-2017-1000486,0,1,4629168b83813ce81600f95a1999344d9c2e95dad50725b660be62503a4f5e2e,2024-11-21T03:04:50.587000 CVE-2017-1000487,0,0,af5ca6c396c74c5b1b3cbe9848ebae920297fa2d550ce5ce3524b1c656a09eac,2024-11-21T03:04:50.743000 CVE-2017-1000488,0,0,15dcc2dad5b26e7d6dc3f6675e2eb3384b71af76179fb3e95470c04c8ff40a8d,2024-11-21T03:04:50.917000 CVE-2017-1000489,0,0,d27b3871cbb594c60e390aba9c0dda9aab7f2a1382b6059bea547f257b2d6efe,2024-11-21T03:04:51.063000 @@ -94429,7 +94429,7 @@ CVE-2017-10268,0,0,2fd5a1eba64da42734fa123762b9bdbc48dafe91212c8b13796188a23db53 CVE-2017-10269,0,0,99a602881bab7d0a9c272d62e9be296209d4d681131d96516b1eec020fb0a691,2024-11-21T03:05:47.420000 CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000 CVE-2017-10270,0,0,314dbf27c930f7b4944cd4faf568f51090481b6e725424179383d35be21c1e30,2024-11-21T03:05:47.560000 -CVE-2017-10271,0,0,152df0d1a9231acb2d1916e2b8a6e550261aa3469e21c39527fc331457341bcc,2024-11-21T03:05:47.717000 +CVE-2017-10271,0,1,14922a22b3e13ba9a751ea1222fa30df24e11e2f5f03c317ff596ab737c3753b,2024-11-21T03:05:47.717000 CVE-2017-10272,0,0,a8ae74e9650948ede1f5ebe3ddebb7fd281d93476bc1061c2a2e80feb18d65ca,2024-11-21T03:05:47.970000 CVE-2017-10273,0,0,3125f38a9aaff799139d27e2e5503e4ec327e522e3537b85981648fd4e32ca16,2024-11-21T03:05:48.103000 CVE-2017-10274,0,0,79cd866f1671fcd1359498782f0a43047229bb288cc35d6385182e3e883df299,2024-11-21T03:05:48.267000 @@ -94900,9 +94900,9 @@ CVE-2017-10926,0,0,f62c5a7bdd10387979ec23b93f0720e14bc87e33ea4363d285692a17ebe09 CVE-2017-10928,0,0,54d44869550359987fb5845e6b9096f8e4145f6a6d3ec2636a22741caa760108,2024-11-21T03:06:46.333000 CVE-2017-10929,0,0,47adc303ddf736b0af14aff87fd4fdd70a41c76803e80b583b5f66671524b015,2024-11-21T03:06:46.487000 CVE-2017-1093,0,0,9a328a371d3aa43cf6e4a54b97d016716cb76fc946e11851d2774b8cd54d53f3,2024-11-21T03:21:19.047000 -CVE-2017-10930,0,0,12f9a0bf578eb2bceb30841aff1861394985ce77dc5b792be33b0075248c92be,2024-11-21T03:06:46.643000 -CVE-2017-10931,0,0,f0c3ac9cef55372e0fb424c29de1770953e07eb8ef1bf369080323184158efcb,2024-11-21T03:06:46.763000 -CVE-2017-10932,0,0,da2e45a1c40abe7d4d41b0e4da655c30996f5076401d2cf15cb0a2755d44d23b,2024-11-21T03:06:46.880000 +CVE-2017-10930,0,1,7a1cb740642d404fee6ad2260c42310f99421408f8e86be0031e4a10ab0f336b,2024-11-21T03:06:46.643000 +CVE-2017-10931,0,1,4318def251c766a9235bf7031f0ce61a8bcd832ea3c7c0ac7f4ded115d482c53,2024-11-21T03:06:46.763000 +CVE-2017-10932,0,1,cda7235ce020d99428aedea6d77e02b7f0397b36307a25d78e7137b8b673ab7e,2024-11-21T03:06:46.880000 CVE-2017-10933,0,0,cf1481e7f399080dd76d32fedb30445c891211da6cb262d719bc996d1f2f5268,2024-11-21T03:06:47.010000 CVE-2017-10934,0,0,c87b419ee217d74264bc741931ad0293dfc1764a3f33086a94424f52d0d4d046,2024-11-21T03:06:47.140000 CVE-2017-10935,0,0,64594bbf331ebd26bfc841593635b6bbab0781bac59e517b90f5378544be5704,2024-11-21T03:06:47.253000 @@ -95256,7 +95256,7 @@ CVE-2017-11289,0,0,58b50957cf22eeda2c4698b8ebfd5bab8f179a9b55959c12cf24584a1da06 CVE-2017-1129,0,0,a71a7869199c6b7ed73da515391e24be3da82065d01b9f64b672df118f3af35a,2024-11-21T03:21:22.620000 CVE-2017-11290,0,0,cdcf62ee6b4195e49799b32d7c99299820e14ca3ee61c40198a0606f1949585d,2024-11-21T03:07:29.340000 CVE-2017-11291,0,0,6781b188c03b45b2dda0f177772a3934fc322dbeb5b78b64e35bdb45cd3d64cd,2024-11-21T03:07:29.463000 -CVE-2017-11292,0,0,38f9c9dff6ad0c6efe6e4c6619d0b5e2e6ebbb3dd90d1302f9f93e693c462a69,2024-11-21T03:07:29.570000 +CVE-2017-11292,0,1,079d2ef25a3f83e0c9ff1c0811542875bccaa36bf1b1452b3e5aa3d65c14886f,2024-11-21T03:07:29.570000 CVE-2017-11293,0,0,53dd3e9f282ccbd8d91cca4f5a9e095aad46da5cfb69a30d9c870f1b9e44410c,2024-11-21T03:07:29.700000 CVE-2017-11294,0,0,d182854f0c2d3c03fc67237f010ff2da62e750c4d7ab44d9c899804055ad5af6,2024-11-21T03:07:29.817000 CVE-2017-11295,0,0,7a2d1d843aa9b055db351721e871c91a80fd1e82aa984e34460830bdd4131f8b,2024-11-21T03:07:29.943000 @@ -95278,7 +95278,7 @@ CVE-2017-11309,0,0,c2edf2ff7344d89eb36f622e8fb5c1da58b55c2171edb8c169d42447491cf CVE-2017-1131,0,0,f2b707159e82dd0de4a6314b3ef9267562ce54b2ca57a4112766b8bbfbd45d06,2024-11-21T03:21:22.860000 CVE-2017-11310,0,0,0f448ff9a320ae44fcbbaf79b254ebcc5c1f7c51b2eddf80d83808129e18cfcc,2024-11-21T03:07:32.190000 CVE-2017-11311,0,0,9500cdf51a9f4ff9a5fcd2114b58aa7161bc921604014d187d42757e895b66fc,2024-11-21T03:07:32.333000 -CVE-2017-11317,0,0,95f3808f2c33194358cdc212de6550b3431db9c03ca28eac2682040fe53ecbdd,2024-11-21T03:07:32.483000 +CVE-2017-11317,0,1,6139fb9f794c2cc00b746d8d17c7df9cca1b758d1bdefd33abd9d1a2223c21a0,2024-11-21T03:07:32.483000 CVE-2017-11318,0,0,eb828cbbd27e15bc4475079f99c54e4af9154622d6798bbdc8309aebe71d3cc8,2024-11-21T03:07:32.637000 CVE-2017-11319,0,0,7dad93003dffd2784582e840125e5b30ba3db406bb237df187a50ff1d9fdf9dd,2024-11-21T03:07:32.780000 CVE-2017-1132,0,0,bef1b3e2a9a18e50647c4cb68345e0869be8a5ce65cda6ca83270a5ecfe1b843,2024-11-21T03:21:22.973000 @@ -95321,7 +95321,7 @@ CVE-2017-11353,0,0,c98fd333fa34298904b66bf815a6e677e94374c5184b12346b6cf8a4eeb07 CVE-2017-11354,0,0,2eae7b253997e32a1e53123cb2835317018fdf11088b6f33797b24024646329b,2024-11-21T03:07:38.073000 CVE-2017-11355,0,0,502dcc3ca0c1eda9d510caadaca00dc71092c38f6daddbc04bab12031dd2ae00,2024-11-21T03:07:38.210000 CVE-2017-11356,0,0,ba3332747d18cc5e5ecfa81c9cd80b30cb9d934362625b01ab54173194882d83,2024-11-21T03:07:38.353000 -CVE-2017-11357,0,0,c24b8aa6f1f0baf135f1c8bfb03c2aa5e4338aea9e97da4ae5de1bee1b6a6394,2024-11-21T03:07:38.507000 +CVE-2017-11357,0,1,bb17b1d958d6117ab31604dc9d315772d48d6cbaf4f1b06bd6641e68140acdf2,2024-11-21T03:07:38.507000 CVE-2017-11358,0,0,e64c3f19208238b9c844958fe379f48ab4831c685a85d6d2d50d45afb204f0a3,2024-11-21T03:07:38.653000 CVE-2017-11359,0,0,025c8130065981d037046d035f301ad8b43a5229cf96b59489e9333fbc92065d,2024-11-21T03:07:38.823000 CVE-2017-11360,0,0,c624252a10f37f6abf7bf093decd41b3e5d56cc5200e72eba5cde6095d7437f7,2024-11-21T03:07:38.970000 @@ -95945,7 +95945,7 @@ CVE-2017-12144,0,0,c5b9588793956a2147e0ffe6a0a8ea4044bdbc460981fa91a393837b5667a CVE-2017-12145,0,0,f6a628c2da158e01f2bd77047cabe907d22b412b56697c26a6a70ed3add26eac,2024-11-21T03:08:55.653000 CVE-2017-12146,0,0,64a79706ee2c8f72ac2fa403a3a37e2a64b996372ffde19ee16afea92b1f5425,2024-11-21T03:08:55.787000 CVE-2017-12148,0,0,1a1262ec79e3b069ae03d2b5af93248fb69a31a3840409bd1f8c8fdfea443f3b,2024-11-21T03:08:55.947000 -CVE-2017-12149,0,0,ad53f78403def20ce1a5308f4801f550a250937ca29abc76c7bd2593fd31d4c7,2024-11-21T03:08:56.070000 +CVE-2017-12149,0,1,2344fb981b14e958f056d2b21f759fb905d6638e4e136a219d99193ac7fa37e9,2024-11-21T03:08:56.070000 CVE-2017-12150,0,0,6ebd77c4fb4f62bdfba4689b6d5d24e668fd3f79a1f423844567f9af316b16d5,2024-11-21T03:08:56.200000 CVE-2017-12151,0,0,e7ec109e39d5943758f1e76f429b6a87e21f784ab8b7a2059b50534825d3cbb1,2024-11-21T03:08:56.363000 CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000 @@ -96022,17 +96022,17 @@ CVE-2017-12228,0,0,f9624688d5aa4312cdc1777ef04e8201c0e398d4cf5b0bc538a48355e07b5 CVE-2017-12229,0,0,da5a1847c0f373517ab565406a2fe43518cf697806774848b0000b60d806f0f9,2024-11-21T03:09:04.917000 CVE-2017-1223,0,0,5b8b0a6cbbf48148ada2d0dc2e20aaa67822d19e60059050ac95bc1af1f52ce1,2024-11-21T03:21:32.020000 CVE-2017-12230,0,0,ab463fdfbe072524d220736b22158e9817ed47b9b9c837eb44ec7a6d640459d5,2024-11-21T03:09:05.040000 -CVE-2017-12231,0,0,8ccdc9f9ee2b59a0d13823136e7680ace5cab3d022c2981d87e3d28d748c9889,2024-11-21T03:09:05.157000 -CVE-2017-12232,0,0,2ffba4dbed08b42bdccd7c6882a93e29732297f0275211a430ccab604c70ef08,2024-11-21T03:09:05.340000 -CVE-2017-12233,0,0,22fd4348622728b0a4acb354d6a6ac478f72c78d83b213d61f713b6a1d109bed,2024-11-21T03:09:05.490000 -CVE-2017-12234,0,0,d0edd2d3714ea9808d28f94126e48c6832b66dd511e5cf3296f1f14c17ce4c4c,2024-11-21T03:09:05.637000 -CVE-2017-12235,0,0,6a94af980a030b0e213d896c46c4e1ca601472ec13219cd8313ebf7a7e1f8747,2024-11-21T03:09:05.773000 +CVE-2017-12231,0,1,7adc7f9c0125ab9db43d89154bc9247c5baf15cce71e123c17914f29913432e5,2024-11-21T03:09:05.157000 +CVE-2017-12232,0,1,e7554251efe05fc0d834d7a8d06d4b4e167a2c31ff340a71d7230ebe60dfa64d,2024-11-21T03:09:05.340000 +CVE-2017-12233,0,1,a8c014700a15a4a7e01973133120194a6b5d483505a1144d9d23f98e0af69437,2024-11-21T03:09:05.490000 +CVE-2017-12234,0,1,4b52b8efe2a8dd5eada9f0d4064967edc110f5260008cef23bd5139634be8c99,2024-11-21T03:09:05.637000 +CVE-2017-12235,0,1,5323ce9771d849e2cf20c3c011e55c5092706b63d2f7878b83effc76e2ca7170,2024-11-21T03:09:05.773000 CVE-2017-12236,0,0,e640642761e1a7cd2c85d861a9ae7df51fa9d7495cc6c2e07c04b9f2bce248a9,2024-11-21T03:09:05.913000 -CVE-2017-12237,0,0,4e150e571e2bce5c7cebe40968381b1ee2f6cc13b7fec9a04b48eb14a49611b3,2024-11-21T03:09:06.030000 -CVE-2017-12238,0,0,e0f0f3087e08efc5661a6ed90ea0bf502d6b52dd435fefb9e0441ab350020ca5,2024-11-21T03:09:06.197000 +CVE-2017-12237,0,1,7bb1ad7bea1d01b6a7de323b2dc788cf57574e6a9f1b6a6caad32a2769b68478,2024-11-21T03:09:06.030000 +CVE-2017-12238,0,1,788ac287e907cca6c520b479a4679e699328e7534cbd910786981b7362daf531,2024-11-21T03:09:06.197000 CVE-2017-12239,0,0,2603e8aa5928db5a2011fbecb4f02a5a346bd317dc1734094ed17fad799f2e26,2024-11-21T03:09:06.343000 CVE-2017-1224,0,0,cbbfb0bfc94cc05aa78e395544e25f4eaddb387bd1a2f4323093288a6374d3ef,2024-11-21T03:21:32.140000 -CVE-2017-12240,0,0,d8c03fc302699e366a74795d639c9ca483df3636dbb361fc765d614080ff36b8,2024-11-21T03:09:06.497000 +CVE-2017-12240,0,1,96045c2a94bb36bcd64db3502143f0f244b5b6417ea744de7f2fcada61284b18,2024-11-21T03:09:06.497000 CVE-2017-12243,0,0,af1edd7e749df31c1adab0ac4d928287e44eedce3f67660905b254d40abea6c0,2024-11-21T03:09:06.650000 CVE-2017-12244,0,0,e2d4c1e8094e2a991cc4daaa5afbf7e3d3478bbeb20cf72b0d396c7e4066278e,2024-11-26T16:09:02.407000 CVE-2017-12245,0,0,b6d508b2455704cffb67b6aaad65c89a13e1506df885630c4efce287fec97bb1,2024-11-26T16:09:02.407000 @@ -96115,7 +96115,7 @@ CVE-2017-12315,0,0,d752f6fb5f855faca1500bfaa8145a40d49e1a9c6d336fe587b1333e9fcb6 CVE-2017-12316,0,0,c05f614a68c6a16f3f53d035aba43dafa7ec33146fe8fdafccc55383e4e8ffe0,2024-11-21T03:09:17.860000 CVE-2017-12317,0,0,510e7853ee769cc72202781269f56037a0f7d8817f5440fab6e1dfd240d266e3,2024-11-21T03:09:17.973000 CVE-2017-12318,0,0,ad497bbb73298255a66daac93762b25e1029d905d65d944fe44e05632f81206a,2024-11-21T03:09:18.083000 -CVE-2017-12319,0,0,30d166e2a5e99a2776fb70ab4d6546016872c2c93b3278b4eb30f6abea721261,2024-11-21T03:09:18.213000 +CVE-2017-12319,0,1,7bd6ff61dacb5c80bbd94a24f1364a7935e452b22dd11487a87ae17891c643c8,2024-11-21T03:09:18.213000 CVE-2017-1232,0,0,d0693b386e90319e44092bea25b1b0057a2ff8726fc9219e53ccb88aeae8bacb,2024-11-21T03:21:33.113000 CVE-2017-12320,0,0,bb1cf1b889406a629ed092aa6422f674d0a1867ac810998564b41b30f47dd350,2024-11-21T03:09:18.363000 CVE-2017-12321,0,0,5a7b1c5b59e4b2adc65730ca2b670d305c676e9466774db28644bc091f38284b,2024-11-21T03:09:18.483000 @@ -96385,9 +96385,9 @@ CVE-2017-12611,0,0,fa9088c3e73b7f18448725388554759a19c6431a8f3cb38f800be66ff5893 CVE-2017-12612,0,0,90eadeea019a6c525e609469c1a17096bb8406fdc277880e280a490a73d85bcb,2024-11-21T03:09:53.567000 CVE-2017-12613,0,0,123f5c3aabd1b1e5dd1f6c958738a91b706cdef18a786ed1ccafd8ca98c730a9,2024-11-21T03:09:53.687000 CVE-2017-12614,0,0,7d44afc3628a197eb4286e6df8f5215280f489d35961ac6e02d3e2259b7dcc28,2024-11-21T03:09:53.860000 -CVE-2017-12615,0,0,c9a08ec198f7820bec21afb87f9abff76c744bec6366d73436f018f3710454e1,2024-11-21T03:09:53.973000 +CVE-2017-12615,0,1,eb406a952b5f3e48c97350e8d400e23c2a3a8c8b217743f0a53879f544ef19b2,2024-11-21T03:09:53.973000 CVE-2017-12616,0,0,44364ba13878fc3af02f2dae155b7c22e55470b84618749d06de79673cfab0e0,2024-11-21T03:09:54.137000 -CVE-2017-12617,0,0,83d790eb4a58b619ca25bc069568fdd656eb366eff9038354a7c8fe2b57eb546,2024-11-21T03:09:54.273000 +CVE-2017-12617,0,1,c2bb32e04a8948856f556f9369a13dd2716b509ec3f8980b1772b718760aa6e0,2024-11-21T03:09:54.273000 CVE-2017-12618,0,0,9ae0cbe580a0f4abeac13276fdd0ef745d642c56b6cb3dcbf88e674b511b41c5,2024-11-21T03:09:54.510000 CVE-2017-12619,0,0,273d42b034c0e0a623c3ef600de4fcfd117433ae835e910c00fc823cdc30d20d,2024-11-21T03:09:54.647000 CVE-2017-1262,0,0,6246430dc38db343b951b613b755bb4c855bf167ba7b871ae460110d74da7fdd,2024-11-21T03:21:36 @@ -99341,7 +99341,7 @@ CVE-2017-15940,0,0,2ba471ce6b80c8d7dc1738647645b4e3d63e749cd9166fba211b1319e3458 CVE-2017-15941,0,0,628dc0ba63485654200162c82abc607f2918671b79b3c5ec79ec42ca3b150314,2024-11-21T03:15:29.937000 CVE-2017-15942,0,0,e79d4cd885593a2aa3fc9e1458e44b230a3ba6457595d8d9f10861012c729076,2024-11-21T03:15:30.087000 CVE-2017-15943,0,0,f509d03117b62f51012b0f0fb9f419235d979fa7609a281c20ecb79f2bcaa17f,2024-11-21T03:15:30.253000 -CVE-2017-15944,0,0,232cb1904eee9358399dffdf13f580db39eb84960f16ae07c4bfb9ec73392fcf,2024-11-21T03:15:30.397000 +CVE-2017-15944,0,1,c63da4a9f396be09656aa763218fd12d2fc6b1fed41cf579407d2b96a943b93e,2024-11-21T03:15:30.397000 CVE-2017-15945,0,0,39ecbf8f80ac9c43a82720272f4c72d24228b8cc12248b3b0e9bfd289e154e3c,2024-11-21T03:15:30.547000 CVE-2017-15946,0,0,5b483ccc3e9101bae33c8164a54295998281a9dd72b27527dde4c88a5e5e23ab,2024-11-21T03:15:30.683000 CVE-2017-15947,0,0,ab876e595ab283829b2c93e3e80338b3dce1ddfce1a04269dd9d7a17523698b5,2024-11-21T03:15:30.823000 @@ -100045,7 +100045,7 @@ CVE-2017-16648,0,0,d49df0b0a682947051f3fdf851a3ac78144fabe8450816ffcc0747e74174e CVE-2017-16649,0,0,a2f5485408ce043cdfae945d9dc06aa743f9d480812654f5119d3431ebffc87c,2024-11-21T03:16:45.607000 CVE-2017-1665,0,0,e74920cd0ea1fbfb24af522fe82e1b515b1c8fde683470023dfdf95634d0b6a2,2024-11-21T03:22:11.310000 CVE-2017-16650,0,0,0773e28fdf618677b2744d709bab543f7e5fb6dc035a78a3c746fb76d6164940,2024-11-21T03:16:45.763000 -CVE-2017-16651,0,0,28b05f7dce03d5e3b5eab2c40937075d860b842b0b71dea43f42a1f73557eaaa,2024-11-21T03:16:45.910000 +CVE-2017-16651,0,1,c508830740c378ef6b72f73d051904c2e4ae8424415c2b7a31e74e1d0aef3661,2024-11-21T03:16:45.910000 CVE-2017-16652,0,0,f492a8214a6cdd89f5ac3d14cf0aea738c61dc3dfef54a963e0ad800d881d151,2024-11-21T03:16:46.070000 CVE-2017-16653,0,0,7f23b5dd2f97ac64881a9aed1e42735fa2e1aeeab2e7bb40851789639b3abba0,2024-11-21T03:16:46.210000 CVE-2017-16654,0,0,56fed4b58de7189769824ed8dcf2f4b781cfb5ad40c04c3e7e8f87b1a965bacd,2024-11-21T03:16:46.353000 @@ -100868,7 +100868,7 @@ CVE-2017-17558,0,0,1a9cd8a1861a68e852e86efb4e866a01df29f37c67383a6fad001ed837f0f CVE-2017-1756,0,0,40bc0e91b28864ec680b7805953f08e33e6a4f80654e28e47707960b1ba41d86,2024-11-21T03:22:19.220000 CVE-2017-17560,0,0,4f4c6068540706a2d98fb80c5f6890a1b43aab27943084b28c68f4a72ab4dfe4,2024-11-21T03:18:10 CVE-2017-17561,0,0,ee3c871f1c1cc7d941f5a9ca718e5010a3db4dda59d3997026a95559f14b1648,2024-11-21T03:18:10.147000 -CVE-2017-17562,0,0,253606b8c059c97664d9b60e42a15c5944eb41c32b817ab967b92e115107807b,2024-11-21T03:18:10.290000 +CVE-2017-17562,0,1,fc2cf6c4061aaeb6e37c64d6d018e4844d3b498ee64ad009c93e27f32eea4d03,2024-11-21T03:18:10.290000 CVE-2017-17563,0,0,445c915ebde270ffdd60d461284019f951f4a875c1aac3c68e3e637ac5ce95e6,2024-11-21T03:18:10.457000 CVE-2017-17564,0,0,75b2ae54c5fc366c45b00af912b568d3980c95fce5abb77ef4046e2aa7bc14c4,2024-11-21T03:18:10.617000 CVE-2017-17565,0,0,6bc8b8bc4899adb999d734b90bd8d59eeb0a9a879fe5da48cd99f0e960d4484d,2024-11-21T03:18:10.780000 @@ -101639,12 +101639,12 @@ CVE-2017-18359,0,0,f1d98b33bac96cf695fa950bdbcdd7a311c83e19f455170e58bc35381794a CVE-2017-1836,0,0,2eadb33b5673dd5153f647e0246479cb85188c2410423a24916ad1a27ff3db3a,2023-11-07T02:42:30.607000 CVE-2017-18360,0,0,76eaad1aa0b699626d370599721ca0a5764d621d0e44ae79c780f485a9a7accd,2024-11-21T03:19:55.710000 CVE-2017-18361,0,0,79097ec256618e70926053b6c2d55cb9b1b6109fd6a460fe2fbb1506a6804683,2024-11-21T03:19:55.883000 -CVE-2017-18362,0,0,449636fe03536eae7422828ca71f53d15f61b494e55b0231e05a373e63c8deb8,2024-11-21T03:19:56.040000 +CVE-2017-18362,0,1,5f94d6625c74cb8f2f419c9a83734cc1432cde44bd09927c16bf149bda6a07f0,2024-11-21T03:19:56.040000 CVE-2017-18364,0,0,bc7317e9185590e388714b1189da33d9f710f239fda1f524daf8e0926e20bd5f,2024-11-21T03:19:56.200000 CVE-2017-18365,0,0,eeac2cdbfe6b611eb4299f3914fc765966c6087303288e334f759b75d56bdc70,2024-11-21T03:19:56.347000 CVE-2017-18366,0,0,8b404b41129dc55dda93db71ee9497117f78539da5cb1b61cb1396483881a2e1,2024-11-21T03:19:56.493000 CVE-2017-18367,0,0,4f74418bf8eed28ff4a802714f348fcd6318883475bdd37613a5b63dc80e24dc,2024-11-21T03:19:56.640000 -CVE-2017-18368,0,0,e352d103ca665ab3cbae7a99d7efce6827c38204f8c185ed0cbfad264ce9a67b,2024-11-21T03:19:56.860000 +CVE-2017-18368,0,1,e5af345f79386b1c5522b3c3423bca555dba892c2c1e7cee3e22e75ef5def26c,2024-11-21T03:19:56.860000 CVE-2017-18369,0,0,f819e21d899e0819c347e08d85edbeff37afe4026adf281e195f83e934d45498,2024-11-21T03:19:57.060000 CVE-2017-1837,0,0,8c90e7b1ad59a6aa57a607e36285e4b808e61e279558e68578b00a2a54a94f2e,2023-11-07T02:42:30.830000 CVE-2017-18370,0,0,288955fe9433655d1eb96c264ecb2f4b0acf32aca395f1a13a7ac7853bebdd1d,2024-11-21T03:19:57.207000 @@ -103975,7 +103975,7 @@ CVE-2017-3502,0,0,3ea00a6a7f668b4d48adb3368123436b52ac21350e1eb22567a2d8f88f614f CVE-2017-3503,0,0,90f3de9a387943622acdb552d9f22c7904b6284a253fe673e47e92303f16f0c1,2024-11-21T03:25:40.753000 CVE-2017-3504,0,0,022ba11b423c06d78971e91a80e59e68001f0bf7995af1a9b7ee4ce23885610c,2024-11-21T03:25:40.873000 CVE-2017-3505,0,0,9cd32dd4b55bea54f8934e3875e131e5604540037ea75ca548cc28dc61584413,2024-11-21T03:25:41 -CVE-2017-3506,0,0,ee386c163ff38c038a7944d691f6052592506ceb32c17a7cab4ac445cb6e7f2f,2024-11-21T03:25:41.123000 +CVE-2017-3506,0,1,ae4a1ec560656d2450fc6ffd69508029c8851ad558cf01dc62f9ea6ed55135d3,2024-11-21T03:25:41.123000 CVE-2017-3507,0,0,3338081cd17593ce03dc2a71b935f61a9c36a7e80427861129d7789edd63829e,2024-11-21T03:25:41.347000 CVE-2017-3508,0,0,1338590ff09608d982779f91930e40b4d06febf70eb961b8cb6d337a1fda8445,2024-11-21T03:25:41.473000 CVE-2017-3509,0,0,a37db3adc52e5f7e64a05b2f1bdb5c2cc8a8863559e9e86a39c539a84905d515,2024-11-21T03:25:41.600000 @@ -104269,7 +104269,7 @@ CVE-2017-3877,0,0,bbad2e8092ea6e9be8f9da598ef2af7b27a8ffeaeaec831d1486b86fb6f772 CVE-2017-3878,0,0,869fdd6fece64e542b4fc48428894e038f30c5f09d416e53358dcd7b792c463c,2024-11-21T03:26:17.967000 CVE-2017-3879,0,0,83468b277f73040876285fcdc24cae6134d3adbd9008039db523bfcd349315dd,2024-11-21T03:26:18.090000 CVE-2017-3880,0,0,282313186fc226260e4ca097b6b3959e88c3fff3d77c3fac47fb8c334041a217,2024-11-21T03:26:18.213000 -CVE-2017-3881,0,0,66bcd971d9b99ba9f312a65ff29e29fc262223776b3b1c19d56daaef4cf4a44d,2024-11-21T03:26:18.337000 +CVE-2017-3881,0,1,40ef8cf5d643a68063d3012289de9d030502f03f84ce53628d4c7c6bdcafc102,2024-11-21T03:26:18.337000 CVE-2017-3882,0,0,290c7341d502f78e889261bc7917a1dcf02554f11bc6b2f020a64833f3846a18,2024-11-21T03:26:18.513000 CVE-2017-3883,0,0,2c3986ee4db8d31011deceab8dc1a465ae2841c9d7269b09cf7aa3ec548ab421,2024-11-21T03:26:18.640000 CVE-2017-3884,0,0,fdde79613d59baf14695630eb1bef7cc79ee53d78c4c664b5137c7fb0b0aedd1,2024-11-21T03:26:18.793000 @@ -105414,7 +105414,7 @@ CVE-2017-5026,0,0,d5a38725a31f738366f1beee032cbd89dd10b4653b84108a8a2d10586c7523 CVE-2017-5027,0,0,3faa021617bb8d53bbbd89ee85f4d713e0f72f31c3a228d4fdb19e5be10c868e,2024-11-21T03:26:53.583000 CVE-2017-5028,0,0,95c1b912517beef415dde1d0fc022d559f040e8de5930a425edb5c27b84a546a,2024-11-21T03:26:53.707000 CVE-2017-5029,0,0,9dd4f9a8e4f58ca0f045826febe4afe3ab6de659018279e9cb2f9d10cd599fde,2024-11-21T03:26:53.837000 -CVE-2017-5030,0,0,fdd97028cdce239f142143037ff41976f471c5ffc481ad6f256b10b826f1243d,2024-11-21T03:26:53.987000 +CVE-2017-5030,0,1,b8d798bb9dbb7a12b3d41941d8bdf73bf9858f1df67192fc7bb96fa9d39ba878,2024-11-21T03:26:53.987000 CVE-2017-5031,0,0,9fb7bb74b87cbc7d0714ba0a0e2e38a87e2994b27b2b7d0d433ca78776958806,2024-11-21T03:26:54.123000 CVE-2017-5032,0,0,710ce084d71a97ad9230e94b0ab051f5fe7b6da6649d98398e5e6becf0de3373,2024-11-21T03:26:54.253000 CVE-2017-5033,0,0,61cd2f4ffd1551497a52b52be639018e94b322c5e70f38acc7f84cb2af939762,2024-11-21T03:26:54.380000 @@ -105454,7 +105454,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000 CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000 CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000 -CVE-2017-5070,0,0,23e1a8acf1a6915cadd659b376e9456223d717e9233f23d34188e5750a2f1413,2024-11-21T03:26:59.100000 +CVE-2017-5070,0,1,615a11d3c3fcfda037a63767a33a59e4e5a8d648020bec496404db799180523e,2024-11-21T03:26:59.100000 CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000 CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000 CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000 @@ -105804,7 +105804,7 @@ CVE-2017-5517,0,0,471d302753807def5f4e02fc96ef762a869e53f76b27863cff45ac27702975 CVE-2017-5518,0,0,aa2c01c91a6b8af976945103d7f908583189b4221aa739f20f45beebec24cea4,2024-11-21T03:27:48.010000 CVE-2017-5519,0,0,8750c32c56caeb14ea72834f63547629ae39eaebdf28abe65aeeb4b1bbcc98c1,2024-11-21T03:27:48.197000 CVE-2017-5520,0,0,78a2ca3d03168e1ad93bfa845a8c9e0842179953d7210123b9ebb1d10a9978ce,2024-11-21T03:27:48.350000 -CVE-2017-5521,0,0,a50fb0e52aeb03cbefccbc76729ce4475ad536b8bcae7a3ca27ea7557abfa528,2024-11-21T03:27:48.497000 +CVE-2017-5521,0,1,557b0bf482657294237479d0b2effd9a95f70b3cadea0534411ced1518a14358,2024-11-21T03:27:48.497000 CVE-2017-5522,0,0,ccf47a0445534712bc22576941d388eb949540ee94dc22e27cf7af2b5dd27ea9,2024-11-21T03:27:48.657000 CVE-2017-5524,0,0,651fda4a9a48673cf336c8394b11ee52fe2910a808547c2500c53a16fbbc05e3,2024-11-21T03:27:48.837000 CVE-2017-5525,0,0,f30ba6c96a8072e69a19f0a1f094dd24d451755fb0edef69603b1531823ac118,2024-11-21T03:27:49.010000 @@ -105906,7 +105906,7 @@ CVE-2017-5634,0,0,c691b0eed537dde2ae2c10d7a3837aa7cedf94218b8faafaf27d2b6acd11c0 CVE-2017-5635,0,0,f92152048ee03f2f3300dd2e6b84fc49ec8f95791a9c24a39881c39d17fc53cb,2024-11-21T03:28:03.940000 CVE-2017-5636,0,0,265cde36b51c52dc7a14cdca404ae07ed0ee4fb7c6ef851fe25acfd3bd2a0d1f,2024-11-21T03:28:04.063000 CVE-2017-5637,0,0,947a830d13563d9955c01f83f199f6d51a49007b865fcb26ab01b2bfd93cd8ed,2024-11-21T03:28:04.187000 -CVE-2017-5638,0,0,472ee35b3613989b3a03d59cc8af30b6d855de0124d7ee59e905fb23a3f72a80,2024-11-21T03:28:04.340000 +CVE-2017-5638,0,1,9417c4787e56708a075518577036b6daaf36327dafc735574c41661f8233f98e,2024-11-21T03:28:04.340000 CVE-2017-5639,0,0,462a0f7c78ab8086edebd9f13969ca06172b26aeaf48715bd8ef53f97b1e42ea,2023-11-07T02:49:28.107000 CVE-2017-5640,0,0,72c959d49b2faee7e74f55903f2dee5136bde1ae0a0b667e8535f44d447f2a26,2024-11-21T03:28:04.580000 CVE-2017-5641,0,0,65e48daa937d45cb94c8220feebcd49740caa7c505a50c61ea31754636386eeb,2024-11-21T03:28:04.720000 @@ -105955,7 +105955,7 @@ CVE-2017-5685,0,0,7e2720838bf75ba8df74963aa0d44d19823c3d3d8b4fe77ca70634fd4621ee CVE-2017-5686,0,0,1b6369a18bc3048e4f5052404b083fde204cc03e4b3610174df32e9ea98ad410,2024-11-21T03:28:13.317000 CVE-2017-5687,0,0,f3eb17158e526c11205277eb0aa51c4ed790e3b3585c712351e750176ecd3553,2023-11-07T02:49:31.080000 CVE-2017-5688,0,0,3047ed52c924afc3b53203936d7a15635d5467cdf666d3ad272cabd19d6b23ec,2024-11-21T03:28:13.447000 -CVE-2017-5689,0,0,34c11da1410b7aaacd6dc2a34bab113b9b1400feb941fe0e5f9aab38db93a9d6,2024-11-21T03:28:13.573000 +CVE-2017-5689,0,1,872c02d2da15c3ed9e7a04499d425e2bb92a7460d5a2e6b18a8214c78a73e610,2024-11-21T03:28:13.573000 CVE-2017-5690,0,0,bde03df0f672bdcf5869f8d1b70ef297085f4350e41728ecf5ca86e2a8b87d57,2023-11-07T02:49:31.310000 CVE-2017-5691,0,0,d124b3c9ec131ae52624cc95825b560339c2db7bdf908a63b5224cac4d8b5e72,2024-11-21T03:28:13.767000 CVE-2017-5692,0,0,46649fd68ecee01e250c40c3b478483a6b0a25ec2e017585bff790e16bee79ad,2024-11-21T03:28:13.920000 @@ -106315,7 +106315,7 @@ CVE-2017-6071,0,0,b45a719c72cb8b3fda95ea74a37a18c49c1978951f1fe2b447d26ba3573adf CVE-2017-6072,0,0,abca9d726351938f6000466839f48f239dd1e70397577c3e816c8edbc3a46899,2024-11-21T03:29:02.330000 CVE-2017-6074,0,0,c669204ed29cbfa426b702bdc91f735b3fa42511533d51a014ffc9f8b054dadf,2024-11-21T03:29:02.490000 CVE-2017-6076,0,0,3bcd0a8c516bace6a0a66932221afee7789e16e74eb27d85850fda00b531b6a4,2024-11-21T03:29:02.703000 -CVE-2017-6077,0,0,6ea7606f3ba86b44c7ec39a988f290ae1e6781f087e869a230aa85b5b4d83513,2024-11-21T03:29:02.863000 +CVE-2017-6077,0,1,099dc6bb9a3c20bc6932bac092c8a3595844bfbce7f9988b9be0bb47576ee51d,2024-11-21T03:29:02.863000 CVE-2017-6078,0,0,b5b0a9ff4b0964cc66f7ed628ed2ee58084a01fa9666bb0a45c55b5fa9f20b05,2024-11-21T03:29:03.023000 CVE-2017-6079,0,0,e5c27ed18d15d24143ebdef8d21aed66f020f3475d5531d0569390f2801fb76a,2024-11-21T03:29:03.170000 CVE-2017-6080,0,0,86745a47ecd09af46027a606ef7898626240da59a60ee8a2264daaa4b6b11a39,2024-11-21T03:29:03.330000 @@ -106493,7 +106493,7 @@ CVE-2017-6312,0,0,42a62315b56934c6a84e31782c7a49d07919eeba430fb0b742454d59a4a894 CVE-2017-6313,0,0,9a8580137a4b25a6f987612e7ec24731634f38d452a6ec3ace4d139e72dc4223,2024-11-21T03:29:32.547000 CVE-2017-6314,0,0,8a2959c7dd50879ca5c7a6b6c4413d49316a17538353417917c4fdf83b8cb609,2024-11-21T03:29:32.710000 CVE-2017-6315,0,0,c630e1e600d8b93e762e4c44505bbb05ac7d756b1d1416f1a7f830d19696a7b9,2024-11-21T03:29:32.863000 -CVE-2017-6316,0,0,460aa202083139c60d8947432f70af11318adeccca532439207ea5058dcff25e,2024-11-21T03:29:33 +CVE-2017-6316,0,1,8ccbe33d3311455d745223cae9003a62fb7d3e01912b49561e9b4da0747baa2e,2024-11-21T03:29:33 CVE-2017-6317,0,0,f3b7e46e15e93d6b3661e59c00b98cd97fbda2877ba6d74850c3dd28f25d3c1a,2024-11-21T03:29:33.150000 CVE-2017-6318,0,0,1af7246e34252f5e0a58359e75c1cfe8bee1a58e607f8a42de55a21f69a89529,2024-11-21T03:29:33.300000 CVE-2017-6319,0,0,ffc5afe9249c6285784e0680d25c9cb43ccd1c26a8478891bac1e57886935ba3,2024-11-21T03:29:33.460000 @@ -106502,12 +106502,12 @@ CVE-2017-6323,0,0,adf010d4a39e345b824cee6fcca9c2195697b5d7a97b0a9c5082468040c4f8 CVE-2017-6324,0,0,77722cfc809cdfadcd278c7b890ec0d070a04bba29126e6eb8a3655dc3f57a0d,2024-11-21T03:29:33.847000 CVE-2017-6325,0,0,7a6ccf0f51e269d2f444f7b191f021e32f282c2136c57deb80e01f1e8d699d30,2024-11-21T03:29:33.960000 CVE-2017-6326,0,0,1cb4eafe71d9ead884f6be63876fd968575791113118974a1f5830ebff169d54,2024-11-21T03:29:34.073000 -CVE-2017-6327,0,0,6af4cf328fb9fe5a8a2cc3e06859af146fd94e061e3d8284c158701f3d551d2d,2024-11-21T03:29:34.190000 +CVE-2017-6327,0,1,41d22cc19320a12f7dcaf53924e4b464e17def5611434a084cf3e8251b5a2913,2024-11-21T03:29:34.190000 CVE-2017-6328,0,0,ed8b8081c67d23f8eecca6e7147a999aa9cca89e11d27e3aee197caa7faaefd0,2024-11-21T03:29:34.303000 CVE-2017-6329,0,0,11dea170ad86b94cced8f348027330ceaae6c40482cdb228f11d6206d2a1c7e0,2024-11-21T03:29:34.407000 CVE-2017-6330,0,0,9daec3b7d68726ab69bb0475e153ee0c9e277dd5f36b71e86c17e73a8d02c9da,2024-11-21T03:29:34.507000 CVE-2017-6331,0,0,f93b68eb1b557a33979a368ccda7fe585bb6c1a60117255fe58ffc8695a7ebc5,2024-11-21T03:29:34.607000 -CVE-2017-6334,0,0,2952f9896639560ff3a83b73b94804104799e234af0cb19c5d748e5d1a264c73,2024-11-21T03:29:34.713000 +CVE-2017-6334,0,1,401dd2858590102140ed189916f29aa15644d05ff0a184d5aae81a86fde421f6,2024-11-21T03:29:34.713000 CVE-2017-6335,0,0,bdc0ce1383d785263ebaea599f6103f93cbdbffa225c44c081e9406a46c7ab7a,2024-11-21T03:29:34.857000 CVE-2017-6338,0,0,7ad952f8d7a96080bad0cc61441e22e6e69941cea8265cf7345a4ef8e0160b8a,2024-11-21T03:29:34.993000 CVE-2017-6339,0,0,411cb891b12273c5c4dd047bbc26a47d367930284f1656502f3c9527eba36dda,2024-11-21T03:29:35.133000 @@ -106738,7 +106738,7 @@ CVE-2017-6623,0,0,46c6619b7240e5fd832906db61e3a28d5a48d11a69d2d3120cce2a86740695 CVE-2017-6624,0,0,71759c3051c1a40da6aff44cf9afb8432419327cc143b729c12d30acf62b9441,2024-11-21T03:30:09.277000 CVE-2017-6625,0,0,c7752f007a235b83c805d77c5651f46aa3f1f790f51df30a0673e0ef6c6c3d39,2024-11-21T03:30:09.410000 CVE-2017-6626,0,0,ccc487d4aeb7217fec7ed5b5ed4c18793f6a17b43e2a503076586d6acc2c0a4a,2024-11-21T03:30:09.563000 -CVE-2017-6627,0,0,51fc4cfca3e5a0936b509e313a43139c6f7c4a332634c4e1ce4fab02dca6d370,2024-11-21T03:30:09.710000 +CVE-2017-6627,0,1,aa33e22627903091102ba8e90d6470c9775725ec9501b2a8430898452a6aa56a,2024-11-21T03:30:09.710000 CVE-2017-6628,0,0,ecba55f3dae5a992e8200c1d6839d84d27d832c42ee1c8c12b1b603c94faa590,2024-11-21T03:30:09.880000 CVE-2017-6629,0,0,2652c30334e23ec3fca827ae67d71a73562b7e7198789841119b85df738ee2b5,2024-11-21T03:30:10.017000 CVE-2017-6630,0,0,62c71f67782d4c2c66f333c3f16607b1867b57bbc5a5cf20c1c2d3c3af130f24,2024-11-21T03:30:10.177000 @@ -106773,7 +106773,7 @@ CVE-2017-6658,0,0,41bd3c921a0885747947b7ce7e7a445d743af4337f210d55abb342db6c0b0e CVE-2017-6659,0,0,ed8da36d1b4116980794977d6bf32bf7abec8ff6bada0d9d60685d6522dfe0d7,2024-11-21T03:30:14.680000 CVE-2017-6661,0,0,b15c9288fd4ab682250e4679a8c33c66d3976e2602e5cd423a39c8423dce623c,2024-11-21T03:30:14.820000 CVE-2017-6662,0,0,4a0dbfc3878c39f8d5b14823ae375d5ac8f3b928fd0b6e0455cafe58cb05cd32,2024-11-21T03:30:14.960000 -CVE-2017-6663,0,0,1569bd66dc95834701be11b746ae894213042e269f3c73d98c529571f335065c,2024-11-21T03:30:15.107000 +CVE-2017-6663,0,1,004690e2546332b851635362eaab66ea4538320f68cd0497c93cf048fc6abdd4,2024-11-21T03:30:15.107000 CVE-2017-6664,0,0,5943066143fe540b6fc18d04677f203ebc036087359dc2ea39c730b3eca00a10,2024-11-21T03:30:15.293000 CVE-2017-6665,0,0,b1c7860215677ee5cd486bef6c9ac9ba00eb9a06f1f62283d9c806551182165c,2024-11-21T03:30:15.440000 CVE-2017-6666,0,0,d56863e41fe32d21674fd8b8e6931f9a9d1af554036708bc7ca87024cf79833c,2024-11-21T03:30:15.650000 @@ -106843,15 +106843,15 @@ CVE-2017-6732,0,0,e449d18ce6f0e4f4eac38b96c3d2d66d54f07c4ca4a73693763266118604be CVE-2017-6733,0,0,12281bc3fe34e5853661cb3bd250c771e4dae9cca52f1b1f182554e24492055b,2024-11-21T03:30:24.193000 CVE-2017-6734,0,0,d9b2adc4e7eb6780e4d2115713a14f11526f090188dead83e62cc5f1bdfd0142,2024-11-21T03:30:24.307000 CVE-2017-6735,0,0,9d32c7142761a02cc612b3679a7fbca4ffcc384fe02ad2998ca161d2cb2a6d6d,2024-11-21T03:30:24.450000 -CVE-2017-6736,0,0,b96be91a63523ac39e93b36ed263da54c74f3a12d4b210c5c99d35b0fddfe994,2024-11-21T03:30:24.567000 -CVE-2017-6737,0,0,486994817fc329fd35a9f6618ae00c54da3eb8719c2fcc54a9981fd0bf1c9420,2024-11-21T03:30:24.723000 -CVE-2017-6738,0,0,14725b2a96602ecd4e2e28dfc7b989b4e8b1a087361befac5c98afe67d00d94f,2024-11-21T03:30:24.867000 -CVE-2017-6739,0,0,d613faf31fc3535cdff935ddc00ee35dd3b77b43fd0d35f8b967d298c252357d,2024-11-21T03:30:25.010000 -CVE-2017-6740,0,0,71672ac83addb34ff30416daac164b7f3e89d44e5fbe96cc415ee940dea05c72,2024-11-21T03:30:25.140000 +CVE-2017-6736,0,1,c3207222d911eb7e777d4cbc9135c1f01f9a324eecb69948d71a42c1fbc4c290,2024-11-21T03:30:24.567000 +CVE-2017-6737,0,1,43e17a8501e336297bf58047e85f4d7117a35908607c2528a4c33e719edcaaa0,2024-11-21T03:30:24.723000 +CVE-2017-6738,0,1,9cc8a48d728859e21369b6f4451c1efa5fda5a0322ad217525541dbef9540502,2024-11-21T03:30:24.867000 +CVE-2017-6739,0,1,24054211043685689c0cf2539c975e72b2167d68fad4ae1077a29da84cea1216,2024-11-21T03:30:25.010000 +CVE-2017-6740,0,1,67aac77368db01ba58b38bc44a3eb1d11178528f78f4b15a840ec962f65c0513,2024-11-21T03:30:25.140000 CVE-2017-6741,0,0,f8af4e0b5bac641d875dd63727ef3a015c71adea6c839db6fc84670137d7febc,2024-11-21T03:30:25.280000 -CVE-2017-6742,0,0,6ea3fdcdd3f147dc9da7a978406ca493f72ad32f86d55043930c870a54b39449,2024-11-21T03:30:25.427000 -CVE-2017-6743,0,0,e1fb8fadaad73a8480d8a95984d9933122451d9730255978599f72db8c0617e7,2024-11-21T03:30:25.573000 -CVE-2017-6744,0,0,0474eed38ca56d2d457ff7fa1a8252eb95c8f6d1c90df1b133720f0dc808ead7,2024-11-21T03:30:25.710000 +CVE-2017-6742,0,1,2e06429a9caa7ae6b8167a9a9ab2ccf57ced61ab237a965b25e2e11adeda4598,2024-11-21T03:30:25.427000 +CVE-2017-6743,0,1,e493a0e768cae47fec74d88e32e7e51042836765ffbb00bc23ebc0d4c24307e9,2024-11-21T03:30:25.573000 +CVE-2017-6744,0,1,2bf5de220a1158a38b5f63cef06fd6bab950dc2728209e927d33b53d17b28656,2024-11-21T03:30:25.710000 CVE-2017-6745,0,0,1526c87d043fb2fb9aa97c34109289704f0d47421b47e9ce4b167a4f703f2c09,2024-11-21T03:30:26.103000 CVE-2017-6746,0,0,710ec27660668acfac05fa03b9bd9ff545d24f927e908aa18ffac6e5f5dd0869,2024-11-21T03:30:26.230000 CVE-2017-6747,0,0,711ba33714be9d957231cc5f9bc6ce7597a0c4f916253c9382b1889704dfbe9e,2024-11-21T03:30:26.350000 @@ -106953,7 +106953,7 @@ CVE-2017-6849,0,0,c87a3d14034618258dcaa1d38546542b91edb7da2cf34fe76a2481d208cb7b CVE-2017-6850,0,0,ecdf301b79b09e8ddbeca44bb35325e49781ce82d77bcec81ba07775afdd69b8,2024-11-21T03:30:40.730000 CVE-2017-6851,0,0,a53e3803f720f8b430644b0fe96cfb6a6dc10d34766fa4003bc8f3fe159f9ea1,2024-11-21T03:30:40.883000 CVE-2017-6852,0,0,99a1fb15db442be975b34d7b40bd97bd3a7d4f39ea7f5795df52204fd0e411e6,2024-11-21T03:30:41.033000 -CVE-2017-6862,0,0,681228d675e342234e4ef1ef601300f12dfeb718a248cfbb6f3862718db00e6a,2024-11-21T03:30:41.180000 +CVE-2017-6862,0,1,2769ce74f437081f7de9456b34df4133a5a2b2bf511bec031cb7779571f2f92c,2024-11-21T03:30:41.180000 CVE-2017-6864,0,0,17dcd3a7c1bd7b1c45121ae1c99ac6e7c4158aec469add0c6096632ec9e8e6d5,2024-11-21T03:30:41.317000 CVE-2017-6865,0,0,996a39dbcd58e23a9bba2c0b62d1614d77e7acdfe49f45b27aa51c1bd61f4d99,2024-11-21T03:30:41.443000 CVE-2017-6866,0,0,d052d39abcfd2e686b21beb68ba70f23eb207cc7c304c204d614557d08f37bcf,2024-11-21T03:30:41.580000 @@ -106969,7 +106969,7 @@ CVE-2017-6877,0,0,9e8fc21ed4fd5d51752234bdde8df875041593db1a71f2e2ae6aa9a6c31894 CVE-2017-6878,0,0,66ceb535c85fc028792ff0af830c1111262cc367069859c27d02a524c1b78688,2024-11-21T03:30:42.877000 CVE-2017-6880,0,0,5e0dd410d3c5b00d6797ce83b2bd3c0649ecd3ef83cd0b851e1ae29367f9eb5e,2024-11-21T03:30:43.023000 CVE-2017-6883,0,0,4637d16b5c6af9932713bccb06a78ff84880e71e1f0f7fa7f98c46a7ae4002e0,2024-11-21T03:30:43.163000 -CVE-2017-6884,0,0,bb27a68ebddf643369d8ce540cdf88ccbc87ba0be86a75b70960aebaffa29efd,2024-11-21T03:30:43.330000 +CVE-2017-6884,0,1,cdaae5f960c508162b448c8296f00cfa6ba72186eb84ca4be694595064984036,2024-11-21T03:30:43.330000 CVE-2017-6885,0,0,04192b8b93d8e5f8b03f1ac7bfe807fe51f139471f31f691f478e099ec3ef6e1,2024-11-21T03:30:43.500000 CVE-2017-6886,0,0,2ade6acebcd0f72d1999f1a1b81b27b018dc228658ec3e32d8b01fee597c8fd4,2024-11-21T03:30:43.630000 CVE-2017-6887,0,0,7ddb4964686b101fada99cc02a37f491dfd99bb8365b71201f651fb8ec6d02db,2024-11-21T03:30:43.763000 @@ -107307,7 +107307,7 @@ CVE-2017-7262,0,0,28c2a20ecbf32e80ea1e6bd2fe09484fed41dc29726290f6db06d55aba74f8 CVE-2017-7263,0,0,5b16ba23a3f168199445ce0b9f9cc703378ae38e0f3aeed9a3f79f208a242f5f,2024-11-21T03:31:30.030000 CVE-2017-7264,0,0,0653bf306cb248dc9d9eb26cba6d15e98ed7227d2f6c787a650486d300d8ccfc,2024-11-21T03:31:30.180000 CVE-2017-7266,0,0,1db35a687908edcf5dcf07f27d1e53c2fb07357cfbc6f03d4a0ab55e6f3ae404,2024-11-21T03:31:30.403000 -CVE-2017-7269,0,0,5ed234f6860e2d0ce0146208fce8341ead3964197568da73ba61964297845797,2024-11-21T03:31:30.560000 +CVE-2017-7269,0,1,e1696b819f078e793708734fcb54ab6f54dfad1f3af6f3b45d5bee82b4aae019,2024-11-21T03:31:30.560000 CVE-2017-7271,0,0,d5656ceae143a3cdcd04c0f226f14645015fcf6c6869c59ff20acc0f3d3cc2a6,2024-11-21T03:31:30.733000 CVE-2017-7272,0,0,0786281681997ad5c254dd96ac3f9da36956c6a06cb895560e64c2ce8533c19a,2024-11-21T03:31:30.890000 CVE-2017-7273,0,0,cc1745a95ae72b9b11bf0000f4f1fd4ca23bd0a95e3a3c5ab6312618e7490202,2024-11-21T03:31:31.050000 @@ -107504,7 +107504,7 @@ CVE-2017-7490,0,0,564db9b2380ca9e6f7fc8c4dd40edaf11a0beb3966b14816d5824cc041bac8 CVE-2017-7491,0,0,a2f3a79b7e81145346fc0d3815d2f4bea285c747a012306028156c34fc389ed5,2024-11-21T03:32:00.600000 CVE-2017-7492,0,0,ba9ab540baa59470295f026caec8df78add0fa0b402b49db449fff9c6dab8892,2023-11-07T02:50:10.280000 CVE-2017-7493,0,0,efa15b4b5e79fc17c5cb5cd255db84b75095d5eb84054f659ecc54e395d484a2,2024-11-21T03:32:00.737000 -CVE-2017-7494,0,0,788fa7a35aea5ede3911321a131c1557ad5bdaa04b5e3917cb5f9d0171e98895,2024-11-21T03:32:00.870000 +CVE-2017-7494,0,1,0470491b7cbe4951b97fc00d854994b50b65bc6f8efa07491ef0d8009b6ead06,2024-11-21T03:32:00.870000 CVE-2017-7495,0,0,4222dd1b73dd21ba5e6fa28448130bc72f8abf4c1cb91ef79d45f6430a0b4ffa,2024-11-21T03:32:01.007000 CVE-2017-7496,0,0,7b7c3f6b58903108e7fc2badb2557a22b9d027b0067a849336b63899e802d03d,2024-11-21T03:32:01.130000 CVE-2017-7497,0,0,cd56a990e2f050d1eb96d1904c401477015038d4f62128ed7b7ac897f7c3c50d,2024-11-21T03:32:01.240000 @@ -108246,7 +108246,7 @@ CVE-2017-8287,0,0,ce37836102a97ea03d49ceb59caf3fb40f16825c889de33bda90da8aa11cb8 CVE-2017-8288,0,0,f29e191ed16a6e38419a232d352ee7e4de49f18b651a429af101ce8360de3797,2024-11-21T03:33:42.247000 CVE-2017-8289,0,0,9fcb421bd9217a54c416a2b9bb23285c9f17f666ab8a4604843dcef828894287,2024-11-21T03:33:42.423000 CVE-2017-8290,0,0,9087c2c060c0af98f1e2c91a6c12709e3a88a63595a5f7a4afba95a94ef79207,2024-11-21T03:33:42.583000 -CVE-2017-8291,0,0,5d0700046e1a5f801a7224375bc081f67ba3d3d37a6c400c0b87533760d8b879,2024-11-21T03:33:42.733000 +CVE-2017-8291,0,1,262349b7055e93a7b8286dba441a700f030c3894a51162f94e2d00b33bc33aa3,2024-11-21T03:33:42.733000 CVE-2017-8294,0,0,33fcc9d89c2b47174da7ff3685dc1dccbf82d5ecd988184b5cb55a77076d0de7,2024-11-21T03:33:42.920000 CVE-2017-8295,0,0,4a7d2fd3a877463f29074df11c09998b5224f249f20d6711adb1f7739a2282ca,2024-11-21T03:33:43.077000 CVE-2017-8296,0,0,705effeed2d0fc3372a595c46e912086dc1db191c861a4896189eab4176a1d96,2024-11-21T03:33:43.230000 @@ -109101,7 +109101,7 @@ CVE-2017-9244,0,0,e23ba3547732547749405955cd243c3c80e81bf878e588c2e4a80088605f70 CVE-2017-9245,0,0,fb9cfee6c1c25d175bf2f7132343315aa1d0b6dafe35b087970a51268d7c6617,2024-11-21T03:35:40.033000 CVE-2017-9246,0,0,c71b04751b6e2df74ddb45bfb73416fccb55537b1c3d981d722308dcaff285b3,2024-11-21T03:35:40.207000 CVE-2017-9247,0,0,533108d162c03423fec9397168b9b133efeadef66f59674700b9df0cb239fa5c,2024-11-21T03:35:40.367000 -CVE-2017-9248,0,0,4681d80167c25c1b82a353562cdffee28e9aabf2eb5b5ff27eb9b8b89239fd99,2024-11-21T03:35:40.520000 +CVE-2017-9248,0,1,d4e6bd8c02ad8012d5cf951af4726cc936ee7e2b73a8df0232cb2b5d146ffc79,2024-11-21T03:35:40.520000 CVE-2017-9249,0,0,52e3823eabfc9c19235871955d0a790cf3488f00c99d12b05aa411094446f3ed,2024-11-21T03:35:40.680000 CVE-2017-9250,0,0,a996a962ee9ed2d6d019b32eaf0d3390a1a06f960dbd334d264ab6aa283bcd27,2024-11-21T03:35:40.833000 CVE-2017-9251,0,0,0cac57f7d268552dec32da8172b0d11442d8828b071c3845f5d369727d21d1c1,2024-11-21T03:35:40.983000 @@ -109590,7 +109590,7 @@ CVE-2017-9787,0,0,4ff0474fa94745ba21b69e810977ce0a4dcb255a757d57917e166690e42f61 CVE-2017-9788,0,0,e6d4e3a8811ab88c0a25a72988130c7240559f653ad54ed27977a26e6e4453d1,2024-11-21T03:36:50.693000 CVE-2017-9789,0,0,55c18e88a75476874c281156ec708fa949d7d6dfa3d6df9a97e45d5a20908273,2024-11-21T03:36:51.323000 CVE-2017-9790,0,0,5986e3314508c3da64592bf9e47874d28c7904b788cecba61f8ab904ed7afbee,2024-11-21T03:36:51.527000 -CVE-2017-9791,0,0,de5751932879fbfdd209f2dabeb03e2fe8ed4bce704053009003f21f7bb7f4cf,2024-11-21T03:36:51.647000 +CVE-2017-9791,0,1,fd12a89bc8c33e4f2ce0068610e42a3a6713ecd330f37533152c97b12f1f8b31,2024-11-21T03:36:51.647000 CVE-2017-9792,0,0,85856ebca0eb83d7d412ec8adc07b478e9b7a430596b956d7c0c5d8296f3ed66,2024-11-21T03:36:51.783000 CVE-2017-9793,0,0,697c62bc29a0d80cd0c7f4c7a7961f560238b57ba6cc02631edf68c66036476d,2024-11-21T03:36:51.917000 CVE-2017-9794,0,0,6e6db4498d19757c3c7e154e2f152eaed1840beb54f4df2bb7109ebf680ac86a,2024-11-21T03:36:52.070000 @@ -109604,7 +109604,7 @@ CVE-2017-9801,0,0,dc7712f21d6648d38a7da724a52b54a68314aa36b346360fbeaaa7b15a72a5 CVE-2017-9802,0,0,5a4ab8c40f57662955b5fa0b37a0f1fcd64d3bd6e8aec9194eabdcce1abe440b,2024-11-21T03:36:53.203000 CVE-2017-9803,0,0,c4d53129e8c075cb9f562aa04ddbbbee900482544aa32757aaea8e4cdcd6dc13,2024-11-21T03:36:53.317000 CVE-2017-9804,0,0,af1649f75773cd4ea2d950fc98ad79fede4cc3f9b0c159ad839eb42a8b7ba620,2024-11-21T03:36:53.423000 -CVE-2017-9805,0,0,e882fcda0f42b2f8ee5eea3c0d4d5ce90bfca464eac753db2e1a81205b71487f,2024-11-21T03:36:53.557000 +CVE-2017-9805,0,1,b29accb976db07e722e54cba2db3c29c59d8694a9d3cde1c1673fb86628271a7,2024-11-21T03:36:53.557000 CVE-2017-9806,0,0,5f4606f350b1c0159ca2c28ac4d679896d973c48661ed62c7fc87a705e4212cc,2024-11-21T03:36:53.700000 CVE-2017-9807,0,0,d589aad1d51bba53dd460e5f280723adca587151b78e5017337c0ad09ab990ae,2024-11-21T03:36:53.820000 CVE-2017-9808,0,0,cf3b02988d19553966ec76ad68604222aeb2d90cf85579c1f38041928061a22a,2024-11-21T03:36:53.970000 @@ -109620,7 +109620,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237 CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000 CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000 CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000 -CVE-2017-9822,0,0,5a694f6421bbd56c8d91affa963fe6ed1ce961a5a4686e27f6c0278bc1c5d479,2024-11-21T03:36:55.967000 +CVE-2017-9822,0,1,2a27c3d2d96b3658088ac342db13376385a6888df412e1b9e9c14cff53de4789,2024-11-21T03:36:55.967000 CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000 CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000 CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000 @@ -109634,7 +109634,7 @@ CVE-2017-9837,0,0,073221a23ec39b6062be0962f596a4104c9a614a05b81d535cded7f6a2b7a5 CVE-2017-9838,0,0,3f3b240a1255a94d20cbae42bf939d491993374f81be62d9709e57b6df1e5478,2024-11-21T03:36:57.477000 CVE-2017-9839,0,0,b1d229a0c7cccaa2e61f2f592d190615769132f4f78b41c17bd67892e9380285,2024-11-21T03:36:57.633000 CVE-2017-9840,0,0,99ad5a9e3f87ac3d34d0a27b4a9448c32c966edcc47d43f0570d16708a3f36cb,2024-11-21T03:36:57.777000 -CVE-2017-9841,0,0,429f8d61a73822f2a99f5fe741d45a04402a030b1a728b0208db6da763f328b9,2024-11-21T03:36:57.930000 +CVE-2017-9841,0,1,937d2dd85b25ea14b3e9478ed168a1ab90dbd8eaafd769da243f4731cf5bbe96,2024-11-21T03:36:57.930000 CVE-2017-9843,0,0,bd26f6b12639a77d3ade648abfcdcc022d5ce3c03f01067bb87cc912dff24aa3,2024-11-21T03:36:58.127000 CVE-2017-9844,0,0,899f33bb389439f532f40077571a72d1880cb00c9f785eb6faebffa1ef094482,2024-11-21T03:36:58.270000 CVE-2017-9845,0,0,493b740e65b6fe13f6c9ea0885782c19f4e957954f3277c9e693f4d5f8db7de9,2024-11-21T03:36:58.403000 @@ -109880,7 +109880,7 @@ CVE-2018-0121,0,0,895d765846373af6c9016596de7016de6f884a20584d1fa9d91d46d115292d CVE-2018-0122,0,0,cd3f66860ac5ec0536320da1acbd6db9ae870ed66e28552867edcdc45391b7b5,2024-11-21T03:37:33.990000 CVE-2018-0123,0,0,22e144d08627831e6984ac953d88825ee068c29b870b96f13aab8273c1319714,2024-11-21T03:37:34.120000 CVE-2018-0124,0,0,47966be1765df87640bcb1a2e9ee245a357cf0e4d1ed6178d66b0a8dde53622a,2024-11-21T03:37:34.243000 -CVE-2018-0125,0,0,0817938ba0e0f6babc8e842b834e905a8c64936c1a3070f4f3b18b2989eaab38,2024-11-21T03:37:34.360000 +CVE-2018-0125,0,1,bbabbb7332f4c76657f5a3c29f16c083cb7664a9f817846744c4ea382bc675c3,2024-11-21T03:37:34.360000 CVE-2018-0127,0,0,7c3a9e342f7028f1b2f58b0d7b57ed281db343c94296689bd60215d457a44f15,2024-11-21T03:37:34.500000 CVE-2018-0128,0,0,4ed3e92f0411f288166411425ed1160895590b18e8c2e105943b0418a4631c0f,2024-11-21T03:37:34.633000 CVE-2018-0129,0,0,a46ce472c4eee07fc400167a72eea8aa498e0a4f536d5f7752f9c8233e74581d,2024-11-21T03:37:34.750000 @@ -109899,37 +109899,37 @@ CVE-2018-0143,0,0,0a866cb3b05eb22b54b7f39d852fd5eafad6b7a66e84597f60e19d38ab39bc CVE-2018-0144,0,0,652781df5c193ebcddbf4cedab44b71c81cabbd2b215e05bb9d1f1417705f118,2024-11-21T03:37:36.217000 CVE-2018-0145,0,0,31b190d94230901f8cc74a4f5c2ac6f0551a3901882010c4fa6206bd62d8c199,2024-11-21T03:37:36.333000 CVE-2018-0146,0,0,8da0a280cec243791a7964b52949e0a715a207b1e78aeb2f7e95915fd5e2484a,2024-11-21T03:37:36.450000 -CVE-2018-0147,0,0,f943e6f26cca14553985cd68f7cc92b22aed383ed800e5cd8d9da2ee0c55c6d0,2024-11-21T03:37:36.570000 +CVE-2018-0147,0,1,b9e383c3a37e420418eb1a69855c7b9f23a75882d5c43e41e58337cb24e04557,2024-11-21T03:37:36.570000 CVE-2018-0148,0,0,be0cd89d7bea1f7ff33c4cede8dc23fd7227dd892126c874c42e23ef95c2215c,2024-11-21T03:37:36.690000 CVE-2018-0149,0,0,2e3996de5bc108b4c7b17a8c93d4bbee53383ae6cb017f97cb552be604789ecc,2024-11-21T03:37:36.807000 CVE-2018-0150,0,0,e393d61410375883c66127558c761a4a82eda44480a5582440ff45ff1339adee,2024-11-21T03:37:36.930000 -CVE-2018-0151,0,0,6e7dae744ef8500230d301655d70502189b2c0b3f89032fef9ee8aaa3d0486b7,2024-11-21T03:37:37.053000 +CVE-2018-0151,0,1,719fed160e55ae68a40ed7186cecb2c8f80ac17cdd6b89f8d27865171b73b7c7,2024-11-21T03:37:37.053000 CVE-2018-0152,0,0,c2469abe4decaa39fb34f67d81011eb434216b96bb00ab28e556dcec90f8bb39,2024-11-21T03:37:37.193000 CVE-2018-0153,0,0,9e052eb2f0e8570d032b38a722386bdddeaeb452ae477e1afa923172a33ea0b4,2023-11-07T02:50:58.977000 -CVE-2018-0154,0,0,b1a3d696d5797162e39cc26ad98d74f959ca231d837094dfe142f5f125052648,2024-11-21T03:37:37.330000 -CVE-2018-0155,0,0,db34b0b75b7c22551d09f4b3cab68d7b0119fa6a55075430f66e60cbd99b4954,2024-11-21T03:37:37.483000 -CVE-2018-0156,0,0,96ce38a7d11422fb5b4642546a8a023004ce964cc5f9d4e753d64dd9491001fd,2024-11-21T03:37:37.627000 +CVE-2018-0154,0,1,12f48d706343a60c13793b737f04d46c595cd53ec62635c44c515a6f41060179,2024-11-21T03:37:37.330000 +CVE-2018-0155,0,1,79e5ffcf85e84775c168a83baea0137a71e58ec2d8863028fefa1d65dc974d8e,2024-11-21T03:37:37.483000 +CVE-2018-0156,0,1,0169348c20e01a24ebacb6ba41874877543c4e7fa40ed67a85c4a4b02906eede,2024-11-21T03:37:37.627000 CVE-2018-0157,0,0,ae5ee9998c7a76192e28e2e2f6bb96ecdbf483fec40ba325eed1ae123eb8cee7,2024-11-21T03:37:37.793000 -CVE-2018-0158,0,0,c8d6b838a0af351036b9f5be46af8fc4cf98aa0b3b47709cf8e99c0c407bd1e4,2024-11-21T03:37:37.910000 -CVE-2018-0159,0,0,5d2ac74c07e1c00573e6675809c4cdd154facc6175d8232d2be2752f7759fb13,2024-11-21T03:37:38.063000 +CVE-2018-0158,0,1,374478e243392dbdc9dc7a7299236ff49badd75c48857c36a6ff621ecfc4fa49,2024-11-21T03:37:37.910000 +CVE-2018-0159,0,1,52a7dbeae4fe7f3074156a44c0ce677361d0d35c8894c7da0af4ba8740a41039,2024-11-21T03:37:38.063000 CVE-2018-0160,0,0,ea7c18725f6617fcae89786287949707d774010915634d3c452cc02f3b15ac04,2024-11-21T03:37:38.200000 -CVE-2018-0161,0,0,e1901549a9ec99c16fa441da0cf47502a712059be8f14b50a596b18d48faaa69,2024-11-21T03:37:38.320000 +CVE-2018-0161,0,1,73a5e8fe1cf93089a28fa3767db660eeff95a045c542faef3d7ea68ecb29bda2,2024-11-21T03:37:38.320000 CVE-2018-0163,0,0,385e240c6fcb9c6fdfb869012d789a1dd276f21f7bc4a40a9a9cf88a47adfe8b,2024-11-21T03:37:38.443000 CVE-2018-0164,0,0,edccbfc6e437f05392a7ea8ef6617b9538ae1764329def397ae64ff60b95831f,2024-11-21T03:37:38.590000 CVE-2018-0165,0,0,39e1b06a7da45923589d0b302e6ceac0ab3b7cca4aed1cfd13d014d689da2f25,2024-11-21T03:37:38.727000 -CVE-2018-0167,0,0,37dc05247db682841870a1c24847f3742e15e7520973dcce9c7d56111df8a1e6,2024-11-21T03:37:38.867000 +CVE-2018-0167,0,1,568388a7f91d388fa78ce3b50d80c0c21fbf23d4877a5af8fd15629b06f12d4c,2024-11-21T03:37:38.867000 CVE-2018-0169,0,0,c3731ad58d7e6463df04065f8e05c9aea024acbe54c622011d6f1d9bd294bab5,2024-11-21T03:37:39.020000 CVE-2018-0170,0,0,fa30239fae57076d1d15b2a91c01d4d60dcf5dba790f13b0c5842a1dd87ebbbb,2024-11-21T03:37:39.147000 -CVE-2018-0171,0,0,894a4ea3f6f5e55fe000caeb93b61e934f051d8bf40be249062a3a3d1e7b0072,2024-11-21T03:37:39.277000 -CVE-2018-0172,0,0,13f3440f5fc9abc097191c292a96f64d374d25ba0c04610e29ecafc8af613f73,2024-11-21T03:37:39.413000 -CVE-2018-0173,0,0,f54d0fc4cbb16b3e641bcec38e929433012865e3fc3ff62962e8ffbd6b2955eb,2024-11-21T03:37:39.563000 -CVE-2018-0174,0,0,94b5706e3aee72ffe0ca16342815eb1034cf6fa6054e9e8185d1755c8c98c05f,2024-11-21T03:37:39.727000 -CVE-2018-0175,0,0,ca9c864d6f13c8846c36e5b6d548618949e1b54ab6b45886d592d375d51c2064,2024-11-21T03:37:39.897000 +CVE-2018-0171,0,1,d453d3c3d471bee57a8a85e7f0ab0aae45d9082ef9a0a3c6b32f0314de1bcbcb,2024-11-21T03:37:39.277000 +CVE-2018-0172,0,1,a64cc32c308fc41fcf8704722deaf60b578d9da75574d9e8541303789f6bcd98,2024-11-21T03:37:39.413000 +CVE-2018-0173,0,1,e229b6eae82ed3c286c1d74b887ed09ab842b8a2d77e8280b2b6247cb20022f9,2024-11-21T03:37:39.563000 +CVE-2018-0174,0,1,11d0b1121211a10463f7c96c789c13cd57cd9375165025e8ebd0a495ebfd2adb,2024-11-21T03:37:39.727000 +CVE-2018-0175,0,1,4ae4b8110202a54cee6342aaf408142abf4e66e3da753cc5e8cc1a94792e8413,2024-11-21T03:37:39.897000 CVE-2018-0176,0,0,1c4f7ee2f1ebb08b6104f79c8899dc731999f813eb03c7fdf1e632c7ee4601cf,2024-11-21T03:37:40.057000 CVE-2018-0177,0,0,028ccdb5a9b977d0426e9b32b935090f5974c331431bfb395d45f663a991fbaa,2024-11-21T03:37:40.253000 CVE-2018-0178,0,0,fcc0266b77ab1fc75799d82f6a7c6e59e18c4d0d7343eda561cb6c3bd85d71f6,2023-11-07T02:50:59.347000 -CVE-2018-0179,0,0,668f2d78e465f453b39f8c30e38534c90e1324ba1900477c3971e2670bbc1746,2024-11-21T03:37:40.420000 -CVE-2018-0180,0,0,6a67b0b78fea35b42b13c95a94942cff04701d296bb6dafc1a972b6e1ed5c8e5,2024-11-21T03:37:40.587000 +CVE-2018-0179,0,1,f157fdf7f522fe1e7559daf516adf29db52ae66717407c6e3270b2fa279cec21,2024-11-21T03:37:40.420000 +CVE-2018-0180,0,1,e00991c5011f4c6c0b2b9e02caff80102806fcce5b65d3dff0c16228633257d1,2024-11-21T03:37:40.587000 CVE-2018-0181,0,0,92b027dedabc4b2dc31ff75d8783ed355603883026bfb4fcd2424351bfae3be9,2024-11-21T03:37:40.750000 CVE-2018-0182,0,0,a7ad9d56fe316f20a76461bf9cb508bbf57ec9076ae8ae4ff0ed8b5e8c69cbe2,2024-11-21T03:37:40.887000 CVE-2018-0183,0,0,ff2f440ee0767ee806268a89047caf476c85fbcdac1ab25b4d1356992e6d1246,2024-11-21T03:37:41.013000 @@ -110042,7 +110042,7 @@ CVE-2018-0292,0,0,0b1ecff849545c7e9ac657851f116b8eb559e0312ad242636a6591c2d3a4a4 CVE-2018-0293,0,0,3083e77d9090660c919d9eb2fd50e71f04053851043855ea32f64192d7297d28,2024-11-21T03:37:54.813000 CVE-2018-0294,0,0,93f3f6f627882212d6360204695236be8830acbfba05d70d5ced08340c188f34,2024-11-21T03:37:54.957000 CVE-2018-0295,0,0,4c16a794447c8895ad857b1bbeae428d6e1e780c13343a7ae0a1acc93059b2b7,2024-11-21T03:37:55.090000 -CVE-2018-0296,0,0,f356a66a61a4f41a6026c59a8c1d62e0f9b12ccd5c906001d03749758ba38d29,2024-11-21T03:37:55.227000 +CVE-2018-0296,0,1,611c447d854f3cb08fec22d0470036eda7a7f57378802cb9f52aa7611ac7f78b,2024-11-21T03:37:55.227000 CVE-2018-0297,0,0,cf51af771632a289a0bc369aebb09823ebf8e148bee6c7196d6210a59123a6d7,2024-11-21T03:37:55.373000 CVE-2018-0298,0,0,b71fbe54af4361c36f741ac166523690777ec8d1305561b319a2482066caaf66,2024-11-21T03:37:55.500000 CVE-2018-0299,0,0,0e83e7d33ca7e1e7f2eef64222987fa1a977e16221f472ca55b3fa003abb5969,2024-11-21T03:37:55.623000 @@ -111171,7 +111171,7 @@ CVE-2018-1000857,0,0,bbff1f6caeac77e463e8132c696d637acbdfbda8b4819d52854763ab250 CVE-2018-1000858,0,0,719a3aba3d9273a11ef430daf2249120aa360901def7cfd775778eb141bff53f,2024-11-21T03:40:30.710000 CVE-2018-1000859,0,0,0379ba721739945bc88bc45ea1b69525cefff3738173e629b266eda7713ec3a7,2023-11-07T02:51:14.167000 CVE-2018-1000860,0,0,ee6332a4b4fe0f3988335236f45ee6596840ca935d0641296f01e032c1c75e87,2024-11-21T03:40:30.883000 -CVE-2018-1000861,0,0,22551076a331c71ecef89d4ab865721e099d68340b103cd1ef96f3853ec32d52,2024-11-21T03:40:31.030000 +CVE-2018-1000861,0,1,eccefa1ecf10432e0a5a05c3ba66b026041e03b4b84acb296c311ee8ea3ab234,2024-11-21T03:40:31.030000 CVE-2018-1000862,0,0,0b5623126c4c2c570d68d3d691f4c27b26ecd06cacf8661f457c44910a0d771b,2024-11-21T03:40:31.197000 CVE-2018-1000863,0,0,4cd52a95c2f6a8ff7b64ab38f6520309b679c0b819d2e5e972e2067377c02455,2024-11-21T03:40:31.350000 CVE-2018-1000864,0,0,bc37a8f023e5095e3119845d74eec2fa872cec65aa8066a5790c38674ef71928,2024-11-21T03:40:31.510000 @@ -111672,8 +111672,8 @@ CVE-2018-10550,0,0,5c44a5b120c1553befdb3451fd84bc0d762a36812d2e8e77719a0796b61ad CVE-2018-10553,0,0,44750b683e35eda64489bb3f7250809fa70f47dfb3bfad52443ce1e48897cb76,2024-11-21T03:41:33.117000 CVE-2018-10554,0,0,62d77c77bbc83537edc6c13aa9bd1ac84c8d0e8668f08fbb6a35d7527f4e3266,2024-11-21T03:41:33.270000 CVE-2018-1056,0,0,762927b7e5f4456ed0e29cfc52a5e67f1f8f69080099349a6c09414a88f40f2a,2024-11-21T03:59:04.990000 -CVE-2018-10561,0,0,b4a6b9728b99ef365235962250218a434828cd24ee8ea8ad407316cf8795d16c,2024-11-21T03:41:33.423000 -CVE-2018-10562,0,0,7ae5d7d67e71668b55a22dc532b824b8373497d5e00b774ea401a8d91b7a2b5b,2024-11-21T03:41:33.600000 +CVE-2018-10561,0,1,a09bd78cab08e65ff31fef76258ac2e1c66e3020ede40ed059681b1d560f83e6,2024-11-21T03:41:33.423000 +CVE-2018-10562,0,1,53a84087a447b3614ddb407874aa36f2c49dfe62683d87dd225f588d23492cfc,2024-11-21T03:41:33.600000 CVE-2018-10563,0,0,bd4d4c366c874e7eabeee4db9f3325de1403473f96480bbde2ca58fbda04842b,2024-11-21T03:41:33.750000 CVE-2018-10564,0,0,d53db1104a16f166dd8b80c1424031108f95577ef1743aa1269ade879afde85c,2024-11-21T03:41:33.893000 CVE-2018-10565,0,0,aa56410f3d808a84b7421b4613176def76efb4d6e8c315f9392b326740cbbdf2,2024-11-21T03:41:34.043000 @@ -112196,7 +112196,7 @@ CVE-2018-11134,0,0,52b1be8f17c0e5c1650f07eae0af8cbe03e3d68216128f9a9f7e02ecdfaba CVE-2018-11135,0,0,1c5640c524beaab2f5f22d3026f4a169b98a7347bd7617f30507c6be35af0a45,2024-11-21T03:42:43.653000 CVE-2018-11136,0,0,525c3cbd887340c440622fef15ae9f3005dff4dee58755893c929073f1b4507a,2024-11-21T03:42:43.790000 CVE-2018-11137,0,0,acce0372c87bad9c1689faa7c544bf47d9fc121300af4c51b65aacaba9eb84ba,2024-11-21T03:42:43.923000 -CVE-2018-11138,0,0,f75bc55ea60fccfbea11217f0bea0c4f746bbfa08c97d32955aa6a217df185ad,2024-11-21T03:42:44.063000 +CVE-2018-11138,0,1,88a4ce14cbc39834497ba5dcc527b5551b0054fce5ee2dc79cbd5c92f976b450,2024-11-21T03:42:44.063000 CVE-2018-11139,0,0,98465a2c912f86e70e610fe962ff81bd391db20e0c8786ccab7f10c79484bafb,2024-11-21T03:42:44.197000 CVE-2018-1114,0,0,8c00acb9b14e412191aec440349e026099850d07a4ff3e6577efd12e859779e4,2024-11-21T03:59:12.630000 CVE-2018-11140,0,0,b0a6ba31ceff7144e86bfa3b4127ca577a0660448f5aedd541c3f5551de305ce,2024-11-21T03:42:44.333000 @@ -112800,7 +112800,7 @@ CVE-2018-11772,0,0,bbc7c30a7a0dbf68b0b90bb283675f793f5ca1f4e3a039b1822fa44a73518 CVE-2018-11773,0,0,394662b584968d1becc4f8d81385073f49d8f78c9f6140041454650380f7f35d,2024-11-21T03:44:00.300000 CVE-2018-11774,0,0,822bef8ddf19c36cbf00f977ee53f186948cc782c6d8fdf7c393b7b77d966ac1,2024-11-21T03:44:00.417000 CVE-2018-11775,0,0,8203037f4ee091b6bd01c6f5d5c9e79d0ac462269416f12e9f8ecbdcb6c69575,2024-11-21T03:44:00.530000 -CVE-2018-11776,0,0,2dce229cc210187a34ffec677c208d594c00919966d04355161a9ddcb3a5749d,2024-11-21T03:44:00.740000 +CVE-2018-11776,0,1,077403adedbed66cc33c2e214fb47938a9fa21d798a04e2b8f583571cc191b81,2024-11-21T03:44:00.740000 CVE-2018-11777,0,0,f8e35d29ef5b091c978fe0e14c00f55d1a1aec0370ac51e551802ff5a2b483b7,2024-11-21T03:44:00.963000 CVE-2018-11778,0,0,3f0570ce1618833ee0231293cdd9c55497b73039cbe76b9028bd9ae5699c0396,2024-11-21T03:44:01.080000 CVE-2018-11779,0,0,6c5f33b2869d33be777d9a8177c1f167b3bbb39ce75e3f5609085f7b4b11593e,2024-11-21T03:44:01.203000 @@ -113676,7 +113676,7 @@ CVE-2018-12714,0,0,cd141d2a9f0273e56f060fcfb102f351a2535700f7285c5bc15d99c2e921f CVE-2018-12715,0,0,4a016da125727b8b320f728925710949dc1f6ca4e77f90d32323d87afafe6360,2024-11-21T03:45:43.737000 CVE-2018-12716,0,0,c92b19a2a7af2b6000d3d1df0dd87dc2007e3384b12bafa396aa189cd6d345a3,2024-11-21T03:45:43.903000 CVE-2018-1272,0,0,acf734948d51dd0c4f8935027315e7f2d7df3a2f2bd2a8aa7532b922cc87c2c7,2024-11-21T03:59:30.877000 -CVE-2018-1273,0,0,d03af6445333489883513964e950985fa3d49b979501bb1e72826f2de8ec1ed3,2024-11-21T03:59:31.063000 +CVE-2018-1273,0,1,6a546022835d7df3cd5c5f28df24a2df4b781c802bd1585dc5f67e57af1e2d83,2024-11-21T03:59:31.063000 CVE-2018-12735,0,0,2a3d0e665591df32512c2617ad1c8efd167fa2b0025484042cab54eba97a59ea,2024-11-21T03:45:44.063000 CVE-2018-12739,0,0,c1531ae8bd165da7d9ae46c00e0eb52bb5622035b7d56dea0e848858185075dc,2024-11-21T03:45:44.203000 CVE-2018-1274,0,0,cf4f68c22bb3a6d88114bf5373ddce7b468dcc524302af25e2b832fdd1f8e746,2024-11-21T03:59:31.210000 @@ -114247,16 +114247,16 @@ CVE-2018-13367,0,0,da02452c390eab7e131ef190aa5f713288a3193bc72eb430bb1ea9e26e65e CVE-2018-13368,0,0,599991ccb96169914173ed521b91e3ff1853fd7bcacba691a6fa415f74184071,2024-11-21T03:46:58.447000 CVE-2018-1337,0,0,1a0c3762cb8cdc0258e66242893bf4bce9057b6f39a834e8870a30e1929a5e03,2024-11-21T03:59:39.153000 CVE-2018-13371,0,0,5798eaf81545d8fdefce2386a42bc8fdbb95a24cc366cc1dc2390885bc44de45,2024-11-21T03:46:58.567000 -CVE-2018-13374,0,0,dbc273a40d76c42e2c63b7473f85cce97c29e0713396b45fbca35f4ce2278d69,2024-11-21T03:46:58.687000 +CVE-2018-13374,0,1,0410296e88866295286064bdccc9f426322c1d0ef67bf951d82dfa5a9203f996,2024-11-21T03:46:58.687000 CVE-2018-13375,0,0,39f632d5afe292b7c4cfecca2235512baa287a0de944201f6697da19c0250ef1,2024-11-21T03:46:58.900000 CVE-2018-13376,0,0,67c03a4233fc20590a9daae50f9718a6c701b59b7b214c82c4446827307d36da,2024-11-21T03:46:59.020000 CVE-2018-13378,0,0,a2f6f6c79fa10d82b1d19940324e6ed7cec755e578dde59b5460620af8a6bbf6,2024-11-21T03:46:59.137000 -CVE-2018-13379,0,0,b0b8508aff357aa970812c8ac36b011fb0e91ad879244988e1299649a8318827,2024-11-21T03:46:59.250000 +CVE-2018-13379,0,1,a1c456ac2d9fd5666b46a0f5150e7e8af61c831f4ade34ba82f6a1bf575166d7,2024-11-21T03:46:59.250000 CVE-2018-1338,0,0,834b2bc6267c275ca8915b0462fc62bc44bca250b3ddc4144ce5c5bca07da53f,2024-11-21T03:59:39.283000 CVE-2018-13380,0,0,f2a05655b527e91f688c04dcfa5c0f702d33cebefa6beb95d6d3216c7962235b,2024-11-21T03:46:59.383000 CVE-2018-13381,0,0,9078054143be03fe17cea43bcc2db84e57915ac373e4bd60eb0f44147927964d,2024-11-21T03:46:59.530000 -CVE-2018-13382,0,0,fe1da80d92edf4894d5289b4452327224f219a4c801068cc7b01fa23f7c6026d,2024-11-21T03:46:59.660000 -CVE-2018-13383,0,0,25aab5d986b7124e000671ef53d1199bdfce00c8a89bb4e87c89539b1a85e9c2,2024-11-21T03:46:59.807000 +CVE-2018-13382,0,1,2b03a89e67b642628bfa2d9627fc82832507da1a93ecf746472b8e504ca4608a,2024-11-21T03:46:59.660000 +CVE-2018-13383,0,1,a3a943fabc24e9fd8edefdeb6eefba634f0909ddcf301f72c68757f36ee5ad5d,2024-11-21T03:46:59.807000 CVE-2018-13384,0,0,46275e730029a6ea8cee6c09ebf0f75c186ad7792df7ec4f2f419ab587b098ae,2024-11-21T03:46:59.950000 CVE-2018-13385,0,0,accd721cc22be15b35ce306f59e5ee54ddb357dfc13fae8f5fd5d284404413d6,2024-11-21T03:47:00.070000 CVE-2018-13386,0,0,5866aca09a2c5ab6d8b586d939abcde6f7d1a2f2a1680a450e78d22ec297accb,2024-11-21T03:47:00.193000 @@ -115247,7 +115247,7 @@ CVE-2018-14550,0,0,99c0db74db43e5443cbc9cac7d0f5e6911d5b8ea377d685a015e7ebafeb63 CVE-2018-14551,0,0,1f19f905b662ca1e1211748de9f0de400587e766778a7ae1aa72726d2ad8228e,2024-11-21T03:49:17.997000 CVE-2018-14553,0,0,b6b74001b2d7004ef7003afce5a73a5c2477e2c39760f6b12b89ae194a7e3127,2024-11-21T03:49:18.147000 CVE-2018-14557,0,0,b5e4dc02e9e11e37916a7e28d35e29c6b0e06bedff7b8e148c75fd6078ac2cc8,2024-11-21T03:49:18.313000 -CVE-2018-14558,0,0,29f906409fd8aea417f12916bb2648a1765472d84382df3fb16c2588679632a8,2024-11-21T03:49:18.470000 +CVE-2018-14558,0,1,0d8a31df5c46f0bdb2c0a504945afff27b346c4496c925df4e078bb09b1434c2,2024-11-21T03:49:18.470000 CVE-2018-14559,0,0,6db4f73f9af2691e88c20fda2da2354892e6e8e0acc853164c4d546cbabf847f,2024-11-21T03:49:18.637000 CVE-2018-1456,0,0,31e9d2940ed2b773662bb48db0b75832e2ef817efcccbc8aff6f9648fbc92888,2024-11-21T03:59:51.323000 CVE-2018-14562,0,0,f5242b98ddcbec6109db88598fb47c79bdb99811dc46e7a65bea305be3ae17b9,2024-11-21T03:49:18.793000 @@ -115313,7 +115313,7 @@ CVE-2018-14624,0,0,36aa1b2ecf39b6dd6b0c6e9b17b748b71239ead4beec7fe32161e43f01ea9 CVE-2018-14625,0,0,ae0b1384e52a2313f8e935d0fd7b4d74e4857f031357615f7ccef40b4cececc5,2024-11-21T03:49:27.037000 CVE-2018-14626,0,0,093eab743947661f9b3a1e8eab9fe5da6af49f7bdb3ea04c7527d28f39ea1caa,2024-11-21T03:49:27.180000 CVE-2018-14627,0,0,5753c9d1dc5bee4ebd6218ed4faf7cedfc289787c4083d05abd7ba662d5cc11f,2024-11-21T03:49:27.310000 -CVE-2018-14628,0,0,6c4830a37bccbf7f2435c12c8d3eb8658f1cf3b3aedd4fc3f40178b7949adc6a,2024-11-21T03:49:27.463000 +CVE-2018-14628,0,1,14cf740679f8b2f5f0d6af3830b14468f74b971c053a16c251c1f1b041ef1856,2024-11-21T03:49:27.463000 CVE-2018-14629,0,0,801ba65c1f5d9ea5b9a3b32f4e8ccc29f4fe913d98e2bb050a226d846d6e9f9b,2024-11-21T03:49:27.623000 CVE-2018-1463,0,0,294af0f142ee75e0a12d34fc1ae7b029ed6868203c60374a3e80ed244b30c681,2024-11-21T03:59:52.310000 CVE-2018-14630,0,0,dcc6c28dd65b4f7eb72f0a646c026d0da64d998b71c4bdb1f8e8b92654b0c126,2024-11-21T03:49:27.770000 @@ -115356,7 +115356,7 @@ CVE-2018-14663,0,0,3b13ce69e552d1e341f0a6135f1c1da2b9ca7d062ad152ef1d59ce5a2088c CVE-2018-14664,0,0,d39730f8033a2ee7a627fba81a3b8019307724436543d9d2cb40d88008e52fab,2024-11-21T03:49:32.650000 CVE-2018-14665,0,0,076451960ade3536f9d666010e5c551baea1fab44f5aa6146af2a79687fc0f8f,2024-11-21T03:49:32.780000 CVE-2018-14666,0,0,0c9776b13d8fa436f05620f3d8ffe2122284ffe2d8e2e104768b720285b6f299,2024-11-21T03:49:32.950000 -CVE-2018-14667,0,0,3c4060883207e3f1737eeba3075400dfe869788e3655ed93ff8ba6f27468f533,2024-11-21T03:49:33.110000 +CVE-2018-14667,0,1,0c747d51af09f59a0adf61c9d5c6cd79bcb80b0c69fba4f92a0c96e0ea2e4034,2024-11-21T03:49:33.110000 CVE-2018-14668,0,0,b1224362594016e9bbdbb4731219426a0c57ec4849dc9b392662fa54f08dadf0,2024-11-21T03:49:33.270000 CVE-2018-14669,0,0,4fba42e06892797b986b766bd6423f896c6635396fd8c7891f00085665e52e9e,2024-11-21T03:49:33.407000 CVE-2018-1467,0,0,c5cab70823379f84ff9be38094e9fac3f9e9fa5210966d2386134aca48101f75,2024-11-21T03:59:53.023000 @@ -115506,11 +115506,11 @@ CVE-2018-14835,0,0,190d973bd78d90054ba29d45f550b3307c7e6f792d3a906658e0eb4179eb6 CVE-2018-14836,0,0,de8055a0b966e0690aa1255bc04bb19e27faa4dde89cb38270ac7b73af8feb78,2024-11-21T03:49:53.800000 CVE-2018-14837,0,0,a2bead3651f50701c2df06485fc9613131b9e11ded2901f04cb105fb656f3f0f,2024-11-21T03:49:53.990000 CVE-2018-14838,0,0,99411cf917f8e4a5223a7b1a78823fb7193ad3091e1b9d4965c085c5a6f40b92,2024-11-21T03:49:54.140000 -CVE-2018-14839,0,0,9d324ca7035eca186fe0f5e1ce3e067ec9abe115c0762c8be4bbfe40028395b7,2024-11-21T03:49:54.283000 +CVE-2018-14839,0,1,e7d161931b3aa8a435886ead6f28e2ad4c56c9fa68ab71e3ad9c15ea1900577f,2024-11-21T03:49:54.283000 CVE-2018-1484,0,0,c765fd6dc0b84f8226c0d591b46daf84293bcf20030995b976a75292e1681650,2024-11-21T03:59:54.593000 CVE-2018-14840,0,0,dc7c002c43161593cc84e015fae338d80bcde28eb11780694796c8b149559be0,2024-11-21T03:49:54.433000 CVE-2018-14846,0,0,bd59f5da06a462d833c436b679f02146dbfca818a82a7d777ec428c3a2af8cb0,2024-11-21T03:49:54.577000 -CVE-2018-14847,0,0,72e073510e7ac439c0a00a782fb6c3495c461794934b2624806a4e03b2b3d3bd,2024-11-21T03:49:54.730000 +CVE-2018-14847,0,1,f3f0594c4673701626566c91f160a39bd4ec2d102ff225946f6d801cd8741de1,2024-11-21T03:49:54.730000 CVE-2018-14849,0,0,1e9740acfcc9049918502bf42641ec9cd378c0af3a5bef3927544d5f91a76a08,2024-11-21T03:49:54.933000 CVE-2018-1485,0,0,392b2e10a905618465cd90fbeaab40c9f160487dc79710b15b77216674d9d6ec,2024-11-21T03:59:54.713000 CVE-2018-14850,0,0,a561a9d513c85992a7e19a1750d957556158a439abf07164f47afc33d051b901,2024-11-21T03:49:55.087000 @@ -115686,7 +115686,7 @@ CVE-2018-1513,0,0,6cda270e22bc115129fb7cc8951ab25c70103e7808dc5c2d634f430d372e65 CVE-2018-15130,0,0,7de56146f245a65b86b19d9825d4ea7e5b1c6e25b5be9aff7ce173d630525086,2024-11-21T03:50:22.250000 CVE-2018-15131,0,0,b9d55bfea7d19e65f86f8fe245d01831be4b7b53d6b79a30ae91e11182e1b51e,2024-11-21T03:50:22.400000 CVE-2018-15132,0,0,a674515e901bc12829e5dc19a54327b8ced3f32b41d11ea79b1b56e1639b7105,2024-11-21T03:50:22.557000 -CVE-2018-15133,0,0,e51ff0c54f31796628de9c42ca1d7429a13ec0994b9ac9dd072f672d37ce50de,2024-11-21T03:50:22.720000 +CVE-2018-15133,0,1,5aa1879ee75985c6a0607a0e0b4372e5a16412c6ed115e0f2dd9fcc1e3346797,2024-11-21T03:50:22.720000 CVE-2018-15136,0,0,ec32920866b3caf7f95e7b73ea601002fa286d3c02fa93191be3270046396af9,2024-11-21T03:50:22.870000 CVE-2018-15137,0,0,71fc17076a1dc630b4fd600e78df68560a1e899be7cc8de3f73e7b4df8a31eb6,2024-11-21T03:50:23.037000 CVE-2018-15138,0,0,72f6971caea73fa4974403b30aa335acbeac5ffe674304e54bc8413f19f145ec,2024-11-21T03:50:23.190000 @@ -116238,7 +116238,7 @@ CVE-2018-15807,0,0,4860614cde85e0da34784a34d1164133dcee109fa857a1d60d0bf8ae79b49 CVE-2018-15808,0,0,455d016e838e06912ba454dbc791b32313c6dce517a5a90a513152cae9a1cf43,2024-11-21T03:51:29.257000 CVE-2018-15809,0,0,d16fc4ec045ff884ac854a3295369387cc90fcfaf38ac1f078e3532c4f171b3c,2024-11-21T03:51:29.397000 CVE-2018-15810,0,0,c6fa6edee7f866d094f9f9f4cd68ea2fddd6850ba36412320a4439f6e9695a5a,2024-11-21T03:51:29.550000 -CVE-2018-15811,0,0,7a67eb8f306c4b37d71cb9b965c68a98e84543e5cb054eb087d1f79be2acdd9d,2024-11-21T03:51:29.710000 +CVE-2018-15811,0,1,cc38408247d7aef00ccab549f1751f5ae3facf2f14c2287b16edb41d9fa26780,2024-11-21T03:51:29.710000 CVE-2018-15812,0,0,aa48b9c7a99f71771f1ad1123f7f4d0f9d04fd2533dc0d140bdf0a1b07ecab3e,2024-11-21T03:51:29.867000 CVE-2018-15813,0,0,eeee8e2865764565421fb3cb76851a575dd32b95666b6744fb9f429381d54523,2024-11-21T03:51:30.023000 CVE-2018-15814,0,0,1a1c1d94303941d4f6e8b2bbf713356b09dc58da2f988827b40d4a22ad567104,2024-11-21T03:51:30.190000 @@ -116371,7 +116371,7 @@ CVE-2018-15957,0,0,57a0b1480d8b8f522bae870ec99aea38b515c85fc81dc08b228ff3ede20a7 CVE-2018-15958,0,0,0f85c77372b6b59d96ac689eeafe11b08e16e9412f51ee8c5179ac8ce2e31bfe,2024-11-21T03:51:48.273000 CVE-2018-15959,0,0,d413549a4bcc41d7d4d7227e3efd9f81326d6fd8e25b9e128ab36d9f2472cbf6,2024-11-21T03:51:48.433000 CVE-2018-15960,0,0,a4820e78d3f3ff49c05bce547803a74dc7a101fd9f753a1b3f5d6ac75e1e681a,2024-11-21T03:51:48.560000 -CVE-2018-15961,0,0,de49fe6768e346495a8453a4b6bf55e23489d837887523f3afc0f5a3f6fdf93c,2024-11-21T03:51:48.683000 +CVE-2018-15961,0,1,4ff5d1aaeba1610773651a149a94dabcf09d42be21d25deb7565722faeac5244,2024-11-21T03:51:48.683000 CVE-2018-15962,0,0,9e452596abbb0d3bce7f467ca3e73c2a0226823c3b1aedef08ee33fe22539f55,2024-11-21T03:51:48.813000 CVE-2018-15963,0,0,8efe13732c3664978942474b6dc4c636a07837aebb800ae09e901c02d472878b,2024-11-21T03:51:48.943000 CVE-2018-15964,0,0,032759fe99a6eda628ffca69ee2f4ccb25edc2b9b087b276029eee86257ba6e3,2024-11-21T03:51:49.093000 @@ -116392,7 +116392,7 @@ CVE-2018-15978,0,0,db08bf76b00332d21cfe417da39c5ae8dff94bd6aaf69420d74cab41633e3 CVE-2018-15979,0,0,a4dd1cddd1ec767fd2637b7b32089e7cda0034c6672c2f9b485620190a36baf5,2024-11-21T03:51:50.797000 CVE-2018-15980,0,0,980da1df13df5c628ef36db25e0cfb01beac832d41e51c6bdfcdb68b20ca74d3,2024-11-21T03:51:50.920000 CVE-2018-15981,0,0,e35dd91e3cbab0af2b55692b6513a001ce14612b5dad9a7238472c49329c49dc,2024-11-21T03:51:51.040000 -CVE-2018-15982,0,0,220637f34940cb0cd8cbb90dc7739a6c25fcc91467f9280c09c314c60c182bd9,2024-11-21T03:51:51.183000 +CVE-2018-15982,0,1,061512f05f11ad12ed0b0f2e88c8ebc435e31ee323c8522150d6b8a297cb286f,2024-11-21T03:51:51.183000 CVE-2018-15983,0,0,47674f4b78f343e8a7259e60c066fccc9e9ede65c818e936a21dd978dabea447,2024-11-21T03:51:51.340000 CVE-2018-15984,0,0,cf63ed8c1fd64da3554eec279a25e9aba297aa77f227b4d1d736e5ef5bacde20,2024-11-21T03:51:51.463000 CVE-2018-15985,0,0,321e2650cbc4a6636f7dd73e3ac9a5c439545bf0b9c325bf6390ac79fb96ba20,2024-11-21T03:51:51.597000 @@ -117675,7 +117675,7 @@ CVE-2018-17459,0,0,01667fcf40f4afd58354e38c26130af139dcd0605eb3148ed6ff5b403fe9c CVE-2018-17460,0,0,101fb371c6a177f13942684b9b8431c334fa9b769774866138f9caaa7f94fff3,2024-11-21T03:54:28.183000 CVE-2018-17461,0,0,08e94a9f8b2c0e111cba3b1e993843050bfee9e16729fcee062cac3c222c1ef0,2024-11-21T03:54:28.300000 CVE-2018-17462,0,0,0f38ee64ade5675c8c7659e22612dee11f0c46a14e4775d4e46cf17fd01feff6,2024-11-21T03:54:28.417000 -CVE-2018-17463,0,0,08988105f1264e422ec0e50534a3406b21d9fc963657344b8ff7700cf40ead14,2024-11-21T03:54:28.550000 +CVE-2018-17463,0,1,b440d1647a3507833d9247458ad6dd32d6172f0530e606f21cdbe0ae9c131ca6,2024-11-21T03:54:28.550000 CVE-2018-17464,0,0,c548efa1995e58d97e68bdebda14642d2421e787b72731d7c363a5950c5dfebc,2024-11-21T03:54:28.703000 CVE-2018-17465,0,0,61bf7c13a28fb91b007e833a8b545f7c7406cab9cef3d683611550623b865d06,2024-11-21T03:54:28.840000 CVE-2018-17466,0,0,2deb66fce5ef461e44fedc1d7c2744ce380a5a1a5eea9b876e97a1c96a3fd0ca,2024-11-21T03:54:28.967000 @@ -117693,7 +117693,7 @@ CVE-2018-17476,0,0,b82e2586d31ff96e7ed50d9b32856cbcf064f3fc9c20e2d0340fb82cfd8cb CVE-2018-17477,0,0,62c76d413d0f58ae5f5b2bee9a0114cda8658fe7ab93ec9845c2b5dba5ee3fa3,2024-11-21T03:54:30.373000 CVE-2018-17478,0,0,57f313c3ffbf31c83ffe86b2f8a6c7aae3a147584a1a7cad9f105ca5e1111d8d,2024-11-21T03:54:30.493000 CVE-2018-17479,0,0,c76681d8118fafc2babcee23dcfa90a9c1484876a611e662828819ad714ffe25,2024-11-21T03:54:30.610000 -CVE-2018-17480,0,0,6a975aa36ec7c5928ecaa783d4174bc0c619f5ec2150a7796c71807e907f0213,2024-11-21T03:54:30.727000 +CVE-2018-17480,0,1,bb42631b9156fdab49a5eea3ad70e339b1481e22337fdc1dbc6f21bd8f8a77a9,2024-11-21T03:54:30.727000 CVE-2018-17481,0,0,9741e539125e44a47705c78676f45007a9687377dca966576cd1dbdcb1fc73bc,2024-11-21T03:54:30.877000 CVE-2018-17482,0,0,499d51e536f5d530705788d87899b5e2e8ba06842bd8f6d2e456e0c8448fa49f,2024-11-21T03:54:31.010000 CVE-2018-17483,0,0,a70a6e7d0433cb2df7f68c5a06051d6c4e07fa9f804e81f0166a2b0eb1829002,2024-11-21T03:54:31.133000 @@ -118332,7 +118332,7 @@ CVE-2018-18320,0,0,97ef2131e3cf9d5d09d7522df5c0f116618a7d18e5a1434a7b0739869774c CVE-2018-18322,0,0,3ac5b0f2536f99c6b307b260d1a55cde391a8faf9e3fc736535c9ab4e3b5d2a0,2024-11-21T03:55:42.483000 CVE-2018-18323,0,0,4d898a4c393c16593efb56b95759cb197bbf4dcd3f95abb7dbd9c7c9428c7760,2024-11-21T03:55:42.640000 CVE-2018-18324,0,0,9c0c3ee8983950689ca89d0570c1a9e31ca8718e87fd93485d7bd8b7254f31bb,2024-11-21T03:55:42.797000 -CVE-2018-18325,0,0,c1934c2666eaa4c699789f9a413e83a2fbab024e426967ea14f99ca3f60b7525,2024-11-21T03:55:42.947000 +CVE-2018-18325,0,1,287f5d89bbe8ea6a69b6e0b947894b1d3e82555f78170008c1701c4905aee4c6,2024-11-21T03:55:42.947000 CVE-2018-18326,0,0,db8f6cdd70338e3bbc4bc3623d3cc122d1e6769392767c9b840dc685704c6110,2024-11-21T03:55:43.100000 CVE-2018-18327,0,0,4566d95fb908418b3cf19ef5d0605251696471933c9dca1d2ce4ff8ff122a4a8,2024-11-21T03:55:43.250000 CVE-2018-18328,0,0,e4a1f93fd883ec209b4d0fa5026795c497287e16fe37865c3e21fd92f95f9bb2,2024-11-21T03:55:43.377000 @@ -118740,7 +118740,7 @@ CVE-2018-18805,0,0,2db81a01612ed9e3856f356a3c3acc08d34cd7fc3cde4b581bcd34fbfedf1 CVE-2018-18806,0,0,73874c1f55650c40c9168d198e4836e0f63cefb447851013592ce8a915a8755a,2024-11-21T03:56:39.300000 CVE-2018-18807,0,0,b1989c9fe62e7e09dd964f1d78e89e460ce9aeabc99e266ef78548b2dd93bbfc,2024-11-21T03:56:39.450000 CVE-2018-18808,0,0,448721dd4dd376be6c2c2ac2714db93123c38306ceb5b77980ed8091dea0390c,2024-11-21T03:56:39.583000 -CVE-2018-18809,0,0,72dd5b87edde29da86658a9023baa17361f8f9f5883aef22338a1f4d4fb2040e,2024-11-21T03:56:39.727000 +CVE-2018-18809,0,1,139f5f471c0597fca7109ddc1f62ed4ce5a7082ceea16430e3ff08dbad3b02d4,2024-11-21T03:56:39.727000 CVE-2018-18810,0,0,dbacb0866951533402200f938befb045e87532480da01c1259ecd77a7e5bf78e,2024-11-21T03:56:39.890000 CVE-2018-18811,0,0,5432be0ac9513880419f866c84d31f792d10091b9b65e0385e612badf8a3a45e,2023-11-07T02:55:22.050000 CVE-2018-18812,0,0,65337f9ba540463ab0da5797a8618af9d81acece865b0cad227cb9e09724139e,2024-11-21T03:56:40.053000 @@ -119173,10 +119173,10 @@ CVE-2018-19312,0,0,1c8e029b6b42c6fbc1775f11f0f40e78f95b1caf8d4d297456eee86f22261 CVE-2018-19318,0,0,ebaad92e5971123dd0293a3fffc5122945edb6b10d6bd23b576d2bc857cbc055,2024-11-21T03:57:42.690000 CVE-2018-19319,0,0,87f293dd648e8b4192b597029c0b4964754967313838c5a72b6876c930ca452c,2024-11-21T03:57:42.843000 CVE-2018-1932,0,0,6c0cde956d2725b69f80d188ae5525fb1847b4478bdcdc1191e40ccdbb95b86e,2024-11-21T04:00:37.090000 -CVE-2018-19320,0,0,57f822c99ead03b5c02c6fe6e928decf6eb6ead0815e9a03a8c5676ed0facdd3,2024-11-21T03:57:43.017000 -CVE-2018-19321,0,0,23989e4dbaf13ad8921951ed0bd3d7e5c6daac3300755c22342d5230ffdffc48,2024-11-21T03:57:43.190000 -CVE-2018-19322,0,0,55f702fb46f24ecf8017bec70bd39d29576937498bfee4d37a974f11a0edf033,2024-11-21T03:57:43.340000 -CVE-2018-19323,0,0,db44193ed92346d3aee1a12245f25c4b6871831ca6111ad9f8509430b43e08dc,2024-11-21T03:57:43.510000 +CVE-2018-19320,0,1,0dea2d1458ceafbe75a55a9b8f24f9fdb5d4cdac8a2d99d599e216c9453389ef,2024-11-21T03:57:43.017000 +CVE-2018-19321,0,1,526958171e63685a7bbd4313c58f063f933fba87732dc429c10efd6641588cb8,2024-11-21T03:57:43.190000 +CVE-2018-19322,0,1,16b177f3b88149c18695efb2af7d40cce54019e5a199aa6f90712acd06349928,2024-11-21T03:57:43.340000 +CVE-2018-19323,0,1,0ab760b69c882d39afe124ba6769dd8a80b47473ada4146ab7e6eb3817b3cb53,2024-11-21T03:57:43.510000 CVE-2018-19324,0,0,a4b3f0318092746133730405c4dd5d205cfe53944184c6cf90d024bf6c3b057c,2024-11-21T03:57:43.680000 CVE-2018-19325,0,0,b2a5a6e5fcabfb6fa759f56900963fe9f19791da60d9a95349b9cec66eb541cb,2023-11-07T02:55:31.520000 CVE-2018-19326,0,0,e77c0e353c9ba05b6fbbd0baa2d3d98edf9a7f463bf35c9be30a679470a6aab8,2024-11-21T03:57:43.850000 @@ -119832,7 +119832,7 @@ CVE-2018-20059,0,0,a51c9dc7c637cc654ff1697815121d270bdcff703f0c68f60fdcdc128d1e4 CVE-2018-2006,0,0,47aaf5fb46e012c3cfb603348c2121f9a9a743a62e7e9289ff736907f0b910fd,2024-11-21T04:03:34.943000 CVE-2018-20060,0,0,e1385d2fac30923e70f75b5e2c91f03777167fa23ae8a6a4823f87a95d33d42f,2024-12-27T16:15:22.593000 CVE-2018-20061,0,0,1f3af18deb366266af78da0ceefcafeb4c84a14e1efa3997c111e9f0e822cf58,2024-11-21T04:00:49.627000 -CVE-2018-20062,0,0,895b2a07e3ec5bb09e0b27112cf14ed238ec98899ad322b27beeb51e0922ca57,2024-11-21T04:00:49.783000 +CVE-2018-20062,0,1,9022b0d79dc2c71be5b08959b8e668d85d4ca6bfc1aec83929ea3276de0d9e93,2024-11-21T04:00:49.783000 CVE-2018-20063,0,0,34f0aa6d0bd4f9600ecd5e922724926b6fd20feacc9a5c41e95ea24a58e17160,2024-11-21T04:00:49.940000 CVE-2018-20064,0,0,db5b51f009f055b35c9ae4c72e7ff854b051d67ecaaf7e317679acbf9d48d3ab,2024-11-21T04:00:50.090000 CVE-2018-20065,0,0,b70f15819a2df13416f828d9056d4d769ce048ef842f7ebe753c4b20dcf1d0e4,2024-11-21T04:00:50.243000 @@ -119986,7 +119986,7 @@ CVE-2018-20247,0,0,1aa9f73e868d5b4182c2523c233a326dbecd7d167ce294be4707146c94d51 CVE-2018-20248,0,0,f7f470a33e49c7d8a830f2f6f780416a9da9e949f404da2c889d116426d9918c,2024-11-21T04:01:09.903000 CVE-2018-20249,0,0,f21f8dfc9ae09288fe76bfdd5984670d27a6285ef8d0858c5bcda32f2a576cc0,2024-11-21T04:01:10.033000 CVE-2018-2025,0,0,1e2822877d7f64481dc14a7a7dda6c0ceba3e09659de889e577a3bb3b9bf6bca,2024-11-21T04:03:36.230000 -CVE-2018-20250,0,0,9d54c6a66addc06e38aa6c603173e51210f0b85c0daae4b4ab566a2ee36111c3,2024-11-21T04:01:10.173000 +CVE-2018-20250,0,1,6d1454ba7b4c15e2c07ecf5c4c9a638c2d62f0115528af52a65a12446e6bc4a4,2024-11-21T04:01:10.173000 CVE-2018-20251,0,0,fa48c85f9a766b854bdaae5980a1ced0c613a22842cce70ca106ab155c903eaf,2024-11-21T04:01:10.330000 CVE-2018-20252,0,0,bf31c40ead6518c6af4a8457a5839fbc23e0c55686b6c90f69d7a1b566097aae,2024-11-21T04:01:10.453000 CVE-2018-20253,0,0,d32db67480bee21b73d266099074610d87d7d7daddc004dbe18dda1d413248c9,2024-11-21T04:01:10.580000 @@ -120409,7 +120409,7 @@ CVE-2018-2075,0,0,04ae20175fa41379533c077097f44ad5290a86f22266576bbfb9080ebffe37 CVE-2018-20750,0,0,d7386a7bc9084e2dbdef92ecfacaa2cd945e1cc8d752db23eda400648cba0cc6,2024-11-21T04:02:05.540000 CVE-2018-20751,0,0,4416da1e1ce022084a931adc64107115fa860281619c7d71dd9365a44468e1d8,2024-11-21T04:02:05.707000 CVE-2018-20752,0,0,b3f7d9989c9602731bee14b1b3f60d7bb821e5111fe0d3c0e301bc2461a867bd,2024-11-21T04:02:05.850000 -CVE-2018-20753,0,0,fe078b1d4a7c6fe1f031d0a1c82c0f6a2a9529f199d4509b49cb994541a63ed8,2024-11-21T04:02:05.987000 +CVE-2018-20753,0,1,c0c83fb4d10189fa88d5620e61d1774a6bb9a4e6de86494681790d06dc7bf763,2024-11-21T04:02:05.987000 CVE-2018-20755,0,0,e5279a0d3d1b0b2e3c42db7cf4f4a38413b717edbb48e553e13b65e2083f6e4d,2024-11-21T04:02:06.133000 CVE-2018-20756,0,0,0e08beb6173db4d859f5499ba3f2699a6e6314fc67220033fb2b6dd826f607aa,2024-11-21T04:02:06.267000 CVE-2018-20757,0,0,2e1d8a354f0c0173c35a646a69a433ac315159663d58ea9c8719b6ff2c1ffe28,2024-11-21T04:02:06.410000 @@ -121218,7 +121218,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7 CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000 CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000 CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000 -CVE-2018-2380,0,0,5028428d6fcceb9913ea988929cb5f59b1a88dd43e260c3bf51de0fbedc91a11,2024-11-21T04:03:42.830000 +CVE-2018-2380,0,1,07efae4ad9e4f53097d410b5073da10fe7fb99ae780c882598acbb7fe38beeb9,2024-11-21T04:03:42.830000 CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000 CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000 CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000 @@ -121430,9 +121430,9 @@ CVE-2018-25101,0,0,2bd8285666e4acb96b73073e83438f9de7be045d6343092b9bbb8ecde1424 CVE-2018-25103,0,0,898e59dad77386a317e4ff1bf68be33ab8be6db6918e382c5845df0e79bdcf13,2024-11-21T04:03:34.090000 CVE-2018-25104,0,0,07c0f7f8deacc6ae3510edd97c87fb0b6a5d5de0a9d91e721e0835794336db5c,2024-10-18T12:52:33.507000 CVE-2018-25105,0,0,d16cf144daafb93b508b5b5e5d66a4d924219330c977526c844488af5bef18a9,2024-10-30T18:23:57.830000 -CVE-2018-25106,0,0,35ad370f4c1c497d53dd214ed57078e196a3735bc3f2d88e16b64e910fc18b4d,2024-12-23T23:15:05.720000 +CVE-2018-25106,0,1,fc0e14b15022071865595101e3a22e1e361a2c274963cb902295c29c6e4431e9,2024-12-23T23:15:05.720000 CVE-2018-25107,0,0,e74e5f133ec4c9e42aba268447c5e4b8ad803c3cf4918fd4d980370e8a36049c,2024-12-31T19:15:07.077000 -CVE-2018-25108,0,0,9f2768c1fa9a2acb6af420c0163b871b5c2830b0a72fbf2d19d7deba4ed97639,2025-01-16T11:15:06.850000 +CVE-2018-25108,0,1,b20ffbb6cbdeced293a2d0d5632cf118c9bcd4427f34608769eddf9c049b94c3,2025-01-16T11:15:06.850000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,64c0ce8dd86b8cd41f028fc0faeb4c2703b3a3d6c99b5cfb7e065de6e8a10aab,2024-11-21T04:03:56.060000 CVE-2018-2561,0,0,03752647d2e63906688e002ddaaa7e85aba13094709fdf81fa6e8215efd59a07,2024-11-21T04:03:56.197000 @@ -121502,7 +121502,7 @@ CVE-2018-2624,0,0,0bad5cf3579d8c8dc2e67322de6e75a5bb2cb8677da7b17bd8d912013721b2 CVE-2018-2625,0,0,b529c5259606b8f293e5f00cd0e86a25635c5986ab6b7337de022a76ea2f2f29,2024-11-21T04:04:04.653000 CVE-2018-2626,0,0,90846e77ccffafb8b7ee748b9089e8268e27e6bbe4091dee3dc1b2d17cc0c48e,2024-11-21T04:04:04.780000 CVE-2018-2627,0,0,233b58cb61a9f4583c9f9fc21b9dbb655e5b82b1cf57769e010859a2e7eda59e,2024-11-21T04:04:04.910000 -CVE-2018-2628,0,0,189becbd1610fc07ade5e8d51bc5430065f0adad8eb75061c29164dbd1fefb72,2024-11-21T04:04:05.160000 +CVE-2018-2628,0,1,40efa0c04120f20564f25b42916dd7904a068a029c0b9f8877883878fa07e47d,2024-11-21T04:04:05.160000 CVE-2018-2629,0,0,0f67ff2b80904d9e581c846cda0ab6c3ec976c073885b224f9486a6f199270e6,2024-11-21T04:04:05.390000 CVE-2018-2630,0,0,cc428b44ca6f5724dedc36f1c0ba9840affedb7197e122b085691a87c3955789,2024-11-21T04:04:05.560000 CVE-2018-2631,0,0,6c7e93390ee00519f947b38ac488aa2e47ae9b1ad9bb2014f639fd4bce706075,2024-11-21T04:04:05.697000 @@ -122900,7 +122900,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074 CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000 CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000 CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000 -CVE-2018-4344,0,0,ff4d9fa916be98d8c9df4de0d3f5def4ec78c29b865d65153666169c3083f27b,2024-11-21T04:07:14.067000 +CVE-2018-4344,0,1,5ef4bcd112280abda98acf6db160b4452198f8c32ab306be7353f1b7b9633dd8,2024-11-21T04:07:14.067000 CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000 CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000 CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000 @@ -123417,7 +123417,7 @@ CVE-2018-4874,0,0,001e4deb5c6535f1d86a9853487f66e644017abf53f30c14044fe24a71e9ac CVE-2018-4875,0,0,828ca7194958837af531f6d926f2e6efad3e06506c06a1ec60d79f97e482f6db,2024-11-21T04:07:37.340000 CVE-2018-4876,0,0,d60f8ca5a522370294131546a37d8cfa7029fe032394b40e7a70c89d2890bdae,2024-11-21T04:07:37.460000 CVE-2018-4877,0,0,837f92480206511c1669bbf6ba58b0f130e7f2857587d84aa9f5f9bb536c7e84,2024-11-21T04:07:37.580000 -CVE-2018-4878,0,0,fd6865fbaf2d489e8c04e5f6a05e2357ce4f2a406a344b43126ec5a30dc8f45e,2024-11-21T04:07:37.703000 +CVE-2018-4878,0,1,851973e5a807958c7c75e4c7b4a8c6243096d481414c639249ea81d159a827a9,2024-11-21T04:07:37.703000 CVE-2018-4879,0,0,0d7f8a85e4038ef27ba31e2472daf37e74ddf6899fecdc5a583ac5bc34a6f3d0,2024-11-21T04:07:37.860000 CVE-2018-4880,0,0,045e9f032a298443f93e3790a70e4abcd68625e59e5c9df6c44c44f9f5c06d42,2024-11-21T04:07:37.987000 CVE-2018-4881,0,0,9b0e562147a6706c36c5906c56df0a08b4ec6027e1f194d83f10d8a9ec581508,2024-11-21T04:07:38.110000 @@ -123478,7 +123478,7 @@ CVE-2018-4935,0,0,399998ac67f634b872f680c3ab88b518d1b7522c988571ccde1825342ee456 CVE-2018-4936,0,0,271ca644a13b593428b1d96d5ee35c1fb7bedfe88af2b402336b313e1b9390fd,2024-11-21T04:07:44.760000 CVE-2018-4937,0,0,96a07bf209f86ba011673cf73c0d98ce9c8331c74e615eae43383c5e8a71fc41,2024-11-21T04:07:44.890000 CVE-2018-4938,0,0,838a8c7bbb985b850f0cf887792b9ee59b8cbd5a1f48a2637cc5d2b46199428b,2024-11-21T04:07:45.027000 -CVE-2018-4939,0,0,1883078db082f6491b604833c9b061fcb86dabf2ab12573ba5436e7baba07298,2024-11-21T04:07:45.160000 +CVE-2018-4939,0,1,790a7176169ffb35549805a2fe4c4b8c9e3845c9d89526d126524d8b22653beb,2024-11-21T04:07:45.160000 CVE-2018-4940,0,0,58e9c596099b32df415dedd77c2fabcf01942da5d842274955e956635e9fc36f,2024-11-21T04:07:45.277000 CVE-2018-4941,0,0,c9746042e985ba715e6224aa8d5e3ca3bc94efb2036fe1778d418e1de275b807,2024-11-21T04:07:45.403000 CVE-2018-4942,0,0,badf52afcf03141ee18de1887aaa45c591c4e8a4cec6581f3991cfff3b3fd89a,2024-11-21T04:07:45.530000 @@ -123529,7 +123529,7 @@ CVE-2018-4986,0,0,c8a2e646894f5fc31c799eb54dce879ece19338c44ac430c0292d7cc31a634 CVE-2018-4987,0,0,9fb4a6f58170586279b1367122696a8bc3103480a0d3e2a19dd33d4c3102e2b7,2024-11-21T04:07:51.240000 CVE-2018-4988,0,0,565db0c120545a0980b443acabc25c3fe0bbe77ff968225cf72c5f4ac1b5bbd6,2024-11-21T04:07:51.430000 CVE-2018-4989,0,0,d969203ec1744215a113eb914fb8bb6e8c8bb47130a1a1b304a3f7f3081f0bb8,2024-11-21T04:07:51.603000 -CVE-2018-4990,0,0,dea62d2decbe4eb168d94206529dc40d9c3d46d540b4245612720db07ed2c353,2024-11-21T04:07:51.767000 +CVE-2018-4990,0,1,11c25b978e2146d3c15a118313abc7155dfdfa637bbc889bfb72f08944b08893,2024-11-21T04:07:51.767000 CVE-2018-4991,0,0,4f48903c6bd132691cdea90b110a694cc849ea70fbafc65953442dc590dd6b0c,2024-11-21T04:07:51.930000 CVE-2018-4992,0,0,774f4ecc150b900b309d235e9dc4e472199fd5938e216d979b3205a223df9919,2024-11-21T04:07:52.570000 CVE-2018-4993,0,0,6595d41e2f9eb986cef7c6bd58b76af712e0ebf9e4ee2213cc2e4671db1d94ae,2024-11-21T04:07:52.690000 @@ -123541,7 +123541,7 @@ CVE-2018-4998,0,0,7bc1b91b4ed3c2ed5bb6e8b5e97d6fabfae099cb567a2c4e418bda5babdd3e CVE-2018-4999,0,0,2804f0f3c26b64f522ac214766f1e12aff6b13f52d410b5a5278af4aa1384d4c,2024-11-21T04:07:53.377000 CVE-2018-5000,0,0,ca36b8788981e66a469b6a12a11b7147b02def6a470cf4634f205bca07351332,2024-11-21T04:07:53.507000 CVE-2018-5001,0,0,937f04430d8bdb291415510bf42966bd1f1f8a6f7a7e08147565cabc6147c403,2024-11-21T04:07:53.620000 -CVE-2018-5002,0,0,38341eef636a5d52e6a0f8ada5656c0f96ef4d92cdb0cee4fc9fce236f31c1a2,2024-11-21T04:07:53.737000 +CVE-2018-5002,0,1,aca88577d66793e8b61eec6e48b9245128dee03e06a483d7133f732c89ca9ce5,2024-11-21T04:07:53.737000 CVE-2018-5003,0,0,68d2f21cd2423841c08bc7db21746f56f3f11803c62cdf55b5a25f219ce9047a,2024-11-21T04:07:53.853000 CVE-2018-5004,0,0,64ff4844ff1f2ff63e89e50d615ef90053208aae825a36ed0bff1b6f013b75d8,2024-11-21T04:07:53.967000 CVE-2018-5005,0,0,580545e4297826f5fb3054eb463692d3543e12ee70adabe9306aad26a47249e1,2024-11-21T04:07:54.077000 @@ -123931,7 +123931,7 @@ CVE-2018-5426,0,0,5c86f78c95d64d99ee13bc0eb04558a03181c21ae0ccd76d03a3e95e1f4840 CVE-2018-5427,0,0,eff3de2d29d9c27066ecf833c6aea084dc430b5f16c6fe51710c41318079d04c,2023-11-07T02:58:46.400000 CVE-2018-5428,0,0,4eb683e6a458eebbda39355ee8a6fb9e9587aab9cdea4049bc3104b1e4ceab91,2024-11-21T04:08:46.903000 CVE-2018-5429,0,0,1e246edbac1f486e528309fddf4b0247ed6dbdfb97630f02a8bd73f4e12b5260,2024-11-21T04:08:47.023000 -CVE-2018-5430,0,0,91ee5282e497cc9167da8f2e4a831fbc2f9a53d90d08fdb0cfb826c0f5d2f95c,2024-11-21T04:08:47.187000 +CVE-2018-5430,0,1,d1c45f8051aef085d6069d97d50266cbc1fc2e7517f100ffa5915cd63e42275e,2024-11-21T04:08:47.187000 CVE-2018-5431,0,0,8cb99d2762d255d097c5085085f866ae2cd363570ee5478f727325bb38f8f36d,2024-11-21T04:08:47.320000 CVE-2018-5432,0,0,6622b09a3493c525f62a4518e9a638198e465f706e141a41e8920aa672f76d11,2024-11-21T04:08:47.450000 CVE-2018-5433,0,0,dbe836c4b4af21ebb7dfbee3c3186cca4bd884900129667d6bbeacfe8fb5a327,2024-11-21T04:08:47.570000 @@ -124422,7 +124422,7 @@ CVE-2018-6061,0,0,2d43e310d9cb4c04f837626c227d605f15283eeda2a2a0ce40da7a7a941dc5 CVE-2018-6062,0,0,9b244e273723ea987a1b0cf9396b13addc0abbe5b29d4be46cae516c01fff65e,2024-11-21T04:09:59.043000 CVE-2018-6063,0,0,65836325c5988636894a478f4bec5898abd92107eaf8f399c71d6a42d699e1e8,2024-11-21T04:09:59.163000 CVE-2018-6064,0,0,c91f752d811e2b1c719ce568c69e993886ee660bf0bb285e784c68667a46ca8b,2024-11-21T04:09:59.297000 -CVE-2018-6065,0,0,1020fe85bd52a6301d49b4c6c25dc94837feab1e369131ee14b6494c8cc0060f,2024-11-21T04:09:59.423000 +CVE-2018-6065,0,1,7fe5d12253f5ba06e95dcbe06d0b17a7c662b27a3b0901d3cf9bde4d428b0d6a,2024-11-21T04:09:59.423000 CVE-2018-6066,0,0,ff301b7645cdb8bc19c94296c88dd15016d902c957a6d39827e9922202ec877d,2024-11-21T04:09:59.560000 CVE-2018-6067,0,0,db9787d1c8c53cbf1a7b1a53204c39a5f848ab1f33d57ceef18d09d871d60077,2024-11-21T04:09:59.680000 CVE-2018-6068,0,0,f4c5582f347f0de6353f004bcdd64689471fac4fdbd510b68fd890f77dbcc402,2024-11-21T04:09:59.813000 @@ -124807,7 +124807,7 @@ CVE-2018-6526,0,0,627c110862d95ff8842b42cec59a5f00b77e899d49f3e1fe365fa2bcabb794 CVE-2018-6527,0,0,df08b81d8e2dd3bb247c892668e5704c86d662c0dded8fdc70cb9a946abd3f6a,2024-11-21T04:10:50.220000 CVE-2018-6528,0,0,70ffd6161bcb38f4b10131d174ef7b9dee233f21c39eca2b95795ad832a6b17b,2024-11-21T04:10:50.380000 CVE-2018-6529,0,0,59c6b821ba792cb9f1c30f213ef3658f4121e4d3d63290830433b82142e741c2,2024-11-21T04:10:50.547000 -CVE-2018-6530,0,0,b1e93a53c40b99f969c26d46d45f695d6ad70db637daf54e84d2bb43f3340f2f,2024-11-21T04:10:50.700000 +CVE-2018-6530,0,1,a4dcd841b74b13782e0b12177e2741ae463689f2fde6dd404dae1f0ff9679553,2024-11-21T04:10:50.700000 CVE-2018-6532,0,0,0098bc11ec65a4448e11621d1d4b07425a474a5d524179df68dad484e4f8b50c,2024-11-21T04:10:50.850000 CVE-2018-6533,0,0,67274d1cde7810e946b1bad1e775e49ac51b5f29ff31d6f0f12e69892c30e3c5,2024-11-21T04:10:51.017000 CVE-2018-6534,0,0,98734f2f9b016654838bf55ca7b6207a616e63924d3a0e1f002a52c13901f3ac,2024-11-21T04:10:51.170000 @@ -124964,7 +124964,7 @@ CVE-2018-6785,0,0,6c7e7bc11704f8c3d91b7c10cb313079fe8fa6e7d92df3c5c58c523f8e1455 CVE-2018-6786,0,0,89ea0f37e5e461c606f651e1741269f34ab4cdb3815ad9a0c06e8df7b7d37800,2024-11-21T04:11:11.787000 CVE-2018-6787,0,0,013b30b87fb4b9bdf2ec7b099b88f944005996449d617518f20957ea5be835e5,2024-11-21T04:11:11.927000 CVE-2018-6788,0,0,86bfab0f7758c7d855f0c1245f7dcc34b71bbf81b8d398277d194377f158181e,2024-11-21T04:11:12.070000 -CVE-2018-6789,0,0,c5aac9003f6eaa6ead58a6d04b41e3a1945df3db5253e9ac09a4335d414a352c,2024-11-21T04:11:12.213000 +CVE-2018-6789,0,1,24a2f0ef45c763cdc7e1faead9dc6714992fa9a614363a33bd93e06a427addb6,2024-11-21T04:11:12.213000 CVE-2018-6790,0,0,49de97705dc7140310bdb87c0fe7398e9aba9f3c65bfa971a774636359ac2415,2024-11-21T04:11:12.390000 CVE-2018-6791,0,0,e29078b1c9f930ed3d1bbdfecb3f6d2966bcd20c8499903f8fe38415dc2f1b80,2024-11-21T04:11:12.530000 CVE-2018-6792,0,0,e304c5ab463987fd30ee683c2245f3a9ad060da07868aa369c46a29b4e0ea343,2024-11-21T04:11:12.677000 @@ -125032,7 +125032,7 @@ CVE-2018-6878,0,0,8957f99d3762ccb00009151816e281f869f98effe9ca63fe04ea9de9cb2b25 CVE-2018-6879,0,0,535972e839f19a8623193f36f9bc049bf1b81d9abb2b7b756c64ad6bd010f2c3,2024-11-21T04:11:21.263000 CVE-2018-6880,0,0,3cd50d6cbd17152daba6ccbe0e977ea9496f687c201aab9fa0ca5d3cbead7cd2,2024-11-21T04:11:21.400000 CVE-2018-6881,0,0,fc5797f0201f5f361e734a06ee788a23d6c71171471669dc4f057cc8b1ac663d,2024-11-21T04:11:21.543000 -CVE-2018-6882,0,0,b2b228028be6e664719164526a64f7d9802f1c9cd46a7fccd41c2cf88e37d38b,2024-11-21T04:11:21.710000 +CVE-2018-6882,0,1,d331634692bbc96388990f02e4ddbcff3e1f0e655e3fb001dedfcab94403afee,2024-11-21T04:11:21.710000 CVE-2018-6883,0,0,b930ea02e0047e1e851632c79fda9687060f683edc6bf626cf7a0b729b9ec264,2024-11-21T04:11:21.867000 CVE-2018-6885,0,0,da2abdf626c132f9442f8a46638932ae95142647389d6e91dd79ebe5ee8289d7,2024-11-21T04:11:22.017000 CVE-2018-6888,0,0,1a9bc092935e2b7e274904d4f2135ce42e3978c4a976bdcaf4e872c2086d4c6c,2024-11-21T04:11:22.163000 @@ -125087,7 +125087,7 @@ CVE-2018-6957,0,0,f8ef43e0ab44cd9a14ef94c4bf28b549e2549864125d99232c5ed00240a81e CVE-2018-6958,0,0,5058115ce9c91397d4a976d0ea7a9bde5c7b101b9c6933e5339ccc74ad9781ec,2024-11-21T04:11:28.967000 CVE-2018-6959,0,0,2fababa30e235648e63ff7e79db99507b7a3d1f3b1656b7f39a1efebe678e214,2024-11-21T04:11:29.077000 CVE-2018-6960,0,0,33c162acc4b1bed97886ac651edef2e0087336cc559b952caaea18585560ad25,2024-11-21T04:11:29.180000 -CVE-2018-6961,0,0,c9a6b7b4d15ac5f0b9c5443d26c5b86c5cb72715c18b6a2fd9ba5f8dbfe50b64,2024-11-21T04:11:29.293000 +CVE-2018-6961,0,1,fde5d372cdb2087e642eb015240a9ba37b447b219fc4e4f663b13b7caadb87de,2024-11-21T04:11:29.293000 CVE-2018-6962,0,0,e2d66a14bc85c71a8afa4e0ad442df178fb31c9b106ccf4a037fdf4334ebd7a2,2024-11-21T04:11:29.413000 CVE-2018-6963,0,0,2f6e7504c38564122d43d832765c2a860c200abd390ca1dfe1607704fb0f596f,2024-11-21T04:11:29.537000 CVE-2018-6964,0,0,e4aae838a8dad98ed0585bb3ce05202cc701c4593b5faf5f3f99df3f566dcf99,2024-11-21T04:11:29.643000 @@ -125463,7 +125463,7 @@ CVE-2018-7440,0,0,7ea5b07ad5127b0ae3dc069222c4ccb685abf8da25a39fc393633932c5bb36 CVE-2018-7441,0,0,4e30fada1c4190f9b9003e6db70040887742ec2ea2f387f50f23852c50349457,2024-11-21T04:12:08.567000 CVE-2018-7442,0,0,30c160f5cb765925283d7f4020356f1152edb27b556cb73940ead803a932f087,2024-11-21T04:12:08.717000 CVE-2018-7443,0,0,3262f59056861397d7f590f8444d6df0ea5143dcc2d2714f262c876ddb3a2abf,2024-11-21T04:12:08.867000 -CVE-2018-7445,0,0,710cac513022e9a0dd212d68a95f04dd78080eed83d466ac414dfebeac457e4c,2024-11-21T04:12:09.040000 +CVE-2018-7445,0,1,dd41e9a27b20b5ac6ad4ed73b1323eb1665806e9086bec977e8cd45e77bc2e41,2024-11-21T04:12:09.040000 CVE-2018-7447,0,0,756b3ded07b0cc53688b2384b1152c19b4ef2ab4bdc9aabb9cc313f5bdc652e1,2024-11-21T04:12:09.207000 CVE-2018-7448,0,0,340198419b7de0d57a83c2aa310c88721d23adb464271a72c180203d630c908f,2024-11-21T04:12:09.360000 CVE-2018-7449,0,0,3cf957f02f1e5deafab8088cb8dab66c60f34f1f1ab0d16ff1c62419613141cf,2024-11-21T04:12:09.510000 @@ -125588,8 +125588,8 @@ CVE-2018-7587,0,0,65de8a533f00aac33af41e5a397719e1b6de1ea8f52a209c0a7d2f108f4c48 CVE-2018-7588,0,0,b390cd43115c9252d0414ec4cb22bc684aa30a50381d52885a73c66140733938,2024-11-21T04:12:25.473000 CVE-2018-7589,0,0,1eaa016bf4f23cbe26a95663d6fd069bcdab777d3601a8a526d85c7e13ebcd10,2024-11-21T04:12:25.620000 CVE-2018-7590,0,0,87f2e7a5a4f36886dc8e443efb322587ad117e6a420422d1d16f90cf4078da00,2024-11-21T04:12:25.750000 -CVE-2018-7600,0,0,b5a606a88dfc7d2b6acc566ac6087362faaeb3ba683ddf203fa14cfb633b32db,2024-11-21T04:12:25.880000 -CVE-2018-7602,0,0,6224bae116d00f519bbc5837c35e7584d6442f781c04b6a2c38dd907162a160d,2024-11-21T04:12:26.023000 +CVE-2018-7600,0,1,ee23506f12835025bbc56cb5b634f79cbc6c39fb2eff68facd0aa0ecf2045e08,2024-11-21T04:12:25.880000 +CVE-2018-7602,0,1,178db653e60017499ed2bcc3d29ccde1173bb888d654630c32ed338b33171ed3,2024-11-21T04:12:26.023000 CVE-2018-7603,0,0,f8f72c2910a98a6c3a28400485620f1ef3fe9a970329cf7b536630a8936b2dd9,2024-11-21T04:12:26.150000 CVE-2018-7631,0,0,e212ef8a0681fb691d7c4f99741ce57ca581e6d8db598df3560b23819da494c2,2024-11-21T04:12:26.253000 CVE-2018-7632,0,0,9bbfda3b4277b47535b07a9289cb5eefd273afc98b5388cef9a20ac243751294,2024-11-21T04:12:26.387000 @@ -125775,7 +125775,7 @@ CVE-2018-7837,0,0,ffad73203c6130b5acdfc40d107384215dbb8b25c8751613d632919e9c1cbc CVE-2018-7838,0,0,3225e1833cdfed2d1995884d8af16d3c9fc9a453fc66a5c9a2abb83c3b3a9e68,2024-11-21T04:12:51.240000 CVE-2018-7839,0,0,8bf10ec39b509fb3dac2ed212ec90df38bc0825a726088a4185c3cec75f9cb0b,2024-11-21T04:12:51.377000 CVE-2018-7840,0,0,d0f9ecd9980c937719a6e2adc5f16efcfa040e7aa577be012037a3aaf2da4dbc,2024-11-21T04:12:51.487000 -CVE-2018-7841,0,0,817e82ce47b75a1dacbbd0e5820db77b6a6de56d8a9d5fa99943b9eb128a1295,2024-11-21T04:12:51.587000 +CVE-2018-7841,0,1,2ef1d3395e8fe566e146b329044e5438f70248d28fcefe1ff225c6d36825c2a3,2024-11-21T04:12:51.587000 CVE-2018-7842,0,0,a4fa053504795e2b7465d7226d30935fd1797f1ae30fabd9b69a097135fb684f,2024-11-21T04:12:51.697000 CVE-2018-7843,0,0,cd06c23a0db25479fda182631f95ec584adb2fcd8a98820eac1152dc16a5473c,2024-11-21T04:12:51.810000 CVE-2018-7844,0,0,5b8905f4a610d68367ac80d96f33373b32cf1b39e86b07fafb58e8bab3835500,2024-11-21T04:12:51.913000 @@ -127435,7 +127435,7 @@ CVE-2019-0189,0,0,13810b74d7aeabe53d566c2633c7bf564418c1befd15535dfeb7a9fc5f5776 CVE-2019-0190,0,0,48e03ee4db4c27e3281667c0c50471bc6f19f2a8e1b27a336d954413c89f6e72,2024-11-21T04:16:26.850000 CVE-2019-0191,0,0,98b776b648d53a9ac95aebeef506a8b27338670cc353d41afdf3937e5aeb9cba,2024-11-21T04:16:27.020000 CVE-2019-0192,0,0,b5914093724940c0ceecc2351fd909dd13bc290674cfc87066219273ef81d3c8,2024-11-21T04:16:27.140000 -CVE-2019-0193,0,0,db59d6a0166cf21cc89ca39fab2151c96303816c5f0ea1b19a67fd6532893b52,2024-11-21T04:16:27.287000 +CVE-2019-0193,0,1,299c5bc7064264652dfe5eb603b7b102a8c26c42c802114e152f7f60de503318,2024-11-21T04:16:27.287000 CVE-2019-0194,0,0,0d47f295cbfd81bb00286e86a8d3de59bba5ecd3c22cefc98cfa22b001d90517,2024-11-21T04:16:27.477000 CVE-2019-0195,0,0,231e2d7227940a30df5c1097759860c54faf13a33907407a11c2ceac4e7f7056,2024-11-21T04:16:27.610000 CVE-2019-0196,0,0,eef8121ef5d4a660cfcca062c0709f2b63b75bea66a0e8117bf7af7e313806ca,2024-11-21T04:16:27.757000 @@ -127453,7 +127453,7 @@ CVE-2019-0207,0,0,1d274320dc3cfcdd3e6843ad8499871aa7aab2b96146ed945bffa6de677aee CVE-2019-0208,0,0,47fa72fb1491e2eddd007ac660c2013a428a55186223ef7595fd512160713322,2023-11-07T03:01:49.670000 CVE-2019-0209,0,0,8a63648f5ca6170017076fde6d74e61036a2724c0ceca47b3baed4431df839de,2023-11-07T03:01:49.940000 CVE-2019-0210,0,0,465a5af179711f2606e97e9f1456c95d28adb8e3023e78b326e4835282594988,2024-11-21T04:16:29.503000 -CVE-2019-0211,0,0,70357558bf3f37fdbaaf6b5c526285ac33c5c0cc268f5cfcbb45b050f2bc8623,2024-11-21T04:16:29.640000 +CVE-2019-0211,0,1,6a156a63cce2c51a958fc9d0e0b9fab9ed9bb1b4d5676b7281bcc6395e79b1df,2024-11-21T04:16:29.640000 CVE-2019-0212,0,0,570d4d5b1a58fb419f2a8fed0d2f1d94057425b51e2fa4b12437cb677e606217,2024-11-21T04:16:29.913000 CVE-2019-0213,0,0,e97ed4030c72ecb0980c1c110d4ddc8ef279b7f36fa864d93896f600ace0b728,2024-11-21T04:16:30.047000 CVE-2019-0214,0,0,65bb13f93d9d445dbbe948ee48fd9a13c87b8b5973a7faa5c46a51e78bbd4da9,2024-11-21T04:16:30.190000 @@ -127553,7 +127553,7 @@ CVE-2019-0338,0,0,365b99f658f18ccf1e63ef15dd961bd32f61be27341cd7fdb456c797ee3d00 CVE-2019-0340,0,0,cfb5bc87a25a756a9c2983640cf39db12eff139c2c7381ff362b3ce054a52a93,2024-11-21T04:16:42.640000 CVE-2019-0341,0,0,99ff18be6dc0a87a23abb4049efed6c596ae60298c3a6f5d30154aa1ee774e72,2024-11-21T04:16:42.753000 CVE-2019-0343,0,0,46444930507b2e98779edd9715d1dd6e0bca7fcd1d98d5d093d546330de1c42b,2024-11-21T04:16:42.873000 -CVE-2019-0344,0,0,611c8dce8bdb13a634ece8acb121e333ce021790928c1c725ddbb9b712d460ce,2024-11-21T04:16:42.990000 +CVE-2019-0344,0,1,c751046d42f51b93387925cc012d3b471e2b2f3e560b2e45237775328040d1ac,2024-11-21T04:16:42.990000 CVE-2019-0345,0,0,d0e861193ccfa8235c6f7e29abc062586658004be1b78cb86b4a2745ab15d8e2,2024-11-21T04:16:43.190000 CVE-2019-0346,0,0,9eae8e4c7678ba98fe244e0490089b377c686613d0d5fb8d6730be5206a77c1e,2024-11-21T04:16:43.307000 CVE-2019-0348,0,0,511916c8d4ad36e69748a7d3ffd9be7a03b59eab838bf1c4a3180c3d76da8875,2024-11-21T04:16:43.420000 @@ -127771,7 +127771,7 @@ CVE-2019-0704,0,0,6eb0e97661a92aacffa526f241faf955d24dde8cb8f750ef9bc345c97757fa CVE-2019-0705,0,0,b641d29fa3ee6e51add602d57290db31e1158c4df07cf80f62876394e7c764e4,2023-11-07T03:01:59.500000 CVE-2019-0706,0,0,989359194e9c4b740182fb426d52576c77ae6a8834be180f4f4876ea6fec9bb3,2023-11-07T03:01:59.717000 CVE-2019-0707,0,0,a4d44730a23b821ef3bc2eb865da8f5fb90e6f28888dcafc6c1508f81b1fecb3,2024-11-21T04:17:08.370000 -CVE-2019-0708,0,0,547564669758bccc97c6198aafa7d97153dd00f5c01598ff7b44ecc4943bd651,2024-11-21T04:17:08.487000 +CVE-2019-0708,0,1,37234b6d5c494af0e675017fc90f573b90c97001f80796223714faab330b71b7,2024-11-21T04:17:08.487000 CVE-2019-0709,0,0,833cc84683f891a5f07117c7f6237587eb6255f65d3967bbcf710df766321403,2024-11-21T04:17:08.680000 CVE-2019-0710,0,0,38db405941bcf4db02c4b084bbf2d881eb7d0757a5b2e6b98ff9b6921a80ed5a,2024-11-21T04:17:08.787000 CVE-2019-0711,0,0,e06f51f9abc514a26cea00013da3f4715f377b2a809b32e5c6f6ae97ba953e8f,2024-11-21T04:17:08.900000 @@ -127871,7 +127871,7 @@ CVE-2019-0804,0,0,5feeb7b73a8234d96b11bd96a457253d4093c1ac883ba47dde91a1af9fff22 CVE-2019-0805,0,0,14f16fdebed423439e9f4a34eb333849b816135d64745fcc6ebf561545b36c08,2024-11-21T04:17:18.780000 CVE-2019-0806,0,0,bb268c3e5fc396e56be6f50af2eb5bcb8fe7b694edbea1237582a2e63e85d1cf,2024-11-21T04:17:18.900000 CVE-2019-0807,0,0,7f61e8cf377df686f7c9e89aea30597f1635e4599e3a6dd7674d0ddcbf1ea9bf,2023-11-07T03:02:04.083000 -CVE-2019-0808,0,0,5bb9f990e88b42f745a1fa06bcec486af8171cb42b887777ccf022db57a2f4fe,2024-11-21T04:17:19.013000 +CVE-2019-0808,0,1,8f7dc33139792675a5c8758ca9db640deed4807b04f91098d2da4944cf7d95db,2024-11-21T04:17:19.013000 CVE-2019-0809,0,0,6f8be398fcbb862afec9ba85c5e4df55888f8fbb203f38cbafd7471152d6fde4,2024-11-21T04:17:19.127000 CVE-2019-0810,0,0,55e076ed465127552fac6a6a13468431a7cd9c6c696c3ba1bac451d4b299c4f4,2024-11-21T04:17:19.223000 CVE-2019-0811,0,0,dee8e97db7166d722247017238b13ce185c414e6f52a1638d2f83b7dfa2fbe48,2024-11-21T04:17:19.340000 @@ -128150,7 +128150,7 @@ CVE-2019-1003025,0,0,9af42893769b7fc06499fcc1553335da2ed9c5949155c884cbfc8509bc1 CVE-2019-1003026,0,0,8926b54c91d67008cbe059a9263a943e0ddb50ec72a565a1e25d2ea17035ca1d,2024-11-21T04:17:45.863000 CVE-2019-1003027,0,0,56f161009556c27505aec3dea316a43730f99659e895f1e3bd5a5f2f8aba6713,2024-11-21T04:17:45.977000 CVE-2019-1003028,0,0,d92a32bceca5f379cfee172d48634f5adb98c1a57b20664042f547930ce377e2,2024-11-21T04:17:46.087000 -CVE-2019-1003029,0,0,9bcbebe36641d06299ec3e4779f826df538314a5bdc43b8a7592c9091c4b822f,2024-11-21T04:17:46.197000 +CVE-2019-1003029,0,1,950dad9ee71126a7eb2a0fcae02a5f61489431e7618233f58bf0849156efe268,2024-11-21T04:17:46.197000 CVE-2019-1003030,0,0,a91cfeea6e2888a021abbd9844cee968fd07290a7c14e20e4e95b6604df02604,2024-11-21T04:17:46.357000 CVE-2019-1003031,0,0,f5c1957a31b1c62b3f5e059f8af14b086fbd7d3d41e8b72f4ccf5ee6bbd32c59,2024-11-21T04:17:46.473000 CVE-2019-1003032,0,0,e1f996b3969bba4e9c31f9343af2bc586fb9daa6067802944375227975e629de,2024-11-21T04:17:46.590000 @@ -136518,7 +136518,7 @@ CVE-2019-19297,0,0,47ac26a22676d548b4ee448eadae7e8cafbacbca70c7f4f2e645e9eeddabf CVE-2019-19298,0,0,a9c04ecd2cf97f1b1fe3d703e20c5a4af9b269b861120b09365a33264fd2f0a8,2024-11-21T04:34:31.407000 CVE-2019-19299,0,0,03c1fc8ff7f137b2bf17fd6b64b9503b67c5be6439d6858d5e05e7a692e6c997,2024-11-21T04:34:31.543000 CVE-2019-1930,0,0,ac1ec8c4267ea502904099848958ca5fd13c3fb46c822f23bbb2a709befea4d2,2024-11-26T16:09:02.407000 -CVE-2019-19300,0,0,b374481ed649ead163e4c3775a06c4e7dd6f22a1761cc26720f869a055f80bb1,2024-11-21T04:34:31.677000 +CVE-2019-19300,0,1,c215b4285e6e9b13ca0f43aa953fa487c23a57eeb7f299b6a1ab076d395c364b,2024-11-21T04:34:31.677000 CVE-2019-19301,0,0,d9c319366c48f9b5514cdffb6166ccacebf48d55a4c1972c50093faf167261be,2024-11-21T04:34:31.900000 CVE-2019-19306,0,0,acda1633508bfc6a9da66d4fd04417cc64b1455ecf1cfbaefaac0ce8b8d62518,2024-11-21T04:34:32.117000 CVE-2019-19307,0,0,43e55d8e7e02dfad2951d487568a759f3b9e93b3cc679f9192a5f8ae891c2e1a,2024-11-21T04:34:32.273000 @@ -147853,9 +147853,9 @@ CVE-2020-12815,0,0,df32f1c62003cdadbb0afc24ca75df39ca4dc0804ab8b97162715dc4a5294 CVE-2020-12816,0,0,48c51f0235980afbcbab50ea2cb90c8fe4004526e9c3a06265fc9b2c75882eaf,2024-11-21T05:00:19.927000 CVE-2020-12817,0,0,e98d3763d551f764083135cad61bc60ac9df18241e9743a5cc7008fcd5839a56,2024-11-21T05:00:20.053000 CVE-2020-12818,0,0,671fc9fbdbe3092c4779c13951027edfc290fea7c7ab7abd7d0208cd1bbcf899,2024-11-21T05:00:20.173000 -CVE-2020-12819,0,0,b543b1b1301b015189812a54e1da27a9ba0f2f49e57866d8d528abe3e3213c2a,2024-12-19T08:15:11.770000 +CVE-2020-12819,0,1,1d12fc4c1b2aa7fcacf96c8a52618106383c9564ec725730ee29b44c81fdf024,2024-12-19T08:15:11.770000 CVE-2020-1282,0,0,5dffd0f7490f04d4b38e703efd93f4aeaf53342feda449eb492337d8e143e58b,2024-11-21T05:10:09.537000 -CVE-2020-12820,0,0,69e991e537df913c51187462379cf0807f8874d6de334c16aa6c2901becaa5ec,2024-12-19T11:15:05.700000 +CVE-2020-12820,0,1,e31a4ed40acd0cbdfe95379f4114af8cf144cac8a5765aef35e281fc45051451,2024-12-19T11:15:05.700000 CVE-2020-12821,0,0,80bcfaffcfb668796236a3e35b815e8ec4146df6282fdf2e3e6375b32fcb8032,2024-11-21T05:00:20.317000 CVE-2020-12823,0,0,63ce9c2c4c1ef765c93695caf4139f7414cd4af512f7553968ad51b1ea50fa92,2024-11-21T05:00:20.483000 CVE-2020-12824,0,0,6534202f520baa89c97b25b54d55668d51bf5fbe629e32fb97e834206f437857,2024-11-21T05:00:20.660000 @@ -150844,7 +150844,7 @@ CVE-2020-15930,0,0,ddf771fc6d87f6ced9204169d4acfef1c571c2a978ab816ce8b7fd853bc21 CVE-2020-15931,0,0,a10cb49292305ec6a808df00d3348e0e4db90c3f72b0471a15de535201f79707,2024-11-21T05:06:28.807000 CVE-2020-15932,0,0,753b5138d95055bc631356d86e2b858be1e912eb235704fc2a5dc0ad771b1951,2024-11-21T05:06:28.963000 CVE-2020-15933,0,0,c58c28ead27a2edd586e93aea5954b30d5e719ba78be7f7d53fd2f414e7f619e,2024-11-21T05:06:29.110000 -CVE-2020-15934,0,0,d285f1b6f7b8bf8e96d66952336eaa367757ad47c3789e9dbe2273b9072e2a7f,2024-12-19T11:15:06.930000 +CVE-2020-15934,0,1,079ef7e3af0e73fcd65e8fab624cd5207510fa7cc1850bcfe2ce23e12aa1f5ef,2024-12-19T11:15:06.930000 CVE-2020-15935,0,0,3d44ad87ef52f836bf08b07849628b028d3f60cc6a3e7dd0c2e18d8d1ce440ee,2024-11-21T05:06:29.250000 CVE-2020-15936,0,0,f67304764b7eed9af18135dc77461ba4954f24074f19be7d3c356ca681372042,2024-11-21T05:06:29.380000 CVE-2020-15937,0,0,5c7d159a511897639fe925e50a3abb031ba9f39c82555f2dea6c23f4a0b2a723,2024-11-21T05:06:29.510000 @@ -159523,7 +159523,7 @@ CVE-2020-36770,0,0,4877f965a0b501bca302bede3b3749f48ca041347f61769f267b9457e184e CVE-2020-36771,0,0,f1adf084a583ddb13e74e9311bd2ae7af5c7e6cda5d8c6f07adec75ecab827f7,2024-11-21T05:30:16.320000 CVE-2020-36772,0,0,3f3c87ee40a18266b59a05045187f2f746d974c6001285ef84ff72ac61773e13,2024-11-21T05:30:16.450000 CVE-2020-36773,0,0,ed355a96266ae9f084f940e0981c7fe2a68a992084fbc1af3e906cc6d0fc9fdc,2024-11-21T05:30:16.557000 -CVE-2020-36774,0,0,fe2054b70171ffd15dccbea7bd19d5b72986cf9837c8f037bfc49b91ce5a7655,2024-11-21T05:30:16.720000 +CVE-2020-36774,0,1,5d41cd423d0775dbcef59d49426ad62dcdbccc1cb0e96618bb206a951c8d15f4,2024-11-21T05:30:16.720000 CVE-2020-36775,0,0,bd9aafbf92daddcee5bdd134836b336c6728c0b52b0a548db8a6b7e6c611c503,2024-11-21T05:30:16.940000 CVE-2020-36776,0,0,9e44964d8b0ce2fa69b6f74fb9faa260d6021842d2b6a768fd68354148011f8c,2024-11-21T05:30:17.090000 CVE-2020-36777,0,0,3e77b01802dc8c702924469ec2c343d257a461f9541fff65f5353927271f9a2f,2024-11-21T05:30:17.220000 @@ -163212,7 +163212,7 @@ CVE-2020-8090,0,0,d46d7f83237d152eb32f3f6e92be684a7d866e97d16c9dcc6391e1a834c30d CVE-2020-8091,0,0,3f3cedd06ba215c32ae09a0b819acaf7aea4088e88ff8a439c6ce7eae384446a,2024-11-21T05:38:17.040000 CVE-2020-8092,0,0,6aba06acaf03d5e490083d0608990e7b05112ebacbc6b6f104f7dd019799e781,2024-11-21T05:38:17.187000 CVE-2020-8093,0,0,59411ae8d980d80bc682fb86a15eed1a907562c28bd5c3ea9efb019f379e5a90,2024-11-21T05:38:17.323000 -CVE-2020-8094,0,0,4fe08aa98970cf84eefc93ca29f279a9cdc7936560d65fbbd838e7eb9145a972,2025-01-15T17:15:09.810000 +CVE-2020-8094,0,1,23f63cfe520838c43d3958835e42c7f7d05ffb0f43a74c0733076c9c07699f09,2025-01-15T17:15:09.810000 CVE-2020-8095,0,0,6ed41175835723c7745e9b903ec1dc1221975bdfc45bee55d3859d2e2101cc6d,2024-11-21T05:38:17.443000 CVE-2020-8096,0,0,7155f43f159057e6fed611a74f5b117d2d3280bef27f77d7ef82390d8eb5acea,2024-11-21T05:38:17.567000 CVE-2020-8097,0,0,196361a640b3ba7734ef6964c5491d7c0d5d9a7eae80a566a9d165231fb2ae00,2024-11-21T05:38:17.687000 @@ -171936,14 +171936,14 @@ CVE-2021-26088,0,0,c26e6d0a3d2d39cb55ac02c63c46a7014509930ab7b8dfa748b6804dc94fc CVE-2021-26089,0,0,6d8844e9a67c7f9126a795bec2dc39b17e18dec81df6faf3063ff3a641ec63a3,2024-11-21T05:55:51.027000 CVE-2021-26090,0,0,e3f8c1b2626ee36fd370ee3c68bcb4a42ad821868abe4e4fa89f643789009be7,2024-11-21T05:55:51.150000 CVE-2021-26092,0,0,bc381940e01045bf4ebcb99f1b03b7940fa8d07e8399794e6e19a6f437b8a7ae,2024-11-21T05:55:51.277000 -CVE-2021-26093,0,0,0a201585d7fe8cd1ed43024b40858d5590b236e38f662455cdb3c997b6b1350b,2024-12-19T08:15:14.717000 +CVE-2021-26093,0,1,da3c8c8bfd0a4d31bab7be3b5fac9959785d0be84a5b5a1b07c60a688bad1013,2024-12-19T08:15:14.717000 CVE-2021-26095,0,0,eab82fd930a577aba43ab891efe1cc8f8949906b0a8e50a351f70144f3de22e3,2024-11-21T05:55:51.413000 CVE-2021-26096,0,0,985ad40795b1115555526fe54bd3b71ecaf986e692d7772d71cf0b479480407e,2024-11-21T05:55:51.523000 CVE-2021-26097,0,0,5492509e540c4b9490ee3ecc2fc9e19c927e8dd5d975d3f7f5bdd412c54ecb2a,2024-11-21T05:55:51.667000 CVE-2021-26098,0,0,3a78a7a98f4df60c6a00e525ff05b85d5d44ada2a807d7c7d95ffc04905c1637,2024-11-21T05:55:51.797000 CVE-2021-26099,0,0,3e3b15c98ba7a020a9c3367c6e1c3eecdb1bbc4fd677e304269fa38f92e8ab14,2024-11-21T05:55:51.920000 CVE-2021-26100,0,0,ed053018eaf23e6bce5ff1257543fd9b49a4ccbc5175f03e01d9b5ca5a66c918,2024-11-21T05:55:52.050000 -CVE-2021-26102,0,0,923ef9389b63e20054daac72074dd108ff58f9bf407d0025b11194d7195f31e2,2024-12-19T14:15:05.380000 +CVE-2021-26102,0,1,03f2035e4d0ac478162ca6a3fc2d84707a4663e701c78e8094374384bf1e7fc3,2024-12-19T14:15:05.380000 CVE-2021-26103,0,0,3e0d5f7e10ed3bb8c2f0e6e30419d3e890d688617b5f5b7d1465896c87e7af6f,2024-11-21T05:55:52.177000 CVE-2021-26104,0,0,50ba7945ee1730d62d5768fd49dc86483435d5f7ffc0fd56b30e4dbdb152e85b,2024-11-21T05:55:52.310000 CVE-2021-26106,0,0,1156db33903c97c6180bd2eb70f02894bdb10adaf97b8483a1abada00d94d3b1,2024-11-21T05:55:52.487000 @@ -171955,7 +171955,7 @@ CVE-2021-26111,0,0,65cfd7a7617da7e8096c4fc1d4834851a9a89795b381808a5ed837084e869 CVE-2021-26112,0,0,ad04a90f399279c6cb54924592c27b54612f21ed4f64ef28078cb3c6ac8d4aab,2024-11-21T05:55:53.290000 CVE-2021-26113,0,0,1239a1d8bfda55bded8d0633a9a803d0afe80a8d5a56bcca10ede0ba5a365e91,2024-11-21T05:55:53.423000 CVE-2021-26114,0,0,4e26ac22bb1817e738cd9fdb3acbb9510f49ffdd0a44f0853a50532b15c1012d,2024-11-21T05:55:53.553000 -CVE-2021-26115,0,0,4ea30dde1981db5ef387cd95d36e8ef4b861206eb467649b720fcef3b9357304,2024-12-19T11:15:07.103000 +CVE-2021-26115,0,1,fdddcfd08e94a3b0b5aa8364792366e1d19b23bdbf6013087dbae402fa84d877,2024-12-19T11:15:07.103000 CVE-2021-26116,0,0,cce36364eeea643186b7df95f8898bc06762541228a4d98951c68bee64b93c3a,2024-11-21T05:55:53.683000 CVE-2021-26117,0,0,4247253501c6b016c1398ba584d37347914d71bb3bacba1824a141ac6d048539,2024-11-21T05:55:53.820000 CVE-2021-26118,0,0,28ea2534ddcf8aea0dfe0198838afbdd8bdfd393b7f85365babb96b975d0fa61,2024-11-21T05:55:54.040000 @@ -174288,7 +174288,7 @@ CVE-2021-29665,0,0,7e5695d6127b48298ea7a39a0b7c1f52d5697c39aabde813968a985029a5d CVE-2021-29666,0,0,c956aa909016c8fd792ec9d0506c621f960402a0bdbad6c0d199b2b03a1d0cc0,2024-11-21T06:01:36.700000 CVE-2021-29667,0,0,204f33d2e93b2f7c4000af49d6cbdd9fe254cb37e57eb71116729bf060b5b52f,2024-11-21T06:01:36.813000 CVE-2021-29668,0,0,4bc6688dbd585f03f869f8787298e797bbb7b3a94a375019815f5b87327677fc,2024-11-21T06:01:36.923000 -CVE-2021-29669,0,0,13264af598ad11f5c4cfeb52f926550e58c709e4569971f59b3fca5ce04ae85b,2025-01-12T02:15:18.750000 +CVE-2021-29669,0,1,8e066ab56d6fba8725f1ed991f844d1078777104985292fed607a88b398bcbe5,2025-01-12T02:15:18.750000 CVE-2021-29670,0,0,9e5d2d4c81e10903681f3116de30d2fdfd5ab87d5e23c5429709bdaa022e399d,2024-11-21T06:01:37.050000 CVE-2021-29671,0,0,a3a65df1136d33cfc981e3b56c61454d7aff843c82febdbd654fe2a0e21e1e37,2024-11-21T06:01:37.183000 CVE-2021-29672,0,0,43e17476e9d7e006ad0a9e796447e41df8645f9785ae18e25a2c57bf08bd5285,2024-11-21T06:01:37.297000 @@ -200480,7 +200480,7 @@ CVE-2022-32417,0,0,d64f19058251d88c14160b8f609db47d69ca031dcf015b8e8878d830ca3c2 CVE-2022-3242,0,0,1c73ec2d1f6f69f9cc2febb7ee35d92f9fb4b3a3a99a05eeb2fa3b82f4600399,2024-11-21T07:19:07.643000 CVE-2022-32420,0,0,e82c9311a55a1f6b169829406434dffa63bc018f3132002b0bda7da2debb7f92,2024-11-21T07:06:21.083000 CVE-2022-32425,0,0,ad6e1c74636e1b8940feea7a3c6128080e8a5e466735d42cd203ffcade73b6f2,2024-11-21T07:06:21.227000 -CVE-2022-32427,0,0,0d57e9df243c883dfcef01363ad7d52d1211a7c81eaf5a1359ca26ad595e05d5,2024-11-21T07:06:21.367000 +CVE-2022-32427,0,1,5d5b98eeed6ec947a62c83c90ee34681612381c5e5ae008f89d9e20ee725b6c7,2024-11-21T07:06:21.367000 CVE-2022-32429,0,0,340f8334e3ead01ece5d0cf008e8b80ff3942c9fe5919b0b4e59a89cc32df1f6,2024-11-21T07:06:21.513000 CVE-2022-3243,0,0,0ad00fd54d518a8767726778b7d3d62fc8ce4664131b47fdbd08523227836ca2,2024-11-21T07:19:07.780000 CVE-2022-32430,0,0,3c00ae0f81ccaf00007552fec860354d3595308ce665bfa010dd07934953ca43,2024-11-21T07:06:21.653000 @@ -201893,7 +201893,7 @@ CVE-2022-34318,0,0,f9a861333799e9b64876ae44ef179644f0a31b1709d00283de6db5a7de986 CVE-2022-34319,0,0,aef60ca70699e8d1b26e5d11ea0634e0df9cc8b3b26427eeee0f68ebe3078d95,2024-11-21T07:09:17.443000 CVE-2022-3432,0,0,ed8c3d3c053de14c7cd1e0678b6c1f6cf7da74e48258f34e50461d133dffb1ce,2024-11-21T07:19:30.240000 CVE-2022-34320,0,0,245655b0171fab34d7184a3dfd840d8991cc2b17e8dd724426634875a48a8305,2024-11-21T07:09:17.557000 -CVE-2022-34321,0,0,9440b26e2166344e0107cf678e48b24711b3300f70e9818c24088830a621d86a,2024-11-21T07:09:17.693000 +CVE-2022-34321,0,1,ffb740cac90be4b2dd63edea2c7b0ab52ff52d1590d3a06ebbcefb7933b0b7fe,2024-11-21T07:09:17.693000 CVE-2022-34322,0,0,4f80c935bd5a2bddda62a2a8b21aa664a66992e210ac169890ee662957e720eb,2024-11-21T07:09:17.810000 CVE-2022-34323,0,0,18f8a86a9ea7367250de4c574733b23b6cb443c54bb1f05564aba032a1233dbf,2024-11-21T07:09:17.943000 CVE-2022-34324,0,0,b78cbad7fe3dba0d1281388c8a288e34447a872aa35eae1eaba4e96f6efe865d,2024-11-21T07:09:18.080000 @@ -212506,7 +212506,7 @@ CVE-2022-48464,0,0,a04fc4617e9ce4c5c7547ef70a80faa0a5984e5206bec685dabecaf476960 CVE-2022-48468,0,0,5a37548a7bf2b40090f4df223a3bcda96f0d11f5141fa27d34925420224fb5d1,2024-11-21T07:33:23.727000 CVE-2022-48469,0,0,c8be7cb84f7209b7e20d7afca6a0bded7a57841c1c6838648c6954339674324c,2024-11-21T07:33:23.890000 CVE-2022-4847,0,0,f9ea10dc433f0a7ca49492c0d40460c777d953f69b3b03890b21104c2804ed2f,2024-11-21T07:36:03.903000 -CVE-2022-48470,0,0,9955682c0e269cf9c45fe3197c26085416ae58073569fe0a769beef4b6b6d51b,2024-12-28T07:15:19.087000 +CVE-2022-48470,0,1,3cfdef037689f910cbad2ca1c249a4df9140cf1855415d9586171a7c44fc3596,2024-12-28T07:15:19.087000 CVE-2022-48471,0,0,db2cd97ca72fc35f2ee71aea0631bbf20792fdae315427d0f09b57bf07c09399,2024-12-17T17:15:06.510000 CVE-2022-48472,0,0,c64808511f56edb7b006436264e030f2b912db2c8e92b1bb7f5768827a0b4344,2024-12-17T17:15:06.680000 CVE-2022-48473,0,0,8a14d908a6798de0b50f6c1c8018fbd60fb222ffabb0007655323679b7bab324,2024-11-21T07:33:24.200000 @@ -212625,7 +212625,7 @@ CVE-2022-48620,0,0,3a0147023a2ce808093311def3d214b6bfe6456b70abb680e638fd93230ae CVE-2022-48621,0,0,c3ea733991c9569be28a3881359c152b589cecfc7eed92953da9d8d07b95b6a9,2024-12-06T22:15:18.107000 CVE-2022-48622,0,0,027039012cc730313011d3d53c704afbb96ace1aeb42a1768b9d920edb82e8f4,2024-11-21T07:33:37.483000 CVE-2022-48623,0,0,36b40d73baf0aa0e574ac39123b25f61f9a9cd0abff90b96d80fc828fe2febf3,2024-11-21T07:33:37.723000 -CVE-2022-48624,0,0,7d8340193c28814d34deb47e64461c30715aea3f85cdee8a05ab3feef2ca7df0,2024-11-21T07:33:37.970000 +CVE-2022-48624,0,1,527e73895b67eed4aefd00072163bdec1526f936598649c39534d59cd14403cd,2024-11-21T07:33:37.970000 CVE-2022-48625,0,0,ad1548e03625a1597bed096d4ae7617552f2279c80077db9d95ac7c5db9b122e,2024-11-21T07:33:38.110000 CVE-2022-48626,0,0,9d4f63da0a918f51b7c85b0ffa7c98eb3b3f0bdfe14eedcb544bde294c904c2d,2024-11-21T07:33:38.317000 CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42ac12,2024-11-21T07:33:38.493000 @@ -216958,7 +216958,7 @@ CVE-2023-22080,0,0,6a1575c7329708f6beb64fe6bdd6962ae4615de752f26fb2ce83470eef282 CVE-2023-22081,0,0,8098b67026ff6b067f26ad72e46f746e7415829127eabb312f3ddfca90d8d836,2024-11-21T07:44:14.347000 CVE-2023-22082,0,0,217f2a7d5d523b4332dcd4ba0f1ee40b70b3f8dda6f1da13ddb6619c8dd3e76a,2024-11-21T07:44:14.483000 CVE-2023-22083,0,0,549569d4f434b2b64b53f184eb945f77bc60cf824fbb758a791df5757f7c7ca7,2024-11-21T07:44:14.600000 -CVE-2023-22084,0,0,7b592c158304cd93f617166900ed5d694c3190ff0f082ce3b1911ad4953bbaf6,2024-11-21T07:44:14.717000 +CVE-2023-22084,0,1,b9fe8e55e64e62cf3d002ffe5c012d2fdc5f627f5e46602f9a00c6ae8ba19072,2024-11-21T07:44:14.717000 CVE-2023-22085,0,0,6bfc1d596b6f19fc1e323c430faac564baf4255880646c1b2e54a076f1922f61,2024-11-21T07:44:14.853000 CVE-2023-22086,0,0,31b717095cd6330dc7fe03956beaa84a2f0f4a7376ac8b20a2aebdace32ca4e8,2024-11-21T07:44:14.967000 CVE-2023-22087,0,0,242e6251cbd6d56e4bc795b041c8038cb4373057265c4411e435a4e04ae60c9c,2024-11-21T07:44:15.087000 @@ -218259,7 +218259,7 @@ CVE-2023-23771,0,0,4826446186f2a7de866225e6fee54c2680d85e5e5802ba537c32e238ae00e CVE-2023-23772,0,0,c9c51309113836e987a748d83a3434e0a7836e16bff77ed79d0aac611b87db91,2024-11-21T07:46:47.970000 CVE-2023-23773,0,0,976babb98658168c9ce41e8dcdbad7379d67fb07247ebcf110b223d0a53aa638,2024-11-21T07:46:48.100000 CVE-2023-23774,0,0,23b8cdefff4646adb28851776d7b7026051b8550fd71dd316cf7680675c1deba,2024-11-21T07:46:48.237000 -CVE-2023-23775,0,0,3e081028bddad99264fc53690e4ffc7fbb310b8c28023b2279dace30a3a87524,2024-11-21T07:46:48.370000 +CVE-2023-23775,0,1,a91f7b299fcaa67cb89a3948def1ba4217385ecffc53fc9990e1d8413fcfce6b,2024-11-21T07:46:48.370000 CVE-2023-23776,0,0,a3bf9df2b23603c54ccfca4adce0942a8a0de8577300e97ea20cb59aed98af00,2024-11-21T07:46:48.497000 CVE-2023-23777,0,0,3d6a8f6005b3ef2168577c2d257dad0a1e657974ecef2370af3b5090278b663e,2024-11-21T07:46:48.640000 CVE-2023-23778,0,0,ee2a44f6465fe8e3dbb56634778fa72f1eacb2148e8e45a5844f091ff28d7e18,2024-11-21T07:46:48.770000 @@ -218825,7 +218825,7 @@ CVE-2023-24457,0,0,279170ede7c5df348024bddae69ef9ba94f7f148f771693e888c3a2b9f6ca CVE-2023-24458,0,0,ae3b2366e4cb730bd07b09ccd7c720c6ab37018e2a0cbeadd2fc87f14f515514,2024-11-21T07:47:54.250000 CVE-2023-24459,0,0,a8790a4245c3da6ca92aac48ab6b9b19e76854a925e7b65c422a6bdce72b612f,2024-11-21T07:47:54.370000 CVE-2023-2446,0,0,b2a076ff78da839689324bc7b41209e0bd4450871bc4e572b8f4f2992e2a8b46,2024-11-21T07:58:37.950000 -CVE-2023-24460,0,0,264372b86f8f337db17819d17cbfc93a660873f7f01403d1cc26508535d6af62,2024-11-21T07:47:54.477000 +CVE-2023-24460,0,1,aa1f81bca2a2aa039fa97981d73449d93712c7a0982179cd2ea7a092d95810de,2024-11-21T07:47:54.477000 CVE-2023-24461,0,0,fd8bc2abb65aada1d7309949da776fd5d44c92bdea8ca6223fb68c7781454c84,2024-11-21T07:47:54.603000 CVE-2023-24463,0,0,a3c9e4674f772990b219d4f3438aaa2243bf93efafd37788b7290fa8764d44b4,2024-11-21T07:47:54.737000 CVE-2023-24464,0,0,c2de430f6b36e44bc70c63167b00d345425c1da1b75d28fb5c9d40caa022913a,2024-11-21T07:47:54.863000 @@ -219785,7 +219785,7 @@ CVE-2023-25642,0,0,e8ced01f0b7a93d97b1fccad86986e0a1030c461d9fee8295cbc0d3751ced CVE-2023-25643,0,0,18dde583afda8da6447b7fc5d9bab3401cd028b66fb92fef8944c7d4aaf81dd4,2024-11-21T07:49:51.263000 CVE-2023-25644,0,0,a4f88a37d35e605b1f0492a6c2ec708d7d2332f5e5b6f5e49f56d8f443aac60e,2024-11-21T07:49:51.387000 CVE-2023-25645,0,0,5971b455e899b1d3192f6c06dac11e92f37ed6c39bbac621845ec9b5e49aaa99,2024-12-12T18:15:22.180000 -CVE-2023-25646,0,0,8d2a3208db362ef113ed909759f46342799918db67be412511e00150b0792d26,2024-11-21T07:49:51.623000 +CVE-2023-25646,0,1,f3df344e7fecbac85039741e3b8fe1dc255e21c01fc6669b5be4a9d0a0785cff,2024-11-21T07:49:51.623000 CVE-2023-25647,0,0,7b1c868f46c5f32ee966cfc709fda46069aaf7aa60b29dede6ea0844dfbe373b,2024-11-21T07:49:51.750000 CVE-2023-25648,0,0,5ebf0c6bb0a99027cbcc90aec48b6710f6157bed7ee854be7136d73e69ee4562,2024-11-21T07:49:51.883000 CVE-2023-25649,0,0,170bd5ee89e1922adae21ce884129bf85fa5f80f537155aaf71b34f9ea1c8369,2024-11-21T07:49:52.010000 @@ -222495,7 +222495,7 @@ CVE-2023-28828,0,0,c8219201f8c82577f62c395dc963be0ff5d9ef990f6cd114e19b9adaad085 CVE-2023-28829,0,0,5f3fb9e83e6bf580b695944554c6fe1959e6a17c65d5fb240077ff50f4fa6f71,2024-11-21T07:56:06.343000 CVE-2023-2883,0,0,34959bad52bf6be31f759c1775100dbd3b11b18902b85ce859cda51c457d7e02,2024-11-21T07:59:29.487000 CVE-2023-28830,0,0,fed7b0af3899c9c0351c75ec8cfb07e27d01e8975cc277e5aac982d65b695708,2024-11-21T07:56:06.480000 -CVE-2023-28831,0,0,42ec0be19e0b3797472c783b9e28a7613e5853814b978fafde47a733b6cc4276,2024-11-21T07:56:06.617000 +CVE-2023-28831,0,1,6f6cdd8e5fd8fe1559f9c93fab3dd445c779916161a7a2b5332a6e8de2089411,2024-11-21T07:56:06.617000 CVE-2023-28832,0,0,c04fae8e5ab3928bedf14f9231bd4ec1cf01e8d8f32a49b0e582cb4d622fe123,2024-11-21T07:56:06.930000 CVE-2023-28833,0,0,9011138fc64d981c5e762d5dbee0f1652c314153024bea70573be0bec72d6058,2024-11-21T07:56:07.050000 CVE-2023-28834,0,0,8d6db7c0f5b4adbe01caa0a5aef9170681d4fe1257d2b601a0080883b3c572fc,2024-11-21T07:56:07.197000 @@ -227343,7 +227343,7 @@ CVE-2023-35188,0,0,f7484a9f80903acc1f5631e4ba0314823cc65c814c8490c44d8e146eb3d5c CVE-2023-35189,0,0,0c013e229c8b320febe8b95a5660110014abdf3b654e065846aefefa2b1eaf76,2024-11-21T08:08:07.667000 CVE-2023-3519,0,0,b65db05e8cad5d551dff516df95f418104a61648a93f704532eedf3a9934fba8,2024-11-21T08:17:26.603000 CVE-2023-35191,0,0,57e2cd323ea5812b05a092bdd798fc25e60bb2f356c1b70cf60026944fad7439,2024-11-21T08:08:07.793000 -CVE-2023-35192,0,0,f68fb02ea23a3667d3bc0cd354ab502c6bc9868ebfe54f3700ca05c3e20932d6,2024-11-21T08:08:07.917000 +CVE-2023-35192,0,1,30ec71a051d1123870b4193fa0a818bfd0b87b354c0ae69acdacfb746d0b2e72,2024-11-21T08:08:07.917000 CVE-2023-35193,0,0,e9a6b5ccac2268d637286d7a1bdb9433afc1109bf4ebb9b8f76e19c20e797054,2024-11-21T08:08:08.043000 CVE-2023-35194,0,0,eb26136d785e028c88401cec9941fa2a28c5954bf71b742cd63f81de2557ad91,2024-11-21T08:08:08.183000 CVE-2023-3520,0,0,867d152778112f3b97e78a29874d0e03f234c3f1c659c909c0707d098fe8d55c,2024-11-21T08:17:26.760000 @@ -227727,7 +227727,7 @@ CVE-2023-35883,0,0,1e723e1a6d59575047eab3ce3444e746ff2622c5d1776b171d1151a445f40 CVE-2023-35884,0,0,18c3d22c18d47b7a585cf213aa70ca7b99505e03785725084d5822812652b215,2024-11-21T08:08:55.010000 CVE-2023-35885,0,0,9ca1f5f1779561172eaee3069b6e3eec6f3050b1039f21143b0b68665e5754fb,2024-12-09T19:15:11.947000 CVE-2023-35887,0,0,76a5831afd9a0cf68a148a72ecedb4d9f74013a2c1d65482318d9531cedc3be8,2024-11-21T08:08:55.333000 -CVE-2023-35888,0,0,833b4455f818eec9d944e166e5fd18f91b9bd1f7cec8aa22f0ee6b2d50368c43,2024-11-21T08:08:55.497000 +CVE-2023-35888,0,1,725560018e0ddb8a5b9947afa13a1ec3a43e86e36f132dc3b9b8225336c6d97f,2024-11-21T08:08:55.497000 CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3bd7,2024-11-21T08:17:36.953000 CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000 CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000 @@ -229294,14 +229294,14 @@ CVE-2023-37925,0,0,515c8082fa4dd5d2304ede7012e16dcd6142947f5297beab40381c7c03d67 CVE-2023-37926,0,0,802a3e216c24e0917d13a1aa94c50d930fc0c64d4b7150fedeb164166c023034,2024-11-21T08:12:29.227000 CVE-2023-37927,0,0,91c985b74b4cf0c20cf9ee2e34abb6e9d5e5bc09f1967cdc6aacd97f6165b123,2024-11-21T08:12:29.367000 CVE-2023-37928,0,0,dec776d364ef37b6e291aec9a18f90850b125ef62937fdd2b294a62c2fd46954,2024-11-21T08:12:29.503000 -CVE-2023-37929,0,0,011bb9e7d58d16b19d04566442236b3df9072ac9a89827895b435ccc7008da47,2024-11-21T08:12:29.643000 +CVE-2023-37929,0,1,171347406abc6704c14aadc27691dc48c03f452576efd1c2343e319a65575eb7,2024-11-21T08:12:29.643000 CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000 -CVE-2023-37931,0,0,a6df9747948b7e4af116102e8d22542d2082a17aeb1e34d2cb6d77c6b29279b0,2025-01-14T15:15:11.440000 +CVE-2023-37931,0,1,4f73bb87e74c7494c824e3506df1afb58c2c1e9a75eaf0a35a61fcc385ea1ed4,2025-01-14T15:15:11.440000 CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000 CVE-2023-37934,0,0,4e265b9ab5d64a68f77d4af970245395e5cadba01a90f14cccc92367afbeed0f,2024-11-21T08:12:29.930000 CVE-2023-37935,0,0,e2680834b672fa8ed2fa3700d283e20af31e71aaa863e0a1bb6357a666cbb04b,2024-11-21T08:12:30.057000 -CVE-2023-37936,0,0,4d1bda336c23c74ec8906c59511da48fa45a47e8c6b8805364ae7a81d5bdb9f8,2025-01-14T14:15:26.790000 -CVE-2023-37937,0,0,c3da49b12f83696a8955b90c7c5fe1257e64d4289776609f188aa20bca9391d9,2025-01-14T14:15:26.940000 +CVE-2023-37936,0,1,f9977c568bd0493948c87cf9c508eb91f4fc8f7c0d9c1ad0845530dfaa570df0,2025-01-14T14:15:26.790000 +CVE-2023-37937,0,1,66f78b4b34d638fe6fe234c97751063472ee4555cbf7e5a12f51702879c87e8c,2025-01-14T14:15:26.940000 CVE-2023-37939,0,0,d3b772421f93766dd5d56ed8a17336460359db9420b069ecd7dc476dd713d5ac,2024-11-21T08:12:30.200000 CVE-2023-3794,0,0,927c15dbb6ac6053f144e81718d1e10b00b61d9e23d4cd5797afe957900c37b5,2024-11-21T08:18:04.807000 CVE-2023-37940,0,0,047021639e76af7b35157c12ff0afa1b906590a238eefc242a6a5cc5dab05f2b,2024-12-17T22:15:05.080000 @@ -230649,7 +230649,7 @@ CVE-2023-39465,0,0,7abbdcf23039d9efa24f92da7ba9d80953bac0bfa9c5d7de34b21177f3683 CVE-2023-39466,0,0,bb7831f123546104f86d73c5dd1e6005a33579ffb6f8345b1ebbdc69df563165,2024-11-21T08:15:28.803000 CVE-2023-39467,0,0,817f908c62b12ffb0fc1ecd473b5e55bb66887b0edee02a427bf2c3ef3c23604,2024-11-21T08:15:28.927000 CVE-2023-39468,0,0,ea3d874a3c8ddf52e59332b6a34fb8c85536681068f9b000ea95be8928f3c9ce,2024-11-21T08:15:29.043000 -CVE-2023-39469,0,0,7aaacc88f4bf4b562a45fc649eb56721bce63e74bc433e287c53f211624f752e,2024-11-21T08:15:29.180000 +CVE-2023-39469,0,1,0f8780ea986a79e9b69db284ea0a583ae9aaf573e7fd7c70e0716ecb46e75155,2024-11-21T08:15:29.180000 CVE-2023-3947,0,0,a882b8170091b888362dd968275aa1d03f197bce9f60b79e29e3ff20eeaf98a2,2024-11-21T08:18:23.003000 CVE-2023-39470,0,0,ce6409ef0267ddef1aa9b64420d22c73981db36d5f3e4981a8ab237750875895,2025-01-09T15:46:02.227000 CVE-2023-39471,0,0,e36e6acbad3c0111cce5d3933ca4f104103e93885f2ea148b492ede0a1e34014,2024-11-21T08:15:29.303000 @@ -231066,7 +231066,7 @@ CVE-2023-40068,0,0,1f3ca3f4bcf4da8c400072f3b88991cf75e70c7f0a05b0f7f3c1e1b37f701 CVE-2023-40069,0,0,34a072feef664e77feb3acf62268e3c864c59acf53340403bb89442acfe082fd,2024-11-21T08:18:38.257000 CVE-2023-4007,0,0,485e0e4eb3d7ba05fde54efb673234f0fe6c1e41da1200e33fb0c19a8d968085,2024-11-21T08:34:12.960000 CVE-2023-40070,0,0,2372b0551ba21cf1c8c20ecc2823740e1027c893f8149132f14e386d9141dc08,2024-11-21T08:18:42.820000 -CVE-2023-40071,0,0,4caf022180fa7370dfbf03ffb8944ea031a212fe8822ebd16130122116e8b0d7,2024-11-21T08:18:42.940000 +CVE-2023-40071,0,1,66a225e992e75e0a6ac4f301300e4afc8a3f4446263aed956c977293d2768076,2024-11-21T08:18:42.940000 CVE-2023-40072,0,0,4e0fc434a35ad1768d285c6f9dd8a5688f917990879d902d6a5040361d7ff30a,2024-11-21T08:18:43.040000 CVE-2023-40073,0,0,e97b0462fafcbc80a64b81fa292074aa36562b6be2904d63de9ecca9dabff580,2024-11-21T08:18:43.163000 CVE-2023-40074,0,0,23b8dc5177975def217ac350ddc9c9fb9e27229fa5af67469a845c69bed7d32c,2024-11-21T08:18:43.277000 @@ -231840,7 +231840,7 @@ CVE-2023-41010,0,0,5020281b77dbe7dd7440784d384628f6896a559bcf096518c478862f8c72f CVE-2023-41011,0,0,5e21c1d6737888dd72b98a17bd26ae01d6230d6104b5485afc5abfb39b484556,2024-11-21T08:20:23.717000 CVE-2023-41012,0,0,612acd5b0ff1a52097e4c43f79804cca44d70f63587b7d734bb90c5d958a145c,2024-11-21T08:20:23.870000 CVE-2023-41013,0,0,72b4b9804956232da397c35cc32ca1703e532b792488c1be8559d117aa77a85e,2024-11-21T08:20:24.033000 -CVE-2023-41014,0,0,f271af3decbfacbed75ae0062b7c81e581fbc30e88a5e0856cb6e8cca46b5492,2024-11-21T08:20:24.200000 +CVE-2023-41014,0,1,1796bbcf594947b3a1ad51cd614d7ff1cbdc428d9d2219af0cd244b9fac532e7,2024-11-21T08:20:24.200000 CVE-2023-41015,0,0,9c81daa213188fb41d2221d8ed1fb600bb4e67920983b398cc11ecede252ac34,2024-11-21T08:20:24.363000 CVE-2023-4102,0,0,1000fe31d845b508d35d2add201da8bb4165bf7a0138224284c54de0bf7d4b41,2024-11-21T08:34:23.777000 CVE-2023-41027,0,0,1f9a34c913a562d295baf751bf2d4f560b0bbb0813decf1b693c6f5cf88f0f17,2024-11-21T08:20:24.590000 @@ -232490,7 +232490,7 @@ CVE-2023-41838,0,0,952c54aae683059d62b494aadea90c0936995fec7c2c31e60fa8e87d00501 CVE-2023-4184,0,0,60df463ab72975bdd1bf87dea9d6116251117803b12f9222b99bf19e9331ed2f,2024-11-21T08:34:34.303000 CVE-2023-41840,0,0,8d20f8abe065bcbe2c2d718ad7ceafc29f0c9c2f78c1e082d11032e68d2148f8,2024-11-21T08:21:46.637000 CVE-2023-41841,0,0,491f8782f84ae4bdd0c119a57acc5dfb8b3c40fff6f6761c378b72c883787aec,2024-11-21T08:21:46.777000 -CVE-2023-41842,0,0,4d425d3ca0ad990a426d09ea3ea2370559ed596f93f1c51d804ee7a694b7ce5f,2024-11-21T08:21:46.927000 +CVE-2023-41842,0,1,f4ea5facffc72ec9bdae9f9a25c41cff091183be3ee1a9dd5f8f8bf9f36f23f8,2024-11-21T08:21:46.927000 CVE-2023-41843,0,0,4f2497aa6d697eab044f18b81c579a61202adaffd325834a205c3b531e182490,2024-11-21T08:21:47.077000 CVE-2023-41844,0,0,8b849fb0203aa5a5fb07018f86ca1b2cdf2390667e6ef7f230e7f7b2ed40dec7,2024-11-21T08:21:47.230000 CVE-2023-41846,0,0,5b5b283416f518a2bfb421bd03629a0c895fc3ce2df31fec966016c7ea999f3e,2024-11-21T08:21:47.353000 @@ -232611,7 +232611,7 @@ CVE-2023-41956,0,0,3282aedd80768b55256122ab701e734c381a5dbdfa9d40baad17e088167db CVE-2023-41957,0,0,a29f516d99af407c126a5e7ad417d81ce357dcbef8ae20e5c515d3719d1d6e20,2024-11-21T08:21:59.523000 CVE-2023-4196,0,0,ef9c1646e137c44dab7abcf516cdc093158d8d226c4a6c8193984fb89aad5817,2024-11-21T08:34:36.033000 CVE-2023-41960,0,0,bc34f55c0365c3e902620fef0f4ca6fa370f5764b27024ab41f4fe778d27af59,2024-11-21T08:21:59.677000 -CVE-2023-41961,0,0,cf282640238b57eb28a828b069697dec14753e316791bb133c42444e3f5966b3,2024-11-21T08:21:59.810000 +CVE-2023-41961,0,1,5ee00584b2d3b7f6e6249b12d87a9f464f68bec3a3bafb36e8c7f4ec11fff01d,2024-11-21T08:21:59.810000 CVE-2023-41962,0,0,ddfd42eaecd7c45420038a2470f93c7b8b9f7d6267cbd32837e17e8c62297a72,2024-11-21T08:21:59.923000 CVE-2023-41963,0,0,c488bbe213194cd9c4226a7f83fad3df13113f5834bb9bc7fa01fced3c6de0ef,2024-11-21T08:22:00.053000 CVE-2023-41964,0,0,717405df1f2cf03c06becb18f5d6cdd82b5117004176fedd87a240e96fd3fe6f,2024-11-21T08:22:00.200000 @@ -232807,35 +232807,35 @@ CVE-2023-4220,0,0,9c1be8bd25968ff0526566a2b1027c997b88a77c0d8dcefa1a6433b8fd36ac CVE-2023-4221,0,0,bf8e9d99dcab730735c20f4580310bef2ff1b13f53334623245631c526c7205b,2024-11-21T08:34:39.177000 CVE-2023-4222,0,0,36229eb8ca311b7badaa947ea221e1d7e3bb7ab89a2604de2876b4d338768ec1,2024-11-21T08:34:39.323000 CVE-2023-42222,0,0,ae94da32ff59921e807938d15425cb115800cda785c3c70e925ffd51050b89cf,2024-11-21T08:22:22.720000 -CVE-2023-42225,0,0,9a135b20128cc030323f03d53bf8108c7d81a6cacd84da35949bce05ec2854e5,2025-01-13T22:15:10.493000 -CVE-2023-42226,0,0,c501f5e6b7fabd0aa674acbf2f9d49be4e913430625b9420a2eb7dd7be4af9cb,2025-01-13T22:15:10.620000 -CVE-2023-42227,0,0,1735a56bf27178202e9b69586ee04724e8561f3060461f44eddda70f9c2d99a3,2025-01-13T22:15:10.770000 -CVE-2023-42228,0,0,a4e98be6bd6d3c538123bab465e221ed73db0570eaf158337f6dbc176049c06a,2025-01-13T22:15:10.887000 -CVE-2023-42229,0,0,d1bf69342af2dfa6a645de7b4eb204911a3b618af9ea1f7d6ce005e74538c529,2025-01-13T22:15:10.993000 +CVE-2023-42225,0,1,8430ce75e1ef708f1aac454ea7c9f389b149db89666bacc37c1606fa90bdf78c,2025-01-13T22:15:10.493000 +CVE-2023-42226,0,1,9ba96da18b6a8f34371ee3ca6b957d0410284ef78ea09707571f75bf8c453908,2025-01-13T22:15:10.620000 +CVE-2023-42227,0,1,102e0f166b09892d4c12ecbffe7dd135d610362e541ae5174ba20f94a209b940,2025-01-13T22:15:10.770000 +CVE-2023-42228,0,1,b9ceed65b6b181ba08210f83ee3baf4cc3a2ba7d869e02c7cd46bfef6ab307a3,2025-01-13T22:15:10.887000 +CVE-2023-42229,0,1,3081a723a6f68d02b552e373dd4ecd659ed91f28db5f9840c4653a45011e2952,2025-01-13T22:15:10.993000 CVE-2023-4223,0,0,af5ff20be5d1517ff6700858d84ba65eb96375a0c029cc2d302d3763216fd7e2,2024-11-21T08:34:39.457000 -CVE-2023-42230,0,0,70bcff1af457f341d4f719bc564e77d9bde9de4efd1225dcc6e66681b2d6ab6a,2025-01-14T15:15:11.633000 -CVE-2023-42231,0,0,955c3074c302ddc1f64ada95930a6200f846f8b5c69cda6413fc074b998114a4,2025-01-13T22:15:11.233000 -CVE-2023-42232,0,0,9ac077ddbe0018e9001a8af27b3db888d76a6fee3d7827171f10aaf20cda13b4,2025-01-13T22:15:11.353000 -CVE-2023-42233,0,0,f20edd589e6ae9192d84d84968343bf5f02bebdd199f00e212738f70aba44b6d,2025-01-14T15:15:12 -CVE-2023-42234,0,0,2386c91df0396bad63b4922fd0d1b26ef5431d675624f5a479affe062a23dc2a,2025-01-13T22:15:11.593000 -CVE-2023-42235,0,0,c76d2036f178a103a88eac1cc302988b3f3cc8e2223b6cffb644a79ab3fa412a,2025-01-13T22:15:11.717000 -CVE-2023-42236,0,0,fd29d0228f97c6398108f376fcca646476b7a18baa7643724ecd0aee62350b3b,2025-01-13T22:15:11.830000 -CVE-2023-42237,0,0,cef9429060181e2799bfd23feaef4f9978fb85a0298c88d9ec910ba47c4c7459,2025-01-13T22:15:11.953000 -CVE-2023-42238,0,0,56765bfc21015feb04ccd870e47b08427685776a60addcd738e449abaa8cab92,2025-01-13T22:15:12.080000 -CVE-2023-42239,0,0,2bf1987f30a8cecaea072b972fe928856e8d5ad95af32d8fdb961d4e98cdd4c9,2025-01-13T22:15:12.197000 +CVE-2023-42230,0,1,a27cd39883b0aa87ed9da74388e020439f1f705309294234881c5df5124a5cac,2025-01-14T15:15:11.633000 +CVE-2023-42231,0,1,c29af4ceeead2c3cd0be7816e6b90700a38e9bc0064ebec1b28eaea8506f7eaa,2025-01-13T22:15:11.233000 +CVE-2023-42232,0,1,c8e9b06345c4b0e62acf8418c1c695c18f76fc7a7d91e18902d5db7d24cce4ba,2025-01-13T22:15:11.353000 +CVE-2023-42233,0,1,0ef765427d2c364bfe6113d71a0ecf990a7a966648b3ce549ce24f50c68a4a66,2025-01-14T15:15:12 +CVE-2023-42234,0,1,e33d66e45484b63183541ec4f20e75f5ecaef9c38c89933966683769779e6a81,2025-01-13T22:15:11.593000 +CVE-2023-42235,0,1,c55bd7cd974fa98373720448c9992e183164041eecaeb447dcffef98954ba297,2025-01-13T22:15:11.717000 +CVE-2023-42236,0,1,4e46b9a31b621d9d7b40e060b2f5b8c2824f5fcfd44dda6e43481278ac52078d,2025-01-13T22:15:11.830000 +CVE-2023-42237,0,1,3dcebcbf41132970d28a46360865cfbec1c09abb3cf0def0e51c280c07bfdd9c,2025-01-13T22:15:11.953000 +CVE-2023-42238,0,1,110362dbe949521469623a75d0216fb28e32db200fdf66610f3148e0220f22e6,2025-01-13T22:15:12.080000 +CVE-2023-42239,0,1,3e133c37f453d1b8f7d5f9746d6182ad4474f46b9fb5e33fd3ce05bfb1b2b53c,2025-01-13T22:15:12.197000 CVE-2023-4224,0,0,f1b6668534bf40a17d723024299108e58758b217bced5525ade83799d795b963,2024-11-21T08:34:39.590000 -CVE-2023-42240,0,0,2e4457f4cc2a7fb5864556ce29c6a5a5984b82bbdabc202feba1093c40fd1b3a,2025-01-13T22:15:12.327000 -CVE-2023-42241,0,0,0e7151d42cba72eda2de60912255bd47da9e90fc686189d7a674ea00484989bc,2025-01-13T22:15:12.450000 -CVE-2023-42242,0,0,0cf3b76d1c431f0555eaab9e12a0c888cb5154b3d55fbbabce6d28ff62a9f2a3,2025-01-13T22:15:12.583000 -CVE-2023-42243,0,0,b126aa981a9148da9503b20008ff8fbfbc7dc606ca7dc643328fbd865f8731ed,2025-01-13T22:15:12.690000 -CVE-2023-42244,0,0,c9682251c50950169da2b027e8188a43823dc07e8e68229c36e3a7e7c14939bf,2025-01-14T17:15:11.847000 -CVE-2023-42245,0,0,eba9df61ed5c9aa69baed28cde1a0964fd6f95ed1a93ba3502d442f18c3f967a,2025-01-14T15:15:12.170000 -CVE-2023-42246,0,0,be5d25b03e37b4bf12bba086fe7879b18d0d5ad46e9c2d3ce4ee81ee4c2fce08,2025-01-14T15:15:12.317000 -CVE-2023-42247,0,0,16ac79ca41a26e1aaa60389c8cb5042194ed9b79edef2f26e370810e8342b6c0,2025-01-14T15:15:12.470000 -CVE-2023-42248,0,0,3b944ae6cbe5ba95eea34e3ca89ba99a3712cf32bf98a9d5b881cb4929a492af,2025-01-13T22:15:13.293000 -CVE-2023-42249,0,0,a5f8d3b694ef0d4fe7e076e6f89e736069eda12481f4691e37b873609dd903f8,2025-01-14T15:15:12.610000 +CVE-2023-42240,0,1,ce5d3f5d3c18140aff23ff4000e608d1e4b314d8f9e524932a5065f8b41aa2ff,2025-01-13T22:15:12.327000 +CVE-2023-42241,0,1,6e1f1f34679552853117c862e2716fdd0ee3ef927281f5202b6f3f1f84a4fe0a,2025-01-13T22:15:12.450000 +CVE-2023-42242,0,1,bc969711777287f87b131d55534885e0ee72836c278478f223473d6eeb0b9136,2025-01-13T22:15:12.583000 +CVE-2023-42243,0,1,7bd7a47ffde02a5b996ca4edb75685d0861f1ed4d4518ca1069c4bf99bd3a100,2025-01-13T22:15:12.690000 +CVE-2023-42244,0,1,fb953b3a8f7f82fd919dea0bdf187d66a37679a9578bb3f5fe95de0b7443148d,2025-01-14T17:15:11.847000 +CVE-2023-42245,0,1,17499c4977088f01727e72e25dbbfe974fc0ec2f368a5616efe7b131bba77dfe,2025-01-14T15:15:12.170000 +CVE-2023-42246,0,1,fe7b78d8b9b334e858f6adbfdcc1b7197b6c936781ce42ccf854f68285ef6965,2025-01-14T15:15:12.317000 +CVE-2023-42247,0,1,37f2b84a8eb1b2726d485612742d8bb00716a453f5fd764c0128b35c3085c8eb,2025-01-14T15:15:12.470000 +CVE-2023-42248,0,1,066857e53641f7b58fbae73c133624253ac0c3d4589700fa34cf7ac264e8a144,2025-01-13T22:15:13.293000 +CVE-2023-42249,0,1,71428716e48bd9bdd971621d7fedc33b4c21785e5f35b051641c0b53373e7029,2025-01-14T15:15:12.610000 CVE-2023-4225,0,0,cfb7cf232768a57c39d2e30da55c945a1f14958fd024250973de670337ea7bfe,2024-11-21T08:34:39.723000 -CVE-2023-42250,0,0,75a4742322b768d5c79d13b4a04b3c0dc809feddf3b2072c43fbe58d71989953,2025-01-14T15:15:12.760000 +CVE-2023-42250,0,1,0b37b3fbb3c7f0bac2c312a0576b53ac7049f613b7d87ed487b7b4a15b2895ed,2025-01-14T15:15:12.760000 CVE-2023-42253,0,0,b04aeb7fb924e616cd7cc46de112d2f76a03dfa83986f286e07ef232f0c3e263,2024-11-21T08:22:22.867000 CVE-2023-4226,0,0,006e286645299d618e1e63c2a59dea3ea574d63652982ccb49b33fb73257fbea,2024-11-21T08:34:39.870000 CVE-2023-42261,0,0,35a3f257c867a2ba33190a0c6068e120a199ec31b279e7dddfaf91aa7cf86651,2024-11-21T08:22:23.020000 @@ -232857,7 +232857,7 @@ CVE-2023-42295,0,0,78fdaddf17673316050d94ecf48f4e22f5939229676b80860a38339eeb1c0 CVE-2023-42298,0,0,12a46d213e32df690be0aaadda6c8295bef1ce681653af4999fa64c565cfcc0b,2024-11-21T08:22:24.967000 CVE-2023-42299,0,0,42e6d0e90217ebd6897af35060870a789eeb3f84316d086cdc1d68c50431992c,2024-11-21T08:22:25.097000 CVE-2023-4230,0,0,9534782230cd0029822ce45f05cf5c34e400f785e0d37fc88e451b5d0ffb5aa0,2024-11-21T08:34:40.460000 -CVE-2023-42307,0,0,c46903bf1cf52286f586f3149da1661181a099d46edf014c465d0501e598f6c6,2024-11-21T08:22:25.240000 +CVE-2023-42307,0,1,a7d1d42948429dc42aa7dbf2bfd47f321cadeea0dc32da05af7dc10c730c3cc4,2024-11-21T08:22:25.240000 CVE-2023-42308,0,0,5779b47b0b3c03d47a2d139bd688f9b5b10b3cfcfb042139000d5ced50d75bb1,2024-11-21T08:22:25.383000 CVE-2023-4231,0,0,d8a5cd6afa3860ab1c78883cf8bf20eccd0d6d00cd46736814e11d4097787654,2024-11-21T08:34:40.597000 CVE-2023-42319,0,0,80b696e6d91a3f59e80d731c4538ea95a74347144234efd042f13fab4e1d33a7,2024-11-21T08:22:25.583000 @@ -233631,7 +233631,7 @@ CVE-2023-43484,0,0,df6a74cd16db4313c9c5d1346828ce84b53d020288b78a3f0d6337d93adfc CVE-2023-43485,0,0,f2e756b077c55ee5d60a7820b4f35f5bbc8c268c3f52a4818a3ee3de6d1cc46f,2024-11-21T08:24:08.163000 CVE-2023-43487,0,0,da4b908218727f03580be0b88995d21b69d09331653a711975ff37d806ae1d91,2024-11-21T08:24:08.347000 CVE-2023-43488,0,0,ebec5a7de90577d8c80523e93429725f86a21a7f6c2b5819c8450ec31d4d3fcc,2024-11-21T08:24:08.503000 -CVE-2023-43489,0,0,a701fa9819be2ef8f68f069bce66da2d029fc488de97ed32c5d2433ddc8973aa,2024-08-14T17:49:14.177000 +CVE-2023-43489,0,1,255bd644f26e5eb98c7842651b9f086c4c2607771746041b582b5ba121d0ca3e,2024-08-14T17:49:14.177000 CVE-2023-4349,0,0,a113f0c16e334ce035b6008fdd7a7e84fda6de5dcd31b75f844d308d867993ae,2024-11-21T08:34:54.270000 CVE-2023-43490,0,0,70a8d4e2a9f0e66d5f0d4f8aa9bbf29ba9745e14090a884644c25d2720095b7e,2024-11-21T08:24:08.723000 CVE-2023-43491,0,0,5de63384fb88ba7f66b800b0456c3327a91060d3df85b7692db574848ad55def,2024-11-21T08:24:08.840000 @@ -233756,7 +233756,7 @@ CVE-2023-43625,0,0,781e2ee8e14d71ef10618af426f25d3e1ac3b24fcdb98100241094dc105d2 CVE-2023-43626,0,0,5a82ed18e1e88cb5c4cf08d67752500e5ab6606a4784a60f9aeffbd12b92f629,2024-09-16T18:03:16.707000 CVE-2023-43627,0,0,027a4fae8f70753107478653afd4fb09c7e4b501284835f69796148330392dbe,2024-11-21T08:24:29.830000 CVE-2023-43628,0,0,d78fdb1751e0071a0f188e0cae075de717cee619346d0da60a48b87ec0f27cf6,2024-11-21T08:24:29.960000 -CVE-2023-43629,0,0,0c39476414636ba1b65e4b9b9d8b486cc9c1c981b8a36ab560e62734162d3d23,2024-11-21T08:24:30.083000 +CVE-2023-43629,0,1,7227090d78fa133dd63f92bd1613c06ae0de1814fe3a4c8f10e5041ec68b76bf,2024-11-21T08:24:30.083000 CVE-2023-4363,0,0,674796ba5c735381a373b235d40a447ef184594684706fce4e9f552ffd1a52a8,2024-11-21T08:34:56.300000 CVE-2023-43630,0,0,69d76e1ff521e1bb4e588210448247ab54072d4b35abb11b0cc5cb5760a96c2c,2024-11-21T08:24:30.200000 CVE-2023-43631,0,0,9df7057eaaa14202866f584efefd9fd44262eca429fc90004b656d07e6bf66ec,2024-11-21T08:24:30.343000 @@ -233856,7 +233856,7 @@ CVE-2023-43744,0,0,b9b2af5b81ce4a06f16eab52b4fe9245ab9252d28f1263c5ebfc8e35bf8e8 CVE-2023-43745,0,0,8b621517115a592fa3f91a26083072e6347a437fc61388ed73f3b4b513b6d02a,2024-11-21T08:24:42.460000 CVE-2023-43746,0,0,11e766ec995a8dbdd6027bca3fa95eb0b941317c60eec966108ecf919eaa09db,2024-11-21T08:24:42.570000 CVE-2023-43747,0,0,fec9b1553e09a914bc97c375ebacc8da8747e6d0dfa9ad11fd586c4fdb830d42,2024-08-14T17:49:14.177000 -CVE-2023-43748,0,0,6b626cf556ac8ee480b2eaf68e71fc28b544e17d246b77f3e06b98078e9d35c2,2024-11-21T08:24:42.817000 +CVE-2023-43748,0,1,f436502221da027b85d308b08eebe00c4525a3aad91fadb7da61485f2b98ccab,2024-11-21T08:24:42.817000 CVE-2023-43749,0,0,fc5f37e89c5f80208705966f90081239e2a2980e066c259c71ad9e78ce3eda23,2024-02-14T18:15:46.093000 CVE-2023-43751,0,0,0f501d0d0574fdd9cb279bfc6ebde200f38eeb423b204fa334ac798ccfda9841,2024-11-21T08:24:42.943000 CVE-2023-43752,0,0,cd1d98c27905de4ad185a5ac569f0405b2569955436472605e30cdaa89bc64d2,2024-11-21T08:24:43.067000 @@ -234238,7 +234238,7 @@ CVE-2023-44251,0,0,84b277936ecc4c4737659e3659d8730ad2c164761badedeafb4e189e8b692 CVE-2023-44252,0,0,d86172e24190fa416860e3d785f872d0502e07e9a8ec8c461d5fc4166e2349c4,2024-11-21T08:25:31.487000 CVE-2023-44253,0,0,05adddf01c28ccdadf157eaf7e699ca16a7f022edc42efc339913e2d8e614464,2024-11-21T08:25:31.610000 CVE-2023-44254,0,0,475ef6ce457d30d091835ffaf71dd3aad018d0e54862a597c59869af0501a514,2024-12-12T13:56:07.013000 -CVE-2023-44255,0,0,7fdcb3d3de35862cfec3d92f0ef2423e8b11fe79c792f372bb9fd7b3037b5267,2024-11-13T17:01:16.850000 +CVE-2023-44255,0,1,89dfd98cfa3af8adf44caa18df1198d6ae54195d0bd4af13d3e3e7601f9e6487,2024-11-13T17:01:16.850000 CVE-2023-44256,0,0,e10f4305e62a4a76d73f69a54ab165b287870937a6bf5c86952e332366741db4,2024-11-21T08:25:31.910000 CVE-2023-44257,0,0,17e774c297b8ffbfc8fd6f5419c407c46c026eea2c723e8720dca22698aa3dc5,2024-11-21T08:25:32.047000 CVE-2023-44258,0,0,36c82b43bb4885920a564d9aac77d0b6b25533d22962f75e532fb78683d94098,2025-01-02T12:15:07.020000 @@ -235115,7 +235115,7 @@ CVE-2023-45700,0,0,a5d61ea257760116e370cc4bc4aa3c0b91f4926c7f46f20cad395fc1ded9a CVE-2023-45701,0,0,0513a837e3b8d2a0211932628f8374b37d2953e878863d17861db884fe6ecee1,2024-11-21T08:27:14.420000 CVE-2023-45702,0,0,a14d92cd9260695aa0b4f2c4055b65024e84a9ee1cddd8b59e758ea90b0efc03,2024-11-21T08:27:14.570000 CVE-2023-45703,0,0,2db0e6b1bccd1565329a3cf77221a1298a048b526152404ba257b634f80870cd,2024-11-21T08:27:14.710000 -CVE-2023-45705,0,0,5acacb4ed82076fbe30eff2143f5fd7413f1ff4f2ff0806505384a626e4576fc,2024-11-21T08:27:14.847000 +CVE-2023-45705,0,1,3109a7297c45d95ae2e37116271275333e2a4e08def0aa9619e42bfb8548cb13,2024-11-21T08:27:14.847000 CVE-2023-45706,0,0,8086840ad07dab5371c4f1b3b1910ca4afe2e69cb106ad95217a95c6c8a9897f,2024-11-21T08:27:14.967000 CVE-2023-45707,0,0,56fdbde5cb7c1d0e0768f434a8990ecfdd59b78994104007a419b09892fb3fc5,2024-11-21T08:27:15.097000 CVE-2023-4571,0,0,1b6dec0141b13b68c66722ef28674187fa141fed508ad265ede28eb29807d5cd,2024-12-10T18:15:26.880000 @@ -235139,7 +235139,7 @@ CVE-2023-4574,0,0,2bd07f1604111f58b955fec3d55bc53098ede40a2810e7f595f8038daee654 CVE-2023-45740,0,0,1e75a1fafaf1ea81b7aae27a54c3ccccc7b12b9476126bdb28670f05e1ab052f,2024-11-21T08:27:16.987000 CVE-2023-45741,0,0,ae46c6e6dc9fc9986ac7f3ef68667fd290a9e00ed5c2397ef7e3906173fba358,2024-11-21T08:27:17.107000 CVE-2023-45742,0,0,424b3b687184cc66ed363f44f7235fec7f8365e35ded73cd84c847ad39a5d951,2024-11-21T08:27:17.230000 -CVE-2023-45743,0,0,b802bdc489b1e87850fa4eb080ec403747d08dc05eaec869d9c21cdc254e0b80,2024-11-21T08:27:17.370000 +CVE-2023-45743,0,1,df4b143824ff631e805167090687da237c2021025a73e9d88ed13705d91169d5,2024-11-21T08:27:17.370000 CVE-2023-45744,0,0,53c0556ca940959fc5d73afaf67665d38debb63703247d8f816d6a2a8cb2b863,2024-11-21T08:27:17.497000 CVE-2023-45745,0,0,1904f27d1096debbcbbee99a874397c5ca6986feaaf777646bd8358fa305421c,2024-11-21T08:27:17.623000 CVE-2023-45746,0,0,28000d3f2f072b911541906685719c47e23a0d51142df750bbb32a543ba6e18f,2024-11-21T08:27:17.743000 @@ -235565,7 +235565,7 @@ CVE-2023-46256,0,0,2f66fabd888ee3223e2b54cb676f1cd460035953b4bd1d8963c74a4ac0a89 CVE-2023-46257,0,0,99c235e371e0dd078eef4887bcc0300975a95bad9beb2a2e04c66790373bf2c3,2024-11-21T08:28:11.180000 CVE-2023-46258,0,0,d1551763538d8eaa75879da1a1aa77b7412468255fc4a632d97830330080322a,2024-11-21T08:28:11.303000 CVE-2023-46259,0,0,b57f734a58e5e4b25b2c1ad57809eed00c490c93ae7a70305e3e1824e93021c6,2024-11-21T08:28:11.430000 -CVE-2023-4626,0,0,8a5c99234e5f5bc790c69d8d9a4f532efa98bbb0a544cc72950e1ca48bbfaef2,2024-11-21T08:35:34.180000 +CVE-2023-4626,0,1,0c85348028cac4d7443781cd09d7b9a9f12f676f8731e043b6f7105f994c5fac,2024-11-21T08:35:34.180000 CVE-2023-46260,0,0,15ea56aca523b74c101f99681bfcb934954e5d8b6a9dc02429bce53879ef702b,2024-11-21T08:28:11.550000 CVE-2023-46261,0,0,b20b4dd61ee47363db0c82a4b89f12a192e6620aa86deab1a08f6ad1ee2c0d98,2024-11-21T08:28:11.673000 CVE-2023-46262,0,0,f9cf692d3d0e0d1c79d128f72410df8a83f9d4df9d38fd9f3af816aab4f1e210,2024-11-21T08:28:11.800000 @@ -235918,7 +235918,7 @@ CVE-2023-46711,0,0,10461e3199ca74c0551a32116631ff9e2136d0c732f728f9ed6f949c7cf46 CVE-2023-46712,0,0,fdf304acb640d6c5c9b27fb14d1c1f950387e795ef7592ee75fefc3ca09147b0,2024-11-21T08:29:08.037000 CVE-2023-46713,0,0,7ec948e1197bfd8e51899d82f0712028840dbf3cba1b2aed7e6646afcea7270a,2024-11-21T08:29:08.233000 CVE-2023-46714,0,0,ce18037b36677f2816f54477a037a4b84221f3eae040dc2e14897e192dcc0255,2024-11-21T08:29:08.413000 -CVE-2023-46715,0,0,f9696c467f8f797e696f1f2ad723b9b0f8a430d65b542ef7afdaffa44ee9c774,2025-01-14T14:15:27.387000 +CVE-2023-46715,0,1,279c94902b2a24b469b55d1465c287560c92b7d04791ad258f06e51706c334cf,2025-01-14T14:15:27.387000 CVE-2023-46717,0,0,1f36867e76f044e23cc25eb25fb4f43d162c6cd99285a154e9a8c2369700b343,2024-11-21T08:29:08.597000 CVE-2023-4672,0,0,1d76ac05ce5b5babe10629a223016fb95a73366a13d7ac98420609b090cf2b39,2024-11-21T08:35:39.357000 CVE-2023-46720,0,0,78c156e18431d5e3d721b08abf3277e6716e1b8c318d85959bda17346eee6727,2024-11-21T08:29:08.810000 @@ -236270,7 +236270,7 @@ CVE-2023-47172,0,0,f96d33596e8b87e991b9c1bd2e5d357f2f4287534e7bec6e2b7630ac982e0 CVE-2023-47174,0,0,3186c7e8ead148bdd3055be43e883eeb52845b4bb17391af02c9e2f9e782f64c,2024-11-21T08:29:54.190000 CVE-2023-47175,0,0,e6466d777ede55f4ca2956ddf87f9d9ccb59b506c80c039228ad2f228638590c,2024-11-21T08:29:54.350000 CVE-2023-47177,0,0,5361d5e2ce6ca046282c69eed906a4725ac787feb21fc61cd92dd9eb5cb3b9f7,2024-11-21T08:29:54.483000 -CVE-2023-47178,0,0,9e3e74ee64d9082a9fc57ea323f922533cf703e48212d65e6546566e75f8f805,2024-11-21T08:29:54.607000 +CVE-2023-47178,0,1,b0765ee6678c8a999c62e97bcf824bb02ea00eb3a925c4b58156438a081b4100,2024-11-21T08:29:54.607000 CVE-2023-47179,0,0,185f89fba70b217eae973470f902f61214348c87ca9089f087650da3cf4cb3fd,2025-01-02T12:15:14.560000 CVE-2023-4718,0,0,06a5b75b66fc698c34861c2a65bd83baf4703a617480c21068c1a488ea0f84fb,2024-11-21T08:35:49.300000 CVE-2023-47180,0,0,39fbff9596598457c2b099251bcde8e3d5ce2f9aedb60fbb8fc79680ed7fe752,2025-01-02T12:15:14.713000 @@ -236755,7 +236755,7 @@ CVE-2023-47819,0,0,2acfa8466f84f79270fe648165931e9eefa39c36aae2ee917bb35a9d357de CVE-2023-4782,0,0,e5805488b01da3d85e73b3359bc45916fd6725f238ac0454d1b2d2cee152d6a9,2024-11-21T08:35:58.410000 CVE-2023-47820,0,0,eaf39b5a1c408837984dcb9ca554ea7dbadf9b792438142e35c79e7f6b162d52,2024-12-09T13:15:31.100000 CVE-2023-47821,0,0,1345c354e174d85dd630ed11b0f18500dab7c99a6b2f25218fe165930cc59161,2024-11-21T08:30:52 -CVE-2023-47822,0,0,97d017c0fbb7b302befbcf2485c3d46d95deb81f148e8f7670346f406c2ac6b3,2024-12-09T13:15:31.253000 +CVE-2023-47822,0,1,ec555d1883fca9b41578d2206af515749ee96cb81c854c1ff6354cebdc439167,2024-12-09T13:15:31.253000 CVE-2023-47823,0,0,78346fd77912bfff7c73f7c82810f7e0d823b4db807bfd46e60e086a782aa2a3,2024-12-09T13:15:31.390000 CVE-2023-47824,0,0,ea1cc68bd7c5ae9083aa5d353ffd37d1b8b9f9a8fdc6e84fccc42c7aeb45e698,2024-11-21T08:30:52.120000 CVE-2023-47825,0,0,efccb510abacdada329987df18c744babc854ceef1657a649eff6d5a3dfd622f,2024-11-21T08:30:52.250000 @@ -238639,7 +238639,7 @@ CVE-2023-50377,0,0,2e55e5dd0b9ea749ddd96251ca5ab5ff90e2e8f4b180745130261f7bd6023 CVE-2023-50378,0,0,0454eb883a7466b810642c469a3a15f6ba9e92155bb9f1e7524280e2f82c443b,2024-11-21T08:36:55.923000 CVE-2023-50379,0,0,465b9ef3245385cb0e3864f75d17a3bc17c56278d0bda52c13989cf1c4f66bbd,2024-11-21T08:36:56.110000 CVE-2023-5038,0,0,0c14545fbe065a76fb3622ab72cbbe110aa299cbbc565cc917bde9e771ff322c,2024-11-21T08:40:56.980000 -CVE-2023-50380,0,0,0f0b8ee8007496d01353e809ea0226bbd89903dc91a7928d6968a7158f88c4a1,2024-11-21T08:36:56.310000 +CVE-2023-50380,0,1,72e2ba827c0405f44a19bb00e7ed8fa9f9dbdadbe65eb243d0dabe303a389ba7,2024-11-21T08:36:56.310000 CVE-2023-50381,0,0,ee7d57e36ca60df4250d44e574938eb8ddcf3bd310f31deb1c9d78f7fa4c00b0,2024-11-21T08:36:56.433000 CVE-2023-50382,0,0,cbcc81630f09b2c4cfb0c22d8dc9844a60d0e20289efc5af82ef418493cd09c9,2024-11-21T08:36:56.563000 CVE-2023-50383,0,0,e859d76f4d38e71520f31d9bb502fae7a56c4ad7c8e60650734d136fd3214959,2024-11-21T08:36:56.687000 @@ -238872,7 +238872,7 @@ CVE-2023-50858,0,0,6cf3e52ec408d9e2f77122bae9e4181d0804ced289e8f725386574e60d0ff CVE-2023-50859,0,0,99c48778832f4b33abdb424b77d90d0e90e04bab50d1b272dc516c5b41aec90c,2024-11-21T08:37:25.573000 CVE-2023-5086,0,0,2fcfaff7469d09b66dcdf56045ba459e26023f8dfda71f8468bd3505de7fe373,2024-11-21T08:41:02.260000 CVE-2023-50860,0,0,aec9bff782631f7e5ddd651827c3e22d4734c876a3fb2dd799a39e78f620b2d3,2024-11-21T08:37:25.697000 -CVE-2023-50861,0,0,aef4aed7ec415ff337e990b534892deaa7cf18a6fcbb659a00dd740c379a7f06,2024-11-21T08:37:25.820000 +CVE-2023-50861,0,1,937e803fae311d0430286880cb696fbe69cae93a6caa15d66778f450d3caa28a,2024-11-21T08:37:25.820000 CVE-2023-50862,0,0,19c30406badff356371f99f45deb3474df27f7e0a8e8358554dac851dd8a61c4,2024-11-21T08:37:25.940000 CVE-2023-50863,0,0,01ef7effa8649e6900c1dbca4eb10331bcb2588a93ac11c8842a262f97eb487e,2024-11-21T08:37:26.057000 CVE-2023-50864,0,0,9e44585ecc6b0cc07bc95716866973e09af773d5a0c1b97ea694729e9f8d1c19,2024-11-21T08:37:26.180000 @@ -238898,7 +238898,7 @@ CVE-2023-50882,0,0,d6b4516bf6b5e3e63e6799c5c6106284188aa1c5276117e7a818f78a76375 CVE-2023-50883,0,0,672a8f063fa55652697bbe3f1d6a011a8767cdb491bd712a91e4f7f54e570f92,2024-09-20T15:18:06.593000 CVE-2023-50884,0,0,fecdc474fc569dc94f0342c1eb0792ff3125446e9c5510abcc9fd701d51f0530,2024-12-09T13:15:38.850000 CVE-2023-50885,0,0,58f7e8a74f1a0d0ed773a3974d954683724942e74ec0db395bc222ed861f754e,2024-11-21T08:37:28.540000 -CVE-2023-50886,0,0,d78238ddd8b1f9c67a40f95976871812046fede1387f524fb268ef9a75cf5693,2024-11-21T08:37:28.667000 +CVE-2023-50886,0,1,0ff0a73ca6b4fd2c72305b09c5641b7d24321a0193cb7efd06f7f405e42e07df,2024-11-21T08:37:28.667000 CVE-2023-50887,0,0,a588089bb07cbb80357a483b040c205f5749e2c1c179de8892926d3cc2280f60,2024-12-09T13:15:38.970000 CVE-2023-50889,0,0,0b705633d570bf40d53690bc60f3ee4bf827ae52264fdcc16c2b6acc9cd75798,2024-11-21T08:37:28.800000 CVE-2023-5089,0,0,39022ad8aab1d3b25314f8f4af040beae42bdd3a6d5c322568e099be6754cb35,2024-11-21T08:41:02.673000 @@ -238909,7 +238909,7 @@ CVE-2023-50893,0,0,7467fcdb65571b5e9b94435584a92850ef33f3e96aed3d3b4138c58527de2 CVE-2023-50894,0,0,5bc77fe2c30b796eeab58d2788624ef16d221f1381a759d7ea40bc13ef60ab80,2024-11-21T08:37:29.487000 CVE-2023-50895,0,0,bfc255063c95b66f3198ecbbc17206ffd6246bc9c9a119532111a958ad8b0a09,2024-11-21T08:37:29.717000 CVE-2023-50896,0,0,b84ef46326aa4cad860424ab64d797b0dbdeb510a85f946cc26971282916fbe9,2024-11-21T08:37:29.930000 -CVE-2023-50898,0,0,4d7f09f82521f7f889eb710ae8d2add5c40b723cd8b69e09c9e6fa8fc4e22425,2024-11-21T08:37:30.070000 +CVE-2023-50898,0,1,8b2864bba0b347fc8d6148dca2ee8ccb00a2caf6e32c0fb9bdaec558cf5a7976,2024-11-21T08:37:30.070000 CVE-2023-50899,0,0,2bb69dcf40e9a3df46636299866f8580445faedf9dcc96b8afcb83513b0f30f2,2024-12-09T13:15:39.097000 CVE-2023-5090,0,0,f518b2f8d763d7d397e26976e4ed4bf83eb2c9f2d153d34ad7e472d4c1117386,2024-11-21T08:41:02.793000 CVE-2023-50900,0,0,b7ab39426fcc06e2bc51cb2d908838ea8ec06db1d269072da0ca5a9dd5397669,2024-11-21T08:37:30.193000 @@ -239142,7 +239142,7 @@ CVE-2023-51365,0,0,2b465a41608afd423c9178a7b06551d04a0cfecabb3b43f3514ccd33d3fe2 CVE-2023-51366,0,0,121a77bbc184692e1c1034ff23ea43a35692a623cde224ccc90cc4bd649b40a4,2024-09-11T13:32:32.563000 CVE-2023-51367,0,0,867d05dbdeb5cbdc8fc2474ecb52ab26e146bea0e2bdaeef7c3bbdd919fcc0c9,2024-09-11T13:27:40.363000 CVE-2023-51368,0,0,b1025009bb8b066ecf7d76a3e801e6b3ebc180a6cb6e297b2a00b72fdec05a8b,2024-09-11T13:33:30.853000 -CVE-2023-51369,0,0,af87f4729d79e1a768b0b48f680b93b5dededc621a7bc53048cc66a9dcdd8bbf,2024-11-21T08:37:58.080000 +CVE-2023-51369,0,1,c7cd1907f99165469e2b859ce59d195a07acb4445e369416c410667b749ed24a,2024-11-21T08:37:58.080000 CVE-2023-5137,0,0,5e24481925400ea955bd133c552a13071f45e83ba1fc330c28bc21ec2f17a2aa,2024-11-21T08:41:08.247000 CVE-2023-51370,0,0,7852cdfa69a72c7a2bd02aff109e6b6fe97a67bee1ff22ff7a096cd85f4f61c8,2024-11-21T08:37:58.197000 CVE-2023-51371,0,0,2d3dff3c2eb1df9684c8a63ce84530b38f012bb2e6088dd39c84219a3fbf4ea2,2024-11-21T08:37:58.337000 @@ -239305,7 +239305,7 @@ CVE-2023-51519,0,0,fec0605cb844f196eaff682ac5dc20cc4da5ac68801fc28f6d7134669a007 CVE-2023-5152,0,0,e0e7345d47320bb88865362c9247216d472fbb369a5bd0435428e121f1223b93,2024-11-21T08:41:10.290000 CVE-2023-51520,0,0,d41905c890993c1ef2db4baf2617b8c6993caa40e55571d729ace60787360dbb,2024-11-21T08:38:17.870000 CVE-2023-51521,0,0,63ace0e2ea9fec07e829fa38073d05ad373f28a4301e5d66ae7f894c4d5be882,2024-11-21T08:38:18 -CVE-2023-51522,0,0,ea2a678a6d5658dfeb60343663e43f8495954e6b1a7b1433e6c45924652acd66,2024-11-21T08:38:18.120000 +CVE-2023-51522,0,1,0222442cef748fab925102323919668442a8748180be19a71cd0512bd06615b0,2024-11-21T08:38:18.120000 CVE-2023-51523,0,0,cd66cc622042618a01e1a4e6a7152686dfb1446731c00f96a33e19b671eb768d,2024-11-21T08:38:18.253000 CVE-2023-51524,0,0,3f15f496afced8105551aa9221c730a16b2feaac3f249e417442e5dc1a4ba608,2024-11-21T08:38:18.383000 CVE-2023-51525,0,0,cc8a41c95e97e3eef08e489711755257d7199a61c16f9491fa2dfe0854a508b2,2024-11-21T21:15:15.553000 @@ -239848,7 +239848,7 @@ CVE-2023-52222,0,0,662c7c7af63a3f624a2e105e5831f086b81f5361afd613413ad5624d6c520 CVE-2023-52223,0,0,dd4562b53360696ac699f1e9ae1954f730d5d4ab99f2d17ac6baaff220a5fffe,2024-11-21T08:39:25.960000 CVE-2023-52224,0,0,0304f27aab63b3fef9911586609743e07545d5f68cee0b628e69183780c43034,2024-11-21T08:39:26.080000 CVE-2023-52225,0,0,cb0ac31bff2bea567cab01822e62002c5c53752f08eb89c02e9f3367cdd2b438,2024-11-21T08:39:26.203000 -CVE-2023-52226,0,0,d9534cfdacaf9e49604302c93c51026fb43ddf1a762d45c0713a4e6484d13dcc,2025-01-08T17:01:20.007000 +CVE-2023-52226,0,1,fdb5b005a5155f6c3d08c9227b6c31e0241e7292ff69602f6f2aac93005ad540,2025-01-08T17:01:20.007000 CVE-2023-52227,0,0,beb3d6ade1985f92fca5f759d82ffd4a50eb1f74741eb27fb41bad9737c19590,2024-11-21T08:39:26.440000 CVE-2023-52228,0,0,dbf758c4d88af4d9c17a754628ecb3f00f8342a2d36b444cb80a7668ca1b2a39,2024-11-21T08:39:26.560000 CVE-2023-52229,0,0,eb5ee1c9114ec221fefc0b5bdf04e6d232285e23dbc4e9fa68e1d805a6df4ef7,2024-11-21T08:39:26.680000 @@ -241564,9 +241564,9 @@ CVE-2023-6391,0,0,66ba8b7dd6d382292303c00e34d31b0a56de19cce37e59655357af3a5809c4 CVE-2023-6393,0,0,69af0adb74196581513b6e48d324d04fa5bfa75536a088c281c9d3f64389f406,2024-11-21T08:43:46.267000 CVE-2023-6394,0,0,54a65388a02a563612d72dbacd3fdb8571ba8b3e6660956535f45387914a41b7,2024-11-21T08:43:46.407000 CVE-2023-6395,0,0,2abf8c6aadb1e90521e841bfdbca43649140749f92ffbce71e09766944cc9000,2024-11-21T08:43:46.537000 -CVE-2023-6397,0,0,3e70ff10af36f20b4aaf66e7692b78216a9e8ae18b2015eaf38f0cb0da1b2ba6,2024-11-21T08:43:46.697000 -CVE-2023-6398,0,0,45e3de22ad05e354878bf41b17ecf8399a44cbe7a31dda74d576ef91464e403b,2024-11-21T08:43:46.823000 -CVE-2023-6399,0,0,c9b36974ec9415532fdcaae1fdec7e78e325b56a52110ec35272762bd558b145,2024-11-21T08:43:46.957000 +CVE-2023-6397,0,1,bc3af089ce6c1adb0d4de4cb74dbde23436b7b1aed2bf58be940d8a5a2a644ce,2024-11-21T08:43:46.697000 +CVE-2023-6398,0,1,7146c4f984126be8b690eb33cb64c389e6fa41d43cea0ced1216cfbc3ff4d873,2024-11-21T08:43:46.823000 +CVE-2023-6399,0,1,807a238986c755748f23ca214224d85366a51ca6fc774309affd5f32563d5f05,2024-11-21T08:43:46.957000 CVE-2023-6400,0,0,72831ff05862c54a05eaa190d5e0b6cc1bbccf295470675d77a5043788da0f97,2024-11-21T08:43:47.090000 CVE-2023-6401,0,0,868f81b7b7551dce6aae1cfcb0003352fda7e65a349e2da3fb680c495807c00d,2024-11-21T08:43:47.223000 CVE-2023-6402,0,0,0c89da37396c30e00e6d75f9aae38e19dbc57459695681cad5f81bca9e128446,2024-11-21T08:43:47.370000 @@ -241876,7 +241876,7 @@ CVE-2023-6759,0,0,00521cf53203a67a8224dd11ff9a6de9d5933bf417de7242c786808402a903 CVE-2023-6760,0,0,c01cfd1714816d8205be33b644c5cf4fb2cc6b89db143ec969f9a4a6931f1520,2024-11-21T08:44:30.140000 CVE-2023-6761,0,0,e66f7e97e82a92aa9637dcca4417f2887ac9c584790eab8000f3dbeac5bd83bc,2024-11-21T08:44:30.290000 CVE-2023-6762,0,0,0897c0b77c2255fffb5dd97f305f8acb79891c0efa4092cc4e86a71c9fdd5e52,2024-11-21T08:44:30.430000 -CVE-2023-6764,0,0,8a8e94da39a6e7166760703d33998ac67f41728482af14750f6b84d411069c4d,2024-11-21T08:44:30.593000 +CVE-2023-6764,0,1,c3de23e2955f5fda14ae93b7a204149cae5169aa0ff1f0a250ac51170466acb5,2024-11-21T08:44:30.593000 CVE-2023-6765,0,0,e7183cb37884c6044d65cd38c9a45ef7378da9a6d88c1c58070134b621dc2f80,2024-11-21T08:44:30.730000 CVE-2023-6766,0,0,c1a3f9934f27774049b800782bfdd204430e3c6ec40f5b6de8f5c67a10a32075,2024-11-21T08:44:30.880000 CVE-2023-6767,0,0,a6147a2c649d777035b3b917f7d468b2dd28ddcfd879b03b9012f389a38d1b84,2024-11-21T08:44:31.047000 @@ -241915,7 +241915,7 @@ CVE-2023-6805,0,0,e8a72fb1acae6e64eb2bc7013d9f329dadad6d28120767dd4db32521bf47fa CVE-2023-6806,0,0,9a26d403f4d4383cbf97488770c0c67e75a4a61d219eb68d8d0d878f9baa70b4,2024-11-21T08:44:35.743000 CVE-2023-6807,0,0,28876ef72ac1582ed427fbae4269621b87b9e8bc060057ead9a9d96f323e1a83,2024-11-21T08:44:35.860000 CVE-2023-6808,0,0,5134cef93a37c51417a7640f91d5ffede6af946721e7812e11e5b70f8dc18397,2024-11-21T08:44:35.993000 -CVE-2023-6809,0,0,462ec8d99541549e0f48741ede4499f1011b6c8b1b581beb15fabc3a012fee0d,2024-11-21T08:44:36.137000 +CVE-2023-6809,0,1,a523520d88e2ecf4da64e2fc68aca45be2c95a6f45349c1addf5724ba404b5ec,2024-11-21T08:44:36.137000 CVE-2023-6810,0,0,b6f57236d3592dabbd9315c807830108753de79cdc00106bfd10d585b91ce71c,2024-11-21T08:44:36.263000 CVE-2023-6811,0,0,255a59fb3efe24bf5e970c5290d6aef83ee643ba754599c0e1607d95b826d668,2024-11-21T08:44:36.397000 CVE-2023-6812,0,0,6fe501ee529542d8187e8b17b4fed037b2968cd90363c68b6e57694c07877974,2024-11-21T08:44:36.517000 @@ -241926,7 +241926,7 @@ CVE-2023-6816,0,0,9d5e921123ff7221ffbfccba0334431d7bf72f6cab6716591e0e0c8a1b19b9 CVE-2023-6817,0,0,34a1fc8a9db0f413f7cd13d163923ec46ef4ee0684de4e05c02168a1db4c49db,2024-11-21T08:44:37.227000 CVE-2023-6821,0,0,1870661daa4634490b3e91a7896d5a213741c77db3759e7ef3563cbcd8adf036,2024-11-21T08:44:37.360000 CVE-2023-6824,0,0,d83b9dd9e6adb64348e59b4fa59bf3980641b9baa1ab82202c67c4ccb7462a0e,2024-11-21T08:44:37.473000 -CVE-2023-6825,0,0,64ed982d563d505a542597222f346f382f028068638cbd44cd1a1968ba6fcae1,2024-11-21T08:44:37.610000 +CVE-2023-6825,0,1,109b02ded2fb18f3c9da311412b5e9c89eaac4b80cfb0bbfe7f34b81f2c570a4,2024-11-21T08:44:37.610000 CVE-2023-6826,0,0,b208dc6477e1edbb2a5c9b182cdaa4613958a196948adf4df4f3ad9a78b515f1,2024-11-21T08:44:37.730000 CVE-2023-6827,0,0,d8f0dad984c43b91bb182c8fe61ef45b35e904037fc9f7210557988036ea909b,2024-11-21T08:44:37.870000 CVE-2023-6828,0,0,8fb23e4ef37f948a57aefc44f8f73503347dc7333cbded170377d64198955648,2024-11-21T08:44:38.010000 @@ -241979,7 +241979,7 @@ CVE-2023-6876,0,0,f89af48ef5f5504c2e692ad4c07df9536f428f7191488caaa8dee49bae4e03 CVE-2023-6877,0,0,fabb8390ccad1bd1daff92a75095fb666b1adbb5bb5a0b20ea6adb5df4bb8118,2025-01-14T20:36:35.477000 CVE-2023-6878,0,0,072a14737a3d37e6ab8da6421d172d02428f32099c58474343ed93f02dcb71b5,2024-11-21T08:44:44.710000 CVE-2023-6879,0,0,f557f69f112ac5fe6f2e3298e8f60d744c9445969de3d787a638354f9bd92b58,2024-11-21T08:44:44.833000 -CVE-2023-6880,0,0,8cffe191e76e6ed62e8df470f4ada6da9b212477d9e859af1e026034b1af0e0c,2024-11-21T08:44:44.967000 +CVE-2023-6880,0,1,4d462eacb48049e58c3f74f43a9dbe00dcb84f31de6413ffed3ab3c19c0ed8d8,2024-11-21T08:44:44.967000 CVE-2023-6881,0,0,7e39493748e64c00f257d736e7ea6cf7f4349773315eda215ccc177f5533eb3d,2024-11-21T08:44:45.093000 CVE-2023-6882,0,0,9bbad07936941d4e1b156f1f177d08f2b37a0f935af4f7f0c2f03369cf66f998,2024-11-21T08:44:45.207000 CVE-2023-6883,0,0,64f26e18895349d73071ab6a57976a51c6f336b16a457d791e5ce153082071bb,2024-11-21T08:44:45.330000 @@ -242051,10 +242051,10 @@ CVE-2023-6949,0,0,078850d39f1204331fbc98d392a0469ded8443843d8a5c473dc39bd1460bfc CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d2f,2024-11-21T08:44:54.263000 CVE-2023-6951,0,0,5cf81bbb22b08bd5b560463dd9595ff1b504507f72343e9bcf9ea7dcc9ded4e0,2024-11-21T08:44:54.380000 CVE-2023-6953,0,0,e3148f54ace7102cc1d1855a57ee7588a45b42a9470f40348979b8e5a6fa722c,2024-11-21T08:44:54.530000 -CVE-2023-6954,0,0,a97c3f6d351e66fa5ca0d2dbb379407ceb44e3923a8ef60dc6fc23d70ff4b60a,2024-11-21T08:44:54.690000 +CVE-2023-6954,0,1,2fd094b844c40962fb168eac901f6582c8310ae007102d8ce37441a7d6e0d012,2024-11-21T08:44:54.690000 CVE-2023-6955,0,0,b511e736eb1492e80ab280a40a08f55d678952ba2370b7bb1d7689f096e2ea91,2024-11-21T08:44:54.833000 CVE-2023-6956,0,0,5a2b668004fecf802df77f05304bc63d47f9be8a32adf14edea244199bcfda67,2024-11-21T08:44:54.980000 -CVE-2023-6957,0,0,ba00d1fac82e9a2020959666152bd7f3630b2ff44351b107c4a5bd54a113ec1f,2024-11-21T08:44:55.140000 +CVE-2023-6957,0,1,ae6e32578d5d74ff3fcf0c3bd27b964f39c4fb55015f001a374a6328ffc6420f,2024-11-21T08:44:55.140000 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 CVE-2023-6959,0,0,8ec838b66e35b19352010350b88da588492a0c4f4f1036ef3700c0fbdd552184,2024-11-25T16:47:33.943000 CVE-2023-6960,0,0,b6026c981573a00251f1c36bc13ef75af794522e5812fd8eff4aa7e26dc6a2ca,2024-11-21T08:44:55.563000 @@ -242062,11 +242062,11 @@ CVE-2023-6961,0,0,d0ee25ffa8bdb76f77c8ea3e3a486e8e065ab8917741a035a963350aba6676 CVE-2023-6962,0,0,4cadfa868aaf20f5de107a0c09d8fd16163bd9c10cf19a5360f8e7a410c0501a,2024-11-21T08:44:55.890000 CVE-2023-6963,0,0,01c79ae6ebdcef8bfb9c31ad967ef0972931fd93edc1bd88ea5a1b8e1c328f53,2024-11-25T16:47:33.943000 CVE-2023-6964,0,0,59149016838fd9e15f69c8e3ebf3a72ceec9d74b315e0e55e9bf9363bd1710b6,2024-11-21T08:44:56.170000 -CVE-2023-6965,0,0,98bed6d87033c685cad62b5c049f6585abe6d8010956678fe7075154e41b6c74,2024-11-21T08:44:56.290000 +CVE-2023-6965,0,1,f6e3e105e9a2a017627d97abf6941db90e8be471b48869112271220e47e4349c,2024-11-21T08:44:56.290000 CVE-2023-6966,0,0,404b8477c36a669c3840eadcbfd58d58203be0eba6f2f11300b8a16c973bcbfc,2024-11-21T08:44:56.403000 -CVE-2023-6967,0,0,95225f8a0e38dce9925dc392ef113d1898988e162ee969fd162f53457e4b5550,2024-11-21T08:44:56.537000 +CVE-2023-6967,0,1,59300b2cc3bb9047b4457057ec76f2b59296de8c0e79da116e074f8507f110f3,2024-11-21T08:44:56.537000 CVE-2023-6968,0,0,e305de6e66181a39e2b6c25e5e4fa341cb65869913f65587f94fba4a34ff03b9,2024-11-21T08:44:56.653000 -CVE-2023-6969,0,0,9f7aa77efd42604aa2d7f429169839ea1a4fde6068a7404d876a143c4702be47,2024-11-21T08:44:56.793000 +CVE-2023-6969,0,1,fad3f6e82ad35aea1701f26bd3b25c05400ab049ac4bee37ba7c5a2687aaec8e,2024-11-21T08:44:56.793000 CVE-2023-6970,0,0,b1eba1e19bef79d8ccacdb9d3c2541f8fd1190cd62a020686ed05171449766e0,2024-11-21T08:44:56.910000 CVE-2023-6971,0,0,adccd9912a1a443b9f533b1bedd8dc796fb2189384f39ab1938beeb7ffe23fbd,2024-11-21T08:44:57.050000 CVE-2023-6972,0,0,f5105acb52c8052b727e323c40f7b03e2b936c86a1c079f698fb0cfe00c434de,2024-11-21T08:44:57.187000 @@ -242094,7 +242094,7 @@ CVE-2023-6994,0,0,d15a852e7f08a1579ce5fe6303f4c0fc2419f62d98812cf73ce75adcf6d06b CVE-2023-6996,0,0,52002d14cb86abbd1281d090e84e4c42a72e92b614af25723f08db101d431aca,2024-11-21T08:44:59.900000 CVE-2023-6997,0,0,6e27e5b63f0a87af454d1261575dc30b0f4ff5f301848e086587a6cca0abb399,2024-06-07T19:15:23.410000 CVE-2023-6998,0,0,bdc0ada6e08e3eee8c2f0effb337d53dcef7c2bf7a80b8f32db217f457f92b0b,2024-11-21T08:45:00.053000 -CVE-2023-6999,0,0,20badeb2c238d441cb421c48ace480ea27b8151e674b990be35a0786113f4d07,2024-11-21T08:45:00.187000 +CVE-2023-6999,0,1,f90bcf62b28a5e65270cc6ab57b9e07244188940cee872aaed5480346cc5c691,2024-11-21T08:45:00.187000 CVE-2023-7002,0,0,84396c0bdf73e170d66b798921a49a9f0a13dde1ac20a4cf4c9ca68c4bd2e87e,2024-11-21T08:45:00.317000 CVE-2023-7003,0,0,090dbcb22a27ae8d1249b5396e7cb61a556fd7edf17cf3f654f7795066af7307,2024-11-21T08:45:00.443000 CVE-2023-7004,0,0,2b0a1c3f594514067c80c828d3cdf50833ef4cd40d9bad21bf097cc6e6910593,2024-11-21T08:45:00.633000 @@ -242164,7 +242164,7 @@ CVE-2023-7068,0,0,66612add00985bee1cb0a47a183f4ec85fafb21e3c327acc340b0d97270e84 CVE-2023-7069,0,0,34c08207af52ed58978c3a450428597e03be145f6a2130e41378d9419807b940,2024-11-21T08:45:10.960000 CVE-2023-7070,0,0,d4f8c7975a3506a7dcc8c4cfe544d8efda7b15b1eb3e3eebf34fdba11847a94d,2024-11-21T08:45:11.107000 CVE-2023-7071,0,0,48fee3396f888c148a3fc3a5c0899df76aaf5be1af3e416151e1024486b5674c,2024-11-21T08:45:11.260000 -CVE-2023-7072,0,0,0b439cc57c6efc175f1bc428743ea33995f1e64e81d071a0b5a270d720a4e391,2024-11-21T08:45:11.407000 +CVE-2023-7072,0,1,451a22d96b8329378c5ec58a80495ba47deec3124ae75cfc96bd23025e299db6,2024-11-21T08:45:11.407000 CVE-2023-7073,0,0,85b3734eba0e857f75453bf3ac337fab097371ed1baa19537546b7ca2054c908,2024-11-21T08:45:11.537000 CVE-2023-7074,0,0,291d8c5c534661f5dfaf35a7ff2936d8f8587deb8df66b45ac15b47f998232e9,2024-11-21T08:45:11.670000 CVE-2023-7075,0,0,d0df2f8a9cc7c4dfc585b329a5ad90139d84978807f1e8347549224668d83135,2024-11-21T08:45:11.810000 @@ -242328,7 +242328,7 @@ CVE-2023-7258,0,0,19eded96602052a8819eafc5cc41ffac2509a4daaba91945398147ff28a309 CVE-2023-7259,0,0,1c611eaee9f33d7ccd17c89183f492baf0d1cbca8df2084f000fb54a7cc465c0,2024-11-21T08:45:37.483000 CVE-2023-7260,0,0,5b13b64738d9f99d38b36ccafd3664ce3af226a3295d006866426dd31c7dada4,2024-10-16T12:53:08.807000 CVE-2023-7261,0,0,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83f3,2024-12-26T16:07:39.820000 -CVE-2023-7263,0,0,cf7920ff5b3068b39e94a13bb6f77d504242e61e7c2b3ec28afdd1a44dce1a82,2024-12-28T07:15:19.580000 +CVE-2023-7263,0,1,47038b709984116a0d26fd831f91702cec9ad1d4cbf85af82cfc0a7adcb0f259,2024-12-28T07:15:19.580000 CVE-2023-7264,0,0,481a3123c728ee9b31d977e1754c02d6eb9c9d972c045f9b799c0c77e37a60b9,2024-11-21T08:45:37.997000 CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000 CVE-2023-7266,0,0,747c05f24a13b4f02e6fa3179fa6e81dbafd40c7bda44e4a6d968ba0d7b0112a,2025-01-13T20:48:22.750000 @@ -242521,7 +242521,7 @@ CVE-2024-0199,0,0,21d5ab91f1ef81daf029bd9933e93292228f6e37c8bf61f6ea8ae9ff1893ae CVE-2024-0200,0,0,960bfffc60e8e094b51fc325744ecd82e4e15c7f4a611a4c757227ceca1a67ed,2024-11-21T08:46:03.023000 CVE-2024-0201,0,0,bc1414ac350a7f67445e5f54f441bae0f708e8c010ba49ff59690510ed4d1239,2024-11-21T08:46:03.193000 CVE-2024-0202,0,0,72c547fb3aee28c1cf66f48325eaa3b3635703c62aa29f3ce5a0d24c6af3222c,2024-11-21T08:46:03.343000 -CVE-2024-0203,0,0,7ae63e8db1b290b350110ed5adfc353fde34208c6d8e0ad41e66e5f3a880865a,2024-11-21T08:46:03.503000 +CVE-2024-0203,0,1,99c17c18c281e928f5092bf3be899b79cdc808df78a225285d6353cf4972370f,2024-11-21T08:46:03.503000 CVE-2024-0204,0,0,bf14064b54d7c17bd589465602a49ac06d8cb2146b51fc1341e96f9c9ee5df1f,2024-11-21T08:46:03.627000 CVE-2024-0206,0,0,d8433599361075ba38b69a9854c8bfa8a307cc12a53ec4f7e2c4f36e4a6081a8,2024-11-21T08:46:03.780000 CVE-2024-0207,0,0,2f8199e7587e0ab7fd695f2e21796f49ca2a9c52404d11018e2d7fe3fb4b037e,2024-11-21T08:46:03.917000 @@ -242622,9 +242622,9 @@ CVE-2024-0306,0,0,e726a2b09de613209f514b8b44d8dfc1090d31cf7c757b724db41b8dbef41a CVE-2024-0307,0,0,00898dc47c68e446662ebafa90959032d67d8be8c36092e5d3227b330724bbe8,2024-11-21T08:46:17.517000 CVE-2024-0308,0,0,746ba188ddfb56cf38e928baca9438e750e285e4bb9845c4028fd3be62aa8302,2024-11-21T08:46:17.667000 CVE-2024-0310,0,0,1854c23b011587e7da7f2fc4c72d8c13e38e742d7956f61362d3a1dbab00e3e0,2024-11-21T08:46:17.807000 -CVE-2024-0311,0,0,a15bafb7830bf001e99872537dffae7803857f8c5613767ceacc9e461d2387cc,2024-11-21T08:46:17.950000 -CVE-2024-0312,0,0,5bc8a08dee0de248dcb3b957865c09dd981f58eba1c72713073de2f23a3f09c7,2024-11-21T08:46:18.073000 -CVE-2024-0313,0,0,7d2c8ea806d9cc502b6af0da75e16a2fef882b1c1c74f9294d1902b55b0f5c42,2024-11-21T08:46:18.200000 +CVE-2024-0311,0,1,614a23ce27b40509af7ceb589e5a47b287c3557eeebbb78dd69a1cc178d4cab7,2024-11-21T08:46:17.950000 +CVE-2024-0312,0,1,4802ec1edda4157457376922a320389220b6ea6ac6b13184772150966b932357,2024-11-21T08:46:18.073000 +CVE-2024-0313,0,1,2a160ce5d10ef102679d71d9428019ad321c6d5c3f3a356eebdd7f7702af0bc3,2024-11-21T08:46:18.200000 CVE-2024-0314,0,0,8d283867fbd2de05730b282f8dbd38973c2b9510c1a0b4d33951796818b4a1f7,2024-11-21T08:46:18.317000 CVE-2024-0315,0,0,e4b198dbac287a4df57e7cf41e0e3742485127c27ee6fc7140566ad73dd4d88b,2024-11-21T08:46:18.447000 CVE-2024-0316,0,0,f6fa76d4019b2ff12c208bcc4ca7845ea6fdc0f04dfb45015c541ed8e5320ecf,2024-11-21T08:46:18.563000 @@ -242743,7 +242743,7 @@ CVE-2024-0440,0,0,9b41d4c42ff0b29e0c33a27150bc353ca04590e3373335ebb1c4da265e318a CVE-2024-0442,0,0,2ff92b8b200597432f6da5c6788d273b9eceb23b02f2972bbbcd8fd6e4cd3a3b,2025-01-08T18:48:34.583000 CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d47769,2024-11-21T08:46:36.010000 CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000 -CVE-2024-0445,0,0,4ab454f150f76c3507e1d605ca8ec368c481acdb45a0591e9b5b90434536ae48,2024-11-21T08:46:36.333000 +CVE-2024-0445,0,1,fdf465da519f470b46d3d155b33a739a4bb1a376e0a829e7b4d22f8adaaabf39,2024-11-21T08:46:36.333000 CVE-2024-0446,0,0,8cd5e7f51f7c43d71d35806007add85f5722762bffd3331d410bf77bbd5badf2,2024-11-21T08:46:36.457000 CVE-2024-0447,0,0,ef82dbacc24448559fe1360e1922a6f76a74074d981e7a70149369df2daa3ad4,2024-11-21T08:46:36.667000 CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000 @@ -242885,8 +242885,8 @@ CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc9182 CVE-2024-0588,0,0,6f8550ff909ae4c7da15a920587063371148ea1a9a4ef35a0da365c3198c11a3,2025-01-17T19:25:52.137000 CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 CVE-2024-0590,0,0,de2ecff39d8bb7ecc0e43dccf38abeb5bc3d8547e89ecead319caf442de4085d,2024-11-21T08:46:57.473000 -CVE-2024-0591,0,0,98f524326e7fc7678fbc5044c03d1eca3ded8bb9446a3be7808261fe30cea397,2024-11-21T08:46:57.577000 -CVE-2024-0592,0,0,26fa4db326cba8f700c0d7b4ae70996dd20d72f88488f65aafcff009c85af9b9,2024-11-21T08:46:57.690000 +CVE-2024-0591,0,1,52dda023b7b05c739dd2046d19609a0e4d1a73487ce454f27c5b6908af32935e,2024-11-21T08:46:57.577000 +CVE-2024-0592,0,1,1a17724febf8153342670e1a2ae0c506c1f9d961e5fb4933bcc637f6677b5b7a,2024-11-21T08:46:57.690000 CVE-2024-0593,0,0,1a5e11ac44ddf4f96546959fc91f930a25c2c52f87916f443b1c3a00a49e6f61,2024-11-21T08:46:57.807000 CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b2485d,2024-11-21T08:46:57.910000 CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000 @@ -242903,11 +242903,11 @@ CVE-2024-0606,0,0,53f79eebfbe885d8ad157dbee910f37431bf9f4a0163dc066767f58dce4283 CVE-2024-0607,0,0,7593ab4432ea7553985e7b16ebd4406e544edfa1354f24e856a4b897e755a05f,2024-11-21T08:46:59.383000 CVE-2024-0608,0,0,364ed7c1816141e08551230deeb225e6f9581f28de27c921e03af6d7943a316a,2024-11-21T08:46:59.527000 CVE-2024-0609,0,0,fe969d910275d5a3a2703bfbabc3af993e9947034bdebc50e55519d8d7cbf919,2024-11-21T08:46:59.647000 -CVE-2024-0610,0,0,887040afeacfe3c398060bb033448abdd3d146ff8a900aad2223c9e43bcbaaf4,2024-11-21T08:46:59.760000 +CVE-2024-0610,0,1,6306e1925cf8710f0f143c59bb8703a5a17e22b393fe1ea0f1373dd0d8e29e27,2024-11-21T08:46:59.760000 CVE-2024-0611,0,0,663347c1724ebcd33ea935e789f8fa6bd6a3de9942c2f6663f2c2af22f7bbc3f,2025-01-07T17:38:50.460000 CVE-2024-0612,0,0,da64d0a677fd45a04382f6cbc2c145ee6f8fef3954e4d1e4ac27b2a8c4b9f266,2024-11-21T08:46:59.997000 CVE-2024-0613,0,0,da8643fc97b531c82d214469e3fab5ad51b81a35aa2fb83e969424e9e3503eb0,2024-11-21T08:47:00.130000 -CVE-2024-0614,0,0,8ef2fd0e88a079773d26e3260e074716b398c31bfe09434fb6fc0840a8fda420,2024-11-21T08:47:00.257000 +CVE-2024-0614,0,1,92754568c7a8ddc5388cad677d9e49091042a40af38d9547244e55d2480ccf67,2024-11-21T08:47:00.257000 CVE-2024-0615,0,0,16b5c5decb6d71dbe6d785869f09134f288020b8bd331b22733ef8d16c4513cf,2024-11-21T08:47:00.373000 CVE-2024-0616,0,0,2d69fd8d6ceb0a472770c88c5b9765122553ff56ca45c5743d54383bc7fef52e,2024-11-21T08:47:00.490000 CVE-2024-0617,0,0,efd125e5b2fb1e127ba81b6d2e9a7eb42489f0212a325253773851856ce45da4,2024-11-21T08:47:00.617000 @@ -242924,7 +242924,7 @@ CVE-2024-0627,0,0,976432e2cabdd1fe19b0d4cdec8436f682029983b59261a458bbe08bbda396 CVE-2024-0628,0,0,8ddf1de100d6820ae2b3b806ae7a32820e6fcef24642699cc6c2ccbcdd5c0c69,2024-11-21T08:47:02.070000 CVE-2024-0629,0,0,890f8077502aee99e57ca27cce7459ccc1c21d7cbaffb14a7e1e11687e700ed0,2024-11-21T08:47:02.213000 CVE-2024-0630,0,0,2663b350751ce9ebf5c0f17a1cc23e1c10552e7d8a74b760a95d01e80d1e3621,2024-11-21T08:47:02.340000 -CVE-2024-0631,0,0,2fbeb8098f4d76db16a31410066d94baa6d6a9dce8338d6f032c91d423c7ef56,2024-11-21T08:47:02.477000 +CVE-2024-0631,0,1,94911f3dae52fdcc944b729c7cc4b47b308ed12d6590f8935e96f762232c861c,2024-11-21T08:47:02.477000 CVE-2024-0632,0,0,a9463c7e82c342018b0e57deb2f88caaa857e9b0fbf047358018422247db904f,2024-11-21T08:47:02.593000 CVE-2024-0637,0,0,a7fa91c903d9f512541c573b00ab1b356e21618c0001459fd1f3657d73fb2863,2024-11-21T08:47:02.717000 CVE-2024-0638,0,0,07ac9ef695277f9a476f19b4f2c1e2a29c25bffffc157de815a3953f8b74a260,2024-12-04T17:00:07.247000 @@ -242977,7 +242977,7 @@ CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c91 CVE-2024-0689,0,0,f6eb3eb2e29fe7f683bb7540f0e85632c4df022fb0391601d5707221e43a0076,2024-11-21T08:47:09.223000 CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 CVE-2024-0691,0,0,a50f23db7013613682b7784287817142b53493a2be1ac349b95c9f4a363c01f3,2024-11-21T08:47:09.507000 -CVE-2024-0692,0,0,7c106171b188dbfb79ab576be16610df86db06442a5256cd303ae65c0208be17,2024-11-21T08:47:09.630000 +CVE-2024-0692,0,1,63addfdab03c3c0e3bf2a72edb4cef564d33ad8a76e68659ed3109d223df8863,2024-11-21T08:47:09.630000 CVE-2024-0693,0,0,f7c97d1f9175fe3f5ed316e5c461bd1f136f08d48c2edf3c1956c86a334e4bbb,2024-11-21T08:47:09.750000 CVE-2024-0694,0,0,dc9fe628f2a11097b105f7eb57210979fce97a3cb1f54662a5d4688094bad544,2024-01-18T18:15:08.647000 CVE-2024-0695,0,0,473e62fcdac89c4d11adf50166cbb6d0f9f9346399cf546335c44cfbfe767100,2024-11-21T08:47:09.900000 @@ -243076,7 +243076,7 @@ CVE-2024-0791,0,0,c7daf57c81003d1623a1cdc030e906bc63c4d9e999bea45556a9ddce550a5b CVE-2024-0792,0,0,5100291c23d13e8d087da03dd004872a471999150c8f544a4585283fcb1be43b,2024-11-21T08:47:22.940000 CVE-2024-0793,0,0,ce235ac83142af1cdfa6c4408664e6f09ddfc183684d5936a2a5d8110b209ab7,2024-11-18T17:11:17.393000 CVE-2024-0794,0,0,18f798efc59f934bba3cf36f2d7f72c5a3048eda2b00aded39f663641c84ce77,2024-11-21T08:47:23.237000 -CVE-2024-0795,0,0,275c6b005f65219b9ae65b8f1f97121c705f2315f088ffe1601341c81e9136b8,2024-11-21T08:47:23.423000 +CVE-2024-0795,0,1,5e32407b34a6091cba38ed337a55819d4f95e5292c11aaa3f116f93ebd84eeb1,2024-11-21T08:47:23.423000 CVE-2024-0796,0,0,fb5b6fcdae6c1288ed0d974c241f7ca22235c3905b71d838ba31adfa087aefa5,2024-11-21T08:47:23.550000 CVE-2024-0797,0,0,21f2183bcf8e361dbe507a69353302d2e961ba174109bad4b51254b867fcaf52,2024-11-21T08:47:23.677000 CVE-2024-0798,0,0,73a170b0cb1088cd0c9a51533a66eb37de679e26fbc3e0496cbfd2cf43ed7f3f,2024-11-21T08:47:23.800000 @@ -243096,10 +243096,10 @@ CVE-2024-0811,0,0,67d2b6739417e4557f007b9337b88217f88a76750056a7e10119a061289bd8 CVE-2024-0812,0,0,4ce4891d5174ff76d3f0ffa89ed361dbfabb73cfca9083afa9baf0aaa16a691a,2024-11-21T08:47:25.707000 CVE-2024-0813,0,0,11871c6b565ec811a17ba8357471872dad5fc973fea343023b9d39f0f2c06c3f,2024-11-21T08:47:25.830000 CVE-2024-0814,0,0,41c6a7c1ac248d2e2abe02a20321d9ae4cb4787ef7f01ddab115caee6ac7f4bd,2024-11-21T08:47:25.953000 -CVE-2024-0815,0,0,0cfbea57fc154ef4f72ff1e75a419cafdb4258b41c5c319871a5fd2b6add9f0d,2024-11-21T08:47:26.073000 -CVE-2024-0816,0,0,2590990357e8717315397de3f46e9b458763d241103a62347a319683af2e58d3,2024-11-21T08:47:26.190000 -CVE-2024-0817,0,0,5792274607ff832c34cbaf255cdeedc33984d6fb4571c16d5a3786a24ef7d43f,2024-11-21T08:47:26.320000 -CVE-2024-0818,0,0,ce3d74c4a7017fc804f88ef139c395ca2b36e90ac6f610d24a443614fdf4f4f3,2024-11-21T08:47:26.437000 +CVE-2024-0815,0,1,11427d1d3f3151fcab5e8c3aa358ffb489b730d6860802287c4033e95aaf7ca6,2025-01-19T02:23:10.973000 +CVE-2024-0816,0,1,d2903066cc1b3b559e0cd1e6989e4f5e2c7fa06a9fba9cff2be52bdb2610b1f8,2024-11-21T08:47:26.190000 +CVE-2024-0817,0,1,645aa1dbcdd724c805269a6bc483078ddd297eb68b5212ffcf08ff402f04a4d0,2025-01-19T02:26:02.377000 +CVE-2024-0818,0,1,cc22f84fa8226e35ca1a09c70fa622badd97113fac5368fdb8259e7cfba12a2f,2024-11-21T08:47:26.437000 CVE-2024-0819,0,0,257b77c8209be71bbb0b5d01c0c32514646519ca1505385a05003d69f599a2f0,2024-11-21T08:47:26.577000 CVE-2024-0820,0,0,4933a9238e8096ed25ed633adc8fd476b6ddf75ccbfd8053442d30c44c6ee2b8,2024-11-21T08:47:26.700000 CVE-2024-0821,0,0,96b734a09c397b88c8f259c171a4a13f0c8e36d62fe1aec588009569dba32863,2024-11-21T08:47:26.803000 @@ -243137,7 +243137,7 @@ CVE-2024-0856,0,0,ccf69620ebe9fafd7906ab766dc2b1fd2bfab74ca660e6b65ec43f45660ed2 CVE-2024-0857,0,0,f5b207eaa482f0854c3fe9058cb4359270cea2f96494248560ac10b0594a344c,2024-11-21T08:47:31.060000 CVE-2024-0858,0,0,229e8db5f5739b7d183f2f36812752d1e45744c6ffea9c2e89dd062ec4290bc8,2024-11-21T08:47:31.207000 CVE-2024-0859,0,0,5cfa08098ea7d06341817062d82bfdf1a0864f915add801f57f34ac3edd24b76,2024-11-21T08:47:31.390000 -CVE-2024-0860,0,0,77c9f9092ba38668ce4b6e9fedb9e2c9cd1daf99e05774817ce3b91f391ef13e,2024-11-21T08:47:31.523000 +CVE-2024-0860,0,1,7cd090c55ba124e5c1f2e1dfcd4f48097776b6c50210efc0adbd2fe230f79eb0,2024-11-21T08:47:31.523000 CVE-2024-0861,0,0,3706666137cefbcdffb9086c7097604cd841c37aec6a1005fe4813b690ecfbf9,2024-11-21T08:47:31.670000 CVE-2024-0862,0,0,ec1a9dbd70c908c3130d8f9b52afbcd2c3c270f7d6de729ee3eb298a17b47060,2024-11-21T08:47:31.813000 CVE-2024-0864,0,0,deed376dfb5abe2f9372e2a6ce4d69a7a1555f5606c86173c53b614b4663d51d,2024-11-21T08:47:31.940000 @@ -243188,7 +243188,7 @@ CVE-2024-0912,0,0,4f57efee87c78987c06f7ceab5e4000e0b2d703a66876a27e9fce78c8c5318 CVE-2024-0913,0,0,fdd184df3fb1e6ddd459b097472fe6fe272697f536f754bc3e7f7dbf4d3d090e,2024-11-21T08:47:42.730000 CVE-2024-0914,0,0,961b54ff0e9b9f81aa56dcd6cdc24b37952c07f3f53f7085b217ebd09ddf718f,2024-11-21T08:47:42.910000 CVE-2024-0916,0,0,5a8012d33f7bb36c9ef1c1bccdc08620475d280f7448052ee484e84c13496a01,2024-11-21T08:47:43.277000 -CVE-2024-0917,0,0,301d2f1de5f705aec4098c5e657e662a1427128f738f6bfaaa798bfe14f42b9a,2024-11-21T08:47:44.103000 +CVE-2024-0917,0,1,1a312a5c14952d08cea7a5b7ac478049a272c490809a32c02eccd975ff270897,2024-11-21T08:47:44.103000 CVE-2024-0918,0,0,adaf982dd698ba71a56fe214b4de6d539fe4a4f06abbbc782136a1eef6b53163,2024-11-21T08:47:44.287000 CVE-2024-0919,0,0,4faa3b3ee004f50a348eb233a0869d4eacefe6f2d379b6009e4cef456d250b55,2024-11-21T08:47:44.490000 CVE-2024-0920,0,0,ee99d8cd581c7af2f038b9e503ecab2633ed9070146163eae7948ec0f0b17f5d,2024-11-21T08:47:44.707000 @@ -243471,8 +243471,8 @@ CVE-2024-10245,0,0,5714c51fb85acb3984990d3d9b6159b31ef4484b309f1b36de23af150cc1f CVE-2024-10247,0,0,5430b5d913fdfe2b748a2d5ec29b0a58e233e1700f121852ac0b90135a42f8bc,2024-12-06T04:15:04.190000 CVE-2024-10250,0,0,dce2ccadbd6e77d5f97f6e4ccb7b1ad74933eaf3de52e88abfac961c0db9fd4a,2024-10-25T16:37:32.777000 CVE-2024-10251,0,0,d0f18531c0f704e2c1c5ac31ed75dee8e4053fe9f93163da13999ad0d8735e1f,2024-12-13T19:35:52.440000 -CVE-2024-10253,0,0,a36e410e5b06816d07aae43f96bfc2298d6b74143cc0ecb6b92efdd2e71173ae,2025-01-14T22:15:25.920000 -CVE-2024-10254,0,0,4a2ce444af6d34395b0bb21e9b9c48c3cb9d5276e588dc07d6dfb0260e8c46c7,2025-01-14T22:15:26.110000 +CVE-2024-10253,0,1,376e73bc06ab8b19f9ff76d2522578701bcf6e31d01fa4a9d14069b89da47ed1,2025-01-14T22:15:25.920000 +CVE-2024-10254,0,1,eaf01fd830974bcaeaf405ec25eb4671f609e67342ab924a6a313bdba73cf09e,2025-01-14T22:15:26.110000 CVE-2024-10256,0,0,29011b036240961b8ae4367653e58f0c2ddb629014386486c8df2e427bfd8d66,2024-12-10T19:15:19.280000 CVE-2024-1026,0,0,0f9b1aa5e37c54243b836a0d53fe73affd52a3dfc7b9905f3b939894e2718221,2024-11-21T08:49:37.720000 CVE-2024-10260,0,0,e6c334e16a39fd3c100b04ab1842263fced68926fe345b87138c06e988e1ffb5,2024-11-19T21:20:51.707000 @@ -243494,8 +243494,8 @@ CVE-2024-10280,0,0,44a0decc5e9484995c7a7f046e6bbd4a0d3c7896518ced426018ba925a113 CVE-2024-10281,0,0,e6cb40ad582f2c3ea2f34885f9c6323dc969e5d9372ab560ab4b92dfab0130bf,2024-11-01T13:52:35.563000 CVE-2024-10282,0,0,8eba3cc795a2cd65da593dc0076e393a867d132abf2d792a2fe2fc42216a50bf,2024-11-01T13:47:10.087000 CVE-2024-10283,0,0,af1db9e4bf83d7668a8c1099e8f6556260183a716c34e9dd98819cfd855c98f7,2024-11-01T14:08:24.997000 -CVE-2024-10284,0,0,cad46fe8a920d3d51e832bb8f82b8a401bf7622ea5739d1d1a1c48dba66fdcff,2024-11-12T13:56:54.483000 -CVE-2024-10285,0,0,5ca882d63276e5b7dae8ebf3b419b2206e78779432460865ffb5489023573c60,2024-11-12T13:56:54.483000 +CVE-2024-10284,0,1,167e14dae884028ca0b30980be5b7298aa774f71f25525b8c28d65a8a1aeef5b,2024-11-12T13:56:54.483000 +CVE-2024-10285,0,1,6fc23cf182609860a2322ec9f31be991174430b2c68116248a002759e3717b5c,2024-11-12T13:56:54.483000 CVE-2024-10286,0,0,73285aaec54d2f558051f184c2d9914af29a81cae430b6c03e061154d648c859,2024-10-24T04:08:14.833000 CVE-2024-10287,0,0,96c9483610f5f75bf4b8c679955448bd52357609fd9ae35b73acf1da0591e9aa,2024-10-24T04:07:33.057000 CVE-2024-10288,0,0,0327b51580110d372062cad69ff65e1b5769e0f246f09c3f74728547d4a6c81f,2024-10-24T04:07:45.110000 @@ -243505,7 +243505,7 @@ CVE-2024-10290,0,0,6203cd0a7f01e82b7be8ecb971679ea529fb27600b4937b731a4dccd19d7f CVE-2024-10291,0,0,58a1a381d4000ad945b853e44b1ee75969519a23394288f70130c32eb3995fa5,2024-10-30T13:23:47.827000 CVE-2024-10292,0,0,b2c8100cd61f74b6009ba04676053b8107462462ecd4707c86f10054e15174d3,2024-10-30T13:40:07.353000 CVE-2024-10293,0,0,50bdec37aafe6f1cfc3e5a66d9d90c9115ee448ec631b5443d443febe4f8e3ac,2024-10-30T13:37:27.067000 -CVE-2024-10294,0,0,509d7f994fe827c1933acb553c5bea8d57386c8d3fa96697955004aa139e1358,2024-11-12T13:56:54.483000 +CVE-2024-10294,0,1,e4248fb5da619a392ad8353a7726ecd45dc388803d944c8e6db5faab51a61c44,2024-11-12T13:56:54.483000 CVE-2024-10295,0,0,2f05ae669836f2df84948189ef3fc14df5d1a9a93968b2af2b1c1e675ed47706,2024-11-12T21:15:10.657000 CVE-2024-10296,0,0,1eebc34a4e5135fa45ee0dfd15d74550cf37afea70ad761058f4a3a878161a0e,2024-10-30T15:13:18.077000 CVE-2024-10297,0,0,b398dba5cf8ed3614eb993da09b3923bbdc96154e1ca0bcd796482f4cbc3e59e,2024-10-25T12:56:36.827000 @@ -243518,7 +243518,7 @@ CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b CVE-2024-1031,0,0,3efe13ab8e8ca0afb2b2c16acf09e60475f45cbc86bc8540948b9d2e079bf4c2,2024-11-21T08:49:38.437000 CVE-2024-10310,0,0,9ff9c4ae788e99e7944a2ba13b3b5ac1a4941438452794ec0f6f96d02747c9be,2024-11-04T13:06:20.190000 CVE-2024-10311,0,0,99dd0a164fd5d198ec222660ccc9d29dd982dc019194a41db7c03f5195e8b984,2024-11-19T17:03:19.177000 -CVE-2024-10312,0,0,4db4b2e1e415a9982a5fff86ccdd3bad121dc77479e0ce32c0aaa3cb51ca42c5,2024-10-29T14:34:04.427000 +CVE-2024-10312,0,1,f4bee13663796c96de77dd41365ff084676f3c26fb627eed4b17820ac5728156,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,8e51257a51d56a046cfe59a44fff727a9a10aea7b003f94d7090952f3eb5e764,2024-10-25T12:56:07.750000 CVE-2024-10314,0,0,f90831d51418d5b65f2e88d951f8cb1edd87a709639989f7c510f0aa8ecf0f49,2024-11-21T08:48:23.997000 CVE-2024-10315,0,0,97fe7043360404cd1fec656a00df0c2acadd9a6f0adabddf28ee8ca2d6ef024d,2024-11-18T22:15:05.550000 @@ -243557,7 +243557,7 @@ CVE-2024-10355,0,0,edd144d42239514a5040e45977c91b9661e0e5e1ef732ff2d1a515e8bda77 CVE-2024-10356,0,0,c3e482948a6c3b0414b5e4eefd2b603eabb27c390a3ec36c480e9a647e34cbb6,2024-12-17T13:15:17.520000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 -CVE-2024-10360,0,0,fdf4c91801296b2986624cb9668818820fc8f9a592678464010c300dd47a90aa,2024-10-29T14:34:04.427000 +CVE-2024-10360,0,1,613c38c9ab1a87b22c3be425e755ef4037b6e0ecdbe0afd2f4ea1f631e7f920c,2024-10-29T14:34:04.427000 CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000 CVE-2024-10367,0,0,047cdf86e80e6b3edd3a8f103515455deeb9cc4fb024de212789283fdbccd2cb,2024-11-01T12:57:03.417000 CVE-2024-10368,0,0,1229bdc9c63256465d1d199349299fe27e9ef0d56f2669e496ca7acd06a3962b,2024-10-30T16:46:30.783000 @@ -243578,7 +243578,7 @@ CVE-2024-10382,0,0,1c875f1ae2ed66eebbc6e7f1a875f8ec0ccb16ddce83c24470dd6868acfcb CVE-2024-10385,0,0,df216807f79e6049f4e0c0d109866adb238dee94592703481f3d8c39123fd3d3,2024-12-20T16:15:21.523000 CVE-2024-10386,0,0,7aff12031680710648573b87d488e50b0294f20a294313dd69f5a61164db5fd1,2024-11-05T20:07:59.487000 CVE-2024-10387,0,0,57470acac2a2dbbd0df691895c55ce7e9f6693f342e79f6c8afed7fe3b526ff6,2024-11-05T20:05:55.323000 -CVE-2024-10388,0,0,e9ec8dd17e88ba202ee792d712ed48b3ff6fd0d0e6fbe5270057fa94b498de97,2024-11-19T21:57:32.967000 +CVE-2024-10388,0,1,d14af1d9f40d4218a38796fbec341d057cf79fa3c2c9425c284d7b618f911ead,2024-11-19T21:57:32.967000 CVE-2024-10389,0,0,335cd052454e4163f5f8f1fbd243a8894512635ded4cb9fe46c87f8eafca2f6b,2024-11-21T17:15:09.200000 CVE-2024-1039,0,0,2867c46e630f2141eef34adefe8c02e7e1c3b8751b5733406e42c25ea3c4bf22,2024-11-21T08:49:39.647000 CVE-2024-10390,0,0,eadc75c0265a2251af0e90207242caf2d4c771cd929a6213a0b7a52a99ae2c44,2024-11-19T21:57:56.293000 @@ -243681,8 +243681,8 @@ CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7 CVE-2024-10494,0,0,7ad9a147562857075c8cc069666645d3f7104fc5dd8722fe8cd0049a8d1c7ccc,2024-12-10T16:15:21.930000 CVE-2024-10495,0,0,1b09df0e512531a80d5fdc9a40ab39dfd083e6391f07097658c2fd0901b95a62,2024-12-10T16:15:22.080000 CVE-2024-10496,0,0,58a3488ff9e15b5a7a231452603d43254d82e0f8ccbd0ebcc3f00089f9c01fe7,2024-12-10T16:15:22.203000 -CVE-2024-10497,0,0,8befb980bdf381b120dc6ea7fad4b415d841e79ba402a6e55ae8a09132ad34ff,2025-01-17T11:15:06.980000 -CVE-2024-10498,0,0,ea0801d29554e3a383456801229cdc226ffdf7f4affde24161d55c37620b6b89,2025-01-17T11:15:08.340000 +CVE-2024-10497,0,1,cb038935a1f435c0896368ab715a569fa104ec84822f64f9ca59e87756b38c55,2025-01-17T11:15:06.980000 +CVE-2024-10498,0,1,e8581c191397a25da278e4e079b4c69a596c922eb02af76b3c907f9baeab50b0,2025-01-17T11:15:08.340000 CVE-2024-10499,0,0,17b74beb086be3ec64eefaa097e37e1d1fc71a291b6b0e133ea9adf1d4040a72,2024-12-12T16:15:10.113000 CVE-2024-1050,0,0,16f18f5c60fb64f5f6a6b201bdf68db704bc8fa10ab29a63c083d6c6dea0ac89,2024-11-21T08:49:41.043000 CVE-2024-10500,0,0,8d3fdc26c117a715c2289f82f7948bed7d8eb25f7b2ae298e127d70c6976259b,2024-11-05T21:02:30.333000 @@ -243692,7 +243692,7 @@ CVE-2024-10503,0,0,763557f1a57ade25f784e624d9c5658615476cbcb58897ddd32d2e193d11f CVE-2024-10505,0,0,bccbee9c045be087cc3d0cec29d521b6f613e0d00c344653d6c46b8270ded2a5,2024-11-06T16:38:28.750000 CVE-2024-10506,0,0,ed25d2679640d0ffb8bf46af8087f8c0c948bb559a1387750e9451ed7a35526d,2024-11-05T16:22:39.830000 CVE-2024-10507,0,0,3241ccb5f62cc7a24046ac59662931134dafb7d8fc4960db22e994f5363f00db,2024-11-05T16:23:56.073000 -CVE-2024-10508,0,0,3c8ca455116090fc18d0350a110b8bb6a6e21d65af46a84fffdf80725f5b33f0,2024-11-12T13:56:24.513000 +CVE-2024-10508,0,1,f011f56e7f54fbbe0686d0ba2f031272f213a93b5c45783ffd71e21b873c1998,2024-11-12T13:56:24.513000 CVE-2024-10509,0,0,f0b7ecf89c97695400b3d4347ae46c239dcae25c8470ed90af5bd1df1138e483,2024-11-01T20:52:15.573000 CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d66,2024-11-21T08:49:41.187000 CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000 @@ -243752,7 +243752,7 @@ CVE-2024-10576,0,0,eed372ac324540d33b58763a1bf43e6b593158e046a13131665b4e3a010fd CVE-2024-10577,0,0,8ee7592b98835f46232a1e14ff5137523cb2e97a8a69a4d48034bc127b323249,2024-11-21T08:48:45.150000 CVE-2024-10578,0,0,66b31bc67aa640c7022b6e2ee0c03a146109396c96bb5c10ab825d27d5228d03,2024-12-06T06:15:22.200000 CVE-2024-10579,0,0,0ae238994e7d51b528cae9d23ed2fa2f0db4469de9914be8d05ed1f76a7dac58,2024-11-26T11:21:58.330000 -CVE-2024-1058,0,0,f55efbbe1000b59a93d67502d5a09284d2f9f41bdec59caa8cc00ef68357b52d,2024-11-21T08:49:42.013000 +CVE-2024-1058,0,1,a4bfa26fce255a08c4a0bcd9ca820b184d439ad79e86816be9e12748d1d66b41,2025-01-19T02:44:46.970000 CVE-2024-10580,0,0,7cbec3926b1e0a5918766b8a0adb238fb5e9aded2f47a47f3fe18631e2f40ea4,2024-11-27T07:15:07.920000 CVE-2024-10582,0,0,081ced1e3bee3a0a102c94bdff81bc48301372e830a54bd85e35429dcce93b3b,2024-11-19T21:17:53.003000 CVE-2024-10583,0,0,2dd8fa86d783214098b78ecf15207bb297f91c4a4766bbf054ba7ce346e63980,2024-12-12T07:15:05.570000 @@ -243801,7 +243801,7 @@ CVE-2024-10626,0,0,22cf1f408fe70f434973482fc51190e9042a8fd964f8790bb1f2e91f596b6 CVE-2024-10627,0,0,3c670f4cedb0c30003aef81a31add80ab021112a0e31dbffcbca4d3539bfebcc,2024-11-12T13:56:24.513000 CVE-2024-10629,0,0,1f9c9c5683a42ffc8dadeffeff3f612e74f207dcf5dcd96d8c7fa679d62c2730,2024-11-13T17:01:16.850000 CVE-2024-1063,0,0,33b4f1a2d0cd96333caf63788d2cf890d1ebab138b3c91da9285726ecbf447d1,2024-11-21T08:49:42.713000 -CVE-2024-10630,0,0,ec311e2dfce4c564d6a92bc9b46793ab58e84292afb122a03a32fe1947954865,2025-01-14T17:15:13.857000 +CVE-2024-10630,0,1,2b78ea36784a2215af96a7d4fa9ced32a586fc0d350190c904bf49da64587ad2,2025-01-14T17:15:13.857000 CVE-2024-10637,0,0,93d08933ba9c4ceaffb9a190c50c42965d9f07240a31bdb136bdb3d17454c3d0,2024-12-12T19:15:08.570000 CVE-2024-1064,0,0,7b760eef6fec23e7e81fb51d838ef1bddf15caed76d88b6ad1d3e688cbbd4a4b,2024-11-21T08:49:42.843000 CVE-2024-10640,0,0,a398cd6d72329485656ef5fe95883039ee9518985823ed26e6c02ea5501d6402,2024-11-12T13:56:24.513000 @@ -243859,7 +243859,7 @@ CVE-2024-10696,0,0,de323e5b08e137c8a44255c5e7e1a053778cff3b0d91fdfbc0760a0c4f688 CVE-2024-10697,0,0,29fd5d7b57788100bf24586a16e2523ded4ecd8f0def098db94e13ad70082a55,2024-11-04T14:18:20.337000 CVE-2024-10698,0,0,fb9e0d8133f1d234bb097d68b3c15ede426fac0319e6c2427f51e2dc121efe3b,2024-11-04T14:20:58.853000 CVE-2024-10699,0,0,88c577a1ad0f057458d4c439992c2175cc837bd4ea163f71ccdbda57d314850d,2024-11-05T20:15:56.417000 -CVE-2024-1070,0,0,05efa33569ed3d794fcb0d1a92fcee0bd32d733f2bf38bc3c700f2016b7cf258,2024-11-21T08:49:43.790000 +CVE-2024-1070,0,1,d2d5327da37483d9112a2ed5ee1eab39e561b54de7db4ab8ba2ab1685a05f062,2025-01-19T02:47:09.663000 CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070ada,2024-11-05T20:15:39.427000 CVE-2024-10701,0,0,0e6acb5db36bb65b2a9a78f5a1eb22e27b99e8cd35851fc25db7c90c627071bd,2024-11-05T16:52:44.937000 CVE-2024-10702,0,0,3259585053a84cb9e4f20d6c03e98232b3f699485fefb085dfa1033c1b54da99,2024-11-05T16:52:11.193000 @@ -243923,7 +243923,7 @@ CVE-2024-10771,0,0,2941aae580639cf6274c20bc9b2c690170426b2770b2a94f5c4b36098b272 CVE-2024-10772,0,0,db9db8e407d46bc0a4189b0b98e43eb07c7b1da0fa6105f2dace53455f0c4d78,2024-12-06T13:15:05.763000 CVE-2024-10773,0,0,8dd7dd6daaeb57554e6f55991b2ea3bb44c5207c78c1459c9aae881124be2697,2024-12-06T13:15:05.897000 CVE-2024-10774,0,0,d680a4839a86b096aeb8b7cc2dc0ff08f28a9d77ee51ad1e46e78500ede5d2c6,2024-12-06T13:15:06.023000 -CVE-2024-10775,0,0,ecb15a99b245608bccd9c0793c98cd8f21947c22a853f6aef23499ce00b650c8,2025-01-15T10:15:07.030000 +CVE-2024-10775,0,1,aa61fc1f929534f3a52ab0c61aaed428ac8f73a91f52b43b798bf3b32f298c0c,2025-01-15T10:15:07.030000 CVE-2024-10776,0,0,d0833c036a6562ea7c6928db6bfa29e04686cd0cb2268f7563ea9636f139506c,2024-12-06T13:15:06.147000 CVE-2024-10777,0,0,151aa045b3cc4f5e20403226014d6e3e0b6b3679df35fc7dcb5b2bc90ffc9083,2024-12-05T10:31:38.960000 CVE-2024-10778,0,0,7a530f50092a14180f4360e4ebb140fc0398b9f90314a295f3515df6641fb86b,2024-11-13T17:01:16.850000 @@ -243938,7 +243938,7 @@ CVE-2024-10785,0,0,3f01bd087d273daf30380c315f820020814d213e2340745da66061077350c CVE-2024-10786,0,0,ccc5097d72c9d28e3db11dc281f3f9385330979372f0eb8c07e82e1cc6da99f0,2024-11-18T17:11:17.393000 CVE-2024-10787,0,0,e4342596cadc13376c45fe50690327764f44d01e21796411a0b18745cbef6e4c,2024-12-04T09:15:04.323000 CVE-2024-10788,0,0,62788f949bca5d7e37cdb922f69d1fcd20199b1de5b86ec020525fca7a998fe6,2024-11-21T13:57:24.187000 -CVE-2024-10789,0,0,326b4c9cd14597942539e336ac48055d70bbbea16751093a371cdebc8e9b05e9,2025-01-16T04:15:08.127000 +CVE-2024-10789,0,1,a3fee710e57289747f3ee1108a198e26c266c5b961e00b751fa73a9ad18a8166,2025-01-16T04:15:08.127000 CVE-2024-1079,0,0,076f0d90756c2348b32c6cbe4a55fada41785208b845fa866d02741439c7a75a,2024-11-21T08:49:45.060000 CVE-2024-10790,0,0,6341528a54cdf3270385869d50c1019cff42d20615be0c52b3565e350b691531,2024-11-12T13:55:21.227000 CVE-2024-10791,0,0,ac0a06f123ca4f2a82c8817f0119d46a6b214304ec50f56d301c5704362b7969,2024-11-06T15:05:38.240000 @@ -243949,7 +243949,7 @@ CVE-2024-10795,0,0,5bc2d3f4fb08450344d88a7dfba7a1c7679958fe7d3fce7094a4faa917230 CVE-2024-10796,0,0,dda2b7fbd241d302e4d7fe3b0cebe9356d590a752fa7379cb5f8f9ccb23ef304,2024-11-21T13:57:24.187000 CVE-2024-10797,0,0,006c7677b07c5456cbe5c08179f34fd3f2028bc42d7da5ac2dc3b47f1c38f590,2024-12-21T09:15:05.410000 CVE-2024-10798,0,0,6bb543025844e6e786719fcb93bd7359375a99a7aba25367f74ad2552d9a3002,2024-11-28T10:15:05.673000 -CVE-2024-10799,0,0,4fdd55149792fc76ddd8ac8a0d30fe99e2485f4e0c5d80016d7e45e1403f9b65,2025-01-17T06:15:14.847000 +CVE-2024-10799,0,1,b7797680ead18fe1a9dbc326dcd7a283091231615844b518b1ae8761c552ffad,2025-01-17T06:15:14.847000 CVE-2024-1080,0,0,d419649d3c046728f86e0db4ac875d93585cb28b1dc1d2ccb108b64b9ccaec06,2025-01-02T16:41:30.747000 CVE-2024-10800,0,0,7c09a66fe19ec81d72fb3dd0d5d6c10275f9b97966090fbd36ca1fbb77eb71bd,2024-11-19T17:08:44.767000 CVE-2024-10801,0,0,2fc64baaadc32ead3d741647c105d1e5f90766977df6a21cbb5fc7403bd4ac96,2024-11-12T13:56:24.513000 @@ -243962,7 +243962,7 @@ CVE-2024-10808,0,0,b834da74949831a7f897c4183bba04078cfb4d8a1c3e61f6ae2ad410f56b2 CVE-2024-10809,0,0,51f78f7a787236cbad7aac7472721fb340d976c70790233c6cce2c1b1b05b8b6,2024-11-06T15:14:48.213000 CVE-2024-1081,0,0,4e0bb84bfbb515e8e6662d2f875a9bb7899411cc135025881bd47d9f276345cc,2024-11-21T08:49:45.313000 CVE-2024-10810,0,0,462940493f0b1c5b280616ee9b6e4ca0acc2fe73d901d9b38b41895de26ba591,2024-11-06T15:16:12.497000 -CVE-2024-10811,0,0,4cc4f3eedc35dc18a83564c2e8e9224ae86cdf891ddfb34c59640f1e458c8cc5,2025-01-14T17:15:14.007000 +CVE-2024-10811,0,1,9cec89f437a4b723f090709af71ee0e26adae8172b2b35922482b026f5b73ed6,2025-01-14T17:15:14.007000 CVE-2024-10813,0,0,8f0d87c8561d66a428b124b04ac3dd7eb7202f93dd365239b75e2107b61a0c57,2024-11-23T04:15:07.800000 CVE-2024-10814,0,0,24cd3cc9c72ab7020b87ed743b9bbaf59702cba37c3042eada5a620d131514e7,2024-11-12T13:56:24.513000 CVE-2024-10815,0,0,8293b7f99c0a99e37b8296b8a7313de52e7c982a394f3ff15ff11be7d8d607b8,2025-01-09T16:15:35.800000 @@ -244085,7 +244085,7 @@ CVE-2024-10967,0,0,7c3473c2b77a8d05803cf7f270943b5290b5d24c3b903af32185338840b21 CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000 CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000 CVE-2024-1097,0,0,f1ad2b99b98b2176c3b3ccdd494bed6625a86a9f96e0ed3a25e7d4f3cd789ac4,2024-11-19T19:05:30.620000 -CVE-2024-10970,0,0,46ab2b85ab6724abaaeac81e0401200707f6b3979204a6c00355ac6bf00238cd,2025-01-16T02:15:26.857000 +CVE-2024-10970,0,1,671a695f28b04e703546d912e6aec761522395bf74b4b3a5f5a2c1f71e98f04d,2025-01-16T02:15:26.857000 CVE-2024-10971,0,0,f8d3e9d67661e4546a1e254ebb74d5d0c1dddae1c4d768a7ce5fd78bda7de46d,2024-11-21T08:49:10.613000 CVE-2024-10972,0,0,94ad4fe97792a860dbbbaf6ed1055424200bc83bc27354926dcdaef27787b40d,2024-12-16T16:15:05.880000 CVE-2024-10973,0,0,cbeb6f65a45bfdf6ca686d53bee20b1187ff9c0a45640545d25c45f64f615a94,2024-12-17T23:15:05.423000 @@ -244137,7 +244137,7 @@ CVE-2024-11024,0,0,87779106a741ba601b519f131f81c931c23a093ff656ecff41f50e830ac8e CVE-2024-11025,0,0,3f6e108019cd6982fd5b3c54f07c198819fe40cc0972828c5e5b6725a3c4dc5a,2024-11-27T11:17:41.740000 CVE-2024-11026,0,0,b66e024362935c10f9944a10c902d96b8ed7a7829eef62e33bfb07c3c33abe0a,2024-11-23T01:44:05.947000 CVE-2024-11028,0,0,be5701b1791efbf2de8ae4ea20b2a6d8d846ef340e5e6b5f9a4b779b0ccd543b,2024-11-19T15:38:19.023000 -CVE-2024-11029,0,0,4eda01b6e45e7b9ef4dd4937afa078645f0e59c8ba59f467e2aadd7840ac0eaf,2025-01-15T14:15:27.683000 +CVE-2024-11029,0,1,2078f199f9bbf1398258d7e80b5e210fc7e6e45920bcdb55b83dc78fb62abd04,2025-01-15T14:15:27.683000 CVE-2024-1103,0,0,67facb6d0111ac9feaedb0e1ff15fb0365b23c4e06ac8bf95d1880d6a65dec1e,2024-11-21T08:49:48.223000 CVE-2024-11032,0,0,193d7f15f7d6fb6acc69100150013c956a0f9f1c2928bed67c10b42c014fff09,2024-11-26T10:15:04.343000 CVE-2024-11034,0,0,3ab7c1e6f92ed311ef7c84bc99d8afea9fbbf7ceee2269128230e97b66af0fb8,2024-11-23T12:15:16.090000 @@ -244168,7 +244168,7 @@ CVE-2024-11065,0,0,f05bce2a9e6bee6b9a280ac202dedc69b2c4cfca29dc9b974ace6d91c4e22 CVE-2024-11066,0,0,4731f30a1f167ca94f93d84cf36b029e007251d4274f74c0c3f328c594aa10f1,2024-11-24T15:15:06.387000 CVE-2024-11067,0,0,8f22abf6a9014acfce22cb7a758a2163e2a0dda974d6d82a4a25cdcf350fa1f0,2024-11-24T15:15:06.567000 CVE-2024-11068,0,0,27b5234cdb2340fcc5efbf261c80bbf2d55dab89f3140f4955847575b03ddfc9,2024-11-24T15:15:06.707000 -CVE-2024-11069,0,0,2eaf501a24d221b1cf3b506a93252ca7b61cd126558e2ba91f672dfc3d69fc6e,2024-11-19T21:57:32.967000 +CVE-2024-11069,0,1,cd464eb7459dfc5ecb04cf5d0b759875e9315772b7f9dba676800f7ec8723d99,2024-11-19T21:57:32.967000 CVE-2024-1107,0,0,5a3b93404fbe99abd1fe2d556d56f474326161e66d8f315a27927add1837860b,2024-11-21T08:49:48.697000 CVE-2024-11070,0,0,d037e4db7faa193efa980e0ab8e8e0c11691b2755407232b12e8d679b0e0fa70,2024-11-23T01:31:09.333000 CVE-2024-11073,0,0,b964986ffef49517e91739c111559ab6ceb86ca5a1589e7ba087ee6fa550b149,2024-11-18T17:21:19.557000 @@ -244225,17 +244225,17 @@ CVE-2024-11124,0,0,0275ce5114a7f72e3905fa90ca16ec6f3f873e2de0bcfd3b8181958a579f5 CVE-2024-11125,0,0,0218051dfdb25061b1a2911fa9148bed742cff64de6da30300c9ce5a26296814,2024-11-15T23:01:32.773000 CVE-2024-11126,0,0,c749db21f8d019a8c0e69b0c89fd60381aeae1d234dc42fa9b9ff1953009b193,2024-11-12T15:48:59.103000 CVE-2024-11127,0,0,a3efa55977cec0481a9d0f60f752166adc632313ccf7c08d957fcbfaa47d4f63,2024-11-15T17:29:43.450000 -CVE-2024-11128,0,0,7324874a6c35e2eb019c219ace3f8649cc273f3d0e70f333b5b2928d8097d040,2025-01-13T22:15:13.680000 +CVE-2024-11128,0,1,882d8275a00c8cb0e7da63d6968cc44dbc96bb40e15e86cb424dc1932b7790ce,2025-01-13T22:15:13.680000 CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000 CVE-2024-11130,0,0,2031b0d91a76a3ae308e67f748474890b1fb080d7d4cbebe58df244865c594b4,2024-11-15T17:57:53.270000 CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d687b6,2024-11-15T13:58:08.913000 CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000 -CVE-2024-11139,0,0,9a636d7e00ed43684be5ff553773bc308cc3b2f0b00cb2e6383b017e86c1a7bb,2025-01-17T09:15:06.370000 +CVE-2024-11139,0,1,f0d0dfd6c7e86e115b3371997191deddf248482a3371b0bbdcea3a61df159ed3,2025-01-17T09:15:06.370000 CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000 CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000 CVE-2024-11144,0,0,af8503925b3320c38a284c525e2190ceb29e6df01cd47b8de568143dcfdf0384,2024-12-16T17:15:07.327000 CVE-2024-11145,0,0,49d8db8e9affdc9bd928055d93b635f15e5703854689b5be5f582242400a9150,2024-11-26T20:15:25.270000 -CVE-2024-11146,0,0,00878ff146c1ec8d83287918976f133eefd41b02eea4182499d3a859bf22c478,2025-01-17T07:15:25.503000 +CVE-2024-11146,0,1,03df03d658627474a36249425d41efadae55984076e597c786ac86aa7f191e03,2025-01-17T07:15:25.503000 CVE-2024-11148,0,0,98721a67b15a1bf200a0df48032e3c1b10f0381f700111d548ae742962375902,2024-12-05T20:15:21.577000 CVE-2024-11149,0,0,bed9c80af9d2c073bb9f97513f448d6c4275a45d3277b166d6da853b66ab77cf,2024-12-06T02:15:18.127000 CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1bb8,2024-11-21T08:49:49.887000 @@ -244378,12 +244378,12 @@ CVE-2024-11319,0,0,b2525c1047d7ff1bfba18dd4732d0fdd16b37c4c17410be8f3cbcdb9380d2 CVE-2024-1132,0,0,64c4b3a1b0ca764dc48eff5cdafebd13449c822d7cb009b4886f58138464c117,2024-11-21T08:49:52.017000 CVE-2024-11320,0,0,043dd45fc8afc6a3f6d5124b009a260902c28d8e6731495b55f0e622c6d087a7,2024-11-26T17:26:33.327000 CVE-2024-11321,0,0,bd940b5bb9138ac791f1f36cf5b55c26ead6b58be5a4ef8bb1b1e965db09ef4a,2024-12-06T14:15:19.810000 -CVE-2024-11322,0,0,c64b40e36649eb98a8c1b8bcf266279a8134e0b15d8eadba77c15b48e179353e,2025-01-15T14:15:27.943000 +CVE-2024-11322,0,1,7661af1c80e5059f58d8e0ae777bbb154006f6edabf362b7e6b0eeb676a746b3,2025-01-15T14:15:27.943000 CVE-2024-11323,0,0,b21512b61028c73cc1de57f12898b09b963c30c0d7f4179739451d39c1bfb5ba,2024-12-06T09:15:06.157000 CVE-2024-11324,0,0,55d7ccc413e27e03ca55705c584d56ff127a26670d0ff07867577116e215726f,2024-12-05T10:31:39.313000 CVE-2024-11325,0,0,96d539af849f72e86bc30d45c134273d928f773df65fa65b9a7fb4618c89893e,2024-12-03T10:15:05.067000 CVE-2024-11326,0,0,9d10d6c9af70a4b37660df9be6daba459c823e11b8e9209053dea842d431fc47,2024-12-03T11:15:04.867000 -CVE-2024-11327,0,0,3f903aa63f72de12c04dae7a5629f37dac1638d0896ccc6ba942e61804baa2ca,2025-01-11T03:15:19.990000 +CVE-2024-11327,0,1,dd71c9321006b210fd3f16673847fbcdb5f47277e9a18f17a61c39749f653455,2025-01-11T03:15:19.990000 CVE-2024-11328,0,0,202569351be32327a1f5002fac66254b9ab3028c9c177053c56cc43c9b28512b,2025-01-09T11:15:08.717000 CVE-2024-11329,0,0,b8078055ea1294f92cc83861c7101c3b3e6c5146a8621a33052ed2acc467efe1,2024-12-07T02:15:17.707000 CVE-2024-1133,0,0,b8c473529bb274e50af6a12ce6542a472ddc949ce4a3070b4347a2a114b5a849,2025-01-15T18:23:26.030000 @@ -244437,7 +244437,7 @@ CVE-2024-11382,0,0,338f84529186c0c55097e3ca4cc330ed2271d6bee576a475398215de89947 CVE-2024-11383,0,0,54a2aabbc1770151cf1e72561dcb20677b19643d9c9b36bb42e62589c719cf63,2025-01-07T05:15:12.650000 CVE-2024-11384,0,0,bd09d80eb823d8832deb7b6d31dd08e4639583550e7acd4a531e328e5f289803,2024-12-12T05:15:07.527000 CVE-2024-11385,0,0,b8c574c75cf2cea00a757d377dc474503f06328c73f6861f0cd8dff47b3ce271,2024-11-26T18:04:49.077000 -CVE-2024-11386,0,0,458e90cc10d5ea7966014cc93ebe3e8ec2358207a7341c32907eb034b035dd6c,2025-01-11T08:15:23.613000 +CVE-2024-11386,0,1,fe00625a74f59e7050d7639e4b2d6bd6c017ff19c0b29e183882100ab9b94bf1,2025-01-11T08:15:23.613000 CVE-2024-11387,0,0,cc2575267c0624c2d772e7a1294628b14be17e17456ccbcf14c82a61dc7cfdd8,2024-11-23T05:15:06.833000 CVE-2024-11388,0,0,cc4ce5951e6443c6719f0b47e25fd91148c8919ab17cf08bd038e67541d941d5,2024-11-26T17:23:56.647000 CVE-2024-1139,0,0,ed27d132fb547ef9bb4d842588c622a547c4be05d0420da7bbf8b6fe851be114,2024-11-21T08:49:52.997000 @@ -244446,7 +244446,7 @@ CVE-2024-11392,0,0,e39da8ffe2fcb91c83eaee842684a73e7195db57e0b1c622d520fa94d7e82 CVE-2024-11393,0,0,19dee016144f4c49671550a1a20a1c722bca8a9d767501dcdfc03cfe728a7c2b,2024-11-27T21:54:58.570000 CVE-2024-11394,0,0,ed715a5643cd62dc08ee2cf492057b775795efb9422c8c56a37f188481d1231f,2024-11-27T21:54:52.887000 CVE-2024-11395,0,0,2c785115768091bea44fe3e26e4ea70367c535f8cb96f9ee4af4a34ca2f81280,2024-11-19T21:56:45.533000 -CVE-2024-11396,0,0,673876db2bcfba9607844a67a0c013543ecb0659808e51424c7d6856f2789c8c,2025-01-14T01:15:09.110000 +CVE-2024-11396,0,1,d89ee9977ecfbb52413e1702206fce42e3129d2c32574879b9bcbed972c938ee,2025-01-14T01:15:09.110000 CVE-2024-11398,0,0,6bc73f661401a8dde5698cef66f54bb03a0cf44e7d4372165a54805de1061f29,2024-12-04T07:15:05.983000 CVE-2024-1140,0,0,047d17dc9671e8b05a6277e9ef33a15f7c6b70a88f7abf98a3b1dd353b79ef16,2024-11-21T08:49:53.403000 CVE-2024-11400,0,0,f0d968b1fcd82e57778ae527db41a43291e92e150d389e79eb9e311a943ae3a4,2024-11-25T15:02:53.013000 @@ -244474,7 +244474,7 @@ CVE-2024-11420,0,0,1711c7ba1ba8c097f09567c5d53d049cbf7bb1bf6f7b471b4caaac9c33673 CVE-2024-11422,0,0,208170e182c3d2142ba69174b9f95e68a4bb28d469a940741629daad460705a0,2024-12-17T16:15:23.557000 CVE-2024-11423,0,0,5fd92d7acac7c9d9434b04e44769038fcd9ed45fc5418a964960dfeca17d19b3,2025-01-08T11:15:06.003000 CVE-2024-11424,0,0,d50ad6baffad28053a50f50d0d95ca3de9adf87a3fb1a59a3e023fabb9b6d399,2024-11-21T13:57:24.187000 -CVE-2024-11425,0,0,651ca114106ef272ecc2d3d9edf7988ef7bfd2b301b1b93ab2a3eec6d6b5bcae,2025-01-17T09:15:07.613000 +CVE-2024-11425,0,1,d9f53fcaf2513e36d49e9f36636783487b44927326189c558322eaf325166063,2025-01-17T09:15:07.613000 CVE-2024-11426,0,0,b92664b1e686c3f02127b23b083fb58b958de57166c1605ab7455364a1793bde,2024-11-23T05:15:07.153000 CVE-2024-11427,0,0,c3fcf7998beeb6a903337e5ecaceaa89f8054cbdaaa765548243de887ca3fc67,2024-12-12T04:15:05.637000 CVE-2024-11428,0,0,46d666ca3d541ca25437787d528f9a48f72c3211fef85014e6eea357fe3616d1,2024-11-21T13:57:24.187000 @@ -244501,7 +244501,7 @@ CVE-2024-11447,0,0,bd53c50380b55196efb74cff3fad5c24687f184135cfde8b6a52ffe6934cf CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e4176804,2024-11-21T08:49:54.097000 CVE-2024-11450,0,0,d9225aed2ac8475bb91c6ace69e4cc88aaeb28d7907e757183e21dfd957a870f,2024-12-06T09:15:07.137000 CVE-2024-11451,0,0,1ae0af532d165e743ffcab70ed2c779554ae651574ede2e8a8329313fc3507ad,2024-12-07T02:15:18.117000 -CVE-2024-11452,0,0,be6218bb73af4916bcdfb49b679c8c453a76008a24ac12876ba169e1c1829357,2025-01-16T04:15:08.287000 +CVE-2024-11452,0,1,15ed0600d3f3cea8d39d0e8707b77d53dbb9f26e901dd48087d2f9e5ff636ba7,2025-01-16T04:15:08.287000 CVE-2024-11453,0,0,5ddaa320fe1d4d03e381c657f388a7d4f2fbdff28eda17ec4fc3bcaf67d9e87d,2024-12-03T08:15:05.830000 CVE-2024-11454,0,0,54cb66d7c340e670e7be7c1c93e117d3d3f291412c8539746ac6183c30e6034e,2024-12-09T18:15:22.400000 CVE-2024-11455,0,0,2585d76118af0f8584c93ef70fec17184fe9addb803068b4dbf20f8e44717637,2024-11-21T13:57:24.187000 @@ -244538,7 +244538,7 @@ CVE-2024-11493,0,0,d49eb92c8c562ba2101f389cdd764449ac518734f087aed95f5fe12a18b9a CVE-2024-11494,0,0,120185b1f5452b090fd317862ca91721f9197720b68abdbed625f37e80933fbd,2024-11-22T00:16:41.223000 CVE-2024-11495,0,0,9c4e4a6f33e735c288ef4e55e53a3e0727ff8f6642201545ed0c9f418349e2e2,2024-11-21T13:57:24.187000 CVE-2024-11496,0,0,43ea7dbd5a3dc8b24d5b87bfdc0e0bfa9c873f8eb1655750b06676344c313b9a,2025-01-07T05:15:13.480000 -CVE-2024-11497,0,0,ea8bb0e7311b90f6021b27100b07d2c0ca28551085fa537eff4f62faa14ca35b,2025-01-14T14:15:27.720000 +CVE-2024-11497,0,1,c2e0834380c74196958a755a567b5d6cc870a884fa1525057406ceb5be8e8f1d,2025-01-14T14:15:27.720000 CVE-2024-11498,0,0,7272009b792fcdecf70fc17a50bede0518cbaf4c2694bef021eda391707cdede,2024-11-25T14:15:06.607000 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 @@ -244665,7 +244665,7 @@ CVE-2024-11632,0,0,de73f7ca209ed3887af097dcd8d60cda4bdd27816f354a861b8ba50b3a9bc CVE-2024-11633,0,0,68efe6d50a10738071cbd51ec1cbc8813b80c80199253ca588c6b5fdecb7bcf2,2025-01-17T19:35:05.380000 CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580535,2025-01-17T19:32:48.327000 CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000 -CVE-2024-11636,0,0,0b6d42fa0d5704cd6ac079216da1bb6972215c21c5e47338513c0632cc826b2e,2025-01-13T15:15:07.560000 +CVE-2024-11636,0,1,477a215831f10296b9ea3788441fcca038078cee1d80a9e966a40e92f5b59df4,2025-01-13T15:15:07.560000 CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000 CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000 CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000 @@ -244720,7 +244720,7 @@ CVE-2024-11686,0,0,396188aaf0b830451d3485fe79803d21d1114c49c3e6a130b6504b9b20663 CVE-2024-11687,0,0,5e77fbcd46b583a4f084d8bcc3492702fbc8999eee40cfff605d5263f17d5ba6,2024-12-06T09:15:07.303000 CVE-2024-11688,0,0,8d8a43b07b745617ea451bc11d9802776a561f6818ffe3d6e83d98ef6a879a1d,2024-12-21T10:15:06.733000 CVE-2024-11689,0,0,083793777007e12786b393e59e70bbd36f5df589b4b26e2949eb5844a08ab45f,2024-12-12T04:15:06.657000 -CVE-2024-1169,0,0,7d005e1e32dcb786dc145e0dc1f4f8a0f524691319a7051d5e1a67ddcb23a460,2024-11-21T08:49:57.153000 +CVE-2024-1169,0,1,3793fb764b595a7113efae9156138753527ea6390fffb3f1eb740b6191074b77,2024-11-21T08:49:57.153000 CVE-2024-11690,0,0,36f949c7291ee937d7c462de6404610bf5fd12a14d132776feceaec4091ad912,2025-01-07T05:15:13.677000 CVE-2024-11691,0,0,36fe8b3d1feccd057ef27ddd17979a52004da0a9606d16fdfdb44bd6d5656bc4,2025-01-06T18:15:18.373000 CVE-2024-11692,0,0,9269d1047de5ccf3bbe848f7300e55c4147a58cfd139cb6b7f723bc7b81e3d4c,2024-11-27T16:15:12.530000 @@ -244731,7 +244731,7 @@ CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158 CVE-2024-11697,0,0,031d7df0dfb1ff2b19cbd36a900d70b7e44f6b02ba77063a3d6968aa272edc04,2024-11-27T16:15:12.927000 CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7d90,2024-11-27T16:15:13.130000 CVE-2024-11699,0,0,2255ca84fcfd2424cade9ded6acbfc13cc6912c47cc2835dfbfa673a8ddf4164,2024-11-27T15:15:24.600000 -CVE-2024-1170,0,0,851c8d1fbbe91e74d89e5c6919991b33a2e52909affaaa10d4125ff826ddbd3a,2024-11-21T08:49:57.283000 +CVE-2024-1170,0,1,848fb967cc3d7d0fb29f31a95e3ab6a287f2d6654ea81e550f9f0e4c297f04d2,2024-11-21T08:49:57.283000 CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000 CVE-2024-11701,0,0,c825848705d456c74824a186f3a702976bbd1db3104a2cd1c202a595c80d93b4,2024-11-27T16:15:13.470000 CVE-2024-11702,0,0,e280c66930279c933ba67473303c53b6d6772276abccd746d35e492c09179838,2024-11-27T16:15:13.660000 @@ -244766,12 +244766,12 @@ CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9 CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000 CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000 CVE-2024-11733,0,0,95cac917a7c172e334d8c411bd7e32914cf640694af4ffd3d3de8eaf57fddbb7,2025-01-03T23:15:06.313000 -CVE-2024-11734,0,0,dda416ba0b80f24de8dd8cd81f7ebc6c3ddfda2a918d3579f549ff91b8a22620,2025-01-14T09:15:19.443000 -CVE-2024-11736,0,0,803cd5b3c6f4d88585847ab328b3f63986edf8eb886c5967a6e04b5145bc669b,2025-01-14T09:15:20.750000 +CVE-2024-11734,0,1,fcb4c3555ccd902a67a95e4dd11cf4a9cf76910b648051466ed2376c9eb6b598,2025-01-14T09:15:19.443000 +CVE-2024-11736,0,1,88441c6eb515a66379164533ef326bb76dc17b0171f7e72fd8ac029e9cec4df7,2025-01-14T09:15:20.750000 CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000 CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000 CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000 -CVE-2024-11740,0,0,8ae2e6a2774c20039997783a60c401560c5e566dcc76005591780fda83aa320f,2024-12-19T06:15:21.243000 +CVE-2024-11740,0,1,f494c8dfed02ed52538b05eb3d2640ea6f2699195fc615281f67509f0a0aeb76,2024-12-19T06:15:21.243000 CVE-2024-11742,0,0,573cb42c588bd214b3269f0f0837d622553f326ed266e544aa54ab8c350167c5,2024-12-04T21:04:48.830000 CVE-2024-11743,0,0,f820c67dcaaaf23a6b1da5f22e8dfaf3af6e92af3da2964cdf1cbb12adde80f2,2024-12-04T21:07:20.510000 CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000 @@ -244787,7 +244787,7 @@ CVE-2024-11754,0,0,115157a8a0f024c3ba84de7edd359cbde1e25041eace45096f12b0e339d7e CVE-2024-11755,0,0,c883abaefa6170cee64d3b62a0d846726e75234488258495594582792094520e,2024-12-14T05:15:07.100000 CVE-2024-11756,0,0,1b15032d5138c63a9bc74c14a17064d85dfaaa7feb6ae78db162c60925186a36,2025-01-07T06:15:14.943000 CVE-2024-11757,0,0,1bc7aae07622ccc6a4b7076dd363e7b8ecfc55de5a0f36b46f6f6ac7ac916966,2024-12-12T06:15:21.367000 -CVE-2024-11758,0,0,ca726f10359ea7a86c76a4ce25cc4fb51d404c0b02b8352f33945ac7a0f2c12b,2025-01-11T08:15:24.020000 +CVE-2024-11758,0,1,c32ee02602910c5ac293545d61aefee90e1f292d1954417a6b34c8176d0095b9,2025-01-11T08:15:24.020000 CVE-2024-11759,0,0,721c2f6fdff65f13ac54d162c1b8bb0f862a88123dec2155aa18c28dd98f712d,2024-12-14T05:15:07.287000 CVE-2024-1176,0,0,ade3cc69c20caab05c727481cc0ec5f568a186d8a0d855f0f768d9d6ccfee82f,2024-11-21T08:49:58.123000 CVE-2024-11760,0,0,72a8fc65de07cdadf0a0f6ed904fea74fd9bb6ba4b9fc9e5c352d9cc3a548975,2024-12-12T09:15:05.040000 @@ -244797,7 +244797,7 @@ CVE-2024-11764,0,0,a95eda8f94695230511213f37b0f60fd0124ea92dbd709e2b85d6745785d4 CVE-2024-11765,0,0,7ca3665c3c821fbe55ce7d0837aed80052a89fb5c5a0acd85f5778bdcb7cc52c,2024-12-12T06:15:21.570000 CVE-2024-11766,0,0,ece6a23c84d85f85ec62e1b775f625e9ee6e819290e6f88bd3f3e210a2634e2f,2024-12-12T06:15:21.757000 CVE-2024-11767,0,0,27b1bb05f924b0778af68bdc2e081cf79c91f7af32c3aed079cfafa7d5bfee0c,2024-12-13T05:15:05.843000 -CVE-2024-11768,0,0,d1dc5256960dbb7c1872ab2eee741d8ee6a82b0e95e8bd4589e5dba11cf5896e,2024-12-19T06:15:23.007000 +CVE-2024-11768,0,1,3db0876ed8f71320a7ce3603b338b6d7330ad956eec8068f9df61fd54f629d21,2024-12-19T06:15:23.007000 CVE-2024-11769,0,0,7c09ce15e3c33c67c82c4f8389595c27e00e07d607e16c4d909baefd0cbdfd8b,2024-12-04T08:15:06.680000 CVE-2024-1177,0,0,50204f0e1e82280f8898460ad80abf26f09df69c8b4bae2f8e7f259925f88097,2024-11-21T08:49:58.233000 CVE-2024-11770,0,0,811fe48f54a597d0d878563d5e3c6ae267f413b42e3fcfc7383af1a6019b7d76,2024-12-14T05:15:07.627000 @@ -244873,11 +244873,11 @@ CVE-2024-11841,0,0,29b2d8ff488587d8a4e1b1dd2198cfdea87c7a6a53f626f6147622127a803 CVE-2024-11842,0,0,b468b59966d33ed9e284180ae3d4b6da56e7697d6ed23bc6f677a3b17c040944,2024-12-27T19:15:07.700000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 -CVE-2024-11848,0,0,b4f189a102bd9221234b516bd2b5015aef773491815514a59419618205cc8c8e,2025-01-15T12:15:25.303000 +CVE-2024-11848,0,1,00b038ec97041da3d96a4d1023137a9b4c56ef72424f577b99bb6575aa07af81,2025-01-15T12:15:25.303000 CVE-2024-11849,0,0,fb65e5751887cf6f925710b520da76940b8a448761cc265aabd26f7c6635383f,2025-01-06T14:15:07.883000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 -CVE-2024-11851,0,0,ee62c08a86056122e74117ab58f255a108a7be018783957a35ab69db7711197e,2025-01-15T12:15:25.630000 -CVE-2024-11852,0,0,fcae6a31251538fa21922d7f8a34f94ee6c6390a3a29cfb5a4e8903a4faa77f7,2024-12-22T02:15:16.510000 +CVE-2024-11851,0,1,c4800712965876560a1d0b855389ef84037bf8e91f70f8903026d35b656dc5a7,2025-01-15T12:15:25.630000 +CVE-2024-11852,0,1,247fa49c341ad85d61d3b5deab0469e6e00526c346849e078d27356e459b9917,2024-12-22T02:15:16.510000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 CVE-2024-11854,0,0,999afde0352966c3848f9613a3046f97c5bfc972302cd671fa92812a3b6bafdc,2024-12-04T12:15:19.250000 CVE-2024-11855,0,0,b8bfb341060496fd32ee788a9ac0c446229bec4b5e208f7ac30bcfa919ff4d7a,2024-12-14T05:15:07.960000 @@ -244886,19 +244886,19 @@ CVE-2024-11858,0,0,73fd067f9f80a3fe9add2844a0fc8b12fbc4555aad7446ed909f2e6252e70 CVE-2024-1186,0,0,2e273a7149091b295fd44850226681809150a1697d95b70cddb9945c7f5d2c46,2024-11-21T08:49:59.387000 CVE-2024-11860,0,0,3a70209f793392595a3a51a4d60b0579da591107f99f2af8b8ca46fce7a60e47,2024-12-04T21:08:39.133000 CVE-2024-11862,0,0,7712aab25e9f815f730578195e7a4831741702c7ef40dfbc871d5c94d52129b1,2024-11-27T15:15:25.393000 -CVE-2024-11863,0,0,4f6ca2ee53a519a9ba2b815bf8abb75f5a29093830b58cb7165c9f07800d695a,2025-01-14T18:15:24.963000 -CVE-2024-11864,0,0,72e8a4e5ca152151b85f2e597259f9e45aabc126f036afb752b87dbd4f4c15c7,2025-01-14T16:15:27.760000 +CVE-2024-11863,0,1,198a026e315b07b5ea98b3f5c86c264937ca792272af2ae00a924a9f72be7b9b,2025-01-14T18:15:24.963000 +CVE-2024-11864,0,1,74045acf38049e2def991e2ab1d0da66a3878de29477694f72e7a43a11f054a6,2025-01-14T16:15:27.760000 CVE-2024-11865,0,0,42a8c32e42c8481cd421b33152335a9be7ed2d851fbfbce47808d03a397b663a,2024-12-14T05:15:08.150000 CVE-2024-11866,0,0,f98849df3d1b11c4a74b976ef8b2271c79a4b31b45f414582e51d5b7f2d3bff7,2024-12-03T09:15:05.487000 CVE-2024-11867,0,0,f6acb417b5c25ca0787745f2bd6aa4f31f6cfd5553556db6c5bd027949960f0f,2024-12-14T05:15:08.343000 CVE-2024-11868,0,0,5f9ba717e5bba6d40e615f3014a00e06d2189a88181101a3b1c6210ef70fffe1,2025-01-14T21:36:35.760000 CVE-2024-11869,0,0,a3baa31d4416f73c33dff88cf9049afe2222269653dc692e0c231b411ae31126,2024-12-14T05:15:08.533000 CVE-2024-1187,0,0,34bfab1d2868a509e17e58177c8ef1072428b9ace11ecd550f1c0daa57f2d37c,2024-11-21T08:49:59.543000 -CVE-2024-11870,0,0,e40bc630aac5ce6ae377e45037e34d36ed90a3a8d4dfacbabc353b9ccf08acc3,2025-01-15T08:15:25.633000 +CVE-2024-11870,0,1,db10c69afb718d8f68b748750ba30efcbdc0d5d8a4e578bf76cee1b98827d116,2025-01-15T08:15:25.633000 CVE-2024-11871,0,0,36cc57375a53657e02bd7a0a87b9e1475ef36a9df08a07761721bf952ae1c645,2024-12-12T06:15:22.327000 CVE-2024-11872,0,0,73a0c13648454617801aeec393eb6a762bb5263f614221a21da77057533ece08,2024-12-12T01:40:20.537000 CVE-2024-11873,0,0,83746cce2dad963e58a32339952bb6b4ae12bd4ff788e558b09e1ea778150265,2024-12-14T05:15:08.707000 -CVE-2024-11874,0,0,074c681a0af35e6e5c7b941981b56804a74fe1d91f1cb4652c19535ac87301f3,2025-01-11T08:15:24.237000 +CVE-2024-11874,0,1,8b938d30460565214a5619415432a2f7a2aca3933aadf882a6ab4d579366a351,2025-01-11T08:15:24.237000 CVE-2024-11875,0,0,2fce0016aa8c6a027c95eca97da341c6f52b04c99e151a803448f2d92e035de0,2024-12-12T05:15:10.317000 CVE-2024-11876,0,0,4d446e019fc456b762b8b387c5e79806d641107f5a6d66eca5284969e986ead6,2024-12-14T05:15:08.890000 CVE-2024-11877,0,0,ea4b234684fec63e3511addc951d161596023eb0b3e6bfea2e1878541e65dfd7,2024-12-14T05:15:09.060000 @@ -244916,7 +244916,7 @@ CVE-2024-11888,0,0,8a06477d55991ecfcdfbbbe13cfc5cc7673a7932d3eb8f15153aab2ef7344 CVE-2024-11889,0,0,c40f4924de6b0709ad2ac4ea75e730ab583fde8e75b7967e6c96aa9146701117,2024-12-14T05:15:10.030000 CVE-2024-1189,0,0,3e2c1a3fc9f24eb6eaedd5adba4b6f521645b93b8971a5e9477fe83a4ee5ef97,2024-11-21T08:49:59.850000 CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce045,2024-12-12T05:15:10.670000 -CVE-2024-11892,0,0,136e0aea797baf6aec107fd99f716a2a8a98d5331a2bdfff8885477242464f44,2025-01-11T08:15:24.463000 +CVE-2024-11892,0,1,d5c6270385b92d8aef9bbc883d47c18aabd1b1a329cb2704b1f0105fbc287876,2025-01-11T08:15:24.463000 CVE-2024-11893,0,0,ab78f78c6e435c83f3f5f09a281780ac0636482d65ec96c7c75ce803df2c5017,2024-12-20T07:15:11.747000 CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109ef81,2024-12-14T05:15:10.227000 CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000 @@ -244937,7 +244937,7 @@ CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000 CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5907,2024-12-18T12:15:08.950000 CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 -CVE-2024-11915,0,0,dc3ca0c1970f54dc4a5ca94d3cc15a32b71532a500815bf83b22c0157a62de2b,2025-01-11T08:15:24.680000 +CVE-2024-11915,0,1,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000 CVE-2024-11916,0,0,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000 CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,4521fc6ae268791ebd6da2ad80ce9552b7ae38c5833cb5098776b1906357f9a0,2025-01-08T14:35:22.633000 @@ -245032,7 +245032,7 @@ CVE-2024-1203,0,0,d1f896c2674b7d8b8ac7ccf181e7d9a7e598afaaabec693045eb0f85d52368 CVE-2024-12030,0,0,ab03bb849d6b0ac5fee4be199a6829464d936641a4ff08f4885974ca9f654ae5,2025-01-08T05:15:09.510000 CVE-2024-12031,0,0,d30b745c703c186af9776c88e8d0d222bab220bbc78efc5ddb772b6e524ac88f,2024-12-24T10:15:05.580000 CVE-2024-12032,0,0,d28549d87ab7a1da8c8e60b219695b8c0bac78074e1f07aa186ddc87bdbbdb60,2024-12-25T04:15:05.497000 -CVE-2024-12033,0,0,e927f07a2b56ed9559feecac9475721158968fcd0a3607e8c3de6dc754c6f0be,2025-01-07T12:15:23.900000 +CVE-2024-12033,0,1,bffaeb972922744e32cf3053889ef8f842d0f1c8a2b3c52d8033e337066b5a75,2025-01-07T12:15:23.900000 CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4e3e,2024-12-24T06:15:32.553000 CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000 CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 @@ -245059,12 +245059,12 @@ CVE-2024-12073,0,0,d6db2f0c4889187ac33654deef83fc5d0350b2e32b900f5fdab17885bff03 CVE-2024-12077,0,0,fc51d2e5a9f19fe3fbf82780f8b1560f161bbef921778ce0625a7b0a0068014e,2025-01-07T08:15:24.927000 CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669a9,2024-11-21T08:50:02.590000 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 -CVE-2024-12083,0,0,5fe27c2d4a4ee9695e52118078393ced73f3a0ce93a0eb895d11382e665ef303,2025-01-14T01:15:09.267000 -CVE-2024-12084,0,0,1c22a3a290fce68018ebc4e3c844d6973ea71c44833524592a0dca79e60c03b6,2025-01-15T15:15:10.537000 -CVE-2024-12085,0,0,16afb68c64775ecf0b48facf338b16d0a7fcca926372e4bcec6854d6d1a66e98,2025-01-15T07:15:27.843000 -CVE-2024-12086,0,0,5887c5c35fb1bf0c47e6f2f0b3ef201e9bfb6399ba1c3e952682d77d3c75c690,2025-01-14T22:15:26.370000 -CVE-2024-12087,0,0,92444a4c8e1098ca810f0f12473e16166fd6e31f57a583a297e3521f39a5f70f,2025-01-14T22:15:26.503000 -CVE-2024-12088,0,0,39bc38a877636df809df561923ec2731db5824435ee5727233c858fc237b049e,2025-01-14T22:15:26.600000 +CVE-2024-12083,0,1,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 +CVE-2024-12084,0,1,fe5308a36c7239f4fe16284500a49c24cf51de42c57cef941d363a1b33c8f1f6,2025-01-15T15:15:10.537000 +CVE-2024-12085,0,1,bd8723192b311f78368a8c3b8c2d1af3331da50236eddbab7d826a098afdb92e,2025-01-15T07:15:27.843000 +CVE-2024-12086,0,1,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 +CVE-2024-12087,0,1,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 +CVE-2024-12088,0,1,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000 CVE-2024-12089,0,0,e4693d0f49f7bcd8f49a3c46cbf99b45117c9aeb9696a4344a79bacac3eaba78,2024-12-16T15:15:06.250000 CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf29,2024-11-21T08:50:02.720000 CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000 @@ -245086,7 +245086,7 @@ CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327 CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000 CVE-2024-12112,0,0,675887d484c30a489c839813de06f4a2c0e83ee331233fc3bb15be475c6237ea,2025-01-08T04:15:06.683000 CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000 -CVE-2024-12116,0,0,869ce525ce7e781c5f6c67db9c3c06f2e95fa2c0db4e986ac99d9fc5b5f2ce69,2025-01-11T08:15:24.867000 +CVE-2024-12116,0,1,4a2ceff80336184e35d0f53deaa453232f189dd136149b8e8e0cd03d307eb4c7,2025-01-11T08:15:24.867000 CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000 CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000 CVE-2024-12122,0,0,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000 @@ -245102,7 +245102,7 @@ CVE-2024-12132,0,0,80a7c8d496b1886913eb9109e260df5ae2c0aa6f78d2c4d5ff0aee7f1f0cf CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000 CVE-2024-1214,0,0,006edfeb44add0513d6df0049d407da5a783feee7b6e41af090a449d9f26b334,2024-11-21T08:50:03.383000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 -CVE-2024-12142,0,0,a67de3fdb7b035904f27568222f265171af60a906a82839c7dc05fcbbef6ed17,2025-01-17T11:15:08.683000 +CVE-2024-12142,0,1,804d5eb963f5e31b1897c048183440c78533ae216be480727967ce98366adecf,2025-01-17T11:15:08.683000 CVE-2024-12147,0,0,a60a326d5e97949b76dd4b6bfe3685435b958d0b913ec9ae9ab905066656d093,2025-01-14T14:15:28.163000 CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000 @@ -245121,7 +245121,7 @@ CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000 CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000 CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 -CVE-2024-1217,0,0,3de4593a5f9b417a5fbd6236f528d532a8a6dfb588724578487cd5ad8c5d1072,2024-11-21T08:50:03.817000 +CVE-2024-1217,0,1,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000 CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 @@ -245129,7 +245129,7 @@ CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae5 CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000 CVE-2024-12178,0,0,85097aaa964ca63d98736b6294a6f2c33aab0e7c117a2f19277506f724b552a8,2024-12-17T16:15:23.687000 CVE-2024-12179,0,0,a0a65d195e49bd7b826852d9b69fa37a100c8cceb44f5eceb7a4713ebca18c3a,2024-12-17T16:15:23.870000 -CVE-2024-1218,0,0,ae65e02be37dbc9babfa45210656ff360cc199b16c8680945f92dd585fedfbc3,2024-11-21T08:50:04 +CVE-2024-1218,0,1,c9de9306acde036a45691c4d0b8ae8a7e3f4e2e79b0a0e0c34252fff4844a90b,2025-01-19T02:53:15.150000 CVE-2024-12180,0,0,25613c8b94aac2cf24513985a7e8ce52f62a7fb91248d4df9e059f62149972d6,2024-12-10T16:34:52.763000 CVE-2024-12181,0,0,2f8ddb76759020891581c20b50823d1952e3d03370eabe8b27bca8702bd25159,2024-12-10T16:29:18.917000 CVE-2024-12182,0,0,99729c3af2a19c744d32ab48ea2f407c48703d1d78f2fc596c4a0dad8235db7f,2024-12-10T16:18:29.027000 @@ -245153,25 +245153,25 @@ CVE-2024-1220,0,0,9554836c8027e0b7a98d02c469b0640f37340ff8518df5c7c53c1851829f88 CVE-2024-12200,0,0,23413f89ab73dcfe4f53913520af84d44004f8074e56a4f24db9e34101f9d57a,2024-12-17T16:15:24.897000 CVE-2024-12201,0,0,24aea21415169e4ceff164eedb7fa32646ef24d523e6e014144846720c08c29c,2024-12-12T07:15:09.607000 CVE-2024-12202,0,0,f8e879b581e6948b8611c91e34e77898ab31ee3bd4fed08e5a23f457acda7001,2025-01-07T08:15:25.090000 -CVE-2024-12203,0,0,8e061fb04c409051f931184cc0168daebd8cb730c46fb5138a848c8c64e89294,2025-01-17T07:15:25.990000 -CVE-2024-12204,0,0,dd2419f837ae2e8153f295f52cb2a01f412a1909c214527d0037cf9f21b9c1a9,2025-01-11T03:15:20.997000 +CVE-2024-12203,0,1,071877eff24cde372305d0756ca5c641682cded9e0285349acc0f650dba1e42d,2025-01-17T07:15:25.990000 +CVE-2024-12204,0,1,8869bb642f03c4aa3a02796800d2990e817fabee5feb10cf5da5780c611929a6,2025-01-11T03:15:20.997000 CVE-2024-12205,0,0,3f132fb045992282c7f82c5a064b4363ee95bb769165d08b8391a552ea18c9e1,2025-01-08T05:15:09.667000 CVE-2024-12206,0,0,2d268b18f02f4bd906dad5a4345fbb5bf68ec20740bfded288226575e3fdc866,2025-01-09T11:15:12.070000 CVE-2024-12207,0,0,4215076d4c349db5508fc90ade02423810084b601173785e651a4489dedc1db2,2025-01-07T05:15:16.080000 CVE-2024-12208,0,0,570ae5920f0e6b28dc0cde719aa86834356ad1572351e3f8a72e245ec26cd554,2025-01-17T17:15:10.740000 CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000 -CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000 +CVE-2024-1221,0,1,6eb0048329d33616469e001cc605524deb6a2585d44638bca96f55052fb887e6,2024-11-21T08:50:04.920000 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 -CVE-2024-12211,0,0,4df7fb84efc9fc12f44c758bef0f4a52c867cba7b75d71e208fe1d5fd8aa95de,2025-01-13T18:15:15.157000 +CVE-2024-12211,0,1,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000 CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000 CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000 CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000 CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000 -CVE-2024-1222,0,0,ff0f67607974451388d42ae6b90b2e9690717b801a6493a4e7aa508a94c6883e,2024-11-21T08:50:05.110000 +CVE-2024-1222,0,1,712e9043c3f95c7a7ccd918bf25adf6e39470356dcdb59119d4b314b49c83394,2024-11-21T08:50:05.110000 CVE-2024-12220,0,0,5a9af5863bd9968393d1012c1c5f5fb4875db98205155149f405e76579a2b19e,2024-12-17T08:15:05.393000 CVE-2024-12221,0,0,a87846a9ea687f0610603fb61d7ca73e4beeed151fc32a3afc0c338aec17e851,2025-01-04T10:15:06.410000 -CVE-2024-12222,0,0,0124c6cfdc91b4979955e2191dd7c13c0eb40d8384f002a9efb114a750f8d213,2025-01-09T11:15:12.490000 -CVE-2024-12226,0,0,426293b413c4970fd2746921ea025f0391aaab4d3790f5078d27ba6cc92c7012,2025-01-16T07:15:26.333000 +CVE-2024-12222,0,1,cf65a2967224f753870ef46b5e08d14581e6de5063f9b31016c226df28360d7d,2025-01-09T11:15:12.490000 +CVE-2024-12226,0,1,21bb283eb49b4f7bfaba4358070671ebb37dd2e9917de9da1738797e9c2071f5,2025-01-16T07:15:26.333000 CVE-2024-12227,0,0,c353a784c73b22c93b545f7e3c07e2ff77771e5d977f7464354ff7113388628f,2024-12-05T14:15:19.400000 CVE-2024-12228,0,0,cba3b66c66f8b74b7da0219a0273d1dd0c005a65d0aca4a38c9a6589b54985c9,2024-12-10T23:19:04.773000 CVE-2024-12229,0,0,aa44844c8d830c107b3760370b58cb504158d7d7c510be09891b02a376b9c9ac,2024-12-10T23:19:31.487000 @@ -245187,7 +245187,7 @@ CVE-2024-12237,0,0,bc9c0d4c537bace6ba73f5084a4978adc8d5b928619c3c4d0e52cb7bef9d5 CVE-2024-12238,0,0,0b2506120279c72470fe6ced119aba981e066d08bdac68bd9b96e39e9d942dde,2024-12-29T06:15:05.487000 CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 -CVE-2024-12240,0,0,da234d125bab02f32b25b5e43ff7fe4ebb93d6e8868ab7cdfaa9e75f89be7500,2025-01-14T11:15:15.137000 +CVE-2024-12240,0,1,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 @@ -245213,7 +245213,7 @@ CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265 CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771bae,2024-12-07T10:15:06.200000 CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000 CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a83b,2024-12-25T04:15:06.457000 -CVE-2024-12274,0,0,d05d8013a3182d0d2476db4ee6fef07e307a92ea82aaee7e035128104c1bb37d,2025-01-13T15:15:07.727000 +CVE-2024-12274,0,1,754c33d384166421b8530c0b6be4d1f50e294eb962f01142a13c10f72064a9a9,2025-01-13T15:15:07.727000 CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 @@ -245228,12 +245228,12 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528 CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000 CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000 CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 -CVE-2024-12297,0,0,45eb13901ddb02484873bfc3afb1fc35bfd6bb4fc5cc6a0b2e410b20a5479229,2025-01-15T10:15:07.237000 -CVE-2024-12298,0,0,45127e972135e0f663b287dd98e22a839e86dfce6953e71f91ed596ac81f4e99,2025-01-14T01:15:09.423000 +CVE-2024-12297,0,1,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000 +CVE-2024-12298,0,1,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000 CVE-2024-12302,0,0,2e7f53c232830ebe1e41c432ae300655d2811aa163d5fbfa007adf0b96c594e5,2025-01-06T14:15:08.023000 -CVE-2024-12304,0,0,ab993de83de0df2c74e2c128cd9b38543eaca4a797c56929aa726e307f2b9725,2025-01-11T04:15:06.113000 +CVE-2024-12304,0,1,4dfa8e767a126cb55003c6a69f6ee8463f160e6a120c56687efe548f8d46fa48,2025-01-11T04:15:06.113000 CVE-2024-12305,0,0,273e297c2c3404dceb5aa9b15a9613cb372f4eca60a3a417a7d24dc0972d8e0a,2024-12-09T09:15:04.970000 CVE-2024-12306,0,0,902fb51a4dbdd5670cb1cf5559cf247f9b3ba9c72034fe5330e7316e326e07b4,2024-12-09T09:15:05.293000 CVE-2024-12307,0,0,dd08ec1d0c570e2dfd8ff10541807fa47db4494718b1c9efb61df634a03bf8fd,2024-12-09T09:15:05.433000 @@ -245242,7 +245242,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12316,0,0,bd94f89d24fe6cce24830f008f192f3c2ffcc6ab0e6191b96024b5a41dc8139c,2025-01-07T12:15:24.040000 +CVE-2024-12316,0,1,2570abed78e04df0d70e5592258d76ad89a9394bd03499a3e471de7c1b107996,2025-01-07T12:15:24.040000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12322,0,0,84247a031ea6a724314932d42a7460599ae4e2c971abe58241a0cfedf89e325e,2025-01-07T05:15:18.063000 CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000 @@ -245260,7 +245260,7 @@ CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5 CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000 CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000 CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000 -CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000 +CVE-2024-1234,0,1,7cbff87657f83691f34fa5150333d5c92e9b17a23ee2cd64532f5a4296ff0a3c,2024-11-21T08:50:07.567000 CVE-2024-12340,0,0,e64d9154ce721e0cef963ec962023bf662e8b1885905905ffc386c61964f035d,2024-12-18T10:15:07.827000 CVE-2024-12341,0,0,73d0614d7c98b23e49242f0be40422e4e73b095a6a96061a926bb2fee6b56681,2024-12-12T04:15:07.660000 CVE-2024-12342,0,0,ca2d1ce741ee271c3f8bb6665fd58409882d87693c71ffc1173980d86241d998,2024-12-08T07:15:04.950000 @@ -245288,7 +245288,7 @@ CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a CVE-2024-12365,0,0,e44342e05a0b6e2262a493fac9edc68519495d51c0acf8bc24f40ad738356cb8,2025-01-16T21:31:22.633000 CVE-2024-12369,0,0,fcd74b43ea72489fd8099497c673c3afa2054b03bb7ec4819b8a995ebe30e685,2024-12-09T21:15:08.203000 CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000 -CVE-2024-12370,0,0,985c17dc1204cc21afd2ca8b801e8e77323afdb870d6158e6bc1f7791471f3a6,2025-01-17T09:15:07.810000 +CVE-2024-12370,0,1,4ba82d78bb18570ed3a92b4268f3e2259421a7f6bdb0562fe53314b2628c8bd6,2025-01-17T09:15:07.810000 CVE-2024-12371,0,0,ad8806dfee353fdb9887f497d244b3ccfcec0ca669e819f5ec6c72aa1dddd27b,2024-12-18T20:15:21.193000 CVE-2024-12372,0,0,61d0814cd7351773a7f17ecab5c027fade58fdedeaf091e4269b15064d9c21b9,2024-12-18T20:15:22.167000 CVE-2024-12373,0,0,83b846beefe400aa9231cc84fd600de52fbf3fd7f422b967ec41c6b980048087,2024-12-18T20:15:22.280000 @@ -245303,20 +245303,20 @@ CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b71 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000 CVE-2024-12397,0,0,661288be67552f431f0a0bf144bed2d313b12b592e50cdc78451d7c1272f6fb5,2024-12-12T09:15:05.570000 -CVE-2024-12398,0,0,edce43a555297dcf503d2b9755d2cabdf06ebe415f26cf31fc5ce1bbfc43a72b,2025-01-14T02:15:07.990000 -CVE-2024-12399,0,0,24fcc833311859ac1371d7a2b9e2e1ed18027e45f09a9024ddf8b022c61477a7,2025-01-17T10:15:06.697000 +CVE-2024-12398,0,1,dc92ba504f92855dc137bb417875a9d86745e240f6a0418c6d370014042cc310,2025-01-14T02:15:07.990000 +CVE-2024-12399,0,1,93b1cedb21d025aa2a7c64672a0deaba138e4d19bf64f3997c97cc28126eb1c9,2025-01-17T10:15:06.697000 CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000 CVE-2024-12401,0,0,ba741c7b51198b95eba245807f65253a1c54ea777ddd918337cd97bd144396fe,2024-12-12T09:15:05.790000 CVE-2024-12402,0,0,36e3ce185be6b6d4714b97d0b9e949abc75eb52a2fa273901aa2b4c0f962b168,2025-01-07T04:15:07.990000 -CVE-2024-12403,0,0,65ae156d0994605ba4bf9e3cb2d05e75cca4e5dc5d2e8d7fe17cdf557025effe,2025-01-15T10:15:07.433000 -CVE-2024-12404,0,0,0ae799af50bc1f8f81ca73c24e0c487e6cb95e7dbb212bb43b7dafb4f227c072,2025-01-11T03:15:21.140000 +CVE-2024-12403,0,1,f86e636eddc7cdb9b8bf4adcd4515238330a01facfd5633ebda91511666728a4,2025-01-15T10:15:07.433000 +CVE-2024-12404,0,1,87caa4e5c1cf15cd438d23ff837dbdc66765b30d50bb620319b7859d065d8d25,2025-01-11T03:15:21.140000 CVE-2024-12405,0,0,631a04fc890c6ac2fbe1fd822df1e67f289f1ef7b029b11f0950a96d4993c03b,2024-12-24T06:15:33.123000 CVE-2024-12406,0,0,3a24bd925fcaee835bc0ee30f7ad38b16626ae1e5c8470fedd28227d3dd60123,2024-12-12T05:15:12.210000 -CVE-2024-12407,0,0,d9811ea7aaed00c035a057ab8d0a3989286774aca6d4690b922da837a88beb9b,2025-01-11T08:15:25.093000 +CVE-2024-12407,0,1,90207e0ed6e0318c2d7902b5431b42ac4002510e342567216f54a8133c6105ee,2025-01-11T08:15:25.093000 CVE-2024-12408,0,0,c9a97800ebdc971055fe039c0934b7c899913355f0545cc6cb71b6253bd484f6,2024-12-21T10:15:08.067000 CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000 CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430e47,2024-12-14T05:15:10.437000 -CVE-2024-12412,0,0,a36f11976e1e41ee78fe97d1e70577f9d00cafdfe398e32080cffa4b8eeaa8f0,2025-01-11T08:15:25.320000 +CVE-2024-12412,0,1,73803094a00fe18ec7862bec4f3d5df80208f9d752aff4dcb1f7ac4bf52a33cb,2025-01-11T08:15:25.320000 CVE-2024-12413,0,0,fdd057a05387c9ace72d4ba4316c6065bf29813d0f1c7f4a169e0a5a81de204b,2024-12-25T04:15:06.607000 CVE-2024-12414,0,0,ecf25a2c3f536085b4d44f95471b078e2b7cb6ad454e7c12c9e7d103ff4fa2bb,2024-12-13T09:15:08.070000 CVE-2024-12416,0,0,133a91588ad725ea1676e171a1de9f146794e8ea11542e637f25e6fdb4eea6e8,2025-01-07T04:15:08.143000 @@ -245326,10 +245326,10 @@ CVE-2024-1242,0,0,8257984bba04d3b8d9819d4344dfe11cb91111c964df741c73e350923121da CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247bfd,2024-12-13T09:15:08.627000 CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000 CVE-2024-12422,0,0,27a2b7b5579aea6b626e898353e29adaf77dce7f7392fa2cdcdfb4f6d55292dc,2024-12-14T06:15:19.357000 -CVE-2024-12423,0,0,3555afe86904ac107f3db4c4d72aa253a40f0541e51402914a1017949cc8c3b5,2025-01-15T10:15:07.630000 +CVE-2024-12423,0,1,df2227f1fff48af0129a6b0a667fb7c3072c1a1dd75c0e4da9043c67a4fe7811,2025-01-15T10:15:07.630000 CVE-2024-12425,0,0,d885296390121d087e04ef42b8491b76f893200d98a386f95c4a72f26f9f2359,2025-01-07T12:15:24.183000 CVE-2024-12426,0,0,172dd3632cc915a80121d55ee02d9001ce95b069ca8a1e5b844628b1eeffffb6,2025-01-07T13:15:07.210000 -CVE-2024-12427,0,0,e75b5adc741827eedf4098619ab568942b8e84e707ecff6859520e41e07fe71a,2025-01-16T10:15:07.243000 +CVE-2024-12427,0,1,c3d2fde21ffd56245e0a5e38d5a0eb85ea15179958d8f15e37e4a4284db0f45c,2025-01-16T10:15:07.243000 CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000 CVE-2024-12429,0,0,e6d5ff5cfceb2f61c0ef11c8f30168015114d1365dea8b766c339e4109cab13c,2025-01-07T17:15:20.527000 CVE-2024-12430,0,0,0c8a563bb6bc403b10276a981acccd2883fb8e64f72cd343170d116fbae88cc4,2025-01-07T17:15:20.703000 @@ -245359,17 +245359,17 @@ CVE-2024-12462,0,0,cab939d75095835b9cd7c3974182ba9f75ca922feb4b5a49ec456a8c518ba CVE-2024-12463,0,0,bf2ad951357546047d42b0aefb8a66347583691f5449e603983c94f9bac4eadf,2024-12-12T05:15:13.197000 CVE-2024-12464,0,0,ffa0068749df08a838ed800b533933f2488b98e069e2e1b69fda93eb15a6a6a0,2025-01-07T06:15:16.823000 CVE-2024-12465,0,0,71cf8d099f9bc4306dd9d21cf13805ebee4cfad62908f99a6e3f6ef7ca285117,2024-12-13T09:15:09.060000 -CVE-2024-12466,0,0,877b09c7e5b268b1bdcb35d6c2b2c83051779af0798fb16f32dd22717490c927,2025-01-17T07:15:26.203000 +CVE-2024-12466,0,1,369177d07ca1cb0a3b591825919acf924d5b626f9b08c6179162f7635f26fea9,2025-01-17T07:15:26.203000 CVE-2024-12468,0,0,20d3be8a82fb7f9b6094ff27e59754b2c2151696c1841d3d96ac080fb2a03b3f,2024-12-24T09:15:06.227000 CVE-2024-12469,0,0,871c3c1e000bdae5610f745ffefecdbdcd7d22ba906daf923687641c197ab750,2024-12-17T10:15:05.997000 CVE-2024-1247,0,0,87dd54613b1838220658d2242080e8fb0b79934df6e5afef144b61ee319c0ba1,2024-11-21T08:50:09.013000 CVE-2024-12470,0,0,60796dff41be247f7bb9299485bec457d98db6e75b28fda87283280a225afdb1,2025-01-07T05:15:19.823000 CVE-2024-12471,0,0,a7a928bed88b4ba06c2a65b15490a326ae6a9c787dc31c2c179fc029202d53b8,2025-01-07T06:15:17.027000 -CVE-2024-12472,0,0,013d43dc4a3d5efd4111c39ad69495f245cd45b07cd96990fce217b14e23c379,2025-01-11T03:15:21.283000 -CVE-2024-12473,0,0,689b1037bf2be3b6c18837d1a5884011766b273a34f635be024ca16a6702e2df,2025-01-10T04:15:18.623000 +CVE-2024-12472,0,1,b008dc18cc89ab59c08b228d95d498327ab3c0a28ad0a6745a0bf880c9c08657,2025-01-11T03:15:21.283000 +CVE-2024-12473,0,1,206297f672a09c7681b3d1cbb4c368e1c0a3b16d868ed8e1c0293957039b0a95,2025-01-10T04:15:18.623000 CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000 CVE-2024-12475,0,0,ef161022c17bfffe57f2c972fe120be00d3d8c013647d5e0ab15260b6747ad0b,2025-01-04T12:15:24.650000 -CVE-2024-12476,0,0,44987868e854f7dd3e7c300cee9b010ccf929052e14ff24ad02acc25981a5743,2025-01-17T10:15:07.013000 +CVE-2024-12476,0,1,d1e3238933bb4ea639cee19cbb8d3bd8d52c9f543c18540cf4efbe3a21fc7ede,2025-01-17T10:15:07.013000 CVE-2024-12478,0,0,9740cd4243776bc4b985718131b1bfcc5e0a94370bd612144af92e9b380848b7,2024-12-16T11:15:04.890000 CVE-2024-12479,0,0,71e9962db709a4fb365c50c76ea2678c0c0be3cc10bb9fad5f99b55609975bac,2024-12-13T17:10:45.860000 CVE-2024-12480,0,0,278aebffcfd2515ae9c7caddd55ce9bc13fc09babf1329c96da477d94bc16635,2024-12-13T17:11:08.800000 @@ -245396,10 +245396,10 @@ CVE-2024-12500,0,0,a1bbc31d033f1807389d74301e364594f87125fc476a6f494352a12352507 CVE-2024-12501,0,0,099422e2bb99df2bd932e80161b3557d59136d70f204462f7c72270d679f0b8b,2024-12-14T06:15:19.770000 CVE-2024-12502,0,0,149382009077c4d5fee4128c2222d378e6f99e3bf1009b70c95ce07a51b9bcc1,2024-12-14T05:15:11.260000 CVE-2024-12503,0,0,e53e761e34d39e4e7df36516ec31d7b0a69f9ff2ae79d7b9e9b3c291572b84d0,2024-12-13T17:13:37.483000 -CVE-2024-12505,0,0,6e23574bf5253c388571f4ef44148ced29b99ef24c9d63d1f08aa5602c56ebdd,2025-01-11T03:15:21.430000 +CVE-2024-12505,0,1,e5acf98e9c67d608c9fbef2d18ccb211668f74dc94c88031b1d02e03c20366d3,2025-01-11T03:15:21.430000 CVE-2024-12506,0,0,ad7226add7d6241daa2317f2d019a78aac67392c449b8b39c4b609b26c120917,2024-12-20T07:15:11.940000 CVE-2024-12507,0,0,f098eff6e3ef53742e66474a6ac17418c00af6d9e6800445130b20da01af7c21,2024-12-24T05:15:06.627000 -CVE-2024-12508,0,0,8ef20a5b0e36709cd72d8cc7fcfb39bc0fc5714680eee5747355f5497bbe1081,2025-01-17T07:15:26.387000 +CVE-2024-12508,0,1,21bc7864dfec1ec4afdc6f630d41f80e3589bc17435e07461da258099a6c3dd8,2025-01-17T07:15:26.387000 CVE-2024-12509,0,0,8448cb7b981b452e7bee8263b7d56776b70a911630dc0596718dc3941caa2300,2024-12-20T07:15:12.177000 CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000 CVE-2024-12513,0,0,6393dedffea01c8a6ef2142d1a8a9d6ba57b27f731b145d36f16e844db01eb62,2024-12-18T03:15:26.427000 @@ -245408,13 +245408,13 @@ CVE-2024-12515,0,0,8c631cd3a275f3c01ae86ddf0d5593ffa408e3783d26380f8b46d3a793192 CVE-2024-12516,0,0,c0f1317fbddc4b686db82724b2e724627f669a3275680bc6d4a47d577638d4a6,2025-01-07T08:15:25.290000 CVE-2024-12517,0,0,4d330b1d19e40313cc9a81f9b8784c01c801f44b6fb4859786e4a9a0d1f904a4,2024-12-14T05:15:11.453000 CVE-2024-12518,0,0,e836e2bda2de8df1c322fb96b28c258a6308fb3f7a0cbb3b5a146ac83d3fa431,2024-12-24T05:15:06.827000 -CVE-2024-12519,0,0,6450c33307c9449b6013ea08667cefb1a5486038517ffb39b882eb5aad6e21fa,2025-01-11T08:15:25.530000 +CVE-2024-12519,0,1,8512ecfe11d3f5f606f5fdf06fefea6ed5c0603f03aafcb3163b8596fbd0ba19,2025-01-11T08:15:25.530000 CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000 -CVE-2024-12520,0,0,3f1b14d7dffeae4c90b0f9206c631144937a48e23d81ccf571b144329c30ab26,2025-01-11T08:15:25.720000 +CVE-2024-12520,0,1,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04bac,2025-01-11T08:15:25.720000 CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000 CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000 CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000 -CVE-2024-12527,0,0,2eded19676c81f6420ec9daeb3ce62a1cabb4a11728f06c8deff94df9b3fcae8,2025-01-11T08:15:25.913000 +CVE-2024-12527,0,1,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000 CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000 CVE-2024-1253,0,0,a598e10fa6d530af6148de164d99995412d597f7142ead42d62b85e905a98949,2024-11-21T08:50:09.843000 CVE-2024-12532,0,0,199fed046db6fc1b5b34521e2b9548b73238ea6ea9f77361d16a8dbec2a817f0,2025-01-07T12:15:24.363000 @@ -245438,9 +245438,9 @@ CVE-2024-12559,0,0,57ab0e0bbf049179f4bb043a31125569183e3823c6e0814b5b25df137c49e CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000 CVE-2024-12560,0,0,d33290fc3e54f51dd78cb0afaf9a18e8538f72db9dd0f598ab5a68b55bfe89a1,2024-12-19T07:15:13.507000 CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772172,2024-12-12T15:15:12.097000 -CVE-2024-12566,0,0,9a77156e8936936c9005583c058b94eca6806bafd8414772c10336a297ecd3f8,2025-01-13T15:15:07.893000 -CVE-2024-12567,0,0,aac6e230ccf263ce1a1e69fd067297b7d8115ef287b9153bec5930f76ee445cd,2025-01-13T15:15:08.060000 -CVE-2024-12568,0,0,91b045e507ca54393cbb5679e99498006a0e0f9f9c51393fc6c10f417ca0d495,2025-01-13T15:15:08.223000 +CVE-2024-12566,0,1,cae64572fc707f14425318c88ef9c52b03f915c4164041e3b4f1038d90684dc9,2025-01-13T15:15:07.893000 +CVE-2024-12567,0,1,13ab14fb9171447e65350d2236b20d0e0c9f3e46107536c165b19bd4c13ce858,2025-01-13T15:15:08.060000 +CVE-2024-12568,0,1,c685936d50ab57dfe5c285322ca955d335948baae78a158fa7194d194f8753c3,2025-01-13T15:15:08.223000 CVE-2024-12569,0,0,25b9d586535dce79af41e88589b6a19e7dcd010171a3602ad95e43e1b6140aa8,2025-01-16T21:15:14.697000 CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000 CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000 @@ -245455,22 +245455,22 @@ CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 -CVE-2024-12587,0,0,2c2bb6109f838cede19935d42d3fb45b90001a4bd2b3fd87b8ac1f4583f8e25b,2025-01-13T20:15:27.283000 +CVE-2024-12587,0,1,7960172962a4bd5df694844fdf178521cdb4dbd17b76b544453367f416394602,2025-01-13T20:15:27.283000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 CVE-2024-12590,0,0,217ef4dab25f45d20c71439c17fd49c4f82558ccd785c0d0a569568075f7d918,2025-01-07T04:15:09.607000 CVE-2024-12591,0,0,ab3753b6008fbe3e6034e40f9f857196cd212596c7c67b4ab270eba30c140899,2024-12-21T10:15:09.177000 CVE-2024-12592,0,0,138962a75cfdc3c83ee816d4268752d65e3f8b81d264b25dbcea90b78c661e78,2025-01-07T04:15:09.783000 -CVE-2024-12593,0,0,1fe841292f8460cce03e6fb573f45da092e954880ca5d7e3ec21e091f7a5057f,2025-01-15T12:15:25.790000 +CVE-2024-12593,0,1,f12fc7c4504acf17f37f7c5d482877e9fc93d8c3d7637d26d49c4eec0814f10f,2025-01-15T12:15:25.790000 CVE-2024-12594,0,0,594b37b561926a174996b6f220ac2c193da316e698a771fbe44cfee2e4625e76,2024-12-24T06:15:33.297000 CVE-2024-12595,0,0,d10767ce84f7e81d5a6ad487503289a59f4d01b86cd7eb0b224ee74e49237f41,2025-01-06T21:15:14.003000 CVE-2024-12596,0,0,5fc66f30988060a8b7bb1a593c82bd6c3fc2c995268e617c35d93ef410dc9a09,2024-12-18T04:15:08.253000 -CVE-2024-12598,0,0,b4b0a6659afcdc69603678a7c62d1ef16396bd4a4d3aef9c5175bcc4e5497e46,2025-01-17T07:15:26.577000 +CVE-2024-12598,0,1,2c0e6e211745cf2c8a775604eda102619f7e15adec08efbb58ccc8f252ed3240,2025-01-17T07:15:26.577000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 -CVE-2024-12606,0,0,22dbeb9ccb7de3748ffcb5a9742ed9efae0d34cb977177faf680cf3e4f662ce5,2025-01-10T04:15:19.667000 +CVE-2024-12606,0,1,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000 CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000 CVE-2024-12613,0,0,7dd856ce73c7c9a995010e01aad16c5eee77060b0b2db6bbab6d0cdb4cee95e9,2025-01-17T22:17:16.967000 CVE-2024-12614,0,0,85c73f48edb54993612da38f79df29849481d1d0bbf1a99bc0613daba18ae317,2025-01-17T22:17:15.190000 @@ -245483,14 +245483,14 @@ CVE-2024-12621,0,0,c2adae066a86c184a771a0d948073e2bc06ef58867852e158c90f4e2e54ac CVE-2024-12622,0,0,44dabce1b6e9706e1913dedf06e830c5e84e3b2aacb10e32270b16def1e102ad,2024-12-24T06:15:33.433000 CVE-2024-12624,0,0,607fd046821512cc38ba7b71abb5daef23523205632ac77d22471643a0913eae,2025-01-07T07:15:27.747000 CVE-2024-12626,0,0,dc01f58442ef4eb4425488c755c4a1d0852a1ed618c4541c829e9e2584781b84,2024-12-19T12:15:06.160000 -CVE-2024-12627,0,0,230444a02f062d22870ea23f281bd0815473ee87a6c21e91ed136026b3cd9ec7,2025-01-11T03:15:21.587000 +CVE-2024-12627,0,1,022af0cec2036ad3cef4dfbe1da5009a76ffbe6b2f826e6feb835dd2d0810966,2025-01-11T03:15:21.587000 CVE-2024-12628,0,0,f48463b1ecdc4a2ff76d188b8ae44a2e0e32ef1e929dc806ea33e24839d1432f,2024-12-14T07:15:07.213000 CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000 CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000 CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb766,2025-01-07T06:15:17.417000 CVE-2024-12635,0,0,3c7aa75fcbe7aad344d7ab6a29830b91315b8c91a45f35c3746137d636be222e,2024-12-21T07:15:09.380000 CVE-2024-12636,0,0,42a82168ce07b7a4b358fd4a7a39c0f3a390399d55754f2ae0215aa2892ce194,2024-12-25T05:15:08.067000 -CVE-2024-12637,0,0,a775faa28ccf08a54fd8e3f20098a0b96684553da4c0ed82d501fce962b5c073,2025-01-17T07:15:26.773000 +CVE-2024-12637,0,1,0a511df96db32a9b14e55f4c161efe09af214577bd9827e9baeb5f267eebf5c8,2025-01-17T07:15:26.773000 CVE-2024-1264,0,0,0a400b50d7c5417af4540851d66c40fe9607cfb1bbd030ca37354551feca3778,2024-11-21T08:50:11.460000 CVE-2024-12641,0,0,6e6b1aa53bd8553222049d57d01527b85aa1b46f94f8dd550c03e6967ee19a5d,2024-12-16T07:15:05.787000 CVE-2024-12642,0,0,a401d76248880d01d3fa48196afb4bda331b127bc27a94608f221d11c2863778,2024-12-16T07:15:06.023000 @@ -245538,7 +245538,7 @@ CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e09 CVE-2024-12699,0,0,f1f15e132ae79e83fce4e52614f661803aa78c84f19a0d2adbe2c9bee934bb41,2025-01-07T10:15:07.143000 CVE-2024-12700,0,0,c161ba4e53ce97164ad141dae69781306c514830255596765fa43a667338faaa,2024-12-19T23:15:05.860000 CVE-2024-12701,0,0,cd6b08f28311d78389b2479a22ff0ce00f8e2d386b94e3b072290f303be9f2ff,2025-01-04T08:15:06.670000 -CVE-2024-12703,0,0,fe1419d669a0f5418d0219294fdf1471b68b6de65b1c79c49d492acc32a1b820,2025-01-17T11:15:08.903000 +CVE-2024-12703,0,1,c565183eb12abdb4955b338c8bd40c3325b4b163523b9159fd30bcbf11e5936b,2025-01-17T11:15:08.903000 CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000 CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821657,2024-12-24T05:15:07.193000 CVE-2024-12711,0,0,9b677fb642029180fdaa553160a64c71aa90c9b6592fc5efc1139f03e5c4de5f,2025-01-07T12:15:24.503000 @@ -245562,7 +245562,7 @@ CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a87b4,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000 -CVE-2024-12747,0,0,23752c7f6205ff17286a665db1e5f8e8eeaf60d91cf82c36e148b0e2752c817f,2025-01-14T22:15:26.700000 +CVE-2024-12747,0,1,228eec4044804b80ba1659144cc2ab4708bae3c1cb52274907fd158447626068,2025-01-14T22:15:26.700000 CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000 CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca134,2024-12-30T21:15:06.130000 CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000 @@ -245574,7 +245574,7 @@ CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de129 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 -CVE-2024-12782,0,0,94615a91fb891a88498de75e4b825123bb157c448f26c71e3e4bd3ffdbda7e58,2024-12-27T08:15:04.917000 +CVE-2024-12782,0,1,a220a59df3c04cfe812d51b3c5d226e092dd063fd83863ac7ea9515a10725c6a,2024-12-27T08:15:04.917000 CVE-2024-12783,0,0,1cbf05ea91cf262fc7ff861feed31dbe6250d2c08bd8ebca814337722a82f119,2025-01-10T21:26:40.627000 CVE-2024-12784,0,0,d43f309a79afe506253b0858298bf53d7bd83e19d817fecf6daba2b82c8589e6,2024-12-19T14:15:05.943000 CVE-2024-12785,0,0,13242b29db7a5f3ee9a9cea49747bea7fbd1861c73882dfea30e05b74275dc2b,2024-12-19T15:15:05.980000 @@ -245595,7 +245595,7 @@ CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 -CVE-2024-12818,0,0,a3cee6dac7f2558cc02053bf5ae1b32f28fed83f74b72abd85104144303936af,2025-01-15T10:15:07.803000 +CVE-2024-12818,0,1,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000 CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000 @@ -245617,7 +245617,7 @@ CVE-2024-12843,0,0,0238e674ff4a2f2823631a9cac361a4395bebdd053f8f32556861c5f8a605 CVE-2024-12844,0,0,5c0e1e9f12ccd3e7b6409ec6f9fa62b1ac61e24d0cd9ed98d53a582ec95f3c0b,2025-01-07T18:45:15.590000 CVE-2024-12845,0,0,a476f9ae604ca9ba196326844e481285fd755f33cc18c52bebc4a8c43fca5e80,2025-01-07T18:35:19.607000 CVE-2024-12846,0,0,b36aa9429c01b33f714298f498b85f545e5bd6d4097759ae2d16ede617c8acc2,2025-01-10T21:34:58.917000 -CVE-2024-12847,0,0,d1d0f91854c634aa238021a769f82878b06bd9e08c30ca50139adfae2e04e485,2025-01-10T20:15:30.150000 +CVE-2024-12847,0,1,87b7137cfe2079bdbe4fd171d126e084bbd33f46edac201de52b8bf2c435d81c,2025-01-10T20:15:30.150000 CVE-2024-12848,0,0,95ac60390486f7accc1a4c21b3c339a643ce34c81e0e6f7a88c7c7253bce51fe,2025-01-09T11:15:15.870000 CVE-2024-12849,0,0,3437660a93e3ba43e7759c6102f16953543e1a3c3d091452a24c483dbd6bd5de,2025-01-07T06:15:17.607000 CVE-2024-1285,0,0,6f25c863c73c3b70a1777f6b7ea15f17f9158b6669df8af6e4411802154a74d9,2025-01-08T17:13:54.647000 @@ -245632,7 +245632,7 @@ CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee91 CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000 CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000 CVE-2024-12875,0,0,65f6ca3bff49bc2fd9ea644c89d99467e02d0f3d3859a576808fcf00ae63e813,2024-12-21T12:15:20.910000 -CVE-2024-12877,0,0,ee745cc6891b6f98f31fc8fb5b937635d304fd155e8f601a9dbdfeb4b3023c62,2025-01-11T08:15:26.127000 +CVE-2024-12877,0,1,a9e389a679e420f1b0a9a06268a68a8b0a86295a1a7eef4bfea3f46105e61e67,2025-01-11T08:15:26.127000 CVE-2024-1288,0,0,395f2de724425f73212a7bc39e91c09ee4289c7b4882341dd1ed370b6c884fd8,2024-11-21T08:50:14.440000 CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12883,0,0,0dccbc52a4dfe90cc951e45cce63bd7a8971973694371765a4b4ec10fba99d5e,2025-01-10T21:24:53.957000 @@ -245657,7 +245657,7 @@ CVE-2024-12907,0,0,d89f3365314aa5778f704685a334ac72db82727dcecdbb78151d02652b150 CVE-2024-12908,0,0,76a88b8500008d4ca56b5c37bddceec64b40a69d8577b8cdbf6118a2030881b4,2024-12-27T15:15:10.240000 CVE-2024-1291,0,0,8f051cca86e07e915f10677720017dd69f0d69620ffe64fe34f7d04e63b0eedf,2025-01-16T15:28:37.230000 CVE-2024-12912,0,0,746e63a7cfb944606513a06821763c045edbf693309ba8391961cb9c8e0e7197,2025-01-02T09:15:17.470000 -CVE-2024-12919,0,0,717b1905f08ccbc54ed50a4e384a22b34d13b7a7099ace4bfb6645d63a69b239,2025-01-14T10:15:07.250000 +CVE-2024-12919,0,1,1c2e8b779628b44ff131f72054d62442fff08b11e2e6cc4877fd414cfba22a7e,2025-01-14T10:15:07.250000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 CVE-2024-12926,0,0,fc2a26ab92b192ae501d4e54cc781c262c43c0b12662ce958be5565acbb713e7,2024-12-27T15:15:10.360000 CVE-2024-12927,0,0,29caca6ad2306153fa9ab094fa9e0334461e2ea665f8d59bbd5e4f726fcaf708,2024-12-27T15:15:10.513000 @@ -245842,28 +245842,28 @@ CVE-2024-13141,0,0,e02630d89869a93282447e18ce780011ed83ee2cea269953c3ed99e9cff8f CVE-2024-13142,0,0,83e0842aea5b2cb3dd06404d668eb9948718605f09db4c9056bc023c82417987,2025-01-10T17:32:54.570000 CVE-2024-13143,0,0,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea32e,2025-01-06T00:15:05.460000 CVE-2024-13144,0,0,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000 -CVE-2024-13145,0,0,d619d4a0aac8850d0c75f520a9103dfd5ad1c1ab851866f38b7082760726771a,2025-01-06T01:15:06.253000 +CVE-2024-13145,0,1,8f9d33e26ad78b43f2820c128d400944c11f810ee68c6fe46ad1e5eafbee4338,2025-01-06T01:15:06.253000 CVE-2024-1315,0,0,8cb70de4b1449c82043b2652cd95d6eb6d48aeb35344f66e409dc981ea33e526,2025-01-17T17:30:38.363000 CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000 CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000 -CVE-2024-13156,0,0,41775375a80c93fa0950178962cf86cfd1e2c8b60f46eda85c616b6213d4e16e,2025-01-14T09:15:20.910000 -CVE-2024-13158,0,0,0feb0e8c4a02508699719d1a2656fcb18788ec9d8ed4b987b938ba54ef1c7626,2025-01-14T18:15:26.020000 -CVE-2024-13159,0,0,ca590d7226d5fbc58bac473e7ed1c549cbbecf46315f2d43caaea179a8191c64,2025-01-14T18:15:26.243000 +CVE-2024-13156,0,1,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000 +CVE-2024-13158,0,1,d921bcc53f0c4810cb7f77f962be3471977624bd876c8c3eed3db3c6a249539e,2025-01-14T18:15:26.020000 +CVE-2024-13159,0,1,c033202b4593bc2aeff54caa4015bf5ab23afa6f19b09f8e11d36c54b7b445e5,2025-01-14T18:15:26.243000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 -CVE-2024-13160,0,0,902f68db99fb1f1b493c1b3050aa88ce820fece31a0fe51cd657b1e354a1eeed,2025-01-14T18:15:26.447000 -CVE-2024-13161,0,0,dd914d507d8b6294170a7aabb8f95388ef31ee14bca7b2dbf75086a4ce774292,2025-01-14T18:15:26.640000 -CVE-2024-13162,0,0,531aef0714f7a696440ade0f76b431bcf880a49a6e32a8376f52c8d16c18a364,2025-01-14T18:15:26.840000 -CVE-2024-13163,0,0,9507f78ee000327c02b1c2c6a8524c38f1eacaf4523f8d9fb4fec1bda5dfcc55,2025-01-14T18:15:27.033000 -CVE-2024-13164,0,0,4179228337c24174d03bf1b7802e31b1a18b0508c7925a8d69d0b09be919a7b9,2025-01-14T18:15:27.257000 -CVE-2024-13165,0,0,252373dbe839d3f87a29c1bcd8b45d86c5d0acf5d73939080cb3e5a2e365a9d5,2025-01-14T18:15:27.430000 -CVE-2024-13166,0,0,7fb4dec63a1c985efa5425eba0bcef7e6ca8d79eb3ac20db106c72d4c0d26d43,2025-01-14T18:15:27.620000 -CVE-2024-13167,0,0,1ed7532967268e38dc21435d960dc74d83e51f2a1a2035b83f82ad1178369a8d,2025-01-14T18:15:27.850000 -CVE-2024-13168,0,0,19ac26761f8dcbdf41c99ff5696a9a711eefc1e501979d74322f08e1ca262612,2025-01-14T18:15:28.317000 -CVE-2024-13169,0,0,59eeb8f71584a910696b4d5d0f6e2b068fb0636b88a3bb031d25afca90a0c16e,2025-01-14T18:15:28.557000 +CVE-2024-13160,0,1,4165258187f1f52b1cdd01e8c16505325245355956c4bc93301c57c0edd1efa0,2025-01-14T18:15:26.447000 +CVE-2024-13161,0,1,7b284408b3ba2c6eeb3cc90d8573955561b6b9b70515433d29dfd816aa6b7e79,2025-01-14T18:15:26.640000 +CVE-2024-13162,0,1,da666b41a7d98c9e3b9af1e27b198252acb00cdb0ecec4980b750fd64eed2fe4,2025-01-14T18:15:26.840000 +CVE-2024-13163,0,1,bfd7b222341b4eeb132c53cc185879949445b8743e8f9a1b980d00c942a7fc15,2025-01-14T18:15:27.033000 +CVE-2024-13164,0,1,5e00467d585bd74d24cb5c4fbdec02b53f0efb7f0a08f8e18116c4133fca3a2a,2025-01-14T18:15:27.257000 +CVE-2024-13165,0,1,37bbfca37a030ee5a60f9c18c2b149100cfca55a2fa6eca764186256ce2b5a7f,2025-01-14T18:15:27.430000 +CVE-2024-13166,0,1,8632e73de4e2fa9ca707280ff2448f82a26ece09b099b2f645b327b36991f572,2025-01-14T18:15:27.620000 +CVE-2024-13167,0,1,718e44f2de408194c130b822c9d7c5a33cff4547c54fd6387fb48f152c212a5e,2025-01-14T18:15:27.850000 +CVE-2024-13168,0,1,4345e7ae110203a9f429492b0a7d8d20013266624694e9ff3d6df94083684da0,2025-01-14T18:15:28.317000 +CVE-2024-13169,0,1,9c404f2f8fe69d92647d0d3bd953517c51062d766445a57007c563fbb58400d9,2025-01-14T18:15:28.557000 CVE-2024-1317,0,0,46323fe1da940bd13276c7c0326eb43d027e4f8b59610bf799203cd66f429443,2024-12-31T16:57:11.080000 -CVE-2024-13170,0,0,44ea4fa66b621026ee0bf2f46f2618d9df3bab17d6438801f3dab12c8ab63f1a,2025-01-14T18:15:28.733000 -CVE-2024-13171,0,0,0ba8c2402e2510e67ba58ef76abab96d5f3c620bdd17ca77337ec2fd48174a53,2025-01-14T18:15:28.913000 -CVE-2024-13172,0,0,361d384b83cc13d8a8b2f334ce45f9bd84bdc94fa1e6afd81d6d3a37452561ab,2025-01-14T18:15:29.110000 +CVE-2024-13170,0,1,64bb0fa3762d809dad101b4ba885fcca0dd1d305c82c02d70bc824e02b59a2dd,2025-01-14T18:15:28.733000 +CVE-2024-13171,0,1,699657c265d040f82de898618a447265bb42e4c5f15629b32474eb0a58331d80,2025-01-14T18:15:28.913000 +CVE-2024-13172,0,1,4be3076bfc8edd49ff4de334b04e8f62cacb071216b0af58069e07996765e5eb,2025-01-14T18:15:29.110000 CVE-2024-13173,0,0,052d5e11a0e6d41f18ffe50cc98d7e8fa992f332fedcf8acc482d2ed982cfbb4,2025-01-08T15:15:16.577000 CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f25f,2025-01-16T21:01:38.177000 CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 @@ -245901,7 +245901,7 @@ CVE-2024-13210,0,0,127e3de5b01fd275f14befb3eb9083d2caebd6f189a1117ba2466bb322bd3 CVE-2024-13211,0,0,ce07bd4dec4e71ee51c53bd7e26b1aa6c9e58b64ba82b1ae528c62444e9a6f63,2025-01-09T04:15:12.077000 CVE-2024-13212,0,0,5d3d9340b90adc02a73b2a397cbc7b9a824f5e41958bbb77ca0e0a733f439b87,2025-01-09T04:15:12.277000 CVE-2024-13213,0,0,3077bf102e80b6ad26d9de82b06cecbfeedc1b0a01c454e5ec2b3b19555a517b,2025-01-09T04:15:12.453000 -CVE-2024-13215,0,0,2cf6f0084be0a9fe5a33e4045196786b0da0bee172b3bed5b1fc1d9fb2e98dd5,2025-01-15T13:15:09.263000 +CVE-2024-13215,0,1,957a3cc32f27352db121dacda6bb51f9c346e02354a0696938a701fe4f0483cd,2025-01-15T13:15:09.263000 CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13237,0,0,757f6068109954aeb708ce365b1ff5e5adf5204baad7d55d37a565a85d7816ad,2025-01-09T21:15:24.977000 @@ -245987,52 +245987,52 @@ CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000 CVE-2024-13312,0,0,1596f306a61a66773ca721f46a9f359accd6e8bc761ac287ef2d071eacd93640,2025-01-09T21:15:29.077000 CVE-2024-13317,0,0,eb3492561747721a0d7f4fa0b869fb0f375e7101ac215917441dbc77811ea0df,2025-01-18T07:15:08.290000 -CVE-2024-13318,0,0,bd9b3dd8797a6a8e50fbc0881ed502b3d6c9d2df54bdf8f89c7bd4c9f15cb658,2025-01-10T12:15:24.257000 +CVE-2024-13318,0,1,e578de8b4719417613441e3d599820c7f899466a7f87935725f122dcda9b3d95,2025-01-10T12:15:24.257000 CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000 -CVE-2024-13323,0,0,b6dbf1bc72030da4865adfe9c77484b3543649561b1053256d05d5821de18e27,2025-01-14T06:15:15.480000 +CVE-2024-13323,0,1,efd40c86d011875eb32911cd9900428905ab90bbe91720def3e774b362e547ea,2025-01-14T06:15:15.480000 CVE-2024-13324,0,0,e28b727b7b2e4ff67b104bb8829ddea65c155869cb67c2e17008296310ed866b,2025-01-13T21:15:12.053000 CVE-2024-1333,0,0,7e67218d34e52c77cd12091eb7bec4820751f8a3faacd15e7977a33b9d658d65,2024-11-21T08:50:21.337000 -CVE-2024-13333,0,0,5024b12d257aab8504538b949b217150782732165be928abef8da4f4ddd8dff2,2025-01-17T06:15:15.663000 -CVE-2024-13334,0,0,30c432abb97d04ee92181b3fbe024f7609d999db2107b6b42ffcc6057b3cdf66,2025-01-15T04:15:19.720000 +CVE-2024-13333,0,1,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000 +CVE-2024-13334,0,1,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000 CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 -CVE-2024-13348,0,0,28a0ee7b4191c68c40fabdc5ca96e1c7f939c87fdb38db21e8b32e455395118b,2025-01-14T04:15:09.200000 +CVE-2024-13348,0,1,e26381eb03e5e67f555cf928c3e9a2305c99dcf3e03e09bd50c1f054f780346b,2025-01-14T04:15:09.200000 CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000 -CVE-2024-13351,0,0,82f0f1a80f8f2950e9c84e7abdd61c165fb4e8543af42fe1c6d847744006626a,2025-01-15T10:15:07.993000 -CVE-2024-13355,0,0,a8ca28e00f9b89c07eec0e25ac16094e44f167607aaa2b464e1b01d07777823a,2025-01-16T10:15:08.750000 +CVE-2024-13351,0,1,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000 +CVE-2024-13355,0,1,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 -CVE-2024-13366,0,0,52930bc7cd2e8d5261f84160d83c017e0f7cbd584fe7086fcaa9f5020fdc367b,2025-01-17T07:15:26.947000 -CVE-2024-13367,0,0,7b3c9fe6b6a75095c7bf0b4220858dcbb9d598d40e7d68274474817fb746d22b,2025-01-17T07:15:27.123000 +CVE-2024-13366,0,1,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 +CVE-2024-13367,0,1,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 CVE-2024-13375,0,0,c87e38b9c0de54c689e8a67a37a12ee2fddbf06e66e4541022feb46d13a56b8a,2025-01-18T09:15:07.120000 -CVE-2024-13377,0,0,d2e5e5b6c9d72523b231e2a995e42c2db86bf26fcce0b464f64d583457d9feaf,2025-01-17T10:15:07.240000 -CVE-2024-13378,0,0,d33d502ff2fbbc3f8d0f87c3c71df788e9b8939d004587a73c5e70f72d603643,2025-01-17T10:15:07.457000 +CVE-2024-13377,0,1,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000 +CVE-2024-13378,0,1,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000 CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462f8,2024-12-31T16:51:41.113000 CVE-2024-13385,0,0,6f29c8cca86431254e1ca86d9c73dbeef35ebe61a664c2905fda6bccefc454b8,2025-01-18T07:15:08.463000 -CVE-2024-13386,0,0,33296b5ae68cf2b5e3d42fc886f9e8ca0ae875dfd7724d3675314a55698f5a38,2025-01-17T07:15:27.300000 -CVE-2024-13387,0,0,6dc34c1690f397ff8c8c3331579d380bce906690020b30857f4fdc2d82342f2f,2025-01-16T10:15:09.103000 +CVE-2024-13386,0,1,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000 +CVE-2024-13387,0,1,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000 CVE-2024-1339,0,0,a64c4c68c8a9a926adb37b05ad26ad3fdfdc4a14ba534fc12b29b0c3bcb239b6,2024-12-31T16:52:24.407000 CVE-2024-13391,0,0,e7acab54105bf4f38620685dee0bbab545cf1b4e9861fb1671386ed9297e5404,2025-01-18T07:15:08.637000 CVE-2024-13392,0,0,1560437f9cf945c5be390892a52113808014e082874bd0da969623c97d9eff53,2025-01-18T08:15:24.327000 CVE-2024-13393,0,0,a93037e85f094eb3a9df95f7bbdb2b755a92afcfb1bc7976d270f6c0ef2b780d,2025-01-18T07:15:08.810000 -CVE-2024-13394,0,0,b6fcea27182fbefcf0642745a1f133fbfca8eb302a1dddd2465056b203356454,2025-01-15T06:15:16.150000 -CVE-2024-13398,0,0,afa7226aa36d2342cdb8d1a80328718fbb9eaa4907248797313456fb74721e56,2025-01-17T05:15:08.613000 +CVE-2024-13394,0,1,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000 +CVE-2024-13398,0,1,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000 CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000 -CVE-2024-13401,0,0,f754cbd15da36955b29dc5ce5207f7954441bed0a94266e365beadbad26fe8c7,2025-01-17T05:15:09.077000 +CVE-2024-13401,0,1,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 -CVE-2024-1343,0,0,419883927ae3b083384516246fa6e1f74b7f4f2e309a0068972246a296f53ead,2024-11-21T08:50:22.433000 +CVE-2024-1343,0,1,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000 CVE-2024-13432,0,0,7d75f67ac18cf32d5dc44570eb7cf156c877d943529d3637d5b0bb399b86a599,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,b744d44080e2e33c41984f231e71d8cc1252181c511f568444c5c86671c3eb05,2025-01-18T07:15:09.160000 -CVE-2024-13434,0,0,06f5e53ce83d8ab46e394913c5ab424798bc131d3e7a4d2c9991445259740085,2025-01-17T05:15:09.290000 -CVE-2024-1344,0,0,597c0cc8c6eb641f90ae3a9870d3e75470a230889fbaee8e504503cb0f59d32c,2024-11-21T08:50:22.543000 -CVE-2024-1345,0,0,0c76ed0a957ae2e29015c6df7057e5c17f3081f7b68ed33d0e7f09f33dcdc4ff,2024-11-21T08:50:22.667000 -CVE-2024-1346,0,0,303f14c2019e4c9714a03c35023cb78da79f82df77a269203b1411390b024a24,2024-11-21T08:50:22.793000 +CVE-2024-13434,0,1,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 +CVE-2024-1344,0,1,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 +CVE-2024-1345,0,1,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000 +CVE-2024-1346,0,1,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 -CVE-2024-13502,0,0,e35d372750cc88cf9cffae844c3d280bfcd57c36093969e074e189ae9463f58a,2025-01-17T14:15:31.147000 -CVE-2024-13503,0,0,7576f806eda86dcd6b291425bfcddf3d4f266c37af3d5042d8bdb800498b7aa7,2025-01-17T14:15:31.317000 +CVE-2024-13502,0,1,ac2a41b6cd26a4157041ef83a41fb1ca5fe4741530d1e5a7cb1a80b922fa6ce0,2025-01-17T14:15:31.147000 +CVE-2024-13503,0,1,9a18f887782bddd42cf8f60b9b9da1ba6181ce424bb49fdf69f585a65e64cdd7,2025-01-17T14:15:31.317000 CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000 CVE-2024-13515,0,0,9c375e4239ee12fbc562375c345cfda5a849d6fb2775b7f77148bc29db2bffc1,2025-01-18T06:15:26.410000 CVE-2024-13516,0,0,eba414603b972f65f10f7cf853b9c9e3b40669e2a413f223b52ac5eaf1fb3274,2025-01-18T06:15:27.627000 @@ -246068,7 +246068,7 @@ CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b8 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 CVE-2024-1380,0,0,5e58429e812779e5b01ebfe83f389083ec54823fd1aa2e429e923f21c4d1de2d,2024-11-21T08:50:27.317000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 -CVE-2024-1382,0,0,5960b15122411338d7261bd78d1cfd36f0bf78c12a33071695b4d732da9bd9d4,2024-11-21T08:50:27.593000 +CVE-2024-1382,0,1,33743aae5080009e67c02e5104e3369d341cdd21b7a5e7e6f86f0c0a62cfd10a,2024-11-21T08:50:27.593000 CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1cc,2024-11-21T08:50:27.733000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 @@ -246083,10 +246083,10 @@ CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000 CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000 CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000 -CVE-2024-1397,0,0,6dfc492b14f18bd41854a790c8b2baa4090eb6fa79ecf65279e3d0311e1386ed,2024-11-21T08:50:29.823000 +CVE-2024-1397,0,1,af37b22741b42c954ae00d3ead16e6f842ac343d14b5596867caada2abbbaeef,2024-11-21T08:50:29.823000 CVE-2024-1398,0,0,7f10f6a1be1871472979dfa3e08ce990ab03c4b0b1b77b6b442adf652486984a,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 -CVE-2024-1400,0,0,c9a2701093faf1480ccd8e9b39b916b3ce25675fb9e0932edae647fb408178b2,2024-11-21T08:50:30.200000 +CVE-2024-1400,0,1,0b9f577a46a1a3fcd46ea85e11e275ccee345bc2c1e6b2f734cc9454a636beb2,2024-11-21T08:50:30.200000 CVE-2024-1401,0,0,aacd439a69914554cbcd89a76778f88178b8f02575b95bb844c89b14ab015b63,2024-11-21T08:50:30.317000 CVE-2024-1402,0,0,c16a2bb5e28338a9b7a8e909fd1180bd46f3314048e1fd4a395f2a2357ace438,2024-11-21T08:50:30.447000 CVE-2024-1403,0,0,1223a155bc2b0b18ea1cc50606869346a4a36515ddf5edc887de58b206c628c6,2024-11-21T08:50:30.643000 @@ -246099,23 +246099,23 @@ CVE-2024-1409,0,0,7962f407df3c3ae50439b2eca79b45057e814b108e0e2b019b6d191d899338 CVE-2024-1410,0,0,5e6f7cca224df908329417aec1336b7ff4ef9e141a0c106289cba50bfd976a14,2024-11-21T08:50:31.643000 CVE-2024-1411,0,0,1a3f3817141b708692776a1cc4fd5069ccf1e40fdb5dcd96fc448a68f63f24d6,2025-01-15T18:41:08.613000 CVE-2024-1412,0,0,488aaea4090fd0bfbd6439d19bc44e277648de8ce1e7b471395f315b7b1d9749,2024-11-21T08:50:31.930000 -CVE-2024-1413,0,0,c64e3388d47b8c2054b600040f62c6fe2a89043f752eb146d13f9d8d6058f8df,2024-11-21T08:50:32.080000 -CVE-2024-1414,0,0,927457b22588fcc937c91bf95f654970922ca0703529397ddf9bc7012135f490,2024-11-21T08:50:32.210000 +CVE-2024-1413,0,1,b623d556bbec42264ef043138e776c7d90f87c26e80da7db9473f0a4c76ce89b,2024-11-21T08:50:32.080000 +CVE-2024-1414,0,1,0b464a7a884be744b6e28bb40b7df1056b85218e62ce2d568fb777444fbfebfd,2024-11-21T08:50:32.210000 CVE-2024-1415,0,0,c14b0840efea8f222abfc94f2ec3b47ebc1c7f10e81408ec1d19d42586f2f55a,2024-11-21T08:50:32.330000 CVE-2024-1416,0,0,1f6256aadfbb3fb6d3f83dc5062b04bb636d70f017b2f2dff3679e0bc331a44a,2024-11-21T08:50:32.460000 CVE-2024-1417,0,0,80c71b6f5eccf4d89c847cf92ad69321e88152cd31952527e9649572b5abaf45,2024-11-21T08:50:32.593000 CVE-2024-1418,0,0,22561da6c61f825effad6710d5e038f72164164027714334fbeb98ec73fee765,2024-11-21T08:50:32.733000 -CVE-2024-1419,0,0,42ab1fc2d6ab9ca492a38fb437634f1d4cac86970a1dc12ed30b178360f9c764,2024-11-21T08:50:32.870000 +CVE-2024-1419,0,1,c806b39ab52f2cac617215f7b4ca10d634b1f03d43de49a7264dd29eeccfba37,2024-11-21T08:50:32.870000 CVE-2024-1420,0,0,87cbde692a44b30138e5311554a8fe03ab6752ef419e674117c5a1abadbc52bd,2024-02-12T15:15:07.733000 -CVE-2024-1421,0,0,0e761ebddf75c548cf7dd6af07abf9548a53b36a5b8589a388f6af75094a73b3,2024-11-21T08:50:33.003000 +CVE-2024-1421,0,1,eef8b6fdfd25c4c0c8676af47f8465849c88f15c3078de98d816a2ea6042bc91,2024-11-21T08:50:33.003000 CVE-2024-1422,0,0,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000 CVE-2024-1423,0,0,cf9424b269ea30f1f1f93fb8aca6f7020e19a4ef0b7ad3a1dcf8f2e9317f1810,2024-02-27T15:15:07.460000 CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a41,2024-11-21T08:50:33.260000 CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000 -CVE-2024-1426,0,0,23b1a7306f53e67c5a563c9eb21d3cdb5365fa187ec8c954a68012e8a35c2dc8,2024-11-21T08:50:33.500000 +CVE-2024-1426,0,1,079033333cbf6c7918ca15c706cc8db9d468c64db35a475e9c4b74b35881a753,2024-11-21T08:50:33.500000 CVE-2024-1427,0,0,045d36306302d266d38f2f3182a2a05490c1c0ad4388299e4f45dc3722894b2a,2024-11-21T08:50:33.653000 CVE-2024-1428,0,0,7796e13a2999d1217a0322c4c01e6866cfb2671a8159abaf43ba19808bf938a3,2025-01-17T17:48:58.150000 -CVE-2024-1429,0,0,5058e99ef8f14eb515834ad0343e76a35ce86f45fd71d223b1d90d473652ec8f,2024-11-21T08:50:33.927000 +CVE-2024-1429,0,1,d15a7d88ab9a8685a69918496326e3b57939b7138782a4ef501b488e8d8b9ba2,2024-11-21T08:50:33.927000 CVE-2024-1430,0,0,3bc978d4dd692ba7ee4a7cc4d11c20fe662c755ea27eb731ad29addddec20cba,2024-11-21T08:50:34.050000 CVE-2024-1431,0,0,1230d8600678d12f7d6985eeb6243f7c0dc22668eba8d5138026b4c6a9e8e477,2024-11-21T08:50:34.230000 CVE-2024-1432,0,0,7035f463555ee4e0684bc896c4ea5cdcaa9577bdd0b576d53cf315b6b4fcec6c,2024-11-21T08:50:34.387000 @@ -246179,18 +246179,18 @@ CVE-2024-1492,0,0,1639bcc1c5a688973fe7c2ddc64c02acd6aaac9cda8a0ad97ec52db83771b7 CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219edefe,2024-11-21T08:50:42.043000 CVE-2024-1495,0,0,b3d42a19aa1a62facaef98e7f063ab8c0b4a92d4ea0b89ef5f606fcb4257510d,2024-11-21T08:50:42.197000 CVE-2024-1496,0,0,71a5c9ff961f70d5c4e2145e340948010a4486cd14c2a715cb1c9eaa56db410a,2024-11-21T08:50:42.343000 -CVE-2024-1497,0,0,135b57c143aea476a4b103b6a41508a0aa39f5d2197178fcea14053e7a1759c8,2024-11-21T08:50:42.460000 +CVE-2024-1497,0,1,08a428db2f6750309757151400d6ad51c92ffedd500922e052cda560c6be58d7,2024-11-21T08:50:42.460000 CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 -CVE-2024-1499,0,0,2fa895202673064cbd35a54445b99c9cb0cf65d5e0d54bc253de6d34157152db,2024-11-21T08:50:42.720000 +CVE-2024-1499,0,1,7df4b95e1444f58094768af6ce55b87678e17f33294196397452b4888d5d96fd,2024-11-21T08:50:42.720000 CVE-2024-1500,0,0,1a2689bd4dcc7fdb3935a898039d25a11719c226152d0787db6d49bd67e84aeb,2025-01-08T18:34:33.033000 CVE-2024-1501,0,0,7278cf3016d6e749f83586c857f319c6893ef852e37caa5b00a791eeb8409c93,2024-11-21T08:50:42.983000 CVE-2024-1502,0,0,fcde604d4a7c0628f2a9a4d7ccfeae5e30232d291f179882e82357fd13177d22,2025-01-15T18:34:26.217000 CVE-2024-1503,0,0,8c3bcd9ef9b0d9b8f113e054e66549c85a90cad3f39bd1c74980cc216201cbba,2025-01-15T18:35:32.333000 CVE-2024-1504,0,0,d581c9656f5131563cedb677e916eb2d390674aea901c47070200915ed1b024e,2024-11-21T08:50:43.387000 -CVE-2024-1505,0,0,1f5bce476861c3fd41baf5f0962bbbf5c85fbeb63ffd3e0d5a89be700845b36f,2024-11-21T08:50:43.523000 -CVE-2024-1506,0,0,cfaef76da624d09cf2ce420799d37ab9d157d8737e507b08d86edfab7cbc719c,2024-11-21T08:50:43.653000 -CVE-2024-1507,0,0,b442cc7027613cdaf88f2abd5fa3484f988fd6301d680f4dda4a2b1c9d2671e6,2024-11-21T08:50:43.787000 -CVE-2024-1508,0,0,7d5a8f9b21d3cbed56499fe8af26db3f07d342dad25b4c46d2468afcf9c84853,2024-11-21T08:50:43.913000 +CVE-2024-1505,0,1,6de1530615b675a4232d1b732952c18c453e2b88530d4f885ad10a2fc31a25e4,2024-11-21T08:50:43.523000 +CVE-2024-1506,0,1,eca0cd74beb0b6d79adf8092a46c94459f729e2d8952b8258bf42df6f58b85fa,2024-11-21T08:50:43.653000 +CVE-2024-1507,0,1,58280acecfaf6abde7f3984e88846aacb711fa8998a0b0068ba6d0e4cd473998,2024-11-21T08:50:43.787000 +CVE-2024-1508,0,1,d3999accfc240fdf5a2cfa846c0937553900d4f8e9704a595255bb673641fd37,2024-11-21T08:50:43.913000 CVE-2024-1510,0,0,c76f27d463e131a290976dcdb39e753c0c1cc63cd998480dfc45ef7b6e61c01e,2024-11-21T08:50:44.030000 CVE-2024-1511,0,0,b11b362f2acbc196f43a92e45bae6b3316a9a34999d9162dab309d4eea0f751a,2024-11-21T08:50:44.160000 CVE-2024-1512,0,0,26a89e8ea4daeb69acb8ef0a5290d443e1fbb4f0997b4751a3c4b63986c14001,2024-12-18T17:23:15.360000 @@ -246211,7 +246211,7 @@ CVE-2024-1530,0,0,6b47ef22b9563339a8c0982f48b2284d09098c01f6b8b9428ca17e515d99e3 CVE-2024-1531,0,0,fb6a0433f239352c6074b626cd9141033859ba994a20b397e07d13189196c495,2024-11-21T08:50:46.133000 CVE-2024-1532,0,0,e80e81902d6512b170ef25fc1c0b7197df19d6d6709ea2ea911faf11cd36952d,2024-11-21T08:50:46.270000 CVE-2024-1533,0,0,672ff40ebd2d9061fbc3bbc9de7d5e8e4d35c5769bab92790afed3ed40e3dc7d,2024-11-21T08:50:46.400000 -CVE-2024-1534,0,0,2e9320299e2180ef1d7e929914dab933cb3e85ea5d4a83efd84ab898f262cf69,2024-11-21T08:50:46.520000 +CVE-2024-1534,0,1,ba9ccf7a982bf7fd624dd113b3434bf5249d741f2728298cb142cb56e99331cd,2024-11-21T08:50:46.520000 CVE-2024-1535,0,0,927dc46177fcf2f0646a5365a296286366125eb861cfedb1145399176e63f500,2024-11-21T08:50:46.647000 CVE-2024-1536,0,0,c46b5077118b6287104aa95a7ed0934321fcad65589140f40d58f23e342e618e,2025-01-08T18:32:08.960000 CVE-2024-1537,0,0,56c08bfb4e8376533125db95254233cfd12a8a9f9def20e37b56b1cc354ee636,2025-01-08T19:09:15.633000 @@ -246250,7 +246250,7 @@ CVE-2024-1571,0,0,59f01ab78b4f7b0f9ac0a699e09826fef03bb32078a1a72f10d58201a8f77c CVE-2024-1572,0,0,a83548f030b810663477d0b6737646927187cff3fac85148113c7069e7392583,2024-11-21T08:50:51.713000 CVE-2024-1573,0,0,55326b48e714bd45f8a7f03a13179fac399e55741cedcbe359268a4ab07b26b6,2024-11-21T08:50:51.837000 CVE-2024-1574,0,0,4b773e15e20eaa265c844cea28d7f429a990bf0f316d61c1be91dcdcc753dad5,2024-11-21T08:50:51.953000 -CVE-2024-1575,0,0,dd89659ed6fd3e43de12baa5b5225311f44be19515c8a2a42a9aa1730c100ca8,2024-11-21T08:50:52.083000 +CVE-2024-1575,0,1,e17be18aa38707a1f7f5049358be292ae5c4c8b4b7b1b40a986a4f71c9ca603d,2024-11-21T08:50:52.083000 CVE-2024-1576,0,0,c1d68cb2b92dbaf973690c9a7b22d2558c647dd4d634038677ac030405ddd255,2024-11-21T08:50:52.210000 CVE-2024-1577,0,0,f1190dd090659696c3c065cc9b0ef534f3bd69cbaa6694420c1e88d656e27cbf,2024-11-21T08:50:52.380000 CVE-2024-1578,0,0,e6377a74619b7ca5b0d3b25fd1eeaaa0aa571f95ff00be163cf6abd495390b9f,2024-09-20T13:53:31.657000 @@ -246276,7 +246276,7 @@ CVE-2024-1599,0,0,105f658bdb5d4f55673b9a4a91d4766e7759683398ba430d2b081d80ef821d CVE-2024-1600,0,0,10ef0d97da1af05e4452c1d5b85c6b86d92a91f8e5aeffb132a19cd0ecdd104f,2024-11-21T08:50:55.133000 CVE-2024-1601,0,0,144a783d83759d1f22b634484b2bbef03f531a52b9217df0a5759fb08e47b78c,2024-11-21T08:50:55.263000 CVE-2024-1602,0,0,56ecc218dd37ad215a177db8079488241e64c43dc3bae7eec42fdf1bdb84777a,2024-11-21T08:50:55.387000 -CVE-2024-1603,0,0,7a0ee83b93030e663ad9cc4b8c4cdfb73189704e205928866e93d7818d9b9b1b,2024-11-21T08:50:55.507000 +CVE-2024-1603,0,1,46fcdb6371ceb421e4df395c252c5539adfadf7172ade240a8ef676f98c6758a,2024-11-21T08:50:55.507000 CVE-2024-1604,0,0,7ac9103a08c9e9dd04004b4e7466052243f63c72b367568e72784f5a0bc1202e,2024-11-21T08:50:55.637000 CVE-2024-1605,0,0,9d25139cf22609654ef8a455d8d21cdf06e67cf1e19359d09ce5b9576dd7793f,2024-11-21T08:50:55.790000 CVE-2024-1606,0,0,98f100f836fcdef4d873587f10566a7e89908cb420114440541bb054f23516db,2024-11-21T08:50:55.920000 @@ -246287,7 +246287,7 @@ CVE-2024-1618,0,0,f900010f21bb70b6581fb91ea7ff15d09cd9f4b411eb32fa913b01f49c3af6 CVE-2024-1619,0,0,27a596ddc3250c410382bc7e145fedcd4a2e3395b97151f21ca063be3207db40,2024-11-21T08:50:56.330000 CVE-2024-1621,0,0,212b3fca00d5946f120096ca5a7a0afc1b2cac9a26b845aa6388948724d52915,2024-09-17T14:12:41.620000 CVE-2024-1622,0,0,641704d79708c5027cc525cdcdef74d012d3f37e9becbffc2cb36bf8a804f978,2024-11-21T08:50:56.633000 -CVE-2024-1623,0,0,9237c655c57b57297f9d4e4236790c55b53a9289ac0a8c9d29baec29f36f1ab5,2024-11-21T08:50:56.787000 +CVE-2024-1623,0,1,dca28a48759cb582de4b6de347c902170700f3b3a827148d5f4d5c17276d5d2e,2024-11-21T08:50:56.787000 CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000 CVE-2024-1625,0,0,a3c7b4228295e9fdc1f0f0703e1d7098f9618bfe3ecc3707e6c876bbb21a68f5,2025-01-08T18:58:39.100000 CVE-2024-1626,0,0,8db5e9a7288598c466eba03561bceefa6719998255d5bf571d808455a162f36c,2025-01-10T14:32:09.173000 @@ -246296,7 +246296,7 @@ CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4 CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000 CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4e7,2024-11-21T08:50:57.763000 CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000 -CVE-2024-1633,0,0,5ccb225bfb0a399abe7a70f1c6fd18da8846101e09ec9f5e0957953da34a4559,2024-11-21T08:50:58.023000 +CVE-2024-1633,0,1,c0d1468328b03eafc1bc559a050329dada5554f7d68db0c5b4e0ecac8483aff3,2024-11-21T08:50:58.023000 CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000 CVE-2024-1635,0,0,720ee7466ccef3685a076ad1a7c9e622aa00228f478532297557f856d0d14af9,2024-11-21T08:50:58.290000 CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 @@ -246308,7 +246308,7 @@ CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38 CVE-2024-1642,0,0,212f14be7d8459e9a508bd3a70180152c6bcf203731c8036b94fea507b9fac7b,2024-11-21T08:50:59.280000 CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000 CVE-2024-1644,0,0,2a0c9bedb7077c42744b0cff4622252c578909ba72cfa38faa02c26586371ff9,2024-12-31T14:30:42.993000 -CVE-2024-1645,0,0,fc2db15dc582e529d4e2d85af443e9dede47328e7ae86a8af4f691034414bd50,2024-11-21T08:50:59.670000 +CVE-2024-1645,0,1,5e4605f086f2220e2dabe6acc3c3494207bd90d1c2aa9cac24c62b5bf00d411d,2024-11-21T08:50:59.670000 CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000 CVE-2024-1647,0,0,61673824377e23ed6345f1ce2d3e2dfdab70aa35a8f57fa1b19d6f80febcb2a6,2024-11-21T08:50:59.913000 CVE-2024-1648,0,0,2b4f9a5bdbbf930dc831a0e6d825e26f3a96b82a0b421ea9c358197a954b7d5c,2024-11-21T08:51:00.050000 @@ -246373,14 +246373,14 @@ CVE-2024-1709,0,0,bdcbefcd2cea797f900bb3e17e86543061d7717b5594f55f1f46cac7942030 CVE-2024-1710,0,0,1e40e71747a8b12de39d769c827824fe24840a5de6160030b181cc2a6ca82e52,2024-11-21T08:51:08.487000 CVE-2024-1711,0,0,c4463fec9e05b1118ee1bfddd76265d4a13e64e908000c805957c19574204370,2024-11-21T08:51:08.610000 CVE-2024-1712,0,0,bdb3e0c816aad12a5ffb83e96d47614474081689b77384ea123451ea94b467f7,2024-11-25T21:15:12.783000 -CVE-2024-1713,0,0,3207d4cc77e76048e2f00cb12d2330e2dfa968f2dbd8cb94fb7756b2dc4c6b92,2024-11-21T08:51:08.840000 +CVE-2024-1713,0,1,ba77e52ac2f6b9f0f138c320a87b82b3f6d7f9a991ea724ac962db87c131fd08,2024-11-21T08:51:08.840000 CVE-2024-1714,0,0,b234b1c111e954137cd5c21e719e75973e2b1876898036fcaf67defabe0a2443,2024-12-18T18:15:07.087000 CVE-2024-1715,0,0,a39c7238a47641a1559a03eccfc580fec09edf9e40fae3465f0a89c38d32e634,2024-08-02T15:16:31.550000 CVE-2024-1716,0,0,9071d172382b58d2d56e01c889ae6e33397cfcf61eae965493f6ee5942820f8b,2024-11-21T08:51:09.123000 CVE-2024-1717,0,0,c3adb19f25e9ee450a585b7bb91ab43887106c17932e8cf3f974c96db2950633,2024-11-21T08:51:09.260000 CVE-2024-1718,0,0,70746d52697ce738d10ef4d93f461374c829b5e4c0cdb84c66e02ad290238127,2024-11-21T08:51:09.383000 CVE-2024-1719,0,0,73bf9f1a16f7575e2471aa27820d10e8604b848eb3d389879ede5bf7e1298e40,2024-11-21T08:51:09.497000 -CVE-2024-1720,0,0,200c99ea2f443238d722e08de4d53a3d6499996ccafd39ab9d03e0b714c0ce0b,2024-11-21T08:51:09.613000 +CVE-2024-1720,0,1,fa8ba8d5ed8e9661edbdb1c161dfe43c80b103ac9b90d55977e2e4a7e37b0658,2024-11-21T08:51:09.613000 CVE-2024-1721,0,0,5992d34ee3d1107fd80c63bbec0b1ac913a676e5242bf5be6bf42da226e0e2b8,2024-11-21T08:51:09.737000 CVE-2024-1722,0,0,62639d7c28f7763733142b00483f0341a98aa36ed70562990c6b1c5ac542c742,2024-11-21T08:51:09.870000 CVE-2024-1723,0,0,11d3a45a60abd75514c9d5b662d454bbccfffc4644e8e6300f550c3165594abc,2024-11-21T08:51:09.993000 @@ -246419,7 +246419,7 @@ CVE-2024-1756,0,0,a55105396c0a5cfd03125dbd5666bd370a097913a79fb44905b745cf43bd33 CVE-2024-1758,0,0,313830f6e19da3cc97c553441ff7c3a8cfd29a19025908c7843ff9adbf04db2d,2024-11-21T08:51:14.920000 CVE-2024-1759,0,0,614d1507146f28d12a0973d6adebe08ab063cf89cb20e4d985e3b2bf348ea399,2024-11-21T08:51:15.043000 CVE-2024-1760,0,0,57b4d1e1cac8d2ede1adc8be04932790a30f8211ed8d80524500e2452561d651,2024-11-21T08:51:15.167000 -CVE-2024-1761,0,0,9b7b3e072f672e785d4a310336bba5019336cdeb66afc0f01f8f04f2e021ce96,2024-11-21T08:51:15.300000 +CVE-2024-1761,0,1,bb10a5bbe0fa213e7088d1347a631cc377e14eac5d87fc6db26619d02193b954,2024-11-21T08:51:15.300000 CVE-2024-1762,0,0,3be22d9a9c6b76a2491e99335b6950ddb3cfa7de8323a0bacf5e471294a0e4a9,2024-11-21T08:51:15.427000 CVE-2024-1763,0,0,0873c590a96444d43b11806402d682be1946102f5b2ded8fa8fc5912f1ad2df6,2024-11-21T08:51:15.553000 CVE-2024-1764,0,0,9af00bc3a2cdec19cf0cc3ce6677a0f4b515b26edef4b60b7c6a5e9330153847,2024-12-04T16:15:24.527000 @@ -246431,7 +246431,7 @@ CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa5 CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000 CVE-2024-1771,0,0,dfc64cd2d5902446d25294ce0163ab293276e26453b42c802ea6af4493302727,2024-11-21T08:51:16.577000 CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000 -CVE-2024-1773,0,0,cf04e4c0c1e4bfcf1aa2d828b9bc8d0c39a72216a49df579bdba39c0486b0fcb,2024-11-21T08:51:16.823000 +CVE-2024-1773,0,1,f2a7614b8428d916106ba75a7e55b0e0986d98e6f9af491856771993ea5bdd08,2024-11-21T08:51:16.823000 CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000 CVE-2024-1775,0,0,b8c203919e47126bb6c2af66dc4bbb6f7b785958b0e56ffc05a0a4a6fa9fb683,2025-01-16T18:39:46.423000 CVE-2024-1776,0,0,8f687e2a9e9f6a8a4412858b8c915f4a1820886d213022ced72ddabc13336d9f,2025-01-16T14:34:59.577000 @@ -246453,8 +246453,8 @@ CVE-2024-1791,0,0,790165eac04c41eeaada5a69f38b45865b25fcff13de4477996f4823948e4d CVE-2024-1792,0,0,5c91c39087a11a285932b6df2f786b9ee27b789c298d617daf628ee7a5671929,2024-11-21T08:51:19.200000 CVE-2024-1793,0,0,1247321dd371ac163a2d163c7822069c7d100252b9c561f2f44a64adcc334d96,2024-11-21T08:51:20.010000 CVE-2024-1794,0,0,b3bce13e5e72512825dea4730d8610342582e06364292c38517814bfe4af86ea,2024-11-21T08:51:20.133000 -CVE-2024-1795,0,0,5e14764cbab988c7d54b6523f160fba4d67385bbe71ed1960a9269f2c0c559d5,2024-11-21T08:51:20.257000 -CVE-2024-1796,0,0,4f640317e0b20db68247964837e1e23fa544a659be70e600c828d7e9cf517ce6,2024-11-21T08:51:20.390000 +CVE-2024-1795,0,1,b6b5e8a38ff75be7c410384457eb38471a7b15560791f4b36953867799ca8b52,2024-11-21T08:51:20.257000 +CVE-2024-1796,0,1,68e9ddfacf3afc0af79bfa53830daae380aee08e50d59d0729da4a8eb41d2478,2024-11-21T08:51:20.390000 CVE-2024-1797,0,0,183002d6382a038d76709953f57646b35469fe82c13c2541a9bb1173360c659e,2024-11-21T08:51:20.520000 CVE-2024-1798,0,0,b61f537a4a5f0f1ad767fda3f9e18af7ae4f05fe2e34299e4b65a55d2e6cec08,2024-11-21T08:51:20.647000 CVE-2024-1799,0,0,4fe6b469e0dfdfa7580497300a6e88df3efeb98aee5b6039e938180c097fa959,2024-11-21T08:51:20.813000 @@ -246536,9 +246536,9 @@ CVE-2024-1878,0,0,353b81ebf07ae56885c8cfbb63f947f3e8787ea44a7bd7e044cd52266e8ea5 CVE-2024-1879,0,0,dd12021a9f8da25add84232bb5abfb35084f5fdbd08fd74bc6fc7642ed4bffc0,2024-11-21T08:51:30.603000 CVE-2024-1880,0,0,84c70b0634d66b0745f8a533c021eadb920e5477328ad81ebcda666fcea1995d,2024-11-21T08:51:30.767000 CVE-2024-1881,0,0,2558a52b142d519b854f3883944e8ea95b305aa8f68977dfa1c288c02b89c85c,2024-11-21T08:51:30.913000 -CVE-2024-1882,0,0,257565217b8efc997d30d5dbeaf901495cc6f39546163d966abe1cec3062900e,2024-11-21T08:51:31.073000 -CVE-2024-1883,0,0,cbf94cb9a18bdfab0557588c444eacacae72f4bec53c788c2c126bb304034324,2024-11-21T08:51:31.210000 -CVE-2024-1884,0,0,ba189281f0643a3af8d0309293b1f351efa3a7ca0a7f9894ea0a8a510b424156,2024-11-21T08:51:31.347000 +CVE-2024-1882,0,1,e7bd160061303d8ecbb9dd4dba5eb82e683e54cc8729fff9c14bfce8aba81178,2024-11-21T08:51:31.073000 +CVE-2024-1883,0,1,90e667e95ff15162f9cc2ca4c5eafac94209fc01866b568e91fb5c2c06151be2,2024-11-21T08:51:31.210000 +CVE-2024-1884,0,1,ca0d36c1574180fd6130b0d2644a43df7abf85c1a612aca14f38231e52d46b9f,2024-11-21T08:51:31.347000 CVE-2024-1885,0,0,3b404c4d727f26b10689d0b87f5a5b801d5412d486ea1d87a5c30d68f6e37071,2024-11-21T08:51:31.503000 CVE-2024-1886,0,0,59411db0ce15bfc54901e0de750b51fe06e0b5421d72fc6b15b7ccd2c430d464,2024-11-21T08:51:31.620000 CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000 @@ -246639,7 +246639,7 @@ CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bc CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000 CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000 CVE-2024-1990,0,0,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000 -CVE-2024-1991,0,0,3f483f3ae7b7a904e68a16f960d0742fa77cd9a15dddb9bd88a60a002c10365a,2024-11-21T08:51:45.033000 +CVE-2024-1991,0,1,d5a6bde57be3916ed448846397b8321aa2019f60be0508a767d23c59db90aa0e,2024-11-21T08:51:45.033000 CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000 CVE-2024-1993,0,0,010d59aa4d31f8f60f42634d27cfbdf469d8f3f88be31616056c1b25e622a672,2024-11-21T08:51:45.183000 CVE-2024-1994,0,0,2799a8fba4da98163d1c8a4201d87bd63ba559669844539136acb52787911a32,2024-11-21T08:51:45.320000 @@ -246813,8 +246813,8 @@ CVE-2024-2017,0,0,236856e0dda8caa97c3fd2d0292540757fbfb28961569fc651286f391f5350 CVE-2024-2018,0,0,6e829569b26c1c6d9562c5c1edf6c63df592bace683bac56acb5cd3f3ac34712,2024-11-21T09:08:49.413000 CVE-2024-2019,0,0,838bd4485ad5c858f99416908e61782fd439f4782ddb8c158812011fa93ac13a,2024-11-21T09:08:49.540000 CVE-2024-2020,0,0,03c4659935ca94706cf163b7f719d08734fa762e37b2723ba48cb2097c9fa8a5,2024-11-21T09:08:49.667000 -CVE-2024-2021,0,0,b3af6a646981e9cfedd4873203086981db462e81f872bee867e0c312cae91979,2024-11-21T09:08:49.797000 -CVE-2024-2022,0,0,8830f8cb6abd87cfae89e528d760e697980612e309cf4af40e455b04c8b0fd30,2024-11-21T09:08:50 +CVE-2024-2021,0,1,f010408aa31667e28f3278659ebe4ea2a0a080c954b87f89068ea4bc561bbaa0,2024-11-21T09:08:49.797000 +CVE-2024-2022,0,1,5ec5b9ac5a06878073b24d02184411419fc427dd05ab30131017bb68ff99a255,2024-11-21T09:08:50 CVE-2024-2023,0,0,af1bf29d0113799e098d2cfbf157a0bda24c0e5910a3b834edb94dde9be5adc1,2024-11-21T09:08:50.197000 CVE-2024-2024,0,0,a1997ce935dd2b9a070dcf5fc5501bcdbb4db0c1a6915c1fae085c47b5c17ba9,2024-11-21T09:08:51.093000 CVE-2024-2025,0,0,4527d6fe9f7317c9197027fa43877931eca8ed461c4640f9a80ab02c51e6dbbc,2024-11-21T09:08:51.250000 @@ -246849,7 +246849,7 @@ CVE-2024-20276,0,0,fd520ee9c607ad4cab0efc8eb5709ff0356aada291f7b58900eca53846809 CVE-2024-20277,0,0,46a78e522653cd955649b794111af340774f82756fc0d03b6ff63566f0189dcf,2024-11-21T08:52:12.613000 CVE-2024-20278,0,0,8b660944e3e7f763f6895dd5b056209ccd186fe1aaf66302ef18a3d0abf6d456,2024-11-21T08:52:12.753000 CVE-2024-20279,0,0,9257799187612238db15ad4f35a72f2477edac10c2e655a5c35bef4920b1f9c5,2024-08-29T13:25:27.537000 -CVE-2024-2028,0,0,722e75775690e86d4c46277b33a5634c6253cb4398f54cd94468134f9d6bad3a,2024-11-21T09:08:52.443000 +CVE-2024-2028,0,1,f0068c760376d28be210c4c91a6d96681fe370a7ce7091c7b28c0f6b8138b987,2024-11-21T09:08:52.443000 CVE-2024-20280,0,0,5176303c1878a01a7736c5cb8a031d0d69aaaad5e3d1e30256d21a72b6ae0dee,2024-10-31T15:35:23.060000 CVE-2024-20281,0,0,029d647f4939fa998f57e310fdb53f84a7700ff5432144daf5c0c1ff962b3b5d,2024-11-21T08:52:13.080000 CVE-2024-20282,0,0,945d0e46d7d55b449187635d4c31d8281b9f41451bf98ce8094836f568888a45,2024-11-21T08:52:13.210000 @@ -247554,7 +247554,7 @@ CVE-2024-21056,0,0,b3cd8883597d5b020b20843f644dd494e35df9dc3ebaf9876d8f8890e4200 CVE-2024-21057,0,0,9156a0c0270c19c6134ff85d4642bca9c805b497ad32521cb29e5544a82a8ffe,2024-11-21T08:53:42.223000 CVE-2024-21058,0,0,6f275eaeb7b9391d2cc7e42353c58a7a5acdfd132d12496c0283d23778c3ba70,2024-11-21T08:53:42.340000 CVE-2024-21059,0,0,2e4b985fb1eda134ddba7dcd5eb2b84cfd40dffcb15cbcb6abe71b19702d60e9,2024-12-06T16:35:57.460000 -CVE-2024-2106,0,0,73033a4de4ca3f773c4ff4b73dd1d649828a0b6c42db30e44e75de672c74ec29,2024-11-21T09:09:02.737000 +CVE-2024-2106,0,1,693c85d6ad15e405a68f7b48e4eb775f7b3eeb9aa6fb78e5f99610d8f206f34b,2024-11-21T09:09:02.737000 CVE-2024-21060,0,0,4a1542ff596ac21ee9085ac76156d1324f25ff69a30cf41672dcce3d1f0eb453,2024-11-21T08:53:42.650000 CVE-2024-21061,0,0,f9899adf77390444264fdf4f907cf9b1ef6f4c59209c2cae5dbc2d6f2e40d83c,2024-12-06T19:09:56.543000 CVE-2024-21062,0,0,e8e4aff4cbba9b2505617ece7d04df2ef473a57d19103abc49ccb9df455c06dd,2024-12-06T19:28:18.863000 @@ -247565,7 +247565,7 @@ CVE-2024-21066,0,0,5254867ca361c1df6197368693a80ccca6b7c988d9f5863427754676a4593 CVE-2024-21067,0,0,7e2edd873612105fa331df870f2f4f4ada069d86fe84a937d7710550c7267de2,2024-11-21T08:53:43.450000 CVE-2024-21068,0,0,22cb123e2b550308d0173e521466dd982631e5a97ed4a6d7bc6a3b636818cf7d,2024-12-06T19:22:57.927000 CVE-2024-21069,0,0,c9f01955133ee2d7d88ba224021b6a44140d5daf435c1f4f00ecf007d265c6fa,2024-12-06T19:04:31.867000 -CVE-2024-2107,0,0,382e8439265e427cd919028eb16032f86d53c3d2af1e55392890e2ed36444283,2024-11-21T09:09:02.850000 +CVE-2024-2107,0,1,dfe574120b4a46c67696f59bcdf68aa0e508d18a7345fecf6dd3726f78076db4,2024-11-21T09:09:02.850000 CVE-2024-21070,0,0,8c69e86f327387e344a4a157732398076b6e10c698da182731e3238f871e4c5d,2024-12-06T17:08:50.733000 CVE-2024-21071,0,0,ad9de5bdbf88b7ca7e98e8441723f697f87793b07a2985337f90fcea37bcfe55,2024-12-06T21:18:54.143000 CVE-2024-21072,0,0,3ac71ebde404278590ff522ceda3046ad4c8241198899f7a8f9724077bcc2ed1,2024-12-06T21:13:10.447000 @@ -247755,7 +247755,7 @@ CVE-2024-21255,0,0,add4c955b981a3076cea346ec3a18ea4e9f5e51e47b4b234e1b1f3ce17611 CVE-2024-21257,0,0,7feb6ca18f4c7ab0b40ef8d13e4835d8441b817ed51b4f20b125f44783b82b3f,2024-11-06T22:55:18.400000 CVE-2024-21258,0,0,19bbc464aa5d2fbb9ef1bdb1e9f31517c1bd3577455200e481e8fe34ec625df9,2024-11-06T22:56:19.527000 CVE-2024-21259,0,0,26a004b56ef6804b22fb308baea616e6bab2cb436eaf74d4037265c8604784d5,2025-01-07T21:16:14.797000 -CVE-2024-2126,0,0,e9479a9fb042176157f8223dce67ad410aa32310af0a1f3ceee175bce508ec4a,2024-11-21T09:09:05.117000 +CVE-2024-2126,0,1,ca8e4ba64abd15adbd173ba6c1bb1fdcfffd909013c46cc932a490aba795bdf1,2024-11-21T09:09:05.117000 CVE-2024-21260,0,0,d3876c08dbb0a88c0e2ef8ee94d63f41849715f9d921f55c480e0c8b1a0af1ff,2024-10-18T19:05:29.830000 CVE-2024-21261,0,0,2cab31e1a64c8464debb8734cc85ed8dbe5360082fe40024c1550d3766bf219b,2024-10-21T18:27:17.307000 CVE-2024-21262,0,0,455520c7e3ec171871030afccc4fabc994273834af188dd9ff5a227ab3360706,2024-10-21T16:28:16.427000 @@ -247796,7 +247796,7 @@ CVE-2024-21306,0,0,2a370a0aee5d92bbbe454d1fdf5ed058cd5c6c363a0e02cdc4a816823a09f CVE-2024-21307,0,0,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000 CVE-2024-21308,0,0,f6a379d41c4cd5133050a31bdc4ca5e24f06dd737032839685d9ee434bfbe4a1,2025-01-15T22:44:09.030000 CVE-2024-21309,0,0,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000 -CVE-2024-2131,0,0,a5c199c67a29a51a3f196eff09fe5f3259839ee406319c0cd2f55c4089afd920,2024-11-21T09:09:05.730000 +CVE-2024-2131,0,1,b1b07f83cc4815619d8a340f7f607f09dab71b73ec5b8e6029c7eae4cf12e8ca,2024-11-21T09:09:05.730000 CVE-2024-21310,0,0,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000 CVE-2024-21311,0,0,4d6ad1816d0e66f3c61e7cdb92c11956c9e3c55be6ee8b7971fca359d0bb88cd,2024-11-21T08:54:04.860000 CVE-2024-21312,0,0,6bf7a111a639274be7bd1d96a6200472536c850ea46f2604e81064d0b20c2d44,2024-11-21T08:54:05.020000 @@ -247850,7 +247850,7 @@ CVE-2024-21356,0,0,5b48982114a60da4f75f6bd1f75f7770814e8aac6326653cf23d5fa99993a CVE-2024-21357,0,0,f6bc63ebe6d01af69735ab9f58ef6808c268f130bcf00bafa37cfc4362402c88,2024-11-21T08:54:11.150000 CVE-2024-21358,0,0,f4f46a6963c93708340d341dbfe178245cceb1490892e5e827fa2701c633c994,2024-11-21T08:54:11.310000 CVE-2024-21359,0,0,5f3a764f74fbe421a6085582e61e1fb1d7aa71674c2de2ea06a2df45081d2608,2024-11-21T08:54:11.467000 -CVE-2024-2136,0,0,1771dc5553937203611e165ff1b5be1056adc7e4595813b1c67495188a24ee75,2024-11-21T09:09:06.403000 +CVE-2024-2136,0,1,4865d76957531f4983a1877000d5c0ec89e48deb27a19bd76728f82080904183,2024-11-21T09:09:06.403000 CVE-2024-21360,0,0,9e56be8f50ddda836b4607151c85ff73cd3ee51c31e2b5f16e9651d5ab99f385,2024-11-21T08:54:11.620000 CVE-2024-21361,0,0,b7ec2e0cd243ba7f60a8d2877bad443baeb7f8c0f11dbb59ab73ebf007e531b5,2024-11-21T08:54:11.773000 CVE-2024-21362,0,0,3e9c9c5ab0de90e700165e1c41847866222be11ce6ef11f0fd3c2853cb3dc3e8,2024-11-21T08:54:11.920000 @@ -247994,13 +247994,13 @@ CVE-2024-2149,0,0,623462d7a5ff9b51b2aa7ade43da64daac4359951ec4d2679456f2fd8be039 CVE-2024-21490,0,0,15b5e2ee4920ffa283e721989521c69ae49e0b37b741d50130fbb3fccd7a1d46,2025-01-16T12:15:25.320000 CVE-2024-21491,0,0,ed885d0621c9afa15f31ced4c11fa76b30b44086a27ec3bd748a089ebf894a3b,2025-01-03T19:40:54.883000 CVE-2024-21492,0,0,41784e48d5d56f935bbe9f5a3d60c45053ca0d5f0bf8670ce081293e9f26c581,2024-12-06T19:15:11.520000 -CVE-2024-21493,0,0,61999d493cd2305b20c93c1b5df9c6afe2ff45a18f04f175f85548997207ee5f,2024-11-21T08:54:32.820000 -CVE-2024-21494,0,0,35297f25eaa32b03c6bad3cd49cc92146b943905ce0fe0568371000866add10f,2024-11-21T08:54:32.973000 -CVE-2024-21495,0,0,b103529566d603a524758734dd13a041de910b0f25b85d9c98c8c11a5a5eb8c3,2024-11-21T08:54:33.127000 +CVE-2024-21493,0,1,5be93b423c9125c12d8a4ec9b49137c38bcb89601c9cf8237bbcd168f2ecbaa9,2024-11-21T08:54:32.820000 +CVE-2024-21494,0,1,ca71a232d651df25899267476bf38554e9e1209863133bc96419b7e7dfb8cddc,2024-11-21T08:54:32.973000 +CVE-2024-21495,0,1,9fd7f82fb8a687b021b232c682f2023a7cdfd041462f2b2e60f5a6d8cab4c472,2024-11-21T08:54:33.127000 CVE-2024-21496,0,0,3c2088157b50478155ad69015fff5cacecfc9e9b2edb3e8ee2b8e7bb0a0e742e,2024-11-21T08:54:33.263000 -CVE-2024-21497,0,0,51954e370adb307292f89f9bacf340ff5ab294db152bff5534def1062932dafc,2024-11-21T08:54:33.400000 +CVE-2024-21497,0,1,387418e51d6c3df912d14968f8f8c1c353a067baa71f9d7c000233d255a92a65,2024-11-21T08:54:33.400000 CVE-2024-21498,0,0,2bf402b1559306f16ac8c8e66d84bb15b551ce6a438faa3500a7705f9ece2da0,2024-11-21T08:54:33.530000 -CVE-2024-21499,0,0,0b2a2928a1766ee081957cde9c5876176f7f5e787eec3546dac1732f7c40b1f8,2024-11-21T08:54:33.677000 +CVE-2024-21499,0,1,20a7febdd3bb65fef9a5ce1069226a3fcfd17371685ca186693bbcb517dc7801,2024-11-21T08:54:33.677000 CVE-2024-2150,0,0,11709d6f33f6feac5b4c76a551fdc402bc450d0a937559060df9be2ccc270565,2025-01-02T20:11:35.597000 CVE-2024-21500,0,0,6cd1594c4e223fc3885480361acdb48625b73f48d694e68856a788a09c0a91e8,2024-12-05T21:15:07.243000 CVE-2024-21501,0,0,199ffb3aa23fde5d8d3391df678cad4c6e4de0c519c1101051786020f9390c39,2024-11-21T08:54:33.967000 @@ -248233,13 +248233,13 @@ CVE-2024-21749,0,0,854c07ea14d44f1a6f258b4195b384ea52b627e1c7fb4eba6779b50701ad8 CVE-2024-2175,0,0,f23583a5f89b3c048c3a390c725234de0385c846391e27a731d22c7274e14129,2024-08-19T13:00:23.117000 CVE-2024-21750,0,0,34ac4bf556abed3b579ceb283a732cbafac6840724519bcf2f9521daaba609b5,2024-11-21T08:54:56.420000 CVE-2024-21751,0,0,37727b39c87b6c1a9e9b1b8c4a5a7fcb8c766a4a78fd465a68a305c6b49c5b57,2024-11-21T08:54:56.547000 -CVE-2024-21752,0,0,5087325061f0baa2c18bc685e2fb3da31689dde4699ec8f5182350f3815fbecd,2024-11-21T08:54:56.687000 +CVE-2024-21752,0,1,7f108a5893876c298d8fc26fd8f1c476818e76551efa4d6f2904e78e93221c0b,2024-11-21T08:54:56.687000 CVE-2024-21753,0,0,45b065c6167769cb16d64a10ec6f37b04b38c9a33361a88b58e0222b96c5fb44,2024-09-25T18:36:45.307000 CVE-2024-21754,0,0,6726148c9c00979954f8e0e43980573889b19508b76c8b84b92cd601e38d1fce,2024-11-21T08:54:56.877000 CVE-2024-21755,0,0,3db688cacd77dd473c848be3e1117c1b29b56eeefd4b3b05f3fefc4fcada771b,2024-12-23T14:58:10.797000 CVE-2024-21756,0,0,55671466161da604c39db4e12f80a3997fbb2c1ad8da690a7c82c7bcf4da8114,2024-12-23T15:02:00.357000 CVE-2024-21757,0,0,2977bcabeb1633cac10a5d2b68ce6f1b718f97760675ba593569c66c881c2f72,2024-08-22T14:34:54.550000 -CVE-2024-21758,0,0,28bb2460cec3e0164356adbb6607749154b8edff18f1f25b3f79ca82f2dc4aec,2025-01-14T15:15:13.843000 +CVE-2024-21758,0,1,21c83bd085ded9ad4e0e70b0a1e23571dab5ec9cbf1f830ae2d69f52b8e98d41,2025-01-14T15:15:13.843000 CVE-2024-21759,0,0,c7b87faa73119d13eeff29f1fcc441192710ec05905507e64f7a792b951b9ab6,2024-11-21T08:54:57.347000 CVE-2024-2176,0,0,1aeee7ae52b7f70f1b987c126ac25fd385f727623c97d4e6f5fec3aa0f1aa936,2024-12-19T20:23:37.707000 CVE-2024-21761,0,0,82642bae2920dd7ff8b514e57bc1c1f5d6d71d9ec15a1b10f21b90ef60b69c46,2024-11-21T08:54:57.477000 @@ -248256,7 +248256,7 @@ CVE-2024-21772,0,0,f310ab481479ca6605eb33ed866f077d30a9cc043049a45b9dca7b65aacae CVE-2024-21773,0,0,18ffd55c3b3bc88b769a0a60072a06b2f11c2c5bd2e42489d365ecf87e312471,2024-11-21T08:54:58.750000 CVE-2024-21774,0,0,9dbd9d2730674cbb6b04cd32f96f031daf4202c8c95abac61f10ac5023434369,2024-11-21T08:54:58.900000 CVE-2024-21775,0,0,47f96747d440c6bdfc57b6dcff5e30996dbaa9514148a866fef0d4c01b291f4b,2024-11-26T16:34:43.767000 -CVE-2024-21777,0,0,86c750d63a6252025244fffb297eafa470f3f0b770396540cc7ed56a8f937711,2024-11-21T08:54:59.163000 +CVE-2024-21777,0,1,f85ceb0be899eba3332738ba5696ee99ba0f2ffc3cc13bee196993f816813b83,2024-11-21T08:54:59.163000 CVE-2024-21778,0,0,253f2dd3bc0112951c08e71c3370ea10726979e1470a6565609d98589cb5f4e7,2024-11-21T08:54:59.287000 CVE-2024-2178,0,0,0d4bed552ad270d43f6485dbf10a48ba6bf9393b5aca825626247e7e4691ff2e,2024-11-21T09:09:11.810000 CVE-2024-21780,0,0,be626ac394fffeb02631c37e137c9a3f6d67dc7a247b963a8b4e90b25404f3bd,2024-11-21T08:54:59.457000 @@ -248267,7 +248267,7 @@ CVE-2024-21784,0,0,271e66d21546e397c2fae271ef065731034c6a3dc48722d555b9bd3eaefcc CVE-2024-21785,0,0,9a6462e1a4ec679c404234f546462fc2ccedea4788076efb9e4346caa9449e05,2024-11-21T08:55:00.023000 CVE-2024-21786,0,0,039443c05be587e2aee9be6d7e79e0ba6731ca972b370ba09a7ba630a00d5c5b,2024-12-18T15:06:28.230000 CVE-2024-21787,0,0,02b845fa11d30ef4d6b5248b543c263f9946579e27a5baee61af2daa73424f03,2024-08-14T17:49:14.177000 -CVE-2024-21788,0,0,f9a4599f6e3684f11960e4f6592dc9aa65a582c5ca6406a9d40efd4597155390,2024-11-21T08:55:00.303000 +CVE-2024-21788,0,1,3bdd4aa91ebdf770ab8ebd60799b0dce301a2f7e73eb33f5bccf6769b75c4c09,2024-11-21T08:55:00.303000 CVE-2024-21789,0,0,c34cd9f442e6303402470c0476d59eb25b078e9a77c0361ee2b35106ce4e225f,2024-12-12T19:11:30.663000 CVE-2024-2179,0,0,3eba545c3d930ee27773dc0d32eb488dec2a7ca0dd014e74fbfb4ff5d3f81718,2024-12-16T19:01:03.567000 CVE-2024-21791,0,0,a67e0ef6e9bf4db6b180890b71471f6e3402c545c927d2c4dcca2990c1bf052d,2024-11-21T08:55:00.587000 @@ -248276,10 +248276,10 @@ CVE-2024-21793,0,0,55f3d8fa434cf99297046e24d2334dbe5f7d72bd3f8b0e81502e115289b9b CVE-2024-21794,0,0,92971ba58a617e12e33592f56f344312a9fd834a6ca2a60f4701773e2e2bf362,2024-11-21T08:55:00.990000 CVE-2024-21795,0,0,d62170e36a7209c83a68eafaec40456bd65bdab9ac50abd2c075ddad6c6103c1,2024-11-21T08:55:01.140000 CVE-2024-21796,0,0,a3d18246346af019828932648e58a2336dc09f4c30761ed2232852bfa32bd446,2024-11-21T08:55:01.280000 -CVE-2024-21797,0,0,279606d25dcc0a9f572a4a1c5e3a389699959e89029141b4d898a7ced5c7a5ea,2025-01-14T16:15:28.327000 +CVE-2024-21797,0,1,3b4ffffcfab8523cbe706a47825f025c845bc84ecfaa20f6d6686ea2ad88d572,2025-01-14T16:15:28.327000 CVE-2024-21798,0,0,0013a211906810d6a9ef53bb3a7f3e21ae41fb033181626567e3d35b7b64844d,2024-11-26T09:15:05.723000 CVE-2024-21799,0,0,15906d985cb5ed1d7fccea8b16ef3741436370664b5830f39616cb04a191e031,2024-11-15T14:00:09.720000 -CVE-2024-2180,0,0,fcc560632b11736796253263644c0ee38f9955d6c9f69c48fe85249019c21df2,2024-11-21T09:09:12.070000 +CVE-2024-2180,0,1,0eb393f4f48667973bdeb447655bd379b8321f18fcdc04504a73cd87cbce731e,2024-11-21T09:09:12.070000 CVE-2024-21801,0,0,a8c56141177a7c46a240198629bbb40acbee9f30928445abc53b9c9d5a4f89b4,2024-08-14T17:49:14.177000 CVE-2024-21802,0,0,6e575bd02a9f26f6a681b03e9d0e6ed519cdd94831e127350ecb1b6d823ded59,2024-11-21T08:55:01.783000 CVE-2024-21803,0,0,b9eb989fe5eaec1aa8e4c7ecff68cc889d999bf0f791c530521d0b2363b7095e,2024-11-21T08:55:01.910000 @@ -248287,7 +248287,7 @@ CVE-2024-21805,0,0,78da5cddaa000cadbfc8c97e4677a4a341010cf31e46cdb8666986000b870 CVE-2024-21806,0,0,76d4e18b277b03f4ae237a28217dbc1a6a11559f17846f037fef87ba1a7f83ba,2024-08-14T17:49:14.177000 CVE-2024-21807,0,0,529e9675184111d1bad446f22de504075505951db4aacf2389a43e129efb9085,2024-08-14T17:49:14.177000 CVE-2024-21808,0,0,99c06a6ac8aafd8cfc1be0a3ffe3830fb507906fc97acb50afd6274df8d9a629,2024-11-15T14:00:09.720000 -CVE-2024-21809,0,0,24fcee3a7e40290eb2f587b80df25e5c28865632e60a847cb4975adc8cd09ccc,2024-11-21T08:55:02.570000 +CVE-2024-21809,0,1,697dbd0cedc1a2c5cd46dfaeead471eaf70804492cd08058f49384c5991482bd,2024-11-21T08:55:02.570000 CVE-2024-2181,0,0,bc2ca43c87e79a2ce51f96614a32ea2ecec3c3ecdc0cc0dd84d4621bf4f6ed8d,2025-01-09T17:23:38.353000 CVE-2024-21810,0,0,4ec81a42073da00ef760857683f4253a4873020979c4273351a33968fe90eb90,2024-08-14T17:49:14.177000 CVE-2024-21812,0,0,9bd251e219bdd80ec43de87b0d9c078ead05f7995c400e0007210d917d930bdb,2024-11-21T08:55:02.837000 @@ -248313,7 +248313,7 @@ CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86 CVE-2024-21834,0,0,aba5ecdbe6fdbff707907f54f191da45860fa668c1ffa6152c0ea4e0ceacebca,2025-01-02T19:13:29.017000 CVE-2024-21835,0,0,5ca067d858621cfd38789265a3fcddae8684932d6a7c154737e5c2eccf5ad481,2024-11-21T08:55:05.610000 CVE-2024-21836,0,0,e88af3400ff3424f7f8c555ab05b9703c4631aecd39cbbe5cfd2b7581a0399cc,2024-11-21T08:55:05.760000 -CVE-2024-21837,0,0,326c8816c92be17267dfe75ba1fc3e837d21bed5fb24b56423812fd195bf0bee,2024-11-21T08:55:05.893000 +CVE-2024-21837,0,1,7339c1b3d07cc4b013b27fd205b927b981461b639abdc91e5309e77d3a393ece,2024-11-21T08:55:05.893000 CVE-2024-21838,0,0,10b474ee89e23525651741f37955dbec52a7ba213ee35fcad19906f3e1d08b45,2024-11-21T08:55:06.030000 CVE-2024-2184,0,0,9e5c40c8a32d1851a954f24d7355c1d9d3bac3a50d336011aa25e72d44ef35b7,2024-11-21T09:09:12.673000 CVE-2024-21840,0,0,55fc6ef95d87e31db483091255ba705fe253037c3a3ea9d0fe7844b5b3411826,2024-11-21T08:55:06.183000 @@ -248333,8 +248333,8 @@ CVE-2024-21855,0,0,b5c9a274a6224ddacae3da8acd4d32ac5bd000acaa7f8868ebcff0034ce6f CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000 CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 -CVE-2024-21861,0,0,6b46cab83c4653618e7f5bd1ab4b2560afcb293785e1fc5ffbe383635565d28f,2024-11-21T08:55:08.070000 -CVE-2024-21862,0,0,cae542eee890ef9bb6fceb8a06c060e70a53518f8f628e986a2314a90fc0fc98,2024-11-21T08:55:08.207000 +CVE-2024-21861,0,1,bc6c41c4bff8e8ec87ce98bfaeee3b1a41aaab8c15c916a4bffc5198c28735df,2024-11-21T08:55:08.070000 +CVE-2024-21862,0,1,216a396c97a4058bfa4e818b3d3b68c0600c1702efe2353081ba38682bee7806,2024-11-21T08:55:08.207000 CVE-2024-21863,0,0,55f366380fbe866d6e020d9802a7829de46bf002961a873cc4fea65ba7605dda,2024-11-21T08:55:08.337000 CVE-2024-21864,0,0,1ad6c5ce84b48a780ceb370fb663156ccd2e7fcace23a3692a69ffb642270962,2024-11-21T08:55:08.513000 CVE-2024-21865,0,0,583fd7dd0aa12097e737a2985a06d8c2e10647eb7bd05007cef306e8670a0ed2,2024-11-21T08:55:08.667000 @@ -248451,7 +248451,7 @@ CVE-2024-22026,0,0,95ce485539115bc058c0d5e366224e51c8b45b49a0d3c411939b9a286d310 CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000 CVE-2024-22028,0,0,dc1d72f35c957d83174df179949d0c9b62a42ce5572e7016a9a9c3503481ee68,2024-11-21T08:55:25.737000 CVE-2024-22029,0,0,e86baf8ff5400263175f0ef817b503104add6d3b793b55c233ceee68af70ac9c,2024-10-16T16:38:14.557000 -CVE-2024-2203,0,0,b8e011bf50ae95ed222d13ddcad042c7d56316cd401664991fbe89db50ae75d9,2024-11-21T09:09:14.967000 +CVE-2024-2203,0,1,60f6909e8cbce0dd59e60f2c5d1689346b33bbb4517abf9349fed4a4ff3f3873,2024-11-21T09:09:14.967000 CVE-2024-22030,0,0,e02699b846d34a18e8b7b6cf5888c535b133634cfe2a017ed58e28205a0d0b6d,2024-10-16T16:38:14.557000 CVE-2024-22032,0,0,beac3563a832af7ad2bb10e838ed7f4dba057a283ad9b47518d8f50d442b7b4f,2024-10-16T16:38:14.557000 CVE-2024-22033,0,0,67af1c2c407114537d4e89679db2f98dbaf388289faa0caf8bebb547f121bb48,2024-10-16T16:38:14.557000 @@ -248459,7 +248459,7 @@ CVE-2024-22034,0,0,fdb317819d71ff9b837affcfad34eef81e09d01bdfaff630f7528b487dfef CVE-2024-22037,0,0,5f8e286bbea74bb2d257a281a4d796858f96dd2b99e6ae3601ad37a11d054dfd,2024-11-28T10:15:06.973000 CVE-2024-22038,0,0,64c25e87ced7fb397cbac3ff6b0992d689d41f832ab4a97deb45c0418e12700b,2024-11-28T10:15:07.567000 CVE-2024-22039,0,0,ce396fab1e3ad0290927c5b46e298fa5c4ce735b27af9f7f5496f9dc290e2d75,2024-11-21T08:55:26.327000 -CVE-2024-2204,0,0,4f7e2c2978e4ca6d1339d570d25b39dc440d1a46d1fe372408ba35e60952b958,2024-11-21T09:09:15.083000 +CVE-2024-2204,0,1,0f80738537a9106dc543a365b9911d6cdaa4b426adb704bf0cbaf461e707e375,2024-11-21T09:09:15.083000 CVE-2024-22040,0,0,71e6d2927c184ce6e97cc21e34b37e0f85e816c2ab695b9e0452a34e09115356,2024-11-21T08:55:26.510000 CVE-2024-22041,0,0,002b9bf9adcbd86b0adc5987ba9591d8d45df19056ec349889a57b8211dc2fc1,2024-11-21T08:55:26.660000 CVE-2024-22042,0,0,f299fbf6ca7c4c9a5419863aff1c78c9ffcb8592a4d3e59bc1c282c660cb786f,2024-12-16T15:02:32.453000 @@ -248479,13 +248479,13 @@ CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6 CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000 CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000 CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000 -CVE-2024-22062,0,0,5e3fbf901447836256112216e65128d54acccd14efc4bf8ec50b4b4ed373b2b8,2024-11-21T08:55:29.160000 -CVE-2024-22063,0,0,3a3fe7cd880c0669408bbc7278ed5dece77438afbf5e027328028cc0f978218e,2024-12-30T10:15:05.867000 -CVE-2024-22064,0,0,7a159daab9aa6e5774f98aa77b2c2b9cdb3b6481d807f30d09492dd701bec0f0,2024-11-21T08:55:29.303000 -CVE-2024-22065,0,0,dae613817a61208717b3a5a276d9f130cc902f700d6c4ff0f2f65e14039fa1e6,2024-10-29T14:34:04.427000 +CVE-2024-22062,0,1,8f0ab471e668cd03b7a1b3138c26a2962a23ff1e52eff23da6e303d3cb6a8e23,2024-11-21T08:55:29.160000 +CVE-2024-22063,0,1,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000 +CVE-2024-22064,0,1,ad28116f62ca19a80c4fd8673772e8fcc6cd9a557307c4207fd4220047cbb8d9,2024-11-21T08:55:29.303000 +CVE-2024-22065,0,1,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000 CVE-2024-22066,0,0,70d4e3985898c8aa9a39f7f36b8d64c8bac198bd9861f8715ebb57132067fd4b,2024-11-08T14:31:32.933000 CVE-2024-22067,0,0,add51247fb7aba56da0e38fb655dd5fa3255e9b0defa9f5c297e2ca7bc9d5649,2024-11-20T16:24:47.843000 -CVE-2024-22068,0,0,3a2f9b2220ab6a2285bc85464bed279bdafd82fa06bcc024def5e82a1defa63b,2024-10-10T12:51:56.987000 +CVE-2024-22068,0,1,0e45a086c8936add37b1df8d7acf50cd02d24eaf181f002cc54878d9c8f7a945,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676c84,2024-08-20T17:22:39.500000 CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000 CVE-2024-22074,0,0,b3ae6a34f5cbd61f1ba3e8dcc86a120a08f8721281bdaf819b018b5694a237af,2024-11-21T08:55:30.200000 @@ -248506,14 +248506,14 @@ CVE-2024-22087,0,0,ec802683c5b66e52af14e7628ea08e3ca753e0f7613afcd6c141ed5e6585f CVE-2024-22088,0,0,1b4567f28bc62e821780e1476d393aa95092e316c51213253216ae85b00a6597,2024-11-21T08:55:33.300000 CVE-2024-2209,0,0,43898b6a7f163b77384dde920a53e0f2dea9f1872d0d31a7c7ecd456628e1dc3,2024-11-21T09:09:15.580000 CVE-2024-22091,0,0,b5fcbd2160b42d3585f87864a6840fceb16582d160dbc6d454cdb5078b82cf19,2024-11-21T08:55:33.560000 -CVE-2024-22092,0,0,5e336e454c4c1bba9ff0353449fc3de33be1a0a630703497238bc9e1a1f3587d,2024-11-21T08:55:33.710000 +CVE-2024-22092,0,1,f337183cdee090eb19e704b98152af8a52f8fb7e458cc5961189cc271f1a91a5,2024-11-21T08:55:33.710000 CVE-2024-22093,0,0,183d0642de7307bb3e538c8eb6a014a3c35704e95371fbb7615f50165b1c085a,2024-11-21T08:55:33.857000 CVE-2024-22095,0,0,823722593447e76106cea3af54bb05d5ea050097c39ce1fa1632c4d0b2fc5ecb,2024-11-21T08:55:34.007000 CVE-2024-22096,0,0,c4602d88323b3424c44a18b3f76c72f6c73d14d53cf003d62bcccec494853469,2024-11-21T08:55:34.197000 CVE-2024-22097,0,0,188acca1f85864502cca0c058f95a3e474e93165d1a593b49266feb42cabcb9c,2024-11-21T08:55:34.367000 CVE-2024-22098,0,0,aa82bbcfcdad7de5e03fc60fafc6844d23ca04b30a801f37c32f229b85434f4a,2025-01-02T19:12:54.717000 CVE-2024-22099,0,0,2aab8d395d6a42ecb54cfd21d97687ce18aadc84db395b6c4859d28ef1982d01,2024-11-21T08:55:34.813000 -CVE-2024-2210,0,0,0eb3eb165f7b003ae7265774a1eb47d82f1d8df2dab3f06c414468d48baa06fa,2024-11-21T09:09:15.777000 +CVE-2024-2210,0,1,95e72181c5a1bdd35257cb7f5e159971c82da0f8c14cdd173762c1d4d384b5b7,2024-11-21T09:09:15.777000 CVE-2024-22100,0,0,56f2af5bc1323d1c0ca1ddfc53290dc26ed685c2c5fdf820f38f4660cad65dae,2024-11-21T08:55:35.003000 CVE-2024-22102,0,0,84892b7b6e5d83a9d6c16f8dffd5e79d322057a8d97be177a66169a0e45abea6,2024-11-21T08:55:35.143000 CVE-2024-22103,0,0,21b0d01eb857ccfc96a63302f1d9c85525df74135dcbdd1b5b1e8e0e0ba5b800,2024-11-21T08:55:35.383000 @@ -248588,10 +248588,10 @@ CVE-2024-22177,0,0,763cc0fe9d4952aa804847af201c74da8244bc525a37db0e20ac1d192cc98 CVE-2024-22178,0,0,e765ceb58033517f1480b1fa39a7e3f034f044ee250041307adff844758847ad,2024-11-21T08:55:43.953000 CVE-2024-22179,0,0,2b801faed759802b573f8a221bc335b3eb337f69cc84bd6f5d1a06164391d29b,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 -CVE-2024-22180,0,0,418e1aa50ebc83787513219b5a30fb4ade28c19d254a55d19417eb8945909d45,2024-11-21T08:55:44.260000 +CVE-2024-22180,0,1,ba5889c40f761c602409812708cfd0c01c2eb40e2d7677b7f8968864ba82c69b,2024-11-21T08:55:44.260000 CVE-2024-22181,0,0,865f27ea93b2f4cd418fa82e296f1730f12a178923e6676e37a31e9d007a0fe2,2024-11-21T08:55:44.390000 CVE-2024-22182,0,0,7ac8d878e2d4ca5a283cc9615664edc83ce6d44c467cc8255966406901629afc,2024-11-21T08:55:44.573000 -CVE-2024-22184,0,0,4ae336f1ea79637f208854c89c65c88b3e3c9fd813f7392c472922a1151f090b,2024-08-14T17:49:14.177000 +CVE-2024-22184,0,1,45f7a467f5284ceeee92cbe2680afa39da382fc612e5638f1e76475e9d85c283,2024-08-14T17:49:14.177000 CVE-2024-22185,0,0,85f91f379b4d59a41a27787f13eaff968636790e8e661ef463dd204a3c8d0bcf,2024-11-15T14:00:09.720000 CVE-2024-22186,0,0,4bb94aa91f9890f5837e92c63eced8f9687c5362fd26bac1064cc79bea12c7fc,2024-11-21T08:55:44.987000 CVE-2024-22187,0,0,947aa56814fe8b16e5fffe2cb8e8a640149c0d34f9fba0378717f44bea5278c5,2024-11-21T08:55:45.137000 @@ -248854,7 +248854,7 @@ CVE-2024-22454,0,0,2c8d1a33988322db7cf38e3b2b361cb6a412c5f542024f6bbafeb0db35f54 CVE-2024-22455,0,0,9cb3bc889559b2f6fb09e417f45871b483f8caca4c045b9db5d805761baa1b07,2024-11-21T08:56:19.423000 CVE-2024-22457,0,0,979d34a1ed7d504df3092a3574c3153ea97167472249239cb545f67f4062bb26,2024-12-04T17:57:09.997000 CVE-2024-22458,0,0,054e05bee56fc2634d5e195c469d65ee7587b8df2315833e22fae6dafab2d0eb,2024-12-04T17:19:03.560000 -CVE-2024-22459,0,0,a59f3a79899e105a6cc3ac3d292c77dd254a456412e506a47ad8a1495f05a21f,2024-11-21T08:56:19.873000 +CVE-2024-22459,0,1,2fc94a97f33cf0ef21eac69fcc3524efa900da095878fd5c77e9271253848da8,2024-11-21T08:56:19.873000 CVE-2024-22460,0,0,cf9685057b4b3269739ae374acfa00b4da824093a0d95fe8e25340068e29c40d,2024-11-21T08:56:20.010000 CVE-2024-22461,0,0,15fc026d7ad5be4a1c4f9e580805f2e43b808a92e87953af4df4577e636db90c,2024-12-13T14:15:21.383000 CVE-2024-22463,0,0,d7d862658e3c45f198827763f0f948786983de80b86774f7ea7e7d6abb7a0b97,2025-01-08T15:46:14.627000 @@ -248866,7 +248866,7 @@ CVE-2024-22475,0,0,b9326cef104e527ebece5a44b8410430ec6ba360374b1b63130781d3fcf25 CVE-2024-22476,0,0,f03934f35360b7025b245717a358830a1748bf912d6afda43db399901cec9280,2024-11-21T08:56:20.933000 CVE-2024-22477,0,0,b8509029d5ec6a4381b6e6bd33da7f50735c23e01284aa814f384a92dcb70695,2024-11-21T08:56:21.077000 CVE-2024-2248,0,0,128b03ee143838230434475acf9988ac8d0fdb2e64239ea0133c82e2fa239752,2024-11-21T09:09:20.790000 -CVE-2024-2249,0,0,dbc66e593c8f80859e580f41621f684f12e5a734c6b217af8fe018b5488b9530,2024-11-21T09:09:20.920000 +CVE-2024-2249,0,1,b7479f791c44ab2d743eb04162d89712e9af7b6acd224caaf8514c7a95cb2cf5,2024-11-21T09:09:20.920000 CVE-2024-22490,0,0,66a82b0e51a88056ee4e8dc9f25a0a6cdc86338bb5341bd044469b861097582d,2024-11-21T08:56:21.247000 CVE-2024-22491,0,0,a7e8274b6222971c8e56e21df04de28db6683d46867835e2cadf2f0873c1303d,2024-11-21T08:56:21.500000 CVE-2024-22492,0,0,e5b01de89d6869ada043630fd5bb3042a45209250cc8e75716793df2024c2b62,2024-11-21T08:56:21.667000 @@ -248901,7 +248901,7 @@ CVE-2024-2255,0,0,c78337bfe91f10c79f504e7a6b28d344294568cc92f821d9dfc4baaad2d3b8 CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000 CVE-2024-22551,0,0,1e93c60dd52f09f6cd2dcd56d4a711553385c5433699e8ae1f44fe69a35bc9ed,2024-11-21T08:56:26.960000 CVE-2024-22559,0,0,36d8d40d85cf4ef45bc2b02dbe49188c093e02a56b7d30ed2946edd5a0d6608f,2024-11-21T08:56:27.107000 -CVE-2024-2256,0,0,0c432ddd47a0a4060eb0a9bfdea4273ef0c55ae0bf7d0cd30558296fc5483888,2024-11-21T09:09:21.633000 +CVE-2024-2256,0,1,31f6a931d1ee42de0f090a47f472b061e8c14afda7782336fd9ac4bb76cb09c4,2024-11-21T09:09:21.633000 CVE-2024-22562,0,0,ea97d322ba73922c2b4b17e7faf95fd9fb5924a77ee360bbda566226f58ffc1f,2024-11-21T08:56:27.267000 CVE-2024-22563,0,0,53141b7efa0448a4fc58647686dae7b112a9eee549be6b37a305348b85c7a109,2024-11-21T08:56:27.410000 CVE-2024-22567,0,0,2a034ecf0e68a255d1c72f03aeb92b1775a988d7343bb0ed2af9804759f912f1,2024-11-21T08:56:27.563000 @@ -249112,7 +249112,7 @@ CVE-2024-23091,0,0,ac809bd19f7e627635a79d83b5695bf1c2fb09ece061006c0f1815b6022ec CVE-2024-23094,0,0,39856c4da401f038553ce13c83297dd603ae7bf5ca4cf6ae32992dbd89dce5ce,2024-11-21T08:56:56.250000 CVE-2024-2310,0,0,b6f8a00e8715d4b3b60be0214b575fc22e21dc1cce049eb25d1bfde853925611,2024-11-21T09:09:28.823000 CVE-2024-23105,0,0,cc92d5b7f0e64822efb2303bf788a510716bf4a22d1dd8fe4f1ced2ca7c2db73,2024-11-21T08:56:56.483000 -CVE-2024-23106,0,0,49177e79dc7b0e4c8d70a60a61100e99b69c056f52521a23f02382021b76533d,2025-01-14T15:15:14.253000 +CVE-2024-23106,0,1,d51ac06138d4ccfdeff4b33582414b9ca25395b3be6a1786623211eeef7571e1,2025-01-14T15:15:14.253000 CVE-2024-23107,0,0,fb9f269ff9a1721dc70633ce33277322f1dbc0036fc8172640447e4431712b1e,2024-12-17T16:51:35.250000 CVE-2024-23108,0,0,9d659a0c56266d107dd050234c8418f99361db23121c8ca000992c1044ae9639,2024-11-21T08:56:56.783000 CVE-2024-23109,0,0,c8b681856326059919d7eca87f263b10c76f30a97cdf3c7093cdd3ba11934f09,2024-11-21T08:56:56.940000 @@ -249592,7 +249592,7 @@ CVE-2024-23603,0,0,aea1f31cacccf724f0eb767dfc62b8f5f7cb80ced40ede6e78ddaf281fcb5 CVE-2024-23604,0,0,dc5cd839af33b7b3dcb48b002d81e48ae97043185456c58e26e0040b5dd4ee1e,2024-11-21T08:57:59.313000 CVE-2024-23605,0,0,6feaaf8078973106d62b89fd77d8350c669a4c873ff6f3514aa9598da39c9a5e,2024-11-21T08:57:59.433000 CVE-2024-23606,0,0,d1d105c065091d2fd26f3da5f7c25c121c9263ce8c9570e40b1ce0bf631d4d89,2024-11-21T08:57:59.550000 -CVE-2024-23607,0,0,0b565baa7c6fe0b727e1cdca61d8091d74bc979c41c8f0c38022d50882fabe8e,2024-11-21T08:57:59.680000 +CVE-2024-23607,0,1,1e3cde2a3bdd7f2b024b02a6b58595499e745787f58fee09de464f8683b42032,2024-11-21T08:57:59.680000 CVE-2024-23608,0,0,f4f0d3dc90613d42fc8485a3197c71394b07fbc0df27981f4d6ad3675d04a364,2024-11-21T08:57:59.797000 CVE-2024-23609,0,0,b90f833366370fe43c05814eb1526887e7cb7b82ee5ea7a039ba9de77d7a868d,2024-11-21T08:57:59.930000 CVE-2024-2361,0,0,cdeca1550c32896fb6fcfb15aca13512200106e857f7cb5e97a4410236124f83,2024-11-21T09:09:35.667000 @@ -249651,9 +249651,9 @@ CVE-2024-2366,0,0,90e2f12149642b70d84804fc6f88a92a2e96d1915eadd9b4c5ad94265dc438 CVE-2024-23660,0,0,a0693769ca2af12f268fbf5cf4c178feba914b1a9e06080d95be4eda9e1f6ced,2024-11-21T08:58:06.890000 CVE-2024-23662,0,0,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000 CVE-2024-23663,0,0,4115801077b89b088b225d11dd742f9500976c4f6b3e6ad1ae4e5eab6cc084e4,2024-11-21T08:58:07.203000 -CVE-2024-23664,0,0,665ff2ffa7ebe6329b6096a4739ce61633371294cf2579873454d1efb96b574b,2024-11-21T08:58:07.350000 +CVE-2024-23664,0,1,bc5863b006f00b79ae9f004252b36fdca40a3227c1cb02be6d5aa4ea4276857f,2024-11-21T08:58:07.350000 CVE-2024-23665,0,0,73cd0c9417cef1431f5ca94fe0c36816dbd45052d13d6eb832491df45fd31d3e,2024-12-17T16:43:37.527000 -CVE-2024-23666,0,0,ba3de7b8db0a2805c97b89eedb7e9791d49d8ddcbed317d5cfa8eec087545428,2024-11-13T17:01:16.850000 +CVE-2024-23666,0,1,585f66f1da75c6e62de646648486d32e3044f1fc34ac1e67bca7ef77166ee0a7,2024-11-13T17:01:16.850000 CVE-2024-23667,0,0,68282659dadf8421bf999f7e5b6411f97973ed884f7fb45d2dd6b12f64ffbbb2,2024-12-17T16:38:56.453000 CVE-2024-23668,0,0,99bbe4b94140b9d101bb1590de5b0cc79587c2f19d27a805e40ca7dbd516eb82,2024-12-17T16:38:42.387000 CVE-2024-23669,0,0,b88515905b95c6021928badd7e75375eff2a9c40d8137d95c199c0ac0de087e8,2024-11-21T08:58:07.910000 @@ -249912,7 +249912,7 @@ CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4dd CVE-2024-23947,0,0,f911293c6af8cf8e2a4c71b3a16ce5c03d9ac810bd789b6ce8a33c36c29ca1c5,2024-11-21T08:58:44.480000 CVE-2024-23948,0,0,d6d4011f0c2b673928e54c2b884e178d06b968843ed951ce2e90e73776691214,2024-11-21T08:58:44.607000 CVE-2024-23949,0,0,da62630c8fa87849f3b8e313b2b05021cd7919bca6993eb5f7ba2a2cc72248d1,2024-11-21T08:58:44.733000 -CVE-2024-2395,0,0,248230e7cfcd5d0b6f747ae11018d0ec53606db5250668008b5d5f5e69aebc2e,2024-11-21T09:09:39.687000 +CVE-2024-2395,0,1,f66dcdda2ce49cb674a9451421d75e2dcebccfa4caa6dade8e0260a999b230b5,2024-11-21T09:09:39.687000 CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000 CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 @@ -249936,7 +249936,7 @@ CVE-2024-23982,0,0,93b871bb849ddfdc1e819724eabf618a026ea0045e6f41c00f87b173c4d45 CVE-2024-23983,0,0,02d6710faa1522bea66123bcc82a087d871b3ccedc8696618c17451f9d9cc1ca,2024-11-12T13:55:21.227000 CVE-2024-23984,0,0,f162dd4abfc9d84b85054bc8ce91537d92c2043213b8f61db51ff4d1ba0ef643,2024-09-16T18:03:16.707000 CVE-2024-23985,0,0,9d6bbccc2e98c1d86fee1dcf9004c07eec9e18a3b2de4c9ffc352d8173ef0e43,2024-11-21T08:58:47.370000 -CVE-2024-2399,0,0,7844fce95083811ba93f278ddd068529ccc6ebd85b139594f29c4949c919a586,2024-11-21T09:09:40.213000 +CVE-2024-2399,0,1,3619fc582e6388bbd9a7cf50e2e0622c7745ca143c42aa23e47d8816b8a1c645,2024-11-21T09:09:40.213000 CVE-2024-23995,0,0,5e5984d7dc53d090ab0b6cc91dfcdf8f7b7c4b2619afedc22294f320d2528791,2024-11-21T08:58:47.527000 CVE-2024-23997,0,0,f9a7952af944bd29be8e50fcb9c5ab1fe7017c01075a6953bb96b71f45c0a174,2024-11-21T08:58:47.753000 CVE-2024-23998,0,0,a3c41daa2712cc1026d28786d997720134834f1a379691af03fd9be821fedc50,2024-11-21T08:58:48.020000 @@ -249973,12 +249973,12 @@ CVE-2024-2405,0,0,960ea883c9f1b1211a05bedc3cb2dbec1a47e697fbdc35497132d4ee90c4f2 CVE-2024-24050,0,0,df324bebea47854fd5bf49149fd24bb3d23d85a2ab4e77ffbeb5039ce83eec65,2024-11-21T08:58:52.560000 CVE-2024-24051,0,0,577b0feff0fd7f408d75fabaee913163e83ceec716679058d7f2e7811bf1d897,2024-11-21T08:58:52.783000 CVE-2024-24059,0,0,992f0ee13ac120c754aac0b1433b58212b741c898be6c2c1e97347d8e56fa919,2024-11-21T08:58:52.963000 -CVE-2024-2406,0,0,c97f8d4b680ceee637c462d4769757a94b53bff58bd85223a96b1c32db14dbbc,2024-11-21T09:09:41.330000 +CVE-2024-2406,0,1,e6dfb85cc8ab9d9d72f5a0e1beee647a9bfcba5e6f077450b8f3b7ad4414fe08,2024-11-21T09:09:41.330000 CVE-2024-24060,0,0,76420c08875743804b95d33c1b8e327e25e9a56c748b2569fe6e9e74860b3f4b,2024-11-21T08:58:53.127000 CVE-2024-24061,0,0,b44f4520c297437d45fb26f88d26245a5b6e5157f6d3a6fede608839ca3e86f0,2024-11-21T08:58:53.283000 CVE-2024-24062,0,0,d3cdf223be8020055c4207e039bf97e140dcf6cc437e7b4ae7acaaca5d0681eb,2024-11-21T08:58:53.443000 CVE-2024-2408,0,0,a9a44685e12fb751abb365dcea513da0e8982589d7eaa294b433e4d0136753aa,2024-11-21T09:09:41.450000 -CVE-2024-2409,0,0,a2a55021301aed26be2e79e5e6eb1b1c5a0b74a40a59d76ecc65eb1505ee4f06,2024-11-21T09:09:41.593000 +CVE-2024-2409,0,1,ff2507b084df7c55fda3dec91bbcf6d148be00a1063727733d7eb2a2a748e9b6,2024-11-21T09:09:41.593000 CVE-2024-24091,0,0,ab544d8586eff97d50440c6aee00588f4dadfd440f573585f5d79c9b1b92e18e,2024-11-21T08:58:53.610000 CVE-2024-24092,0,0,42612e9d4b67369b95e4f784bad7b4f3ce9b376ecaf3980484ef440bfbfb510d,2024-11-21T08:58:53.847000 CVE-2024-24093,0,0,d01cfd200da021b3379ec9bea10950f044fa309e1e43c1c0570f4c10f2933dc4,2024-11-21T08:58:54.060000 @@ -249989,9 +249989,9 @@ CVE-2024-24098,0,0,26661b271b088520db0dad6b3dbc22394de135426ba42d4868b1b8c0e26d1 CVE-2024-24099,0,0,4b668ecaad05d276a2b0054855eb68c0aef970c2685ad8df476e53deb1482b76,2024-11-21T08:58:55.073000 CVE-2024-2410,0,0,3be5ca8a66a5bd9557281be3e70bc0a40d70cbb2d20f1abc90621dbc68baf023,2024-11-21T09:09:41.717000 CVE-2024-24100,0,0,05dc63327c0c57ce6ab042ce950205521d3695836e7001d3858a8b7fbb0a65c4,2024-11-21T08:58:55.273000 -CVE-2024-24101,0,0,405b7c8b0b70ab50fa00b112a57e97ae6691e0e951cafefc5835e3fb8c5562e6,2024-11-21T08:58:55.397000 +CVE-2024-24101,0,1,713c31b6ca71d1e446283ee4fa6486dd54d1d15de4993f1b456126c208a6f2d1,2024-11-21T08:58:55.397000 CVE-2024-24105,0,0,255c139eabd3d6721f6c2c8b3ad56b8ba1f8f667587ce82d0155af0ac2d90fa5,2024-11-21T08:58:55.537000 -CVE-2024-2411,0,0,8c085fe77e5a728d9d09f8f885a00f5aa40752f57e9d9e52e7be505eddea2008,2024-11-21T09:09:41.837000 +CVE-2024-2411,0,1,c10cd1d76af0d2128fe1664c0a5b334d61c58b2c6f82ae734cd0e50f8085a213,2024-11-21T09:09:41.837000 CVE-2024-24110,0,0,24e3bfd7edfbdc9c648c149e52de113518ac1893351463aa09c13045ca7b364b,2024-11-21T08:58:55.667000 CVE-2024-24112,0,0,f6f904d56964636026057ec672d9f84ee172228629a02220c0864497bc55f6f0,2024-11-21T08:58:55.863000 CVE-2024-24113,0,0,76a9d649e638013a0a10bc2ce28faef2817a4228fee697e65a3b46a10e812685,2024-11-21T08:58:56 @@ -250188,7 +250188,7 @@ CVE-2024-2454,0,0,0529696b46064432400ecb536438bbd0c068e6096f5377190013117326aba0 CVE-2024-24543,0,0,59c3b1da73d28451a1cf1cfc188099161f9c980e5c2def4a9d3bc67372ba2315,2024-11-21T08:59:23.253000 CVE-2024-24548,0,0,66be0b6ba6ef0844ddd2a0ae230a74ca3e9c9ffcbeb06975fa2c032719d8c629,2024-11-21T08:59:23.410000 CVE-2024-24549,0,0,4ed77430af1fe22cf50322942baa69bc3dabad1352e6f759abd9a7ffc96a9448,2024-11-21T08:59:23.603000 -CVE-2024-2455,0,0,157d6b86ef39f0140c49f56ac7ddb0f54af2dcc7b9b331edaadd09557d5523bb,2024-08-01T14:04:01.833000 +CVE-2024-2455,0,1,af98c89184659abfaf4fdf185b6149a30fc4131f7976b0134874dd0b82ed0e6c,2024-08-01T14:04:01.833000 CVE-2024-24550,0,0,27cb7af9bd449f0fbdf95ef0a021af6839a34983570783985ee03919c2f67595,2024-11-21T08:59:23.793000 CVE-2024-24551,0,0,b7a1c2d46c2b177adadcae41ee83ffab2ce81a9d7f916acc3bf4554ccc8ba3f2,2024-11-21T08:59:23.940000 CVE-2024-24552,0,0,08553109cc8f803ca2660d07fd76902953e8d5b86d511086fa1825b8cb168286,2024-11-21T08:59:24.080000 @@ -250222,7 +250222,7 @@ CVE-2024-24578,0,0,1823936017f4e26e35f0d3c8e70c86355447118592c7a8398b77a1185d45d CVE-2024-24579,0,0,5b750dc9276586545591c5f17c685da900cca7fa18a626d3a0cea44f176e0760,2024-11-21T08:59:27.897000 CVE-2024-2458,0,0,d3a43945b002bbe4dbcc775cd2d9094cda2834583bb42f76f13ae769b4a19a8f,2024-11-21T09:09:47.697000 CVE-2024-24580,0,0,e9b3c63c841b56484e9a7cf6be12569b58937f5d37eaaf95d5cdb644623e864d,2024-08-23T18:51:20.207000 -CVE-2024-24581,0,0,9f6f287a26901a475cd9c397fec2633d727e41b3d383da5b8d7be088a503bd1b,2024-11-21T08:59:28.120000 +CVE-2024-24581,0,1,4406b787ee5ffa3db80651e9bdd69a781ae56626748b8861ca9be0155c91b5aa,2024-11-21T08:59:28.120000 CVE-2024-24583,0,0,45c00206367c2fe915fa0b6105bf3677234e2b1c69d31356fc1fca8dedbf400e,2024-11-21T08:59:28.243000 CVE-2024-24584,0,0,eb901c7452a856c10753487f523e66379a94582063689840bcf016216e0e61f5,2024-11-21T08:59:28.360000 CVE-2024-2459,0,0,25a3e13292c0e654cb7fca3dafd8a2a21d524bd7d615cdbca42cdbb547eef683,2024-11-21T09:09:47.813000 @@ -250331,7 +250331,7 @@ CVE-2024-24775,0,0,5fbf4068aee5b4a63d5bc8c27165baed12b61ed8648f8952c732695b9d7ee CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000 CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000 CVE-2024-24779,0,0,ec198cae623b4e6d5aec06eee0755bb1fd858c19bafc33c00af47d84202d8cb7,2024-12-31T16:26:31.327000 -CVE-2024-2478,0,0,e85196d894b10e02f1a421f833798ced2a47eb5d6f2dba4c90c6c4ecef4da3bf,2024-11-21T09:09:50.483000 +CVE-2024-2478,0,1,1bbd5f1263895f704551382cea7b289b1431674f50cc3bb62d25fed01775304a,2024-11-21T09:09:50.483000 CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000 CVE-2024-24782,0,0,80499092009d98ba529bfca673a7ac4275b61ad8394a4890122e575a7c7e8097,2024-11-21T08:59:41.467000 CVE-2024-24783,0,0,39288a4eb4aea0a88f0ae788ed2507a3b90047276cc68bfe890b777ba52b8d15,2024-11-21T08:59:41.620000 @@ -250341,7 +250341,7 @@ CVE-2024-24786,0,0,e9371327989983c10f03e9e7630fc9dfb18cd612c48fb0a73f10a1885b0a5 CVE-2024-24787,0,0,88d0ce8c14109f53791998247e6f4ce869c0d0b2f50add9e89accc0532f46dfe,2024-11-21T08:59:42.297000 CVE-2024-24788,0,0,689c6f619735b78c22617ea8d0f70d46959f2d9ecbef6812542340145414bd5e,2024-11-21T16:15:22.527000 CVE-2024-24789,0,0,5951221823dd31cd5aa065309bfd3c5cba05aafe536517efa8c97184c8cc9546,2024-11-21T08:59:42.597000 -CVE-2024-2479,0,0,a73af445a61f3cc18d3d790a63896c97bfb328de4b594e8c3d9977739f746e1f,2024-11-21T09:09:50.603000 +CVE-2024-2479,0,1,2fb1fd55feb7e72408dd6a3d54c9d1ec428f0054935334decf5dffe5280da6e4,2024-11-21T09:09:50.603000 CVE-2024-24790,0,0,1c6c25def6e78137e3fb9fe340e439c2b615f5bfed064f7d15771b9d1ca4b970,2024-11-21T08:59:42.813000 CVE-2024-24791,0,0,95d350869c872f634399877990d9006caf3f157c76eb6cacc64ce604dd72219a,2024-11-21T08:59:43.013000 CVE-2024-24792,0,0,7b793717714ca10458ebd040909b1ee6238d58e113a3e42e27b0e683446e6b97,2024-11-21T08:59:43.203000 @@ -250352,7 +250352,7 @@ CVE-2024-24796,0,0,936f569a4e34fb4d4aac1ba450fe67ab1232609d0c0323046d33e8e209938 CVE-2024-24797,0,0,067d8188b693e0ee4b12c52f8b196bfe51310c68f65d14af22bddd959f943a34,2024-11-21T08:59:43.973000 CVE-2024-24798,0,0,c5bb0364de6a32ae0059fc62bce418f0115c8ef80a60990b33c1206ede4f4950,2024-11-21T08:59:44.117000 CVE-2024-24799,0,0,2de0339d7da838c99a8acb6d666ca4cd712d7b4db0d617eb199747f254c4f180,2024-11-21T08:59:44.243000 -CVE-2024-2480,0,0,2c09188c327dfdd4df478bcf97c1c41a4c777e4097b6e4a01466208467dbca21,2024-11-21T09:09:50.737000 +CVE-2024-2480,0,1,1b9f715dc60c0bdfd4b3b21e1b64a57ffb3aedac1dba2ca49aaf7084d9967e66,2024-11-21T09:09:50.737000 CVE-2024-24800,0,0,dbe60d3968d5b952b66adef8c28c56be1673a0644aa5f108b8354581256d30d3,2024-11-21T08:59:44.353000 CVE-2024-24801,0,0,4515ade1c54a6676b32c21cdc744d9933c5c155323292753062789136d4bafa3,2024-11-21T08:59:44.487000 CVE-2024-24802,0,0,b0f553663840bb5a70e17cee492a3695c4401a72454d68768b223d2197c4eef6,2024-11-21T08:59:44.623000 @@ -250363,7 +250363,7 @@ CVE-2024-24806,0,0,df6a604cde567cd2da60614fb4c3118c04960f5c8ae7188254c2266790a48 CVE-2024-24807,0,0,f4ce25d9ac15c8835dcfcd6e6f48e4c31632a2040bd9a540e57d99cc08d85250,2024-11-21T08:59:45.297000 CVE-2024-24808,0,0,06eaf96a2a70c9ad9a44c5c6d45a3933e4ca8afe5b7f21e81cdbfca613b65e95,2024-11-21T08:59:45.443000 CVE-2024-24809,0,0,a4db0e44eab83a8b135434c0e449179c82f614a4f6ea9d9efc91d70f6e74bdf8,2024-11-21T08:59:45.570000 -CVE-2024-2481,0,0,2a4c7bca14bc4244077d879c3a2db1735d39121a119e229ed2ac64f988ca4869,2024-11-21T09:09:50.863000 +CVE-2024-2481,0,1,53d8a14eeda1dc10214a967b38872a3d8314028853dd697e37e15ff24ddec1ba,2024-11-21T09:09:50.863000 CVE-2024-24810,0,0,3b2ddc208ae06a31b26a22d5369df2b1c503fb9dc6f63d0a273bf99db61753d4,2024-11-21T08:59:45.690000 CVE-2024-24811,0,0,62793706ee3cdd23844732be87d1e1e43cb52a43d650a024f28ce229409638cd,2024-11-21T08:59:45.820000 CVE-2024-24812,0,0,8dbb54d7f193e94552bd89a3df80995163be3fd9544e1a90c9d4b8e04a6bdb32,2024-11-21T08:59:45.950000 @@ -250374,7 +250374,7 @@ CVE-2024-24816,0,0,823e9031d4ff85c8ffd066eaf6addd3c767fe0429f13a879f60557e790033 CVE-2024-24817,0,0,c8f4c7f28d3f7829fd7ec46ce69f6a0aadc37a594df13a75f23b8c9575623e33,2024-11-21T08:59:46.640000 CVE-2024-24818,0,0,9f6cdbf54a293f634bf2bb0d43a4ed9390e3fee341cf699d97e90d35014dc4fc,2024-11-21T08:59:46.770000 CVE-2024-24819,0,0,ac821307a43b4a131d4aab48940ba4b05b87ac63d15e45f69044c6ff9ceec37f,2024-11-21T08:59:46.900000 -CVE-2024-2482,0,0,619c9016649b878a57006d2bd18677f8ddb8dcbe8769c9134c196a0496ffaa3d,2024-11-21T09:09:51.010000 +CVE-2024-2482,0,1,5231dc598d8fa668b365b869c869e9565b596c9724c0818d22d4d6b6bc0847f1,2024-11-21T09:09:51.010000 CVE-2024-24820,0,0,e09a68673ea540d6e6b04904a166ee2cc19610221f27c15c4d17017d90d38036,2024-11-21T08:59:47.043000 CVE-2024-24821,0,0,55138b1e30210054a4312786095f8d054532d6340f1da2b81eb232281a890a4d,2024-11-21T08:59:47.200000 CVE-2024-24822,0,0,e3bafbfb3c5943d83f741995d517ce7e91957bcbe4d3b8eaeb5b780946d236fd,2024-11-21T08:59:47.343000 @@ -250397,7 +250397,7 @@ CVE-2024-24837,0,0,7ad01e4d66bd18540fc4a1df9e3655e1c4a199a45b0859636572272be2977 CVE-2024-24838,0,0,8e4d815e4da317a92180027f298a62e47e86b6f757666b5c0dfaf2710c513fa3,2024-11-21T08:59:49.593000 CVE-2024-24839,0,0,8ec42c577cfc36527fd5af38ece006b20f9475083205745abdecca2ce49ff896,2024-11-21T08:59:49.730000 CVE-2024-2484,0,0,5cb9f8308022675c8287e20f9cbb0a5855b23416d0e6952dd026d326a0eb190c,2024-11-21T09:09:51.280000 -CVE-2024-24840,0,0,fa9818acd6c50ddde9f1a1fae75224111165ca55204aecce84f41df5c6353a21,2024-11-21T08:59:49.863000 +CVE-2024-24840,0,1,2e4855962f74827073bf43796e4103b0f774243de2eafb70a6fab3ec08c3e82b,2024-11-21T08:59:49.863000 CVE-2024-24841,0,0,c8af00789e244d7e2334accb9d107678e5ab5c4481b749d6b368a2dd649af192,2024-11-21T08:59:49.980000 CVE-2024-24842,0,0,71d734bdc7e9888aadb804fc377f87f4d0aa14e084a80124a283ddc10c12b4da,2024-11-21T08:59:50.110000 CVE-2024-24843,0,0,370e161acc98fe061f1d3bb53c93d59788125611eb7de858ca848f928bdaa1d8,2024-11-21T08:59:50.233000 @@ -250500,7 +250500,7 @@ CVE-2024-24943,0,0,39797c58f877efcb960a5c14e3952b4ed965705c28abbc91788b0766abbf7 CVE-2024-24945,0,0,1a32182f01b8efb3b584bcd9740c8c6b7f92a97eac5ec81f3a38816d6387c7e5,2024-11-21T09:00:02.077000 CVE-2024-24946,0,0,468678429f22b9ff544dc869777216cd46a660b0ce825beaeac5a485d888d44f,2024-11-21T09:00:02.237000 CVE-2024-24947,0,0,e1f3adb532d236777c29b078470f36fc564e3609355d97bd56bdc30dbb335086,2024-11-21T09:00:02.367000 -CVE-2024-2495,0,0,40d6d7bf95b0e3374177789d3123acdf9a82363451d9b77ceac87bc9b341ee9d,2024-11-21T09:09:52.873000 +CVE-2024-2495,0,1,bd4f8634593ff81cb17e20628f6195b87d6b1a7ff0eee06d72d356d112925df6,2024-11-21T09:09:52.873000 CVE-2024-24954,0,0,27f281006304e0bde7559c22e64f81cc8a2d88fa9268bb8e08cc4f388c14a887,2024-11-21T09:00:02.493000 CVE-2024-24955,0,0,7c3c725f782b785abdc41e9a18a46f3d7798195763d919d208c73eac1d8cd4a0,2024-11-21T09:00:02.620000 CVE-2024-24956,0,0,4c52f2ffc9e2253196f5eec94fb8b777a422b770caec3f85ebc8e11b44866f00,2024-11-21T09:00:02.743000 @@ -250511,7 +250511,7 @@ CVE-2024-2496,0,0,051579418359f85bbcda93fbe22a82cdbe6432c139ab0c0ffad8ae83e4581f CVE-2024-24962,0,0,1cebc93e4d6c3df34e57cb9df2964db84f2563e9a4c0bd93e3ff40e70b58c267,2024-11-21T09:00:03.243000 CVE-2024-24963,0,0,f9ad2b45a0d9754f789fd77f11d0d6bd197c6b1494b09d688edc3d878ec75bf1,2024-11-21T09:00:03.350000 CVE-2024-24964,0,0,f2f90e1f53bc2e9057a1ed570baa4ea348ebae1fccc952c0417838ff4dd829be,2024-11-21T09:00:03.480000 -CVE-2024-24966,0,0,af9c0dbf2b6630e97ed2577e2242c12d6098f7c81eee9923d36a735e214416a4,2024-11-21T09:00:03.660000 +CVE-2024-24966,0,1,e5ccfc0a60b4fda19863bc8d2ceaf6e29e4f65f3934bdfaf53d634ef4f5f0f55,2024-11-21T09:00:03.660000 CVE-2024-24968,0,0,400e490118c16083e36fd26c85d27bd24dddeb131874caab82b3947794aa5942,2024-09-16T18:03:16.707000 CVE-2024-2497,0,0,9d5b12a04696101a720d6a6eac03c4a25093d05e266f607e067ae28b468c6315,2024-11-21T09:09:53.157000 CVE-2024-24970,0,0,d539881e528c227f4316b7df6b7900424bfa37663985a5801663f38c22e74e22,2024-11-21T09:00:03.857000 @@ -250529,9 +250529,9 @@ CVE-2024-24984,0,0,567c9bd096a581925e3572e03ea5eeb0f022b51699fa71ede6b70b03cbba4 CVE-2024-24985,0,0,094cf98cc2834beed20248e4007d784f8f54307826d7d129d410921b97d6ed81,2024-11-15T14:00:09.720000 CVE-2024-24986,0,0,b3a0aebd140b4a87042d6dd637f5da69c8a05632aba7bbfe41c00120f8cc0218,2024-09-06T20:23:48.690000 CVE-2024-24988,0,0,74b8e9b9bae0b532768d5857c0d83160975e281bd61a0e187400101505fbc03f,2025-01-10T15:38:05.187000 -CVE-2024-24989,0,0,47235b2a829b48983692a66465ee23949950254e8806e809055cb12909af6df1,2024-11-21T09:00:05.640000 +CVE-2024-24989,0,1,a402b9aca66cddd4a6464999cbe9e050c337be7f6ecab5c12dea82314322f063,2024-11-21T09:00:05.640000 CVE-2024-2499,0,0,58df8167ded63ef11aaf8fbfc99b0704fcf662a903d318b087b95eac1c8b0467,2024-11-21T09:09:53.297000 -CVE-2024-24990,0,0,2e71c7b065f4e6a1008eadb9235e495f55c4b8557060386a7a771ac2cc1951ab,2024-11-21T09:00:05.750000 +CVE-2024-24990,0,1,ddae5e6b8f48beeb2d8fc8afb6b5ce1d9fdd894c4694e1e800a3548e7f007bc7,2024-11-21T09:00:05.750000 CVE-2024-24991,0,0,ab571423a1a6309b0495c9db088adb19784d1783badb8b28c84a771e894ba6a8,2024-11-21T09:00:05.867000 CVE-2024-24992,0,0,7e6c184fe11d55e75cf8acbe2688410429d81c016034216dd125188eaae17636,2025-01-07T01:15:06.780000 CVE-2024-24993,0,0,705a08374da6010fc88afad1a4ae031351a7f03de838c5465f09adbda3ac0c72,2024-11-21T09:00:06.103000 @@ -250563,7 +250563,7 @@ CVE-2024-25024,0,0,94dc9c631d2c500a02ba69e3d14eb503fd049554240337a94df3486bd1e16 CVE-2024-25026,0,0,55a3a6330c68c45602e09e0075b2dfc62f34bd03a295eb50853e9132b5b631a8,2024-11-21T09:00:08.747000 CVE-2024-25027,0,0,2fd12127e4643c673f529161cf53e4588b217516e68f1d873bb50001abb5936c,2024-11-21T09:00:08.870000 CVE-2024-25029,0,0,b687f5b3fdfbde494167fcb1f03a00ea37c9c79db373d46255ea84ad0b785fd3,2024-11-21T09:00:09.010000 -CVE-2024-2503,0,0,433d2cc27fa620adf97dd152aa1e9218ca3e83690f8593069761a808cc2eecdd,2024-11-21T09:09:53.790000 +CVE-2024-2503,0,1,4b065baa17858e99cd3ea1415bc34f8838da412071948a2fb813aac3094d8bea,2024-11-21T09:09:53.790000 CVE-2024-25030,0,0,3bf7cf36ab25986b6901ce978418ca57d6fa819b3639e450fc36c96ac4859d66,2024-11-21T09:00:09.137000 CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08f50,2024-11-21T09:00:09.263000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 @@ -250609,11 +250609,11 @@ CVE-2024-25093,0,0,7eea3dec9b90b62623daebdbcc4923466ca6991fde5a27887c5d4f8426d84 CVE-2024-25094,0,0,b63b8f62d0827941191e3b3aa61420ea3a1c039d7fc072b71ce975f59e97a833,2025-01-16T19:09:37.237000 CVE-2024-25095,0,0,071a0e893adddaf4c8990d871a79da8559ca8c6ea36cade0ecebd8aa372d85e1,2024-11-21T09:00:14.823000 CVE-2024-25096,0,0,0a4cc5cd62670b48a96aa834592cda92ec1e730262eea101c7c43d0039d97bb7,2024-11-21T09:00:14.980000 -CVE-2024-25097,0,0,7a17da446a848067f64ad3beae0e132d38a7be4b81df383c2647d487431ce055,2024-11-21T09:00:15.117000 +CVE-2024-25097,0,1,5d5f2b1eb78ea63d34a8393607619213d6366bd75b238a4bc52c1b95f7365602,2024-11-21T09:00:15.117000 CVE-2024-25098,0,0,7bf87938eb91bca7e97e4122242d148928aacfe0d777197b7862273045d7154d,2025-01-16T19:05:08.543000 -CVE-2024-25099,0,0,615985817d4928ef2f628a9a30cadf3944211895cfb756d386fa2ca42878b0d3,2024-11-21T09:00:15.380000 +CVE-2024-25099,0,1,14e3ea7e4e5685ff73373922001943352ae99a88199633aaf75b6c21e58e4f82,2024-11-21T09:00:15.380000 CVE-2024-25100,0,0,8dc073ebeeb5612406a0fe85c3411871bfb7fe05e8295087ca6b4b8d7e3e94d6,2024-11-21T09:00:15.510000 -CVE-2024-25101,0,0,f6eae5cdc9347ef48e0c334d1510c71ff7e0607305767168b86b63d462a9fcc3,2024-11-21T09:00:15.643000 +CVE-2024-25101,0,1,21c0fae0873f9fa9788161fc9dc30ef70b5ca11b43ce2ff41642bcb775fed87a,2024-11-21T09:00:15.643000 CVE-2024-25102,0,0,98243b3d3dd1db310b96a1b32ef1013b75708eb3fa2c31104e2846a72b154bf4,2024-11-21T09:00:15.760000 CVE-2024-25103,0,0,04ad0c657e86fc33c9625cc46f0dafc37956feb152f4424ae24f7592d34147a3,2024-11-21T09:00:15.880000 CVE-2024-25106,0,0,66eff9626b718efb5f88d47ae7bc58f81822abea71ddfae386b1b779956ea89d,2024-11-21T09:00:16 @@ -250663,14 +250663,14 @@ CVE-2024-2515,0,0,44f3fa018c3519699334cca505032d6c5d3c8e2affb7c2ada212e4ff428377 CVE-2024-25150,0,0,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000 CVE-2024-25151,0,0,0b01c254dc10f34581a176a2dd1392ead139db1f1f92ec88900940bbbe02d51c,2024-11-21T09:00:21.530000 CVE-2024-25152,0,0,c4883d942930ec99a7ece74f3181fc32c370260063ba88e828c32188ee6d7978,2024-11-21T09:00:21.653000 -CVE-2024-25153,0,0,28781d25e5c087d6ca5fbaa17986781f84cb0a151f81a7762bfeb961d739885f,2024-11-21T09:00:21.797000 -CVE-2024-25154,0,0,f0d7c15078fa83eba62a6d13983ab574d7a0c54912d81a4b5254fe63dfdfe740,2024-11-21T09:00:21.933000 -CVE-2024-25155,0,0,b69c566af9493742d68ca232ea87bbfa7c62031f379bfdf008b81a442bd185f8,2024-11-21T09:00:22.067000 -CVE-2024-25156,0,0,8892792533b07a9388ee9406cf0cdb53d77b8f7cc7cb7051e32060fc4bcd7393,2024-11-21T09:00:22.203000 +CVE-2024-25153,0,1,fb02f17fcbefa177fee2e21377746f4bd87b5fac212699b2e55645eff883979f,2024-11-21T09:00:21.797000 +CVE-2024-25154,0,1,6552e6574e77c127d449f53be7628c832d98f1cd524f07804c437d65ccf1b1cc,2024-11-21T09:00:21.933000 +CVE-2024-25155,0,1,03f0c4b09db182c2e392b70ecb03d20345fbd8679bbbf96c9f61d8972b2a0ef9,2024-11-21T09:00:22.067000 +CVE-2024-25156,0,1,455fc0dc8eaa20078395743d60edad998281e5ee2b72229ac80ac2d07374ece2,2024-11-21T09:00:22.203000 CVE-2024-25157,0,0,b70385b233eacac3c5d9d9d5477e3e8a95d4ead7ee037df905caab5d3e171959,2024-08-19T18:57:58.657000 CVE-2024-2516,0,0,abd58d1cee01d58633a09e01fec53c76d8c86e8c2e494c725dccb7f354b35029,2024-11-21T09:09:55.273000 CVE-2024-25164,0,0,eee54783d2d6bfd262ee8b281adf3cb7c0b25d88225f6d68f860ad59977da6c4,2024-11-21T09:00:22.493000 -CVE-2024-25165,0,0,34ccb8f611c9eed2b4046ec9c151baed2b23947bd5510088ac3520da358802a9,2024-11-21T09:00:22.717000 +CVE-2024-25165,0,1,7c7f47e7bc83c48f0b6b83f12869667aa2deb29ed4294425f3ed1cea3197a218,2024-11-21T09:00:22.717000 CVE-2024-25166,0,0,d65d60bade9b69cb76854592f67ba61d52edf8bca7037b9f05c53ea22da07c20,2024-11-21T09:00:22.937000 CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0d07,2024-11-21T09:00:23.153000 CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000 @@ -250715,7 +250715,7 @@ CVE-2024-25223,0,0,904104134e762e2c1542946c70886d3b3703a261ee7e18cead6c76d2357c1 CVE-2024-25224,0,0,60ec5b236e5bd9776df84b7ffa2cca7718832d60e1e66b524a3b495a894a05e8,2024-11-21T09:00:30.293000 CVE-2024-25225,0,0,fa3f0a9746172ec72928144f73e3bc96fd4ae6bdeaa1ea2e092201b400d63231,2024-11-21T09:00:30.460000 CVE-2024-25226,0,0,61507129829112c9ca147876d8ef7a76eefacf655e65566512dc97486c33b6f2,2024-11-21T09:00:30.627000 -CVE-2024-25227,0,0,ff61ac46d6cde56777551361255e155834df2cd880381108a6c5ce15a5c00eee,2024-11-21T09:00:30.813000 +CVE-2024-25227,0,1,b973fc422a2c5e4c361f29db90f9e387cd0219d4f96c1374e01a31c810336937,2024-11-21T09:00:30.813000 CVE-2024-25228,0,0,3f8b8b90a475931a022fce6ad96b33e0d7743a1b36b24664692106a8d55dfa6b,2024-11-21T09:00:30.977000 CVE-2024-2523,0,0,b33692c7258a9b01b62c85de309ec896c891eb475dc10cbb4251c072041ee2e3,2024-11-21T09:09:56.250000 CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1a07,2024-11-21T09:00:31.193000 @@ -250746,7 +250746,7 @@ CVE-2024-25288,0,0,38218632e649898aa9cfb0d0c7bffa67d5b4699381a2842eb82dd347454a5 CVE-2024-2529,0,0,7bed1a78cbdcf81994025f6fc4b67c9eb438ee3d35cd9f3daece0691d175f96d,2024-11-21T09:09:57.057000 CVE-2024-25290,0,0,35a48ca5a622e094bd31621eeb7b60a8ce0e37e115c0a197c45f71405831ee4c,2024-11-21T09:00:34.240000 CVE-2024-25291,0,0,ba7c4ce1e37aa8e24b394ec2f91fed6d0c84aacadb9e83714fd1d90b98266610,2024-11-21T09:00:34.457000 -CVE-2024-25292,0,0,a19199631699bf59a4064005255486de1298c62d64acc8a8ffc937e6caa3407e,2024-11-21T09:00:34.680000 +CVE-2024-25292,0,1,09ba7a0cf03596fd5d60bebd7613943c4f20816dcdc837adfbc77ed298f4ec08,2024-11-21T09:00:34.680000 CVE-2024-25293,0,0,85561e1f8c0397872a3690c79a54190ab513deff632dd15d08724cd294257698,2024-11-21T09:00:34.823000 CVE-2024-25294,0,0,548c06e67bc118a6fa5feec4c8fe3ecd605a03dc361470c0aeb4866e475c38a0,2024-11-21T09:00:35.037000 CVE-2024-25297,0,0,a5e886fa4ef1133925f78074d5887ee6bf7505c42983811cbe1a106b4c6fd254,2024-11-21T09:00:35.267000 @@ -250789,7 +250789,7 @@ CVE-2024-25360,0,0,e089036b5b01d137197b9a6e98d6b65bdfd97c49cd47a370e756821b6a4c1 CVE-2024-25366,0,0,bf9f988e5beaaf7037d5fc5d41f1eb493cdf15de69761504441d1ea806f128cd,2024-11-21T09:00:41.110000 CVE-2024-25369,0,0,1a5279686e5277f0474570d04c1907565b1c826db6e265d9d5232bbf5aaaad58,2024-11-21T09:00:41.330000 CVE-2024-2537,0,0,245581af9cb0004fabdffbfca72e0fda0e6cf99c56b5dfae5408c1dd2468d6fa,2024-11-21T09:09:58.103000 -CVE-2024-25371,0,0,c2e408d488c77447148fe087c1e0289385512dab3594aba099b619ceccf5d43b,2025-01-14T15:15:14.490000 +CVE-2024-25371,0,1,02370958f1fcb5a2b09fff3d567983d7c7d1e4ab210b6dca6193d9dd108edb58,2025-01-14T15:15:14.490000 CVE-2024-25373,0,0,d4bb0f33d1aeb2a5a53c5ed2764be7945bf1d210aae7d091cb88bf312c0ab5f9,2024-11-21T09:00:41.553000 CVE-2024-25376,0,0,b9162f08a32a4213913d51b909fda1191d4711871cec0062f7a25dc6ad917cb9,2024-11-21T09:00:41.780000 CVE-2024-2538,0,0,18ba10814d39428e8d5577752d8b03a64068541821e5f9329f304872357fbfde,2024-11-21T09:09:58.220000 @@ -250850,7 +250850,7 @@ CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000 CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000 CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000 -CVE-2024-2547,0,0,d51d6810aa146e933146766a166169fe2343ecf22475f64c42ecbdb23ae82c57,2024-11-21T09:09:59.170000 +CVE-2024-2547,0,1,90d41a91a54e213f02614de06ba4c678c4303a08116eb3638a1bbb2663fbedeb,2024-11-21T09:09:59.170000 CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000 CVE-2024-2550,0,0,2d2df85bf011e59207527946e6d118ad16cdeb5fbed94fcf3f161a8c84ebbefd,2024-11-15T13:58:08.913000 CVE-2024-25501,0,0,39a441609204709047cecad828c175f01310d82b43dc4ea230772a5942f74b33,2024-11-21T09:00:51.913000 @@ -250911,24 +250911,24 @@ CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e CVE-2024-25576,0,0,95b8b2fe29c3b8fa31fbe37491add9737a675d1ce27c7ad5d9b93d6c253067d8,2024-09-06T20:17:14.003000 CVE-2024-25578,0,0,cd7bc684525a22b1c5771942ff4ae262fdc7036bf854cdb96ec3e2374a3eeb34,2024-11-21T09:01:01.047000 CVE-2024-25579,0,0,53dc5740ced037e66b1a2ba8c7a85647afdc0321b2de6a97263699799a9bccc1,2024-11-26T08:15:04.400000 -CVE-2024-2558,0,0,f118d41c2055c5ed2095d5ac5de07a771edd70946983904e27b861f0f051c0fb,2024-11-21T09:10:00.450000 +CVE-2024-2558,0,1,4c290bc425a5a167cdd2127e86122f516379dfb57df269146f8c6f2f4c616487,2024-11-21T09:10:00.450000 CVE-2024-25580,0,0,c4b0afd79a1474589c375c8ffabbee3d018fad8e4c0933a7f12523ed1f4b9156,2024-11-21T09:01:01.400000 CVE-2024-25581,0,0,d9cf41000e40894e1e57e66e69bd839bdf75b2cba10804a3bcb1ccd687a5175f,2024-11-21T09:01:01.620000 CVE-2024-25582,0,0,14689a0079cb9d91c28249ad9323f9afd0c6579c6fd0dfae82c9052534820133,2024-08-19T12:59:59.177000 CVE-2024-25583,0,0,ca939b3dad6e6f74b1ff49a658bdf716ccdd446c737a5cdf17f568d1249b9dd1,2024-11-21T09:01:01.823000 CVE-2024-25584,0,0,7a4aedd8c8bd4a4f6cf57e5a5b34fefd3a570c6f165ab147cc791809cd369790,2024-09-06T16:46:26.830000 -CVE-2024-2559,0,0,66bb36fc8efcfcad114adca247256d9703c4b0503a8b5c001dc075ed28cd9401,2024-11-21T09:10:00.610000 +CVE-2024-2559,0,1,125d50d052f7ba4d30e7ac796be0d551aa5c6a8224db7ab8c7c361c5513d8486,2024-11-21T09:10:00.610000 CVE-2024-25590,0,0,8d02885f747c962ae03bad6ccc691cb5a7f3c754a0055c180ff7ee84094108bf,2024-11-21T09:01:02.033000 CVE-2024-25591,0,0,fa8458e4721010bc4a3e953326e37e290e504ea9adf2514e3f0f84525f97c3df,2024-11-21T09:01:02.157000 -CVE-2024-25592,0,0,865a4aab98f8041c06375de913ca332fedb465824f217f7b9a99dc356ba22ada,2024-11-21T09:01:02.277000 -CVE-2024-25593,0,0,d61b427c407bad40f1d7f7d80ca13d698d00a4438fb1569ef7693a46484c82c5,2024-11-21T09:01:02.400000 -CVE-2024-25594,0,0,9d288f048c9e378ebd8a7500af200b65893b6b85ca9ff79d951837a473e93609,2024-11-21T09:01:02.513000 +CVE-2024-25592,0,1,bf19b896bd9433e3d57dce279c27cc399891f4a322e824c1668acfa22d188e00,2024-11-21T09:01:02.277000 +CVE-2024-25593,0,1,036df1b7b9a4c016cedc8bca30e422314e25dc026b9f8e93ecea00c4c6683a0f,2024-11-21T09:01:02.400000 +CVE-2024-25594,0,1,2f88e7fc8c19a000bb7c170e99741ad5dac59c9ed6c2248210c9bbe7ce0a127d,2024-11-21T09:01:02.513000 CVE-2024-25595,0,0,b4e17d09d0f1dc51f7c33882dcae6e7ef76ef7c8af61e8dfb146895abb475440,2024-11-21T09:01:02.643000 -CVE-2024-25596,0,0,47130de47bfb0784a6829e05a98a09f67aaf5901dca7056e8ed0f34c77ddebda,2024-11-21T09:01:02.780000 -CVE-2024-25597,0,0,db4348d20a66663e41b98b7c5d05cb81597a3111049d70f4f95f76e136042585,2024-11-21T09:01:02.913000 +CVE-2024-25596,0,1,6186618554109e3d2a029dee7ff783ca6bb5457223dc35a27b1e9213b1e2e5f2,2024-11-21T09:01:02.780000 +CVE-2024-25597,0,1,d6753bcf92b2b2cb17d0603d676eb65cb5ad229f296f95c507cc7b74d6441098,2024-11-21T09:01:02.913000 CVE-2024-25598,0,0,d1a1805c77bf344303a6352c38a2d681b3301f1209882142cd84bf98bb95feda,2024-11-21T09:01:03.040000 CVE-2024-25599,0,0,1e405853502d37a32519454e3bbc96a90c793cbcb44778a175a4f144b956282a,2024-11-21T09:01:03.180000 -CVE-2024-2560,0,0,818d4b894152c220c07e675bff0636f68824fb9fcf1d9ba8478d47c23509313b,2024-11-21T09:10:00.743000 +CVE-2024-2560,0,1,5d006437181537550ba5f010993e8db34562f6948f1e46f92d03dce5a82ba1d0,2024-11-21T09:10:00.743000 CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a35971aa,2024-11-21T09:01:03.307000 CVE-2024-25601,0,0,592b72e8287af6c7a3150c0f52361c80173956d1cbaa844c63524e684c186930,2024-11-21T09:01:03.450000 CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9400,2024-11-21T09:01:03.573000 @@ -250955,7 +250955,7 @@ CVE-2024-25620,0,0,3242825c0355f9f35c07a4b629a4a478687338f127cdab33ebd2096721a4f CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000 CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000 CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000 -CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000 +CVE-2024-25625,0,1,5cc90678dde97da2589a1a0d3599bc3f52e0625b9e2172e9700aa7de66246445,2024-11-21T09:01:06.387000 CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000 CVE-2024-25627,0,0,7cbce9e513644e3e2bc69141c068497c8530550daae3c8ffcfeb9fb3cc079991,2024-12-18T19:34:36.927000 CVE-2024-25628,0,0,7e120fb8d8628e240dd092a683ce7920f893f4e4925ec5e71fd9cd00ee4291cf,2024-12-18T19:43:00.970000 @@ -251015,19 +251015,19 @@ CVE-2024-25694,0,0,9aea7ed506f3e75701da5f8d91f5126ddb9fc6039a2cfaf95eafeb4edbb1a CVE-2024-25695,0,0,dd69ada188cfe555126eccfc8160d5342bb635827d40f664117ae84700fdfe7e,2025-01-08T14:32:59.223000 CVE-2024-25696,0,0,d5a9136c1d8f99bf95f80eb21266c5f45a51ff0365b75c1e51382b7ec2cfb6a2,2025-01-08T14:30:29.987000 CVE-2024-25697,0,0,a267efec5273910cac3ec9498c584553301da7dd464ae170402e82473ed69618,2025-01-08T14:22:09.017000 -CVE-2024-25698,0,0,0466a346f2cd6e5ba0f3d63bd5230693cd01ab3f12a9782ac0dfaddc8de80249,2024-11-21T09:01:14.170000 -CVE-2024-25699,0,0,9b3060f266007e9b9f0f500b677bdb9c7b84bdb08f418e44887436ffbd9784e6,2024-11-21T09:01:14.283000 +CVE-2024-25698,0,1,19eb454e81d3c195c657f5c68a39132668f17dce0e38c56018a5f756122188c5,2024-11-21T09:01:14.170000 +CVE-2024-25699,0,1,a504f29e6715a9f4cf15669b900042e866e6989406ef2bfa7e7be1669e7997b8,2024-11-21T09:01:14.283000 CVE-2024-2570,0,0,8904be72da1cc04949bb577192b9c0d2e6811b77e6cbf72d6c39d9361754ea4c,2024-11-21T09:10:02.120000 CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000 CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc54d,2024-10-16T21:00:36.173000 CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 -CVE-2024-25705,0,0,8f7f68cd9f340fd1839fdb99e45a2a52528b2018ad9d801ce07fbb022804f7ac,2024-10-10T12:57:21.987000 +CVE-2024-25705,0,1,4c85f2126ead3ce3c0774776e6bb6841f004ed364727d984d7e62e5cc1e3ce5b,2024-10-10T12:57:21.987000 CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000 CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 -CVE-2024-25708,0,0,68c9390638f6220a8a747f45f94bf4ae8b6c1bbc385eb469c159bfd10cf1ca30,2024-11-21T09:01:14.923000 -CVE-2024-25709,0,0,31489fbef83fb265c90fba2ad01feb192daca17cb8946a88d5b798b413e187b5,2024-10-10T12:57:21.987000 +CVE-2024-25708,0,1,25e086ffa0a81a3b857b32e708535a968457dcd6409ec723a476e9b2d66d5b65,2024-11-21T09:01:14.923000 +CVE-2024-25709,0,1,1c5bc6838c0059affc01d3ce989bb9e8ae06fe6dfe5be1540360742d558d4709,2024-10-10T12:57:21.987000 CVE-2024-2571,0,0,b29b266277adb21ced6590b6766850aaf4a1b8696efe1124ac983a0d3d7a3e6f,2024-11-21T09:10:02.260000 CVE-2024-25710,0,0,14c488f94704110bccb0ebc194fb3de52b81c1368723fbc1d3df69c3748109e4,2024-11-21T09:01:15.113000 CVE-2024-25711,0,0,6b07db62ade2bc0114f28a2e5cc5709d9d183c15244fc22f9067859e0e6f014d,2024-11-21T09:01:15.250000 @@ -251109,7 +251109,7 @@ CVE-2024-25858,0,0,a77c4e8bd8b75d30f14ed1903eaa31883fb836c272ec5e4d5c204f2a26cdf CVE-2024-25859,0,0,34b3066024d487e69b7e4402052d02a767e3807f28bf8d04e6b68bff8e2c3131,2024-11-21T09:01:27.973000 CVE-2024-2586,0,0,517bba0b02d6a5f2d5035c9d7b1f552ea85557b35786444819e5125b6cb911c1,2024-11-21T09:10:04.220000 CVE-2024-25864,0,0,b2af6591b1b1a6a5e3db12699a98829bbd31e7d47d61ce5e5d10cf491516d67c,2024-11-21T09:01:28.197000 -CVE-2024-25865,0,0,657f361215e36bcfa05aea042a0a6e681c3badcd19c106e4bdd2db8c25ae46b0,2024-11-21T09:01:28.413000 +CVE-2024-25865,0,1,6beefe1e30022fbb9b79ba73d17d8b3910dadb71644f844d26cdb1d53619dd67,2024-11-21T09:01:28.413000 CVE-2024-25866,0,0,cddbbd2f3013eb33e91e4d0d1121bc9557a1a9dcbf91365570d4368c1e595cd0,2024-11-21T09:01:28.557000 CVE-2024-25867,0,0,7190dee4840a49c0d81ca168a8cd706377a28f7064001113cf3217761a5e1f98,2024-11-21T09:01:28.777000 CVE-2024-25868,0,0,cdc6b4e4ce936f80eebf0b0a159f6e0b763778bd4194f25caa815e810b4d0c36,2024-11-21T09:01:29 @@ -251245,7 +251245,7 @@ CVE-2024-26005,0,0,ab8dec86b835a1025d9007a91813d1fb4ad91c2949fe7b6a778b69a8a5e19 CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01156,2024-12-11T19:55:59.830000 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 -CVE-2024-26012,0,0,7643cdf3fff5394f6b847987ffcd78802404787b2d7068c3292d6b9f572e0545,2025-01-14T14:15:28.893000 +CVE-2024-26012,0,1,b20b22a750383cea6aadc33dcd5cb28351e43991396060bdaa1939352b4b855c,2025-01-14T14:15:28.893000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 CVE-2024-26016,0,0,2610bd296695018d3e38024798d9b1b7a39a4da11d75be17fe8b8abc7a84b7e3,2024-12-31T16:27:58.487000 CVE-2024-26017,0,0,11d040a25f5c2d5c2e1e2401973b3159ea6e8ba153c9a2238d873c2f164fc160,2024-11-15T14:00:09.720000 @@ -251558,8 +251558,8 @@ CVE-2024-26313,0,0,e95d02de1d4052be713c0be90ef61847e38271af8acd03c78fcc8ef33c2d3 CVE-2024-26314,0,0,16b14b790b204a9dce3861ce2b360799ee7dfafcd5ac190bba6e667b6569b4c3,2024-11-21T09:02:21.567000 CVE-2024-26318,0,0,906eb8b230325eda251dececda86313ac591223ac614c32b0aa55e4dcc7ca895,2024-11-21T09:02:21.757000 CVE-2024-2632,0,0,300d9ac42b8f019a855e8e9024543531f20a59a664cf33a5a9a35b4647186c67,2024-11-21T09:10:10.750000 -CVE-2024-26327,0,0,3dff98487a61e5d3abac20bc292c184e35ce7d9ae48a01151a269eaea3d64703,2024-11-21T09:02:21.927000 -CVE-2024-26328,0,0,8a367d67bc87648ee9ac654b67366b389d065c4d3eeb5e48429c5388385e32c4,2024-11-21T09:02:22.160000 +CVE-2024-26327,0,1,72a77ae0b6d90693319dc4a70872140f4bf0e1116dd5bbfb2cdcf10d61353777,2024-11-21T09:02:21.927000 +CVE-2024-26328,0,1,a64b1353b07e99a2e45a3b2e7810fd86f0c0fcc416b504575e3dce4572d38712,2024-11-21T09:02:22.160000 CVE-2024-26329,0,0,220d0b86ce94a766397733f6ce3a3cf797489720133134e3ff765be44ac0f65d,2024-11-21T09:02:22.367000 CVE-2024-2633,0,0,34e287e3b165005dc093379b5285b328642852573ae2cefe2ab0987f5b28ba29,2024-11-21T09:10:10.873000 CVE-2024-26330,0,0,c46c610b23495d4faa106b5b245b71ada340c670fa8084ba1f5df40f3c1ef570,2024-11-21T09:02:22.580000 @@ -251606,7 +251606,7 @@ CVE-2024-26470,0,0,5a3a0e9bead74d3ad7a801ce5e989377aa1e8dd86cc9c2c97b389b1c343e6 CVE-2024-26471,0,0,14554bbc2c0b5b2a0502a2d3b4b7bfb2b94c413a02c7f7a3204a15c12b0d588c,2024-11-21T09:02:28.273000 CVE-2024-26472,0,0,886a2fc774cca6e7209753367afa5a190bb62651cd1c25e70722074ee21261cb,2024-11-21T09:02:28.490000 CVE-2024-26473,0,0,00fce609accad83d07750bd45b1342c1c6ea4b9d7793b3dfa144586b59ed3298,2024-11-21T09:02:28.697000 -CVE-2024-26475,0,0,2171f75ad207ca26420669e6a6eb14e2e5e8bca9110a19f557bcfe46d1a57156,2024-11-21T09:02:28.907000 +CVE-2024-26475,0,1,c14c0d45dc07594588f5cfc0490631a6bf1e9562f655960578b5b74a00c293c4,2024-11-21T09:02:28.907000 CVE-2024-26476,0,0,8d9df15e765bbf5a9750f7a0d9952d7d99b32a5699906b57f431687265856ba9,2024-11-21T09:02:29.043000 CVE-2024-2648,0,0,09b0142db1667bc19ce319320dde5629f04d7e5bb636ca0fbce01c22490a86fe,2024-11-21T09:10:12.637000 CVE-2024-26481,0,0,27cd2dd704778bc0c175f0416f8065c950331ff365164eeacdcc041662290a87,2024-11-21T09:02:29.270000 @@ -252210,13 +252210,13 @@ CVE-2024-27093,0,0,a9117ff9166b3c38a135437a4bd5a746636b446143bf8b313342e0657b083 CVE-2024-27094,0,0,574201530a99a0d9932b44c50c32630975cca1ba28f4581b17fbb77dec7e452a,2024-11-21T09:03:50.780000 CVE-2024-27095,0,0,78a1555294ea358b8152550a2082da91e49d92b932991be797dbd3c604913e80,2024-11-21T09:03:50.910000 CVE-2024-27096,0,0,ff3b6eeb112a372181ce06d11a8e55e4a7fd78dae9c02ff45f77b3fada3d7dd8,2025-01-02T15:54:08.883000 -CVE-2024-27097,0,0,275ffd2044c7c91ef48ab9e8697562be8cad3e8c87f8ebee381769e17f66f059,2024-11-21T09:03:51.193000 +CVE-2024-27097,0,1,d85aa93394e4e680f75a9e7264651af7c470750ef9b9889adca401b929e256b9,2024-11-21T09:03:51.193000 CVE-2024-27098,0,0,1499d8142df4344f103b85f95cc2fa30ec1684770d1db46e09f4809fb5d9d86f,2025-01-02T15:53:19.737000 CVE-2024-27099,0,0,f7b30e990d7c353aafd3fc8896f44f834c33a48c7e4370e410a9218f97f05f99,2024-11-21T09:03:51.437000 CVE-2024-2710,0,0,001269c32b1f0eb15da92a265d34f54cbf493f381bf937b59ddbde30025a682a,2024-12-12T17:30:23.267000 CVE-2024-27100,0,0,8508ad18190a019203604be481303560b90631fee2ced04d03ca66167b3e3a17,2024-11-21T09:03:51.563000 CVE-2024-27101,0,0,742992fa71b398a15715e3e520dbe09c308c4ac568b904be7d12d66735db88b8,2024-11-21T09:03:51.683000 -CVE-2024-27102,0,0,6c12cf63c12d22ea915cc227e9583e7af4cd59244b4b118acc8d47c0ba4db88b,2024-11-21T09:03:51.810000 +CVE-2024-27102,0,1,4214ff49390fc55b61a2e52298733e2e6253ad82ef3acb4e237091d133a44e3b,2024-11-21T09:03:51.810000 CVE-2024-27103,0,0,6c2b0da25f22638b08226af47ff2302601407bb5f3428815095b8a7e33c94670,2024-11-21T09:03:51.940000 CVE-2024-27104,0,0,296bcf5d7d6dc8aaecd81b67cdeded1f2d656b6f969294f2b54d7ab465e63900,2025-01-02T15:47:16.617000 CVE-2024-27105,0,0,0fbed232247dda846235fafb02a8788a6ac3b74045ce4a3b4e4c30589d2b8297,2024-11-21T09:03:52.220000 @@ -252245,7 +252245,7 @@ CVE-2024-27130,0,0,c9d6b28e2a18273de881a42f0dd25c4fe8494c26ad6475c525d0437de22d4 CVE-2024-27132,0,0,da7791e849fa4bdfb90720dfe9c2040ab21c79cdb9ec0c6e6db0e47979ac5457,2024-11-21T09:03:55.010000 CVE-2024-27133,0,0,528b659e9485f935780afb7c055fea428bfd20bcfce58430300f60cb7faf138b,2024-11-21T09:03:55.143000 CVE-2024-27134,0,0,10536f2c6cec2d014c78c98ff1034c300c2e1bbf125cdac8c205d1c9fa4af632,2024-11-25T14:15:06.867000 -CVE-2024-27135,0,0,bb17d508060dbe2a9d56418a8cc58737ca8af4d72f491b1a085bc1533177c0a5,2024-11-21T09:03:55.270000 +CVE-2024-27135,0,1,249bd83d6faa31f9be0c60ed0834bd7d41455f59453e7696691b7627646e8f7c,2024-11-21T09:03:55.270000 CVE-2024-27136,0,0,bb37721f8ed99b1ce670c8cc12d36d4a8ef9b3720f3c4a42663714f551f679da,2024-11-21T09:03:55.410000 CVE-2024-27138,0,0,6de0692168ffb8321db4d7a75bc11e70c526c15c151f740bb19b59afdf3d020e,2024-11-21T09:03:55.543000 CVE-2024-27139,0,0,0e47c700de8536bf68cca727388be88ae3266f1f9250f903b9607229f69d3631,2024-11-21T09:03:55.740000 @@ -252409,7 +252409,7 @@ CVE-2024-27301,0,0,0dc0e7fcca77305d1b07d51dc5d6e87edec76f4b67ea0b4c91144191fc73c CVE-2024-27302,0,0,1126d35a4a36c0394d9e8298833cf3f9ca789e1f50e656755905c9a44280507f,2024-11-21T09:04:16.990000 CVE-2024-27303,0,0,446eb07103109107a6b5cb1a7ac6ddf2d6869e3efe4680886a25ae0d19a80f11,2024-11-21T09:04:17.120000 CVE-2024-27304,0,0,6d9daedacc8a33e2d7baab9bf30efd010b154dcb9215fa336d95f0244e4ac2d9,2024-12-12T21:15:07.677000 -CVE-2024-27305,0,0,714cfb69343ca2d3ee7f99ebd324caf6cfe34af8693ef689cbe5839005abf492,2024-11-21T09:04:17.380000 +CVE-2024-27305,0,1,0d0d80e5ff3c51365bd80b1ddf136e0cecee1591fdb3961edf8408a2473717a9,2024-11-21T09:04:17.380000 CVE-2024-27306,0,0,7a28ab142666bcaf42530dd089da65a8aca11e816370cd89a9870260ca5d05b6,2024-11-21T09:04:17.527000 CVE-2024-27307,0,0,cf618de8ec42069f47b1c5022714176e378177129a4fe94cef62bc4f79ac235a,2024-11-21T09:04:17.667000 CVE-2024-27308,0,0,37f214bdd3eae19c6ca746aa11f3f3b092a842a3922749c87981b4f4a93b4ee5,2024-11-21T09:04:17.800000 @@ -252422,7 +252422,7 @@ CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d02328 CVE-2024-27314,0,0,c7800ff43b3dde4e64855ff4c8e9e09054f2d9523de2c8225fcf94e9bdda5465,2024-11-21T09:04:18.717000 CVE-2024-27315,0,0,d76b0fcdba6f7b4b207cb9b903ce70dcff45e546dcd16fd74a8323c6a63e3929,2024-12-31T16:16:15.510000 CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079f16,2024-11-21T09:04:18.993000 -CVE-2024-27317,0,0,b8cb397c1dd25df8528d924f4a62d807beeea4e76cb88f463ebe43293b5fadac,2024-11-21T09:04:19.237000 +CVE-2024-27317,0,1,e7e6f6949784bf21f786249ba92406ed0865e9598634b9b253d6fd60598f394a,2024-11-21T09:04:19.237000 CVE-2024-27318,0,0,a39bb4bb6ceefb9dab21937c537b420423d8cb9a6ce6d647023eb496b3d6b5b8,2024-11-21T09:04:19.373000 CVE-2024-27319,0,0,ba43b558a916cdc8ea2ffc9143a26e8f5c9b0fd690315b9a58ed0750f77418cb,2024-11-21T09:04:19.507000 CVE-2024-2732,0,0,c53ca86f62810bb8d7151754be48472811994b863d082d4f89a0e05dc2c7c2e4,2024-11-21T09:10:23.810000 @@ -252583,10 +252583,10 @@ CVE-2024-27489,0,0,78ee1fedc02b9f3ce3432e0dc3d893730dda61f66b16c4dc8fb7a226b2173 CVE-2024-2749,0,0,f7099dff410859e56bea7c08e1757e94d389a4f8afbe4d8034eaaf9a5811203d,2024-11-21T09:10:25.843000 CVE-2024-27497,0,0,62f599a501b5cf4655f3ce984b75800709d12bba5ed8533f5e10f5fa43687f31,2024-11-21T09:04:40.573000 CVE-2024-27499,0,0,6ebf2413af9b8161e7bc930acfe2f9e91308d15314e4c0178aadceb1a45b0b78,2024-11-21T09:04:40.793000 -CVE-2024-2750,0,0,fa5628c58ba07af58d112e6597b1a092b6b1ce5596e3656d290f54b5a8019844,2024-11-21T09:10:26.033000 +CVE-2024-2750,0,1,34e73459a8fc08ffe7d95f83fc87220aa012791c76cf59ba5d1c19aa773aa551,2024-11-21T09:10:26.033000 CVE-2024-27507,0,0,14230983f8b7c5b4991386618175ccf29a0bcb5a8c4231dfa55ab7be6d0ec71d,2024-11-21T09:04:41.003000 CVE-2024-27508,0,0,01dd0be44ff9b2d2b7bffbdc4bf1608e07f98eb2f01050faeab4938cdacaab40,2024-11-21T09:04:41.233000 -CVE-2024-2751,0,0,51cff601e8ea6cfee3fe3dfa9937ae3d8010aa7433ad9f2ec6648b77fc7092cf,2024-11-21T09:10:26.150000 +CVE-2024-2751,0,1,e68d8460dee09e11b88fe901e5a3c115b8456fafc7f3502b43f8e3ff6b626004,2024-11-21T09:10:26.150000 CVE-2024-27515,0,0,7a60d945962f42e82b8cedde4e0f599a7ec8fa86b07c648e7efc6bdafb4fab08,2024-11-21T09:04:41.443000 CVE-2024-27516,0,0,6be3a269b6245193a6844f91cd544cf56f6cc248ac9c97a44a0b76c9d09a6f9d,2024-11-21T09:04:41.653000 CVE-2024-27517,0,0,61bba897ef6c7df8c717bde8dddefddaaf590b57ddb936696ecbce893483c7aa,2024-12-16T19:26:43.387000 @@ -252720,7 +252720,7 @@ CVE-2024-27773,0,0,9937f907ae86df124158e0d3d02b2f6a356bd36428cea000a9bdb98a6113f CVE-2024-27774,0,0,307f48a7716a730e60d75be64dea775aaf45a608fbb3ab8fba2c3652139b9ebe,2024-11-21T09:05:02.147000 CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000 CVE-2024-27776,0,0,ef49ef17c1210e0ed2c1ff489a27f0662db66dc8a6e90113cd624459aa34be3a,2024-11-21T09:05:02.433000 -CVE-2024-27778,0,0,cc407cb1cc3a17c1f81a5a000d90559c967fc40caad20daa7846eed43a5ad2f6,2025-01-14T14:15:29.053000 +CVE-2024-27778,0,1,1dfa96d3d5f00d773af037c82a8cf9dab452bc24fafe7e2396f112dcf655e314,2025-01-14T14:15:29.053000 CVE-2024-2778,0,0,da9799ba1a896260f3966e85cd8ba6bdf1155e8b3eb8fb7ffe9ea6d0361cc9d7,2024-11-21T09:10:29.870000 CVE-2024-27782,0,0,b01afce97382f5347b598b12017d99ef6ba8abe65ad6d5215e9994d037f58038,2024-11-21T09:05:02.573000 CVE-2024-27783,0,0,f4ab6f1bc78e2b58465d6941ea5ba1a40edd430586869d7f6403e5f08823a681,2024-11-21T09:05:02.727000 @@ -252781,7 +252781,7 @@ CVE-2024-27836,0,0,cbc2d84b81c4d8680b3e2ce71e679c4626236304b018eec892d9a66d50b30 CVE-2024-27837,0,0,dbe00fc9ad9cfd5169a026b6dd14e56e505a786293836f85ce62ef635b022b41,2024-12-09T19:50:49.497000 CVE-2024-27838,0,0,f48a4ff4fde890aeedd51ce8d5c4a8dd37d520a0fe71173be2957a5d08c5e442,2024-11-21T09:05:14.337000 CVE-2024-27839,0,0,25de2ffde9540eeb3dfd6497c179aacaa009bc4d2b387bc139e8b6349aa09d8e,2024-12-09T19:49:50.323000 -CVE-2024-2784,0,0,701ccf822ee84345d8cb6e75a41ddc19a1a9797e5158d6a53e5e02ec34649bfb,2024-11-21T09:10:30.660000 +CVE-2024-2784,0,1,25eeabba0047303bdf38fd1047fc143c853e498fcc56a23a83934f1f4854bc32,2024-11-21T09:10:30.660000 CVE-2024-27840,0,0,453af47d9309a88c2e180a33c2d097b7c43c49ce2350ecde6e4b6a774767854d,2024-11-21T09:05:14.717000 CVE-2024-27841,0,0,36aa403c3b820f7969c7032fb508bab18a8911fc289482fb447f16f18f6db9c7,2024-12-09T19:41:14.837000 CVE-2024-27842,0,0,49df2c33f0e29eda2c7919a0e93a2fcf54846b0aefcfb3b461eee7983e68528c,2024-12-09T19:37:50.357000 @@ -252791,13 +252791,13 @@ CVE-2024-27845,0,0,d71cf0c0ec065b23d4dd61815af6664ea6cb71aafb52d5b7d45d133828b8d CVE-2024-27847,0,0,71f93657e07337bb7b166b0763f6e58ef2ccf5e7a81265e4fb4a929e0d1455c8,2024-12-09T19:39:08.330000 CVE-2024-27848,0,0,174470df8b8c056af49e772881a57e396b5596e901992b4a002bb4e501ad08a2,2024-11-21T09:05:16.213000 CVE-2024-27849,0,0,fc4f7deee1a891aa16b7cea2fcce8aa0746cf5d86935b3aa70533f39a4015199,2024-10-30T21:35:02.607000 -CVE-2024-2785,0,0,b6d998e0123377d9bc90ca8ae3ff985b399b5fa5be9e7cb5fde9ab7b4c64b6a7,2024-11-21T09:10:30.790000 +CVE-2024-2785,0,1,eaad0be25425b1fef0e6690b361cca0038bd479a488596ee399e430129612392,2024-11-21T09:10:30.790000 CVE-2024-27850,0,0,1250ad80f7ac3b5478788a4ae91050d8de16b9618bea2e937a23b75728cf9fd2,2024-11-21T09:05:16.590000 CVE-2024-27851,0,0,c3b97ee6b26dfbc0c56d39614137e38659ab1609757d63181c34ff60a311c0c3,2024-11-21T09:05:16.740000 CVE-2024-27852,0,0,21baed505dd28c7a0b77d3ba061072e5a4859b987a8b1d420f9b79d60ef54041,2024-12-09T19:40:07.710000 CVE-2024-27853,0,0,72a1ed6ec4d0895fb804921668bc2bff946add21527d9bb528b8f3dbbcdca964,2024-11-21T09:05:17.167000 CVE-2024-27855,0,0,7b61a08acfa4129bbd09ca95b2fbbadadedd2683e38c872f9104fbd486556985,2024-11-21T09:05:17.320000 -CVE-2024-27856,0,0,fdfdaf450b411d17898fb69d56609366edb5ef155e3d02820221a7c03309c67f,2025-01-16T15:15:13.100000 +CVE-2024-27856,0,1,09c5bb73b814d1144196c9ecf929f00cb814093cdfced3c6adadc63f100b4422,2025-01-16T15:15:13.100000 CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000 CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000 CVE-2024-2786,0,0,22e7aa45cb0e7749183823d317f8f7b810ca18197f71a7cb7903a7f8a0a36e07,2025-01-07T18:17:10.187000 @@ -252829,7 +252829,7 @@ CVE-2024-27887,0,0,27c7d91a187938663d4a01d4c87033037d24e5ace0c9df0921f49ee73def6 CVE-2024-27888,0,0,cd0431e20853cd52fac0840f748f121c2c1ffdab2233c1cee21b2fe50a5a00fd,2024-12-10T14:51:04.667000 CVE-2024-27889,0,0,9baa87884a3e66fc5756c9ced2a8ef947001f8941593056f52c6dadb55724bf9,2024-11-21T09:05:21.780000 CVE-2024-2789,0,0,b1690b1b83fedf5140ce93f0eda4241364d6c80c52f2ee1616fa1c36870eb1b9,2025-01-07T18:14:48.107000 -CVE-2024-27894,0,0,a529ce9447bf5cccdc79592c335a904880367559eca12c605a0c1c557584b199,2024-11-21T09:05:21.910000 +CVE-2024-27894,0,1,862e169fb503eb5b75cb8674f22c89cc0a2243926d7f53efb12178863a036c97,2024-11-21T09:05:21.910000 CVE-2024-27895,0,0,d55175960df25787806e528bf2b5b0b690105cc86f51c145001c192d4b0382fc,2024-12-09T17:59:55 CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865a42,2024-11-29T15:15:16.833000 CVE-2024-27897,0,0,e0fd628e199d1ad9f7d1973d04b30e3b226e987f2d07bcbb58339313ac383abd,2024-11-21T09:05:22.297000 @@ -252924,7 +252924,7 @@ CVE-2024-27982,0,0,3b4edd38916d4b70e6bd265fb1fcaa37369c9af685bd7f99d27c1bbef3d48 CVE-2024-27983,0,0,b2589cbbb580d16047bd9ecbfda79c782676d32c5fdcf965b61589244d8bb50d,2024-11-21T09:05:33.613000 CVE-2024-27984,0,0,aae42ff7c5e2f91ad6145729ed698347fd731a0e279fcf89bf92ea79157be3c0,2024-11-21T09:05:33.767000 CVE-2024-27985,0,0,9679fe24d68a7f5f2c10bb4c13c0afa57c8fea04d57b528532db987befe8dabb,2024-11-21T09:05:33.917000 -CVE-2024-27986,0,0,80eb61e728bc9804fe3e7bc3f8d089073925b73f46de279f1ee675a2bd2e3bc5,2024-11-21T09:05:34.073000 +CVE-2024-27986,0,1,ac4b49272065f159d37fee5707a406cdf4ee7f47cc21cf0fb339fd7552474026,2024-11-21T09:05:34.073000 CVE-2024-27987,0,0,fae87e6a46a51cadc955d1613c451a2ff702574b3ff9d5a457489bddc03af350,2024-11-21T09:05:34.230000 CVE-2024-27988,0,0,c686d670cc748ce822fc38945ce5b40635e2e005a14b8e9934b0adbae696c579,2024-11-21T09:05:34.380000 CVE-2024-27989,0,0,7f894ef41691189e0c1df3102dcb631ad9f4b4b2ff7a95ff2ab4bf4eafb7ea15,2024-11-21T09:05:34.520000 @@ -253025,7 +253025,7 @@ CVE-2024-28094,0,0,e65989a468ce7112ff14a5b6de487cd35f7abbd47747bf6c735d7568c9d9e CVE-2024-28095,0,0,1f7d8fe8a6c56dc8dd69a3e4a3303f7c94c39f3ce605ea90cdf64f6129ed7de5,2024-11-21T09:05:48.183000 CVE-2024-28096,0,0,a0a1b2d48a132a8f67f7924055e0d93805996700281fe9467707cabf2e784f75,2024-11-21T09:05:48.310000 CVE-2024-28097,0,0,d328615318f60f00491ec7904bbd032058d8e0158a6c16297acf359751fa44f7,2024-11-21T09:05:48.423000 -CVE-2024-28098,0,0,8495478d80eddde4b5cc336ef8c1b3a68efb37cea2afa53f2594ecd5315a9ad7,2024-11-21T09:05:48.550000 +CVE-2024-28098,0,1,04d6e9d1679bdcdf536b9988bc76b8851d6d8ac1ff65ceb57aa8a68dce33fe43,2024-11-21T09:05:48.550000 CVE-2024-28099,0,0,67074bfe8335b5e423677837dbafff99c4030ec6685c157c0f1ee9942960739f,2024-11-21T09:05:48.693000 CVE-2024-2810,0,0,f152fec8b4da4dd39d7c0040313b2d0236f2aef6a1dcaa287e4d60d1c0e11e68,2024-11-21T09:10:34.653000 CVE-2024-28100,0,0,980f955c88bfadf6275346988b59f10331a2302846e8287402fe5dd637f02c57,2024-09-16T17:28:07.347000 @@ -253082,10 +253082,10 @@ CVE-2024-2815,0,0,99d14255bf9f20e39c31ea08c7e689a61370d6bda7f2c6f0bf1786acf33245 CVE-2024-28150,0,0,eaa0ef1d0452a95b592ba3f449367a6abbbf724cd71275311fa4015466444bd2,2024-11-22T21:15:17.663000 CVE-2024-28151,0,0,1fcab3b8206d9bcf898b51b0d809958fb6311e0151756d0716deca3296ac8552,2024-11-21T09:05:54.350000 CVE-2024-28152,0,0,eeb1c1a05bbc4a2e074591366ce1ecb2612911ce441a4ad410fd12a4000edc4f,2024-11-21T09:05:54.547000 -CVE-2024-28153,0,0,7644c38b56908d3e10a492e25ee5d231be4afb15caa58a3b40e9dcc0086c0025,2024-11-21T09:05:54.733000 -CVE-2024-28154,0,0,093ce073a6134898ecfd74ccc6b9ce4d83ef27212cebef9f0b1c267c95da66d0,2024-11-21T09:05:54.840000 -CVE-2024-28155,0,0,62f31f5f42ea3a37f1146512eab60d6db56f6bac709d4818df295a1065415e59,2024-11-21T09:05:54.953000 -CVE-2024-28156,0,0,d4de5d40ddb46a95ff2a501c9020c5d252f680cb7ef84f274f417270dc5a2618,2024-11-21T09:05:55.070000 +CVE-2024-28153,0,1,6ad37a56663f56b57a7fee1f2533513f35a715f753ad725ff6307fd59e180e47,2025-01-19T02:39:08.690000 +CVE-2024-28154,0,1,40f4b72ad19063848738c2c5c46f075eb801aa8f54ef158ce502f2b3a7bbffd8,2025-01-19T02:36:34.320000 +CVE-2024-28155,0,1,883e1f9e3429512ab5b79d087bf5215b77c44221a95bac36f4732cba523a7f59,2025-01-19T02:29:23.020000 +CVE-2024-28156,0,1,d0da5807bc4c46a60b34d37321439612c75d037680852d780bf6fdab6ce1462d,2025-01-19T02:27:21.977000 CVE-2024-28157,0,0,e564045109b01f4899c4276b6dfc02ab7291e76081b37136bde916d7cb8ee9cd,2024-11-21T09:05:55.187000 CVE-2024-28158,0,0,f71b00fb00e164c1aea55316523408b66d37b0530518739398503aac7b790d00,2024-11-21T19:15:07.777000 CVE-2024-28159,0,0,eefb6d69dcc74f1b4ceb650733005cc9a79171f0b236a5aa760898858cabe472,2024-11-21T09:05:55.500000 @@ -253123,8 +253123,8 @@ CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da CVE-2024-2819,0,0,6daecd2bbfb467d8a24e5dcfb2faf4c02588ef96e9150250558dcd9fe5f2ba9b,2024-11-21T09:10:36.070000 CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000 CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 -CVE-2024-28192,0,0,7710241b372f15cd48783ff863776a66f46b4b3cd57ca39601c199ddf835e1a2,2024-11-21T09:05:59.927000 -CVE-2024-28193,0,0,7ef66a28dd1ff57f0c0b025e8167ec6baa56982b11f2bb9d0c45c5587f2e1e2b,2024-11-21T09:06:00.070000 +CVE-2024-28192,0,1,8ce1d4e61a87cb10a00bdafae803eca98700e4efeb74c80b194aed6b869d7272,2024-11-21T09:05:59.927000 +CVE-2024-28193,0,1,5005dbbcc81d05e3f0bec2426595b0b53e6372f94f8847cdb10ad53ae2e95b98,2024-11-21T09:06:00.070000 CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000 CVE-2024-28195,0,0,1c8cd56ede5413ee2e3fc3f8a72d5ad055ccc2245b1d55d162ea0bb57080f1c2,2024-11-21T09:06:00.303000 CVE-2024-28196,0,0,5935adc603506f91db2ad215ee3616bfe048394ec93eefd8b8d42fb8dd2992e8,2024-11-21T09:06:00.430000 @@ -253142,9 +253142,9 @@ CVE-2024-28215,0,0,6ae6b224ccf5aff7edc23a68458aca410139d72bceebf7fcdbcb0d96b24d1 CVE-2024-28216,0,0,4e31d9fbd45448fa1e0b201e1bddcd35ea27e8096912bcd6dd7c295cfb1f30bf,2024-11-21T09:06:02.080000 CVE-2024-28219,0,0,6830fb0e26f886b3485bf2fd7a0cbc5043cc855dd90632c85ce0d69014a3d7cf,2024-11-21T09:06:02.270000 CVE-2024-2822,0,0,eac17cb2010c91c3b838b4ace8eb55a7b3846d55205a1f1ec1bcafa75ea3a92f,2024-11-21T09:10:36.557000 -CVE-2024-28222,0,0,a6f532e094121d2d3ca88f2594b97947ed6d0fe5027ca5c1ac4a5899d887e85c,2024-11-21T09:06:02.470000 +CVE-2024-28222,0,1,8084aed5b509707b8c8bab0875bb923f35f6597f05bafd238849ad00f6f94acb,2024-11-21T09:06:02.470000 CVE-2024-28224,0,0,4dc495d1b5391a5805b35b2cccf549718cba127cbcdb7a2bab566e35ee9808ef,2024-11-21T09:06:02.613000 -CVE-2024-28226,0,0,a04adc45d47426d327f332ffc617a958172e7494aece288fc40840e9be086147,2024-11-21T09:06:02.767000 +CVE-2024-28226,0,1,7042ea8502753cf42316124d8450a936a79906d71bbbbc2f3abfdc9bbf97ca4f,2024-11-21T09:06:02.767000 CVE-2024-28228,0,0,4c70949e6df8bcf2882fac2da178d0d5c63a3ff277dc66365cbdd98196ca17b4,2024-12-16T15:06:31.563000 CVE-2024-28229,0,0,91f2c6bf4f4cd9f37b886899d3e16c101d8f0aeb77afc57f338cfea95f7a2e46,2024-12-16T15:06:00.407000 CVE-2024-2823,0,0,a7476924000e3fd8ad4ee932eb74fdb14f5fb1293812dc1c86970256676a64d9,2025-01-15T18:53:00.390000 @@ -253154,7 +253154,7 @@ CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b2 CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000 CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000 CVE-2024-28235,0,0,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000 -CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000 +CVE-2024-28236,0,1,006d943face2653d8586409285dc0b25a377f4f26cdaa112ad9338f349805672,2024-11-21T09:06:03.913000 CVE-2024-28237,0,0,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000 CVE-2024-28238,0,0,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000 CVE-2024-28239,0,0,cad2389eb8ad3f3fc89b4de0deaf45f55e8417efae42f10b632472f86525ee21,2025-01-03T16:17:32.100000 @@ -253519,7 +253519,7 @@ CVE-2024-28906,0,0,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1 CVE-2024-28907,0,0,0a0e9df28d068123203d200496d461a9f5a85cf195778c93d73b68574a7b0ece,2024-12-05T18:28:21.740000 CVE-2024-28908,0,0,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000 CVE-2024-28909,0,0,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000 -CVE-2024-2891,0,0,1ff34ae211a25afff02de381688fd5a4684ffa990ce2b6494a9492549a569d38,2024-11-21T09:10:46.173000 +CVE-2024-2891,0,1,bd3f749e6c21a7f6d547ee1f933bc22268be0a4654afc275e43c1a6f1e6e2a4f,2024-11-21T09:10:46.173000 CVE-2024-28910,0,0,e3b369e4a8d472d72e9a19b12774a71460fc4bab55bc84a0c4568ee848a06deb,2025-01-07T20:17:51.460000 CVE-2024-28911,0,0,5df5116a7758f00ac661fba3cb2509ac1329af2e07838f553897093eddccdcad,2025-01-07T20:11:27.670000 CVE-2024-28912,0,0,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e099,2025-01-07T20:08:15.217000 @@ -253529,7 +253529,7 @@ CVE-2024-28915,0,0,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977 CVE-2024-28916,0,0,e34cd9ef2748a7cccd5995352677bfa0b35bbb61565917369bb676539d215256,2025-01-08T18:35:14.683000 CVE-2024-28917,0,0,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000 CVE-2024-28919,0,0,1c6282b7290ea6d12f58497301cfb1bf431a4c9d6bfe90ac3ecda81daa1fc9b4,2025-01-08T16:10:55.147000 -CVE-2024-2892,0,0,74c239cacaa79151a1c470c6b6fc24b5a5eb0198576c9c168529a88848909c96,2024-11-21T09:10:46.323000 +CVE-2024-2892,0,1,92873276fd2f6e3e9a8171d454a0c01749460d399f5bb48c6c11f14ef5bd6b4c,2024-11-21T09:10:46.323000 CVE-2024-28920,0,0,b1f59a0172c6d2ab413458de6a58ff8bb5ad0546c83587f17da4930f09c4e726,2025-01-08T16:11:26.560000 CVE-2024-28921,0,0,8e0c5de7255ffbaf24ec273d5f031faae03acb44b8a2c66037dc33a5236abed7,2025-01-08T16:11:39.433000 CVE-2024-28922,0,0,69fdcf8fc01da16e5d877ef26236de0eef66dfedc059000948bd219bf8b8531b,2025-01-08T16:11:54.427000 @@ -253540,7 +253540,7 @@ CVE-2024-28926,0,0,c5f375be6d2d488bea53ec1e93300777cdfbddeb5ddc37526b3c2ac3b4aa9 CVE-2024-28927,0,0,695e9c189aff014fc53371c2cc03e1340199354cfc08d7dc2774750486df412c,2025-01-15T18:45:39.533000 CVE-2024-28928,0,0,c27b696b54b60804049f3d90e44cea72634bdc70647e90d01df999543c8b82a6,2025-01-15T22:32:19.930000 CVE-2024-28929,0,0,046264c571aafda225d7365c3059ab68bd25c30dca254045cc4347ca9da9e90f,2025-01-14T20:47:41.253000 -CVE-2024-2893,0,0,d6fda5ad886871814bd5ffa9d425d870715f3c56c45827b8c39c61f55007f365,2024-11-21T09:10:46.457000 +CVE-2024-2893,0,1,da0d4c1f772373e5095e93c42c7b64faab0a08d64fbcd20ca086de248f77f2a9,2024-11-21T09:10:46.457000 CVE-2024-28930,0,0,61f753279169a9d3d53d3ab92a960da8c3002d265e18e3e04a743a7e521200cb,2025-01-14T20:48:06.263000 CVE-2024-28931,0,0,612cffb3be59ea3e82b7e58fbf7aa17ec7918f4b9682159ff2fa8d555d876ff1,2025-01-14T20:52:05.480000 CVE-2024-28932,0,0,8c877a376da85f927fa18714f62d4005c85e7a2c413c669a0f71039ddfefb9c4,2025-01-14T20:48:30.367000 @@ -253551,7 +253551,7 @@ CVE-2024-28936,0,0,4264c80a5f3a08d5f205f651ba6b20f9bdacfc5ecc900ceccddb8f2af2de3 CVE-2024-28937,0,0,f7c193f0a4b300cb22ce8d1015fa240677db7dffadf67f0783951778c1c26673,2025-01-14T20:50:38.043000 CVE-2024-28938,0,0,4c3ed97a2df40cd15aafe170d8f206c668154d1c86cc5aea8e7d1547ef3219c2,2025-01-14T20:51:01.370000 CVE-2024-28939,0,0,38ebf183fe37377b8fd2ccb268afcf629c3fc3a5e43928b9e008d675f0d5fedd,2025-01-15T19:06:06.007000 -CVE-2024-2894,0,0,4e4e197d6e5e2cfa7dce6da3a124c67e0d58dfe258916ccee0dc79455f6b8393,2024-11-21T09:10:46.603000 +CVE-2024-2894,0,1,54fd15927475e7f93099e91936175dbd1bef40db66449490c1d7c67160d97aa8,2024-11-21T09:10:46.603000 CVE-2024-28940,0,0,b4e91055e512829ef86de877890d0613f8bb207a143a8a2a9701b281837d479a,2025-01-15T19:06:25.340000 CVE-2024-28941,0,0,c146dba5cc5132ed8f71f242b70ea18220d6242e2e3181c7792809978cb5aa59,2025-01-14T20:51:28.040000 CVE-2024-28942,0,0,45e12863cfd2906d7e9b154de89b6a52a9867356e5cbdae1fbce2828713bad02,2025-01-15T19:06:35.190000 @@ -253561,14 +253561,14 @@ CVE-2024-28945,0,0,fd0f929d94e9a072a54ac6220b0a882ea43cf1101ced55267196733ea906c CVE-2024-28947,0,0,f423c6da395b9fab8d455cff865afb02d4eaef269f598c96201d2b407abccf3e,2024-09-12T18:52:38.433000 CVE-2024-28948,0,0,1666ae581c80c38aac0ccf842fe7ca7d976d37f538b8ec7b216cab7a6078bfb5,2024-10-04T18:58:14.400000 CVE-2024-28949,0,0,1f3684a855e01293d9c0333b231907267ad216e334a79f7ff99fcfcf991a1b22,2024-12-12T21:38:08.237000 -CVE-2024-2895,0,0,254eb6cc317a640f5af45b49db43dd42204cb96361be652398c2bb03dfb20994,2024-11-21T09:10:46.743000 +CVE-2024-2895,0,1,8fa57bfbf55405e8b59474276ac13e2c45fe5cc933b052bd2f421c6a0cd377db,2024-11-21T09:10:46.743000 CVE-2024-28950,0,0,1a05508e6285963097a3b72b652266b51c45af88f660c467f1463d180a5b37f5,2024-11-15T14:00:09.720000 -CVE-2024-28951,0,0,16baf9b6d80bb19856e8fcdf8203e5463e5b78129ed21a2b8e8b6bffb2fd7cea,2024-11-21T09:07:15.640000 +CVE-2024-28951,0,1,09416b672634bd3150f06f0e71a1c5a6f0ce65faa90f7a522075aea097dec4ac,2024-11-21T09:07:15.640000 CVE-2024-28952,0,0,a3c4c6996f99d6d10f644fb690635fed6d4bd8920a537bc08e5b50bd933cd304,2024-11-15T14:00:09.720000 CVE-2024-28953,0,0,c901751ea2f147779352c1e947dd13228802aa9d79715e869d0c3f0d67f4b2c7,2024-08-14T17:49:14.177000 CVE-2024-28955,0,0,d25f942d0189970997c9beaa87ecae40becc3e717d61eb7169e70ed01f911452,2024-11-26T08:15:05.043000 CVE-2024-28957,0,0,4149b5010d0b1c2568f2f4f291564713cd37dee8d620ca60dda3ebe3092552df,2024-11-21T09:07:16.013000 -CVE-2024-2896,0,0,36007084fa568f31dc228bf199099ed6a05a1240a7acaa1fd3838f218b710516,2024-11-21T09:10:46.883000 +CVE-2024-2896,0,1,14c42c63ee3f528f0219ab7aa8059bf97c5438489c68a4a7829405d64f22f256,2024-11-21T09:10:46.883000 CVE-2024-28960,0,0,07be4df1b4177567bcc011207a77201ed2e71e2ecf6eaf000238ed73bba54553,2024-11-21T09:07:16.223000 CVE-2024-28961,0,0,72ef1aac80f9e5ee01b55b825560f9e29b42a73d432d42432b59b38533093f5d,2024-11-21T09:07:16.467000 CVE-2024-28962,0,0,1722d1439be0e57d00fac6f93bc2a029df89951b0809396a3013f82491cdd038,2024-08-19T17:12:57.750000 @@ -253579,7 +253579,7 @@ CVE-2024-28966,0,0,066af8407887272bce3b5de87d8ae4299d575b7614379b3ebba1050d470af CVE-2024-28967,0,0,2d5d2eae0b61a88c479fdaffdfb4a01de4bb9a33be5b7acb7c671741cefb783d,2024-11-21T09:07:17.290000 CVE-2024-28968,0,0,30f0a5615ec1f86d46723a888e87f3cc1d2f5fb43a379b06e125991c23e00070,2024-11-21T09:07:17.450000 CVE-2024-28969,0,0,ed2e7d307eae482486e0f8ca0f0bec91773f9a523ac1edf23b80faee6c1caf7f,2024-11-21T09:07:17.613000 -CVE-2024-2897,0,0,784ae1d41e5a5e83de018b74ec13a544958df085ca0ab3faf511c8cf9342ec55,2024-11-21T09:10:47.040000 +CVE-2024-2897,0,1,864ec8506cba1fbd197b3ff2b26693fae6fd4975d2af8fad04aae953ee6343e4,2024-11-21T09:10:47.040000 CVE-2024-28970,0,0,40de7b82743a11a5ad6d4091afb1ee76e91a11478a88b6485d9e52873333afdf,2024-11-21T09:07:17.760000 CVE-2024-28971,0,0,60c1b7cea147deb90a66336e84867f097cd9c3f3d33da0bd555b1b0b9c115e15,2024-11-21T09:07:17.927000 CVE-2024-28972,0,0,12c7e7efe1195c680c17aa2603704c5c29d6e9fd7636c8c8b733f1d9d5598f42,2024-08-23T16:59:11.070000 @@ -253589,7 +253589,7 @@ CVE-2024-28976,0,0,c180718ace7ac1e06f9c278b90960f13d8902577afe7806f2edb96f44e295 CVE-2024-28977,0,0,a45310b3049fcdccac896f6a0f9b61331f72d96638faa47cc648f7e6234927bb,2024-11-21T09:07:18.537000 CVE-2024-28978,0,0,da799c0a16393f900a300a366c8e866774ce711453c2c4b1160779dba68ae01b,2024-11-21T09:07:18.667000 CVE-2024-28979,0,0,99a7aab3884e5ebe09de299942c15bf9528d835168880a8bb57f8c808495f0e1,2024-11-21T09:07:18.823000 -CVE-2024-2898,0,0,4cb3a6a6d199e8b1603a25e1b35c5463f39d5e3e68ae0a40c243a189156071d3,2024-11-21T09:10:47.180000 +CVE-2024-2898,0,1,1e7971e90d44ed7db0f72653ff1b70766173836d462ed401dc3a5f3c5b92adfe,2024-11-21T09:10:47.180000 CVE-2024-28980,0,0,6dd21a20c6c7ec39652a020c019163d4e095ed0f8bb0af407011aafd97fe6635,2024-12-13T15:15:26.953000 CVE-2024-28981,0,0,692b15f24059cba73d7928530e872749524473b415389822d7c1810b6de68905,2024-09-12T12:35:54.013000 CVE-2024-28982,0,0,293d85a1eda8daf3f0e9e42b82681e8e9ccfbfdcf941f77ed8a2fd39fc8cc421,2024-11-21T09:07:19.063000 @@ -253597,7 +253597,7 @@ CVE-2024-28983,0,0,853eb2b12a9ad3bf106c30e0e1489518e0cbe87352e67323535e3cf905652 CVE-2024-28984,0,0,e221ea1e0ed5d84a917cf65a0a3924161f9f1b60c50e39e56b41be334f33064d,2024-11-21T09:07:19.380000 CVE-2024-28986,0,0,04047c53e92796f6c88df692b7a4dee29fbd1f79089034259bae8c2d933c1c88,2024-08-16T15:04:28.150000 CVE-2024-28987,0,0,eb1d6e8c195369e8160428cb16da1b0c3f28c82362eb42d58d03aebe865d58d1,2024-11-29T16:34:47.650000 -CVE-2024-2899,0,0,acf1e7b75e331e6ae79320211e404adce2744530ff85ca6045d2f241e99462b4,2024-11-21T09:10:47.327000 +CVE-2024-2899,0,1,a67fee834d3a87ebb8f6c6ee8fa2ff24bf761302839456c3a5a0607b6ba528a2,2024-11-21T09:10:47.327000 CVE-2024-28990,0,0,cee78bb41c487ff5287bc312509ab2a1c6447da39e21d14ddee35c76b2524b3b,2024-09-16T18:05:28.957000 CVE-2024-28991,0,0,162d93769e8b87d4db4424fce1391a16d64fa7b50a85c14e446e72b5f1e1c43f,2024-09-16T18:06:20.037000 CVE-2024-28992,0,0,b140bc55fc6732ddb5ef57978bf3e0425b496a5e01b1ccf218e40bde197b87c9,2024-11-21T09:07:20.070000 @@ -253605,16 +253605,16 @@ CVE-2024-28993,0,0,67d676c59b2b64f7cf16de77d9ab2b66f2844145b2467910d0a492be96927 CVE-2024-28995,0,0,586946315238795a13c3f5bce631e421acdfee18bf0dfa89e4162af89f2dbf2a,2024-11-29T16:35:14.907000 CVE-2024-28996,0,0,0806bb8d40fe342d5e6e04c891592d793f0bfade4e371bb2d2e66a14bcbe06a0,2024-11-21T09:07:20.530000 CVE-2024-28999,0,0,e77bc8aadf745e15c481beb594110ef5ca9c38e6804be89ec42b866b0bf1bd6b,2024-11-21T09:07:20.680000 -CVE-2024-2900,0,0,6a771d6261cb4441870218df2043d6d6cca9483498c292ed14a0c78cc88996f1,2024-11-21T09:10:47.473000 +CVE-2024-2900,0,1,918a5c815cd030307ef8006fc220981ecd1a809db5673bfca663e784039be483,2024-11-21T09:10:47.473000 CVE-2024-29000,0,0,7a305cccd175671343b97767d7c882563f2afc3a0fbb62aa579187b27944ae15,2024-11-21T09:07:20.827000 CVE-2024-29001,0,0,33e499e26ccfffab77e2a9a0196071af4053eafb3c7b487e58f86d3831f9cb69,2024-11-21T09:07:20.983000 CVE-2024-29003,0,0,aa0448857305ef8166f64d09b6a0aecfc681d4d8ef2dd604c70ca9d26cf84df4,2024-11-21T09:07:21.100000 CVE-2024-29004,0,0,e71f6941edb707c0c3bbd70c4cb5ee173fdefaf8a4d65799390c385e184d1124,2024-11-21T09:07:21.257000 -CVE-2024-29006,0,0,37f10cd16fd52bf14d1c160c59f60a5034b1f2910d4798b1b1bd5c2be76107cd,2024-11-21T09:07:21.387000 +CVE-2024-29006,0,1,3abee45cbfaada31ae0786001965936ff6bb74d5feb252bef431fa2f6d2c4418,2024-11-21T09:07:21.387000 CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000 CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000 CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000 -CVE-2024-2901,0,0,811e9a0cc1ac7c2e82c1903de3e9a03cc6d5bc08aa60ebac01e293c50bf54be5,2024-11-21T09:10:47.610000 +CVE-2024-2901,0,1,42399ab95d0bfc31667e9d0d54250f1708549f72ebd26149b6753db3178369a0,2024-11-21T09:10:47.610000 CVE-2024-29010,0,0,4dbbb313be40d0c135584395796085f49dfc5a38f9b20d53ef797f5c9a7732c3,2024-11-21T09:07:22.030000 CVE-2024-29011,0,0,c6021f6c242e39fc9aace540c8602442981098d2fe2c3f610f36278c6132416e,2024-11-21T09:07:22.173000 CVE-2024-29012,0,0,40c05b14afddb0cc661d36c69dbf118239f07d1b247ec5496c2f0ead6efef9ae,2024-11-21T09:07:22.317000 @@ -253623,7 +253623,7 @@ CVE-2024-29014,0,0,2bb4c7c55a453adc3bca5a57be7f0dc897cf7a6df37b2c7e2f7280b1bcb1a CVE-2024-29015,0,0,06c1b838b075a1a879d4d8d54604d2734c08c138ce56929733b0da42db823b8c,2024-09-12T18:53:33.647000 CVE-2024-29018,0,0,dd2b327b1b89a160d0dcc0d1fd9caced193b0522fafea0be7b407f44deca809c,2024-11-21T09:07:22.967000 CVE-2024-29019,0,0,026ec98dc834f6d523b465baf78adf168519514bfb3421c37e8d04ec7939a04a,2024-11-21T09:07:23.103000 -CVE-2024-2902,0,0,5a92101f6c46f7f827b30d4ea7de164ba2c47bb156416817b124bdaa60186338,2024-11-21T09:10:47.757000 +CVE-2024-2902,0,1,c6ee7fd8346a057b16b23b2bef0d5db5f1c249f0c7d3131956aea3dd14500aa6,2024-11-21T09:10:47.757000 CVE-2024-29020,0,0,8f90e1cb77a1ceaa84ea4cf6d4be9c75bb14a140b161deca4c41951dcb67026b,2025-01-09T17:20:18.197000 CVE-2024-29021,0,0,9e8341fdbb48e58f80e64f4861525263812a0ee45b37f3a746ea08f58df39b3d,2024-11-21T09:07:23.363000 CVE-2024-29022,0,0,86f895eb5a53cafa1adfaf8cde76caee125e12a3ff10e40b6057327fa22e9146,2024-11-21T09:07:23.490000 @@ -253634,7 +253634,7 @@ CVE-2024-29026,0,0,de9ec356ac90fd02f902d916cd7e0bc293b4028e1231d8a4fe9b0d606b6ad CVE-2024-29027,0,0,cad2c3e3075aa793ecd13d5a6db3c7104155fc1583df44e70e041ebc7f10c285,2024-11-21T09:07:24.170000 CVE-2024-29028,0,0,9c4c6ceae51e15abd24bea2f10c8a8287e79fbe320fdae0f3644ccb394d11342,2024-11-21T09:07:24.313000 CVE-2024-29029,0,0,79a14ecda4dc6dc09574b170d06c65a72f1bb1b8f0316fc9902a134d522b067a,2025-01-02T20:46:24.867000 -CVE-2024-2903,0,0,162f14fedf523d37663ff386be667ca95e9daaef136c3132db7408197a7f73c9,2024-11-21T09:10:47.910000 +CVE-2024-2903,0,1,8ed571512c9c5cbc7c1ab6d7dfd9be521fa1e9c30bc4ee67110a431ba198f916,2024-11-21T09:10:47.910000 CVE-2024-29030,0,0,4839b6e2f6738537338b92d9d9c426892d773e51c9de6dd341d7931249443992,2024-11-21T09:07:24.583000 CVE-2024-29031,0,0,43885b264be637e71494b7988bfccd07c0c261c20bf20a201a9b30066be50cac,2024-11-21T09:07:24.720000 CVE-2024-29032,0,0,e4982184528b3910b9311a270985ad61418d068232bdcad658d089c012dde188,2024-11-21T09:07:24.850000 @@ -253979,7 +253979,7 @@ CVE-2024-29646,0,0,eb8af73bea0df40f2bca567fbb3142009d4b42ca68ce28f98a67d8f285123 CVE-2024-2965,0,0,0e37bbfa530a61c2d82fef1ca2e0856588e0f7ecf3b5b3a3905f885de3031030,2024-11-21T09:10:56.847000 CVE-2024-29650,0,0,32d15580191c7e4ba16d03aee0bb830b6bb78e29fa21f75133466fdca3213232,2024-11-21T09:08:08.197000 CVE-2024-29651,0,0,31d91be0f564d07d6c8f19a393b333b330f5d72e83fb5a5cda786276b03b3635,2024-11-21T09:08:08.420000 -CVE-2024-2966,0,0,76322a3e1717c8fd084ea9913fcf5f5a75fbe970c5f264bb22d24c907bf6e889,2024-11-21T09:10:57 +CVE-2024-2966,0,1,8c4c37d828d5a3eaecc6d2cd18e1cae3f1ed07a99cc04f0245637faa200e2bcb,2024-11-21T09:10:57 CVE-2024-29660,0,0,ec84c1d59c35f5c710b39a5306b858dcb5322675f12548bfa7a6d01325818b22,2024-11-21T09:08:08.663000 CVE-2024-29661,0,0,33eeb097530dd938963a006813b514ee2f217b4805f64bf726e22f92b9d6f86a,2024-11-21T09:08:08.887000 CVE-2024-29666,0,0,4816994d3696247c03b8328a9343bd38453cca8e45ebbf1e319026a45443ab8c,2024-11-21T09:08:09.110000 @@ -254116,7 +254116,7 @@ CVE-2024-29830,0,0,3f9252519d26c2a44915f75e911a6f26ff92e77c813067ee428ba5c495fa5 CVE-2024-29831,0,0,e6c66beb73404b95bd012a575dfe2fbe460731a7b1a9e842d9b5a35c457e6ea5,2024-11-21T09:08:25.767000 CVE-2024-29832,0,0,6056032a590f7abd34bd12f5925c086bdf38bbd060ac2b171db2d160a1e2f453,2024-11-21T09:08:25.963000 CVE-2024-29833,0,0,749e9d8c64909205659cff602c4225d0cb6353f71312c1f77d5c97e9e9c104c1,2024-11-21T09:08:26.100000 -CVE-2024-29834,0,0,90b85051ec55f095116c171026000d712a98456fc0ba2caaf6a883aee25cfefe,2024-11-21T09:08:26.233000 +CVE-2024-29834,0,1,bb1e173c92ca9093a9c57070759cade84ec0204929809afb96971b4501bc96ae,2024-11-21T09:08:26.233000 CVE-2024-29836,0,0,d83ba4e00c62b6e0545f19626ba78475a56ba67b33e57c14cb3ed18d1ffd828a,2024-11-21T09:08:26.370000 CVE-2024-29837,0,0,40cae44464abb484ced0c952d98fd9bc0888dd0bbe7a5abfcd18020cd2f2ce0d,2024-11-21T09:08:26.500000 CVE-2024-29838,0,0,ae26f6d4b8133e525797109d96340fbc53824063f004cbc1496ef814c2ba32fd,2024-11-21T09:08:26.630000 @@ -254189,7 +254189,7 @@ CVE-2024-29906,0,0,fc1e1d7bc1a280d50b9cbddd32252e5bdb3a644c28a879459cc87af91c93e CVE-2024-29907,0,0,6a6dcf1abf6285cfc2a5cb15e8dbf09a7ebfbf7c0b9c54766035c8a196da0082,2024-11-21T09:08:35.543000 CVE-2024-29908,0,0,2015ea0a79e2dfbfcfcc8c9f56219cb4aa05d88d8743a9e6a62e5bb7ea1c486a,2024-11-21T09:08:35.660000 CVE-2024-29909,0,0,fb9ae7b23fa5013e6341fa9c080778ffeab890f332e295ba676aa55a587bf1de,2024-11-21T09:08:35.787000 -CVE-2024-2991,0,0,657c3b589308347886bd682b63bbbefaacbbb62908a678547d9afeee7d35437d,2024-11-21T09:11:00.327000 +CVE-2024-2991,0,1,9dc7d42e6ba1825bb49a2cc1dd121a48d401f9d4fa8ee810196a06baaf9e46e8,2024-11-21T09:11:00.327000 CVE-2024-29910,0,0,c41d09944920a9d8d61c20066a9b3c470d9f0156387a3f57445729a2f0a08722,2024-11-21T09:08:35.910000 CVE-2024-29911,0,0,5ae28372f5af08c3e1887f676ae9a2bc6b1682d2f9adce9a9ce29199c6d86ad0,2024-11-21T09:08:36.040000 CVE-2024-29912,0,0,4295d9a37bfaa06115d9f12a98aef4d1b4334764122065277f0bd2af0a62ed4a,2024-11-21T09:08:36.173000 @@ -254200,8 +254200,8 @@ CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a035,2024-11-21T09:08:36.923000 CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000 CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 -CVE-2024-2992,0,0,d98fdac79b397258e2cb16c8118de8d2da4ed9fad93d42b486603ccd363689c5,2024-11-21T09:11:00.473000 -CVE-2024-29920,0,0,04ff55dbcb1de25fcf0cb6b53991ec8722d4852ce0d3eb43131f53cccf3cc633,2024-11-21T09:08:37.313000 +CVE-2024-2992,0,1,a64bdc9926cfddb7eea233d6d35587921525832cb81243003f5550a352d71836,2024-11-21T09:11:00.473000 +CVE-2024-29920,0,1,581a8a03ba9787c287fbcaaf180ab7a4e4a61be263962bb7b2b47bcd0dad3d9f,2024-11-21T09:08:37.313000 CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 CVE-2024-29923,0,0,8225650ead409b8f85369357d44055c6eaddbde5fe28dbef52825bbb60efcf72,2024-11-21T09:08:37.677000 @@ -254252,18 +254252,18 @@ CVE-2024-29967,0,0,d82ebad11dfb5d1cfca5a40a54c1664eab6b2c7049d86eaeba6d5832308b0 CVE-2024-29968,0,0,95773ad208e1e4b128f66738a28ba326d5e907ec8172642086a5ae899f98380d,2024-11-21T09:08:43.297000 CVE-2024-29969,0,0,a88342fd00c5b13b444b2dc3a9c41d7d06d0bb130b74314a54468c2ede3b5437,2024-11-21T09:08:43.420000 CVE-2024-2997,0,0,34d2a19b9ff69df27205fef4532b986a51bd9c34f866ab6910f03b0cf9556b07,2024-11-21T09:11:01.173000 -CVE-2024-29970,0,0,8256db3817fa9a82f48a52fd9d292c324c156edc0eb1b1c64ac4415dc3fbdaac,2025-01-14T15:15:14.973000 -CVE-2024-29971,0,0,d0c1f327a07c83a14a05e5e1da604682b00f6fa03bbdbbaacb39fa9d7974e348,2025-01-14T15:15:15.167000 -CVE-2024-29972,0,0,6789dec1505bc16fc7487fc6a6563ee2c036e2b2e7990ce846671e51abc497fe,2024-11-21T09:08:43.547000 -CVE-2024-29973,0,0,c0179d9591ff9c8c3a58f725811618cb79cf3b8dc534dd890d6f1abf11fc38e6,2024-11-21T09:08:43.707000 -CVE-2024-29974,0,0,6c9561e4b7e476227460e4afb5bc9a6fb1a67ccafcf602ee9861291d337fb70e,2024-11-21T09:08:43.847000 -CVE-2024-29975,0,0,cb04ecedf4a11d7e497f453fa97b03b6acf40bd604a383dd1a957a6a3a2e9c9f,2024-11-21T09:08:43.987000 -CVE-2024-29976,0,0,a8a38d5ec72815180a8740de1a2755ff3b4448f57255fa710ba609f4dd4bee86,2024-11-21T09:08:44.117000 +CVE-2024-29970,0,1,30ccfc672dbcc68f9e9c530abc2a318b021327a43912d1a8fe68035e6eb0947c,2025-01-14T15:15:14.973000 +CVE-2024-29971,0,1,d6ed4ef29e7bc64c3c722e51c9009928cc19e29fe2b4f6b6879ff10e2eada349,2025-01-14T15:15:15.167000 +CVE-2024-29972,0,1,03ef32b0f86b450c73cf7cefdd437f81f751aab1e8c64dcc9dfea434a62008ae,2024-11-21T09:08:43.547000 +CVE-2024-29973,0,1,6e723218b86896240af47388038d1c65a62637d61d47498510cee6af9f83e4e0,2024-11-21T09:08:43.707000 +CVE-2024-29974,0,1,cda7540ec0ddec16f2d8b13f462b84103593436413716d4bda0c9a45f63f8a4e,2024-11-21T09:08:43.847000 +CVE-2024-29975,0,1,40fcf038fd3ae3ba6c0f5cd7380ec80761539e027743a1a9be6d119265b2ea0a,2024-11-21T09:08:43.987000 +CVE-2024-29976,0,1,297d32d0e573dfed653999e80281f51e6ced4e9a9ee484d6b54dc14498ba6576,2024-11-21T09:08:44.117000 CVE-2024-29977,0,0,bc0b0c3f00512826d3afc15c878e90557d1e530cdf0900ad20154e5fd854b006,2024-08-23T14:52:19.923000 CVE-2024-29978,0,0,eae448edc2ea3a52a4ea4b11b5efbbaddb66df9b1fe4c50de1f98d83d8337b9f,2024-11-26T08:15:05.353000 -CVE-2024-29979,0,0,eef8f0e0c6e3c19f2b73e8323e8d55c578f57049bf57b4c0973d36e1da15a002,2025-01-14T16:15:28.423000 +CVE-2024-29979,0,1,a98f08d74ce42d98e7df23347f3516e127a6d8b16d56967db0e0e3cb98ec14e6,2025-01-14T16:15:28.423000 CVE-2024-2998,0,0,4dea38390aec1eb05ba53ab716c17a921873391ec79bf9978195fbb79ed9eddd,2024-11-21T09:11:01.313000 -CVE-2024-29980,0,0,ddf5e79e683f65eb79e5290f66a5d55d0946f8257145ed6e6fa62aaec8e2ce4a,2025-01-14T16:15:28.600000 +CVE-2024-29980,0,1,ea4c993ba3ebd5fe459bf3a20a372b3b61a898bb451194cb814cb0e8b23500e3,2025-01-14T16:15:28.600000 CVE-2024-29981,0,0,0d96708c10f774658d035c3c0f7071119e5248a30ce12e4c6ac613898514042d,2025-01-06T18:38:04.080000 CVE-2024-29982,0,0,32bee63f46b19e8d6975cc6983b6808d51edf6687a8f1c8ed2a0a94e65adcb52,2025-01-15T19:07:20.527000 CVE-2024-29983,0,0,344b9d2199881b2661a68e9af52fece38d7f15e18fcc01ca69668f2b65328c8a,2025-01-15T19:07:16.507000 @@ -254456,7 +254456,7 @@ CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc CVE-2024-30182,0,0,0f6979edc5340254c61dbc0cbd7d4390e6b740ecdf6e9fd97a9d73ad11716bc6,2024-11-21T09:11:22.890000 CVE-2024-30183,0,0,3c466350958593d90ca423ea65b4cb5e481df5dfd1cc5ae5c5525bde0c6264fe,2024-11-21T09:11:23.023000 CVE-2024-30184,0,0,687d938a7f6ece9acd3b8185e8886757183e17afb63a5ca83ac7911758ed5b39,2024-11-21T09:11:23.150000 -CVE-2024-30185,0,0,85c06cb3cae2bcb9372bf383e856cfb14e4db1cf1e6fcebcbc4a89f6911c4d9e,2024-11-21T09:11:23.273000 +CVE-2024-30185,0,1,d9a11fa1493c3d39202258e7784ebd32e5e9ef6143e723e534df965b9d61d3e5,2024-11-21T09:11:23.273000 CVE-2024-30186,0,0,53bb03ad1cbb4fa177e7f7e64fdaf3dca0853a01d6025157da33afee090214b3,2024-11-21T09:11:23.400000 CVE-2024-30187,0,0,6ab90f628d4de6ea936b04cbe7ef6693781b7e8f80de722020d6b283f2bcf671,2024-11-21T09:11:23.513000 CVE-2024-30188,0,0,0be51808a0bc5ec77e2bd06528cca0a9f7702d4428b403b3dca1bd25f0cce002,2024-11-21T09:11:23.740000 @@ -254611,7 +254611,7 @@ CVE-2024-30331,0,0,c46a3954fa2db7fa82bb01909829239694ec25824569125cd1bdd6ea1cb40 CVE-2024-30332,0,0,86e9c4b1f7305283e6be51bc00614ae7d892767a558e3d3e2101ccc40ca04b14,2024-11-21T09:11:42.597000 CVE-2024-30333,0,0,c97c8db7506ef18e690f6b188ca70b4242bc0cf3b5ab465c09f0416ba8016068,2024-11-21T09:11:42.743000 CVE-2024-30334,0,0,39b8bda4e9fcb2dc335e4967a8936723d3d7559141db96cb30af4dc743764e30,2024-11-21T09:11:42.887000 -CVE-2024-30335,0,0,6fe6da64e2a2d4576e96f6db1f873ab8ac4d48fbf8fa3777aa63a439d6dc5a33,2024-11-21T09:11:43.017000 +CVE-2024-30335,0,1,a986d21d392b14b5767c90f287b89cc8e726962f65d44027a620e776758b7b49,2024-11-21T09:11:43.017000 CVE-2024-30336,0,0,eb1d2a7d0c150682396c0e73bc55dce4d42ef7347c71ca1ac9198368f49239ad,2024-11-21T09:11:43.160000 CVE-2024-30337,0,0,e7231ecfbecdc8d3398b69d763fcc795b2e12ee4038e2e18453e89c60288fe43,2024-11-21T09:11:43.307000 CVE-2024-30338,0,0,b91a634618a2dfa58da414fb669c25033009d4a414d4ccc4ed18190b8d611156,2024-11-21T09:11:43.440000 @@ -254649,7 +254649,7 @@ CVE-2024-30366,0,0,8a94b8c07e149343f3c82ef80064c339b80cc48a910b971ac366b1971f451 CVE-2024-30367,0,0,fa3c0211010d5197aa65f2c59b23c77ff0a2d000f637087b45b195677e61dd8b,2024-11-21T09:11:47.353000 CVE-2024-30368,0,0,d96361d29e3ef6c0afd7c81128aa8d9c11a5acd9fc35464a5b5574e6e62658b9,2024-11-21T09:11:47.493000 CVE-2024-30369,0,0,599260f9174352b9416cc6f9cfed9edaa7863cf92779bf720e6ddbe354fef625,2024-11-21T09:11:47.653000 -CVE-2024-3037,0,0,dba643d38d073858c63613a52375c845958bc4dd249ee56729108cbd508ab8bf,2024-11-21T09:28:44.220000 +CVE-2024-3037,0,1,b383da95d058d877e2bb21c16061051661d5b3819d925981b406e74e15c4304b,2024-11-21T09:28:44.220000 CVE-2024-30370,0,0,697bf20924afe8b36303c898ef8193332c6a6b99547fd6cb6a16dd7e9336646e,2024-11-21T09:11:47.807000 CVE-2024-30371,0,0,b5d6ce17f5315b9b23c2419b0bbf5646c23ef4a918d0050ba7180e7ce4f7a988,2024-11-21T09:11:47.943000 CVE-2024-30372,0,0,cc111a41a90afb5fb01651ed5cface3e07f85983fe25bdcc33097ca3684ea095,2025-01-03T19:55:22.060000 @@ -254750,7 +254750,7 @@ CVE-2024-3047,0,0,9e65e2e6ea3641539b8936b0201739017a0c89f16d8693ab8178f6ab49f7fe CVE-2024-30470,0,0,401350549a9af2e6d47de73b92a22226a42adb8030494eebd3f507fd43cb01d2,2024-11-21T09:11:59.440000 CVE-2024-30471,0,0,7f05159d7b1bb52c7f44f1503d91bcf3ddb878300d6d0f685babe2188a880de6,2024-11-21T09:11:59.580000 CVE-2024-30472,0,0,f99421b44702b1bfa7591fc35986a5e44a7c75afd2395131e35a18241f34b854,2024-11-21T09:11:59.780000 -CVE-2024-30473,0,0,4bf3fdf8d46217d16c0a2579e6552237ccd067795ed068b5d7430a174af4200b,2024-11-21T09:11:59.923000 +CVE-2024-30473,0,1,cc1662c64edbea7f5227d150a53a82edce96493533028b0b6947a25f09dbe422,2024-11-21T09:11:59.923000 CVE-2024-30477,0,0,5f48ccb06e4867f2a1b2058d885b227a439282c1bc0b756765407174c49f98c0,2024-11-21T09:12:00.047000 CVE-2024-30478,0,0,ca853d36566aeeb15fe38053a898ca56d8cdaaea4d1ee2a0cd42feec7f182dc4,2024-11-21T09:12:00.170000 CVE-2024-30479,0,0,3a1c45d84b195b84f8d4de162f387c14126668af368e7be294e7e3937eb3e371,2024-11-21T09:12:00.287000 @@ -254762,7 +254762,7 @@ CVE-2024-30483,0,0,34876275343bc4a3b9c6fba57bb4ac4253227fd0fea2f3bdc8489690f0cf1 CVE-2024-30484,0,0,1fdba9dc6ba163c6ba4b9414dc5d5c3d692e31129a19f55068cab57903ac52c7,2024-11-21T09:12:00.917000 CVE-2024-30485,0,0,959873beb181fc032ad160c5aa64db18502af2ec0b5777f048b062bd1212809c,2024-11-21T09:12:01.057000 CVE-2024-30486,0,0,db339813265f7f192452ae8556c302d856de22ce698a7c033d0d3ae4afc3b1a9,2024-11-21T09:12:01.187000 -CVE-2024-30487,0,0,13c822a8441701ee3630da48c50d2dc223efd2258557628d24a181401b62a6e2,2024-11-21T09:12:01.317000 +CVE-2024-30487,0,1,47d5458a05467e3f87dc39932c5b0d35ef8bed76f0f92b76740c9f4624a4b349,2024-11-21T09:12:01.317000 CVE-2024-30488,0,0,d56b2685374c31f5ece7f9fcbf9d4144f7d2785e3b1a5299872a3d43c2a53a85,2024-11-21T09:12:01.450000 CVE-2024-30489,0,0,746eb42c1d4701f5dab7993ae5fc87612143a868b6199455ec72c55bae79c78e,2024-11-21T09:12:01.587000 CVE-2024-3049,0,0,20f7e76b72edf5855d588d0316ed10874b8207f2f3b8002bded49efc30fa22c0,2024-11-21T09:28:45.870000 @@ -254772,7 +254772,7 @@ CVE-2024-30492,0,0,944b6e4f4861258dbb795ac5398cdeb34f608f275efd240e733c219ffb14e CVE-2024-30493,0,0,d4995f3c0236a8f39e19456beb10363f62a43dacd003296c017289c489e75ea0,2024-11-21T09:12:02.167000 CVE-2024-30494,0,0,86881d3246dd3af7f8df46136cf1d3c24086e55d5e94a82b4f320a5589a42ea9,2024-11-21T09:12:02.290000 CVE-2024-30495,0,0,56d4b880e421a985cd717d31e56ebfadc437be45f7645d1c309628bdbebd1eaa,2024-11-21T09:12:02.420000 -CVE-2024-30496,0,0,70ad66024e50ab10ef49d398a7bcf494c2fb14e62677cde8ca2634b65f70a76c,2024-11-21T09:12:02.553000 +CVE-2024-30496,0,1,365ccedb9c8649f89d3beed93700d73c3e6867c9030d9821a985bf1ef35bed5f,2024-11-21T09:12:02.553000 CVE-2024-30497,0,0,0c148092d9f0a9526c995e4b66b42cb69cb00ad77c3f3d302fbf00845f117224,2024-11-21T09:12:02.670000 CVE-2024-30498,0,0,36abd756ee2c580f1867577bf2aa51997e57ebeac3f6a296181f99dafc180b56,2024-11-21T09:12:02.810000 CVE-2024-30499,0,0,5275ac0246d15f9470bda59f657161aa6f3dfea157e8092fa09a4390dbf0b051,2024-11-21T09:12:02.973000 @@ -254809,7 +254809,7 @@ CVE-2024-30527,0,0,2c1feef7f01e006c11f931b2e2d894a8e287f3163f534985806ab8cbda416 CVE-2024-30528,0,0,ac1e81a5dceda71b86a3b3bdc4b07e2c23fb4e83ab19a55e510f918b6007674a,2024-11-21T09:12:06.553000 CVE-2024-30529,0,0,7e54f5e683a6e2f7cc403098b91509b499ced2237f14e8a2c08662321fc733c2,2024-11-21T09:12:06.710000 CVE-2024-3053,0,0,43bf02f20e58d457399258664f79ef54b1de1137161aaf1991195d09a193a383,2024-11-21T09:28:46.530000 -CVE-2024-30530,0,0,8f56a7e25ebfd8e609085ac1a3e36cbaba78ed87c1d49daab222775dbe83d72c,2024-11-21T09:12:06.883000 +CVE-2024-30530,0,1,76d328fea4649400b2118d2ec23f2b4d376f8e356e1be656cfbc66ff11873eae,2024-11-21T09:12:06.883000 CVE-2024-30531,0,0,9158f96d0f3926ed04db19b15cfb844be0c2582067dc1f1e6833f19bbceda472,2024-11-21T09:12:07.020000 CVE-2024-30532,0,0,e9c45ee18a559bf1fc8a96ff54502486454bf4e6677826aa73c3d205879f18f2,2024-11-21T09:12:07.153000 CVE-2024-30533,0,0,2d99adbc24aaba4f978a596df81a846fdc30732f69d20e35fec6ff27596c91b5,2024-11-21T09:12:07.297000 @@ -255126,7 +255126,7 @@ CVE-2024-31074,0,0,01d64d0a51bf3ec3df5d6c59c3da5338deaaf4325178cfa318378ec4fdf90 CVE-2024-31076,0,0,1293d87671585f621e57738a562115aa8563ab94cc4beb2163a9d49bb681d6cc,2024-11-21T09:12:48.140000 CVE-2024-31077,0,0,289d0fa87ed9966f075d7cf387e3721edb9b2f366b0ec4a722be692dbf847080,2024-11-21T09:12:48.273000 CVE-2024-31078,0,0,c685657ef2ddb5a5f6950813502d56bfa1502d3b4d479876fa59d79cc3cba853,2025-01-02T19:04:58.017000 -CVE-2024-31079,0,0,a7bf17abe5dd779f1e3abb78acf796ba0c38e4bbd6eab14dc7c7dfbbee442d74,2024-11-21T09:12:48.597000 +CVE-2024-31079,0,1,66c97a3115681edfb2af3b3af7e8fefe1cb552f471b53ad7ca4743a6af2ce16f,2024-11-21T09:12:48.597000 CVE-2024-3108,0,0,0a457dab289bbab6cbbf64df7736b6d0a7c3250fc6713e73c93a6029760a47aa,2024-11-21T09:28:54.970000 CVE-2024-31080,0,0,7985776399695af271a70402c55211a3aadc068d82c4a7fe69b7a47377da62a8,2024-11-21T09:12:48.727000 CVE-2024-31081,0,0,7c181540445311d712c076a10a1507066bfbca47351c61f292adbf4f85ec7de1,2024-11-21T09:12:48.930000 @@ -255358,7 +255358,7 @@ CVE-2024-31306,0,0,d225ff4e02585256db330196e23247f53caf206b29d320d872b89047c5806 CVE-2024-31307,0,0,fe5c146bc2e01b31d10c8798aabeced41a593f46147cc701844fecf521def462,2024-11-21T09:13:14.583000 CVE-2024-31308,0,0,e26bc58410205067bb8d8db3d33abfda2da6af578804048a337db59e83ec9878,2024-11-21T09:13:14.700000 CVE-2024-31309,0,0,4d74e223b139d85cacb1e8588eca9fc311ad79bf20795c25cd105fa0c27c32c5,2024-11-21T09:13:14.817000 -CVE-2024-3131,0,0,672bee77a4b9f56fc61c76e6dbf2a03a233210a4581feacc3c8db1074a180202,2024-11-21T09:28:58.147000 +CVE-2024-3131,0,1,e57750da524f00289ab21553f195ebb50a635fe1b30122a399924561108fed30,2024-11-21T09:28:58.147000 CVE-2024-31310,0,0,098c3633a4927790e31a6001c9d03c9b41631dbc55201432e5beb837f265765f,2024-12-17T16:31:31.697000 CVE-2024-31311,0,0,1a44e686db557c94dba0ef9b706e10f4ecfa786c8cdc2e5becafc8a2a70a2a92,2024-12-17T17:43:28.493000 CVE-2024-31312,0,0,a6faac328a1918a99ef8645176673fc9899bc26b8ba45d4fcf17774fe9f22e11,2024-12-17T17:32:22.067000 @@ -255440,7 +255440,7 @@ CVE-2024-31386,0,0,3acde958c7031a742cbc4a99febff02b326329be42acd0fe4f94a0fb89ff5 CVE-2024-31387,0,0,51d389c45d4eb19a80768936b92f81f13e6db6da9d727cedb95f8cea10cfa082,2024-11-21T09:13:25.507000 CVE-2024-31388,0,0,969b791e4fda50e2951bfa1c1b7c4b19f1267ec11ef79ab157b990117c9e8ad5,2024-11-21T09:13:25.633000 CVE-2024-31389,0,0,08af152747ff407e3026afce016704b24317def223e62ecb4990aa88b6ae4f5e,2024-11-21T09:13:25.770000 -CVE-2024-3139,0,0,8256dd6a355db54059311c98bf3b94761e9068a7e911d4c641b4d4c46d2a9bad,2024-11-21T09:28:58.927000 +CVE-2024-3139,0,1,77658101cb47b9df0af7ec6360dde0260231e9127755b511bbd64ee93e9b3138,2024-11-21T09:28:58.927000 CVE-2024-31390,0,0,09006f43013da697eb3ff65b55900b18a5bda9bb9eed07955cb886886fd9d7be,2024-11-21T09:13:25.903000 CVE-2024-31391,0,0,dd8e3986c0c7ad42b6bd64a59897a93d1a52069456c096537e64f413a47a9f44,2024-11-21T09:13:26.040000 CVE-2024-31392,0,0,2cf7bb0bb7b3840b5de6d2fa2cf618e252d13dcf4ceb1d56e669ff5d64f29037,2024-11-21T09:13:26.240000 @@ -255451,7 +255451,7 @@ CVE-2024-31396,0,0,12070261c9f4beb75949d082f0abbcd14c87a6065f52201897e85d3106040 CVE-2024-31397,0,0,4669b8c9ee6bff7627f3fabe734097169262ab8e925a351364e2643d116f2d6e,2024-11-21T09:13:27.013000 CVE-2024-31398,0,0,4e751e8f01cc9ca800cdcce821680e0d055f3ced6a85206b209df594140fe40e,2024-11-21T09:13:27.210000 CVE-2024-31399,0,0,69c671b3f2b9824d1d3b88c3a428d3e5889527feac06c7757b6605ccc0413fd9,2024-11-21T09:13:27.323000 -CVE-2024-3140,0,0,8bab856070776abb18b6b7f57cb0ccde288164022bdaf81821f81109713d2147,2024-11-21T09:28:59.070000 +CVE-2024-3140,0,1,80c7d2f962abb48769723f1fccf62f45b955bb05ec055e3729a5a2daf732333e,2024-11-21T09:28:59.070000 CVE-2024-31400,0,0,7e4080f10aa278ce8df7d9488317404c2dff8e1c3510182a88eb3f049386223f,2024-11-21T09:13:27.470000 CVE-2024-31401,0,0,d23bc7e26f4f52e4438758e09d0f4ed266aeb8096cfa9dc7f40d19524690ebfb,2024-11-21T09:13:27.653000 CVE-2024-31402,0,0,29278ec71a42a5755be62c4a283dfbe343c94fd25ddd8f5774b75d48aeecc828,2024-11-21T09:13:27.833000 @@ -255539,15 +255539,15 @@ CVE-2024-31484,0,0,659d2e969344deede1af2ac26a238cb0f51c82aeb2ea05f6e3ba4fe2a034a CVE-2024-31485,0,0,0d3fcb0ecb575c370349f9926a7edd62c66e8e79b393d1a37185c578f719a038,2024-11-21T09:13:37.617000 CVE-2024-31486,0,0,7b6afc57284e2eca1d2c55c22eae9408be3513e75dc9f259985e31d4ec232706,2024-11-21T09:13:37.750000 CVE-2024-31487,0,0,08fcc8ef6576c44ad67020aa3b90aa1c65c8d0ece85b73ec4ba9fe63beac1c86,2024-12-23T15:05:45.840000 -CVE-2024-31488,0,0,cfcf599019007e4943692b70a719c6cb37a35d714337963740462890b05d2346,2024-11-21T09:13:38.013000 +CVE-2024-31488,0,1,b027fef02b4391b8d4748a937f8c6a6469fd9117b7efe2885cea04aa58173a31,2024-11-21T09:13:38.013000 CVE-2024-31489,0,0,3c09d689ae4b29e24aa7a9b618ee52fdfa1da44cc707200d5479123d988742c4,2024-09-20T19:41:19.447000 CVE-2024-3149,0,0,8a78140490bcf701e13d0c05549610bd9a1157605ed7c6cf66c461a13a6097ff,2024-11-21T09:29:00.367000 CVE-2024-31490,0,0,fd601ecb6ce1c2bf33547fbbfd274f52c7252a32d9509a829d05990a5e592b31,2024-09-20T19:48:42.507000 CVE-2024-31491,0,0,eb8e9073235bb77415aa2949bd8dca7f0e2f76c335a1621addfa760485c0fdcc,2025-01-02T18:35:20.503000 -CVE-2024-31492,0,0,209860fc2b164f15f96abc0fb7ba6df99e9fd427b67254fd5c861805767efa72,2024-11-21T09:13:38.490000 -CVE-2024-31493,0,0,9418664761e0b780d111161059e98ef3fd056c9e2ef27d90db3cbacd9d17d9ea,2024-11-21T09:13:38.620000 +CVE-2024-31492,0,1,5ad9b4a65fd45e78f9277fa9db0f26964f6a5f0b495fbce6fa0081aaa7c894ac,2024-11-21T09:13:38.490000 +CVE-2024-31493,0,1,82928904ba67a71035bcf6e8e027a7610a3e93a3ec77fc3ee6a9adf3c5853b46,2024-11-21T09:13:38.620000 CVE-2024-31495,0,0,157a56de21c06532d9c8d19bbc8fe71f35ccfa7d686350a57acfb733a26fa532,2025-01-02T18:27:26.153000 -CVE-2024-31496,0,0,441349407eb47d7b15e75063141ce6cbfde8947a3ce6aa9eb5ef39471053a480,2024-11-13T17:01:16.850000 +CVE-2024-31496,0,1,e1d22f24a2a802e5701894cb2e97bd897a46d65906f4c3f16862ee666ac9199b,2024-11-13T17:01:16.850000 CVE-2024-31497,0,0,6de0a6e1630b9edbedd1fe7b42e0312690a0515831e8093c3ae9b84fca91dc04,2024-11-21T09:13:38.997000 CVE-2024-31498,0,0,b2e6276a70232623190c44e8fb464ed6a164bd12de239edf2266e9b650ae46d0,2024-11-21T09:13:39.247000 CVE-2024-3150,0,0,75d0be56062bf1a530210c178aada19a6cec46e37ca674016ee68e74c48916e5,2024-11-21T09:29:00.520000 @@ -255809,7 +255809,7 @@ CVE-2024-31964,0,0,f65cc6b5f4934fd6258a84b89bdf7ca1cbd4fc741d07ee5b4948fe67cf5c8 CVE-2024-31965,0,0,a8ed1e872b3a9f995eae2e922f1e319f6c74996724c2f53bc2532e2ff16ef251,2024-11-21T09:14:13.790000 CVE-2024-31966,0,0,388a4804a803a3021b672bca742c0ac3d033d29eb8c74dc8e7062eaa492d06d5,2024-11-21T09:14:14.003000 CVE-2024-31967,0,0,6e4ccd4470d9f327114109285401c64152b3dab7147d51257d96d720f055412b,2024-11-21T09:14:14.217000 -CVE-2024-3197,0,0,f1217d11d24ab9d20b80555e4d917853221ab2367a8b6b75e3460fbbd541e2aa,2024-11-21T09:29:07.820000 +CVE-2024-3197,0,1,b9fb16fbf3d7c2eb04a2d44790ba77d729bbda91d84d0b95175a122578c3222d,2024-11-21T09:29:07.820000 CVE-2024-31970,0,0,33204d77c9895ef9835bfefa3c81c26306232877898ac5023779bfcf2469fe64,2024-11-21T09:14:14.437000 CVE-2024-31971,0,0,37f5d0ea2290465bb08c6c6c2bd9a3efc4fbf790de4685c10c3a7407e7fd7e0b,2024-11-21T09:14:14.730000 CVE-2024-31972,0,0,af44ffaddba10003a9e8ec8cfe80535b511a133d20ef98164276d302dd852ecc,2024-11-01T12:57:03.417000 @@ -255831,7 +255831,7 @@ CVE-2024-31986,0,0,b5cedc45e879ef6685f89351e24eab1c892f41db1b4998dbcb052f3033425 CVE-2024-31987,0,0,9b0f8dde623b28428ea272e5cf88697a7093bc6e90820dc2079387179a984250,2024-11-21T09:14:17.267000 CVE-2024-31988,0,0,e1f6fe0e57c15ec80e26442fc27a73e4d01b1cd5c9eee218db1d87a564cae068,2025-01-09T18:54:53.390000 CVE-2024-31989,0,0,36cdf7afb424d91302a92c3464338da9f6357aa9b905adc4be0eba8e4665664b,2025-01-09T16:56:47.220000 -CVE-2024-3199,0,0,f1dcc8fa9251a13b6d2329d451b94b037b8df3eb36a8c0ed1aff5360e1397f65,2024-11-21T09:29:08.080000 +CVE-2024-3199,0,1,d82ddcd0be185a83e8424e96baf747cb4d2f3cafd8fec32114b3488db07adb4b,2024-11-21T09:29:08.080000 CVE-2024-31990,0,0,4ffcd4cb931fab7999e9eb8c0fc52e9e3272d1dca2a60d8c32eb43175564f375,2025-01-09T17:04:35.590000 CVE-2024-31991,0,0,7132990e3ccaac0b0b4c4387127e74fed9a9b88698bbb13243710b1c6f82cdf3,2024-11-21T09:14:17.827000 CVE-2024-31992,0,0,5bed648fa01ba4454ee23bd04fdfe08449c13d9c9222e0b542f88edea3bcd509,2024-11-21T09:14:17.957000 @@ -255941,9 +255941,9 @@ CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599 CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000 CVE-2024-32113,0,0,b0416d14f21fbcfcb8bd0e4b14fa8754bf0dc777f677edb1f6cc939227329fa6,2024-12-20T16:51:57.577000 CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b8c2,2024-11-21T09:14:30.127000 -CVE-2024-32115,0,0,3c8a228f0b573fc5544521748051d92562cca7b9375133f8f23d502a90fd21ac,2025-01-14T15:15:15.387000 -CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000 -CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000 +CVE-2024-32115,0,1,ef680dc47b7d0e120f93a67d58062023e74ac15a624c755f0486abedbb7c179a,2025-01-14T15:15:15.387000 +CVE-2024-32116,0,1,7f66fbc0cf609c0fe61654a322747af6ff1a714fb5807b2c130f548b553f018d,2024-11-13T17:01:16.850000 +CVE-2024-32117,0,1,de468cb54c9cc22f1406aee23215773771adb3307f609bf2ea211633dca5ec6a,2024-11-13T17:01:16.850000 CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 CVE-2024-32125,0,0,35c62d76638cb3e6e8a0b666fab0d78df4c4a5a2cc2247a2353bf686c3ce91e4,2024-11-21T09:14:30.493000 CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000 @@ -256171,7 +256171,7 @@ CVE-2024-32506,0,0,b107e8ddd51e583a9d0ff0af499834d62f7eab2b21288816ce4e8a42d2480 CVE-2024-32507,0,0,adfaa8d5d3c430c1e863ff4b449d0566f7cb0a7900c0306a1fa64b604809d5e4,2024-11-21T09:15:03.640000 CVE-2024-32508,0,0,da8422fd7cf2877f70a79ee64ae7196ed8b1f7a8a2342467127e545489027ed3,2024-11-21T09:15:03.767000 CVE-2024-32509,0,0,d7ae0abbffa293f67efb9678c0e0a3733d5c85e86821f6192484d815522412b8,2024-11-21T09:15:03.920000 -CVE-2024-3251,0,0,371afc7684261d422795975d3a1b2cf41e1cee6be072edfc0625a000ef2178e6,2024-11-21T09:29:14.820000 +CVE-2024-3251,0,1,8ad0e927340d28d1bd7a9d2da63f34eb26a9db7ce64b3380ff52c462a7f66539,2024-11-21T09:29:14.820000 CVE-2024-32510,0,0,d00b602fa3d5cf5b31ed40fc54835d9b4e6454dd89336228be943571d234b5a1,2024-11-21T09:15:04.043000 CVE-2024-32511,0,0,a0a3a03646a71f253902044309a5364d8e403c32206228ffa6c7031f0665cc88,2024-11-21T09:15:04.177000 CVE-2024-32512,0,0,0961b4b29cc71ae859aa6470f1f6fbdb19a6dff97b7a4bce9c9e3de7e85cebde,2024-11-21T09:15:04.307000 @@ -256238,7 +256238,7 @@ CVE-2024-32569,0,0,a9454b78d83009bb1146577e9f0f3c0fd07a0743e4f961159113b1ceff2d7 CVE-2024-3257,0,0,2c116a51a7b90ce8ec3015c8d19ee93a6cdcd0c049aec2ea7fbc5b207224d753,2024-11-21T09:29:15.640000 CVE-2024-32570,0,0,a9fd3f92bfea49dd7dbdcf524c5adf1f51f490aed3f76f9203382d2f08daa852,2024-11-21T09:15:12.220000 CVE-2024-32571,0,0,37503fe930b0dfa4cac2afb62cf84dc36d904c374111c980e59bf7c368a09121,2024-11-21T09:15:12.347000 -CVE-2024-32572,0,0,71021795f6f275b8094609f5ed316631642c39f84111647f161744619568114b,2024-11-21T09:15:12.467000 +CVE-2024-32572,0,1,80e7da7c6c91bb1be6b4943c32d3586d60aca4b926801be61272e7b798b82981,2024-11-21T09:15:12.467000 CVE-2024-32573,0,0,c4ada09449978ac5ef71753fe53b95c37ffe6879877b5e9dc86a461e1e2e1838,2024-11-21T09:15:12.630000 CVE-2024-32574,0,0,a89670989500cfd40178f80a09a009fb32c147beb8969ca4c49a42decaf90458,2024-11-21T09:15:12.760000 CVE-2024-32575,0,0,5ed0922468e1ff33f98d76bb2157ea9bd775d85cceda9c160e7ac270de9314d5,2024-11-21T09:15:12.913000 @@ -256381,11 +256381,11 @@ CVE-2024-32710,0,0,918953eb42e296f97ebf6deebebdf8d317f11d29355b027a7213424bc79b4 CVE-2024-32711,0,0,1d593f0396d46e34d125a4355bbd4a25bbe1ae7a62be70a76ec52b26061654c4,2024-11-21T09:15:32.090000 CVE-2024-32712,0,0,a8d2ae2d974a24c6f113d436186e75ad8dbc04bad5fdd05a58c5420aab8a9508,2024-11-21T09:15:32.220000 CVE-2024-32713,0,0,6a05cb86c686770e6f59d4cf6c14170810d565db8528243a9ffd6ad2528cd253,2024-11-21T09:15:32.353000 -CVE-2024-32714,0,0,dbcbdede6c48dea6a3474832a9a7ac234210193f55e967bf001b3ab02369ab18,2024-11-21T09:15:32.500000 +CVE-2024-32714,0,1,22339424f4225fe7cc6ddc5fd26fdc9b2a8a7d976e1cf1924b0e67aaee6f411f,2024-11-21T09:15:32.500000 CVE-2024-32715,0,0,304b4163975a1f0b3faebc68806d887b7dcd202ebcff1a4048659b9dc8325ad1,2024-11-21T09:15:32.650000 CVE-2024-32716,0,0,79cb3886456166b63fa8d928257b603f312c9ee1a224ac5f910c93bf57bf66ca,2024-11-21T09:15:33.180000 CVE-2024-32717,0,0,b39256f13e27eba31cb3c0bf23bee278701cdc790277aece6e6818ea3d037f61,2024-11-21T09:15:33.340000 -CVE-2024-32718,0,0,be0620dc537ac0370bf66f57bd5be346f127423856b03dc2d49178c19ad3b6b2,2024-11-21T09:15:33.480000 +CVE-2024-32718,0,1,881b8a1c407c4fc0d6d7d1d1c95c701f4beb3c7638a251f806c393333d5d90c6,2024-11-21T09:15:33.480000 CVE-2024-32719,0,0,6f2789ec54efc8ddedf42f68a45f9c75732887c1be2e19d4aad66b6559ded744,2024-11-21T09:15:33.620000 CVE-2024-3272,0,0,8755f31ebd5bed47a497c43058ee97d33270a67431045a7b7ba96fcc6233b0df,2024-11-29T16:45:43.063000 CVE-2024-32720,0,0,d0e3ba56f6f4a8089cade475b59bd6d70c2bbbfb7f07a0721792e0f5d0ff2be0,2024-11-21T09:15:33.770000 @@ -256425,7 +256425,7 @@ CVE-2024-32757,0,0,e90481642b590121fcf0c24df5d47bcb06a24fb8762f227ffbd72b326a384 CVE-2024-32758,0,0,4dff72018711e9f974dd46e5998fd183163f8264bf88908bc63121e1c7db8ae0,2024-08-09T19:00:17.183000 CVE-2024-32759,0,0,b6eb576e54af0c681685d9c2daa75b3ba79d7722c015ec50f117e0f6b8f5a968,2024-11-21T09:15:40.380000 CVE-2024-3276,0,0,231307f572bf201867b6e192771acf6a099f0f7f8523272307912246a8f3de31,2024-11-21T09:29:18.153000 -CVE-2024-32760,0,0,4dedb4929a8cc2116b48eeca427e00f0d0d501c823b266a2851c58d3e4cb0e64,2024-11-21T09:15:40.530000 +CVE-2024-32760,0,1,5f080350424ed4877f2eb6ed7b24e2611d09b2a4c5f5be4ecc91259116a48e43,2024-11-21T09:15:40.530000 CVE-2024-32761,0,0,c1bc30bb1c2e53c2b9b8f210dc65959b2a2346754df853ce010dd8c7e6d36dc4,2024-11-21T09:15:40.690000 CVE-2024-32762,0,0,e2e8b9ba690b7f1e2af2675ee1c4b7f2fa71ca55130e86054a01c63799cb3895,2024-09-13T21:10:30.137000 CVE-2024-32763,0,0,b233e95fe29930be363344f15fe06fe28d2e5c9aeaf866c0ce31a2c3b28d8537,2024-09-20T16:49:08.883000 @@ -256451,7 +256451,7 @@ CVE-2024-32781,0,0,a9ace391c3e34c225952205059353ba686a2d78403d5fcda4ff4d278c2a5c CVE-2024-32782,0,0,4980d838b08a2e6eba18c47ceb3cb57d060899d1fb9d0f538bc8c274b8dbe044,2024-11-21T09:15:42.657000 CVE-2024-32783,0,0,2ef660cd30a0ae4fdcb90a66d933542235d529b20d845301bd55b693993df428,2024-11-21T09:15:42.767000 CVE-2024-32784,0,0,14abe73c795ffd3332020a59fca51306d97d3fc775320dde3e49c2d901f2907d,2024-11-21T09:15:42.893000 -CVE-2024-32785,0,0,aa422ba0b25de06a7e9bcf7d68ce858b8ccdf3d03612f84b9630aaf744f74d2b,2024-11-21T09:15:43.027000 +CVE-2024-32785,0,1,e931bd9362d417e90801d358236f40b62d28b38a5f47805bdd7d270474651da7,2024-11-21T09:15:43.027000 CVE-2024-32786,0,0,610e891c42d6e580a68ec9f740b2457a69fe6d537e15ff4e5cde38d31a60eb26,2024-11-21T09:15:43.147000 CVE-2024-32787,0,0,f31bee818914c8319b33e4c8d2b3dfd92cbdcd1a30641764031401149bd9c46c,2024-11-21T09:15:43.267000 CVE-2024-32788,0,0,46dee0cff203cabca907a85961b57d3c514fb3ea5062d5eec2e98fe5b0dd1d0c,2024-11-21T09:15:43.387000 @@ -256766,7 +256766,7 @@ CVE-2024-33122,0,0,0868bb01e4bb9981dec89f062640d42956a3e024a237db623c97f8abe8d23 CVE-2024-33124,0,0,e8e7fc9b3f4c3c20a2f001aad74eca1df30a4dbfa8749113ee0a19aea169d675,2024-11-21T09:16:33.437000 CVE-2024-3313,0,0,6e8cdb5d7eae798bbd013f2c09830c63055cded6e685f9624b5c28fb30bc07d5,2024-11-21T09:29:22.393000 CVE-2024-33139,0,0,3c0cbfdd18d263d342e87e03c7da967e315bb5561cc9eea5bd4103f1b96e3fb6,2024-11-21T09:16:33.657000 -CVE-2024-3314,0,0,1935103b25ad927ee27c615864e5b20d51e4339288b8877705e3720a2e2d239e,2024-11-21T09:29:22.533000 +CVE-2024-3314,0,1,43684b92e6505cff72b6e66fd5f6d01ebfca7001ab8c6751ad8c67e01d813d64,2024-11-21T09:29:22.533000 CVE-2024-33144,0,0,b3e7c4b483653f877a725bca7e0dba440fbc5178535e6bdd978539cce7b654ee,2024-11-21T09:16:33.870000 CVE-2024-33146,0,0,171629cc4b8cb62195d164515a6fed4d8999741d196bb0f46c6f160081fc78d1,2024-11-21T09:16:34.090000 CVE-2024-33147,0,0,c2cfd2d98b97ea5fdcb835818c9cad8c555afacce5b3b33cc198b2c0c2ba88be,2024-11-21T09:16:34.300000 @@ -256831,9 +256831,9 @@ CVE-2024-33276,0,0,bf145f9840bf9187740b422cbdb925c3d18129faa26c9fadce8e33c5857d1 CVE-2024-33278,0,0,300b1827ecb83ff06dc7ec4b2116851abb544696a23f7191a2be7c5609af9fcb,2024-11-21T09:16:45.317000 CVE-2024-33292,0,0,6a64b57bbb7575a5f85fcab48e666d2cc493167374c7cbc261d525f6c155e921,2024-11-21T09:16:45.543000 CVE-2024-33294,0,0,f20394a35a90dcd893fc18219f91da48b0b033d114fa0a8684e8a3cf7c8d1e2f,2024-11-21T09:16:45.770000 -CVE-2024-33297,0,0,8b9979e95210fec413006ffdf0385a6ab03543e160d65e9bc48954fede45d255,2025-01-14T16:15:28.740000 -CVE-2024-33298,0,0,a90cb0c44141f5599150f22d0e1e0e22b0215f1fed2130d15dd8819e304d96a0,2025-01-13T16:15:16.813000 -CVE-2024-33299,0,0,e5cb63d00b29b63f7eda07e2eaf83ebeda4c51a0f5bc41f7fee65aca9d8c7a22,2025-01-14T16:15:28.893000 +CVE-2024-33297,0,1,62d8d91ba01c63eafec38fc0e6af1f11de2acaeb6f5fce76ed25ff835024c4cb,2025-01-14T16:15:28.740000 +CVE-2024-33298,0,1,d60093991b2520c0dbd60aba69cd6e98ee70eb2489e194f200911cc8a94f81d1,2025-01-13T16:15:16.813000 +CVE-2024-33299,0,1,969774646cecddcac4857a1694d50b1947951c08947ae33e0c4a479af824d015,2025-01-14T16:15:28.893000 CVE-2024-3330,0,0,c065d4bcab4f16db3053a980305730ff33dd0d5eb8ac38631155f08ab4ecfec1,2024-11-21T09:29:24.060000 CVE-2024-33300,0,0,fcfcc67a598fdec5020eaee48abef6ddc9c4f0ced0fdd6058b024ed4c721c78b,2024-11-21T09:16:45.987000 CVE-2024-33302,0,0,57b80549fd8096e59e00a3e7e11124741f0adff181ffcd73a2aeb26a71758fd2,2024-11-21T09:16:46.207000 @@ -256939,10 +256939,10 @@ CVE-2024-33498,0,0,50fe8de8bce7e48e620f0f169dde903b59c1e6db4dd10e5d366514fd61692 CVE-2024-33499,0,0,803dea18a502c032d7f43bfabb140fa02ca861ad18c39b77e542bf705c52768c,2024-11-21T09:17:02.293000 CVE-2024-3350,0,0,d4069f70c85c5408080c42132a37ca996283e73747386676dca3be3d2af545e9,2024-11-21T09:29:26.097000 CVE-2024-33500,0,0,746323f4fb4b9901ec2db4b5c0fb0d198abd8dc5a220cdbb454eaf0948907ee7,2024-11-21T09:17:02.433000 -CVE-2024-33502,0,0,d0674e8636083af5f3a783257cf74bc32f732f29257bf89f109ce4ef4feaa7fd,2025-01-14T14:15:29.360000 -CVE-2024-33503,0,0,4ef2e20a85c689ebcd4a284c2f4342090764795d94a628b568a80e00b4a93cd7,2025-01-14T14:15:29.517000 +CVE-2024-33502,0,1,394d98b945827d001b6bb56c5699707980ac196e168811599eff750ce7f6ed73,2025-01-14T14:15:29.360000 +CVE-2024-33503,0,1,9627fe3747d00d2bfec9cc7bcd3a434096fbe990d9d1ad1add1f66bb7d395f07,2025-01-14T14:15:29.517000 CVE-2024-33505,0,0,1225fe0735434c0168b96035a87d6bbc53cb961ca66ce6e44cbf0ac8c7a1fdd0,2024-11-13T17:01:16.850000 -CVE-2024-33506,0,0,ebc73da9186542bc574ff2ffa1bd0018ebfe9872b5e96093b78710739d042a79,2024-10-10T12:56:30.817000 +CVE-2024-33506,0,1,3fc13c6c865a35c2ba65ba702ff62e9990b1c54090a3e79326a92ff7aa46259e,2024-10-10T12:56:30.817000 CVE-2024-33508,0,0,3b76b0d03aba3d39a9333effe55dda5557e5f1c6adb532df7c6b80bfe8c854e4,2024-09-20T19:48:06.197000 CVE-2024-33509,0,0,11ba9153d706e68229ce986557f07cc698790121f85f23f3dcb45f7cca9bacc8,2024-11-21T09:17:02.900000 CVE-2024-3351,0,0,fdd55a913ea8ca434b668d00d42f466f17e8d7ad8fab0600f36cb4e91885e476,2024-11-21T09:29:26.227000 @@ -257003,7 +257003,7 @@ CVE-2024-33564,0,0,91c6f3a88e6fa9a12ecc1c501d4eb570213632d372ee621cb73eeae69ae8b CVE-2024-33565,0,0,f8ac59487f0ef5ad93af6071c80b82fcc0b754442b9a6dd245dc4785875fa939,2024-11-26T15:47:54.437000 CVE-2024-33566,0,0,0a14cc0ea99cac25f6074b80a5cdf26ca23a638ffc8bd0e69ca4fc09d0b8f93e,2024-11-21T09:17:09.930000 CVE-2024-33567,0,0,cf8c266aa4176a9f4e335e04c8716e3d23a144b9b4be0bd49b92c79efe210938,2024-11-21T09:17:10.053000 -CVE-2024-33568,0,0,d288e11f4867a9b2ee2a925656539804eaa23eeff48779eacb776222797f6b46,2024-11-21T09:17:10.180000 +CVE-2024-33568,0,1,97bed0b8998569578f840a5cb7cba5966fdac66def2b7270cce19b11f6aad795,2024-11-21T09:17:10.180000 CVE-2024-33569,0,0,79125245cbe0905c94fdb34d1dc829f7eca3884c8dcb3558cf500491820827f1,2024-11-21T09:17:10.307000 CVE-2024-3357,0,0,b9470eb877484a6a1d3b031e7fc673eb397601f17c8ac0f3c5390d09b2d15c93,2024-11-21T09:29:27.060000 CVE-2024-33570,0,0,6c83c6c938ddb2cc871bb41684ef01126272a5713c0a8bf6de4341bd743fe097,2024-11-21T09:17:10.443000 @@ -257256,7 +257256,7 @@ CVE-2024-33907,0,0,621c3e9e0064a0cfba07e2b00ee09c218cb7474799c5ddcba5baa09cf7cfa CVE-2024-33908,0,0,18e5ba74b5b314f4d44fb68022de92a3f27b318cf379aeb205fcb5dcb49e942e,2024-11-21T09:17:43.157000 CVE-2024-33910,0,0,02e7d7d2c717810e2e6046c8ab909ba55dab8588e7c23d058b758e17103fa1a5,2024-11-21T09:17:43.260000 CVE-2024-33911,0,0,0e3e9910921546cb7570b8065942096c714978a134424a460a960dbda2fdb342,2024-11-21T09:17:43.373000 -CVE-2024-33912,0,0,f1219868056edf9b3b0c2996b483dabb825e4b5c3e74879dcbbba0a4b0353ac2,2024-11-21T09:17:43.477000 +CVE-2024-33912,0,1,cf289e6fa306aa8daf3cc37c485af97aa05f6c74f7058a67f8b3af3512fe5068,2024-11-21T09:17:43.477000 CVE-2024-33913,0,0,c3f41653850668bfae1fd42c342538945d3100d9b4dc2c329a882cfcb5828e2e,2024-11-21T09:17:43.583000 CVE-2024-33914,0,0,f1c6db7e65f5d7f5cbf1d0a7aebea997776701c106aa56b55d4efd8ea3417c4d,2024-11-21T09:17:43.687000 CVE-2024-33915,0,0,b5d6ca9802eb50cf7b3fedca8792fbf9297319e0fe0443966abc02517a524960,2024-11-21T09:17:43.793000 @@ -257494,12 +257494,12 @@ CVE-2024-34155,0,0,cab98877c86710a24b6232356801c572b3fbc0a3514fafb0f172bdc4e8b16 CVE-2024-34156,0,0,7adeaae3b1acb009065f3eb01e3a00f28dacbe2579f28ba7266c18d1b1e4fbb5,2024-11-21T09:18:12.853000 CVE-2024-34158,0,0,7398f1d9c16e74fe70c443b0a6b141e3a955771017d6bb32731341838047519c,2024-11-21T09:18:13.030000 CVE-2024-3416,0,0,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000 -CVE-2024-34161,0,0,2c366ee1b57d461f68e85fe2d68570b44da9298dbc452eb855b30363fe2b90fc,2024-11-21T09:18:13.217000 +CVE-2024-34161,0,1,b4374b0579e0bec61289235f59423416aa3b4bea203a2da7aee69adcbb077d8f,2024-11-21T09:18:13.217000 CVE-2024-34162,0,0,99e5e0e47ea9cc892ad1a2752ae2eba8b11fb682968d0009729fc7651fc4cff4,2024-11-26T08:15:06.123000 CVE-2024-34163,0,0,ba58e172d2c30fa83f64389865749b115811be245ceff1f9c6ba324a80e84b91,2024-09-12T18:59:30.753000 CVE-2024-34164,0,0,713b6728aabcc03c74788824e129ab8b5a3e89826a8ad42af15ae45f0c2b806c,2024-11-15T14:00:09.720000 CVE-2024-34165,0,0,05db88a6da35010dc20b3e8a9d223822b8683997a0c67d0b2d4f9d52b701ab91,2024-11-15T14:00:09.720000 -CVE-2024-34166,0,0,b65e3f742ada4aa97bbad2fd2ef9b5642c8b234eddbb763ea26559729ad0d782,2025-01-14T16:15:29.033000 +CVE-2024-34166,0,1,dbf66d70e8ef489da6b99dcdfcaff1a550f08c84bc5a72df68602ca62b5f9ec6,2025-01-14T16:15:29.033000 CVE-2024-34167,0,0,b64f17228e82af8e3cfbfc8cc266e318fd2d8ce529ce993856d797ebadc36da9,2024-11-15T14:00:09.720000 CVE-2024-3417,0,0,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000 CVE-2024-34170,0,0,5d43fe9fb1c0c5ca40611077a724b542eaa2e023bbe67fbf24d729c47b6470ee,2024-11-15T14:00:09.720000 @@ -257539,7 +257539,7 @@ CVE-2024-34223,0,0,c2ee839afb9b1fac1c90169923bdab548a7c7cf9533cc5507d2fca08bb6f0 CVE-2024-34224,0,0,3a60fcfa0164eec7a80099b3676c3554e933619cb6a29b591672b45bc0c440e9,2024-11-21T09:18:20.030000 CVE-2024-34225,0,0,6d2138de3835c9191c51c4afb4300d242b9779d66092f9c88507f5e324d1fce4,2024-11-21T09:18:20.260000 CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4cd17,2024-11-21T09:18:20.477000 -CVE-2024-3423,0,0,d93fa2aa82d74348c343103dd41dfdcb78f23bbbf018959a0d2f38920066aca6,2024-11-21T09:29:34.370000 +CVE-2024-3423,0,1,04c44e8c396e88e33e76b227756ab6e4a3cdb303568294582004d57706273469,2024-11-21T09:29:34.370000 CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000 CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000 CVE-2024-3424,0,0,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000 @@ -257616,7 +257616,7 @@ CVE-2024-3437,0,0,bcf3c80a48dc3d5cf0953af92c9042ed5f968c48f541ba1ebf1af92f41735f CVE-2024-34370,0,0,4047551e28a0b3c8984c1f8dd180dc78c06c6194ff8ba96eb64ad39dfda39854,2024-11-21T09:18:31.687000 CVE-2024-34371,0,0,e846a2fe676040566f4e6efa50b35269655bad9983cf7c77a9c9788717f4eaee,2024-11-21T09:18:31.803000 CVE-2024-34372,0,0,6e08f9389cdc780953f7d11dfd76b886412e9c780b4d6714a57a67ed1541b47a,2024-11-21T09:18:31.923000 -CVE-2024-34373,0,0,8594dc06e2ca35a06f1c6a4acf765d291be220d3e75cc47f603b138d8a40c8a0,2024-11-21T09:18:32.047000 +CVE-2024-34373,0,1,aef22129749e0f74a97bfdb3552de88e51bfc89b0b1c5939239b311529caa87d,2024-11-21T09:18:32.047000 CVE-2024-34374,0,0,a527a1d2996d1e2f0a995148ce15f3a2815570a5f249ae10c11b53749e5c2744,2024-11-21T09:18:32.177000 CVE-2024-34375,0,0,42c642f287ca3e9930a3cfbb84eebb7ed663620473f6ae9bd8aeebdfbf7f742f,2024-11-21T09:18:32.293000 CVE-2024-34376,0,0,be096431336d572ee1902ef44d862b693396a16053ee69d5a1dee92f13e9dea6,2024-11-21T09:18:32.413000 @@ -257759,7 +257759,7 @@ CVE-2024-34539,0,0,c854bbe7f9048f728960760cea4c583690145340b45377eaa6900e438777a CVE-2024-3454,0,0,9cda14788c848fc1f2c1f8413023ed5048f1970667677666d2e98eecc19724ad,2024-11-21T09:29:37.917000 CVE-2024-34542,0,0,f6fde5a9a1021bdac96a38d25f395da3eae8f314c5b6313d56b29e5eacd0c480,2024-10-07T15:20:34.553000 CVE-2024-34543,0,0,b18c85106a744269ca9e1f0c3a3f847e2b6877b614888d11614b6e4ba54583b5,2024-09-23T14:17:42.957000 -CVE-2024-34544,0,0,307242ea5c72d957109abb560d7ef5f820428fbdefe15f37aa403eb693a929ea,2025-01-14T16:15:29.140000 +CVE-2024-34544,0,1,7e7c9aeb83b9494021ef13335012c0050648225274ca095f75ff3beb3e4e3be4,2025-01-14T16:15:29.140000 CVE-2024-34545,0,0,5c279474cf289d0d87cee0453870a2820d04eaf84cb229bd6613a7c051630bf6,2024-09-23T14:13:07.883000 CVE-2024-34546,0,0,48f856dfffe054d925e60c2e336606e9498c6c8f848b7fb3d3812f76c2d4654e,2024-11-21T09:18:54.437000 CVE-2024-34547,0,0,6cbaa9fdd622f7802dc941b02e1b5c79774f9df5ba6501a23d06ea5069aec8be,2024-11-21T09:18:54.557000 @@ -257779,7 +257779,7 @@ CVE-2024-34559,0,0,add1f51454556128ecef0e724a3bc62f9a607a7086d3443048f323f79f5a3 CVE-2024-3456,0,0,666f10caf8d4abc2c878e20fa7643e23a4280263bd59ca1aee750ef6bdda76a6,2024-11-21T09:29:38.203000 CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000 CVE-2024-34561,0,0,94a3a4a32680e52abd396f991fa3f3091d097ef31d868ad3111ea0a4b4409a56,2024-11-21T09:18:56.363000 -CVE-2024-34562,0,0,37b87c42fd1b918b8802ca021eab0d058b047e5fa817070a54e3ccd30872d37d,2024-11-21T09:18:56.500000 +CVE-2024-34562,0,1,50df53f6e1c6c5425184cd1540cca4bcd667f9efb7b62abe55cc5756349a20a3,2024-11-21T09:18:56.500000 CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000 CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000 CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000 @@ -257795,7 +257795,7 @@ CVE-2024-34573,0,0,ecf15fea9a46b1a7d769a0ae7e7a48e67613b9ca12f88eba450bd43ab08c4 CVE-2024-34574,0,0,871147d88ddbbe403ad07267a1d94866cf59f9131e4c297094224e459568fff4,2024-11-21T09:18:58.107000 CVE-2024-34575,0,0,c7e8ae0dfc8ffcb80dad6d4977fccd670908b42388ceb4498b484ec1cf63a0e6,2024-11-21T09:18:58.233000 CVE-2024-34577,0,0,f3255e55536d0eb4bb14c59b08f09dd86b76f85d6d1e936c7770bbe6551a4405,2024-09-03T14:59:01.767000 -CVE-2024-34579,0,0,599457ba6b797b0690d2b8d2623ef583802c3f981c1628b9cfd99cb218ccfb01,2025-01-17T01:15:22.377000 +CVE-2024-34579,0,1,104acd3e2e38a82fac512c7a1af9a9535e4871945105b555720ff20b3465715f,2025-01-17T01:15:22.377000 CVE-2024-3458,0,0,a2fac5653fa1106e695d9d641fc9dcfcda43439beaaa13eb375906ce69f167a5,2024-11-21T09:29:38.487000 CVE-2024-34580,0,0,45af0526328f2aea2eabd45e84f4b9bd97e31bfab36893128b721024e6204898,2024-11-21T09:18:58.437000 CVE-2024-34581,0,0,c66b7b716fa6a8506c21f90ac27fa18a0c9d46baf752a05e8a667ec61ba2b234,2024-11-21T09:18:58.680000 @@ -258067,7 +258067,7 @@ CVE-2024-34882,0,0,09a6f6bda3cb178895648e96db67705c4c022e540d9dded3b455a872bdf1e CVE-2024-34883,0,0,092a706a8734668eb77324d8c51c642c9be84207981c1a5fec8f14c3c51869f4,2024-11-06T19:28:34.900000 CVE-2024-34885,0,0,152b0b9e5d3216b5b9a7beaa1f04a898f996e21d92477998a2435b7f0ccb0402,2024-11-05T17:35:15.887000 CVE-2024-34887,0,0,15bfad19b1d1ed181ea959191d94dc734739bf83ed021b83e2ef5681c9e26ff6,2024-11-06T19:28:15.613000 -CVE-2024-3489,0,0,99a3e408b39519db38c307d74a5bb81efdecbd210fa33f8b0e07e4fc1e15c2a7,2024-11-21T09:29:42.780000 +CVE-2024-3489,0,1,69b0e01482f42be0166515f396eb1922b701b4792005488430da942e13572edb,2024-11-21T09:29:42.780000 CVE-2024-34891,0,0,25cb8e112712853608c2c85751a52cff47c44dea59bc7bfcbbd2c0cf2d3819c2,2024-11-05T17:35:17.710000 CVE-2024-34899,0,0,9ecfd3fb5f76f8e91935a0ef479d0a8882ca629447934509efa12eb54a961a89,2024-11-21T09:19:31.127000 CVE-2024-3490,0,0,a44d4e788dbbb31c2d20e7cda7c06080195f41b9c2be3506ebb9ea17f43626d8,2024-11-21T09:29:42.900000 @@ -258198,7 +258198,7 @@ CVE-2024-35168,0,0,72c360513b343ef3d5d110e12281ef48774c959f016065c2926365e7e0b61 CVE-2024-35169,0,0,a1f628ccf8d3c2ce1e9c501ab96fcec6269b275293b150f1cce2b1d591443a51,2024-11-21T09:19:51.460000 CVE-2024-3517,0,0,e5387b700944c6080aa9b03e7e89f5a8085a1222a6f8825a121a763952e726d5,2024-11-21T09:29:45.940000 CVE-2024-35170,0,0,b1eef986d43611b394a799821cf7fe7eb4c44aa6e12473b58aee962a84d79c68,2024-11-21T09:19:51.577000 -CVE-2024-35171,0,0,23deb103d053d952e26b010ad2a3818485f947b7038417ea1694bc74ef20e8db,2024-11-21T09:19:51.723000 +CVE-2024-35171,0,1,2f0d69e35afcc7baedb5841e7daf1cc5d2e1ae6ed8032387947d49655ba71297,2024-11-21T09:19:51.723000 CVE-2024-35172,0,0,ccaaebaa2e461a069d2019b08d3895e1c80e139e7e83e9d6d0bc6ed276417ddf,2024-11-21T09:19:51.850000 CVE-2024-35173,0,0,6e586b770532bbec70a1a22d51641e5ebb020c65a9dd9f5f046c1c67746862b1,2024-11-21T09:19:51.977000 CVE-2024-35174,0,0,45c1ded6f418eee47f7da5d436a57a8ad12156a76cd16071e103316cd7fdd28a,2024-11-21T09:19:52.110000 @@ -258227,8 +258227,8 @@ CVE-2024-35197,0,0,d5326fe560ecdd602b2f0cfc8c145fa46d88dbe6cb9b3721815d62fb2c64f CVE-2024-35198,0,0,4455bf7a526d840df73bfb7cb5145186815eead54fae8f5c2849b9d59aba3f6d,2024-11-21T09:19:54.920000 CVE-2024-35199,0,0,4bd67b951a6f1baf7a94820b27d8bf9d3eee00ee1362d6edb0456c2376e74606,2024-11-21T09:19:55.093000 CVE-2024-3520,0,0,dea180350db432968451fca16d84d4384456cbdf80b62e14d7f4e13191f01e06,2024-11-21T09:29:46.280000 -CVE-2024-35200,0,0,32f5dee3f4a70959d8af21d2f98cf3ed93aeeab6e1c34663351addcfffee547e,2024-11-21T09:19:55.233000 -CVE-2024-35201,0,0,b08895a05f69ea340ff4087802c32dcccb33aeb564a2159d1b7ea75fa18c7383,2024-11-15T14:00:09.720000 +CVE-2024-35200,0,1,bacd4121e1a9ba2d558fcc359bcae1c8ec9f12f33485ae6233a8c40e9bf1855b,2024-11-21T09:19:55.233000 +CVE-2024-35201,0,1,f8a5b90459cbd11135685faf5240cf25c70e3c2501ebe9a37ca8eacd936ed565,2024-11-15T14:00:09.720000 CVE-2024-35202,0,0,f3502ac16a142c6fa2605a574809aaea3b9f27445139dcbf89ce87db4f63c852,2024-10-15T12:58:51.050000 CVE-2024-35204,0,0,d1b368734e3dc18cc976cbdce89dadd38ac33f61db7221474e1ea942ad215f21,2024-11-21T09:19:55.753000 CVE-2024-35205,0,0,957eb6846f8ffa9fc85a7b85254df544b79538c9ad4f1555882f49c7a3785c28,2024-11-21T09:19:56 @@ -258294,14 +258294,14 @@ CVE-2024-35267,0,0,9ddea27617f038237b3128d4e75fc5102d056540871869cdbf937fd02f76a CVE-2024-35270,0,0,54fc0aef882c68b0af36e2a2e87ea567a3f0433770da6d3701c29cb540de6659,2024-11-21T09:20:03.357000 CVE-2024-35271,0,0,53435ea3e84efa467a9bdfc22250170e3299e5610ce3c91fa1af50680f120201,2024-11-21T09:20:03.527000 CVE-2024-35272,0,0,7c25fd9425a5925ce7b680ae430dc4c99441fca7143b7504eaba903c26bfba9b,2024-11-21T09:20:03.667000 -CVE-2024-35273,0,0,9ab858ebb346d630e6bbf8da2157e41f0d8e42e4a4c1d3d1d26beda7fb4bf411,2025-01-14T14:15:29.663000 +CVE-2024-35273,0,1,cb2660ba677731ad46e908fc4b3a75c9f0f87742fb675f2319c1a3641dec0f5e,2025-01-14T14:15:29.663000 CVE-2024-35274,0,0,b634b8288c0dfdfa69709dbe44a7d735931faaa8485a146c2a3cc42a8a1673b2,2025-01-17T20:29:43.327000 -CVE-2024-35275,0,0,db920a4838b9e37c71b9bc6fd6d2d69f628712cc99e5de16479c022646ccb044,2025-01-14T14:15:29.817000 -CVE-2024-35276,0,0,4c959b5ba1a33576ed209445d5bbc58fbac65866e46c0631f77c80bdc2461b2f,2025-01-14T14:15:29.973000 -CVE-2024-35277,0,0,1f41c5934d010de66ad104c6e38cd26c146e0cb4b1b59e8e833cdfbc61bc9a2c,2025-01-14T14:15:30.130000 -CVE-2024-35278,0,0,dba5ee459729d0618f30372e7418d89fc2322b58b80fc5a2eaca09ea6cc469e1,2025-01-14T14:15:30.280000 +CVE-2024-35275,0,1,583f77811c10de909b8dc2128569f4a0515fcbc5dd4ce741c61b2b832cfd3ee8,2025-01-14T14:15:29.817000 +CVE-2024-35276,0,1,1e32b09931f20292df20ec560554a0129c6fbe084444d47d38047f58b92cad8b,2025-01-14T14:15:29.973000 +CVE-2024-35277,0,1,4b20cc9dc006fdd7b334170b7c31a51287be0138ba15ea10244f023b90076c1b,2025-01-14T14:15:30.130000 +CVE-2024-35278,0,1,7d16b104aa0ca58e70cee55ae5c43c808bf321d9ef5cc408e3edf630554f5fce,2025-01-14T14:15:30.280000 CVE-2024-3528,0,0,73792362235e828bd56025419c83c67ec901a0e2b04dfa37d11c551a857b0238,2024-11-21T09:29:47.207000 -CVE-2024-35280,0,0,e22e82835d59e884bad53a41c9918e2e24695af5d6ee50fb2ce5a4fc81a55a71,2025-01-15T11:15:09.087000 +CVE-2024-35280,0,1,a730c77ab28bb884ab0fce1f1001ddcaffdcde9c3e30a4c1aefe21dfb75cf4e3,2025-01-15T11:15:09.087000 CVE-2024-35282,0,0,174e154b42e127fa67b7958222015b753e479a85266f575b2e2ca4b3057942d7,2024-09-20T19:44:17.557000 CVE-2024-35283,0,0,fdb32a776c5efc323466eaba6c259cf3489c6c6ec5c750c58fec77f2eb007c63,2024-11-21T09:20:03.977000 CVE-2024-35284,0,0,277d9a5f01a809bf78700b423f1bf84acc1c72d215de5cf4ec67e6bf8fd3241f,2024-11-21T09:20:04.203000 @@ -259131,11 +259131,11 @@ CVE-2024-3625,0,0,cf7822922c953723f7708b175fb6862b465c211d35958a5ab499265593a6b0 CVE-2024-36250,0,0,7e7a993f0589716a6daa68f43c8f6a3ca976236e7f62dc6019596010a75d529c,2024-11-14T17:11:23.913000 CVE-2024-36251,0,0,522c391346a563e84c374e7a7bf3a7ed2e510a6d30321e4e8c43b31108908dd7,2024-11-26T08:15:06.760000 CVE-2024-36252,0,0,95f3d83a37ed6fd9221b9e42b012743d23e0c17e5ba7c8454c48c785c00a5d66,2024-11-21T09:21:56.440000 -CVE-2024-36253,0,0,efff8c72da2ed69a58e96e9e596f3ca777f37d47d8ac4225b4c4ed0ab8719bc0,2024-11-15T14:00:09.720000 +CVE-2024-36253,0,1,059e474e4175f8d54d978e5e90e4d07f2b38565f565700a5e008de2282763ef9,2024-11-15T14:00:09.720000 CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3a12,2024-11-26T08:15:06.923000 CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000 CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000 -CVE-2024-36258,0,0,8a94fd66c58364143284de08187a7a93a0bd4b98c3b3be673e7e5742e1535a82,2025-01-14T16:15:29.250000 +CVE-2024-36258,0,1,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000 CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000 CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 @@ -259147,9 +259147,9 @@ CVE-2024-36267,0,0,3648137b8a65567f0be472a89c4c19f9f4b7a0248bb8012d2cfb3977e6c54 CVE-2024-36268,0,0,6bd7f2a08d60f857a812fd35ccc84177256999f3bb9a77410d2e76736e372be9,2024-11-21T09:21:57.987000 CVE-2024-3627,0,0,ef339dc21a5b1fd1421fb7d91956f750751521bfa12e27bf4e270f0ad2130a0b,2024-11-21T09:30:01.343000 CVE-2024-36270,0,0,acaf2ccc273dd2e6490c172039e027026cc310fbeda3126ff89ca0ef8ad854e9,2024-11-21T09:21:58.203000 -CVE-2024-36272,0,0,87477bd2cacd9f544cb1338cd0cf18d23f169ab0f3529182f932e707defae15e,2025-01-14T16:15:29.360000 +CVE-2024-36272,0,1,a7dbc0cbeae123fa36835ce40bba69633c7e84046585c1b19cb882cc5e2500b6,2025-01-14T16:15:29.360000 CVE-2024-36275,0,0,a220a1a2c9428b373009c8eab26f07177e45f382eb9f965967e2c51f4b4ce45a,2024-11-15T14:00:09.720000 -CVE-2024-36276,0,0,f2f0fa62f8fa09060016ea51b13d3a23fc785fd1e0aee37b71fd467eb5809d52,2024-11-15T14:00:09.720000 +CVE-2024-36276,0,1,2a6dd1c84efe704e02a113088d217fe4d6d03572ef3770483248fa08f717b0f3,2024-11-15T14:00:09.720000 CVE-2024-36277,0,0,badb4cc53c7202f17ca4e4f181b5ea1b2e562b954d3fa837092b06388881e158,2024-11-21T09:21:58.537000 CVE-2024-36278,0,0,823563aeddfd98d3e93f22c26b562542e8ad7cf7063e2491371a5c535851f7e4,2024-11-21T09:21:58.730000 CVE-2024-36279,0,0,301b02b4e0a70f551decb44b8d794050e356973281cfe9dbc17669b0dba3b799,2024-11-21T09:21:58.870000 @@ -259162,9 +259162,9 @@ CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482b CVE-2024-36288,0,0,541c28d0151ea2628599b96895a2d3701ce11da4847adc16a1712449dea92513,2024-11-21T09:21:59.667000 CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000 CVE-2024-3629,0,0,df403ccbf1837e11a032a9bb80d87536760e2eeafe99d76ff9b043ef1d743b24,2024-11-21T09:30:01.633000 -CVE-2024-36290,0,0,6c6dbc532fd320f34ce89a55d1361b4a3ee2801bbf334805cbf2f0b19805199c,2025-01-14T16:15:29.473000 -CVE-2024-36294,0,0,e1e1ff63c04ff1e8afe192911e10224d1240cb368400fddc3d0014142cf5e0f7,2024-11-15T14:00:09.720000 -CVE-2024-36295,0,0,7d000369e632f26f9cd64ced983f04277623f84fd723af7dae976704b0329283,2025-01-14T16:15:29.580000 +CVE-2024-36290,0,1,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000 +CVE-2024-36294,0,1,d8f0f2f67611e7f90734c627016952142e064479464221f77d47ec17d1ffddd2,2024-11-15T14:00:09.720000 +CVE-2024-36295,0,1,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8adb2,2025-01-14T16:15:29.580000 CVE-2024-3630,0,0,77fcc9a4ab1f0f4362906fbc77c6b3cee6304fb38c0fff6803c856751be26cdb,2024-11-21T09:30:01.833000 CVE-2024-36302,0,0,1d69f0b64200ec5d47ab74795b72da3adcfcdb8bd0ca0ec8048662d28fc092ac,2024-11-21T09:22:00.113000 CVE-2024-36303,0,0,a964fd215355ee98ffcb8f25a918a0cfbb4d6ac28e5c8f4be35dcaa7e27894ee,2024-11-21T09:22:00.237000 @@ -259220,8 +259220,8 @@ CVE-2024-36399,0,0,5d8883d4e31da5ef7c620f45aac4672768456d98184ff090ae8593b5bfc95 CVE-2024-3640,0,0,03d30f90776beeec67f3b1ddca74d31ed1690ede1e0f09c18d136bb1708f6dc7,2024-11-21T09:30:03.560000 CVE-2024-36400,0,0,65a0b2b37341a1219cac5f112aecea97fd94f3de0c9457671290235a7be01af8,2024-11-21T09:22:06.187000 CVE-2024-36401,0,0,31255c330f99246bfe0bc2f818cca78d4cdf5df279630134ddcb3f5120ee0894,2024-11-29T15:32:24.923000 -CVE-2024-36402,0,0,37891ac3d531b82db35872fade88c6394eae48b68a53d6c71ea4404bd563519e,2025-01-16T20:15:32.047000 -CVE-2024-36403,0,0,4b0fe82325f13775fa48110f6c6190e4b434c614c0caeb5f822bb5c44fd035ac,2025-01-16T20:15:32.197000 +CVE-2024-36402,0,1,5233f15c8cefdd264063102dfe65cdc5af5d17738d5330e61eb3e627dd79a77d,2025-01-16T20:15:32.047000 +CVE-2024-36403,0,1,e32e542e407286f32afeb20056b887d26cd4be1457d41873318537c422f0f435,2025-01-16T20:15:32.197000 CVE-2024-36404,0,0,c6169be2a4b80ff24796d6aab24ff44ee78807a200d0b8ed7d88e5f2592cc7ca,2024-11-21T09:22:06.500000 CVE-2024-36405,0,0,f5f795ee430dca5c7d27caf7356fa61c08cbd48e466e77638f6465518e714dba,2024-11-21T09:22:06.647000 CVE-2024-36406,0,0,cb6e68653fe4438582177029263fde35127de543849a1ed6f4134f125234ae90,2024-11-21T09:22:06.770000 @@ -259291,22 +259291,22 @@ CVE-2024-36472,0,0,2141a82cf2963fc87ad353f49c6d6e9a36ee98eea852abcc6337f04d66077 CVE-2024-36473,0,0,464af3dc48eed905b23512cfd65ac4ca881cdd106c7b0890012fdcab698d056f,2024-11-21T09:22:14.983000 CVE-2024-36474,0,0,c6326bd8b9714adac09be987e683c4a23e8086c5abc0c8254213e6de6cdeb724,2024-11-21T09:22:15.087000 CVE-2024-36475,0,0,adc81ee421cc0d62608283a0eaf7146ba146a092b410236d1fec5e85ec0e2260,2024-11-21T09:22:15.240000 -CVE-2024-36476,0,0,b4ae127a9e2c9e12a2d8ade1a188283ff54f54bf08493756920669ed1caa4337,2025-01-15T13:15:09.460000 +CVE-2024-36476,0,1,f55c44e78567de7a0cb187ac1e5a40385f7a610e38f332243c04301fe08d6f70,2025-01-15T13:15:09.460000 CVE-2024-36477,0,0,6675b402ffdea85719f18cca79852910b0ef1caf645b50047a401b33d739dc9d,2024-11-21T09:22:15.493000 CVE-2024-36478,0,0,238d158212ab0e4f6079da39ed5847f632dffce1f07ef80950ab3c4538806296,2024-12-02T08:15:05.787000 CVE-2024-36479,0,0,25dd44146306bbffa7073d4eb554b38625898f25e38bd21ca3e31ebb72eb7c58,2024-12-14T21:15:18.730000 CVE-2024-3648,0,0,f0e964c3bbbf64204a2bfe37735a502c7df36f4988575f56a4d2cbb238c3d52d,2024-11-21T09:30:04.770000 CVE-2024-36480,0,0,7ed3a648aadb62fe0fbd403aa28c825cb6e7dec63cacf57d93bffe14d8593025,2024-11-21T09:22:15.850000 CVE-2024-36481,0,0,4eb9f12e83487746bcd563f74e1338838b3bacec77ea996220050453df93aa68,2024-11-21T09:22:16.030000 -CVE-2024-36482,0,0,1deb7c653d24835f7f34fb550aff55a4ad41d5e0993dfc140ce92a8b79c13009,2024-11-15T14:00:09.720000 +CVE-2024-36482,0,1,1b9dcc2736c44fb2964e5afafbd55631d015294e8bd67b20060e444ede67ee09,2024-11-15T14:00:09.720000 CVE-2024-36484,0,0,a06783a9b3c79d8cb9b5fe8bfffb1618ea1a5c1aab2918e64ca3d8f674b8e0e9,2024-11-21T09:22:16.280000 CVE-2024-36485,0,0,d951588f4dcc00d26595f8d25b71cc0d010f10ca23d6ec7bebb340fbcf7c88da,2024-11-07T11:15:04.637000 -CVE-2024-36488,0,0,14e8b9c3d744895b028812d169aec78590993d89325595a1d84cc7716db00d91,2024-11-15T14:00:09.720000 +CVE-2024-36488,0,1,dc4d72d1e94a739f17842b0d845d9bb866aa8ed405c4b677faf0b50f589db39b,2024-11-15T14:00:09.720000 CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7f89,2024-11-21T09:22:16.667000 CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000 CVE-2024-36491,0,0,c755cb5a1143bbce4a7cda0b31b5fee61d8d298088a69a8871a699ccb2c2e2b9,2024-11-21T09:22:16.813000 CVE-2024-36492,0,0,e317bdf7a68aa0ba85302ebd2a113aec9f051f925a8df929903da8016701a4ff,2024-08-23T14:51:08.580000 -CVE-2024-36493,0,0,e7f209278222e7c3d6945789f3d7e2a88e5459b0882cca94325b511838859f60,2025-01-14T16:15:29.690000 +CVE-2024-36493,0,1,1d67c99d7ece59a7ea5c1215b5c9ee7b87502eb04abbf8978f3c021e7b60e9a7,2025-01-14T16:15:29.690000 CVE-2024-36494,0,0,93db4fb212d4087c594bc2b9d9289af597c0dee0169448ede734716cccc4725b,2024-12-12T16:15:15.587000 CVE-2024-36495,0,0,7a48233cad150c8548a3307f191550e3a4681c1f61964468c57271a9b155ed9e,2024-11-21T09:22:17.123000 CVE-2024-36496,0,0,714184028efd3fe8c9f7d2ed728a4da4803d7a712f47e3b49b2335391ba3f339,2024-11-21T09:22:17.317000 @@ -259318,15 +259318,15 @@ CVE-2024-36500,0,0,3749986292cf3f04be3ecd79c3eae7049cd48de8e666dbec442c9f3a4ab4e CVE-2024-36501,0,0,9c0f9c29b1ea578ebce558d7100251055f7ba2e7147d4ca51f7dd8451082c4ab,2024-11-21T09:22:17.977000 CVE-2024-36502,0,0,fffafe10f0702323c26baccbe897485dd35ab633d4b0d89efe45f6d8d1e5c5e1,2024-11-21T09:22:18.110000 CVE-2024-36503,0,0,54ada8b9d8eed2c037238cccde3657d3a80dd1f98e801f7a69d977747c8040d6,2024-11-21T09:22:18.260000 -CVE-2024-36504,0,0,3476aa9417a72d06dac0b71b3be72e5539c4995deb2552c54d8ed414bbc12983,2025-01-14T15:15:17.027000 +CVE-2024-36504,0,1,2d3d1a9ba4e09c32e56fd18eba2d5db8deb83b32a2af249edb6af606405a9dc8,2025-01-14T15:15:17.027000 CVE-2024-36505,0,0,fb291dd94dce4e50449c9e877ac2ca2ff61e5da72ca7ade21bdb425debb63d84,2024-08-22T14:36:31.643000 -CVE-2024-36506,0,0,9307fef39a0d7679f16b257ecae474a6c80b67726aa819bba669245d29657ec3,2025-01-14T14:15:30.590000 +CVE-2024-36506,0,1,fc0aa99f2b20529351279852d3b3050485ee6e1d111dd07d8b8e7644944b51a2,2025-01-14T14:15:30.590000 CVE-2024-36507,0,0,04a24cb7eb80c7ce5b0cd930e917054d877c6b282e7beecab850e0815de29b70,2024-11-14T20:31:45.367000 CVE-2024-36509,0,0,51a3ce39b65e0ccad621c0235a19da7b333d1a36b9c66eded9ef595731c58b4a,2024-11-14T20:33:44.727000 CVE-2024-3651,0,0,ccda00a280c38637cc17b638d5c91961891d001821e1052b9fc773bf82e39d71,2024-11-21T09:30:05.170000 -CVE-2024-36510,0,0,a41b277a39087e0104fb0be8446732f86015fc66d966e8e2ecf87de1b3a9368e,2025-01-14T14:15:30.737000 +CVE-2024-36510,0,1,f350fd233c2942deb1300a90055a5c7bfa2f34036e41d8528a74ce9aaba8b56d,2025-01-14T14:15:30.737000 CVE-2024-36511,0,0,c0da5dd4b7ff65370d60d13062a323a1aaf424bbb9ae24c4ffc8a28beb2751bb,2024-09-20T19:43:25.023000 -CVE-2024-36512,0,0,3099e29a697b87ff75365698c76c26f315d2ce105ba904d851745cbc3c4fc648,2025-01-14T14:15:30.880000 +CVE-2024-36512,0,1,0dd0ad95a79a44c5c5353e845e302b173efef352a6bf4d7694678072d9277f21,2025-01-14T14:15:30.880000 CVE-2024-36513,0,0,ee921d2ae73d79a0555cae5621e49e24e34fdc6c7e4a1ff34a39def65fd8a7b7,2024-11-14T20:35:26.093000 CVE-2024-36514,0,0,dc8ca9154af7beb05da22020118383c29164d6220eeec3886ce7403901a1e1de,2024-08-27T13:28:33.090000 CVE-2024-36515,0,0,ae9f00a24ab36e0dd18f037c094f8dd91bd1052645f659af43e5a534764ff4c8,2024-08-27T13:28:09.360000 @@ -259452,7 +259452,7 @@ CVE-2024-36742,0,0,3a8ac06d2b7460d92170f393580d757a9169bcf0cb47f2df5b6b9175dc24e CVE-2024-36743,0,0,997f7cc47dfdd9276a067f7a34f5b7be0237277a0a3157d65da6a25a7753b82b,2024-11-21T09:22:35.510000 CVE-2024-36745,0,0,7dbdb6b068ebfce6206826a7b3683b8e3075311b55f148598b550b2d1cdd84ea,2024-11-21T09:22:35.730000 CVE-2024-3675,0,0,320c0c6a821e66128af3b5683a2218c46856ee00dab3b257adbda9526c52d243,2025-01-08T21:11:01.357000 -CVE-2024-36751,0,0,2271916d5f89041732d6b75105cd263352748eef475d012a206b19ae37afa068,2025-01-15T22:15:26.400000 +CVE-2024-36751,0,1,bfaf96d7f8fff1d7a4689548fc89d38e10039cb9b5944f328e0ab2190b34d77a,2025-01-15T22:15:26.400000 CVE-2024-36755,0,0,959c7e1c5392de2c0c9f9c3a5e5235cba19560b12ef4e2310e57761b2d2324b3,2024-11-21T09:22:35.883000 CVE-2024-3676,0,0,c25c73186d2926601a4bf9263de9e5912c4170cf55771346041257a143aab173,2024-11-21T09:30:09.570000 CVE-2024-36760,0,0,2eed0d1b029328b3aaf61411ac108b885b75813a77deb3defd7d8df3d154ccef,2024-11-21T09:22:36.097000 @@ -259575,7 +259575,7 @@ CVE-2024-36946,0,0,f7720481f875ad60323f73dfece362f55869f5bf618838e67f86d53b9ec41 CVE-2024-36947,0,0,ad57448cd824c61b99dcb8bb5a6830ff85aabec778ec9016bb3e53b843279f52,2024-11-21T09:22:52.987000 CVE-2024-36948,0,0,5d1a47a335dbad3c82a10fcb17ccd4f0f40beddd9a2aa396f82c4e52ec25a557,2024-11-21T09:22:53.177000 CVE-2024-36949,0,0,8ccda660533f38ae2b803453a704b8c4686a1c846a4c27f05f67ef2153090632,2024-11-21T09:22:53.290000 -CVE-2024-3695,0,0,a60bf31ea06e46bf1663e15977e6cb19e4b708309cf7dd5085865cb4686f9a97,2024-11-21T09:30:11.617000 +CVE-2024-3695,0,1,657b5e87e225a51f58371f08a6cc51a625d916b08daebd85d8bfd75afeec7330,2024-11-21T09:30:11.617000 CVE-2024-36950,0,0,8414f3797a1ca6b9b3ed2dc4deba0f208de15d3c3e920c2c4d3f7dc7e715d74a,2024-11-21T09:22:53.400000 CVE-2024-36951,0,0,fcfb202d0ce90c93df700a45fac85a7280eb6a8aa26d1136e4ac7f9c5ef18383,2024-11-21T09:22:53.537000 CVE-2024-36952,0,0,7ad64d673e2ff060ff845e51d30546e3ca87f05f20494a1fc809e5c9e5f43ff6,2024-11-21T09:22:53.650000 @@ -259712,8 +259712,8 @@ CVE-2024-37089,0,0,8d387479d3a2a6e03e30baefa0716f09d2a1a735bef61b94a2cbba881bf01 CVE-2024-37090,0,0,c8c780f174a978437f3b8dd70e2e53729b421f624c42b5d0406b423c315ea8d0,2024-11-21T09:23:10.460000 CVE-2024-37091,0,0,516fee9b33edc9a2ec4e5cbefae8497129a19a168e7efc3b6e9674fd24788fb2,2024-11-21T09:23:10.593000 CVE-2024-37092,0,0,7fec326954dcfe116fd2c6e3f2c5f0e501a13f13685558ec812a9e8d4848fc3a,2024-11-21T09:23:10.750000 -CVE-2024-37093,0,0,fc531d57e2cd7fc5b5c2e2f465d29d3c2996433ca230e2cca05232767b6cbac6,2025-01-02T12:15:17.320000 -CVE-2024-37094,0,0,461a573e0402bc0e49439ada6f1ee204f3ab4cdbf605a4d834cb0d003291654a,2024-12-02T14:15:05.967000 +CVE-2024-37093,0,1,d6b0dbf4138885b6fb77900b3158be8e78bafa360c06661b9a105e6f63dd38db,2025-01-02T12:15:17.320000 +CVE-2024-37094,0,1,4d48016dfd5694d29dfc178b242f2c60573ffb791673e49c484b4e5a78615a61,2024-12-02T14:15:05.967000 CVE-2024-37095,0,0,e6056456aed9cfa1233740ab02a62cd5d905d39ecc612d79030adf2d2b42d0e6,2024-11-01T20:24:53.730000 CVE-2024-37096,0,0,7640b912a9fe5480a0e761f27d148ee529239584c0f97b1b0a5419d2ae02ad37,2024-11-01T20:24:53.730000 CVE-2024-37097,0,0,e9df334d9906ce4bb450b7dd9cd6bdcd90517f518eb81e79cd91caf03472947f,2024-11-21T09:23:11.190000 @@ -259802,14 +259802,14 @@ CVE-2024-37176,0,0,d1215c1d327ad7cff8509222078d5bdbc65aec407f86b629554b9bc96e5dc CVE-2024-37177,0,0,df9e679952fae86a24e1256f3c0728c3dce383469bd77d91a8bad9eae3f3a322,2024-11-21T09:23:22.090000 CVE-2024-37178,0,0,6c1e6df29c920286f76f5880a509f9fb076af2ebcc1fcf3445d3b19211e3e851,2024-11-21T09:23:22.227000 CVE-2024-37179,0,0,213277cfc254289be643d33de0ef2ecf58ed29ffaf33a33d91f9d9c1e50a5994,2024-11-14T17:35:54.067000 -CVE-2024-3718,0,0,dd5d8a591f32d0e48035ea74d0790c0768f4ce77c482ef67eeded39048d38629,2024-11-21T09:30:14.200000 +CVE-2024-3718,0,1,bc64171453008a50542d4de450eb055382a8cdfa4aaac94c427d517daf1f911b,2024-11-21T09:30:14.200000 CVE-2024-37180,0,0,39a574cf19521cc8ec0e2382ae82b349ca227f9b779760d1bf33cb7c61ea38c8,2024-11-21T09:23:22.447000 -CVE-2024-37181,0,0,13e87ff1c099cd0f431ceafddc8e600c83ba68dc6655e6a74c056e6bbafbdd05,2025-01-16T18:15:22.307000 +CVE-2024-37181,0,1,f220b83b298efdb315e915c05a90e352216df57ee686016033b76c6c2cc46eb8,2025-01-16T18:15:22.307000 CVE-2024-37182,0,0,ff57a2e4bed42f9467d325306e200b6316c33088aa65f4131915cabcb04e6b8f,2024-11-21T09:23:22.580000 CVE-2024-37183,0,0,6ce37c0b960969be55a1b8d0b63f2cd3ab0310494d4ffb09591924c2b580b1ad,2024-11-21T09:23:22.750000 -CVE-2024-37184,0,0,ba3cd5c4c49204ec2d244126d2771b707991412a7945bb4e09c4a91560a23b50,2025-01-14T16:15:29.803000 +CVE-2024-37184,0,1,302ca72575b888a5995c74a2442f826313849e238e514a8b2f701d71951300e3,2025-01-14T16:15:29.803000 CVE-2024-37185,0,0,ae0cc862279502ae5e66322a3aebd2640385872be1c74e78f56119b40d276146,2024-11-21T09:23:22.897000 -CVE-2024-37186,0,0,cc59359d00f7b2dc1223c3ef8b8773ff743962aa28479912d836449de76dabbe,2025-01-14T16:15:29.907000 +CVE-2024-37186,0,1,154e72deffecde1795102479b38c4ff4c5d18584b229038d937653892b1beaee,2025-01-14T16:15:29.907000 CVE-2024-37187,0,0,358acc4679a7f0d058239ada1ac6d119059d86eefbeade2996572c1c1a0ddfa8,2024-10-07T15:17:34.747000 CVE-2024-3719,0,0,dc2fe9e8dcadf3ea8db70ccc54d00927a998f0c9e910cf19839b3f05ab3d780b,2024-11-21T09:30:14.340000 CVE-2024-37198,0,0,9e0ae22ac4bfae0159d0f8b987c6b86da412e901b7413281a582e9d83651bff5,2024-11-21T09:23:23.130000 @@ -259980,7 +259980,7 @@ CVE-2024-37352,0,0,3f023f1fb2a769ea46547b210828a58497c5cf6630361c558ccbc529aea79 CVE-2024-37353,0,0,7ff7b7453550602b650cfdec5ef1242f502029e3779b416a04c17939bc6e63d5,2024-08-22T00:15:05.760000 CVE-2024-37354,0,0,8714660eea3ed91e9b81cd464e3754efc32fe0d558dd6abd8ab964c32e5c5bd4,2024-11-21T09:23:42.537000 CVE-2024-37356,0,0,4fe4d4a17eafd229e9050e6753d570a71ec28698aaa6438baa1abb86c96de84d,2024-11-21T09:23:42.667000 -CVE-2024-37357,0,0,3112b349d6665b9ddb3bfcb4780c1ac50fd882fce72d3f60ef5b6b3194d4491a,2025-01-14T16:15:30.027000 +CVE-2024-37357,0,1,fc7134e6eb69001209ce08e10f760d544b4fb396e8ea209636530f56b5eb787e,2025-01-14T16:15:30.027000 CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000 CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000 CVE-2024-37365,0,0,92f445546c97440aae8023b82925d87a3f96476cde45f92ebb44b9fbc714aebc,2024-11-12T15:48:59.103000 @@ -260134,7 +260134,7 @@ CVE-2024-37509,0,0,d5e6b19ed3d1ad64df945928790d1a3a5613e29bb97344590c25e1d26093d CVE-2024-3751,0,0,72e9fb4120c75b7bf3ad8c9d0ee0ee4cf520292ab9247727447e65abb1e849e6,2024-11-21T09:30:18.963000 CVE-2024-37510,0,0,24f65a45fcfdc8da10a3b0d214c6ef398c4bee32c150dcd42299d5919b41901d,2024-11-01T20:24:53.730000 CVE-2024-37511,0,0,a4adff47ce03c2f0897418bc0abb29353550f1a886370a385d0a7ea54ba99b91,2025-01-02T12:15:21.780000 -CVE-2024-37512,0,0,3f655d61c5867892f2c2ea63742a763aafe9ad9bd93fdccfc32f6d0aa72d91dd,2024-11-21T09:23:58.413000 +CVE-2024-37512,0,1,a4eb8abbeef6a1dc7bfa20db88273d50b1d055e37803003e47c3cc7cfc67dc81,2024-11-21T09:23:58.413000 CVE-2024-37513,0,0,d0bdc814a11e9a23902da654b5838b30392488394721377007e11c4ae0194a9b,2024-11-21T09:23:58.577000 CVE-2024-37514,0,0,fe2ffa44d7d18f72b116c084c5c19179a8d350b5a958692e6fdf1436e7c5cf82,2024-11-21T09:23:58.753000 CVE-2024-37515,0,0,582164ec1fd25d4ba342bab313332ca8898667a47350909b25f12fec1c53277c,2024-11-21T09:23:58.913000 @@ -260721,7 +260721,7 @@ CVE-2024-38262,0,0,6bdeaf5f41cf849f004d6bc1800eee3b888d3ea26fafd106399dfd2d69555 CVE-2024-38263,0,0,08c09bca8be0748ee609afbdc86995447afd4fc603f8c53991539f339963ff1d,2024-09-13T14:55:01.400000 CVE-2024-38264,0,0,544aec0258efd2ef444e3b0f22cb1914d31b5f221162a747396cbd15d26901db,2024-11-19T20:52:32.727000 CVE-2024-38265,0,0,34377c1ecac9e16586946781889111692995cac81b15c1f718c3ebd685f7fc23,2024-10-22T19:33:43.260000 -CVE-2024-38266,0,0,9e43110f9f58ff12ecb0a0938d2f2d40edffe1ace6c44d38b558168490c8692d,2024-09-26T13:32:55.343000 +CVE-2024-38266,0,1,8c8283cd4515dae011fe301c60ca586e91dbfb1fbeb6f6c1a9745c558cf89284,2024-09-26T13:32:55.343000 CVE-2024-38267,0,0,2f2200bdf622493906326d5acab6e766450e36cf9e37a3aef0e32c2106f2c357,2024-09-30T15:52:52.787000 CVE-2024-38268,0,0,eab46e6b7e36a54bfbfac467119830961637a950b96b9b108bfef786c50054b7,2024-09-30T15:52:29.977000 CVE-2024-38269,0,0,432ee47481f8a3dd52097e6040b22531583eb4901adeb010f3b35ad3ac7431d5,2024-09-30T15:51:55.567000 @@ -260809,7 +260809,7 @@ CVE-2024-3838,0,0,ecb2f637693b0f52b22a1ce5c265c7718bccba4ed013cdda37dfec46ec17e1 CVE-2024-38380,0,0,e82d406bb5fd1bf3bc4ad66f322cc926d0134eaf47dc73f6bb3f7459fd1be2e6,2024-10-02T14:22:25.323000 CVE-2024-38381,0,0,fd24c84d99f21dbb0117f725b97738bb666c17675ace06f5e8d1b2e5ef39ef65,2024-11-21T09:25:32.840000 CVE-2024-38382,0,0,9524a8333d5d29d522dc7c1e1d13c071d5f06c52bb45e836d12847b8a384b3fd,2024-09-04T17:10:56.497000 -CVE-2024-38383,0,0,32d74723bd6343e21a2aa6f7e4aee85d7a65ab0f4a3c90456ae4d33f49e552a2,2024-11-15T14:00:09.720000 +CVE-2024-38383,0,1,3a1a0651383925996f73c40f3bbe91f25d02115ffe40c9bd7f5f377b390839dc,2024-11-15T14:00:09.720000 CVE-2024-38384,0,0,73c8977652b930f6915ad8c323151633ee17d57bc432f2d1f5d8c0adfe0f17dd,2024-11-21T09:25:33.487000 CVE-2024-38385,0,0,b2173ba5c0dffb191c2ccec5a5cde96562718c5fded14aa6a234db099c37b01c,2024-11-21T09:25:33.840000 CVE-2024-38386,0,0,5f04f52b0e7480071e1f6871ca4928ca701392ba129eef59e0eb9751d9f41f0a,2024-09-04T16:56:41.463000 @@ -260895,7 +260895,7 @@ CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade CVE-2024-38481,0,0,e569c1b2683e1d59dfe394dee132f7375b3825578031c3d522810bc8473f889e,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f391,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,178f813aaa538f36bfe36509f188778c0f04be9869ce4e1261bd547bb7ef5b0d,2024-09-18T19:19:24.453000 -CVE-2024-38485,0,0,e0d4d684ecfabc874fec6f53f977d70d9dc465eaad84e71ef98de0003e9a1f20,2024-12-09T15:15:14.110000 +CVE-2024-38485,0,1,b89f8ba0e9336eb997bcb6f93748c2518a43e1ab15d5699942677d203b8864fa,2024-12-09T15:15:14.110000 CVE-2024-38486,0,0,f8a666c446c24f8e00c7959e1edfc5d2cebe73bc53af61bbc50964dc6ddfca28,2024-09-13T20:36:08.597000 CVE-2024-38488,0,0,f0879102ef546a5cfdd479def458a81b67cf2925a98a4877e85503a0ffb37c50,2024-12-13T14:15:21.993000 CVE-2024-38489,0,0,c8809c3a3b8dbca7d8ce1d14c39e410a336e30ff83b4df53210b8bbc08792dcd,2024-08-02T13:54:55.697000 @@ -261085,9 +261085,9 @@ CVE-2024-38662,0,0,5bd5e82aaa558295dc8a528cefb17fec358d9a4b94099171168456d0f17d2 CVE-2024-38663,0,0,80bf4df7b21ca889d4af4cf066fc48be56c797d290d991f7739152749dcedf9a,2024-11-21T09:26:35.093000 CVE-2024-38664,0,0,d09ea81bb05e796759cc1584188ea64f06c101175640728920f21a137bc53aff,2024-11-21T09:26:35.220000 CVE-2024-38665,0,0,a51e8076cec880bdd9cc3c8c203ae0fcd593a243a4c7f0ac0b6bc53d8cec55d6,2024-11-15T14:00:09.720000 -CVE-2024-38666,0,0,fa4a3dd80180a6253f4c802724541dd53a80f00bde0693248fc77cdce7cbc926,2025-01-14T16:15:30.130000 +CVE-2024-38666,0,1,525a10c27b70a515b3a98c23b6a3c8e124b4e2f941eac45474f32301d66380df,2025-01-14T16:15:30.130000 CVE-2024-38667,0,0,585ddf03133afeb6f8f4d6a3246f713bced042a0be006e40f12e0030690b62f1,2024-11-21T09:26:35.473000 -CVE-2024-38668,0,0,7842011ebab45d17a51f63e37691ffaedcf024bcf0d4891a1dd7d01a430d9bd5,2024-11-15T14:00:09.720000 +CVE-2024-38668,0,1,a65af4e9cfcaf46edb7d7b313d0d5a5c012005056d7836cde46679c8ecd15448,2024-11-15T14:00:09.720000 CVE-2024-38669,0,0,4b2bb0c0084c309a5420f306390da199a92a34f2e35588b850d82e6cc8d74522,2024-11-21T09:26:35.750000 CVE-2024-3867,0,0,b9355f71b1265f950435c248573f1704c806e85856d697b37d561324a1433b0c,2024-11-21T09:30:35.580000 CVE-2024-38670,0,0,11289b1e126db881fff6325a04005fba01d66c0840611a3daa8a2f5fd39b572c,2024-11-21T09:26:35.910000 @@ -261177,7 +261177,7 @@ CVE-2024-38746,0,0,34e8f06026a30fcba1f2a4b7d2fab4e9fac068f3df4ee3d29d85717e37ce0 CVE-2024-38747,0,0,9417f9dce18a2a48fa84358d319e1b7409afd0f0ccec02b607923b94ce85595c,2024-08-13T12:58:25.437000 CVE-2024-38748,0,0,8b10e3d45b2d7841f932e18531ec0bbbbe52d9df2a25aff056fb44676ee593f4,2024-11-01T20:24:53.730000 CVE-2024-38749,0,0,9cac44bd60a189328f8a96d4e9a4cc173a1d715533e0c5ebcab85c3cf2df8979,2024-08-13T12:58:25.437000 -CVE-2024-3875,0,0,fe434912d663e886f4e3e29cd1c0ee527a603c6292ee9db9f6bb0bfc495a0e4b,2024-11-21T09:30:36.597000 +CVE-2024-3875,0,1,ea09267fd2bcf012469bcd8092ae1f269eec6c9a634717b56c31b3ee93c2605c,2024-11-21T09:30:36.597000 CVE-2024-38750,0,0,f3d180e8c9a537e3f35b0a267bb1076590b0494a5b3a159f9756f13046728710,2024-11-21T09:26:45.343000 CVE-2024-38751,0,0,bd51de817d7b629ac63c238eb024107a4607932abc04099dba969db78fbf46f0,2025-01-02T12:15:22.680000 CVE-2024-38752,0,0,85fbe1960c245df4c649f4f347181dcc979c1ed8621bbf1b1fde834ce5b9452d,2024-08-13T12:58:25.437000 @@ -261188,7 +261188,7 @@ CVE-2024-38756,0,0,d19a94e70a964dc8bb4e73bba21106e200715bf0ed1ae07d6ced1b0e1d6e2 CVE-2024-38757,0,0,059ebf8661c5c12d820942a389fa1f209fd046537790c40bae7849abcf11ee8a,2024-11-21T09:26:45.803000 CVE-2024-38758,0,0,2e034084df5d7f2893b1d07a3d084b43bf9007ec50db51c2b81baeed0f249a62,2024-11-21T09:26:45.927000 CVE-2024-38759,0,0,9ac9da36b88c559f8aba5bc282baa5303a4aada52f5c758604b65a4626a9c1b2,2024-11-21T09:26:46.083000 -CVE-2024-3876,0,0,4a1ad585cd81213fcc981bd0b597c0609a60650bda6e5e61ecd897d6f0073798,2024-11-21T09:30:36.723000 +CVE-2024-3876,0,1,da83a9ff868bc8f1e946cece555fd1ec1cf29f9ba903d3471d340e145c1f3e06,2024-11-21T09:30:36.723000 CVE-2024-38760,0,0,0bdf6e1b54e81553a2be16eae0f92d6916d49f215e9ddf726505be76f65b5d22,2024-08-13T12:58:25.437000 CVE-2024-38761,0,0,b807f6ec3b4c1b73a62fb5ae540f930ff00fef0c3ea616b60a69805afd807996,2024-08-02T12:59:43.990000 CVE-2024-38762,0,0,a69d5a9b22cf39051fd5f972665bc1671848d539ff060289da665b1e009b6592,2025-01-02T12:15:23.073000 @@ -261197,9 +261197,9 @@ CVE-2024-38764,0,0,f0e9da1424a15c6756b728c5c5b3a43e89524fc5c7ad4b46fb9607df455c7 CVE-2024-38765,0,0,45b024f9c43bfe47a4a4716b5c6e2cfd83a268c867cdb7c9b65775b0a2295f3f,2025-01-02T12:15:23.337000 CVE-2024-38766,0,0,8c7b8ba00d9d03d5710b03920d96ecdaee1da3dd08661f9ae5ffbc66e9a580a4,2025-01-02T12:15:23.487000 CVE-2024-38767,0,0,fbf72db56b2c3319d2ba5902f993c4818e7574fe761f64435b5a8fda9e194b17,2024-11-21T09:26:47.073000 -CVE-2024-38768,0,0,ae32a1bedaf091cf7bb9f7bce8b2963b6d87ad140bab23589e746f49a4a50e4e,2024-08-02T12:59:43.990000 +CVE-2024-38768,0,1,70e152c4c851f00719076d092ee071030827ee1b6a362919e2baad99ec6f2500,2024-08-02T12:59:43.990000 CVE-2024-38769,0,0,7453ef1008308d0d8eba420a2195f488ead7bd495afa2ace09b4382293c795f4,2024-11-01T20:24:53.730000 -CVE-2024-3877,0,0,513eac690375c3f8389b7c80d2d70149338eebf202938a4a61d9ef360ce45469,2024-11-21T09:30:36.857000 +CVE-2024-3877,0,1,deac9a7aa46a62157ddd5ad517b836933fb7ecf3ce86e1d22e21f85acdd07329,2024-11-21T09:30:36.857000 CVE-2024-38770,0,0,0c9e03582a12319870a45ae32b8320368f33ad592fdd5a171772f822ee858897,2024-08-02T12:59:43.990000 CVE-2024-38771,0,0,27b468612455a91733eb84f694387c7d5325ed26015a10d165eca1c1b024222f,2024-11-01T20:24:53.730000 CVE-2024-38772,0,0,82a728a0b96401862ee0e2b2102e6386d00c16a258621acd80b55636f2b24a42,2024-08-02T12:59:43.990000 @@ -261209,7 +261209,7 @@ CVE-2024-38775,0,0,03db8f69fa0697d00e8cb8f435ad116eb722374921c9d3763f28cc6001770 CVE-2024-38776,0,0,7a590d569735cb49fb71d732707e32ccc3d4f27eb4490610391e050c26adf6db,2024-08-02T12:59:43.990000 CVE-2024-38777,0,0,f4d4683247322f31066bb658d0644f1c59a914566d45a7058794ec1cf7e0d1e4,2024-11-01T20:24:53.730000 CVE-2024-38778,0,0,42d7c0084c76d2382dff1e525dcf5e6383337b6edf9c583d8bbce7af742372ea,2025-01-02T13:15:07.520000 -CVE-2024-3878,0,0,9416bec3574ee506fcd15a6cb5ff47e1ee39b7ac6202902faa5edad895a6d3fb,2024-11-21T09:30:36.983000 +CVE-2024-3878,0,1,1c79b41ad0de7dc8e4ca32420b449c37d7ef571e6b6a68c9755332bb6404f0f6,2024-11-21T09:30:36.983000 CVE-2024-38780,0,0,59b516bf2edeec5bd5de1b6b25f5c18b14158969877e153ee0fa0692d018e06a,2024-11-21T09:26:48.823000 CVE-2024-38781,0,0,0dc3c569223570b22ffc9a0a837f27528b499c6a7317b28bfc390c2a6de9946a,2024-11-21T09:26:49 CVE-2024-38782,0,0,01160802fd0f189b240fc641a37384c195bc1f20e754065643d1aa6713819e12,2024-11-21T09:26:49.157000 @@ -261373,8 +261373,8 @@ CVE-2024-3903,0,0,3abc3093808cbf33494e777ab78a2a1f0d0a381b5e414e8aae50b0d04cda30 CVE-2024-39031,0,0,31600cbde8bea78bc56e4a9598adfa8ee74fe57d43a5d0365ca0ab764476d743,2024-11-21T09:27:10.103000 CVE-2024-39036,0,0,b4bfbf7ae964d272ab5cded04fc4273edac34005bdb2e82fca5b7e2e2aae34a3,2024-11-21T09:27:10.370000 CVE-2024-3904,0,0,ad761d288d957d794b31c5702f59b35dfd5c44b747d0c7e16f2e403dae30a0d0,2024-11-21T09:30:39.910000 -CVE-2024-3905,0,0,4c80ed85238faf80c10f5a55c3b441f63de24b896b80922a247980fa1e8d8fec,2024-11-21T09:30:40.040000 -CVE-2024-3906,0,0,38d5ab7d7295bbfbf8fda50b3a718f84612bcac7a5bf8734ddc0e18ea8e0ca6c,2024-11-21T09:30:40.170000 +CVE-2024-3905,0,1,6bbef7978ce50fa6df2da9622eb642524662088b1807f11469153969f94ebd55,2024-11-21T09:30:40.040000 +CVE-2024-3906,0,1,39887b363c38e25ab063508c0bcab1bf103414555f24d77c53e675c6d8558773,2024-11-21T09:30:40.170000 CVE-2024-39063,0,0,1f8e26cf4e98abfdc7b6058f73f534bd52a0245eabab786c5a57812027f6a139,2024-11-21T09:27:10.580000 CVE-2024-39069,0,0,df07d5b4e498e68eab0525d09eafd252e5aae6cc734f27b8571431c3959a392e,2024-11-21T09:27:10.793000 CVE-2024-3907,0,0,d33abb7499d8bdfc0449d1ce0b19211840dd2ba2d6c9eb538b65c815ab9ef15f,2025-01-17T21:21:37.327000 @@ -261382,12 +261382,12 @@ CVE-2024-39071,0,0,bcf49297986e31d2062e985568f055f9ac47c400defe91dd2a64b6e8784be CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a476,2024-11-21T09:27:11.203000 CVE-2024-3908,0,0,9ae7a3395f82376068b28a5a66b47db9023d7d608b35c761f458f643cc6e3617,2025-01-17T21:16:07.327000 CVE-2024-39081,0,0,29ab3d686e2b6d4ec4a310846650a5756a54f10027b101688be62026057df595,2024-10-01T15:51:30.237000 -CVE-2024-3909,0,0,7558d94419a80b4787ddbb5aa4ff5bc9036caa4b45c2d36a6cd8f69e85924d21,2024-11-21T09:30:40.570000 +CVE-2024-3909,0,1,0f38b06b811f98c4c243fe4925e6127da467289159442dcc0dd414df37c82b09,2024-11-21T09:30:40.570000 CVE-2024-39090,0,0,c1fb932b3c7852f6751439bcd02ca4ef3c48bbe1e8476802f1cae84e9705ca59,2024-11-21T09:27:11.500000 CVE-2024-39091,0,0,c140294e78a78cd7474377e032af5887e358fd95402a58bcd7abb93d413219ea,2024-08-13T21:35:02.617000 CVE-2024-39094,0,0,b8b0fdf3bb56e46602aed2d337165bbe267da562fff0dc6e6f47744be1bd7d0b,2024-08-21T13:31:04.087000 CVE-2024-39097,0,0,2ffe2246b6dcf8095996d63654e4d34504f5907f265a5a3acdcc049adc39575e,2024-08-27T16:35:13.930000 -CVE-2024-3910,0,0,f4431f1ac9c44c6d98dd4193bbd9def74c837a719ee1637c1fd540078aeb4409,2024-11-21T09:30:40.700000 +CVE-2024-3910,0,1,9074b4346bb8ea4b4e4b6863ea8dfe22844348837c24529fecc4ca2e1f471252,2024-11-21T09:30:40.700000 CVE-2024-3911,0,0,654b04203a2f40565b15263d1f004365df42700519e1ffcff8b9969132d518c9,2024-11-21T09:30:40.830000 CVE-2024-39118,0,0,30647d316b1ab338bacef66a23398c0c7da737d730c5961d4c8cf3897a30932c,2024-11-21T09:27:12.257000 CVE-2024-39119,0,0,ebe81bbdd4e86ccd3d28f2f7b95af1cda12584cb666eedaab03a8551e95007b3,2024-11-21T09:27:12.427000 @@ -261454,34 +261454,34 @@ CVE-2024-39242,0,0,43a91895e92bd720e6caad7b641764febae124befd54612aee776ab0a64ab CVE-2024-39243,0,0,8a71f18c951566d7879eb980241b0471ab0905142b0166e227a16eb2063f3a99,2024-11-21T09:27:21.760000 CVE-2024-39248,0,0,1bf76b2262f3407a8431a3b3e26c4e6ae4412d8dbda47d486dad5141d6444024,2024-11-21T09:27:21.960000 CVE-2024-39249,0,0,7be8f0314a4b46939ea494f384d9ffdc384f5f98b6cd05eb17cc6b2d50d2a427,2024-11-21T09:27:22.130000 -CVE-2024-3925,0,0,5560f73674fed12a5c639587df8d0e965b4f7917db7a9e3048e6732e16b0fffc,2024-11-21T09:30:42.837000 +CVE-2024-3925,0,1,a9fdc485a6f2473b83b57153efb2c86617818a4f60c235c7ca15d6fa03880593,2024-11-21T09:30:42.837000 CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb5511d,2024-11-21T09:27:22.363000 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,fa19456efa357b066885387799b645bd8aa9371a065efe590ac8cd9be31edae6,2024-11-21T09:30:42.947000 CVE-2024-3927,0,0,c5a7a83540dd0108e0c95456e196911f953d1c089ad9153186ac7abf5eac21fd,2024-11-21T09:30:43.063000 -CVE-2024-39273,0,0,479a1c15ea4f665381464712c00b19bdb684fba8212ffbedf56b669e210fd454,2025-01-14T16:15:30.227000 +CVE-2024-39273,0,1,5181699ccf93ef18ef6af16c2c5b39bedb60a9d8446642e1b83f04b362725f80,2025-01-14T16:15:30.227000 CVE-2024-39274,0,0,6e7d1a33b0e5d020249e1265d5c2fe803a054c23d02db7f7ac41bcc85d95ece2,2024-08-23T14:39:29.247000 CVE-2024-39275,0,0,3a30aa64f40c900af2046a32b51bca26459d15ed56339ef5c87dcb823873ae2a,2024-10-07T15:25:17.050000 CVE-2024-39276,0,0,dd977f122c99547ae4b07eb5192e163e6e3e61789006652d41f5a5fbe512a712,2024-11-21T09:27:23.107000 CVE-2024-39277,0,0,26080347ae1771d5f6c59abbd813475f28a4e34b16949734c9b3cb30c815c0b6,2024-11-21T09:27:23.317000 CVE-2024-39278,0,0,08afeea0ff66f11774d46076ab58f2f6cb47799fe9878a2833101dc3a7d96dd6,2024-10-04T14:36:35.340000 CVE-2024-3928,0,0,80eb80995ed734a4fd6c40cf49e2905ed9643c2a1a0d85ff1158531da5501ded,2024-11-21T09:30:43.180000 -CVE-2024-39280,0,0,f05e1d4badbfdf759c138880666df50bcd7b3fa61dd9e1b86a1f69ac8f7d57fc,2025-01-14T16:15:30.337000 +CVE-2024-39280,0,1,c9a29d8ab16a066b50b7f63816b23b3ffbca89715f819ee07f0b80811e3858e3,2025-01-14T16:15:30.337000 CVE-2024-39281,0,0,276b9ae8e8a9a0b79ee7952c2bd6307cb0cf6b8e0cfe907b0f872eb5eba37a27,2025-01-10T13:15:09.467000 -CVE-2024-39282,0,0,15ecb69c67e914a2f04fc0b690dbe0759fdeb4a603fba67f16e58e8058d89918,2025-01-15T13:15:09.740000 +CVE-2024-39282,0,1,985be1a02ad62fdca3b1b2f464a1e5073183838b0f6616f35f2bcaf249d496cf,2025-01-15T13:15:09.740000 CVE-2024-39283,0,0,4522f3bbc438abcd81e221b08edda070f395b85d336b168a4b5ca1c5829a00dc,2024-09-12T19:15:46.390000 CVE-2024-39285,0,0,f0043fe58d02ea22fa80a21b1fba2440c49cfc1f78daf98e76e53f25d8a76df4,2024-11-15T14:00:09.720000 CVE-2024-39287,0,0,7582a54b2388a70164c9564ee1f85653aced547dff036f41aa22b6e50b81804d,2024-08-29T14:23:31.807000 -CVE-2024-39288,0,0,d79fec733d4e26e7b100b1f6027a1dc7e0b629cda1845acc788a32226648d446,2025-01-14T16:15:30.460000 +CVE-2024-39288,0,1,f17532d8db758c901d7f2d2b6827cf0283adb1c05ec9834da20a939a636a4990,2025-01-14T16:15:30.460000 CVE-2024-3929,0,0,2f3799dad2b99454ece752aad0330957941062a860c2df3b38dbd9ef124282e2,2024-11-21T09:30:43.337000 CVE-2024-39290,0,0,e79bf2df0914f5b0d3a535a47b983b6a92325136ec8db8e5760108d9317b9526,2024-11-22T02:15:20.963000 CVE-2024-39291,0,0,268187eef2802511dbda3c6779c2d8cac3539a0f17a52b3ec5688fb4430fdc3f,2024-11-21T09:27:24.090000 CVE-2024-39292,0,0,1bd1d219eaa1dfedbf1f01defda49e39401414a8624bed318a73228587123f79,2024-11-21T09:27:24.223000 CVE-2024-39293,0,0,9899c62ddc2a616624c5f74261a6fb8a04ba18443e3fe3735c891c7350937521,2024-11-21T09:27:24.390000 -CVE-2024-39294,0,0,bda103fa2ffd7f3109e89aeee7b59c28b9d0a6dc53b27381c48f5974754c2b0a,2025-01-14T16:15:30.587000 +CVE-2024-39294,0,1,74f7182b979f5f96c8e71ddefe3c466dc6d03a02a27e34375828d976df959027,2025-01-14T16:15:30.587000 CVE-2024-39296,0,0,fe9afcb37ada181781ff79674b93d4e1c0c49c6e1520b49b1004ff998f90225a,2024-11-21T09:27:24.520000 CVE-2024-39298,0,0,c197fdce767dcb32e8cc56740da17650d796d1ceb5a2ae72796d2395602a9312,2024-11-21T09:27:24.640000 -CVE-2024-39299,0,0,09efb949a1a15118cfa4133700d52dd981eb2c41a27d65c849ede3a4da300ab8,2025-01-14T16:15:30.687000 +CVE-2024-39299,0,1,fe0b366f94bd0c68069d338e99457aeb6762769906f11334364d48943df6740b,2025-01-14T16:15:30.687000 CVE-2024-3930,0,0,7c655208fe81a22227b6c349827ca36be40941ff1f44dcae490b3e1f72a9f007,2024-11-21T09:30:43.447000 CVE-2024-39300,0,0,ac8009d5eb3ead7cd835b6423d42b0137c69317188effa92b1c4dbbf7025d522,2024-09-03T14:57:54.137000 CVE-2024-39301,0,0,a0750219c9b2a1f8f09ed0b4301e3d3b3a4250e1926522409a12b8756eb9f270,2024-11-21T09:27:25.003000 @@ -261536,19 +261536,19 @@ CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5 CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000 CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 CVE-2024-39354,0,0,3b90d2416ae264749b7a6a31ff3bf2d440269037cc77a3e2fde13244263bd7a4,2024-11-12T13:55:21.227000 -CVE-2024-39357,0,0,385ba76232c9aa517e91731b088b75e0f7219947933660875b18cf4764581465,2025-01-14T16:15:30.793000 -CVE-2024-39358,0,0,de60868606273f7a8a6bce6e85a083ce22e06e7a56f180cf0120cc5884bc0880,2025-01-14T16:15:30.907000 -CVE-2024-39359,0,0,8753557b22deb26aa091a0267ba7c7a7dcb587a0f2707f9df27539d59caaa3e4,2025-01-14T16:15:31.010000 +CVE-2024-39357,0,1,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000 +CVE-2024-39358,0,1,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000 +CVE-2024-39359,0,1,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000 CVE-2024-3936,0,0,ade8cffce573dbabd57e50fd354e4f2f018f6f838a5eb47583c8f32f82009a2a,2024-11-21T09:30:44.283000 -CVE-2024-39360,0,0,a5cce895c84fb8fb5f641a3d1465c7978a6d50432424dd45d27c0c2399fbfee6,2025-01-14T16:15:31.123000 +CVE-2024-39360,0,1,c0ce10852512937355c460f8110ee97b028d3cf4d72326d8f93a545830c7f7a4,2025-01-14T16:15:31.123000 CVE-2024-39361,0,0,477116428326d7bdec5ce562e55d21a285643227ebfe2e1fbe27a873152d590f,2024-11-21T09:27:32.293000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 -CVE-2024-39363,0,0,efbf49dcaceebc906c3815a605f5d34125e1cff93c360c41b2a65dae5fc04a33,2025-01-14T16:15:31.223000 +CVE-2024-39363,0,1,1532df8dbaa164222937f85b082fd3798ad305753bec49cec27dedc9a5faf8f6,2025-01-14T16:15:31.223000 CVE-2024-39364,0,0,5c70137712c5b899f4bd053db2949ead7489ac81f5ead35b90cbcb1bbca7521a,2024-09-30T12:45:57.823000 -CVE-2024-39367,0,0,d4e94ca15fda4d720355e33affdcebb2ec72c9f54556cae02381bb615309186c,2025-01-14T16:15:31.330000 +CVE-2024-39367,0,1,2a0d1a1735ad2eb38f3dc83b04bfe1b4b45a382d6c816a4b8ec5c2288c0135b9,2025-01-14T16:15:31.330000 CVE-2024-39368,0,0,8d0beb90981772e56cdc456383e0ad76416c3ac8910086fb0eb28318814c835a,2024-11-15T14:00:09.720000 CVE-2024-3937,0,0,45bcfbffb0cc9dbb6ee7014f6348017c5f9d7762fdf9bb269b80a174f4d59cc1,2024-11-21T09:30:44.430000 -CVE-2024-39370,0,0,6cb17a9efc918cc777314abccbe07df530376b9fc15ce39be1ee8182135ff3d9,2025-01-14T16:15:31.430000 +CVE-2024-39370,0,1,2831f53cf04707a9b504d0a70bf0135e102149552b32023438e88a1fa030a808,2025-01-14T16:15:31.430000 CVE-2024-39371,0,0,720a71ad5bece19f2267d5063ec8544c29d6cc9e6cdf7e6a5c5d88623672c625,2024-11-21T09:27:32.667000 CVE-2024-39373,0,0,c9f21aedca8aeb11477ede49acfb175851a5381d7367fa191f175fef22650e7e,2024-11-21T09:27:32.823000 CVE-2024-39374,0,0,a4c07ccaadb829fd966842f0cd7fd5f4d48639b87a267dd4b005f9ad138e642b,2024-11-21T09:27:33.003000 @@ -261601,7 +261601,7 @@ CVE-2024-39416,0,0,e68dc0785f6855933fc51131077fb639f0623d4cd90f53e624f4134f3ae33 CVE-2024-39417,0,0,9764e8c9281897c4c781ea6ac2c80e80839462f8f5bbc706db29011c85c22179,2024-08-14T14:33:20.707000 CVE-2024-39418,0,0,4f8f28d06e5236ca21581dd1875e1366c99a0a968c33f840456b4370ac169d9d,2024-08-14T14:32:59.893000 CVE-2024-39419,0,0,e29afd24f4a5cdece4a09a0610e5dd70756e20a2b086b0ce200f1805eb115b29,2024-08-14T14:25:31.337000 -CVE-2024-3942,0,0,fb13f4653c32a4cdffc5e4b407d54bc012f6c1c91b7641ffd0b5e56252581dbb,2024-11-21T09:30:45.017000 +CVE-2024-3942,0,1,0880c823afcf89a18dabe436d8f1f41c60a92127d16f8fa66e628ea1be276c2d,2024-11-21T09:30:45.017000 CVE-2024-39420,0,0,a536ce9a170c9e931969a23b8ce7bd51e70f9ed8a1abbff3ae9f91cb66a6483f,2024-11-21T09:27:39.373000 CVE-2024-39422,0,0,e3a1dc91dff5cfcc6e27ef20f19f0d3f685387ad229532a728dd53ec5414c834,2024-08-15T17:25:54.750000 CVE-2024-39423,0,0,370b899ea146969720f23cc3c55d2267387c19dc70cf41abca4628ae32e0be72,2024-08-15T17:25:41.800000 @@ -261775,12 +261775,12 @@ CVE-2024-39598,0,0,0c2f73f732e09887cba0af0194e5f3c77ef9d94c00b244fcde4b418695553 CVE-2024-39599,0,0,c6157ebaa688355f491b611bda5e2b3f7e1b4434772e7545edbfcdef1fc2022f,2024-11-21T09:28:05.570000 CVE-2024-39600,0,0,5cdcdd4d33cd14270a72aa6948e7fd08f2047e4e8ef5f5943733a11c8548d2b2,2024-11-21T09:28:05.713000 CVE-2024-39601,0,0,92d2b69fbd2e8bc149b176391e3e16765df166d2a97846f11f4915fdfd4741f9,2024-11-21T09:28:05.847000 -CVE-2024-39602,0,0,6e68e8d83369877a51f47b79e9fa74cd0162256cae51d78c454a0e5a2f21136d,2025-01-14T16:15:31.540000 -CVE-2024-39603,0,0,b78e17ebaac6ba5501dc09196c11a6dc7f4b0310dafd273b7f1bd8e447cbbe54,2025-01-14T16:15:31.640000 -CVE-2024-39604,0,0,e2b927b57a041782bb4e956c2ae72bf8e707a7a049a7e8f788488a327b9b8f9f,2025-01-14T16:15:31.747000 +CVE-2024-39602,0,1,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b383,2025-01-14T16:15:31.540000 +CVE-2024-39603,0,1,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000 +CVE-2024-39604,0,1,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000 CVE-2024-39605,0,0,5b96d522d766f2e17051ea739eeaacb596e48786c582aaadd7ed88e7099daea9,2024-11-12T13:55:21.227000 CVE-2024-39607,0,0,aadcaab0bf1d7729e38b88e8516ae68565ef10bef4190422593ee5df929d784f,2024-11-26T09:15:06.277000 -CVE-2024-39608,0,0,fd5db6f02bc1b144b298dc718a199016ac872ac42ed87c1454c900d129ce39b4,2025-01-14T16:15:31.853000 +CVE-2024-39608,0,1,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000 CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000 CVE-2024-3961,0,0,9adcc99617b8264560a448864cfa925b25ac1a522a680cd7491d3775365a24ba,2024-11-21T09:30:46.797000 CVE-2024-39610,0,0,5343055bcd0163768ab6327ea58c70d44bca3d34250efd82fb84b72dc771d3be,2024-11-20T15:02:14.297000 @@ -261839,7 +261839,7 @@ CVE-2024-39663,0,0,9eb2defdb57c778b787c277af4a7b214cbdfb1d28335ddc2ffbcb437456c3 CVE-2024-39664,0,0,ab9c539de9852ff21328453f09cdbfcae41c3bbe1b2faf26d26ec1e6e58d2ae6,2024-11-01T20:24:53.730000 CVE-2024-39665,0,0,c7e3c9af841c624ca561e1b95d71d31cb0f58ffc747ac6ba6141eb0bd6a5b203,2024-08-02T12:59:43.990000 CVE-2024-39666,0,0,fa8ff56cdc7e54d25a6f0154dd6cf869de6f56aaf7e9d8b1cf5208a1b1ccda49,2024-08-19T12:59:59.177000 -CVE-2024-39667,0,0,ea91d67963be58ffd7bb5ab25bd296d1dca2319d25b7eb31162899dc20166631,2024-08-02T12:59:43.990000 +CVE-2024-39667,0,1,a9ec069447c02b2502f2527bb91375344cbaf55ea79bd351b555a8e2ebafcc5f,2024-08-02T12:59:43.990000 CVE-2024-39668,0,0,884f51ae0f7cfc82c0c058a55103068092acf5006c5788f96d5ed16b5bfec153,2024-11-22T19:09:18.243000 CVE-2024-39669,0,0,530d6f86f85ae9bc2c6df6ae944cffb82e7a774e6ff2ca913977e99c9fc39831,2024-11-21T09:28:10.870000 CVE-2024-3967,0,0,0c21980f9f99a2dd15a94152551a64e59442e26f8df998bcf782300495d5fd1d,2024-11-21T09:30:47.740000 @@ -261924,55 +261924,55 @@ CVE-2024-39746,0,0,f1afc11bc11a44838803dfd62593cc3e7a4249af2cc2a806a84825178dbd4 CVE-2024-39747,0,0,2364c8f9f85ad03df91981b97454f0719e0ee4edb3b0df3002b45e0ad1d1a3e7,2024-09-16T17:13:47.497000 CVE-2024-39751,0,0,b0c0aaf4fb5c9d1835036b5573daa4920c821bcc0ab31bb499aba831cb233595,2024-08-29T16:56:32.053000 CVE-2024-39753,0,0,9cf0ba8c0db0b89a70f7293ebcb08ff8ef168b9c804117157b5fc41c2f9b0584,2024-10-23T15:12:34.673000 -CVE-2024-39754,0,0,d4a475e9a37fdcb9d2caaa121c924b52e2c65ac18f395951b42930f7b31f4599,2025-01-14T16:15:31.977000 +CVE-2024-39754,0,1,643f5cbc7d034b0abc00cad0faf015845bc25f508bf6fa4d2d1e03d3c969d63d,2025-01-14T16:15:31.977000 CVE-2024-39755,0,0,c89983064fbb3672e96d95936bac6d3850b3b1cd085c9bdec08e8d8a80f60503,2024-12-18T15:15:10.370000 -CVE-2024-39756,0,0,66f04f9746038f13ab024c0553e2084f78fcfa836ff5718baa0b51d0a47a1972,2025-01-14T16:15:32.090000 -CVE-2024-39757,0,0,7fd4fbd79e208ead715b97ade8691de7a136abe8090e581fbf13b3d023e9c222,2025-01-14T16:15:32.197000 -CVE-2024-39759,0,0,c5d04d20d1f791cc1a26914a6b0bfee66362f31ccbb4313eb08a329a8baa6ebf,2025-01-14T15:15:21.057000 -CVE-2024-39760,0,0,baddda330b167697733a09152ebb91a49642aba8ea83ef0fb545c73a77f5a6ba,2025-01-14T15:15:21.213000 -CVE-2024-39761,0,0,17ff79dbe16262ddf25334c46d7d96d1a01f1bc7e1811c8b7c767764c75408de,2025-01-14T15:15:21.363000 -CVE-2024-39762,0,0,9c40a4a35679539ea6ded0e58539733f604466e57777d60dc35a7fd22aa494db,2025-01-14T15:15:21.513000 -CVE-2024-39763,0,0,a0dca6f3ae821b774830c07fb8779342c88b0582e004d58486dda7734a501a13,2025-01-14T15:15:21.663000 -CVE-2024-39764,0,0,9e97faae4b5e85046278dcb4d77e24e92dc0c24a407505f366a02e8c31ff8cad,2025-01-14T15:15:21.813000 -CVE-2024-39765,0,0,f3d87fe716cb2363ed74b3acbd8d5932c21a20f61272dc91c6b272844636b781,2025-01-14T15:15:21.973000 +CVE-2024-39756,0,1,10ea94389121a31c4ad5704d9d41b2d815ca27a65d291dd42d05234b1c6df1a2,2025-01-14T16:15:32.090000 +CVE-2024-39757,0,1,bbffe30d38694551e04e11303255d7ab5ea0236256ee220b4a6990792b47defe,2025-01-14T16:15:32.197000 +CVE-2024-39759,0,1,ebffca9cd95163f774063fc7fdc49a900b70132b12ffd2a9e61778e3dc71c363,2025-01-14T15:15:21.057000 +CVE-2024-39760,0,1,4850d0213ec10332b3444f4b371ec4a26720c1891607b32b2dcf97fb4a47dbde,2025-01-14T15:15:21.213000 +CVE-2024-39761,0,1,9e9befd3f760889dd9407cae8625e94e60480751e0a84c9926e7130c0e12d076,2025-01-14T15:15:21.363000 +CVE-2024-39762,0,1,491e6d275828bad868000496c94368ca66a463268dcc0b64e081b5f6fe0db9a6,2025-01-14T15:15:21.513000 +CVE-2024-39763,0,1,7f0f5164ace21e508a13a111b073388726a4fbfaa2709aaeabe5ff63eea98871,2025-01-14T15:15:21.663000 +CVE-2024-39764,0,1,70b5f1e1a6966a75bd02797ba185a47abd1400a66db469a2aaf12b8e5b51984e,2025-01-14T15:15:21.813000 +CVE-2024-39765,0,1,ef2b7bcd853e56781ae62a030555f0a6054e7c3876362f1428749235f0d9e1cb,2025-01-14T15:15:21.973000 CVE-2024-39766,0,0,844aefab41c4190ffa859ec2a49097c570e2e9373903e050261066d0ad10a0ff,2024-11-15T14:00:09.720000 CVE-2024-39767,0,0,9e1d98afeb59e9ce0a888e3ac87dc97f327ada5cf6782d1b11dbdfa8cede82ae,2024-11-21T09:28:20.950000 -CVE-2024-39768,0,0,6b4e6ad8ef25a6233919af1b01b351ff8db3b06a853b9c6d359e95a83df83af5,2025-01-14T15:15:22.127000 -CVE-2024-39769,0,0,26564d074472dd26f0b4a4ac7cf0d1d04c74f244cf60f2b6d06dc05348207e5e,2025-01-14T15:15:22.270000 +CVE-2024-39768,0,1,734c021f2f7bd771275606bf690c8669d154ff4dab070850cac251942576bc2f,2025-01-14T15:15:22.127000 +CVE-2024-39769,0,1,ab8c7c86a2b553b3cdd05c10c6b0aef04e65d4cb33ba075862913c7f2cfbf873,2025-01-14T15:15:22.270000 CVE-2024-3977,0,0,78ac860cc8a8d0c7c2aed6775586d6934117777782645dfe7099108b8d9721f9,2024-11-21T09:30:48.667000 -CVE-2024-39770,0,0,cf17243c23b9b0384c492e590332a8bf8ab35f0608d58cc394c492c1b4ab7894,2025-01-14T15:15:22.430000 +CVE-2024-39770,0,1,4c2f66306dea94bcd156fc0bb6c541f091c36c87533b4598c8a4b8b9b377ff17,2025-01-14T15:15:22.430000 CVE-2024-39771,0,0,1df971bb66b0c1de701e7eddfd6b346b8adfc589a7d21a831a453ad4d77573e3,2024-10-28T21:35:11.267000 CVE-2024-39772,0,0,7017d890106e3d10136c00096439024bf2193858f8fddc05716bf61dbd12f94d,2024-11-01T14:20:22.217000 -CVE-2024-39773,0,0,7409fd733a2a3079b824f8419d96d7ca1ac72215f06f7ec450a59548c6039347,2025-01-14T16:15:32.520000 -CVE-2024-39774,0,0,a680ecf48cdda0c78eb67252a9744ca2b740be55d2baaf3627d16fc56b8eeb05,2025-01-14T16:15:32.630000 +CVE-2024-39773,0,1,fdb1d38056bd815f162774d486f5525e7960fabbbbed9359df43e14ccaf28f7e,2025-01-14T16:15:32.520000 +CVE-2024-39774,0,1,4589ca88f16002a9f06fa13eff1d056fb6426984a67c01aa59660afa1f20418f,2025-01-14T16:15:32.630000 CVE-2024-39775,0,0,9755b0d11cb128cbd71f3ab95f30a15bff4bad6969790236412ac10cc2cc2441,2024-09-04T16:34:51.113000 CVE-2024-39776,0,0,47015231b132d702adc5e908b384445bac8e422abb123c6994d64454c8ef88a3,2024-09-04T18:25:51.920000 CVE-2024-39777,0,0,d544fb5c8af3d11cc0bf86238933c07737b24f611dcb10d9d356ddde3e445899,2024-08-23T14:36:48.817000 CVE-2024-39778,0,0,54090db86e8d38e017cd2ddd1031fafce658bb8e4578d3d0c24cf22544ca372d,2024-08-19T16:20:52.980000 CVE-2024-3978,0,0,482c21d01e49c69bca4dc15aede6173bfc8d79c5700a49fac23ff27e1403ed25,2024-11-21T09:30:48.857000 -CVE-2024-39781,0,0,9f450371a4e76baf8fc40b7679cfd25051c41e8d3a6aa9122aa083e368b91b62,2025-01-14T15:15:22.900000 -CVE-2024-39782,0,0,8b02f437d11848bb91dae97c35433597101de8928c6640b03bccb5c4314ea885,2025-01-14T15:15:23.090000 -CVE-2024-39783,0,0,ff2f8a0ceedfb55c43d24c248251991ec83a1151e393f6e8bc1d82c94d4beced,2025-01-14T15:15:23.253000 -CVE-2024-39784,0,0,695a9d3fc6d72da1c5210be393843b0e8131b2560dd0830d6e620efda8b57a85,2025-01-14T15:15:23.417000 -CVE-2024-39785,0,0,577ddab38e0cde7f4b6f733fc1c38b440914a3915172a5cc3c6f56d7f92f7bf3,2025-01-14T15:15:23.597000 -CVE-2024-39786,0,0,d5a2eece41773dc16268bcc2a09b97bbf2ab7f244a5c4527804ef1bd3fcb3137,2025-01-14T15:15:23.777000 -CVE-2024-39787,0,0,ae748a08b87071894eeed0aa2d2e56b8121045df02bfa3a2e4a362751a60defd,2025-01-14T15:15:23.927000 -CVE-2024-39788,0,0,77424cbad7980187558cca25bf33947f4739d305892ff1ee81f5feeedd40195b,2025-01-14T15:15:24.073000 -CVE-2024-39789,0,0,a5daefed092897ea25999618b903e53ccaf14598c69a7f279904ae35185551fa,2025-01-14T15:15:24.227000 +CVE-2024-39781,0,1,cd7ec078c3d17c622583b3e23660ac213bd8eadef2f1c6639a74be6e2f789062,2025-01-14T15:15:22.900000 +CVE-2024-39782,0,1,2c4a0c996115cb53bacadccd26e56de9d86433511bcf2ca9387251a8d2006990,2025-01-14T15:15:23.090000 +CVE-2024-39783,0,1,f6f01647f22663a1a4237028be2f09d041ea4a7b798078632e4cd7d6dc559f9f,2025-01-14T15:15:23.253000 +CVE-2024-39784,0,1,650fe76e70d43204020856d5e73646c8e95692ae6edb3ef84c1d0dcc126b68fd,2025-01-14T15:15:23.417000 +CVE-2024-39785,0,1,5eea1e78a8714069eaa46eb8174ad8d30ea6406f87b0e47634dbce6f04b2ef56,2025-01-14T15:15:23.597000 +CVE-2024-39786,0,1,d63f705473581c4eef25c3b5a890b17d34b42cc5133d5a7385bca56e6395bb45,2025-01-14T15:15:23.777000 +CVE-2024-39787,0,1,1ddce68c4ae94c56f427d408a0b86c9c4ccecd8410aab81c22cf9f58f7c8927c,2025-01-14T15:15:23.927000 +CVE-2024-39788,0,1,db3a4d04195c61e86c8a6e3f798c70f61eff8f336f0e3bfacdd020e69b661602,2025-01-14T15:15:24.073000 +CVE-2024-39789,0,1,5cc3dc1f5dcc60edde002dbebac77a3f71310e9b3dd7d1c16db9b7fd41c2712c,2025-01-14T15:15:24.227000 CVE-2024-3979,0,0,0afe50bc44d6fa6b597cd86ec198fb5812e3efa26f9c96f16b2dc019765fb52b,2024-11-21T09:30:49.047000 -CVE-2024-39790,0,0,22683e65f56f72c23d1e9f7b986a2b5f632bb9c9b1beebc6286dba28a333ba03,2025-01-14T15:15:24.367000 +CVE-2024-39790,0,1,50e6c82a9606027db5b214ff2e2eb4557bbd237138a5114e3b0d8fb498d14c9f,2025-01-14T15:15:24.367000 CVE-2024-39791,0,0,84800cbf50106122b4ec00c830726d3c0c16e597f5511aff68896621728fa7b5,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997cfee,2024-08-19T16:20:28.967000 -CVE-2024-39793,0,0,cc0ecbae37a9be521f8fa4656d464c818e4c3ff4ef4c57a19cda993e345c8172,2025-01-14T15:15:24.510000 -CVE-2024-39794,0,0,f77a10646535e672858a67900168934e1d2cf5fb65046bbca2a55833bdf67f0a,2025-01-14T15:15:24.663000 -CVE-2024-39795,0,0,1ccc35c0c465df55f045d08db25c645d794d6ffc064a09a49bfe99ccf1a3f929,2025-01-14T15:15:24.817000 -CVE-2024-39798,0,0,374cda9829165d3f5ad30ed23877477d23760435b9d2c6cf4906a062d27f75b2,2025-01-14T15:15:24.983000 -CVE-2024-39799,0,0,4c10538164f071627b90a9c5efc64a1bdae91ae19942daa73709bc29f8a9aee0,2025-01-14T15:15:25.167000 +CVE-2024-39793,0,1,41497e9b4532e6ba7660bf3fd4412ba05d0cc12136a31e4a2d487c533d2f3ce2,2025-01-14T15:15:24.510000 +CVE-2024-39794,0,1,837f4f6ff378c23c3ca990a9eece931e17432e19bc82c2ef37c2593d934ff0f1,2025-01-14T15:15:24.663000 +CVE-2024-39795,0,1,5b42de05552f2a4e48bd5faa081f43d44850af50223f52ce7a4eafbf5f864221,2025-01-14T15:15:24.817000 +CVE-2024-39798,0,1,e93b265d472121bc280dc37329e6e8e82ae098059ce87403ae85505fc8c92de1,2025-01-14T15:15:24.983000 +CVE-2024-39799,0,1,8289bf452953f094a08219ab8c654ff0bfcc5c545dcae60ec2de1540806f29e8,2025-01-14T15:15:25.167000 CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000 -CVE-2024-39800,0,0,22ebc325ba3c3e82789c331d5ff25e0230169b0fa549f1c069ca259f8bdb2a6f,2025-01-14T15:15:25.347000 -CVE-2024-39801,0,0,136617eba3dcf94e8928703a6dc403d2d44032c813a854d90dc67988168f9f36,2025-01-14T15:15:25.510000 -CVE-2024-39802,0,0,ad8d0edd28f874c87a61bd0e836dc9883de5a02c38cbb339c8ac91bd30e61966,2025-01-14T15:15:25.677000 -CVE-2024-39803,0,0,3de419c280d8bc9d5f7b1643d398400490117e179fb2771ac11ef781f0793e11,2025-01-14T15:15:25.840000 +CVE-2024-39800,0,1,0590a724ca7c7b14cb0aa876059ddea102273530a42151da4aedac48f2f77aa1,2025-01-14T15:15:25.347000 +CVE-2024-39801,0,1,91ddbbca5bd46d44f56f74a71907defef9881e8952c8cd461d8441278f0329ae,2025-01-14T15:15:25.510000 +CVE-2024-39802,0,1,4e08d5343d9311b0c46e76a6590e6658a6bcfaae0a93fb3c5fc18c7f14912bb3,2025-01-14T15:15:25.677000 +CVE-2024-39803,0,1,d0e062b8d8498e7853bac6593c0ac81a9efaf7a0824ffd8f4776c9c517e1a2a7,2025-01-14T15:15:25.840000 CVE-2024-39804,0,0,970bbd5e70b5a1ae4ce845ef93df8f5df4fa3a408ddbe562f3bc62cf1c781211,2024-12-18T23:15:07.640000 CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000 @@ -262011,7 +262011,7 @@ CVE-2024-39843,0,0,487982c7ac9edf948bf5070b1d5694d31df05d071ec44e4a9d29dcddfbfbd CVE-2024-39844,0,0,85c3a846aa32629f6113f9a413e0e7dc227dbddf60f06f604db9d915b574da6c,2024-11-21T09:28:25.877000 CVE-2024-39846,0,0,80953257ce1c332cd15e530c3e3ca7ffad1fca5d0d35a29a56f52115354d0829,2024-11-25T21:15:15.117000 CVE-2024-39848,0,0,6fb5930c26ec13faeb8b3f14124f22fb0a64f39031988723e8e09a6ad4893c41,2024-11-21T09:28:26.230000 -CVE-2024-3985,0,0,16fcdf1581584dc8b8cd1048140e74594a4bfe19a8e3540063a807f5a825bea1,2024-11-21T09:30:49.757000 +CVE-2024-3985,0,1,afec2f4d4f11a8465eff8bce2a2f56ef2ece934c1bfeaf152cf2a57f5a558b24,2024-11-21T09:30:49.757000 CVE-2024-39853,0,0,a224043399891653f1bf55094c6d78bc499427db95adef716d68626986175f2f,2024-11-21T09:28:26.447000 CVE-2024-3986,0,0,821905e2ab820467455b5a5f470d0c3f3b3637df80998a6d83e1cdb055d8c204,2024-11-21T09:30:49.873000 CVE-2024-39863,0,0,2a4fab41b36270083c53945f9453e9d3f204a719fe1df5d3475aa7899200c551,2024-11-21T09:28:26.660000 @@ -262101,7 +262101,7 @@ CVE-2024-3995,0,0,67420ab684035dcba53d6cd4affaf243e024b306482721d617904927a31747 CVE-2024-39950,0,0,bd2e265d0d3e341db8fd3fcdb0bbe9322437d77857deea077eb316ac4c626513,2024-08-19T16:15:10.800000 CVE-2024-39962,0,0,610d63d23297f1ee68b2c62b2472d5d090eb07acc7385cefe298e4919bc63e06,2024-11-21T09:28:38.377000 CVE-2024-39963,0,0,a7665a725bfd603dca56229224107e62d497de0f7b57fe964a30af519e56bb58,2024-11-21T09:28:38.597000 -CVE-2024-39967,0,0,257325ddd5f2535f1d28c742384787f470ba214a971c88d95ee10e704d169569,2025-01-15T23:15:07.923000 +CVE-2024-39967,0,1,dc3f75dfcc78cbd9871bb8e4c8284fab48b89a92aed3a345974053c3ba93df89,2025-01-15T23:15:07.923000 CVE-2024-3997,0,0,0a03be4e7ba77df2c735c58c4c279b21783da7d62f4a479befeed51e634c7efe,2024-11-21T09:30:52.453000 CVE-2024-3998,0,0,847c70ba4e0bee0ad4d10aec09ccd79489e9a61ce069c72f27125c4d62d52359,2024-09-03T15:00:36.923000 CVE-2024-3999,0,0,76272a3e50a6a2e069e3213357753908084bb20422a13e0771c86e9014635714,2024-11-21T09:30:52.620000 @@ -262253,8 +262253,8 @@ CVE-2024-40509,0,0,d365af0a26f3351b4ff6ec1b3ac9c15ddfb12134e28ffa425616027809028 CVE-2024-40510,0,0,01a4f30105e4141bfbdf735dfe770a9e53e3acbffd49d6de09904f8ea086ad66,2024-10-04T18:28:07.177000 CVE-2024-40511,0,0,559bde25f295eea2f47294178cdd60114ad9f4dfeba09aee5941c614d809c509,2024-09-30T12:45:57.823000 CVE-2024-40512,0,0,d36f48a03ff3dd4f93c813812097a184b347da771d3626b2c3f74ff38cddb70a,2024-09-30T12:45:57.823000 -CVE-2024-40513,0,0,d0aee1e2fbd58b5044f76cf5242b5a894635c335f7f3743a5c368ec0512123a8,2025-01-16T23:15:07.490000 -CVE-2024-40514,0,0,efb1346fa8c9f1902cc625a4c8b3a1b64be043aec59987ef02ec3e49db8aa55c,2025-01-16T23:15:07.600000 +CVE-2024-40513,0,1,9713fb9812889aa54ef5f64e53fa78945258e142fe326199c4e00ce06f97e5c5,2025-01-16T23:15:07.490000 +CVE-2024-40514,0,1,24cd42ce15a68daeb1e07304169cd251b4ac0ff1eb95686b861e492991564350,2025-01-16T23:15:07.600000 CVE-2024-40515,0,0,02cb86e3e0b377895050d0961542e60a81e71e07527579b9769598689f04005a,2024-11-21T09:31:14.117000 CVE-2024-40516,0,0,d4d687972653b472f242f6a074ac835c001043a1ab0dbc3ea72906e0b080dd33,2024-11-21T09:31:14.310000 CVE-2024-40518,0,0,bbf2d149d5fcc55b5b0dc1b47361a8364a7ddf49f79972030ac300284c5871b5,2024-11-21T09:31:14.500000 @@ -262294,7 +262294,7 @@ CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da1 CVE-2024-4058,0,0,41bd13730a967fba6dfa98e0a473274805b3a9521fbf9427b1f8ca715400dc8e,2024-11-21T09:42:06.270000 CVE-2024-40582,0,0,dd0f2a6d540adec2bb9dbc707f94fc9dff9972da1e4d33c84f17f86b02c0ca18,2024-12-11T16:15:10.873000 CVE-2024-40583,0,0,060f59166f99bc729cca84acecd51bc3d35affc7058999b403ee573e24158633,2024-12-11T16:15:11.080000 -CVE-2024-40587,0,0,38c5312a4c9238882bcb91fb2b3d2734ca1ffc9bc5b9ceca84014ea68da47d0d,2025-01-14T14:15:31.027000 +CVE-2024-40587,0,1,13182e8f48be90b9583ec23aeca6c5ba7d4017cff4bd50b632cb6831da84cd4b,2025-01-14T14:15:31.027000 CVE-2024-4059,0,0,a7395c4133ca68cf195a746536b2a10391759a1b7af0981398c03fdffb32f8d2,2024-12-19T18:56:45.140000 CVE-2024-40592,0,0,70d588c7e0dd63c3f30c565c48cdd17864cf3988f3b717bd753beb73e71e83a3,2024-11-14T20:37:06.040000 CVE-2024-40594,0,0,bf65899143a2f4c0e93f528c3b9a7873123db8d586300b13b7dc1af3be463ad0,2024-11-21T09:31:20.467000 @@ -262333,7 +262333,7 @@ CVE-2024-40636,0,0,dd66fe6861164d4a296e8e0c669d696148e94f69e4967ded6581c3eff7851 CVE-2024-40637,0,0,0e78c74d636aff4401930bab6753186bb249828b976fb63a23598de7dd495008,2024-11-21T09:31:24.457000 CVE-2024-40638,0,0,607d13a6d5e05300f5970a3973c842a17786a4de2592bc19f98b03c563472665,2024-11-20T15:30:37.387000 CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000 -CVE-2024-4064,0,0,f841d0f1b1bd102fde2aa0da5f3c18bc936ece3d1c5161a64fa940e573d1e6e3,2024-11-21T09:42:07.163000 +CVE-2024-4064,0,1,1d8e533f9c3add24d4e5e77aa955ebc13ddfa1558685ffb2506bcd9de9030dcb,2024-11-21T09:42:07.163000 CVE-2024-40640,0,0,4c300dc2d4aa65376921c56be088d3a884bddb1a5c13c080acaa3742081ae168,2024-11-21T09:31:24.770000 CVE-2024-40641,0,0,a61b31d3abcd8a29a60d2de58bce29a354c2331e286c1d995c1edc01de36d8c4,2024-11-21T09:31:24.887000 CVE-2024-40642,0,0,e2e54f8272cc2144122c7e7f80b671bffe567c9b77b4e07ab6dc0505467687f4,2024-11-21T09:31:25.017000 @@ -262342,7 +262342,7 @@ CVE-2024-40644,0,0,a57ad1bfdf68296ce8a9539e505efa1809fefd866555c9c76d8987e02e0e4 CVE-2024-40645,0,0,a3f49b95b4c12b5444ede2f523391703502ab565df4a5cf2c506d73c2cde7df4,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,88935cfcec599678993a6403e316caa0b9a2d4c594531b02670b7f84c2cb6867,2024-11-21T09:31:25.587000 CVE-2024-40648,0,0,d1a60a844ec096d2fa051ae2f056504ecbdead31db11117a3172d5ff5e1a66d4,2024-11-21T09:31:25.720000 -CVE-2024-4065,0,0,33a15d752d58e8bee831b20fed17bafcbb9a5fb9b8477bf30b17dbe970f94d68,2024-11-21T09:42:07.320000 +CVE-2024-4065,0,1,9da44c2d32dfbc73460c19358c62c4e268445f2c0a97dae86df931449210e89c,2024-11-21T09:42:07.320000 CVE-2024-40650,0,0,78138be7e0cafd2635985c4e24ab654bf9d1895811ba8f47491211caaf20f74f,2024-12-17T19:08:50.857000 CVE-2024-40652,0,0,3f440f86342c58e47996d56495558243ae5edd7e5b0d377daab8b5a46ab73bda,2024-12-17T19:09:03.173000 CVE-2024-40654,0,0,92b6520c587274abcdf8c0d347f6bea7ed6a9174c82ea6943ece9915b4ce4a3b,2024-12-17T19:09:27.327000 @@ -262351,7 +262351,7 @@ CVE-2024-40656,0,0,7952244a0edba16c7b1641e37a8a4c2b9512711a7db3e419601d58f1ff099 CVE-2024-40657,0,0,bf4a138d1aa2fa42aa4d5a2da3a3f6fb502cfc4f5e26c7ce78f111fb635b6f95,2024-12-17T19:10:57.930000 CVE-2024-40658,0,0,81c96f5b07e731aa3e30f306c1988f242cfcac3d8634728dd99c324f4add9300,2024-12-17T19:07:48.867000 CVE-2024-40659,0,0,a7b5cb3172d5254cce7613182004debd0bed477960909fcb5534622c47022ee9,2024-12-17T19:07:45.260000 -CVE-2024-4066,0,0,0c129e4b332ff0e4346c90544ae4356d59681f587fe7bac3b803674f3af09586,2024-11-21T09:42:07.463000 +CVE-2024-4066,0,1,6cd355da3c9e49abb35e08f9fda369aad53a6760706707b0377e9e8e82e70021,2024-11-21T09:42:07.463000 CVE-2024-40660,0,0,b7c78dc1f99c1908de45423562bff4e1020b202a8369eadb6ebe92a17540bbaa,2024-12-17T19:36:04.020000 CVE-2024-40661,0,0,e9311a0488c8beb4857508062f47da62f4761ca246a30ea7974cdfed1317449f,2024-12-17T19:32:42.070000 CVE-2024-40662,0,0,f930fc5956328b9ceaccc04df86a895546984aaffbdfff03287ccf231f34c2aa,2024-12-17T19:07:42.750000 @@ -262429,7 +262429,7 @@ CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 CVE-2024-40770,0,0,868a7712172f9193db04503bf4681e6456ac2c380ba489a77f29f0b183bde5f0,2024-09-24T14:55:38.737000 -CVE-2024-40771,0,0,dac0ccf91eeef1db3f9b139084c8b3826343b0af5bffe0baf015ba27c2d3e811,2025-01-16T17:15:11.850000 +CVE-2024-40771,0,1,81b2ead0067167d8532f832ed90232b1edb8a7d971b8334b76f2b3a7f78f361c,2025-01-16T17:15:11.850000 CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000 CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000 CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000 @@ -262498,7 +262498,7 @@ CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e7 CVE-2024-40836,0,0,a141cd1ddaeaf46ffa54c1bf810175958c1ce047751b66d0d0ec544280cee946,2024-12-11T19:40:36.427000 CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000 CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000 -CVE-2024-40839,0,0,3b6f63d0f34b330c3131081b0536c08531faaa601e2ad7ca5f1a87737d41a09d,2025-01-16T17:15:12.017000 +CVE-2024-40839,0,1,f287398273177798e7ccdf3956adcbca35beefd91280639fd10d6bb88b022750,2025-01-16T17:15:12.017000 CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e36,2024-11-21T09:42:09.817000 CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000 CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000 @@ -262514,7 +262514,7 @@ CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,872fb94116f001037c1281aa476b36043a3a7ea2928e48e7702d75cc209d3fce,2024-12-12T15:28:11.783000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 -CVE-2024-40854,0,0,dc2774b11c70c35cbd43d0844ecc1093d7c886f6c08ca65037d452aa436f73e2,2025-01-16T17:15:12.163000 +CVE-2024-40854,0,1,d73ce7d4afa629e37e3e3e7680a500ddde44e4df8fe74e74e2c91a3a3dbbf93e,2025-01-16T17:15:12.163000 CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000 CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000 @@ -262801,7 +262801,7 @@ CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808c CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000 CVE-2024-41145,0,0,e583948039235f072af443025bc0ea6bb5630b5a84bc37fad1ee2b5dbca5d3b0,2024-12-18T23:15:07.970000 CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000 -CVE-2024-41149,0,0,cfc94f9062da856b3bcd11d798ac2b78a748ee2600229b4b923a283a290da8d8,2025-01-11T13:15:19.973000 +CVE-2024-41149,0,1,606b9142d000eafc384795094ed1e1843df9d27b3662048369f68d6a6cbb9ad6,2025-01-11T13:15:19.973000 CVE-2024-4115,0,0,ffb5f36fbe2984a7256aff205f47c39ef178d82820690299ed15db732f03d6a7,2025-01-15T18:42:08.110000 CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000 CVE-2024-41151,0,0,00f13e1e96fa8ce3e2849a0ecdb2937bd23efcaa80a1d6b9e409fd228363f8f4,2024-11-21T09:32:19.073000 @@ -262948,7 +262948,7 @@ CVE-2024-41444,0,0,40dc2a2ff5c1d7d012984e5f8e458529a422a415ff1fc824c0d056c0835c5 CVE-2024-41445,0,0,39f65e85a8026950b749bd33850514ea1abf27c7d809b4b0d704f4057a44f5ed,2024-10-01T19:03:27.197000 CVE-2024-4145,0,0,bf30081aa256f27ec5ec45b8e903ae674bd8ea9a8556cad62f5df9c1c025c206,2024-11-21T09:42:16.447000 CVE-2024-41453,0,0,ca223a754854826e8622a14a8b2af6b1993b3c3d5360c8f104b3a028994b74b2,2025-01-16T18:15:22.540000 -CVE-2024-41454,0,0,a6593741b1c518fd65163e1e0988c57d908a0806e1e98de00b6f0875f6257336,2025-01-15T23:15:09.130000 +CVE-2024-41454,0,1,dd949c856ff68e3ea293b505a0d8ab00771e939a024f3f93a118d2b0dde0b095,2025-01-15T23:15:09.130000 CVE-2024-41459,0,0,945e7666277f92adefa4a45ea355c655829c2bacc91d62c763534ab8d13fdaf5,2024-11-21T09:32:40.673000 CVE-2024-4146,0,0,0663ca1946310f885e7b84f94c4d0e50a90d3f22de3a0daeb9adf70314f7435a,2024-11-21T09:42:16.633000 CVE-2024-41460,0,0,680a17cffac82c4d739a25bf30c24e3dd4848de66dc731770f357c7e6681469e,2024-11-21T09:32:40.897000 @@ -263050,7 +263050,7 @@ CVE-2024-41656,0,0,5547ca1fc7f086123134ddf7e25997a9e8d115d893b3ca9d5b86084e55bc7 CVE-2024-41657,0,0,a5c54d84702589380e59150e6f26700d50d5483935a1d64a8c22f9006b671145,2024-08-28T16:13:35.140000 CVE-2024-41658,0,0,73d31f03f30fd7feb411ddb1abbfb27bc5ff6a231dff63f4532a66eb480a8106,2024-08-28T16:08:31.743000 CVE-2024-41659,0,0,d3ddea8571ed769aae42e5471e10a16d5cd0b51389c93e3216030e421b69ae04,2024-08-22T16:15:08.993000 -CVE-2024-4166,0,0,fbe1c3381257b0cd3e3a34c97ef2b56ea0bf7cc9a1210246aa5faa95ddeac9df,2024-11-21T09:42:18.970000 +CVE-2024-4166,0,1,1fcc408dd189f0c9300f3bdcf7f4e403e2ff8582dc00ebfcd8ae8a23180a4213,2024-11-21T09:42:18.970000 CVE-2024-41660,0,0,c04f4bdeed996b73090b035a760ea73b17c4634a67ab354f0c2c3561ae17b8d5,2024-08-01T12:42:36.933000 CVE-2024-41661,0,0,8be49a95a9c023719c12155b6bed0ffae7501d3f32777c539056e8b618120c6d,2024-08-29T23:15:10.743000 CVE-2024-41662,0,0,dc3e227528839622e3f52103be234a8b480e9e6cbb7ce29d523b189f23f32bce,2024-11-21T09:32:55.687000 @@ -263060,7 +263060,7 @@ CVE-2024-41665,0,0,d45defca8cbb1cc7c179ea92d3660a2d03a817945288adb82a64865ca964e CVE-2024-41666,0,0,d1f92fab5beee45ff4388efe5ddd44e33f7a0f850b5bbacae429ee6a186a4dbe,2025-01-09T16:54:08.037000 CVE-2024-41667,0,0,1521e864f3422c9bb00179574d7279d1ebaa600c95bdd96efe9cb514a68f8910,2024-11-21T09:32:56.327000 CVE-2024-41668,0,0,dc859c8887bac12a38e68f1ba130799ac5f5864a2aafd455bb306c37815db92b,2024-11-21T09:32:56.450000 -CVE-2024-4167,0,0,d22d20db5f1aaa247cb65ba71df4cdba88f48d96dcd102d6e40984303654b000,2024-11-21T09:42:19.103000 +CVE-2024-4167,0,1,87aed1d2d662bfa0eb8b9ad9a290b75ecaa9218eb55ec2afff703a0964bdf15b,2024-11-21T09:42:19.103000 CVE-2024-41670,0,0,c9e87686017bf1f06962765d723e0f2d30f9c3d48faf6a120d662b572f6ec20a,2024-11-21T09:32:56.577000 CVE-2024-41671,0,0,c596ad9d6de7c94f6a9a343533bbf1ef3f4f335fcf8e52d87a0aaea1be8e0898,2024-11-21T09:32:56.690000 CVE-2024-41672,0,0,8a88dbf32aeecbe5589e8346fbd3b5f74564360f3a3d962fea935a7182bcc0da,2024-11-21T09:32:56.827000 @@ -263071,7 +263071,7 @@ CVE-2024-41676,0,0,8e2ea5bb990638d3ae9d99715b3bf844e30ae3d47cce0c91ce8505f989f6a CVE-2024-41677,0,0,96250bc52ab18207ccd489766e50a131e1d26666e8f9be83ee991c8e4f846f3a,2024-08-12T18:51:29.497000 CVE-2024-41678,0,0,9bc03ecd6faf0db93e91a5b36c28e5ed841a3d4bdaf8e81efb4b10d2c99c65aa,2024-11-20T15:21:37.683000 CVE-2024-41679,0,0,fff0bb7009cdc2f4069c822cc9d75e707b4a208d00692569164ecf3d643cd35c,2024-11-20T15:21:19.883000 -CVE-2024-4168,0,0,b6857a9fc0ff751517b07d3b66cfdd2e7a1e982c24e356554c1836bee75e5a1e,2024-11-21T09:42:19.240000 +CVE-2024-4168,0,1,d76fdd17ff62138ece4bdab0cd8dee1a558b4d835ef9fb1788de575cb9c28e88,2024-11-21T09:42:19.240000 CVE-2024-41681,0,0,851f2d33a294bca43286fe19bcd65c701bdda939e213f541a50d86109ced693e,2024-08-14T18:37:06.540000 CVE-2024-41682,0,0,78c52b6d6ae7fa021e668be7d5addb2d1f292ddf1ae3e1922657884e26ff54f2,2024-08-14T18:37:24.413000 CVE-2024-41683,0,0,1f739f2f25a478b852b7913484322d0fb291c1cff85619a07da231b4550ba792,2024-08-14T18:38:26.757000 @@ -263081,7 +263081,7 @@ CVE-2024-41686,0,0,6ca3838e800281fb0f56892e27b1066cc806999f5254d98754cf0c39ab9ae CVE-2024-41687,0,0,a4a5a4f72125eed186fa6f8395e818c70c0c7ac8e563ea7df1804b7657bee055,2024-11-21T09:32:58.460000 CVE-2024-41688,0,0,59e905e70a60ec413244716bb53ac7a38909a19d986318b9299820ef5aa40589,2024-11-21T09:32:58.603000 CVE-2024-41689,0,0,37a5077368ede55e691e7af029f30ad8a79185d8f83c093df4da9290a7535b71,2024-11-21T09:32:58.750000 -CVE-2024-4169,0,0,49903d0332e49aeb140420462b26fef5e66d6784f795faf69471190b474b94ab,2024-11-21T09:42:19.377000 +CVE-2024-4169,0,1,c0860649fd74c8e002fbf68ff811804dca3d53761ff6e813cff4e2023b547b37,2024-11-21T09:42:19.377000 CVE-2024-41690,0,0,da79a39c17cdf59b607be7b7646047c5333a9d966b5329fce36738f98a05fd0b,2024-11-21T09:32:58.903000 CVE-2024-41691,0,0,caa7f60a21d53b4fc7de2721454213045afe0b661e58f569295db6751afde492,2024-11-21T09:32:59.053000 CVE-2024-41692,0,0,af4c3ae3327b5fa388270b9ca6f7cad936342880256ef5b66b3bb2b15d4e6510,2024-11-21T09:32:59.197000 @@ -263092,7 +263092,7 @@ CVE-2024-41696,0,0,eab16590d0c5edfc488b14692a9f8db9a3d4e3ad6e13bbecfd159b5146c5b CVE-2024-41697,0,0,a10fad6982c4f67ae3533b5a7be9ab43663fbb42b04a9d9667153946c0a0dc29,2024-09-03T20:19:45.490000 CVE-2024-41698,0,0,83f3b0720c9129a7b161b5c14f3e60a4cd0d55d0869429176e5a80fe9826db62,2024-09-03T20:18:57.060000 CVE-2024-41699,0,0,5101bb72e5ad33cba3281353080fffd0bc46a7212272adad9f7543fbe950b9de,2024-09-03T20:17:45.700000 -CVE-2024-4170,0,0,59907b80c214b140b10eef19d193670e74d138469075c5bb97f3ce4fd14e6d83,2024-11-21T09:42:19.523000 +CVE-2024-4170,0,1,259ce56daf1840291bea84b0bd07beba87dda9ffe2cbbd55c43f8a6617fe8ac9,2024-11-21T09:42:19.523000 CVE-2024-41700,0,0,50c40c31fab6377127dd0dcd79059c2577e200167f130365b3425d2f6c695b10,2024-09-03T19:37:12.273000 CVE-2024-41701,0,0,daf49829a0b75a687fbec8e2a8e671624c6389e728c274971ae634529dcbd2f2,2024-11-21T09:33:00.270000 CVE-2024-41702,0,0,ae40f48fdefa4952759c4c242cdf89d9f575ea0a3cbae8e1ce728189af43b621,2024-11-21T09:33:00.410000 @@ -263138,7 +263138,7 @@ CVE-2024-4174,0,0,351c15947bb701aa0f06097d0b29e94daa2eeb6bcf3253c51405ecf8081dca CVE-2024-41741,0,0,87808c3a5a97a8a12b0599786276b0bacbc5a8e2f5d1ce88333c8491b2440d52,2024-11-14T20:42:44.150000 CVE-2024-41744,0,0,a1ec9b6f722dfb7b5eb719083ed54b520e388eadf02f9306b2b2589df4b2c46b,2024-11-01T20:24:53.730000 CVE-2024-41745,0,0,6dba06d9ea0cc08ac8425e0341c71668811a6cd02139664e48e7481acbda9d69,2024-11-14T20:35:33.390000 -CVE-2024-41746,0,0,11e80c505b3f05f969e1a5d13af29f9f3c401e750e9a2efdf4e6033a05c63130,2025-01-16T18:15:22.863000 +CVE-2024-41746,0,1,989806c900ffd11c21b1fa6f91d833c84f6c1680e4b868bdf0c4c4b2010f26cb,2025-01-16T18:15:22.863000 CVE-2024-4175,0,0,5386392290fa38470dd8910cd3753515f25308d1edd31217aca2a63897449a15,2024-11-21T09:42:20.143000 CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085fb9a,2025-01-10T19:33:46.213000 CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 @@ -263160,7 +263160,7 @@ CVE-2024-41780,0,0,f0bdb2eca8ebee85877f13f35a81fb91d5ea99c267cf6b461805356adb0fe CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000 -CVE-2024-41787,0,0,2ce07b9a6b18d8a84c5d57c1b65be03ed592b20cf437d4d53fcd02adf4105c64,2025-01-10T14:15:28.947000 +CVE-2024-41787,0,1,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000 CVE-2024-41798,0,0,cc633ea407fdc391b71e57f24672a48cd6a94d6090c3348da6eb82d23699eb9f,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 CVE-2024-4180,0,0,64e0c8d8c66171063acccd720d31bd7075e5baef32bbca8d371983bbcc0987b5,2024-11-21T09:42:20.530000 @@ -263285,8 +263285,8 @@ CVE-2024-41929,0,0,cf6dbcb46e9c567ed50803e8bc7c5ed670d63483d59ac3786e92707bae89c CVE-2024-4193,0,0,2c348f7f2f87544d588812c852bddbfbf63c657e73a923d4b668c311de4e3919,2024-11-21T09:42:21.860000 CVE-2024-41930,0,0,9970243747a2426495d5267f7aec4e4ab9cce4ad5c0b5449a838d166e239dacb,2024-11-04T22:35:07.177000 CVE-2024-41931,0,0,8055ba2b4f57b9b2835ae4697ec8b13da4a3ea06ed170c08866a5fcbc2836aec,2024-10-17T17:15:11.773000 -CVE-2024-41932,0,0,1babd8ab5d2e518e92818cfec109bb4b2009572048e4065a0946f05f927aca2f,2025-01-11T13:15:20.930000 -CVE-2024-41935,0,0,4831f0e3ccf585077e6d1e3a4b423f325a5789c5e410c8cfa2504851d6b0e3ab,2025-01-11T13:15:21.083000 +CVE-2024-41932,0,1,1abe0cfce1ee58b08103c4b11983b06cf9d6d018f246ca811a21294fed0afb3f,2025-01-11T13:15:20.930000 +CVE-2024-41935,0,1,97e87f9da1b20b0c02c2d1055e7a663ebdcd03109f5d41c24a14b0c4db033df8,2025-01-11T13:15:21.083000 CVE-2024-41936,0,0,bc5263d793837e387ee98a53d893cb418781f457dbe691d4096c5aa745312359,2024-08-20T16:26:54.663000 CVE-2024-41937,0,0,908baea8d6075c024574b677758230bec5903572013c4b3c9a48a3ee7bf5b699,2024-11-21T09:33:18.477000 CVE-2024-41938,0,0,719214fd73b2e6d8794a5aa93ae558a501490a215679ae53d51ef85d7234584b,2024-08-14T18:08:42.777000 @@ -263514,19 +263514,19 @@ CVE-2024-42164,0,0,095d8335090047cbd32c9aa6dca282597d3bb04e8a636f4b9216dd5231bce CVE-2024-42165,0,0,da373a8e928b9745206f46b38828e9e3c7550a945a361c91e545a543515e661f,2024-08-29T15:21:22.330000 CVE-2024-42166,0,0,ad7e633f45131cd690a920c41a0a51a5bf0d41de735418be596855d789324a71,2024-08-29T15:23:20.647000 CVE-2024-42167,0,0,a8537f04ff59d4b55355491fa52ffd928dd919682df2e2ae176719a0ae545287,2024-08-29T15:24:12.060000 -CVE-2024-42168,0,0,396f9a2a9cf8c68e9266763d699c26138cc1d4ef65d45c1544d9044b683ac508,2025-01-11T03:15:21.737000 -CVE-2024-42169,0,0,c4139885b2469e8450cbc5522608cee82c175ae727bad061d2616411c5428be4,2025-01-11T03:15:21.873000 +CVE-2024-42168,0,1,85544832acfb90a86cc98122c133cce7849ab0defd09ef59dbd625daae45fd20,2025-01-11T03:15:21.737000 +CVE-2024-42169,0,1,4f63645f6f308e137ecb1ddffea48d0f5305f39667f62471aed3129aa866bb50,2025-01-11T03:15:21.873000 CVE-2024-4217,0,0,4a31dba4c3cb596b9bff69bedee5b7fb5464d8d24ddeafafb7638907c1f396d8,2024-11-21T09:42:24.493000 -CVE-2024-42170,0,0,8621732feafb5a1965cf3a672a0abfa5ec1d2fa154849f8bc0827a4858d29f69,2025-01-11T07:15:06.767000 -CVE-2024-42171,0,0,7c23376f01e8a71dba8f02e3cc459179e17a02155763a5cb5f720093a587aefd,2025-01-11T07:15:08.553000 -CVE-2024-42172,0,0,225fcad75eabc6687a4f18f7362b2adb3c25abd093cdc9d59c7996b0d4e7cfbe,2025-01-11T07:15:08.743000 -CVE-2024-42173,0,0,44f315b59e5db8539983c783dcc88b531da6958c918975bbf10efa6c538c20d2,2025-01-11T07:15:08.927000 -CVE-2024-42174,0,0,3f28820a9bd8cf8cf9d334457ab9a1a64b4e8c40d794a897f768f73624ecc250,2025-01-11T07:15:09.110000 -CVE-2024-42175,0,0,15ace39e893c1bff8b7e16e522cde4b95b5af743307f180322bb8a85d03c4238,2025-01-11T08:15:26.343000 -CVE-2024-42179,0,0,5e44a06faf5de646efa63bdd22e13e75061d112a56d64113167a2850a68fdec4,2025-01-12T22:15:05.923000 +CVE-2024-42170,0,1,5afcbe6a45d5f72994293af74920b328c7dc9aefc846bfa21a34a157f7353802,2025-01-11T07:15:06.767000 +CVE-2024-42171,0,1,8d298ec0b3e2d40f4e0a416b8d85d05734362ce2cf22dbbd76b4571728e0dd07,2025-01-11T07:15:08.553000 +CVE-2024-42172,0,1,4fa03e5310b9a85cb9035e0fe80dac98b7212102b38acb969412c40a3e436166,2025-01-11T07:15:08.743000 +CVE-2024-42173,0,1,d69d898226c0eba918eecdbc04204164323729085d4276338a569ea2f0c3c019,2025-01-11T07:15:08.927000 +CVE-2024-42174,0,1,bceab254b3c44d2b66899be5e50ac7038ecca13faa79bebf36e03519285bb313,2025-01-11T07:15:09.110000 +CVE-2024-42175,0,1,c6a06f177e4f5de7cfe1f6178200c9ad4f24c0732cf200455797808f18f0ffb5,2025-01-11T08:15:26.343000 +CVE-2024-42179,0,1,196106f2d3fd2b8f10b05ef0357a8e01417f21977d9b370fe7a52116b37eb085,2025-01-12T22:15:05.923000 CVE-2024-4218,0,0,7a0061e75f27495a7259e5a50ce11715685411290c6b771dfa8c54d8a57b046e,2024-11-21T09:42:24.667000 -CVE-2024-42180,0,0,b8981c5f4c283ce4938fb12f4fb994e8d974d1368c48899ad7966d2aeeeb05af,2025-01-12T22:15:06.983000 -CVE-2024-42181,0,0,e7ae476db729412a07da99fe69c05026658c00a62acd974cd71c0fba47129e81,2025-01-12T22:15:07.120000 +CVE-2024-42180,0,1,e809f9eb7c1490df30221feea0eda948578a27863db7d95ec3363e5547031367,2025-01-12T22:15:06.983000 +CVE-2024-42181,0,1,906efc04675e6ba0dfe172b3f945d5b98bb4c6661097a27e747b5cc96fa37cb6,2025-01-12T22:15:07.120000 CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000 CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000 CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000 @@ -263589,7 +263589,7 @@ CVE-2024-42266,0,0,e3773d6d9416557898775f8e251bb3caface8cb0ca7f14ef02f46bb386d50 CVE-2024-42267,0,0,881474d04f014e3df273462be8ded36c9d57a485e542f49fb9e4732784ec7797,2024-08-19T12:59:59.177000 CVE-2024-42268,0,0,32405a14e4dd6aeea6b8bac7d9fbbbb26f3abdb388425d48d9528ab8165ab983,2024-08-19T20:52:49.323000 CVE-2024-42269,0,0,02987285ba6a510a4f86004b6c012db3daaca6a917d5ddca0195d2e4fddf6486,2024-08-19T20:53:51.717000 -CVE-2024-4227,0,0,58e47d5be6c4e2dd73b4cd46c9ec9dc6f4ce44db3dbfd2264ae51caa2d816627,2025-01-15T08:15:25.983000 +CVE-2024-4227,0,1,ef8948e0af7f7f17d9a07bd0e3b386829e4bc166f129ab941da0b6677e7aa879,2025-01-15T08:15:25.983000 CVE-2024-42270,0,0,6b50e5a9597b9526acb4eaeebc4139bcf4abc11e8002fddbaf9c4256b84553ae,2024-08-19T20:01:09.520000 CVE-2024-42271,0,0,9523571215d77ef04f2ffa9461360c070595c5ed9f9b05d782d5f2b6bed98b5c,2024-08-19T20:03:31.840000 CVE-2024-42272,0,0,4fdcca2a8e5f5cc9a2a4cb69a5754d8e5d4f5b4acbe21ea4a0783f9d615cf61b,2024-09-30T13:40:21.843000 @@ -263760,7 +263760,7 @@ CVE-2024-4244,0,0,3b8d7edf2ed63df8044e422aeb1b780c9c45f9ae3662ebada3be0b2a6c45b1 CVE-2024-42440,0,0,e21d9b776ef80bd04d695f0a47e516545028ac8225f143837019c4c0b08b76a7,2024-08-28T23:59:01.537000 CVE-2024-42441,0,0,04cb6e9a13f27c86bb2051d7eae465da3e0fd75a34af891d94c6ed0cb275f3f5,2024-08-28T23:58:06.960000 CVE-2024-42442,0,0,c95b9702729f1aa9eb8ceba5f94968c5cfabdca93c030d049ba8bcc0788889f5,2024-11-12T15:48:59.103000 -CVE-2024-42444,0,0,322bccca80f39d755569bf8c414893ed1f93e374c3148694739795df3d82ab05,2025-01-14T15:15:25.997000 +CVE-2024-42444,0,1,9c10c1c787216d53ad642f4276dcecfc578d8b3c31bd900159c9e2c546a3099a,2025-01-14T15:15:25.997000 CVE-2024-42447,0,0,f2527a1907bc97edf5fa3092632226feebddfd1518376703abe26c98f8cdddbd,2024-11-21T09:34:02.990000 CVE-2024-42448,0,0,b2ac39b31ded9216cdbe436ad867b986a202acfcc6e34d426fd4cbd2727261bf,2024-12-12T15:15:14.230000 CVE-2024-42449,0,0,9f33ee15a72f8c53ed840f00741624888679f87eea5e3eefcd0793f447b6eee8,2024-12-04T02:15:04.533000 @@ -264038,7 +264038,7 @@ CVE-2024-42904,0,0,dd65971147a31315d3bfee5d40160e4bf66b73991caa4add2af3390891039 CVE-2024-42905,0,0,c52ab1475651d1d452452a4967b5f494474147ab5b1030ccb298ab25a52e8907,2024-08-29T13:25:27.537000 CVE-2024-42906,0,0,e4c12e3d6765127547a5d0fd8dbe9b9445f37e7aeccfc0dae30b9a5ac41fd954,2024-09-05T18:29:02.627000 CVE-2024-4291,0,0,b149f57dfd24140262aaedda1af7497212845830e579622247b4d03f2f54638b,2024-11-21T09:42:33.253000 -CVE-2024-42911,0,0,5fefe0df2df59eb1ffaedff1d07c1d77cdcb8407581d0bb53d4c2f86cef77e74,2025-01-14T23:15:07.297000 +CVE-2024-42911,0,1,034d560b0859ac9552e736a1e4b97f262ed4326b2c693eb284ead43a6878ec91,2025-01-14T23:15:07.297000 CVE-2024-42913,0,0,83119740f97d1fb4c34c867cc28a51c6c334861fc3bbc20cef3f59f0118bf607,2024-09-05T18:31:19.263000 CVE-2024-42914,0,0,1b84f2891f55a525ee8470b362d5b264cc43bcbebb794212367321a710143ccd,2024-08-26T17:35:10.510000 CVE-2024-42915,0,0,82774ecce7752d395797d1dd840fdb0ac74bcfb8cf5c14ba63693e387ea4ecd4,2024-08-23T18:35:05.490000 @@ -264142,7 +264142,7 @@ CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1 CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000 CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000 CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000 -CVE-2024-43098,0,0,6dea91d88e70f70fbde066d9faad9bb804edfb35642461a2bacc1953af4dd634,2025-01-11T13:15:21.240000 +CVE-2024-43098,0,1,aaa4bffdf6c6e20ec4753899ba345f210f592f053c3f9fc872d1827eacad7c11,2025-01-11T13:15:21.240000 CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000 CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000 CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000 @@ -264616,7 +264616,7 @@ CVE-2024-43584,0,0,48e627cfea6a9647e06f5895df87f7de5808f3364c6c538ecf02965881aa5 CVE-2024-43585,0,0,d5b51daae74e528bee5e49484ec714a235a78329b8dc0a81e0003a06ed04afc6,2024-10-16T21:38:57.467000 CVE-2024-43587,0,0,9de9e4aae1c926feb9c254fb5c9841a525dc7e95ddee4987c94a6de807a75369,2024-10-18T16:54:36.267000 CVE-2024-43589,0,0,7421a03d79a251f1fcb3e670cc2ede90fd5c85114ad0506fb2719206f281e7f0,2024-10-22T19:29:53.660000 -CVE-2024-4359,0,0,7150fb55811fab9c0cf824bc2e13150506ba38ad4b035cd5caa45a7a79ce7a92,2024-08-12T13:41:36.517000 +CVE-2024-4359,0,1,a847c8a4556be0bc64499ff4a494bda5373f3e9fea07d39ae70522d6aa358cf4,2024-08-12T13:41:36.517000 CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda0d9,2024-10-16T21:44:50.927000 CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000 CVE-2024-43592,0,0,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000 @@ -264626,7 +264626,7 @@ CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d92265438716 CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000 CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000 CVE-2024-43599,0,0,e8ed1fc525a6895d6a19bfee310c1be1add8fbfc1bd1f275dd80d76add28514d,2024-10-17T20:03:28.687000 -CVE-2024-4360,0,0,bf74f5eccc1881547f6f91a61251be583253ca151ec1301fcbaee9647faf35b1,2024-08-12T13:41:36.517000 +CVE-2024-4360,0,1,6252dc41739530b13b80d54c3ba928a6dcd0865b27642a102a8ba40f784b0055,2024-08-12T13:41:36.517000 CVE-2024-43600,0,0,512e86bf1b068e11fed10f17ded98012e43b045697c873b109da2f251d32875c,2025-01-08T12:39:18.487000 CVE-2024-43601,0,0,f4750adec6049954723df6377c0e9969d37c9d4c9bb640431f543dc8ccffc558,2024-11-08T22:15:20.270000 CVE-2024-43602,0,0,8305a93b11e5988c2ad84757fc77cd97d5fa424c6919ea25cb20c9e18393fcb4,2024-11-19T03:40:15.550000 @@ -265141,7 +265141,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,a1a7565b3d1d747868a47cfe0b90ac2757ca3fe3528c74bc3c5562541c409893,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,1a66ffb3fced69f7dd0088f00608289a6df8f259d48e72e731b80a9fde46b0b9,2024-09-25T13:28:09.067000 -CVE-2024-44136,0,0,c065c4f10368a56e223cbbba40f78abb8fcfe2ea0dc64cd68efb58d12ea08cdf,2025-01-16T15:15:13.300000 +CVE-2024-44136,0,1,6f174c4211aefd4ed089ffc5069f9b8c0ec85bf908cf7d127360d8595626b83e,2025-01-16T15:15:13.300000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 @@ -265433,7 +265433,7 @@ CVE-2024-44761,0,0,f2fbd374c905a05d9df4fb95583dd2553e55188e5ecbb406bb2b5a2754599 CVE-2024-44762,0,0,0252031658b287d2b24f86957e87260de5c6c531326cfec0caf9dfdb500c9354,2024-10-18T12:53:04.627000 CVE-2024-44765,0,0,f81ef15b0a3a61859cb1b17066290c8490ac2adc22a484a3ce700c9973dfd276,2024-11-18T14:35:03.200000 CVE-2024-4477,0,0,f8c8347117fb6def6bdcd4ad9e5293fd63ac62e9258176671603ccdc713d0e8b,2024-11-21T09:42:54.207000 -CVE-2024-44771,0,0,74b7f6589c32446dedbe8ce0efb96419346d2132c628dadd0fa47716b42e38e0,2025-01-14T15:15:26.150000 +CVE-2024-44771,0,1,9f4754e87823d65b71ddd4a779b7dc83272f7671334b044c4bc0056991951dc8,2025-01-14T15:15:26.150000 CVE-2024-44775,0,0,011306915a1ccec8a2dc43a0525a6e4c4a138ea71cacacbb4139dc7838ff48fb,2024-10-16T19:35:10.167000 CVE-2024-44776,0,0,4a401f17cb489db8e3a27a309be25f5339458e753f79a473b6f579dab3a5a708,2024-09-03T18:33:26.287000 CVE-2024-44777,0,0,a398edec91d4490afe5ef74579daaf4dd8cf95eb1a91d4125ac3c877af1c7458,2024-09-03T18:33:38.413000 @@ -265466,11 +265466,11 @@ CVE-2024-4483,0,0,a55a3b2cc06753411045c8b7d716cded925104b5b68a44935bafd4b74de213 CVE-2024-44837,0,0,d99be13bd28102fab04d2436e2423a9abe7e5510be44a84cf457d3b46476bfa0,2024-09-12T16:17:57.797000 CVE-2024-44838,0,0,8d376af95f42d0d8bf980ba63f53616a78fab858760e0c31e2a6fb218ae7c30a,2024-09-09T14:35:06.773000 CVE-2024-44839,0,0,1b98dbfbdec4a61210e539bb2abdbaf3319f35d3dda44d650971ff8cb9b58707,2024-09-09T15:35:10.797000 -CVE-2024-4484,0,0,a0f23024d483a004b225d7020d4de28783a966977b518e13fa06ae03eff9a312,2024-11-21T09:42:55.237000 +CVE-2024-4484,0,1,905f01c39bc86bce3889a4c9779fb44f358f23be0249d32a3bb2e519284d6cb9,2024-11-21T09:42:55.237000 CVE-2024-44844,0,0,543b67798b80c9f433394b5371f67242f69c06e81a35f5031e65aa2bc37f2c80,2024-09-11T16:24:51.660000 CVE-2024-44845,0,0,be723405d776fcd23ce5801cd5dc6a06dd41574f2f123999283d6be69263ae54,2024-09-11T16:24:23.970000 CVE-2024-44849,0,0,556a0bd4002e0d7931d67df8540866973c154d8cb1d32b49d0c67e3b0c20db93,2024-09-09T20:35:18.097000 -CVE-2024-4485,0,0,5e6a42abe6c2f13fab70930cea3afb839a54b10beee706342c16d2d18176ea57,2024-11-21T09:42:55.363000 +CVE-2024-4485,0,1,ce41b74da4f4a7838ea98ab0da8f3b648f337ab8b80a300df4de88e7ab27fc98,2024-11-21T09:42:55.363000 CVE-2024-44851,0,0,6abfc69b738de66078e20610415b56073c882cc1306851277a169c82063db87b,2024-09-13T16:34:45.413000 CVE-2024-44852,0,0,a74f653fdb1ffcc2e84f3297ca4dfee5ab9454ebde7a4924894631ae74e9622f,2024-12-17T20:27:12.623000 CVE-2024-44853,0,0,a3baa20da8c42d2a3d05fc0f4bf9256ac96d6eb1a5c90ec0d8f5a7b212a45c65,2024-12-13T20:33:40.270000 @@ -265645,7 +265645,7 @@ CVE-2024-45058,0,0,3e754ab3cb6fad940a98b62e4ca382427f30f2cb78868fe21e22c59073e40 CVE-2024-45059,0,0,fdd80483995b4c7c79db3ad6a3187198cc00c2b4861efd53bac3b956fae10f81,2024-09-13T20:09:19.523000 CVE-2024-4506,0,0,228a4a465a028398b0941f6b4789f16630aaa2541ecec409f49ce1e1c4b4b84e,2024-11-21T09:42:58.667000 CVE-2024-45060,0,0,fdf3192e213f43713fe94dd4f660c140c402b48e19c6be5f44cc86908a9d0e81,2024-10-17T14:14:11.230000 -CVE-2024-45061,0,0,befda2b72b8c78f8a52f7b766c6a9b17a5d28cf7411184ab5b9de8a067f4a858,2025-01-15T17:15:15.113000 +CVE-2024-45061,0,1,05b1c7309f8ac21a996408c3f436219993810ef39c6cdbea2d2923f33822314f,2025-01-15T17:15:15.113000 CVE-2024-45063,0,0,1409a1792fb044d0180db60765e18242d949607976f55c38d4cb7d3b87690fec,2024-09-06T17:35:18.370000 CVE-2024-45066,0,0,5840c56de67d6ec89c19e6b63643f7547b6ea7016be72ec0c0aaf3000af5773e,2024-10-01T16:18:10.680000 CVE-2024-45068,0,0,c8edc7e1dd2efd4150730702fd7fc207bb2cdcb6fa3089f6d2a2ca2cb86ca5f7,2024-12-03T03:15:04.953000 @@ -265671,7 +265671,7 @@ CVE-2024-45099,0,0,858c41c5f15c72cacc9dd43b5c393ed0070ec0aaeb790150e951db7166ebd CVE-2024-4510,0,0,02ed18b24a084b78d31c63e9da1b95e453ef9099ebd9923c60b7e5c73b97e063,2024-11-21T09:42:59.297000 CVE-2024-45100,0,0,a1114146ec3a16b64841da41e807a8556df40765aeb56724f02ad4b7fa3cd578,2025-01-07T13:15:07.530000 CVE-2024-45101,0,0,f325c1ff668b2b7378c2468672321659723e47dba843b782909feb83b24e490e,2024-09-14T11:47:14.677000 -CVE-2024-45102,0,0,fd30df2d9be275e6e06aa25e3e8a326695eef92495ea3f7ccb655de66167f212,2025-01-14T22:15:26.820000 +CVE-2024-45102,0,1,086b5646abee52cd5a795c666a903f2baa0d41145313fbd475f1ed0df6e414b3,2025-01-14T22:15:26.820000 CVE-2024-45103,0,0,a8c0055551f03e695e63b0973f1e941c9fcf8c5e34f2e57e30f25b4a4f7f650a,2024-12-13T19:19:52.410000 CVE-2024-45104,0,0,3df80228db5c275f30b0ae9082e735c38b4d72283dadc8a224190c0e3a2a19ff,2024-12-13T19:19:54.233000 CVE-2024-45105,0,0,64323ebf12b70b6f8728cc8df565272cd704a4098c6c244c86eaef22c3091a10,2024-09-14T11:47:14.677000 @@ -265876,11 +265876,11 @@ CVE-2024-45319,0,0,f54a68d148467026440ad15f341a6bfb542cacddb35ec8506cc4659fa4aa3 CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73ac,2024-11-21T09:43:02.993000 CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000 CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000 -CVE-2024-45326,0,0,86ebce8f30d55c1b2581cd9f16d3a4529cb04f091a99a26c0b2f7f2fa73b1005,2025-01-14T14:15:31.183000 -CVE-2024-45327,0,0,42ce17a56d26e9f93c0428bdd57edccc07f542ef58a06cef469cef22c8286e63,2024-09-11T16:26:11.920000 +CVE-2024-45326,0,1,50b7e6957e5644f2fe5468ee5e874fd00ee8c86b30012bc26d5ff1ebabd042ea,2025-01-14T14:15:31.183000 +CVE-2024-45327,0,1,c19405fd027bab55688482e17a7c065e7915b2e8366c5483f9d8c6e0e1bff408,2024-09-11T16:26:11.920000 CVE-2024-4533,0,0,565c4992f22cce399c7ec79b1c1f5241de1ceb51c7019357739f36b97aa0a0ff,2024-11-21T09:43:03.177000 CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000 -CVE-2024-45331,0,0,50a30c7ff023f46df9bb814a7b6dea1e93fd189bcc773dbdcc28ffac6c6b64f9,2025-01-16T09:15:06.500000 +CVE-2024-45331,0,1,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000 CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000 CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000 CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000 @@ -265906,7 +265906,7 @@ CVE-2024-4538,0,0,5bd1ad90e973f76dc331cc98dd5010eac6153f7bd5c3f59bc15316bd99e49f CVE-2024-45382,0,0,cd17bb10b42a7a52154b8f180f6a96138cbe671bc16e0955e6b9f0951bb6f705,2024-10-16T17:43:43.917000 CVE-2024-45383,0,0,18b2a12c0247f6bd404573e4f3025c14dad6c1dfae1f9cf4c31db12712f62634,2024-11-21T09:37:42.043000 CVE-2024-45384,0,0,cbfb50bafa8517a7944bff5db1df53c710c3eadab72436ecb1123d86217adad5,2024-11-21T09:37:42.190000 -CVE-2024-45385,0,0,0ff36faa4890e68eda1f2926aab7ef6bfdfdd26ff04558ffd7c599d744ddd711,2025-01-14T11:15:15.750000 +CVE-2024-45385,0,1,b38907c3c7b76d562808754d87a2b74dd59151e3345fd4bc12154a559e7a51ba,2025-01-14T11:15:15.750000 CVE-2024-45387,0,0,da4b0586d68c4f918b7336c262bd810eaac6fb06288260c72c637886e434ed76,2024-12-23T18:15:07.043000 CVE-2024-45388,0,0,5e8b5ccfdf2c3da6b5d7948eeb7403963fce2832acccafbcb71f9440d5a08c72,2024-09-19T15:18:32.007000 CVE-2024-45389,0,0,7edb5866be2f947d92ed825c273c577f4ddbd466128d69408c1eab72a19e26af,2024-09-12T20:17:31.767000 @@ -266084,7 +266084,7 @@ CVE-2024-45622,0,0,b710e3973bc54105a6c52433711f835588415a56a038ced9ed7020c8b95ca CVE-2024-45623,0,0,5c441374691aca3d3dc1871007085f3589123ddb707473a40f59605250fae5e7,2024-09-03T15:35:15.360000 CVE-2024-45624,0,0,b55674d4570db6379ffcfb68d511bfd6e80435e71433865e310cb34f4d504a6c,2024-09-12T15:35:48.600000 CVE-2024-45625,0,0,d20161a4995ace7748c12e338379fbc120e9cd3065297a8eb4465406af4a3f9e,2024-09-10T11:19:40.113000 -CVE-2024-45627,0,0,68cd7f55b51117aa57e13320ac60d7ec7d29545406eda5b48175d8237c7a1a7b,2025-01-14T18:15:29.477000 +CVE-2024-45627,0,1,06f8e7024e61e55a40ff1609bfbcf38e586710636d9d54b99621459f22bd28f9,2025-01-14T18:15:29.477000 CVE-2024-4563,0,0,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b289,2025-01-08T19:51:35.093000 CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2cf,2024-11-21T09:43:07.050000 CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000 @@ -266211,7 +266211,7 @@ CVE-2024-45824,0,0,052af77f2938c71d885f8780c684340b3e8def2ae196f2e001be1da99675d CVE-2024-45825,0,0,7653756adacf41b9d7b029d50745cbdaf6bd0929fdac78c43ff0f70e0ec9f043,2024-10-02T14:43:08.720000 CVE-2024-45826,0,0,06ae7370defd3736a6cd9f71c444134a6d1e5c46af980777be7a5f7aaf7f4fb6,2024-10-02T14:35:38.017000 CVE-2024-45827,0,0,14b2e3c223bee3e57f3f499ba2a6632d8d5cb7e001c1dd0d7aff42ddb6920805,2024-11-12T13:55:21.227000 -CVE-2024-45828,0,0,73bbe0dd60535323b4b9452d4adddfba7eb9c9fe8494d20ce8a68ff41c4895cf,2025-01-11T13:15:21.450000 +CVE-2024-45828,0,1,6a8b7b9826b5b0a7021978737c67ecf4eab16ea76d1e74bf17ba5c02f900664b,2025-01-11T13:15:21.450000 CVE-2024-45829,0,0,ab7f0021bb7a93beaac116d04129f4163df742a680ddbc4de2302713f584254c,2024-11-05T19:38:57.827000 CVE-2024-4583,0,0,785a5bb3a36957836b7a383b7765b0b67cf9852b800aeb286c820ff0407ffb78,2024-11-21T09:43:09.317000 CVE-2024-45832,0,0,d75bfc3e389f08270f7efbda4f6a9926c8035de2d7487181b2202066be5a30a1,2025-01-17T17:15:11.870000 @@ -266346,12 +266346,12 @@ CVE-2024-4614,0,0,eca609b72f6d0dbdf3e2930a517382c618b783ca5f3bbd2f9a2c62afa1f7de CVE-2024-4615,0,0,2ef0c847a0e7928efb8e726ca9f8d3082fb4a8f69966f52e098782a2c92ae089,2024-11-21T09:43:13.227000 CVE-2024-4616,0,0,c88a5bb19ffab0b116976f147bd01e0835cf9dd78a3350693b45be3922df36ca,2024-11-21T09:43:13.370000 CVE-2024-4617,0,0,591f2f27c42c02f697911ff625983cd1e4eaf8f3a464b0dba65cf73eb6c11bdb,2024-11-21T09:43:13.580000 -CVE-2024-4618,0,0,cdc22910a020e9bb9502aeb149bf184528942c32b067a8d361cbb1776e6c9212,2024-11-21T09:43:13.690000 +CVE-2024-4618,0,1,7c58b666d3f7a94fba266dc1b68e80219cb03c13535be0bb74dfe81db6042827,2024-11-21T09:43:13.690000 CVE-2024-4619,0,0,e13855d30b6945557dd4659b259b86ac4d456f730a52ea3bb1b91f51d4f58536,2024-11-21T09:43:13.810000 CVE-2024-4620,0,0,ba6cb8b4b90a19279ffa16a083d9166077215ec27ed0288a47d1ce2ebcacc327,2024-11-21T09:43:13.923000 CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000 CVE-2024-4621,0,0,5b081f12feb85affecbce7e55cb325897bb9294ab5a34846e1b6b33436e2d24d,2024-11-21T09:43:14.093000 -CVE-2024-46210,0,0,0ccb80736915868f80a8057949f6a84479dd796fd0f6866cb5bbebb1ac890924,2025-01-10T16:15:28.757000 +CVE-2024-46210,0,1,9de5b62abb5af1c84ec63c4fd8571b835d6b4fbcb5164e64675ef3ddc8b911fe,2025-01-10T16:15:28.757000 CVE-2024-46212,0,0,9fb6a248b9aee6c6623aaaed9592269e8faf25b72106f535b7602ba05dd43c74,2024-10-18T12:53:04.627000 CVE-2024-46213,0,0,14e6aca58c78f4091257ec1bdfcf4f32aabc7fd46f373f1f42d1b8882c20a13c,2024-10-18T12:53:04.627000 CVE-2024-46215,0,0,fe5702e9b51c58e432fa7fecc93685ecce003d70c9e7155da8f03da1e9c41964,2024-10-15T21:35:30.590000 @@ -266427,13 +266427,13 @@ CVE-2024-46410,0,0,31e03ba0c54c3d457ace9a72e0933a7183f5084a10c157e4925b9d8e3c1ca CVE-2024-46419,0,0,7af2356fc4a4cdc079ec535cf9b6451b04fa1664f50917e909fd51e655efa97a,2024-09-17T14:35:29.797000 CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000 CVE-2024-46424,0,0,2273b0f58286ad09b52a454674cc24b223f9c5afb4eee6fc1ffbbf08a1bb4cd9,2024-09-17T14:35:30.557000 -CVE-2024-4643,0,0,c72eb0e24aa15a0242ddb46f10dd387e245484987d8feff675043a9a2f0b31ff,2024-08-02T12:59:43.990000 +CVE-2024-4643,0,1,a86c5cb3704a17a98d8db6a028780c7179de9fcbdca27c95d2dadeffb8c47c36,2024-08-02T12:59:43.990000 CVE-2024-4644,0,0,789900a44e8049f565d0a084645f78e0226f44174b1ef54d3027776d0eb82aaf,2024-11-21T09:43:16.477000 CVE-2024-46441,0,0,228695ddcca85ab6755bc8a154549c980bf013ca49086460cfb0ab87ca194c52,2024-09-30T12:45:57.823000 CVE-2024-46442,0,0,5d34ebfc68b0e9b498265063d998a52d1a2b56b4b766741de6c5c955f52d52df,2024-12-11T15:15:10.250000 CVE-2024-46446,0,0,32498f8ed9e97dfaea9d9d29b52aff01ff427c37b0ae17db53d50ecbc649b2b9,2024-10-11T13:04:46.337000 CVE-2024-4645,0,0,ae6fcbc17927f6fb7b15dd7e2cd4ad23d3bc0045e51ea10de74a0f641554c9cd,2024-11-21T09:43:16.590000 -CVE-2024-46450,0,0,5c61d28534961200a865ff7e0a8d166b51e7cbc2ad674571bbd2925f59a2d88f,2025-01-16T22:15:39.840000 +CVE-2024-46450,0,1,14c9e64b7af6d48eea92fb8f953cb7965786133f412aab795801a4f9c47027b8,2025-01-16T22:15:39.840000 CVE-2024-46451,0,0,5691c8cee8fae2502da71b898418de27414898c09a161c995aa0a792f136951b,2024-09-17T14:35:31.353000 CVE-2024-46453,0,0,eb16d6a14c6afb2906a10bcd83b48fa20d81c17662bd8c281c8b51af6f96c56d,2024-10-07T13:53:04.767000 CVE-2024-46455,0,0,0b91cb2d456ef57e37eaec00f828b8cebf8d0a48c98cc5abe6b851bbbf1c9130,2024-12-12T02:02:38.990000 @@ -266452,10 +266452,10 @@ CVE-2024-46471,0,0,589331dcf0f8c9c450c6e7b62ea573b2d697ed156abdf0841e50912165e0a CVE-2024-46472,0,0,2bfdd82019e257a999a07f7e7f1ca5ea2cecc586102f438773f3e9b8b73a6851,2024-09-30T12:45:57.823000 CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000 CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000 -CVE-2024-46479,0,0,3e0e7af9c97d4ca976ec229743d4a5a327100ebfaf5e59eb638d2dae254cdfc5,2025-01-13T18:15:18.003000 +CVE-2024-46479,0,1,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000 CVE-2024-4648,0,0,212eae539e1c4f9e76bd7794cb06c3cbae5f1a5abb7f9e09441f66d66e134975,2024-11-21T09:43:17.023000 -CVE-2024-46480,0,0,bbd2098c1503933640229cb1fc42c014946e86ba7f2991b7ab4b40c6cffd07dc,2025-01-13T20:15:28.147000 -CVE-2024-46481,0,0,e7e962cef586598466dafbc13f2afbf5ddee2b19c37adec9bfb2f658c837531d,2025-01-13T20:15:28.300000 +CVE-2024-46480,0,1,ff7dc1722880813d8ff3e28d1dccf547b3a865b2546150ea45115323f8573725,2025-01-13T20:15:28.147000 +CVE-2024-46481,0,1,368d4913ca3abe83054053c7b25a5474cf2a690dfae1e79806cb2ba367b876fe,2025-01-13T20:15:28.300000 CVE-2024-46482,0,0,e4c801a2cf34271c78e5d32f990a4d755bf1dcc521ae213f4144174e1d100bef,2024-10-23T18:35:03.670000 CVE-2024-46483,0,0,5f5b506edb7d89b259e9e397ae75c01096f4b3cb3d63773184b27131fe14eeb5,2024-10-23T19:35:11.493000 CVE-2024-46485,0,0,c5c003208e4a28b0ec5c2baa1571cb1aa48ca8b81c90c708a253ed626fdcfd98,2024-09-26T13:32:02.803000 @@ -266562,14 +266562,14 @@ CVE-2024-46655,0,0,619756e28facd4dcca44a3c94ed931cf61b4408f1c51eeb5eca49c9e1ace2 CVE-2024-46657,0,0,a5ced2fc9af0ce563815dae98d1fb612587af65b11df31ab1959075bb6481834,2024-12-11T16:15:11.770000 CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c6d5,2024-10-07T19:37:30.467000 CVE-2024-4666,0,0,b7505f51131c566a65a04c854bf3da56137a32df8f67317652113aca5c7be8be,2024-11-21T09:43:20.073000 -CVE-2024-46664,0,0,e5218d6b2c148dbf578051c94ba6f67a57c7c795fa44a41d0934f6272f8ab248,2025-01-14T14:15:31.330000 -CVE-2024-46665,0,0,51bd9d8a8d10de7cb9b13827256a3212419a2fcd5cd656a056f5afa8f0b477d3,2025-01-14T14:15:31.490000 -CVE-2024-46666,0,0,a91168f7bdb2c66289f2d18f1a857f5d82553dc0bcf1da79fcd73565750f87dc,2025-01-14T14:15:31.647000 -CVE-2024-46667,0,0,6be024c312b6d0b74a33c84a4ec1e3c3775ee0e4b1009e960fd283edb8b94709,2025-01-14T15:15:26.370000 -CVE-2024-46668,0,0,67b0123ef714dcf5e7fcef0ddb8932a4d3a92d3294bec6da1ae3760a03a61dac,2025-01-14T14:15:31.950000 -CVE-2024-46669,0,0,bdef86248ec7b557b3ba17ecc147870f48f5ccc58ebb3826e082c5281bc175d9,2025-01-14T14:15:32.100000 +CVE-2024-46664,0,1,581f619b295aa4ba664deab8c6e162ad03d5cd79d87978a11e1db0cb57aed8a3,2025-01-14T14:15:31.330000 +CVE-2024-46665,0,1,ffbc9e9b28f014f8db6bea1fb73ee3f71b5446fec6dbec8281dcdb008e16cb37,2025-01-14T14:15:31.490000 +CVE-2024-46666,0,1,9597b6d7906f6e48f52f2513aa91009bea8a3bb79d64c20c309bc9548787f869,2025-01-14T14:15:31.647000 +CVE-2024-46667,0,1,9d9479893d3289e299ba39d965f766bd03c3b1849af4b3d13033c99b9dacdbd6,2025-01-14T15:15:26.370000 +CVE-2024-46668,0,1,b75013a2753fa4e65c602be8bbc6bcc8bc558fc59e18de18ffbdd0277f68b613,2025-01-14T14:15:31.950000 +CVE-2024-46669,0,1,994758b865eac324646826d5d7e38a9ab069567c91adcd75767a3090fdedf28f,2025-01-14T14:15:32.100000 CVE-2024-4667,0,0,0ba4feb9061227f326b9f44983ec481dee587f64e4899bf77e538f69f9f74063,2024-11-21T09:43:20.190000 -CVE-2024-46670,0,0,4504416ea77713541266a837baa7d90c2bfbc1e25606035675b447f096e61748,2025-01-14T14:15:32.243000 +CVE-2024-46670,0,1,909f76cf0212f7dc8f4fdab579989dbdadb7ab5ee9e102437b8d33c2e1126340,2025-01-14T14:15:32.243000 CVE-2024-46672,0,0,bc507e64d04ea5640093bd9a3ca6fe7f0c7a71643b79e70f9ab8ae27db60ca75,2024-09-13T16:29:17.123000 CVE-2024-46673,0,0,3f51c09e700b38d12ae33fe015bc01f6f75ee9c1181458b7ce2541d901e5897e,2024-09-13T16:51:39.117000 CVE-2024-46674,0,0,658c5615ef5104d2b41abc83d32329287f71abd731b08493051a521ab04d6ebc,2024-09-13T16:51:45.103000 @@ -266795,7 +266795,7 @@ CVE-2024-46873,0,0,f4b6ce25822b5f66b9eda7224277525233b6be310ea0c7e9c58104a3b1452 CVE-2024-46874,0,0,26c14938d3bd992112157bea5c4166c0fd1799831df9907b641db7157a63de40,2024-12-10T19:49:18.773000 CVE-2024-4688,0,0,0da5a2cc4532b2a20302b23569ddc0737195b6ffa097a6ed8db87ef0127f00f2,2024-11-21T09:43:23.167000 CVE-2024-46886,0,0,9a63353229e01fb1edd6f3ab48979b30c42407a9917c12b34caece3fb7192dd7,2024-10-10T12:56:30.817000 -CVE-2024-46887,0,0,18c6791960d0c0f0f98cf0b746a3fe10c5dc360b7c999b0a9994c1273a38d556,2024-10-10T12:56:30.817000 +CVE-2024-46887,0,1,31ffdd020e6e89ba10d4cabf13eb03312231ce0649facea3f0049fb4d2927403,2024-10-10T12:56:30.817000 CVE-2024-46888,0,0,db6a842f30d8f251dc121bd25774417ae3b2f6592ba0d0251860e2c1ddbff66a,2024-11-13T23:11:24.570000 CVE-2024-46889,0,0,0c0b8174b24aacee68d901072070e3c9290edceada480715ed82947d767bbb91,2024-11-13T23:11:58.763000 CVE-2024-4689,0,0,afdd092acf15c85594b452d7415b5690c9eaed5a758374b2fb2f7776ef6ad11e,2024-11-21T09:43:23.310000 @@ -266803,7 +266803,7 @@ CVE-2024-46890,0,0,07cfdc47c5e4f8b02ff64259dc69d0e812ad8e9965921da811fdf8e6a8318 CVE-2024-46891,0,0,88e2de50d7edff3f506b079a19451bc4dc625969dca215e8c5443db8d50f25be,2024-11-12T15:35:11.240000 CVE-2024-46892,0,0,c694a76e168de1f34027babae1b9b99dacd3ebaeb91d91eb4252126ca4da7892,2024-11-13T23:13:06.400000 CVE-2024-46894,0,0,660a6a786100344b5f43ffde9caf0642aadcc1bde7c503739d45a779b89d91da,2024-11-12T15:35:12.310000 -CVE-2024-46896,0,0,7ab825ab54108601285c4c09dc9cd9b16f7b4a94c0a368a18a42080b49a5033a,2025-01-11T13:15:21.643000 +CVE-2024-46896,0,1,2d1cbdbce5fc917746dc94fab2a6ec6394bd49069ac2f3dd6d0e3ea0abb87e4d,2025-01-11T13:15:21.643000 CVE-2024-46897,0,0,9eec647173e555f13f51f2e584fda49a1d135ce40040a9da0ee91e1e29d63bf6,2024-10-22T14:09:46.913000 CVE-2024-46898,0,0,74a42c689ae857f92ce7afe6487c46863603ab1bd0de02bba2a7de3bdb05fd52,2024-10-17T17:52:00.700000 CVE-2024-4690,0,0,bb8f79ed0583008c6d1a8b7baa189bdee4f903e95decde129ba88c5ca1cc909d,2024-10-21T15:51:10.467000 @@ -266818,10 +266818,10 @@ CVE-2024-46909,0,0,23c76f6e1a6ff88eaca1f23c162ae0295380b6a8eaa129068dfbfc189f6b8 CVE-2024-46911,0,0,3d0ee5b10efd83bd968feb73195ce7d2aa3abe80ac847507929e8b55f2484d57,2024-11-21T09:39:07.520000 CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000 CVE-2024-46918,0,0,4ffbb01b562296291ac13b104d12d655761406982e7cf7d77cad5d9f13d483f1,2024-09-20T18:14:23.897000 -CVE-2024-46919,0,0,1b8f5f4c834e44498c5898c7cba6f4b1a56cdab4d29b49d3eeaa641ef13fac17,2025-01-13T20:15:28.450000 +CVE-2024-46919,0,1,caee3ec5db2611d5674f255e6e4093f56001d0cd40bf7d98b7791ae4b55380a9,2025-01-13T20:15:28.450000 CVE-2024-4692,0,0,23393761d23a527f075ec0ab23d8db8e227006f309d26221ac72121be686a8a6,2024-10-21T16:10:14.873000 -CVE-2024-46920,0,0,e4ac6b82e18dfeb2051ce3b7e2456127293ea60f027be0301b5c27e57f1906dd,2025-01-13T20:15:28.613000 -CVE-2024-46921,0,0,bc35bbe8caeb79c9a411f9da2cff91716f1bcdb6338c53291389b1c703ef875f,2025-01-13T19:15:10.903000 +CVE-2024-46920,0,1,b32520b4541741819e59354b8e0dcf0eef99f4c8b248bb03a8dc5b52b8a5f76d,2025-01-13T20:15:28.613000 +CVE-2024-46921,0,1,8049c3858b141585eb4860cf394bf8a77f2855bdb5f90256968a6f88746ccf36,2025-01-13T19:15:10.903000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 @@ -266834,7 +266834,7 @@ CVE-2024-46943,0,0,a2ab43fac07b04c57c15a38e07538d32082401bbe9f47f2f38a4d041803c9 CVE-2024-46946,0,0,a4e07dc5ad75fbae4520cef9e33c0e117d786edf5f3362d441ee46603ff6340e,2024-09-20T12:30:17.483000 CVE-2024-46947,0,0,746e903a7b5d23a7bb52fea9ec922cb555f50088a9805d67f928629a5bb0bbe1,2024-11-08T19:35:17.037000 CVE-2024-46948,0,0,6281b2e205398125081e3b0b5e4daaff40c726def690fb7395c7c14018f3d942,2024-11-13T17:18:21.337000 -CVE-2024-4695,0,0,344ada13b5a73d6b5b899b22b9f138cc66b4b3e387d43f9e33b20cb0bc04eb70,2024-11-21T09:43:23.687000 +CVE-2024-4695,0,1,5e84c73ceac1cf7be7970a3fd4c3fec884b53e10639fbffe93fc37227131c918,2024-11-21T09:43:23.687000 CVE-2024-46951,0,0,e223ba85d93dd29975b18c8d34d8184a7af1d00272af09e6931db4d92728c791,2024-11-14T02:13:25.587000 CVE-2024-46952,0,0,93dfb1d3e2e3d67b1e0073f3d53cb2d0dfa255f4a4235ef37ffa90b1225f76e9,2024-11-14T02:01:40.953000 CVE-2024-46953,0,0,ae36fe9cfea292fbb6782ec13818f5d95e30d5d46a5da8b15400ca0eed3bb974,2024-11-14T02:01:09.580000 @@ -266883,7 +266883,7 @@ CVE-2024-46999,0,0,a1330ba0a227e6ff40481e86ab6b0bdb70a0529b3fd306e6ba8f29b9812f3 CVE-2024-4700,0,0,8f4064e6b7c128fb26b0362196d275485530c6f1e5aefb92206ad3872bf002da,2024-11-21T09:43:24.313000 CVE-2024-47000,0,0,ce23ce4b9613f5c8f0ce4188779adb11a16dd34934775d61761695a82b554738,2024-09-24T20:25:30.493000 CVE-2024-47001,0,0,82512b739d599a177453c09e314861017847d0227aaef8b1ee95f2f0a3f453a6,2024-09-20T12:30:51.220000 -CVE-2024-47002,0,0,8bd9f1b54f60f7513f20660a3b2b157f6cd5131cfdd3486e4494fc84d7d9b3a3,2025-01-15T17:15:15.883000 +CVE-2024-47002,0,1,5c919a7b5eed1045781701efd4624c6ef2b2f30ba79fe4aa6e689aa93aabf61c,2025-01-15T17:15:15.883000 CVE-2024-47003,0,0,525372da90b89830fd41e0c884d9afded05f7a8947d62cb01c2a85154f0d7a86,2024-09-26T18:42:29.383000 CVE-2024-47005,0,0,d90719cbe514c55464440f47622554265d33eea28544c444cfe482b6e25c483f,2024-11-05T19:36:41.127000 CVE-2024-47007,0,0,89fca0e021dd1dcdcc40431a1d37a47d29be0898f47767c4ce5f1f63d928d850,2024-10-16T13:23:03.467000 @@ -266970,7 +266970,7 @@ CVE-2024-47093,0,0,254373901b8fc660464b2e2de4e7fbfe56fe2ef0b4d8cc4ab6e7d7491a830 CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000 CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000 -CVE-2024-47100,0,0,c07ce74430e20aa3d764f00bdb8922764a353dc3a99b907d7385c250814a1d30,2025-01-14T11:15:16.573000 +CVE-2024-47100,0,1,5512161596a91aa61f59e569c4aaaf770b6ca7b29dcfad1142393a788aaed6d5,2025-01-14T11:15:16.573000 CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77740,2024-12-25T15:15:06.583000 CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000 CVE-2024-47106,0,0,d85a8e37ac40b85485c50aad7b2f7a67ee7b806a3ea7e8ecdce4814f2c48f4c1,2025-01-18T16:15:37.883000 @@ -266980,7 +266980,7 @@ CVE-2024-47113,0,0,779d440772277fe5838a7220c7526dc6206bbf1e989fcfb188eb4da0fef04 CVE-2024-47115,0,0,64bb47e915974f1dfec3d4bee74763bed48bbf036cf9597873496ec80cb951dc,2024-12-07T13:19:14.783000 CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000 CVE-2024-47119,0,0,822d29d557ac8a46a432d9833d3741afebbd1611ae551e680e9265032df20c37,2024-12-18T16:15:13.110000 -CVE-2024-4712,0,0,1fed59bb7e8ad0e60ff127714cca3b30ddf28383821e6801d32e14d7ddccef6e,2024-11-21T09:43:25.850000 +CVE-2024-4712,0,1,41dcfebcfa1570030d0650a11b9ea1ebe268de096b5dd5446ec4b7c88eeab622,2024-11-21T09:43:25.850000 CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000 CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000 CVE-2024-47123,0,0,5653f27850e6d35409f08b28cacb03a0f8d3e59c1152fcc0a7ddcb50ea8eb316,2024-11-21T17:15:16.473000 @@ -267001,10 +267001,10 @@ CVE-2024-47137,0,0,fb6ebe05a92e5137fc180626cc4ef25cc14bad5ee91ece2d54c1a034c8819 CVE-2024-47138,0,0,1291f6ab98e2f2d151d85489bfaa9f1ed1f5f441939346bb1ef897ae0399d6ba,2024-11-22T23:15:05.213000 CVE-2024-47139,0,0,2ea80937ea44c41ff081df285d143843d8800649d52ee529467323c945f04da9,2024-10-16T16:38:14.557000 CVE-2024-4714,0,0,0d524d117aabf03780c7be3f44074976485dfc4d101c0f965f441387c1ce48e4,2024-11-21T09:43:26.100000 -CVE-2024-47140,0,0,40e00c4bf8fc4230d4b4684fc06d973d1dce8861ef624e22ad4d8a5f0755e731,2025-01-15T17:15:15.997000 -CVE-2024-47141,0,0,13c4663231989b42a0fcfb01f4cd3fdface6997ec6c1904a02f6927d45654069,2025-01-11T13:15:21.830000 +CVE-2024-47140,0,1,0aedb372d21ea7e4d5e7f3a19624dbf9cc67b441956124253288590b6f7e20f0,2025-01-15T17:15:15.997000 +CVE-2024-47141,0,1,b01ee2071dd673bc6aee0bc456441ffed0684ea0765c1cc277284186bd71c70f,2025-01-11T13:15:21.830000 CVE-2024-47142,0,0,3b160aeed892b3de0fae2f0bd942190d42286dfc37500bd913fc0a3b0770ad8c,2024-11-22T02:15:21.280000 -CVE-2024-47143,0,0,c92830750dd0bd567e882eb6aa3b547d64184ff004388ec8f2ca35297e6e3b0c,2025-01-11T13:15:22.007000 +CVE-2024-47143,0,1,0d78513f7de65e5971b492075880c9868972d141ed46002ce93ba34d681d3943,2025-01-11T13:15:22.007000 CVE-2024-47145,0,0,060f9bb9a43b25110359917405fc9bc4bfa91006f8a71471b803c37bd9f0df18,2024-09-26T18:42:33.550000 CVE-2024-47146,0,0,4c1ec2fd77a55fc12a380140e8b75abce8b99c7554038e5bb49a8e56f7893728,2024-12-10T19:45:51.023000 CVE-2024-47148,0,0,8840019318d9e07f6140b0cc4c3b9fe87436c939db4a6a112a622ddb22cd20c7,2024-12-26T17:15:07.687000 @@ -267171,7 +267171,7 @@ CVE-2024-47360,0,0,3505750b43af9495495e6581d3aea77c21b1c501fbd0d883ba17ea947a88b CVE-2024-47361,0,0,33dc229f4d22271f1ecd394a993c61c75da3d2f296de3692410ee4c5a9290664,2024-11-12T20:25:04.763000 CVE-2024-47362,0,0,56bc4f07dcdfdb017da34c825963826df9398c632c974d75f574faa2381d2aaf,2024-11-05T21:44:55.657000 CVE-2024-47363,0,0,c615105e8ee5adfd6a8485d6e6e139d86ffcb58bc6a37be5e338f997edaafe55,2024-10-07T17:47:48.410000 -CVE-2024-47364,0,0,149170a89a88cffd470cdfb41d175d05e039b100886c4e574ab750b51ae2a75a,2024-10-07T17:47:48.410000 +CVE-2024-47364,0,1,eda3d19f8b6af238e879a13750854c6d9f4d8f7d51e14cd0e2f1f30450606dd0,2024-10-07T17:47:48.410000 CVE-2024-47365,0,0,afb0d6a8b18ae6c2493d0789ee81de1a1a73bd252d339cdf1953803b3d5de00b,2024-10-07T17:47:48.410000 CVE-2024-47366,0,0,4d57dd3357453352263a477fdf262b3e7ef903ab36a0e51fdd022964ed094a2f,2024-10-07T17:47:48.410000 CVE-2024-47367,0,0,bad7707269a1522b052638ed4752b9594efc2bb8cd40e160a382a90cb47d38c9,2024-10-07T17:47:48.410000 @@ -267192,21 +267192,21 @@ CVE-2024-4738,0,0,55b92f0ec83ca844ba7a3954e47159298fd8cdb4db3da13f38a69a26392592 CVE-2024-47380,0,0,e81b018b83213028d19f9ba405ac98571b941cce5d4fa1555f91ad1c02db3d25,2024-10-07T17:47:48.410000 CVE-2024-47381,0,0,4e7f3a0dbaf14b2c9a5955ec5adbed26e0047fa2ed481f9b2a433dd76fec344b,2024-10-07T17:47:48.410000 CVE-2024-47382,0,0,aa63aaebe1408d6c53de05759fb3ec5b5378ea6225202113523101dd197e4e3b,2024-10-07T17:47:48.410000 -CVE-2024-47383,0,0,2a77637fc600f6a477d93d5bd0c2573a38dc293cf0a70a940265f83447f94456,2024-10-07T17:47:48.410000 +CVE-2024-47383,0,1,72eb4758004b796b8cb39b924759c7f1ca3af0c39c096a6c9e8cd358dba3a2b6,2024-10-07T17:47:48.410000 CVE-2024-47384,0,0,e61030dd58a8950106fcf0b6a80e07e639b301dd55ec3138c45bb4ca6076f807,2024-10-07T17:47:48.410000 CVE-2024-47385,0,0,a735e7f2ad2f341e9684a4b65943fafc1760287fe6a3ce9634ac6f784b3d72d9,2024-10-07T17:47:48.410000 CVE-2024-47386,0,0,74b7f43e7ecd3b099c14428c8723fb90bf6d091a992eadca79931a0a007dcad8,2024-10-07T17:47:48.410000 CVE-2024-47387,0,0,c7bda230ed387b3a5e8a3302c0dd2e0a690bfa613a8307335761c5f8a12fc6e8,2024-10-07T17:47:48.410000 CVE-2024-47388,0,0,758c51fdaec18732cfb900475a403560931bd32506c62fbb2207642d3eb56ac1,2024-10-07T17:47:48.410000 -CVE-2024-47389,0,0,eabda1865aa20b5bc50afcdfc3971a8275494d92b1cb9b6597fae9e3bd09426d,2024-10-07T17:47:48.410000 +CVE-2024-47389,0,1,86299bdd264d50bc9da88c821e9d991bc90211ce853bedb296f6ed1186c3eff3,2024-10-07T17:47:48.410000 CVE-2024-4739,0,0,7b14c0aa87931fd19f500e5986f0b9cf9b632066d66dcbd2ac4307c74e99fb69,2024-10-22T14:07:02.023000 CVE-2024-47390,0,0,cc63875e69f06d4c17e24abcdb338b4f6bd982a7482b6fa20c9c6090683f0101,2024-10-07T17:47:48.410000 CVE-2024-47391,0,0,500eb0e23f5ae3d06f662233d5d40aa77710641ba95c8d575dc20b70f2347927,2025-01-07T13:57:47.850000 -CVE-2024-47392,0,0,7d93a3635e28232dc25322d9d02a74dbdc0712d524ee3084f036fccefe253476,2024-10-07T17:47:48.410000 +CVE-2024-47392,0,1,00551b6f97fd19b84d21351afbdb0a4f67e271ab807a9926f6f48e11f73620b7,2024-10-07T17:47:48.410000 CVE-2024-47393,0,0,228410e0daf6874cb668c644bc1c416844376ff82bc2ee46443d12bb91864fc8,2024-10-07T17:47:48.410000 CVE-2024-47394,0,0,a0040493a4339256d0c055721ffe7da5d10466a1db94b9e0e71b6b8311834a32,2024-10-07T17:47:48.410000 CVE-2024-47395,0,0,1bb947c2581bc5b0cdddabd963abdc1a3b1033f7495712457f47382960f59672,2024-10-07T17:47:48.410000 -CVE-2024-47396,0,0,87d25ccb080048e8349758bc99d9fe3be10c922e0add195e0af639ec72573bb0,2024-10-04T13:51:25.567000 +CVE-2024-47396,0,1,810c45e52001285ec8489db0c724df884906c2047ee743b43dca2920f2e00d79,2024-10-04T13:51:25.567000 CVE-2024-47397,0,0,d6e33b579c6f3b98878c9c8af5ba33c7a8163496fd4923a2f333df46298539b5,2024-12-18T07:15:07.847000 CVE-2024-47398,0,0,0e8500765dd23e95693039212d9342c839876f578954591efc256dea85968391,2025-01-07T08:15:25.617000 CVE-2024-4740,0,0,7752b92b77e605ff7518e19b7a1f8eb00ebf5f274219e7e50671031cca9d8ca9,2024-10-18T15:13:42.123000 @@ -267215,7 +267215,7 @@ CVE-2024-47402,0,0,5294b67f23b6e0be377ef33c2041b98bab989a32ba18cd1f6c0f3e64e0167 CVE-2024-47404,0,0,5fb36c58410057a64b74691188c0177ad91c01400e20d71d3a6f6e3e74e73b21,2024-11-06T15:25:24.887000 CVE-2024-47406,0,0,b743d902911ab614308b81c9703ec038605a1361241dc79745f12d5875a7ef9f,2024-11-05T19:36:13.840000 CVE-2024-47407,0,0,bafcbef053ce99a8e3169a4c7e5eb00bc517cd7b8d7c61a77da14e9be287bece,2024-11-22T23:15:05.347000 -CVE-2024-47408,0,0,df311c244fdc6c9e625965beb6efa17641030deae968489d811667c25df9dfb9,2025-01-11T13:15:22.220000 +CVE-2024-47408,0,1,c93a3958555e049b56fcd4fb42cc524acc558dbbae0ea0fa9604a0456f690307,2025-01-11T13:15:22.220000 CVE-2024-4741,0,0,12b19bd4141c3e2d0569c4a8736650cced57250db541761df40f516d23dde63f,2024-11-13T17:01:16.850000 CVE-2024-47410,0,0,508b839c6437920b3e8550e9af906a7efb9133c78124a4dd321673a1687ad75f,2024-10-10T18:26:44.857000 CVE-2024-47411,0,0,4122ca5688cb791277921b8b82e0a1587012c755d1af9ab500a251affe2c7be7,2024-10-10T18:26:54.153000 @@ -267307,13 +267307,13 @@ CVE-2024-47506,0,0,905ef44abae2418239c9b45c19ccded57cd15ef42abf699d7aaed8be7f249 CVE-2024-47507,0,0,4b5526bca6993d370893c5c6161e096044990d9b0b51024d2cb9be1f9cc107fd,2024-10-15T12:58:51.050000 CVE-2024-47508,0,0,9eb24349b682be71035d07f35bdd0e3c44d0149390ddd7778db3308d79b627b6,2024-10-15T12:58:51.050000 CVE-2024-47509,0,0,94c229801bddb8ce94388d34ff206e5f012170cf995eff5bd6f1382afdd7a27e,2024-10-15T12:58:51.050000 -CVE-2024-4751,0,0,323d34e4e60f2c798f82031d559639fb459a06390325463f51ec0a8dd20e430a,2024-11-21T09:43:31.213000 +CVE-2024-4751,0,1,7398c9ade628151963a8a0bf8e2ad1b2eb84489d2988c58ee4a360979cd1e3c3,2024-11-21T09:43:31.213000 CVE-2024-47515,0,0,e01f3c54c3cbe76ec857a537bf8684971e9ea310ebc5d03edd629be99596f6b0,2024-12-24T04:15:05.750000 -CVE-2024-47517,0,0,edc6999bffbf8b17f6f2acd03fc20a5da694bb62af2c88052f8e68e6455edfb7,2025-01-10T22:15:25.923000 -CVE-2024-47518,0,0,2489bfda13a7d774fd3562aa6a0e87f3668d0141b2975dac2172534168c3d586,2025-01-10T22:15:26.053000 -CVE-2024-47519,0,0,b4146e82e3d00fcbd8489820558abf28958b6665f8f58005b8e8f75bd5f0a636,2025-01-10T22:15:26.177000 +CVE-2024-47517,0,1,280f2eed8efb27b246263a792dea3408ddf827c6f4a75e9aff0a6f840aa5faa5,2025-01-10T22:15:25.923000 +CVE-2024-47518,0,1,24b7a7ead9c7a22d68f59ad0b13be74fb743e24feabd71e7e0d62b6c6424e77a,2025-01-10T22:15:26.053000 +CVE-2024-47519,0,1,faf20ac358552293154eb0ecfc5b24abd2d02a5ea1eb88c6e84e82c43e9a5dc2,2025-01-10T22:15:26.177000 CVE-2024-4752,0,0,710c56921216e1d7aca081e59c40f51db5ad035f8f7076b00214ce955a44b36f,2024-11-21T09:43:31.400000 -CVE-2024-47520,0,0,7b07c5b9deef8ed7dddb0613217630c57bffdfecd63c9248a653ceb26dd25a2a,2025-01-10T22:15:26.290000 +CVE-2024-47520,0,1,3f97c922602333b995d69a3aef4376a260af49538e94499690194d7fdc1eba48,2025-01-10T22:15:26.290000 CVE-2024-47522,0,0,c02f34b0206a3beffa01319045412a788f423598c15fe9aabedbdbabe223631f,2024-10-22T13:51:02.710000 CVE-2024-47523,0,0,c97d6eb97cc8d0172f2511cd438bb91b754c178ebc143b911ae3b2c8f936379d,2024-10-07T19:07:30.287000 CVE-2024-47524,0,0,e4d42d0b194ce3c0402a53054852a6593b27aa59e8071d3d2c032cd906d11934,2024-12-19T15:43:50.877000 @@ -267357,11 +267357,11 @@ CVE-2024-47561,0,0,f17764695fbbc71bb6294f0150402374289bc95733ccefa47795f57080dc8 CVE-2024-47562,0,0,22d7aac266fa2bcc932f0f43047690776f5dbeae34fea86034497bd09b4b2170,2024-10-11T20:04:35.480000 CVE-2024-47563,0,0,ceef06dc2480b41957bf3bbf91f7572558ef123ada102fed1a77a39f26abdf49,2024-10-11T20:05:05.143000 CVE-2024-47565,0,0,36b5b2774ba0114a0b6b38d7c3f6e740ed1cceb643a386f25a7f0a47c87192f0,2024-10-11T20:05:59.237000 -CVE-2024-47566,0,0,8415f1d3a43aebbe82674cdd93d5aedf8e9b361a4bd069fcba002a37d22f49b3,2025-01-14T14:15:32.400000 +CVE-2024-47566,0,1,7eeeb4992d9917fe58aad8e8033ab01706f82e716d6a5ef49983166365238110,2025-01-14T14:15:32.400000 CVE-2024-4757,0,0,8725ef836161b110d22ecb4616862fd191a65a364176246ebd41f0c649a57c8e,2024-11-21T09:43:32.290000 -CVE-2024-47571,0,0,e51c0bc2c362e6772df4a7a87d4db3ce4f783d470ff1b40b303da9d28a46f726,2025-01-14T15:15:26.630000 -CVE-2024-47572,0,0,41c956b4de4bd87db30d54dfe338b0e4d0d19860459f77d3395513b982e90662,2025-01-14T15:15:26.827000 -CVE-2024-47574,0,0,b053f693b774c7953ae85400600819c5392a7ad8eccc8a3cd4089d5ddc67765d,2024-11-13T17:01:16.850000 +CVE-2024-47571,0,1,05282e300ccd971aa4b197d4ef24ad019123057d6aa931a6004ed4fdc79b7dfa,2025-01-14T15:15:26.630000 +CVE-2024-47572,0,1,e1a75938018cd5cb54d360809debabe81214c2c41357b60c74f2f4d6fb6811ad,2025-01-14T15:15:26.827000 +CVE-2024-47574,0,1,3215dc22016876d13797884521ccff7e71af24d95b3c05e20b71a4dce13704e9,2024-11-13T17:01:16.850000 CVE-2024-47575,0,0,8a9e09b118d95daf165d3ea923803180c001f61012a5c234044b57c730876d25,2024-11-08T21:16:28.987000 CVE-2024-47576,0,0,88f7e74dc57b5fa3165bca4e8de12361a68dd9037f9a61c6c1b0e979a41fbc7f,2024-12-10T01:15:05.340000 CVE-2024-47577,0,0,870c0920adabd485118227517e097c07697b2cc258b0dc2bdc77579adf9ae6f5,2024-12-10T01:15:05.500000 @@ -267391,7 +267391,7 @@ CVE-2024-47601,0,0,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879 CVE-2024-47602,0,0,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000 CVE-2024-47603,0,0,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000 CVE-2024-47604,0,0,0bc47ae414bdd6b01a65c265f3f3055e1a0a5458b44c790858631e91134d9f75,2024-11-13T23:17:14.437000 -CVE-2024-47605,0,0,c210371a2e8b53951f52b809742805f438daaa043ab64a7ca940d240be8fdc45,2025-01-14T23:15:08.270000 +CVE-2024-47605,0,1,684fa6c52183aa6f1a10993c27a771752a1fafba5e47040258dff1255f862ec5,2025-01-14T23:15:08.270000 CVE-2024-47606,0,0,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000 CVE-2024-47607,0,0,382969a888801c46134ab6b16f4a50a4d9e68502ecd36882250f06d39efd0e1d,2024-12-18T19:53:21.123000 CVE-2024-47608,0,0,6568bd19016506539b4ea82412fdcb1ecdc2fcf519cca4e0194fbcee5a3c48e7,2024-10-07T18:51:05.650000 @@ -267590,8 +267590,8 @@ CVE-2024-4779,0,0,2e1aaf861b56995420e2ecd41fb05fbeff0136f0ff02e8684e6cad712f3005 CVE-2024-47790,0,0,0033caa01d3b380ade4380efa296858b7b158eabdc29e84feb2d5832c0b983fa,2024-10-14T11:15:11.930000 CVE-2024-47791,0,0,15000555053c296919902f42e8781945f23bfee06473820c84acf5fc428f2c99,2024-12-10T19:44:43.937000 CVE-2024-47793,0,0,882b9f21365001a1bbe1427d7ecd7686f09cb53c26df041c802a57c5badf616d,2024-10-21T21:25:36.697000 -CVE-2024-47794,0,0,00349888bce735f0346b17f602a8ec90547a4f0e70d9b1cb746c8dcb5c6e42b7,2025-01-11T13:15:22.390000 -CVE-2024-47796,0,0,1815171bd1ed76943bd2d6ceb735c2a543e3e37c4adf4e6323103fcfb2744823,2025-01-13T16:15:17.760000 +CVE-2024-47794,0,1,5f08b59a295e74bd759bb3415b51927fbe86f46c8a55f75f87047c201f0f2904,2025-01-11T13:15:22.390000 +CVE-2024-47796,0,1,cee4e94390ab9716e123155ae919c19c5eefd7bfa68c04f8406a3b33dd99a9ab,2025-01-13T16:15:17.760000 CVE-2024-47797,0,0,1db7c191d78a0c4eb63d4cdd8fe193396dc3e7794237bd9d846daea68af0e9f7,2024-11-06T15:24:53.210000 CVE-2024-47799,0,0,c3938335baae6d700a63faf82e2306985214819a9aa9e9a31818efb7cbeda4db,2024-11-12T13:55:21.227000 CVE-2024-4780,0,0,d587053157d7c17d807fe8569feada4a245f1bae752836389b387fd0d926bac1,2024-11-21T09:43:35.980000 @@ -267602,7 +267602,7 @@ CVE-2024-47805,0,0,9aae18c3e11f3b637f36e4cabe651a10fdb7c11e5af31eeff611154acf1e6 CVE-2024-47806,0,0,a9d6e69f147db55a9010517fe181b09bdf0c723cafc8fe156a8def4f62dbfd52,2024-10-04T13:50:43.727000 CVE-2024-47807,0,0,78bd319435174254d649de27630a1f69840809df78c607ab539f6fa82f612f73,2024-10-04T13:50:43.727000 CVE-2024-47808,0,0,3924b9cefe20472af8979aed441ac27dc70244fae40103f8f689b3bed484611f,2024-11-13T23:14:07.650000 -CVE-2024-47809,0,0,8a0558b7b21c57df5e63a342d2595f6fb4fd3de4f140ff4bc1c09f7e2d345d76,2025-01-11T13:15:22.583000 +CVE-2024-47809,0,1,33fe9a18a7f2037a2bd0ea17adc2d3d163dba208b6c0efad7434438cfe6d81f4,2025-01-11T13:15:22.583000 CVE-2024-4781,0,0,dca04dc1498213ba1a1a197fab3ce11b94dddd311dde0315913f82a2ac38840b,2024-08-19T13:00:23.117000 CVE-2024-47810,0,0,2dbef77a35b034493c61fa5f819a30575fd00397f7c437d175379a2c7bb4f840,2024-12-18T18:15:07.310000 CVE-2024-47812,0,0,897aae376a8f43996b3658ca9867b5f6dd4a27027999c91348ce8bcd7002ac09,2024-10-10T12:51:56.987000 @@ -267673,9 +267673,9 @@ CVE-2024-47888,0,0,f29473c64160f0d588a7ca069a65eb155d847c3556eac13a0a5e08def2ade CVE-2024-47889,0,0,fbc19ced86c6fe97c19cf36af507f82d2f6cb4f350a639ca6656c9db442c9b66,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,cb1fce1149cb253592c06cf88232fe30f43f7e24305ca3501b7b2ce5d58908d4,2024-11-21T09:43:36.877000 CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000 -CVE-2024-47894,0,0,10cb3fcf43aee84728015caa1ec7ea40b57870fe842fc76e102626be48558b17,2025-01-13T18:15:18.693000 -CVE-2024-47895,0,0,24265746246461ce822ef4f2b8b2e78f2dae4b75e456193756e8e977fda8851a,2025-01-13T18:15:18.933000 -CVE-2024-47897,0,0,4f2e88ecc7c8c00d74363df7285f2e3e9f4702003cb3d2b7f2f87967d3a42b58,2025-01-13T18:15:19.310000 +CVE-2024-47894,0,1,90877e14f180160e2f32b8f7e31918f3a5d81d9927bb9299954c6f367495fa91,2025-01-13T18:15:18.693000 +CVE-2024-47895,0,1,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1692,2025-01-13T18:15:18.933000 +CVE-2024-47897,0,1,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000 CVE-2024-4790,0,0,b9d76a36166d9f8d4bd7b87bb2c3b8f2d1cb59ae69b213b42a13db79aa975016,2024-11-21T09:43:36.990000 CVE-2024-47901,0,0,3165d7a5ba37411c22ef300e066496e43f11ee0c48270295fa8bb2b50803f6e5,2024-10-30T15:39:47.430000 CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c29b6,2024-10-30T15:48:39.207000 @@ -267810,9 +267810,9 @@ CVE-2024-48112,0,0,66b06dae67eaefbc5b4fba345a4c29b161777f09831586e1142c2f5b06f80 CVE-2024-48119,0,0,baa21abf94b191e4316bf16893ebdf390866a932a6251e9efb907f2e6f573b4f,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,8ef04e2594d9b88fdf0c6c095b09aa229bb7a9aa44c0aa25b1242cac8134f5e7,2024-11-21T09:43:40.183000 CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12eccefd,2024-10-29T20:57:53.360000 -CVE-2024-48121,0,0,3214bee7da8e3f509f7412f3e279397011d850b12d106151290f87bcfd743976,2025-01-15T21:15:13.063000 -CVE-2024-48122,0,0,ef4dbe73ddcbe3747d75bc0f305c7993ceeca917a7b17b9ddb38c3b776858056,2025-01-15T21:15:13.200000 -CVE-2024-48123,0,0,1ce64456a782985d4c9c698673e093b6139525cfb44a23952e0fe7744f609606,2025-01-15T21:15:13.340000 +CVE-2024-48121,0,1,641fcc0e8cb4d468b6535b468716064cfad82742b473f525c904b635efe547aa,2025-01-15T21:15:13.063000 +CVE-2024-48122,0,1,b4daa9294eed7eead9c86f07eccb2a535062bcb984eef4ed8ca8941bff6a48c4,2025-01-15T21:15:13.200000 +CVE-2024-48123,0,1,2b5386cba7f0f60e3dc202d5b24fb7836cb888bc1e31f6752ab8792ed6744829,2025-01-15T21:15:13.340000 CVE-2024-48125,0,0,52b4c432cd9d44248f4716ba7255cd00638eb9bcc133a6e2c0153681beb1d818,2025-01-17T18:15:25.547000 CVE-2024-48126,0,0,39da822ea5af8f88748dbe07438d4c6a18c6f0004db8538062615ee5258f4755,2025-01-17T18:15:25.800000 CVE-2024-4813,0,0,53589647721842c051dd9f712ddb32f92956eced2bba5aa7c708a955b3cd0fb3,2024-11-21T09:43:40.333000 @@ -267951,7 +267951,7 @@ CVE-2024-48456,0,0,5157f8dd26a6f4dec318ad8d7c80b2cd217ac77f0e9ed233c772d4f65ef0a CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a537,2025-01-07T16:15:35.057000 CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000 -CVE-2024-48460,0,0,39489ed62547043e3b2e6177875d0c25884159e069106997e1a3156d717796b4,2025-01-16T22:15:39.973000 +CVE-2024-48460,0,1,9c6a11915e1a14d980c8032256794eb66753933cf88fb0466f6211d8fc8f07e2,2025-01-16T22:15:39.973000 CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000 CVE-2024-48463,0,0,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000 CVE-2024-48465,0,0,86905cef5ebcd2b050652d2c9d8dc0390e1a20f41c011a54752e2071221c8455,2024-10-30T18:35:15.410000 @@ -268053,7 +268053,7 @@ CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95 CVE-2024-4875,0,0,394ece81c68b71b805a6c0937e31042655f5a949977d1cd6a3dfa5931193132c,2024-11-21T09:43:46.460000 CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000 CVE-2024-4876,0,0,de85c8e9613d0e9fc6eb1dd2f397e83f5dd1df822710f78acb283d1410594b49,2024-11-21T09:43:46.573000 -CVE-2024-48760,0,0,862a97cdd1a2d3d032a7dbb8339d643a6b969ee7be978c9012fd43d124292353,2025-01-15T00:15:32.720000 +CVE-2024-48760,0,1,addf8733472ad110e08b92560421dba590ecbf45b02f22e7e6bf3e2f717c6b54,2025-01-15T00:15:32.720000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 CVE-2024-48770,0,0,3e66352e1521b9d6543412a56ab61f680bed31dc0a12a74770aeefc4f0bcda78,2024-10-15T17:35:07.440000 @@ -268110,11 +268110,11 @@ CVE-2024-48845,0,0,a643a94c17f0ebbcf0348838f1295e9b966d7133e50b049e18aff662aa7b2 CVE-2024-48846,0,0,3eb9b8c7e039554dd47229eda32f3ce85bcda234f40ccba7f3d2ff57fbe2020c,2024-12-05T13:15:06.983000 CVE-2024-48847,0,0,62e26f5687a05f9e27c0fa72204c801e43faf170b6739803103d65a24350941a,2024-12-05T13:15:07.150000 CVE-2024-4885,0,0,989acdf0b4e4908577625235aafc422054317b5059d96787b76f3aa8e71927e8,2024-11-21T09:43:47.450000 -CVE-2024-48854,0,0,2ef721a215ee4da68a88fd5d4d6b994a8c53628220e731447f870738f25448c0,2025-01-14T19:15:31.267000 -CVE-2024-48855,0,0,eb43cc8549eb4781f914965d3f4b0ae5eaed5e82ab1cc1a7bddabde30a872a0a,2025-01-14T19:15:31.413000 -CVE-2024-48856,0,0,ac6a25c8cc5c37485d7d55d58f9af2ba7f90cb2d81c02297b600f78655a9b197,2025-01-14T19:15:31.543000 -CVE-2024-48857,0,0,5770e01edd9d2e230e9b60e7b4db70604835236a0e6bc841803f3d130772a326,2025-01-14T19:15:31.680000 -CVE-2024-48858,0,0,1fbed1cdc309e377c1d231cb1caf6bc34befda77ae9156d84a6814178d1ce011,2025-01-14T20:15:28.373000 +CVE-2024-48854,0,1,214621435b531b052209cfa6df02c8db378f76164f1e8ea9569d7325e7e24e9a,2025-01-14T19:15:31.267000 +CVE-2024-48855,0,1,9f8deee734c3c6fef6af1f906770d3fa2a0ac733177733406cafa7d01d226262,2025-01-14T19:15:31.413000 +CVE-2024-48856,0,1,9f652330c9f18b8dd538526468d615caec1a358df61d4c2124f82e0de433a92a,2025-01-14T19:15:31.543000 +CVE-2024-48857,0,1,27faf98bdfb3ef4688b0c0cee65ea593452e3efd9536abe49b5ce69fb81303aa,2025-01-14T19:15:31.680000 +CVE-2024-48858,0,1,e3ac978ab9666b0be7c3804be06d1ac89ef20ea5c03c187f730857c345a661a1,2025-01-14T20:15:28.373000 CVE-2024-48859,0,0,ba719e678a910afa616ff7f1eea8af58ea1ab5dbb5cb75fa6f1f8879ec70add5,2024-12-06T17:15:08.350000 CVE-2024-4886,0,0,634729ff8fe359265716858de65a284196532efd0dbb21da126bc9a1da5cc664,2024-11-21T09:43:47.583000 CVE-2024-48860,0,0,9c6c9ab7e8f62ef069ffe0e44d3e44942ca72b8d6c73404d11ff69a5ac4e982b,2024-11-22T16:15:28.337000 @@ -268129,21 +268129,21 @@ CVE-2024-4887,0,0,a0d0f9a8fb046d1d64dccc572def5193a849cd711291225c860f9ae76aeae9 CVE-2024-48870,0,0,18a307d8f6128cb29a6984af9c786b2a3f86ad0eb48edcca47ed5bd77f7947c8,2024-11-05T19:34:38.287000 CVE-2024-48871,0,0,5d5a01d36a9cf590d21015dc1fb8d88b484f6420693898fd35b4436407272623,2024-12-06T18:15:25.267000 CVE-2024-48872,0,0,9ea5d88bb50af02969b7b4651959f337e12bb8e36a3a9117d9c1214c7bd8e05c,2024-12-16T08:15:04.950000 -CVE-2024-48873,0,0,711e1aefde960448ac451f493eb79f40f7b17f68beeb2e35b15d3cbb0f347eca,2025-01-11T13:15:22.750000 +CVE-2024-48873,0,1,b0b2ee673e2708abf7b330cdf04d419d8f7f0fd80b7deadecd181738bfb97c16,2025-01-11T13:15:22.750000 CVE-2024-48874,0,0,d4dab0701d320c08fdb5c4d13166c7fa76f47b4f8118adcdce9e1ede30e7393e,2024-12-10T19:44:16.093000 -CVE-2024-48875,0,0,529b4233fbe080d3015386f334cf03ec25771cdf417a53f7668f41f574dca9b1,2025-01-11T13:15:22.933000 -CVE-2024-48876,0,0,e956412c9e67ebab3643a6f85503effdcaec15b67887a62803f066802d153792,2025-01-11T13:15:23.263000 +CVE-2024-48875,0,1,7f1f8981cd6270df07a780e840c26cad1b0b91482d166c476525c21afb836bac,2025-01-11T13:15:22.933000 +CVE-2024-48876,0,1,b3dc83bcc3b30f54be4c214a67c78cf07745e4e50a2efa873d5012bad81ae667,2025-01-11T13:15:23.263000 CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000 CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000 -CVE-2024-48881,0,0,ebc6f1728ddca45a5c4c77e921d1ab1f076b9c09394d13101391d66674a8d76b,2025-01-11T13:15:23.437000 -CVE-2024-48883,0,0,40a7c06416987571c8a8b08bd952b0491dd531f3479f503fba90cb6ed5c81613,2025-01-13T20:15:28.770000 +CVE-2024-48881,0,1,9f5d514ac47729e731291b03eff478501f44a3dd45142fd28510db91af3ffc1b,2025-01-11T13:15:23.437000 +CVE-2024-48883,0,1,3da0b66ba525dc6217acb6b296270b21a74566abc1ad9b7b8cce3e028e258705,2025-01-13T20:15:28.770000 CVE-2024-48884,0,0,3359ff773d09dec3cb555730b4a6f1a64741d3b148a8a871f573eed309fcf941,2025-01-16T17:15:12.310000 -CVE-2024-48885,0,0,bd322d0919f1f5bfc17b7462306e27a9d23817b549080ee56f875128913f049f,2025-01-16T09:15:06.737000 -CVE-2024-48886,0,0,e66f6047d306aaedc1af3f50921854a8ed3741d3b76c9be2c96afcce2b1dd88b,2025-01-14T14:15:33.027000 +CVE-2024-48885,0,1,da7f0208f0c95fd2f24f647844a7354b8155e6f4c2c3df76ced6f9f588a64496,2025-01-16T09:15:06.737000 +CVE-2024-48886,0,1,f1a654d0b24acae0f655db620517eac5f88a03e1413c63f93bf4f53b28192e5a,2025-01-14T14:15:33.027000 CVE-2024-48889,0,0,8e1bac12eb50f3243e5ec10f0474e909f75dc6516eb6b1b6cee870377808ea68,2024-12-18T15:15:11.713000 CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000 -CVE-2024-48890,0,0,4469bd7019e5860ff35434033c96f58dc6df56ea5261eeffe1e90439382296b3,2025-01-14T14:15:33.187000 -CVE-2024-48893,0,0,57bd45a691616c93ba674432be2e4034ddd715b1a09af0f667c42fcf3300c76c,2025-01-14T14:15:33.333000 +CVE-2024-48890,0,1,1ab9aa34e2dee7c83ce102bb687e8be474b284b9f530d42d9e01ca00b624c9bd,2025-01-14T14:15:33.187000 +CVE-2024-48893,0,1,f685b37228cb812a8fb671bf4237846143f7461727ddcdead4141757fa4bd791,2025-01-14T14:15:33.333000 CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000 CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000 CVE-2024-48897,0,0,f3182141722d6be3bdc9aba61fbb38fd1908803d90d823ef2ab33a0e64cdc49a,2024-11-20T14:48:25.373000 @@ -268331,7 +268331,7 @@ CVE-2024-49101,0,0,74e1dcef6bef75df1a641c4add4a1719a1d01a79ebf48d468b2863e9dd0b0 CVE-2024-49102,0,0,943e35320459300753b6cc64966217aa9afc7d12aaa3a82cef65bac537f6eb6c,2025-01-08T12:33:35.393000 CVE-2024-49103,0,0,0b5779a87559af55ac0814a3a779d32a87a7422c558283ff0aca126b8ab5c5fa,2025-01-08T12:33:53.027000 CVE-2024-49104,0,0,b18805ac24c67660e06918d84c0a867906b41351b098f073ee0ac718697b0c85,2025-01-08T12:34:20.100000 -CVE-2024-49105,0,0,cc42cd7b6bc81cbeab1538e0ab3ee7e239af3b65a04b426a18533a2fd90be7e3,2025-01-08T12:35:17.657000 +CVE-2024-49105,0,1,390780934857365311ed8bce7ac6492b692bcc04e37407a878fc3f20efd4257f,2025-01-08T12:35:17.657000 CVE-2024-49106,0,0,5d7e387842adf9129a1b95bfb72c82a92201d70df912ec21139139b33c31ac40,2025-01-08T12:35:30.717000 CVE-2024-49107,0,0,a93c505ea96dc92318ebccf4d93e9eb1813c40d5062fd5b573995db94df323d8,2025-01-08T12:35:49.377000 CVE-2024-49108,0,0,efdb1f6bf1983dcec14945d433d8ce24cad1101509f8def69fc864fec7edcf65,2025-01-08T12:36:07.647000 @@ -268532,7 +268532,7 @@ CVE-2024-49368,0,0,772416102a2ec685bb66e231fe37dbb00aaa7964a774802072e82de224475 CVE-2024-49369,0,0,6258381369a95e122d8b4a8265dd8c9c82340e2a2cd4214543fa7ad31240c0b7,2024-11-13T17:01:58.603000 CVE-2024-49370,0,0,28c85860a398a8fd36a32b63f1b5ae8e656dc29d7b1deb02b7ba40b41e39cf1d,2024-11-06T22:31:30.160000 CVE-2024-49373,0,0,58bd472ef3b11ac378ffcf19869120f73b7eacc01228a257ec82cd2e1dc17e38,2024-10-30T21:16:59.213000 -CVE-2024-49375,0,0,8a423ef556b9fb5ae84194ad26a3a4a950f665e4c6246be3cb116b0bd5946f70,2025-01-14T19:15:31.813000 +CVE-2024-49375,0,1,75b6fa512e545030a1d9c796eb8e00abda6bb21cb503b1df53b62a2978ef356b,2025-01-14T19:15:31.813000 CVE-2024-49376,0,0,9641505bfe1891b9fa319aee5e820e5aea0ddba4eb94eafec66369ac3322668f,2024-11-14T22:49:50.667000 CVE-2024-49377,0,0,25dd022c5ddd384b788ac4f08857804dbca09312efb00b6da5ce96ab5045b24d,2024-12-18T16:31:26.757000 CVE-2024-49378,0,0,98d825a66aae22af1d83c0197886845e9ecdfd29786ee869ccbb1a9dad42c70c,2024-10-28T13:58:09.230000 @@ -268647,11 +268647,11 @@ CVE-2024-49557,0,0,6601a96c4bc210f01d32593bfa488dfcd4eaf5855ed8b64d0dab8c422cb09 CVE-2024-49558,0,0,d6190c4fa083ad35fb776a8089e14895ccaced89c942fbc8e925117ea666e076,2024-11-15T17:35:54.480000 CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000 CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab24a4,2024-11-15T17:35:25.407000 -CVE-2024-49568,0,0,6cd769aeef33534f830381540ccb636754fe194484a9a97ab667dacac6ab4059,2025-01-11T13:15:23.637000 -CVE-2024-49569,0,0,a73477b42ad4d6e56f1fabdec44c2c84a430fc659968da971cc617074d0702a8,2025-01-11T13:15:23.840000 +CVE-2024-49568,0,1,2424937b6c632a3bb8bbe23f1d59070173b0b27451c699774823ff5adcd561d7,2025-01-11T13:15:23.637000 +CVE-2024-49569,0,1,b1379fd025e32fab88c21975ab9b6f766098726076e1ee1ddc484d172b3d093a,2025-01-11T13:15:23.840000 CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000 -CVE-2024-49571,0,0,a5ba64c9f611935e55dba2e2fe218c99a27a9f25b92ccc25a48e782e6aa13b83,2025-01-11T13:15:24.027000 -CVE-2024-49573,0,0,9ff47dd83005fc3216bfeb97407e2b86def924b25ed8b57ddfe1e521adce785e,2025-01-11T13:15:24.223000 +CVE-2024-49571,0,1,48d41a1ed34da6a8d207508416dbadcc69c521f2274992ee3d4ce336a0c1087e,2025-01-11T13:15:24.027000 +CVE-2024-49573,0,1,bd822bfcb04a1a23a0356060b4b02e8952dd69548a8ed6c8619ad13c8392c259,2025-01-11T13:15:24.223000 CVE-2024-49574,0,0,285edf65c7736387bb1f5e69a3d9da68a65cb104e57ac1234838e33c6baad7dd,2024-11-20T16:32:37.770000 CVE-2024-49576,0,0,a0e80c457192d468c296ffda93b2ec5817da69e683704223c66d9a1d2b684a3f,2024-12-18T18:15:07.417000 CVE-2024-49579,0,0,9abb18443d506ce310fd7f4e6167b121033f3a0e20d401bce4799bb038c96994,2024-11-14T19:24:45.603000 @@ -268811,7 +268811,7 @@ CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 CVE-2024-4978,0,0,201c9e11d7966e2ff18e4c4242d116c7a008068b070b2496c2220d3d01e21eba,2024-11-21T09:43:59.780000 -CVE-2024-49785,0,0,b20e0551fda42e1e5e7dea2f4591aeb4fedcb85283371b5abc392097d1265651,2025-01-12T02:15:18.973000 +CVE-2024-49785,0,1,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 CVE-2024-49803,0,0,3d17c64dfa44a309f0956e2f80441fab8adbfd788223cf7d4d00fdb1c300ae97,2024-11-29T17:15:08.180000 CVE-2024-49804,0,0,9f69c0555ffa5cee4c9737c951497d9f13a0a16cf2a7c81ab8b24b57fe9013d8,2024-11-29T17:15:08.330000 @@ -268823,7 +268823,7 @@ CVE-2024-49818,0,0,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5 CVE-2024-49819,0,0,18989ee02215782dbaa36dd11585d529ff7cb27112e595064942a9ff9397ee70,2025-01-10T17:52:26.793000 CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452731,2025-01-10T17:42:53.707000 CVE-2024-49824,0,0,c7a01bbfff7b460030cf368b6be98fb9d78e5ac0581c186863d6110e26263cb2,2025-01-18T16:15:39.183000 -CVE-2024-4983,0,0,eefedacb8523e31a6a187e2c5f1e853f41a668185e6ca18f1a2fa72cc91a9950,2024-11-21T09:44:00.070000 +CVE-2024-4983,0,1,87246ad10dd6e18c3cf6b93466a56ea2aad9e91adc9ba860f6bb4af64f316016,2024-11-21T09:44:00.070000 CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000 CVE-2024-49849,0,0,1a31752650e852a5b0633815bea11e2d50d7437494649b720c371e6c4b6f27d1,2024-12-10T14:30:44.780000 CVE-2024-4985,0,0,24ca642ab1af582069f35187f63584eb56ac0072c100febf0fdf2dec3b3c9587,2024-11-21T09:44:00.330000 @@ -269043,7 +269043,7 @@ CVE-2024-50048,0,0,734ee607259cb5de03c0e5e88ee5124013128422086f99044b8deb2b4900e CVE-2024-50049,0,0,4fb7eccc061b9b39e10ac3d579d4120a6cd306ebb79ccd76e3060d58e8f56f0d,2024-10-23T21:45:43.657000 CVE-2024-5005,0,0,edffdae445ed03271277a1d7da4f3ef9e99a78c0f49c5b3d66f4f5e15bfe563a,2024-12-12T19:55:10.777000 CVE-2024-50050,0,0,c772e99e0a240315b1aee2595b338c31c22eacc00e5698e6c99fc85138563b84,2024-10-24T19:35:08.107000 -CVE-2024-50051,0,0,24f88de74c7ddb8f3910b3a7fbc210ed0c9f2ac5c709c76bda47a757934fa549,2025-01-11T13:15:24.427000 +CVE-2024-50051,0,1,bfa885d0d1cb74bbc577b0e16fa35ade8074fc3b214f75c03e2b9dd405dd4561,2025-01-11T13:15:24.427000 CVE-2024-50052,0,0,8e1166b11b73a0cbc906f464db8f67520364e38f19292f66596c205740cd9ead,2024-10-29T14:34:04.427000 CVE-2024-50054,0,0,9bfacafee7f112f8a3ee836f0ef82f61f8cbc6f904998593af4cbbd6eb17eab9,2024-11-22T23:15:05.510000 CVE-2024-50055,0,0,e65a6f579f8baea0a13da4d9d71d9507bacf2344b02707cb8898d92a373544ea,2024-12-14T21:15:33.437000 @@ -269348,7 +269348,7 @@ CVE-2024-50333,0,0,2215b3721c9d11db558b39b1f74e4135c527ec52585c9b11c8251b7d114d6 CVE-2024-50334,0,0,47c3c410514a1bc4c4a7814115d398c1a55088aa9abff8399bf52586113ad231,2024-11-08T19:51:58.433000 CVE-2024-50335,0,0,148ecce6442c45f7244fc0a5587d3e3191c46717cebf978458a1aac602d81397,2024-11-08T15:09:07.440000 CVE-2024-50336,0,0,a5193abafd166cfb889100203ecf427fcaaa84768e0716a0a63351a39095d6d7,2024-11-13T17:01:58.603000 -CVE-2024-50338,0,0,4f28b9be4ee53fa2779124748e102a142f974f04b6929d4ea3255e88c1a40dfd,2025-01-14T19:15:31.967000 +CVE-2024-50338,0,1,4f8fbac812dbe3e29a8337af42330be9a860a6ea91898569fa8f0ce27d2603e4,2025-01-14T19:15:31.967000 CVE-2024-50339,0,0,829c0382f9edc232e9507aaeaeaf53b4bed469c5664e207ada92079c4d1e5c6a,2025-01-10T18:48:11.093000 CVE-2024-5034,0,0,d223ae16593e2ecdb2242c0e6f0a8631184cfb6f48c2e0d137df7245167f186a,2024-11-21T09:46:49.320000 CVE-2024-50340,0,0,c04a10c0fd471eafad0846a62f3f7bc515d754e783b072015dcfb8d1d5493bea,2024-11-08T19:01:25.633000 @@ -269360,7 +269360,7 @@ CVE-2024-50345,0,0,231418cc83ef220b3d9b97f1a004a29319681824effb854803c987d31d1d6 CVE-2024-50346,0,0,ab2362723a364a29785f1d40e331dddf40b3d03db60e216b36dc43114b66e67f,2024-11-05T16:04:26.053000 CVE-2024-50347,0,0,52aa067043c7a335121c6c5069b24c3959fee5c2772f96a4ccd7c983e1eaa8b8,2024-11-01T12:57:03.417000 CVE-2024-50348,0,0,97dfe806e693a1b885ad27ca831cd11aad24fadbd22f0a9b36b9860eb21cc102,2024-11-06T14:49:46.073000 -CVE-2024-50349,0,0,5d45da811a3d927360ea55eb453cb104fdc3a4656543acde44d023eada44aabf,2025-01-14T19:15:32.157000 +CVE-2024-50349,0,1,f40ab09ca5d59162338dbee2f96becfb6d9b3275041a9bcc426806d0f217d9fd,2025-01-14T19:15:32.157000 CVE-2024-5035,0,0,2a40ea542a47d7f685442aae63876df68355cfa56a032e9be542396d8c0deb36,2024-11-21T09:46:49.497000 CVE-2024-50350,0,0,4e6626a7c59aadde2ff73aa3f673848fa8a7ce45b60d83c2534413a2cf8998df,2024-11-20T14:39:51.533000 CVE-2024-50351,0,0,d2a8e2787cb6befe373fb2458c543d016be8f41b8aacb6e2215febc3dd8ea2ad,2024-11-21T23:37:56.520000 @@ -269399,7 +269399,7 @@ CVE-2024-50380,0,0,f10ef598ecccc7ed544ab2722f10c84c2a5e78255563c7513653ff94676d3 CVE-2024-50381,0,0,2c2c5a4847c05b7db6d3d96ff87c82f854de4222974bc5963df25dc7516f2d78,2024-12-02T17:15:12.160000 CVE-2024-50382,0,0,2cfa180fa7d224151e21be0a844cd37583f94a12b921c730fa9877110a6887ec,2024-10-25T12:56:36.827000 CVE-2024-50383,0,0,4de5dd807ee67133ee2b2115c18d50902580ad7a7cde07b8a41a7c3d45d6f1f1,2024-10-25T12:56:36.827000 -CVE-2024-50386,0,0,38636aae367e78e7fa8aab3bb46fa91d4f5703abadf6955566d517ab11b6004b,2024-11-21T09:44:35.633000 +CVE-2024-50386,0,1,be879441299007c5b50ff1057ac9a51703cc0ce44e148b50e3e8fd1d70806b22,2024-11-21T09:44:35.633000 CVE-2024-50387,0,0,aedd2053b7f7fa12e24e13197ed09bbedfb5233fe8268136ff59d77fa421e377,2024-12-06T17:15:09.247000 CVE-2024-50388,0,0,337e81c7157c16f83e12ff6991b94f8a4b655483d008aa3fb31bd420cbd97c21,2024-12-06T17:15:09.373000 CVE-2024-50389,0,0,da62e60ec5fcda3c4463f34b9a2b9d946cba69e942601bc369f7fb17f49886e7,2024-12-06T17:15:09.510000 @@ -269465,7 +269465,7 @@ CVE-2024-50449,0,0,a326465cb01e1e7b8848f74b154c9f8396a893705017326aaa28915611951 CVE-2024-5045,0,0,bd84e1b4cb68c5f16229e522b82965a2a3bc593cc0136370e64e5ecea74da8ee,2024-11-21T09:46:50.953000 CVE-2024-50450,0,0,347ec8bc31e40019006517b58dffc734ba4a3bc85c98dec49411a7c49c9e8fe4,2024-10-29T16:05:40.250000 CVE-2024-50451,0,0,32f02546caae281a9f31a76c5b7c54690c8c2781db2b8b136cb02a5572b39e02,2024-11-13T19:44:17.430000 -CVE-2024-50453,0,0,0417835e93f1f33ff76ad05a75d53fb7d961a3a0b931f59efc0de10cd061b96d,2024-10-29T14:34:50.257000 +CVE-2024-50453,0,1,a47ecd0a0c4c7445b841adcfc3224b6fca1bdb50b84d60aa9e384e519533f775,2024-10-29T14:34:50.257000 CVE-2024-50454,0,0,6ee9d34962df930309e61436d538d619b08eeca9060889d9f6e45b118a06d818,2024-11-01T12:57:35.843000 CVE-2024-50455,0,0,e03e2c552a99e7c6bb62688d5bf42baec86ad2304c59f21946bed5c0f08526f4,2024-11-07T17:01:30.937000 CVE-2024-50456,0,0,ed2b515b1f33cb2da2e4ab27de8df631f04c7735dc3d5ebd017e6b920fac7057,2024-11-07T17:02:03.653000 @@ -269579,9 +269579,9 @@ CVE-2024-50559,0,0,dfa1c4cb23ceb2f70b4684ba6fc94ad535123e84e14b38239e2546f378ae5 CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de1531,2024-11-21T09:46:52.267000 CVE-2024-50560,0,0,849cbb22dc43c9735ca18b0189950c1e8b5ecac4d47888f5bcbc5715b936ca6b,2024-11-13T19:57:26.073000 CVE-2024-50561,0,0,6a51b1f26d5cf18987d57ec188dc14932c4d4312c95a1bfb0fba3e588b50e618,2024-11-13T19:57:56.313000 -CVE-2024-50563,0,0,fcae2c66eb13e091d7d4c8cb37a6355d98b8a6034274402cb0152d28886d91da,2025-01-16T10:15:09.480000 -CVE-2024-50564,0,0,e7d7ba23b6b0bd993389dc5aa1693345829839ebf13dced1f3e6b06c0e9b8cb4,2025-01-14T14:15:33.490000 -CVE-2024-50566,0,0,3bfb5a17edce1a8fb08ca6a9da44a890273e947e3c31fd7cc912e28d4fea9f0f,2025-01-14T14:15:33.650000 +CVE-2024-50563,0,1,3cb3058b3811bf7ede7a877a75dc542e9a8e220f47a4f871ab56ae9b4b417ff5,2025-01-16T10:15:09.480000 +CVE-2024-50564,0,1,4a2a7b51380febe6370791b50e7a15a1842efcd306622119d6977fa863ed9b3d,2025-01-14T14:15:33.490000 +CVE-2024-50566,0,1,bfd3951dba82f12232fef18f6a6bbbebb83fdb8ed0afe1245f9953979e379434,2025-01-14T14:15:33.650000 CVE-2024-5057,0,0,4e84b19a66dd237677e71f8f6b2954676ecae2fca742ad51c75df8e74bfe774e,2024-09-20T19:31:39.437000 CVE-2024-50570,0,0,2d9dc66724750d347def0458b21203e33f8d848938408b5276fa284db7ba2a64,2024-12-18T15:15:12.660000 CVE-2024-50572,0,0,87b1aa24f79c401027b600910fcd433cb81a62e025ef81c863f015edbd3acb6f,2024-11-13T19:59:16.777000 @@ -269610,7 +269610,7 @@ CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4 CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 -CVE-2024-50603,0,0,c040a2a4c7325b01fabcba54050ded66fe917fce755fc35bf5da8d49ea65f756,2025-01-17T02:00:02.040000 +CVE-2024-50603,0,1,cf57abf7a9d1676ee98b021794191aab84ca363b486463f18970b8ae4933dc6f,2025-01-17T02:00:02.040000 CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000 CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000 @@ -269678,7 +269678,7 @@ CVE-2024-50801,0,0,0f7ef78ac6e5029b9e68f3bc3399077c7ee6d99e77b039e1291ceac3b70cf CVE-2024-50802,0,0,6cca50e9c91b3d1d741efe1d890c96d518812e1b94ca55d7d9db2b13b507a6dd,2024-11-04T19:35:14.907000 CVE-2024-50803,0,0,9aa557fe66c0fa649c326f5a23339815733fb0e4c207617891e9147c81b2f767,2024-11-21T09:44:55.397000 CVE-2024-50804,0,0,21eef12522632cc6200c04fd0be5f19a3047fb28d5a76fe0dd4b691ab9b0874a,2024-11-19T21:57:32.967000 -CVE-2024-50807,0,0,5133d7e430ffebc3a2982f5b1f4084d717254a4c275bb9eaa7154fb126c1d362,2025-01-13T21:15:12.773000 +CVE-2024-50807,0,1,20d00b93324cfc0c030c03fa142f06f1b94c011da8e306bdc79dc4e574060896,2025-01-13T21:15:12.773000 CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000 CVE-2024-50809,0,0,914ce698b44822ab37f48cd0281a75805aae4ad7652024103c7e3c2ee2c0d112,2024-11-18T14:35:04.110000 CVE-2024-5081,0,0,15c0bdf8294535879e508dfd26c86c4970d69b5008ecb1d47e8260494db448ad,2024-08-05T15:35:16.180000 @@ -269714,11 +269714,11 @@ CVE-2024-5085,0,0,2c4b4085a8e4bdb77987847a0b046b43685474bf82f1bc30dd3b70feca1941 CVE-2024-50852,0,0,a554aacf991646da5b2721516004d1f4d3015c73785e9e42d26b1a8b27fd0d85,2024-11-21T17:15:21.473000 CVE-2024-50853,0,0,a2c16db2d9a48c6744a7c1a41fb13ec1d9457efe837db0d74474da40cef9ea9d,2024-11-21T17:15:21.783000 CVE-2024-50854,0,0,ef773b735c2a347d27ee6e8fc360f731f61bfb69f79492695040fe16f5b3d113,2024-11-14T14:43:25.770000 -CVE-2024-50857,0,0,0911de7b594086a09c0ba9e92d1369f1fd2f6d03681c75ac7ebe8d3f9d3fc6c8,2025-01-15T20:15:28.023000 -CVE-2024-50858,0,0,a45701b9b7375b6bf75c6c4453bcfdb9b731f413529cc2440928205311c968e2,2025-01-15T17:15:16.100000 -CVE-2024-50859,0,0,52108c1f888dbe270b543a86024d52785db90837da3a5168ac1ec034a576eaed,2025-01-15T20:15:28.193000 +CVE-2024-50857,0,1,53627bb5de949d80e2b47c21e3006f0c81c95660bfedd14b7a79d7b9d9db109a,2025-01-15T20:15:28.023000 +CVE-2024-50858,0,1,8341977f994abccd8c38658e3b06a5b441ec6a76e63e75e17a4fe56b3ad395d1,2025-01-15T17:15:16.100000 +CVE-2024-50859,0,1,75da573e20014a6b551d90c7c2fa3e61ba7a75fa523715dcb057e9b0bb0b512d,2025-01-15T20:15:28.193000 CVE-2024-5086,0,0,6f4adcedc32131edaa2421b93d6f66300703be46e5cbd2689d364be6c71d3e7a,2024-11-21T09:46:56.290000 -CVE-2024-50861,0,0,b2a762d829416507d5f1897d7dd81f35b1933c282e8cdf7868d849bc14b5ce1b,2025-01-15T17:15:16.257000 +CVE-2024-50861,0,1,daab97f5069a3bfda43517026828d2c16c97699dbe9561ee4716d07ce3db0cff,2025-01-15T17:15:16.257000 CVE-2024-5087,0,0,31abeedd94931ed5c0834d8eca1075c48705227fc52b3830e1422827a9f66ace,2024-11-21T09:46:56.403000 CVE-2024-5088,0,0,cb760213addc1b272fedcd03b93efb771012fe463aac9fb68544dce6e855ac4a,2025-01-07T18:03:40.723000 CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000 @@ -269741,14 +269741,14 @@ CVE-2024-50945,0,0,14ef0d93349a623489e0d6530b83780997045d4cd58c9c3fe88c9be10df02 CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721971,2024-12-05T20:15:22.180000 CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000 CVE-2024-5095,0,0,435f4b1943c8e810fb8465989f6b408e8982e554cc5e9afb3bd58dc0f211a716,2024-11-21T09:46:57.340000 -CVE-2024-50953,0,0,aaae13e550df547900d535976c765e7cfcbd4c5ca420ae827af2927bdbd375a0,2025-01-16T16:15:31.227000 +CVE-2024-50953,0,1,de9fdda6f9d3d0e4a86470672eeaac6c0ad7e07d2fc55c7edaa6aa82b7e02e65,2025-01-16T16:15:31.227000 CVE-2024-50954,0,0,18bee49920c53fb8283b1524ffbd022141797de9d8bf6bf69cc613e4bb16be47,2025-01-17T18:15:26.310000 CVE-2024-50955,0,0,b7968787a5cfb7ac17e9f82a1b15116d586dfbbc8f589b423fc4833d2d57ec69,2024-11-21T22:15:09.370000 CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000 CVE-2024-5096,0,0,daa79798869c51db70b1632345a0375a73fb203efe69c41a72ad3f88eb45ffa1,2024-11-21T09:46:57.483000 CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000 CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000 -CVE-2024-50967,0,0,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000 +CVE-2024-50967,0,1,a9552707aa02fba956742b8f41ce9f8913f8383bac6966c3580525fb6720779b,2025-01-17T15:15:12.313000 CVE-2024-50968,0,0,78b03157ec5aa0254f7c1725ce9821a722c029c0393b3cb5157be12ac87dda1f,2024-11-20T17:35:28.470000 CVE-2024-50969,0,0,942a1110d4bba45b7082f409f1f8ba045dde6ceb8185c473e2c03a45d00fb696,2024-11-21T09:45:02.800000 CVE-2024-5097,0,0,38195c0534e73d2ad413d1039a29854ec06ed3467b0a0463cfee2c9d3a6d6ccf,2024-11-21T09:46:57.623000 @@ -269957,9 +269957,9 @@ CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,b2ae8cc65c8989503d0b014630e6c65571d6434c6efef511344d8e3c826913fc,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000 -CVE-2024-51456,0,0,3c61638caa50a72d686c2513f141dc47a94982f4575920b49a722ee25ad1568a,2025-01-12T14:15:06.550000 +CVE-2024-51456,0,1,66b05d860daa73e2ca5150a1c93bd2ff924126d07f9447d85a1bb5c4e9cf4c2f,2025-01-12T14:15:06.550000 CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000 -CVE-2024-51462,0,0,4aa6af44dd00035e691904904248f459982eed07031553bccc0d04464c322f81,2025-01-17T03:15:07.527000 +CVE-2024-51462,0,1,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000 CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000 CVE-2024-51464,0,0,1b2031370218977af474f39ea7b9c6eb15448100f9427860fc8d10cdd981ce8b,2024-12-31T07:15:11.307000 CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000 @@ -269983,7 +269983,7 @@ CVE-2024-51488,0,0,97eb0126bfbb810a6d9f44217c3f57c54b04438c8dac98a6146065ed90554 CVE-2024-51489,0,0,fee4ce2f3b921e5364e523268cdb4b484a8c65d64be4c59f477d40e22636706c,2024-11-14T20:12:52.027000 CVE-2024-5149,0,0,afb83ca572eb753fdcb6786ae747885cb6d3501e72a1f00595e91c4c4528be83,2024-11-21T09:47:04.267000 CVE-2024-51490,0,0,afa618adfe44ac20c77d2ef3b8a8503a964784c38cf29e6f924fdca9d564accf,2024-11-14T20:13:01.587000 -CVE-2024-51491,0,0,e58a2c3973956eb08d985498598cc27e992622753cdecd08b40a2db1fc2b4bf1,2025-01-14T01:15:09.583000 +CVE-2024-51491,0,1,7a729f530e925fe8de6e70f881d69b52dbbbda0a4fc9491f6e7fa2c0d320febb,2025-01-14T01:15:09.583000 CVE-2024-51492,0,0,033f3b3764a927ebfe5932515c3e806cbe0b3ee319f77a5ff6b6235b21773605,2024-11-01T21:15:15.080000 CVE-2024-51493,0,0,eb28e87be49323e583a476d82d4acd2cdc1dda50d07ada4162428002028ecc66,2024-12-18T16:34:37.497000 CVE-2024-51494,0,0,e7db54adc858b5ec905948b1ff770c8ac2a5ba1e309a5e79cdf3f488969e4e20,2024-11-20T14:40:56.067000 @@ -270028,7 +270028,7 @@ CVE-2024-5153,0,0,5201b5401d401becd44a1317581445bf8929de090e1718378b23c7f68f95a1 CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3ffe,2024-11-07T19:56:10.187000 CVE-2024-51532,0,0,8689d5098bdcfea2709ed3698078f0dbd694194313d78288893f7517216ef2d2,2024-12-19T02:15:23 CVE-2024-5154,0,0,2b204ac4cfe5700aeb8fd234238f6495b194bb11d4ab3c09549ae293c9be6a35,2024-12-11T04:15:04.990000 -CVE-2024-51540,0,0,07cc39ec1c213fd9a3791b7e64942267571cd5c2a3e02a18ac5af7401840457f,2024-12-26T16:15:29.640000 +CVE-2024-51540,0,1,3fdd36b541d45a9bb5072fb62f38ae52492706a2ce5f0bc19b13e2e7d29d2fdb,2024-12-26T16:15:29.640000 CVE-2024-51541,0,0,142a418f59528ceed12160c8666a0df4712069c8f2391d18e7017db83feff322,2024-12-05T13:15:07.303000 CVE-2024-51542,0,0,8c33b38999354a42a1903c24f67205a8ad9fd22f1d54e4dcd4d2cd4e47336759,2024-12-05T13:15:07.453000 CVE-2024-51543,0,0,2e5257f71ed91dbe805d033e4a6755a3128eea835afba16fb7592fead3d316f3,2024-12-05T13:15:07.613000 @@ -270225,7 +270225,7 @@ CVE-2024-51722,0,0,a82de8fcd7e90f6f41d39ca36a19feb39e82af6ac9b0df93c6d217f42c922 CVE-2024-51723,0,0,405dcadcdbf00249437ac8a26372209fb3d01c194653eab79c47481a1ec06a48,2024-11-25T19:15:11.050000 CVE-2024-51727,0,0,8858c32e9c05ed142d6035368629a58d5f5511d07aca54fdd69ef146c2c5ebd8,2024-12-10T19:51:08.360000 CVE-2024-51728,0,0,3bbad1d60c33e7237d8b468e87256ba82f10b9e78f6e5515e077c2c0433acca1,2025-01-13T10:15:08.360000 -CVE-2024-51729,0,0,1141d54b399461fc0ac337bc8d07bf7bec711ba479efeb2df93c61cbc5158c69,2025-01-11T13:15:24.650000 +CVE-2024-51729,0,1,0f55e9102ab1f809882a11b078feb4a5eddc3c61bea203a3afaf0721d78465a3,2025-01-11T13:15:24.650000 CVE-2024-5173,0,0,090e48f75343bb69589a840e25ae60a8ac00187572b68cf38125a567b358b84e,2024-11-21T09:47:07.830000 CVE-2024-51734,0,0,c7b97e928c8850d54c2fdbd4124a5548ebb3a9718f17988908d6f3c7921c071a,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,48473e5db4cd5ecc77914f0341bc3fe19cd3b449987f541b0b758a8a1a3f060f,2024-11-06T18:17:17.287000 @@ -270442,7 +270442,7 @@ CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9 CVE-2024-5195,0,0,e5801157a03af57b0b477f12ddbbdfdf2400954236093425a1336efcab3d77e3,2024-11-21T09:47:10.100000 CVE-2024-5196,0,0,c1ed13355afe2ad57b4673ab6c37a350a1a3ee6e8c7dde25b17a93063a8f0698,2024-11-21T09:47:10.230000 CVE-2024-5197,0,0,c395e7ddc635786cbca10e48f5338a794f356687d6b361f56c4276f3833a35e8,2024-11-21T09:47:10.363000 -CVE-2024-5198,0,0,a547e3b4b5312a007a45bdcb38f2b3a15e50a7a26d302e9c86ef82981c8cef8a,2025-01-15T15:15:13.607000 +CVE-2024-5198,0,1,0cb0dbc1ecb18e948c4424650c67decdfcc909aef2c2c929df2436f4b9fa7302,2025-01-15T15:15:13.607000 CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000 CVE-2024-51988,0,0,a45b9470dfa3fc9b3b82cb1bacb88f01f17e4e8292b3ec9c884e93e16e6b15ff,2024-11-08T19:01:25.633000 CVE-2024-51989,0,0,a62aa77319eb44e1ae15c0a171eaaf0800894194bc1d4e92f5debdb86b23946b,2024-11-08T19:01:03.880000 @@ -270460,8 +270460,8 @@ CVE-2024-52001,0,0,78f4b3f4ac098d84e7755b87917d54c89f68966e660cd2cf99fbfaea2ecc8 CVE-2024-52002,0,0,5dd71186c04d642ab39d61b570b48d9b6609d3cf4aeef18bda9bfec319cb6014,2025-01-07T16:43:28.527000 CVE-2024-52003,0,0,c4d0137679bf24bf7e427991f4a35c6e340cb6ae5935b9bf8c2c02879996db01,2024-11-29T19:15:08.170000 CVE-2024-52004,0,0,af81d9a04f1ca0a30dd0ecd4bf4087812462bfda43adfb75471e3a85c7fac816,2024-11-12T13:56:54.483000 -CVE-2024-52005,0,0,8d115a4c9844d8b9c09a21d02a0baf0b0ecc9eafd5d5063f8de08f49ff6ed61b,2025-01-15T18:15:24.130000 -CVE-2024-52006,0,0,1793aa1a4f9d0d44762cf81f3cb20b636623c2a2779482c5ce3f12f03d7e2a36,2025-01-14T19:15:32.330000 +CVE-2024-52005,0,1,6d34f99af5e19d95adf23716596adc042a7857653d12a3e66a75efb9645f8770,2025-01-15T18:15:24.130000 +CVE-2024-52006,0,1,a071621db10b1013f3d6436e37831e8e2c94c7c6124af13dee381f6f5e90eef2,2025-01-14T19:15:32.330000 CVE-2024-52007,0,0,6f0263bf421a0f49599286dd93cf09426c13c6e425c7e139103d5ade39ba57aa,2024-11-12T13:56:54.483000 CVE-2024-52008,0,0,7281563e51f3b39d532519e8a2681001e782e7c2a3e897881477e254e32f3d96,2024-11-26T19:15:29.583000 CVE-2024-52009,0,0,c9066cf7155cd04eacfb31719dd1a8a72528bd2bf8524793c7b6ae503cedfb78,2024-11-12T13:56:54.483000 @@ -270582,15 +270582,15 @@ CVE-2024-52314,0,0,2bc5f0f4e54107738b2581026358de8cab0a15c42911fbb686ea5cbcd385d CVE-2024-52316,0,0,ebf0d6b51f9b3de5678fe00136918cce85b2bdc4db5d96ec21388d145ce9f4b8,2024-11-21T09:46:16.433000 CVE-2024-52317,0,0,ce73efcf7b1c232dccd668d6afadee9ebc191724bbb215d2a3cde41432512716,2024-11-21T09:46:16.630000 CVE-2024-52318,0,0,9990c8ea56e7da2a0fb5af64141a1eeb644a507e2c6f41d3a96bd75739255ee9,2024-11-21T09:46:16.813000 -CVE-2024-52319,0,0,44955fed4c9fb208eaef4ac5aad05bb25e55915b8e575998cf1a57680f70b51d,2025-01-11T13:15:24.843000 +CVE-2024-52319,0,1,559a60ef1f4b0e5c15ebbccd65dd87f2daaedff91c3db37c5f132858a727fd5f,2025-01-11T13:15:24.843000 CVE-2024-5232,0,0,9c659ab55a0398d626d6da1c09e82340b1fec2662d16e1eca07d5817bed41493,2024-11-21T09:47:14.200000 CVE-2024-52320,0,0,fbfaa1883239695b0007c9764a43ac2cebac69eb763863afcec1548f7df5c2dd,2024-12-06T18:15:25.737000 CVE-2024-52321,0,0,58349402fe5df3092273b7344f7d995ad64537d59a580bb31bc25ef4220d89e0,2024-12-23T01:15:07.700000 CVE-2024-52323,0,0,57617b6f1b94228bad139ee211c36bd4ec7e4706388ebf89e10500861eceb01c,2024-11-27T15:15:26.377000 CVE-2024-52324,0,0,1b82757393c4b121efeb2aca56c501ac2b568f66f0e838324b89dea8626b5590,2024-12-10T19:42:56.737000 CVE-2024-5233,0,0,f7aceb9f589abd3e3127e7bdc682ef20b7c3a1e0d748898af38a399a8a8c2229,2024-11-21T09:47:14.357000 -CVE-2024-52332,0,0,af74adb12488f71127ab8b372db4933520d8b9b1a04d45a629e928fac8569104,2025-01-11T13:15:25.070000 -CVE-2024-52333,0,0,1ffe9afc2aea0a607b789fb43fe253b28e5ac25c7d1bf7f3add2a0a67ed110ca,2025-01-13T16:15:17.990000 +CVE-2024-52332,0,1,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000 +CVE-2024-52333,0,1,e1bc57a7d739bdd387fb07cc28b3547c00461f3445b0a694a0bfc9660ebe8df6,2025-01-13T16:15:17.990000 CVE-2024-52335,0,0,e1e5dff8245ade7d0df486779ba826bca2b65cb6a4f443a05cb574ac0185e48c,2024-12-06T14:15:21.230000 CVE-2024-52336,0,0,160e4fdf3c9ddd8c08bcb01e538c5c08889e84ce5825eea53a2a7d6fc852d283,2024-12-05T14:15:21.663000 CVE-2024-52337,0,0,21e845ec6217e7bd2b3abb0cfe497622b802e6002a794e6cbead62c8d0159ddd,2025-01-16T12:15:27.917000 @@ -270621,7 +270621,7 @@ CVE-2024-52359,0,0,509efcb95ef880ccde43fccb440c416e0525cc864ec20eeb05761e61ccf2a CVE-2024-5236,0,0,2567479af261d5b21b924e08416f98f775dfb54600e5bcd680efa9c7d4ca6153,2024-11-21T09:47:14.757000 CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000 CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26140,2024-12-18T16:15:13.967000 -CVE-2024-52363,0,0,f378b587a04a1ed78a29b94eca7f10ccecce7f7c3e17ba5ada2892abe89eb1aa,2025-01-17T02:15:25.060000 +CVE-2024-52363,0,1,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000 CVE-2024-52366,0,0,5eb5d532a2a455b08ea0a92266486ecbd59be84360d732dbaa7ab966f9474b5c,2025-01-07T12:15:24.680000 CVE-2024-52367,0,0,c8bd249cf84afc9db3295deb602b0f010566468527c0212f3c545dd982041f33,2025-01-07T12:15:24.847000 CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000 @@ -270801,7 +270801,7 @@ CVE-2024-52530,0,0,78f036a07a80d7c50933eab4b5ec3e54640dd9a8e9ce77e883bfb2118e573 CVE-2024-52531,0,0,8eedc16d1aadf080c6f2b302997fd47ee6a376af2a4466e43fcf9633d24182c6,2024-11-12T19:35:15.807000 CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bcda1,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000 -CVE-2024-52534,0,0,87df2be11e701104b02f7df92fd6a0e63ed3be0f3c92aae76ec07d384b193f95,2024-12-25T16:15:21.997000 +CVE-2024-52534,0,1,02789f5e2ff101c67a65dd5c1afd089e1396a7e54ffa1ac3e51dbc061ddab8af,2024-12-25T16:15:21.997000 CVE-2024-52535,0,0,31682e87cb2e78c072375e112f4550d0101761d6fdac75fab85b7d61c00bc12d,2024-12-25T15:15:07.247000 CVE-2024-52537,0,0,79d5bab7a316a4a5e36b347dfcb08651d568dc7cb64073148e1c1e42669123b6,2024-12-11T08:15:05.747000 CVE-2024-52538,0,0,1bae7e87d532ab1b896b47e33928c8b9835fb6690e8325140679d38a93ad90cb,2024-12-16T11:15:06.523000 @@ -270850,7 +270850,7 @@ CVE-2024-52590,0,0,456a975e409b485eb1fab048e88bd3bd7a2b5e415820906fa6548cac46158 CVE-2024-52591,0,0,1908a28e763e86a52de8ec35ca4c34e076c9f6a13999dc40733ae939de8f116c,2024-12-18T20:15:23.697000 CVE-2024-52592,0,0,9044c893c6c95803c26d0913203762294668b7e7d32de7707c4944e436d81d8f,2024-12-18T20:15:23.840000 CVE-2024-52593,0,0,d77b8c708c744a44fe19015feff5ee578786048e46c35a6eca675f337b52eafa,2024-12-18T20:15:23.983000 -CVE-2024-52594,0,0,6b3ca8cc4a643bce8f282863a596695cbcc2dfd0a2ddca95081ddbb1cb6ad5ca,2025-01-16T19:15:28.480000 +CVE-2024-52594,0,1,0233a71fe11c8ed0f36d700e0c378e3f0e65c18da973dcd28b630087d781ea60,2025-01-16T19:15:28.480000 CVE-2024-52595,0,0,897ee135760f31a40fde077940d0915d9d6eacc203929b9473ecd250bb6b6ddb,2024-11-25T14:27:38.087000 CVE-2024-52596,0,0,f3a36e6746d90779d638b312d4c826a468906b9bc77aa701634ae63129f1dc58,2024-12-02T17:15:12.353000 CVE-2024-52597,0,0,66d5ffd2bc6b002b25a9fdd759f439714e790757fa7dcdfc2d3f27142c3f3287,2024-11-21T13:57:24.187000 @@ -270858,7 +270858,7 @@ CVE-2024-52598,0,0,47dc45c1ab85a5c823a1a36c4d8f9937ef6c2dfd969360f3e9511e6544eaa CVE-2024-52599,0,0,0db0a011c2a72c6bb6dd64e9b34949435e5305b006875a178839b0fbb4bb2f3f,2024-12-09T19:15:13.863000 CVE-2024-5260,0,0,94e815a87d6c591d24da63e43d3039cd8c9b83efb1be3bb3f841ed63fe37b4b7,2024-11-21T09:47:17.820000 CVE-2024-52600,0,0,a943c0271bba15206eb04ad43ca34044fe44d51a2cff4ca3141bbb7e1938b0c4,2024-11-19T21:56:45.533000 -CVE-2024-52602,0,0,18433771544a110bc4b7b8ab6d75f89d070e58e0ee5b36a2bf756b8807dfb84d,2025-01-16T20:15:32.503000 +CVE-2024-52602,0,1,dbb3f6bfc53551d2091c95c757df3cb100dad25fbc396d181000dd0d2ef91aa4,2025-01-16T20:15:32.503000 CVE-2024-5261,0,0,580aa98e51c4d4415b97bb4b6e967076a591fa4b24cde3cedd85bd2f60c23569,2024-11-21T09:47:17.947000 CVE-2024-52613,0,0,ea4f19d3def098c89d96f3bdc7b096fa414b50502db28af233d85fbd71ae6cda,2024-11-20T17:35:28.730000 CVE-2024-52614,0,0,7f2270286c9c1ae4321e62b34a3d4e298b4e533b10f50a6189cade1437a72fbd,2024-11-21T13:57:24.187000 @@ -270910,12 +270910,12 @@ CVE-2024-5278,0,0,d260100f100a907c71bfaa4a582b71a1fafafcd3b8fde91a6c9a1057921a39 CVE-2024-52780,0,0,c0ecb44d9e322cfbcac2be36824b48896e13d68f0536ab5b43d3bf4e9cf7f347,2024-11-29T18:15:10.813000 CVE-2024-52781,0,0,aaaebc4bb61a1db40ff44bb58a3e8d18e473587ebb5c3f6143eb7ee66ba0c5ec,2024-11-29T18:15:11.050000 CVE-2024-52782,0,0,0e1b02ae576ac37bfbc8f92e25501a022b17443ee220b884e370afaa0769e720,2024-11-29T18:15:11.313000 -CVE-2024-52783,0,0,5fadb3a64a27e5069f152cd44464bf30e98b0ed54259f0f82f05854fe0761a03,2025-01-15T17:15:16.607000 +CVE-2024-52783,0,1,64034abdd540d3be68340bde756d75dac66481ff9f0995bb1c4e3211241a3901,2025-01-15T17:15:16.607000 CVE-2024-52787,0,0,b46fccd6281487e8d8c3482a3336a26f545248bd88528968c6c559fc14398efe,2024-11-27T17:15:14.397000 CVE-2024-52788,0,0,0c4984cad79461973d5de4a3e05903c6c7f7a01bd7ed12fc5aeba0db1c060907,2024-11-22T17:15:10.490000 CVE-2024-52789,0,0,68191a5d73d8014f438d5df1ccf489e1805479b35c445ebc54b246cf3a38dd5a,2024-11-22T17:15:10.660000 CVE-2024-5279,0,0,530d0192da77dcbc8feb4408edacbba7e53338a22689bc73d3f61e58249150ff,2024-11-21T09:47:20.467000 -CVE-2024-52791,0,0,a94c4e7115203d92b52df9b9e3b76f65483e107400ace0bcbcc36af89b0c843d,2025-01-16T20:15:32.667000 +CVE-2024-52791,0,1,162e3d6a512f9491101923b9ff099e7b8df58fdc67f0ed6295d1a7f85923f433,2025-01-16T20:15:32.667000 CVE-2024-52792,0,0,6bf74e6f5214a0e91327eeabb25158e05107d93ae5bf7d1b5ce6e248f27625cb,2024-12-17T22:15:07.083000 CVE-2024-52793,0,0,c259519361bf0f2bada907a2abf587f20a0b7b99896b145765bec60711987750,2024-11-22T16:15:34.103000 CVE-2024-52794,0,0,74da6ef4e158fa373b5567025e41b90b053ffdf18f4589a42837eeb80082f0be,2024-12-19T20:15:07.513000 @@ -271001,7 +271001,7 @@ CVE-2024-52891,0,0,c6b610008a5f3ec3869a4a93380f2e9ddf6baaf48eba1e31c2434c79c4127 CVE-2024-52893,0,0,93318ea4edf051cd522e6cc747b964878d2b91249e126365b5b3b33f5344312a,2025-01-07T12:15:25.153000 CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000 CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000 -CVE-2024-52898,0,0,9ed229a2e284aeca19413907c85ba77119cc5ddc3dbcc6df70fb3a6c49bdb699,2025-01-14T17:15:17.513000 +CVE-2024-52898,0,1,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f889,2025-01-14T17:15:17.513000 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000 @@ -271021,10 +271021,10 @@ CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afc CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000 CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000 CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000 -CVE-2024-52935,0,0,82bee18e7666e3b9627a83dc0a3752879a976f8cdc2c5166681676e372856b87,2025-01-13T19:15:10.993000 -CVE-2024-52936,0,0,a1439d337fa72544d7f992bae6abc1ed03039160e6f2b23e57535b986e6ab2f8,2025-01-13T11:15:08.883000 -CVE-2024-52937,0,0,5f36e12fe977c800f711f4d25ac90366c60f8b326fa32c674c6a617d8d4a2dc9,2025-01-13T16:15:18.093000 -CVE-2024-52938,0,0,5a308697e3bf9106f1daeb9736111ff575bb1eeadbdfeea87a5220423f329ff5,2025-01-13T15:15:09.300000 +CVE-2024-52935,0,1,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c479,2025-01-13T19:15:10.993000 +CVE-2024-52936,0,1,7dd7ce0bf9ba1169f3dc52e4e069b5997ef5aacc54be080724bfe7c5ebfb37c6,2025-01-13T11:15:08.883000 +CVE-2024-52937,0,1,4e2e200c911871605d656a523330fd8515bef881c87955645314df4efb4a35e8,2025-01-13T16:15:18.093000 +CVE-2024-52938,0,1,25ccbcee31d517a9492c1820a88aa96739f339ebff7e4c4e42b2b7d66f53baa0,2025-01-13T15:15:09.300000 CVE-2024-5294,0,0,5f7ae00e9a959f94251bcb983ddc17250c36ab864c5296be765aa222fa5fa253,2024-11-21T09:47:22.597000 CVE-2024-52940,0,0,dada389fd604fabcf8cad162ee7439c1b0f0631b96a74ff2b430a8633c0d2fd5,2024-11-18T17:11:17.393000 CVE-2024-52941,0,0,54a69191187ab640d350b9c58a59b08396ee95fad6d8092cf6c6613e7f3eba21,2024-11-18T17:11:17.393000 @@ -271040,9 +271040,9 @@ CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be50 CVE-2024-52958,0,0,965d541bdaa048d08984be57ec6ff291abae1c702954dddd32ec7b0108549df9,2024-11-27T06:15:18.590000 CVE-2024-52959,0,0,2eb2157890632ca954f7c150a61a989fe40d967f91d0ca40fadb69eac73b6b64,2024-11-27T06:15:19.083000 CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000 -CVE-2024-52963,0,0,4d65ae9a0e936d9582d3eb41b8e0c41c745523171603fd5bdb53ac17d9891400,2025-01-14T14:15:33.807000 -CVE-2024-52967,0,0,6223077f8a0a2ff718c0eb1c7cabde521405743774a581e8c0fdd7de5061fa66,2025-01-14T14:15:33.967000 -CVE-2024-52969,0,0,8d77c8e05c53f2f4fc2a735cd22e03c6d83b18c43f947f3dc1496437db7a937d,2025-01-14T14:15:34.123000 +CVE-2024-52963,0,1,ff01669b1598f0bce0b4b90af8cc55f96a203c8a430eccd639efb9c221ab9715,2025-01-14T14:15:33.807000 +CVE-2024-52967,0,1,ee495ed0ae82b5386a5a5e29b20d009f38e7fec0fdb15824df2e77e4920e6e29,2025-01-14T14:15:33.967000 +CVE-2024-52969,0,1,d48edc4c533d9acd9a260c0e4d555526245a1be1476ba79e29b9502b8c79f01c,2025-01-14T14:15:34.123000 CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000 CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000 CVE-2024-52982,0,0,87ddbec0fddbec6a4eb61fd0607c77d31103b1dd9283c5a13ec4d5a36a8ccef0,2024-12-18T18:22:52.637000 @@ -271310,7 +271310,7 @@ CVE-2024-5326,0,0,b39dfc566e259ca71a2d55906f899ff2beeb05110c42c160f9552c811ea722 CVE-2024-53260,0,0,702830b06fb93c73fa253b709f42f63ec6e477f3f64a83d9affbdefe31d26ce0,2024-11-27T22:15:05.353000 CVE-2024-53261,0,0,e0db8a3a963673511dc9fcf9efc221aec217f488643d1b352acc2373992c41bd,2024-11-25T20:15:10.217000 CVE-2024-53262,0,0,a30976483b4a3447c0f3cd137bc9d61475976254751462f53de127c8053e7844,2024-11-25T20:15:10.423000 -CVE-2024-53263,0,0,50489abaec72919f848f47f4a1ccc52b4a9d4d7f963f3ac3175959c80249233f,2025-01-14T20:15:28.610000 +CVE-2024-53263,0,1,c14864bbc280301aa1ac68bbdd6b993448b9ed0b7a1d46ea67a2fc6a883b3ddf,2025-01-14T20:15:28.610000 CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46ce8,2024-11-27T19:15:33.400000 CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000 CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000 @@ -271323,7 +271323,7 @@ CVE-2024-53273,0,0,4be201cb4a2a2818369414ac4a638086038f7b2129c8882fb2f8ed84d4b3c CVE-2024-53274,0,0,1b082934bf5e9b4005ba0f77ebbc282458901418112daa847bcdad246d3a28e8,2024-12-12T02:15:28.940000 CVE-2024-53275,0,0,c109163207090e239ba3bb162b134558c4e7d58d599431c7e2f0fd7649f229c2,2024-12-24T02:15:06.037000 CVE-2024-53276,0,0,8ebdeccd872ef8e8a05221a3a75985676351c6f58ee87f0d565b069799f621d9,2024-12-24T02:15:06.207000 -CVE-2024-53277,0,0,97b6a016030a0182653ebae696a19f3a4bf1321b4d29699595ca2612cb4b5aa6,2025-01-14T23:15:08.530000 +CVE-2024-53277,0,1,d10ff5d7f7d0c8fe68ccca4a1ba6ddeb6e3da767e86b58eddf05fdb441659514,2025-01-14T23:15:08.530000 CVE-2024-53278,0,0,6f30b711eaa2519505a8ae7e3cc5077447b747b2c4a9b5a5e0658f524894f224,2024-11-26T05:15:10.563000 CVE-2024-53279,0,0,44033b042ffed7a89d7ff23520a85cac4516e857c657f0452265be9252a09d8c,2024-12-09T04:15:04.477000 CVE-2024-5328,0,0,8c7cab73e73336a340952a9318c322c99389e6514b1340a59b208cd9ecb39030,2024-11-21T09:47:25.977000 @@ -271358,7 +271358,7 @@ CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b6 CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000 CVE-2024-53407,0,0,a9f08a2a8b48dbaa4752120065410e5d3389d13fa41e9ba37732894187dbca00,2025-01-17T22:51:40.307000 -CVE-2024-5341,0,0,5035641083613f7715a9cc55e9dc02da384db0018776b0363e78acae939d270c,2024-11-21T09:47:27.407000 +CVE-2024-5341,0,1,b91d381510e65a0064a2e9531659e8deb9b4b41b504550bc8d36c31f6a9c780a,2024-11-21T09:47:27.407000 CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000 CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000 CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000 @@ -271402,12 +271402,12 @@ CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a65 CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000 CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000 CVE-2024-53552,0,0,4cbf8fbe1c1d8b81113efcd1116951d33bdd9cbf11887cfd2671d9f28438541a,2024-12-11T16:15:14.373000 -CVE-2024-53553,0,0,76e8adec03b9db38abe353aadccb437ffe801c6f9e058270be9166fa3c32cd14,2025-01-16T23:15:07.700000 +CVE-2024-53553,0,1,96586682b18b18abf40cb4975540b6e6024c206d62f7a1515e26de218ae6785b,2025-01-16T23:15:07.700000 CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab5983b,2024-11-26T16:15:18.520000 CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000 CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000 -CVE-2024-53561,0,0,07197a1147eb76ea94ad9b5b789ca7ccbe3e6fe5f5f95385b99043f921c68c5a,2025-01-14T17:15:17.667000 +CVE-2024-53561,0,1,89b54e58c563af7cac21b87b083dc866156186638973815180e8244a4c4314d1,2025-01-14T17:15:17.667000 CVE-2024-53563,0,0,f6ed2a0477f6a476013c53a3a4876f7b2e47b331802caf434b1ccfe2bfebf549,2025-01-16T18:15:24.573000 CVE-2024-53564,0,0,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000 CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000 @@ -271433,7 +271433,7 @@ CVE-2024-5363,0,0,26d4875386ad8c3215b4c09e1b67dd8ce62939d9e762298e9b8ac4e18d0732 CVE-2024-53635,0,0,69eb99ebd3cc8f0f627f786197a00b6b987c88368caf03b14418ba15ea7b94e4,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,70608899f95aca150ea63ad11d46a4a5108c90127a7a301ace82188c2357f63e,2024-11-21T09:47:30.357000 CVE-2024-53647,0,0,cfcb346f723938ad054c8fdc72391827a75db16440dc5160efbbab2c409a3044,2024-12-31T16:15:26.437000 -CVE-2024-53649,0,0,c4c6b955106a096e3730b531752c300c6d2c019faf872c25a38e43153658bc98,2025-01-14T11:15:16.820000 +CVE-2024-53649,0,1,3dd5f8c14dc3f08d9a7eb42b9ecf83bcb0b56b38b2003ee9bf939d3fe0be1a0b,2025-01-14T11:15:16.820000 CVE-2024-5365,0,0,1cfce3a239d45132ff3721a342529a7c8292cbd269d61639965b045e1105a397,2024-11-21T09:47:30.490000 CVE-2024-5366,0,0,3d4708898dde8c46157274fab31aec2bb1d6d4355897d80e5ba83e77521494aa,2024-11-21T09:47:30.617000 CVE-2024-5367,0,0,a7221799367d103e649a718fec766a2c3243ad87477c7760cdab4ba0815d2580,2024-11-21T09:47:30.747000 @@ -271444,16 +271444,16 @@ CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681 CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000 CVE-2024-53677,0,0,0343757ac9b8af9a79c282863db1b88cd9095ebb57012e3687a2e517e71e0a02,2025-01-03T12:15:26.673000 CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000 -CVE-2024-53680,0,0,8f6a0e7e0ab328aba846c45a5169e8953dc6dbfca85d9cca37f56439e3715008,2025-01-11T13:15:25.710000 -CVE-2024-53681,0,0,b5981a5f23a050c58621754137465bbe9a27a78bd67559fa015494e5b655da4f,2025-01-15T13:15:10.963000 -CVE-2024-53682,0,0,8fff7fe6ed56d7be9465617e7f5434428ac8e26e2cf3262f7b6c754f477833c1,2025-01-11T13:15:25.860000 +CVE-2024-53680,0,1,d00cdef75190d88cc2c8633c99dc18973cdcb2e6508d8e02eb8a8af87c5c3651,2025-01-11T13:15:25.710000 +CVE-2024-53681,0,1,275dd62378dbefc087157f568efe3961eacafb9ec6438e48555a840aa194132c,2025-01-15T13:15:10.963000 +CVE-2024-53682,0,1,a5d4ca048009fac74a0c53cb8280cfc915e85962207104b096449f6d9567af72,2025-01-11T13:15:25.860000 CVE-2024-53683,0,0,8ed3f44393e22eea3f080e26403389aa2eeebf5c0860ee00e51eb42f73e4ab91,2025-01-17T17:15:12.053000 CVE-2024-53685,0,0,f14f882249b9db19115e9f5bd40c211ab0535cda9ea0386cce46e0a1a952c567,2025-01-17T14:15:32.120000 -CVE-2024-53687,0,0,db69b3a3aa7d0b6527150d997ca94f951ff7fdd68c92c6f81dd6f27f46185a16,2025-01-11T13:15:26.120000 +CVE-2024-53687,0,1,2d6ff7ead580eff771695e1bda58b2af04695f06576730dca8b266502dfc63ac,2025-01-11T13:15:26.120000 CVE-2024-53688,0,0,19e807e9f218b9a73099ef1ac03cb800eed5ec697cf2f5b2b26094211e5b9782,2024-12-18T07:15:08.233000 CVE-2024-53689,0,0,fe9d8a3bf209cb2ad2405bd8604640e12f460f2d15f1045beecc250fa01ee7ab,2025-01-16T16:21:09.993000 CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000 -CVE-2024-53690,0,0,95f18b7f80f7b65f49ec8c6ba80e039b538a1b86261631e7cd401a89d8976dc6,2025-01-11T13:15:26.470000 +CVE-2024-53690,0,1,145186003a2e20e895b910273e087e978c037a99e9a7d237f6c4661d59d1c9b5,2025-01-11T13:15:26.470000 CVE-2024-53691,0,0,09846e368cf7a07a1d919202728e77d0589572ed56c2c2f1bb03db07c3ec7fb0,2024-12-06T17:15:10.520000 CVE-2024-5370,0,0,118bbc3bfc68a5a364fa8038fafc7682a10bb0308a5e5da229e35dbd880721b0,2024-11-21T09:47:31.160000 CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 @@ -271572,7 +271572,7 @@ CVE-2024-53804,0,0,c64f2291c3e202809c8bf90598d4a2a0d324c8b22742806eb77826f9e995a CVE-2024-53805,0,0,f6fbe145ee852ec5282c6eab9bdebf9592e6eef4e867082a6f67281833d0254b,2024-12-06T14:15:22.823000 CVE-2024-53806,0,0,5d0f271a2983f1f83d7508a02584eca59adaab527ea8901c453129bf95b28a3a,2024-12-06T14:15:22.967000 CVE-2024-53807,0,0,751bfdc593286768f425347630b2bb5cdc74565427163649502df4c7031e3f57,2024-12-06T14:15:23.103000 -CVE-2024-53808,0,0,79cd653404f2d2b27ba6a96023da0a7466625ac2eeef9ab2247db499c22e8457,2024-12-06T14:15:23.233000 +CVE-2024-53808,0,1,2dbdc10adc548714475ac6e3a4e4a4cfb3503dfe64897d4dcb288b3782e40725,2024-12-06T14:15:23.233000 CVE-2024-53809,0,0,17427c419c7de66655b1e47e44c0d29c5f3fb35f4b69dff194a411c2dc4c773b,2024-12-06T14:15:23.370000 CVE-2024-5381,0,0,9f7e4aaec825976e9a0bdf11a7d8967a98b45cb6baef860075a12db62657c2b3,2024-11-21T09:47:32.687000 CVE-2024-53810,0,0,e98d78a114e65e3c19821776336507856eb72ce3497a2398568bdbd161c6e99c,2024-12-06T14:15:23.500000 @@ -271716,10 +271716,10 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f CVE-2024-54010,0,0,55025b40a5b298b8a5e8aa969e96243fb05f1dc7d8c7c838522e5ec07eca40f1,2025-01-08T21:15:12.900000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000 -CVE-2024-54021,0,0,eb34467909589e9ed378241f26b68d9b57aaa270e202ff278b5bef31a7fb90c0,2025-01-14T14:15:34.287000 +CVE-2024-54021,0,1,13a0709ef7a4e77dec1177a991cc8b9c7e150472cbf3b901ccd7992c11bb3fd1,2025-01-14T14:15:34.287000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000 -CVE-2024-54031,0,0,7ffae447ca5aefabce8d84ab05bcf6663d65ecc3f38c69751ed968974e15b4e3,2025-01-15T13:15:11.203000 +CVE-2024-54031,0,1,4ae67926939f395dbb9b982b52cc595624b4a9cbb64e71c57385fb6c364e81cb,2025-01-15T13:15:11.203000 CVE-2024-54032,0,0,44cb0433c08109f277c1dd7cec5998b3891bdf37d9d532da1f33f5a7f93f3073,2025-01-15T17:39:38.073000 CVE-2024-54034,0,0,af902fe770d25a96f01838d2a06f240d679ee0c2b25584bd9e2a03f959c34219,2025-01-16T18:15:24.910000 CVE-2024-54036,0,0,4ee392ab45a7ebdf90ca04024f547832268a482e455a4e1084a47025aea11ef9,2025-01-15T17:54:40.237000 @@ -271801,7 +271801,7 @@ CVE-2024-54139,0,0,09da0d25a85a895a3c6184b5010c9f3291eef4490dac084a4d67ceed16034 CVE-2024-5414,0,0,5121b02a6b535c7a985e876782b07c16fe258b67f2027b8e6e110fd30fd4eea8,2024-11-21T09:47:36.480000 CVE-2024-54140,0,0,e331d2ac3dbd3b8a53d43f4b62020140bfe310c3ed6fc6689e9e07dc1c045fd1,2024-12-05T22:15:20.400000 CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000 -CVE-2024-54142,0,0,ddf983cd055c22b7d9c2da1a3a75c154668a08a13233315e30efc19756961699,2025-01-14T23:15:08.687000 +CVE-2024-54142,0,1,72133cd2497b495f2be9332cda5c9c42b0acf32e880167b6d7b1c949210b9875,2025-01-14T23:15:08.687000 CVE-2024-54143,0,0,39896e76381b970ed0c53caca39df9efa5206ded9e17479626eb381c775f3554,2024-12-06T17:15:12.687000 CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000 CVE-2024-54148,0,0,520bd3c53bd8e84d8ecad70130ff9860bb292c1254f0bc8ea386248ebe729c70,2024-12-24T02:15:06.410000 @@ -271823,7 +271823,7 @@ CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b6218 CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000 -CVE-2024-54193,0,0,f4cea4758637cbed747248dd7ad4abdf58c30081d62575de71f8dd6b91bb9c23,2025-01-11T13:15:26.840000 +CVE-2024-54193,0,1,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000 CVE-2024-54197,0,0,603709103f05bc7a97f6cde13218f652b68a22f4a935ac881648bcc5cc0bfd99,2024-12-10T01:15:06.573000 CVE-2024-54198,0,0,91bef3f33cfc40b2dc583ea6ba9db99e021097c6399c70366353fc13f33f4ef0,2024-12-10T01:15:06.713000 CVE-2024-5420,0,0,dbefceaecf14c94a5632c30e286eaf19c84cd096f95c11f7fef61c799e73a7ec,2024-11-21T09:47:37.207000 @@ -272088,13 +272088,13 @@ CVE-2024-54451,0,0,62bfea464680a36276017f91bb5ae11f8712be2380f4e61a47de985084800 CVE-2024-54452,0,0,30db43977a4bb0060f4301184eef5e7e4316f5a66e91aba57b8474d2cdaf07d1,2024-12-28T19:15:07.570000 CVE-2024-54453,0,0,4b38818ec57830d6d15331deb8fc6306f0e91d48c89fb133c6569d5b7d3ea04e,2024-12-31T19:15:47.147000 CVE-2024-54454,0,0,d67e1bf29a3aaa483b825ac163d62022e2785b5de9b64863f3bc27235cd67fc7,2024-12-31T19:15:47.310000 -CVE-2024-54455,0,0,7b3e247c6f8ee1ab7e460d8d2f79a861df979228217b3f4fff81a5b338b425f7,2025-01-11T13:15:26.970000 +CVE-2024-54455,0,1,20565313a23365c4c17140fe19943535439cfbd982b6e19cd3463b943b5d9db9,2025-01-11T13:15:26.970000 CVE-2024-54457,0,0,da0353a7ec7d859fd477580e7c54e31a24aeea86ab2c2ac2e00b7a1eda59c2cf,2024-12-18T07:15:08.377000 CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 -CVE-2024-54470,0,0,d2a2eb7e77dec59873d13ff3ed78e7bf5c675b16602c0d7c42612756c7059f1e,2025-01-16T17:15:12.433000 +CVE-2024-54470,0,1,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -272138,7 +272138,7 @@ CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,206bf99a3aa890b83364e2d0aff86c3b8f6596e8472b76b2fdf32b4a4989a18f,2025-01-17T18:15:26.610000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54540,0,0,cec5648fa22fe0cc733814d4be0bb9219cc980c202703a2aa5266fee5fe4c719,2025-01-16T15:15:13.697000 +CVE-2024-54540,0,1,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -272149,7 +272149,7 @@ CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afa CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000 -CVE-2024-54660,0,0,537d945e287f3283780ee32550a38664bad1afde6cb0b7c627afcd97606739ef,2025-01-16T22:15:40.200000 +CVE-2024-54660,0,1,edef0c5871f664f8877d185e31c3b8a6ca427240ddfe23726caee85e94e3c9fa,2025-01-16T22:15:40.200000 CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000 CVE-2024-54662,0,0,40063869c5984ddcfcaf82116b2fa9ee6b8ef71c24c68deda4080eb1ea805f5c,2024-12-18T16:15:14.220000 CVE-2024-54663,0,0,f5353753ee157eb79c3a456bcb90fa176ea7107dfe149747714f2e06d4f48033,2024-12-31T19:15:47.500000 @@ -272165,14 +272165,14 @@ CVE-2024-54680,0,0,23c42810796888c623043dfa17bf2c05e67e8cb1f0dd95a5d3bb0378d9b39 CVE-2024-54681,0,0,253e5dec99c9346d03e651bfd86679c7c1afa29b9d10690c2c2c73d3edd05e49,2025-01-17T17:15:12.227000 CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000 CVE-2024-54683,0,0,35ec2d70086ae912ff4eae7d82bb097dcf57dbd99c9eaf862ef970893175a37f,2025-01-16T15:18:09.453000 -CVE-2024-54687,0,0,edfa64742c2d4dcf37d41c46572e277e022b38f127cbca49510f62103a2ed788,2025-01-13T20:15:28.927000 +CVE-2024-54687,0,1,ae08c85d224b757e1a5c6be5c8bc6b223baab48ee4ede4a56265487768ca764e,2025-01-13T20:15:28.927000 CVE-2024-5469,0,0,0593227e51e97383649ced684c68d7aaf013a250af5a8e55d437662843299556,2024-11-21T09:47:44.633000 CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ede9,2024-11-21T09:47:44.787000 CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000 CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000 CVE-2024-54724,0,0,c0f98e987154c550545f744e0a810dc344baf54de510016645ab4b226bb63a3c,2025-01-09T20:15:38.863000 CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000 -CVE-2024-54730,0,0,471b31c602099b87a149fd7533fc590197f69b0d46c2a5bfdf4028e1cd74fc27,2025-01-16T16:15:31.407000 +CVE-2024-54730,0,1,1f5b2039ec78df882c8a067f1f2e14a50bc9fc3855df85b8baefb9b0165aa937,2025-01-16T16:15:31.407000 CVE-2024-54731,0,0,acd86fbebdd274bead6535bf83cf37467581b483235e177fd7e87a697a25d37c,2025-01-08T05:15:11.810000 CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000 CVE-2024-54745,0,0,fa6c31d7a2d0035c561f7b97850c2a530b0e2e38d0e9249ae4c46e230cdcbc34,2024-12-11T17:15:20.460000 @@ -272201,10 +272201,10 @@ CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d3 CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 CVE-2024-54842,0,0,ccaf3a44f3596e593a08308e4797efa5052c648d3a0bb0b78b9bc5f97386b385,2024-12-12T18:15:25.580000 -CVE-2024-54846,0,0,3f6a4c3cbe281165e581f61639085181de9e7d5e042d1a600e94edf2d87e48cb,2025-01-13T21:15:12.913000 -CVE-2024-54847,0,0,2b192b3153e463cd052907632401045f1854cb52ad88b4254347fb3bff486614,2025-01-13T21:15:13.060000 -CVE-2024-54848,0,0,fbeaae3b83e9d11e8000c4cb599eccce4eade0efd0e1a2712b70422f6c3695e2,2025-01-13T21:15:13.200000 -CVE-2024-54849,0,0,a43301e051bbfd1007bc7e0f6eaa42ebd1e53bfcc997c03b1d753f79b3d72dfd,2025-01-13T21:15:13.347000 +CVE-2024-54846,0,1,cd293e372cd7b688684fe1a669519f7fd7cf9e715a92b3759a56aa794ae915b5,2025-01-13T21:15:12.913000 +CVE-2024-54847,0,1,92cd9612836c1d70a209fa90bb5658c416e64e42258c013167fdea7601604aec,2025-01-13T21:15:13.060000 +CVE-2024-54848,0,1,abe11eeff9270b99a0212209e764ce9100c7a8167e4b1af609b1ad75cba4abb6,2025-01-13T21:15:13.200000 +CVE-2024-54849,0,1,ecb2618b47660945a630d6edeb58e480eb8019d05c1f299b012bdc19f7f4588d,2025-01-13T21:15:13.347000 CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000 CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000 CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8a9,2024-08-16T20:22:51.930000 @@ -272216,7 +272216,7 @@ CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffa CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 -CVE-2024-54910,0,0,7ccfa671a05ee887025450a7de9a4dcec3c8cc2db43b815ac1e01ac88a83c431,2025-01-14T16:15:32.953000 +CVE-2024-54910,0,1,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 @@ -272249,13 +272249,13 @@ CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720 CVE-2024-54983,0,0,149f3772b456c1ff99a44fd44b0ae178f010b2926690711624e998da7ad367e4,2024-12-31T20:16:07.363000 CVE-2024-54984,0,0,3c6b13090909d3934507dc7f38f4e66c664045495e844f3883a0db8064e98820,2025-01-07T15:15:10.720000 CVE-2024-5499,0,0,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000 -CVE-2024-54994,0,0,3a378d14b3c1899e4ff6455c2c5c1522eec8c7d144de1d3bd9fe562b2e7c3911,2025-01-14T17:15:17.927000 -CVE-2024-54996,0,0,5d8c07e61eede1603ccdca6f35250f10be0d6813b862e8afc620d73b51073af6,2025-01-13T16:15:18.270000 -CVE-2024-54997,0,0,58ca365e4ac716b592ad47681cb736829a13e3b9e98ec381af91ae98a7e525ba,2025-01-13T22:15:13.990000 -CVE-2024-54998,0,0,8a35c7fb6600edccbb508e719a601873a37c5e576f5152f57e13ef2df0c4761d,2025-01-14T17:15:18.110000 -CVE-2024-54999,0,0,cc534052e693f21e59b36ba0d4ea86a8b78733f65ce9249e6bfefb7551d90d83,2025-01-13T21:15:13.497000 +CVE-2024-54994,0,1,dec8e4552c89bd0582f16f38534e2d0d0a8f1b867f7eef9a780a9e797f3492af,2025-01-14T17:15:17.927000 +CVE-2024-54996,0,1,159c01c3b3822fbb9aab0e72c2a7084311a1a6de7ebb49842fafbf13b41dfa81,2025-01-13T16:15:18.270000 +CVE-2024-54997,0,1,62067db3c095e6191ba5db8d277db015746466767cae87952abd180bc807e0fa,2025-01-13T22:15:13.990000 +CVE-2024-54998,0,1,bf5d0d86ae36b44df94994f1b2b372fff5279ad39c4c8d3a1d3b322f79f31854,2025-01-14T17:15:18.110000 +CVE-2024-54999,0,1,7d688b5e6850db35622cee3d7c13ceaf526f67556bf50ea8d38cf86c561fb155,2025-01-13T21:15:13.497000 CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000 -CVE-2024-55000,0,0,825c549e03235f5bae33d7893276c766e261c6535999241be9cf05f8b9201f8a,2025-01-14T17:15:18.300000 +CVE-2024-55000,0,1,e44bbf604c17a445fefb05afc4d06c2cd9a73bf2a0f90098b42e7ec22fc64a03,2025-01-14T17:15:18.300000 CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000 @@ -272358,7 +272358,7 @@ CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b9167 CVE-2024-55507,0,0,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000 CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 -CVE-2024-55511,0,0,97530fa98efef4074d8b2c5edc10405d9a350a4016850fdb63a57b5dfddc6fc6,2025-01-16T22:15:40.327000 +CVE-2024-55511,0,1,fcb4edf90239709ac34874a454569aba9038e0203d00c427ddd4aceb21cc4b00,2025-01-16T22:15:40.327000 CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000 CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc912d3,2024-12-18T16:15:14.900000 CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000 @@ -272393,7 +272393,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349 CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000 CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000 CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000 -CVE-2024-55577,0,0,f091be9165dfad4021e3f0b2a13f52e188503db4096a598d8ef273db8e727613,2025-01-15T06:15:16.740000 +CVE-2024-55577,0,1,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000 CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000 CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000 CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000 @@ -272403,7 +272403,7 @@ CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c8 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000 CVE-2024-55591,0,0,a4119c3a900eabf0113ebb321de53b83e488411766eec9c46fb6102609e7a164,2025-01-15T20:48:30.333000 -CVE-2024-55593,0,0,7966b8c0c61f0e982eed66bcaeabb127b9928db85b43c7e5a46fdeafce2a85f4,2025-01-14T14:15:34.610000 +CVE-2024-55593,0,1,9430bce7692d2c8e6d288cbe72f31d16d74be58a9c07a6a6961fc12e525a7607,2025-01-14T14:15:34.610000 CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000 CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000 CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000 @@ -272422,9 +272422,9 @@ CVE-2024-55635,0,0,392082c131c01336e2210c07f5a3e2fcbd7cb3b3f9054eec0bafd4ca472aa CVE-2024-55636,0,0,e49650b1673b5336fe0733d223e8fc2e472caad48f40b65ffc4ecff5eab92986,2024-12-16T18:15:11.463000 CVE-2024-55637,0,0,418fc59eaddba6292c7ca9a157c9abc724d8230c1bf6179e0194990ea93fb105,2024-12-16T18:15:11.673000 CVE-2024-55638,0,0,27d92259e0a78066bb2529c55e1965f2134ea587303667a5ef98e650405575d4,2024-12-16T18:15:11.840000 -CVE-2024-55639,0,0,d8888938126e4da74faedefaa4a3bbb465a3e002a6734fe4824599c8bc95bb7f,2025-01-11T13:15:27.663000 +CVE-2024-55639,0,1,7d7aa08a61792d0ea5f97997d9bed58b5e5cf7aa4ad94f021a75a1623394ad47,2025-01-11T13:15:27.663000 CVE-2024-5564,0,0,3aa73f6c6404c243b9f6f394613afc94e063551efa8746acdefa8554437d3ac7,2024-11-21T09:47:56.340000 -CVE-2024-55641,0,0,77d9ffc4c02e5ee034bb45f1260529b5a07f960192ca09455d8126eb71569411,2025-01-11T13:15:27.847000 +CVE-2024-55641,0,1,5ceb1ce1fcdd8dbdaedf279a0cc0a70e3a5bc311e90933680c0312aa874fb259,2025-01-11T13:15:27.847000 CVE-2024-55642,0,0,bebbffc81c84734ded4e32ee6533cd16dfafb72d8736803a1e0946b43f8a229e,2025-01-16T15:18:22.557000 CVE-2024-5565,0,0,d611550f5bcf5e6c3db2413f5bd8aaf6eb30fde2563331d26a9ad58249b7304a,2024-11-25T13:15:07.310000 CVE-2024-55652,0,0,4e4448d6da8b16d3811a29eb55a690e8e4ef0fe299bd552eafd44d61141bd125,2024-12-12T17:15:11.360000 @@ -272465,7 +272465,7 @@ CVE-2024-55877,0,0,435be389e0076431a46ab8708ee411347fd84e481635e037befe4e5e1cca4 CVE-2024-55878,0,0,ddf93675a87b982771a83dcbe0c7d650fbaf40d82f129cfcd23293bff68215eb,2024-12-12T20:15:21.493000 CVE-2024-55879,0,0,c7d9e69254b07c65dcce66e329164fffcf9c6aa4a735e46f7047582ee960442c,2024-12-13T15:15:43.170000 CVE-2024-5588,0,0,cd4fd6a3070fd76f99f64f98fe5c8858877cfc8403e9efe0eba9cc6fe8e6a080,2024-11-21T09:47:58.750000 -CVE-2024-55881,0,0,7ea9aad4570cc1d363d8611ee3efe58f7dddd9b7684e20d4f0f9cdc6e12462fd,2025-01-11T13:15:28.197000 +CVE-2024-55881,0,1,68ec0fb2de3335ed344107c3257bb4ad71c2e95497efa92e497581731e6a4040,2025-01-11T13:15:28.197000 CVE-2024-55884,0,0,5d6da0d32263735a14f387d6018828f5961d5e83d83c540231cd267e671abff9,2024-12-12T17:15:11.710000 CVE-2024-55885,0,0,9e3ddad49418cc28301222751644c0a1957b0cd7a0b086b55392509dea2c9c50,2024-12-12T20:15:21.760000 CVE-2024-55886,0,0,b364e38b57c8224b068cc87c9ee99447948b262b8408afc9444bbbe5b3713fac,2024-12-12T20:15:21.890000 @@ -272474,10 +272474,10 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3 CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000 CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000 CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000 -CVE-2024-55891,0,0,7b71bc14705581a904859d5d028e11c05b58995141305675edd149cb3cd64ce7,2025-01-14T20:15:28.773000 -CVE-2024-55892,0,0,b4b981fc663a5d1b8ab3418498faa337b5f4c20dd7d72f4caa9c53202f767e6c,2025-01-14T20:15:28.963000 -CVE-2024-55893,0,0,b7f73ccfc3c16c1efd1adaf6266d2f311751dfb1df0f04bee132bb800482e8a9,2025-01-14T20:15:29.197000 -CVE-2024-55894,0,0,8c1aaa53599c713491c0a1f5b64925cb91b7a7f8ffef462a627039296453e9a2,2025-01-14T20:15:29.380000 +CVE-2024-55891,0,1,e50484d6d9c8c803bdb7ddc1463259498c2d5dad263ea1badc722a0f7145c697,2025-01-14T20:15:28.773000 +CVE-2024-55892,0,1,3c8099213df5425eaba1a2e1930df12d4267be1588bfc9fa740e8a606ecc2b13,2025-01-14T20:15:28.963000 +CVE-2024-55893,0,1,2311d1be97932c27026b240dd874574f2c2fd1aab5a9a2bbd9b0b1b5bf8eed95,2025-01-14T20:15:29.197000 +CVE-2024-55894,0,1,a518cee2fb5c444e45eddc499c726dbccb5162cc415b97b8eed1d6bbd03a94ec,2025-01-14T20:15:29.380000 CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000 CVE-2024-55897,0,0,86f551f0669482615238eeaffb68bcc56791f5e1b9341f9faf1df69a0f9917a0,2025-01-03T23:15:08.573000 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 @@ -272485,13 +272485,13 @@ CVE-2024-5591,0,0,5b452d13d5bfa9a2af82af55a6427cebed5363226c02cb0163eff6e664b73e CVE-2024-55916,0,0,7502995a20458315a9946b04859af6b86781c5ddbc0a9a47dd47bfb5e67dec22,2025-01-16T15:18:39.293000 CVE-2024-55917,0,0,c12e2bbc393b15d20fbce1ec995c8d1d26abb7f3ae27ddc186e402fd7d620706,2024-12-31T17:15:09.140000 CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000 -CVE-2024-55920,0,0,c4ece96596ed348898d2aac430befde9f65c48d134928ac02e77a7521a447158,2025-01-14T20:15:29.613000 -CVE-2024-55921,0,0,500cba808daff3220c861db400b95f89a656d677357c1dc13e54186c4c90b8b5,2025-01-14T20:15:29.847000 -CVE-2024-55922,0,0,d0f066c11c20182c14fe66e861d05fcc2fb8ae0110253849be8ee65e55f90e4e,2025-01-14T20:15:30.033000 -CVE-2024-55923,0,0,3ef372907c34115f4d3f7d8ef68d39be6bd698e8c88b08041d5298605d1c9ec1,2025-01-14T20:15:30.197000 -CVE-2024-55924,0,0,876c8e894cfb4b43c5da5c9a2a8a8050c8fb387b46b2889b744a16a12da27f4e,2025-01-14T20:15:30.367000 +CVE-2024-55920,0,1,d289d579894e9ae556d4916665c72b6c96b36944bb6699227a0817a4ecbe37a8,2025-01-14T20:15:29.613000 +CVE-2024-55921,0,1,5fa81d92601e70d676a1016b709a0f2741abaf55426856cddb4a06e34b9a7949,2025-01-14T20:15:29.847000 +CVE-2024-55922,0,1,ab9ba749ee333e9f82aad55cb9be15ec2bea94f8fc77977baf33bef44d3cce51,2025-01-14T20:15:30.033000 +CVE-2024-55923,0,1,219ffcee25fb405d9a02cdc68a4fa5af829e860803373b590c58a214037e5d08,2025-01-14T20:15:30.197000 +CVE-2024-55924,0,1,51b538faaafc8081c0d91ed65951b4c0e863d37d4f9e21b793ae96fe9f20d0fe,2025-01-14T20:15:30.367000 CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000 -CVE-2024-55945,0,0,d55edcd20a9af76c546f1d51d15ccd11b6654f4ae5025f69d9746dcef193d198,2025-01-14T20:15:30.527000 +CVE-2024-55945,0,1,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000 CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000 @@ -272500,7 +272500,7 @@ CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fab CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000 CVE-2024-55952,0,0,40f06e6cb54766cf7357654cb464e4bb21c58158c39af1ac076f236e96ec903d,2024-12-18T19:15:11.933000 CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519feab13,2024-12-18T19:15:12.067000 -CVE-2024-55954,0,0,5d7bab6dc29eb9eedaaaab2deb00ec4a143be4e9272de74e49b5d63d205a4700,2025-01-16T20:15:32.890000 +CVE-2024-55954,0,1,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 @@ -272606,7 +272606,7 @@ CVE-2024-56061,0,0,a028e486e70270644a1996649c2c3b8450478b85bb5ddc1825cc066d2525f CVE-2024-56062,0,0,0710d5a9eeb90721a35932b9d93096a40330ad3819456d48d0db54e95031a5c0,2024-12-31T23:15:41.237000 CVE-2024-56063,0,0,ed2ab2d5c262e5bb3a5e177f403525bb9adf28ffe38af3acc326c401291aae27,2024-12-31T23:15:41.393000 CVE-2024-56064,0,0,0d85e693a6ee180923e3bd9bf5f6c4beff2647e62cc73ae1ee472d7fcb52494b,2024-12-31T13:15:08.157000 -CVE-2024-56065,0,0,a316a29fc957af92d778ac26e6f2a3e6769d7fdd24aa84b467e3581dc362179b,2025-01-13T14:15:09.117000 +CVE-2024-56065,0,1,1e7e79ad901a249cf3b84fdd4f95f74b4dc3e18729cca8dceb16fa0af04fe16f,2025-01-13T14:15:09.117000 CVE-2024-56066,0,0,4b41a7e13e2d31a70f1527d8d2fafeb73707725a422cde8f675c73ee0c2f217a,2024-12-31T14:15:25.117000 CVE-2024-56067,0,0,597ebce79b808ecc582bbfa17e7f441dc51b6f609bd6619333a0dfc4b05a0d84,2024-12-31T13:15:08.323000 CVE-2024-56068,0,0,92316b067e27575fa15c4235d39b371638edb63fc20f54ce0f3777c553727cc7,2024-12-31T13:15:08.483000 @@ -272635,14 +272635,14 @@ CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-56128,0,0,e2cb76efd64d63d4c386db8a1315b19e05cdb3bf57b90430767a6b815ae92cb5,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 -CVE-2024-56136,0,0,8e040b984ed4255eca39f7beec891b3cdbc5a151bedc3871f33db6f2544981de,2025-01-16T20:15:33.047000 +CVE-2024-56136,0,1,3233f503c5171e4ba11df9e13150ae4049de7b6a390326df6fe239b64631c5e7,2025-01-16T20:15:33.047000 CVE-2024-56137,0,0,5dfe89d1ae5911eb9a89f977030c79ce761d66499f995b20161d28de051d48cd,2025-01-02T18:15:20.213000 -CVE-2024-56138,0,0,c26f02a4eac81dfae75a8836a9e8fa5686cb21c66701aede7c765fbc01a1ae0c,2025-01-13T22:15:14.313000 +CVE-2024-56138,0,1,56bd8032a118db50efc637f56ac5577457d98d6e38b449027a5f8c36cc988ac7,2025-01-13T22:15:14.313000 CVE-2024-56139,0,0,3024c21b786c6ca0bdd0206dcd9c6c0aa19c59d867560c6433c6053807599e34,2024-12-20T21:15:09.787000 CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000 CVE-2024-56140,0,0,5e773e07d0eed57889259343301d38e685c0a1811e50189d4f1636233600aa01,2024-12-18T21:15:08.353000 CVE-2024-56142,0,0,af110be5554a54e3ff40972c7fb19f7e124ff4110044f38d9d27c032f57da280,2024-12-18T16:15:15.433000 -CVE-2024-56144,0,0,ed55f1ce240086bc98338dff4987aaa83eb91cd6df3be511adcdd1adc45bb93c,2025-01-16T23:15:07.830000 +CVE-2024-56144,0,1,ea384e7cacf8dd720ce75f72f27014e6ec1f010b2ec13dfb9dc31d30f6928025,2025-01-16T23:15:07.830000 CVE-2024-56145,0,0,e8fa44102f09f0f36fd71cafc049a2179bb21772192bd2352fc7357b43f472f4,2024-12-19T21:15:08.383000 CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000 CVE-2024-56159,0,0,e0caaeab3b9fb3d5d49ece96fb0e11237096edb89d270006067ab0682bd07a86,2024-12-20T21:15:09.940000 @@ -272713,7 +272713,7 @@ CVE-2024-56250,0,0,fad514099844fd3a40a460e7b2f8b539a1827f56918983d298bbc6627256c CVE-2024-56251,0,0,bf5059a40f2f69a193b9f087bf4681f76ef9e2fbd017b99c10bc6dbbe6743a4d,2025-01-02T12:15:26.840000 CVE-2024-56252,0,0,bcb55d9aa2aadd71289002a4156bb5f8ef8a93cdcf119b8a855a5677a77aa8b9,2025-01-02T12:15:26.973000 CVE-2024-56253,0,0,052bb57aad380ab1163937481d3ea63eb4fff054d20b021d2dc31b61be64863e,2025-01-02T12:15:27.110000 -CVE-2024-56254,0,0,fbc3040467c65f4c35eb0c602720fcd15493ae0754f802a374191ca88a10f2e7,2025-01-02T12:15:27.247000 +CVE-2024-56254,0,1,2b5b313142eb54beaafa6ecc460e76642bf02fce5000b53a14e9bfde5562a81b,2025-01-02T12:15:27.247000 CVE-2024-56255,0,0,e25a417498dee039f9b9bb01d0aa00b5e9649106ae99313547414bcf56b7b83a,2025-01-02T12:15:27.373000 CVE-2024-56256,0,0,e02d1c8c5bc51a1b179a5bca398725aea9ad7a89db71f48878c2f5bce3510a46,2024-12-31T11:15:09.543000 CVE-2024-56257,0,0,e31ff6866c2c4c35beae38750d7442e6309a0a5186f5a5bb07d11dea1360b332,2025-01-02T13:15:07.963000 @@ -272726,7 +272726,7 @@ CVE-2024-56262,0,0,4447534a78607e1275b0ed628da648df4beb28771835b217aa80a6ddb743e CVE-2024-56263,0,0,974f02d536848b4074de4f0a7a6ee52770aab22023237624b3ca89478ab882dc,2025-01-02T12:15:28.193000 CVE-2024-56264,0,0,073527848c96e2530225db6050f6576f8658501e1459fca3855280b46e6bd00a,2025-01-02T12:15:28.327000 CVE-2024-56265,0,0,06c317e12da44533cb0101010f8fb0fb21a84e3dee4894f6712c25ad3b90c059,2024-12-31T11:15:09.707000 -CVE-2024-56266,0,0,265a3e77ffeab76fe861882c5717b3b9f7e42687ff2745ec11b3fa63a202ed97,2025-01-02T12:15:28.480000 +CVE-2024-56266,0,1,356e024a93d0eb9899f21db50cc1cfe82e9b29846d8260827e962784043b87aa,2025-01-02T12:15:28.480000 CVE-2024-56267,0,0,1a857d7bf07f7bdad7247fe75bbc7603553ef3ae2a1cef53f9569ee0b2c25d2f,2025-01-02T12:15:28.617000 CVE-2024-56268,0,0,6c5e42fafa8d0d431aa18ee0814c13c9e3020d74b57b5ddd14fbebc4b330873e,2025-01-02T13:15:08.120000 CVE-2024-5627,0,0,4f3ee87aef2fc9763c8caa5864c6f83c1e8820b485bf86b137197706dbea80f8,2024-11-21T09:48:02.683000 @@ -272756,14 +272756,14 @@ CVE-2024-56291,0,0,48645baf7bdc88e516614d962f94fb1fac9b78ac59c04f570d3af4e27edaf CVE-2024-56292,0,0,b8c5eac9032fac60f36a83699c17bb1cf4e5aeb40bf08f49fc3262d643b66777,2025-01-07T11:15:11.943000 CVE-2024-56293,0,0,3b45dcbdac77e414410e489682239cde470dc717efaa7ef8cf82fc2bbd777adf,2025-01-07T11:15:12.100000 CVE-2024-56294,0,0,b26837195ca12c6c365d2fd7b3d165c913a922cd77e049adb61cad295b465d07,2025-01-07T11:15:12.270000 -CVE-2024-56295,0,0,5f70a320fe5261adad4050b9d0d819b54d435f23d0c56b3d65a1f10e1bfda050,2025-01-15T16:15:28.920000 +CVE-2024-56295,0,1,0f63578df9a6b789ec864cad549311fb687bac0caadae43bc62274150a6ea802,2025-01-15T16:15:28.920000 CVE-2024-56296,0,0,44b95312336975bcba28e41005693632f9d16550b6452bc089daa9967bd1d3a0,2025-01-07T11:15:12.467000 CVE-2024-56297,0,0,ed761e25c979a4fc44259b5ac2d6526707ba072d111ac25998ca3e6a01d412ae,2025-01-07T11:15:12.643000 CVE-2024-56298,0,0,2789fa5d036005bc0351788cc02882c3b6e32cd00eb4381e16ed64e756303b30,2025-01-07T11:15:12.807000 CVE-2024-56299,0,0,e2b6482b24da2187df00fc2d99b8b6504835dc7e0411924e896022a0742dc728,2025-01-07T11:15:12.960000 CVE-2024-5630,0,0,50874e31f2d6c9403bb3dbaf933b8b3f439196ea7c18b531eba9bc061324fe0f,2024-11-21T09:48:03.020000 CVE-2024-56300,0,0,fd8f91c54d7b2d2f0c20bf657c6cc558d46dbec655d8d7ad2230066619d3c5be,2025-01-07T11:15:13.117000 -CVE-2024-56301,0,0,81fee6d0fa8cd2ad2a6d969b275f6a833c44e0e241ac1fac484d1afa53728426,2025-01-13T14:15:09.887000 +CVE-2024-56301,0,1,f46c9c676999b63d81039c9a073e3c1760c3de4da85396c862849172997d41f7,2025-01-13T14:15:09.887000 CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000 CVE-2024-5631,0,0,2a74e658158bae900a85436e92fd017c375ea2371e9ccb7b5a67e7bbd481f6b3,2024-11-21T09:48:03.210000 CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000 @@ -272778,7 +272778,7 @@ CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b5725 CVE-2024-56320,0,0,7c1f738efb01f994e6aa710bdf93faf09602c1cf0b08ca3443806c0c1e84929a,2025-01-03T16:15:26.180000 CVE-2024-56321,0,0,74f6aaba2312f358c8612f649e79b3518a2426ea72dd60ae831d7b708032a87f,2025-01-03T16:15:26.340000 CVE-2024-56322,0,0,8ee18a8aed8dde9318d518b84e60033ce04395d9ab1e2e8b41773f6c45e68aa8,2025-01-03T16:15:26.480000 -CVE-2024-56323,0,0,e491d3061c2e2589602e76d8d2012c6b51516cffc92c5cd5e174a752a191f088,2025-01-13T22:15:14.447000 +CVE-2024-56323,0,1,7363c537a56ea671200a79ef9b8f6c044f0ddf41d99e23dcd3f0f679453c163e,2025-01-13T22:15:14.447000 CVE-2024-56324,0,0,1ba8ed12eb3c68f3a00dead310264c1c177b76fd79da0868f4a6a097d58c19d9,2025-01-03T16:15:26.643000 CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000 CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000 @@ -272812,11 +272812,11 @@ CVE-2024-56363,0,0,7b130d481442d6564973e2a7227b43f5a030ae8a41341bb70189f5abec825 CVE-2024-56364,0,0,6115dedb84ebd874c4c0a6694d1fb784d8502b3a627aacf7ea4fc74186ea1ff2,2024-12-23T16:15:07.770000 CVE-2024-56365,0,0,90b4a8dc5af5c7417ab38949ac69cca0ac19960bffa66a95ede05bfebd2aecb3,2025-01-03T19:15:12.340000 CVE-2024-56366,0,0,5d5050d19e9512349e99560a15ebd241b3438eb4f271b6e29d9ed63f918d5d01,2025-01-03T19:15:12.443000 -CVE-2024-56368,0,0,83130770495e059f53d1ccc77eeeea04285810e00c87d0c45bcc66175a524ebf,2025-01-11T13:15:28.530000 +CVE-2024-56368,0,1,3fcf15405e5d098a7d36ecb9520617c7fca5345251aca6249179f3e1c86517d0,2025-01-11T13:15:28.530000 CVE-2024-56369,0,0,3c8472717567d8bf18ec0d8e83a626d55afe4bbcb99b2a53e44807eb7ad97aa3,2025-01-16T15:18:59.237000 CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000 -CVE-2024-56372,0,0,63a64a6c0142715c4ddc6ec56300de4db39119137bfcc0781143b559cb029ca1,2025-01-11T13:15:28.873000 -CVE-2024-56374,0,0,dd473b9830782ed99c32576b0ba31a9e46a075d2e7f08e30817a3b2e91175648,2025-01-14T19:15:32.510000 +CVE-2024-56372,0,1,90a1aabf121e4966bb6f781ef40b9ea4a8ff306749512dfc68df7e160a9b150b,2025-01-11T13:15:28.873000 +CVE-2024-56374,0,1,464fb001fe407eb24cc2e5d0a911247f84564e60d3fc6ef1dc21f626fa58d404,2025-01-14T19:15:32.510000 CVE-2024-56375,0,0,1aeae50409e14309fb31af7dcf320eae7189e473177b68d63698866c2c62cd0b,2024-12-26T06:15:06.203000 CVE-2024-56376,0,0,ec7afa265cfcfc2f0a337b9197d5ce2d94544a812119725f7a9fa6214b034f65,2025-01-16T21:10:10.170000 CVE-2024-56377,0,0,03aa288e6093633ce306b370432fa6bb1ec9d8f7ab6fce395565e9fb72d46471,2025-01-16T21:10:25.790000 @@ -272864,18 +272864,18 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d CVE-2024-5646,0,0,c48b41c63e1dae6ddb1f5f69529911450f8300b5322652ac7b1465148b11ea55,2024-11-21T09:48:05.203000 CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000 CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000 -CVE-2024-56497,0,0,9e1301cea3ad51076f7a891451fc948078d213e3257e4f6d9b488956f6ddfcd1,2025-01-14T14:15:34.760000 +CVE-2024-56497,0,1,fb6ae2328ea879e11eb6aa87ceca9886896622bb8f94577a87be6d7512da58a9,2025-01-14T14:15:34.760000 CVE-2024-5650,0,0,e326c3216630004af5368334e17751b93c2144fc6e95ba439673319f24c5efbd,2024-11-21T09:48:05.557000 CVE-2024-56507,0,0,2fcd6aea186081b10138c7efdbe4c6828fb4bc2d016266039f2e51dacfa7b54c,2024-12-27T21:15:08.287000 CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa32e4,2024-12-27T21:15:08.390000 CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000 CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000 CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000 -CVE-2024-56511,0,0,372c3149918ac629ac10a134aace0fbd7732ea1726a83cd3f44608028ce6db99,2025-01-10T16:15:29.510000 +CVE-2024-56511,0,1,a32b676c6fc5236481962ab182b1fc05a7ba04f1e84fea7b90de8ae50325f284,2025-01-10T16:15:29.510000 CVE-2024-56512,0,0,9c068b365c4512dce8c612c9c28583046961ffa6d0e903214500eeef2ace3ea0,2024-12-28T17:15:07.967000 CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000 CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000 -CVE-2024-56515,0,0,93bcabaf10ccab9244aea61e0ffbf0fa18e77b425b036d6943e0a158fb356b16,2025-01-16T20:15:33.197000 +CVE-2024-56515,0,1,4a07e3e4d2a1308e0588ce8b7f05a8f9d332299ec2e52c6ef14eab15d40c8073,2025-01-16T20:15:33.197000 CVE-2024-56516,0,0,8ab2e608947364b0ae07f700d0c92e02cbdfe27375d1a973791166b99f9664df,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,7c3d524fcdfdaec8c61e6084a922097b52b4d5b66ec799d189e8cf76cc61f4e2,2024-12-30T17:15:09.840000 CVE-2024-56519,0,0,3c5a6d8f19f54d6c861bfc224498ef149ba17c594e43f18b02fc8f106d9f1bb2,2025-01-02T20:16:07.080000 @@ -273155,7 +273155,7 @@ CVE-2024-56777,0,0,29504a8a348a8c0f3a7df27cdab9ea1f8e357bbf38d1596728d3dc080161d CVE-2024-56778,0,0,f68da8cc80211298aad97ea63aa4b0c0bb9501e6980a281bb4a3e12254599641,2025-01-09T21:50:26.363000 CVE-2024-56779,0,0,22001bbb62cba4f01464b17cfe9d6efda793f2df5c0eed5ca5699c9f41981fb5,2025-01-09T21:48:56.667000 CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000 -CVE-2024-56780,0,0,d1b5706f1da5027023a1b6f25505407a2cc99fc2ae9c3667e4a6a705ab9327c4,2025-01-09T21:50:02.050000 +CVE-2024-56780,0,1,e6067ef3678aaa600d9dbf6ee0bf9f1b03712abcdee5ec89ff5190e083efc82d,2025-01-09T21:50:02.050000 CVE-2024-56781,0,0,7090844ed24a359066317823fe2b6bf0a02e9f47855b6742e8a87cf6ff9e3db7,2025-01-09T21:21:49.207000 CVE-2024-56782,0,0,8ea8c1c6076121ccd6387cd73e62b29831bb97f162a193d72c4089bf509d6881,2025-01-09T21:00:44.913000 CVE-2024-56783,0,0,ce83b6478d153aecb85bd2ed51b7393f53075c8b501633f17784c3734829a62e,2025-01-09T21:24:41.370000 @@ -273163,7 +273163,7 @@ CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5 CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000 CVE-2024-56786,0,0,ea16236b0070d1ee086d935f00ebc5682fd5b368b3f0ac1efe1f4df73b3ea78c,2025-01-10T18:53:06.473000 CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000 -CVE-2024-56788,0,0,b461a5013e707fb38d8dd4945a129ee1f12c7aa7e33bf50d3d5b26fb8ac4cb3b,2025-01-11T13:15:29.090000 +CVE-2024-56788,0,1,3a36c511427dff664270186cc18fb40335209c34976451cd94bb4b753be21e11,2025-01-11T13:15:29.090000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 CVE-2024-56799,0,0,7c81f75b0fadc031d3c3a69969ffb946d254b09a307c8ed595c44ee135ddd7a5,2024-12-30T19:15:08.160000 CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 @@ -273180,7 +273180,7 @@ CVE-2024-56829,0,0,fb517ef6b7f51e566ba1e37004f2890737a0fef0bcdec303fd5ff6dcfac6c CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000 CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000 CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000 -CVE-2024-56841,0,0,00e6b1866469faa47f0316ce82befa0216f19384ec02a27a0ba58da8ce558796,2025-01-14T11:15:17.020000 +CVE-2024-56841,0,1,bf78aa73bb15e61d034fb38007d1e81454816f3224493cad5048fed44a6c067a,2025-01-14T11:15:17.020000 CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f87,2024-11-21T09:48:09.570000 CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 @@ -273198,22 +273198,22 @@ CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de039466 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 -CVE-2024-57011,0,0,d1476644cb4bcd610ae648ea949af3e6148b26da86f441d5f343b688eab16c90,2025-01-16T15:15:13.873000 -CVE-2024-57012,0,0,13e5481fd78e657548144b0d919ac4d11f34e8d265937bb48823736c30728a08,2025-01-16T15:15:14.090000 -CVE-2024-57013,0,0,d77a4a351623c21a06669fcf64e7e97cbb6b216e887201f50bb06a02c22190cd,2025-01-16T15:15:14.300000 -CVE-2024-57014,0,0,a1fc97d9ae72842a0c727b87df797a2d7d21b1fd9932a63a89b4a841cfd4be90,2025-01-16T15:15:14.527000 -CVE-2024-57015,0,0,cd7c8e7ea712a3387f47cf24a00fe02718192ca7816cdbccdc136e5ab816cfd9,2025-01-16T15:15:14.733000 -CVE-2024-57016,0,0,5b2dd69829de654783b8bb69f4080488fafa0a6c45a5e5e9cb5908332c9b4d6c,2025-01-16T15:15:14.937000 -CVE-2024-57017,0,0,751c0ff2478ed663bfc97b847cf7f14abf9c905dd4a4d35b46449d88b4563fd4,2025-01-16T16:15:31.640000 -CVE-2024-57018,0,0,7219effc5e4142e152c14b5f1ae3ea1f8f778e3e6753153f316c12a0333836f4,2025-01-16T16:15:31.823000 -CVE-2024-57019,0,0,bf114575bad0a1da693dd95f2db3a0cf75ffbbfdda67be33f2137056cefa3b51,2025-01-16T16:15:31.993000 +CVE-2024-57011,0,1,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000 +CVE-2024-57012,0,1,9eeaeb247ea982bbb49160ccdf98082729e7cd26e86494fbb31016855f1607c5,2025-01-16T15:15:14.090000 +CVE-2024-57013,0,1,46e0074ef4a74c2f8db5512692e7efacd9237cc1d193003a63a2ab4a181f527b,2025-01-16T15:15:14.300000 +CVE-2024-57014,0,1,822dff03c5758ed86496a82e9d2b56939c2b51bd8fad6a6cb7307ac10e407dc2,2025-01-16T15:15:14.527000 +CVE-2024-57015,0,1,4a99afd5bc0e9021b3ca58ad78407d79cc83506349a78aece19e3df4ae865dae,2025-01-16T15:15:14.733000 +CVE-2024-57016,0,1,5d1b36c2767455b510e372c6cabd5ff3d4d94308cf8fadbcace8ca00101cfc59,2025-01-16T15:15:14.937000 +CVE-2024-57017,0,1,154f909cdd6f14840b8ac30a0be3db466eb6480310e081bb3b4285f57df3e719,2025-01-16T16:15:31.640000 +CVE-2024-57018,0,1,ee89316bc2cbc3196f29512adee6345ac569c6acb35ee3279871354afe66f118,2025-01-16T16:15:31.823000 +CVE-2024-57019,0,1,9a9d081d28bf0d75c6a698fd70547093a07c026969125c0c4986388e1018b0e6,2025-01-16T16:15:31.993000 CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000 -CVE-2024-57020,0,0,f9f2e4ba1acd5b558c2383863a5eaf45e367b57cc13a3e12d0e64326ef8ed288,2025-01-16T16:15:32.180000 -CVE-2024-57021,0,0,172766e90f4b1ed59117cb0559fe32c16040ed08dfdaad03fec73582c1832139,2025-01-16T16:15:32.353000 -CVE-2024-57022,0,0,df56a6a73cef79b540d7350326eef1dc5570f342f4360a1325a7defbb2c28668,2025-01-16T16:15:32.530000 -CVE-2024-57023,0,0,d41df66e12ee48dea9911b68b69fd3e2dd6413bff89fbe7d5f003eb0363c9a7d,2025-01-15T17:15:18.183000 -CVE-2024-57024,0,0,1beec8a751780ae175322494ef7070044d054f1fa5e0ef48a3b87e0391061ef3,2025-01-15T17:15:18.280000 -CVE-2024-57025,0,0,ffe0150ee7bafc58fb550b4d8a1a7a0168a0884a7f8c6275ccd41663b84022f7,2025-01-15T17:15:18.377000 +CVE-2024-57020,0,1,9a26c0512866e98cfc951f1fde8265e39bb7efea1bc7bbbb27e268d288b0ec27,2025-01-16T16:15:32.180000 +CVE-2024-57021,0,1,8d75462a6b80d3b2fd14817ac7b68aae6eaed1d73079fcd6b2381d6ff8c9a98c,2025-01-16T16:15:32.353000 +CVE-2024-57022,0,1,e93767755cd56bba5677f8873ee26cba90de77d6f0470f7d7f8e1ce2aa5f7f45,2025-01-16T16:15:32.530000 +CVE-2024-57023,0,1,471c3b5297fa0832a730424b585b95a0579bd181dd6713e56c8e26f3c9e8e8dd,2025-01-15T17:15:18.183000 +CVE-2024-57024,0,1,03071e007e76ede73a78f5ea9c04f8abe3fd29a9a2e02e018a26f4af121e40e3,2025-01-15T17:15:18.280000 +CVE-2024-57025,0,1,f38689366db7900e87034365342cc83dc261abbf5e8c570a6be98d93d1f308e7,2025-01-15T17:15:18.377000 CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000 CVE-2024-57030,0,0,e2085dbd261ee8fb49a18a0a03fb91173298ac1c000f3b1b7e66eedd701a1450,2025-01-17T21:15:09.823000 CVE-2024-57031,0,0,4ff5f488d31f759c2a25a0bc73d06eb69144a5d62732bdf899ef3bb385fbb9c9,2025-01-17T20:15:28.790000 @@ -273230,10 +273230,10 @@ CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000 CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000 CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000 -CVE-2024-57159,0,0,15583a75064e55d87bf75fed70e73d79d360d20391d0e99a0f639f7334a5140e,2025-01-16T16:15:32.700000 +CVE-2024-57159,0,1,87b08e206ddc43db244ef415dcb6a137db640416ec561fc3cf69cd71d133ddf8,2025-01-16T16:15:32.700000 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 -CVE-2024-57160,0,0,cfd418c2294a4aad4ffaf0f6e6c02c6c9c462f90fd047701ea5321fce5ab1453,2025-01-16T16:15:32.817000 -CVE-2024-57161,0,0,7d001b6ede91e7126dba3cd73d4b23f42855fc1336561bd2cb109c174d7ee6df,2025-01-16T16:15:32.937000 +CVE-2024-57160,0,1,c55573c40a94af5aeb89725ea34b55d50a8811329a1d0da11335a64c8b0104db,2025-01-16T16:15:32.817000 +CVE-2024-57161,0,1,b551dd821ed77efd3756854f787f4707269ef93bee88c51d1fffdc2fbe9375c0,2025-01-16T16:15:32.937000 CVE-2024-57162,0,0,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 @@ -273241,14 +273241,14 @@ CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d02124 CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000 CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000 CVE-2024-57211,0,0,57b520ff240cd1b95722e462b132296a6ab5311980b04d2750462f237d1cf6b2,2025-01-15T21:15:14.057000 -CVE-2024-57212,0,0,ec6e149d277d1971a4be9cc9ccc4b09a27f9df022cacab3ca719730b9bd3a1bc,2025-01-14T16:15:33.120000 -CVE-2024-57213,0,0,da38e8db9d9624bfb17e9b74dcbb1d9c9b4d9164a614e7e55222409b4b1ba115,2025-01-13T16:15:18.460000 -CVE-2024-57214,0,0,88774198ca1615fe7c85c8d15ba3ecb9d024222f80b5ad4ede4275a8640ddc74,2025-01-14T17:15:19.380000 +CVE-2024-57212,0,1,02f0c3c990f43dc5ad7a5cdfc22dabd4b73f6ea68fed4798ef396b0d12c08bba,2025-01-14T16:15:33.120000 +CVE-2024-57213,0,1,6d05dc6754ea939729bcf024301246dd01a8f636faaeafb49846911119b23ddb,2025-01-13T16:15:18.460000 +CVE-2024-57214,0,1,c302653be8f0b35b51736b51584b289e93c8c8ece49769343b0676b73570dca3,2025-01-14T17:15:19.380000 CVE-2024-5722,0,0,fb2626652051e86b0980edf17cc31d2c7d3932c3a2dc5ba698d58a7b1606523e,2024-11-22T20:15:10.787000 -CVE-2024-57222,0,0,bddbdc8f278a6d79bbafdfadd56296b1ae6babffc483678c3d81d31de6931a10,2025-01-14T17:15:19.537000 -CVE-2024-57223,0,0,7aa014bd144e210943598673adc96f88513f7f5847e8e5029067c6d35453604b,2025-01-13T21:15:13.637000 -CVE-2024-57224,0,0,d743b28053138e146f17b7d9d8eba5f98ad07a1fbfe64e9ab1d1f1b2b7162bec,2025-01-13T21:15:13.773000 -CVE-2024-57225,0,0,e72498860bbaa18f2a0eb6b55d3b3d2e7524cdea4fc6c5c9b67999bdcbb71019,2025-01-13T21:15:13.910000 +CVE-2024-57222,0,1,6c9ff9ac1c071c7537cfe8e7731f8b445bd04d0328980fd45732215f43127f52,2025-01-14T17:15:19.537000 +CVE-2024-57223,0,1,2f5c70a62e59e4b0b6f2c01a8a9727435737b94b479bc49253cf797f189d2eb8,2025-01-13T21:15:13.637000 +CVE-2024-57224,0,1,975cf43dd81ef80055ddcee1afaf95fbe473648b4a3f6a90f5ea3622071cb1df,2025-01-13T21:15:13.773000 +CVE-2024-57225,0,1,0f626873e99e00c755c8c3df1293eb7b3cb77d6777a17558eb107c8ba1ebe685,2025-01-13T21:15:13.910000 CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0ed7b,2025-01-15T21:15:14.303000 CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000 CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000 @@ -273274,18 +273274,18 @@ CVE-2024-57372,0,0,c305f1ff8dee898dc877fd7092322892cec8b12f543ffd49cc6c6aec831bb CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 -CVE-2024-5743,0,0,d0e55743955a19a87c824f43f113517e2001f346d7c0d7dc8f98ceb853b6977e,2025-01-13T18:15:19.517000 +CVE-2024-5743,0,1,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 -CVE-2024-57471,0,0,145fbc3b96e42a3173f3b55f1aad8841303816fe57dc70045a074e6b22fc6982,2025-01-14T22:15:28.250000 -CVE-2024-57473,0,0,4a06c351ec4197093875235f4e4e13625d8ca2f2c014e27311d357d6ec947011,2025-01-16T16:15:33.183000 -CVE-2024-57479,0,0,6416e6efdf0ec6f7279b069a88a5f2d939db89704d80d9b571b5e5c8307ef185,2025-01-16T16:15:33.360000 -CVE-2024-57480,0,0,ae550c150edeff2d75d93b8c880b84ac2ff14590c3607fa6a41f8d09d7155b8f,2025-01-16T16:15:33.530000 -CVE-2024-57482,0,0,e55bc843860f398351ad31fd6ef63a269964fccfafe0015a0cd579c60f5d74e7,2025-01-14T22:15:28.627000 -CVE-2024-57483,0,0,aa52744906feba9d896ee7890e1fb7bf22df892381b4c0db41db475d58b23bd8,2025-01-16T16:15:33.710000 -CVE-2024-57487,0,0,0807b290efd6cc8f6e7e6b31de66036ade21e0044433af00698c818fcbb278ba,2025-01-13T20:15:29.090000 -CVE-2024-57488,0,0,d19c2052fbaefedd169eceeb76f3704e3b884097b8c5ff84fd1ae0a72fa1e299,2025-01-13T20:15:29.240000 +CVE-2024-57471,0,1,835a2146e459309f7f2dddec90a893686be45b1de486ca0a3c1703651cba8046,2025-01-14T22:15:28.250000 +CVE-2024-57473,0,1,5e3e2f533ef78e6f4b74e928a4bd67c4e25caa058e34b8782863e4b551c04e05,2025-01-16T16:15:33.183000 +CVE-2024-57479,0,1,cc2b3a57b7a4614cd898e8ee3788a1d22119e874e2d5e1b2963e5824e56759a2,2025-01-16T16:15:33.360000 +CVE-2024-57480,0,1,1335ba4fc2f7a30a85ef4ca3b3b5f095203e3f52baa3fc3c668a26242cc217c0,2025-01-16T16:15:33.530000 +CVE-2024-57482,0,1,b2e3c0863aea3764c56d9d3a29e2d004e80c1dc23f3d2d5131c52b69f66ca3ae,2025-01-14T22:15:28.627000 +CVE-2024-57483,0,1,42f78ad72eefb62ad9fc5fc46850ff2f6a434ca41fcee6006d9831dee74ede79,2025-01-16T16:15:33.710000 +CVE-2024-57487,0,1,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000 +CVE-2024-57488,0,1,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000 @@ -273294,7 +273294,7 @@ CVE-2024-5754,0,0,f2c4f40343fb16d68e3a72c7a389800b829b93f31dea5ecdb29b9f34a3018f CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff1173d,2024-11-21T09:48:17.093000 CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000 CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000 -CVE-2024-57575,0,0,0325e9b9beebc39d453bf2fb98a790fc58c0448755bf827de5d20c6d07a85690,2025-01-16T21:15:16.537000 +CVE-2024-57575,0,1,4c20e12c2159ee9823e8ce70147259a0cf06d0b26ef1058991f1959b2f49e863,2025-01-16T21:15:16.537000 CVE-2024-57577,0,0,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000 CVE-2024-57578,0,0,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000 CVE-2024-57579,0,0,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000 @@ -273302,11 +273302,11 @@ CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee9 CVE-2024-57580,0,0,bdb0b94b78717db32044fb1ebf152be16356daef98584c7a2fbebb19f878301b,2025-01-17T17:15:12.410000 CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad2e3,2025-01-17T17:15:12.597000 CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 -CVE-2024-57583,0,0,0a9b32a2c9e5a9aa7a9b9841c10dc898724b6f12184bcb5639e412fb8b164e68,2025-01-16T21:15:17.800000 +CVE-2024-57583,0,1,3ea8c345c22dfdd34c10584c8a9369f8b980af48e02c5051532800fb546089d2,2025-01-16T21:15:17.800000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-57611,0,0,6fae1f378c2de7211d8601642d793b718892b838d45e3641195667b838c7ac2a,2025-01-16T16:15:33.893000 +CVE-2024-57611,0,1,e23c6948d65a5243c368ddb9d20386aa125c64c82a7a8dbb52b2d18c0c979c46,2025-01-16T16:15:33.893000 CVE-2024-57615,0,0,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000 CVE-2024-57616,0,0,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000 CVE-2024-57617,0,0,fc37a9143f7697345ef8ba885edb5924334e0ba6c92722d5e2e2d86f18a312b3,2025-01-17T18:15:29.803000 @@ -273316,22 +273316,22 @@ CVE-2024-5762,0,0,c0d3df55e57fc9acf7b150356443c67a5f0ff2ceca17905a4d2ee526faf141 CVE-2024-57620,0,0,d6e0d0ade604a140abb5cad58c05a8b4c6c907ecfc6f8cb07eb21993cb075577,2025-01-15T17:15:18.627000 CVE-2024-57621,0,0,2b3908dd9534557b6a330a16e92aa12f69f40991853c1d18119b151ede0a8417,2025-01-15T16:15:29.100000 CVE-2024-57622,0,0,8762b7a2eb21f8a7cf0d36bae7fe0457d7130b0c2d9c683d7da5e928205593f7,2025-01-15T16:15:29.310000 -CVE-2024-57623,0,0,7987e2b9d0e9815755838c3ac100dec7b1db446aa27f96c2e9c877531cc27218,2025-01-14T19:15:32.677000 +CVE-2024-57623,0,1,b13d62c5f9674ab5b54705b4ff6b296bd9a310557dc0be0cd71dba6eb3430ffe,2025-01-14T19:15:32.677000 CVE-2024-57624,0,0,2cb5b2759ed2f9b5486eace5d935476aae1cd4896fd47ab11ae582155fe393fd,2025-01-15T16:15:29.483000 CVE-2024-57625,0,0,b9355563bf7e15fff3d4f5659147af5237c2a0e2f3371cac3ac04f7007905ef7,2025-01-15T16:15:29.663000 CVE-2024-57626,0,0,ed272fa998077de9328a7a7d7b2e302d9b8c56dcf00a9e48193117a9a574d7c1,2025-01-15T16:15:29.840000 CVE-2024-57627,0,0,8239fa834d9ba5c3704bbff926d902ecc13387b7d4d2283829fce7c090a8ad4f,2025-01-15T16:15:30.030000 -CVE-2024-57628,0,0,0f4f2760bda21830d1ff0e30e855ba7d34191094c6aebc07ee3fdfffc6a02418,2025-01-14T17:15:19.677000 -CVE-2024-57629,0,0,9e0bf98add46ccd47e1ba272742009a9e65f8f594e592a0332882e46b62b30db,2025-01-14T17:15:19.813000 +CVE-2024-57628,0,1,238daefa7629bf0c6b2f2bf47b3435e8ddb128b81608110c5c908a3a14ec78ce,2025-01-14T17:15:19.677000 +CVE-2024-57629,0,1,134746e8f9cd89c3c4e9db1d20d7c354abe4d58711d112776ac66213389ca562,2025-01-14T17:15:19.813000 CVE-2024-5763,0,0,dc494ff2400e697d6f940724dfbc5efc797a51bdc4f3713b20544d275c30dd1b,2024-09-03T20:31:30.480000 -CVE-2024-57630,0,0,5a6bbfcc7bdd6578343f4df981159a622606292ab2b4272c3a65312983cac851,2025-01-14T17:15:19.950000 -CVE-2024-57631,0,0,aa68d0ce06527e5796b17989324505b8f479177f87be99312eec197fff675e39,2025-01-14T17:15:20.093000 -CVE-2024-57632,0,0,c48ed3417006c8f0c5aa338753b6fb593c7e906811f1d72afd84558e72ec057c,2025-01-14T16:15:33.277000 -CVE-2024-57633,0,0,62fef2694bcd63d0c7a10f08e0a68e5b847e719465e5fe16d2543d988b9c5946,2025-01-14T16:15:33.433000 -CVE-2024-57634,0,0,0ed599ce45916397e511bd0d9601a23ffd6f1d87b0ea8729a0f45ecfa3dfbf63,2025-01-14T16:15:33.583000 -CVE-2024-57635,0,0,e724ac4022c3346f762458adbdffbc94d6ecedcf6aefe4493ed9e9aa4362d2c2,2025-01-14T16:15:33.743000 -CVE-2024-57636,0,0,ae51a257cadf3e440793388fbefd63d01043e77c098d8d6ea7f5014a96577904,2025-01-14T16:15:33.907000 -CVE-2024-57637,0,0,d2e5c35431613c5454ebf6564cedd12435749e75444e098abf75fdc086decd3e,2025-01-14T16:15:34.070000 +CVE-2024-57630,0,1,7e7e9b7238d0158de010ae0bc04cda852b4a3c1aa29a2d4befbeef1aa78f3afb,2025-01-14T17:15:19.950000 +CVE-2024-57631,0,1,4821a41eed12de08849a174b0da739bc97cac46d5c047a900e9974f586aa9625,2025-01-14T17:15:20.093000 +CVE-2024-57632,0,1,19877266c2cf2f49290a1d569f23636f7028d036327ce16bbaecf1728649a96d,2025-01-14T16:15:33.277000 +CVE-2024-57633,0,1,751e0ab35ca5a1efdabfc837b2bbc0c6edd781411280b649e2c048c865a15904,2025-01-14T16:15:33.433000 +CVE-2024-57634,0,1,f867acb3868dabb25e3a3a0b5409e06c98c1482009f17ffd7491ee722f649cef,2025-01-14T16:15:33.583000 +CVE-2024-57635,0,1,f351bd908929b784a223a91a5f6aa6b9b1c4fe415f7ae2bcd1ab08fd42c516aa,2025-01-14T16:15:33.743000 +CVE-2024-57636,0,1,d0e565c0dff72c6ea0982391b44fdf984e106fd5d6b59b0760addd9cfe969217,2025-01-14T16:15:33.907000 +CVE-2024-57637,0,1,9fa5d278af6a43348f247912d387e7524744efc37b49adea3d619cf820c579e9,2025-01-14T16:15:34.070000 CVE-2024-57638,0,0,9dd4e57860ccfdc983aca2e95a17223bfff96883ce295e272db263c7f46ad3b0,2025-01-15T16:15:30.220000 CVE-2024-57639,0,0,81c18119d0796036207b52600fc301d317795cf7d5d03a2144ee581f0cbebd4f,2025-01-15T16:15:30.393000 CVE-2024-5764,0,0,b7612214e0b4c36a7adafd04d08b4fff0bd1bfea33c567d6f09d0bd135904604,2024-11-06T16:41:00.277000 @@ -273350,7 +273350,7 @@ CVE-2024-57650,0,0,299e46e3abc171811e439efcdb7f787c46c9d18dbb03cc5ec582088c052dc CVE-2024-57651,0,0,5e8dc54af74efb76238cdd0ddf66365828c5c6ae77832d24a8a6fc6b71203e63,2025-01-15T15:15:12.963000 CVE-2024-57652,0,0,d73e7be12017c8f1cd68a94beba6a947fa401580f763e064115069718c3a2579,2025-01-15T15:15:13.130000 CVE-2024-57653,0,0,f0844ba7fc5fe95e0da3ff7a326d26b9ddffb3823051fc053b91d42777536052,2025-01-15T15:15:13.280000 -CVE-2024-57654,0,0,1f36c570d3c73ce0b10c8e01c3bdd9d98940d2fa1bf0651ab84ccddd6ae64969,2025-01-14T17:15:20.233000 +CVE-2024-57654,0,1,7f766ad02bc18df38721852911dbcc4b021e73b25a35d8fd990c3fd3aec04d8e,2025-01-14T17:15:20.233000 CVE-2024-57655,0,0,6ae80ede19f84bfc2d837a6696f1a2dc10564bd3b6fca17e0cef6270b9ace48e,2025-01-16T16:15:34.243000 CVE-2024-57656,0,0,a6ec84858b960f44a1db9ea182c5a6a8e009fc3bb4ad680569afeb4b39021c63,2025-01-16T16:15:34.417000 CVE-2024-57657,0,0,a27eb7c740910d603d2da6e8216356c55267a515c0c0f5f41ecaab0db65288db,2025-01-16T16:15:34.600000 @@ -273358,27 +273358,27 @@ CVE-2024-57658,0,0,7ba79731ac6516d08c5b7a7d567ffa13c8af56b1cb49724aebc5463b51ea0 CVE-2024-57659,0,0,f32b1ab826823776ca0c8a17c8694a17edb2ecd676fd6e2f2814340b2ca52fc0,2025-01-15T15:15:13.450000 CVE-2024-5766,0,0,cdfccc92ec2c159269346acd4c1a0ac28434fd31fc36fe70d66da845920ad03f,2024-11-21T09:48:18.263000 CVE-2024-57660,0,0,c7c5b4211c716ae36757bbc03c5947aebf289f8ce358d716e4b1fe5714c0608c,2025-01-16T16:15:34.947000 -CVE-2024-57661,0,0,e8f5225c0a5f8c30ef676d9af05bfb14131ce33fccc8e1730da1ca222cad480e,2025-01-14T16:15:34.240000 -CVE-2024-57662,0,0,82223b4f40f12b96f5423e36ea8f649d2dfea4cbf0a26f28016781049d041217,2025-01-14T01:15:15.087000 -CVE-2024-57663,0,0,10f1486df8c3f5a82c4f86c80f328ec8760cb83f380bd29bfd86da9af10ac259,2025-01-14T01:15:15.187000 -CVE-2024-57664,0,0,495a30d278c52ee34887ad9e1f6fefc6fa5a4cb23e9094e753a9604bd1380128,2025-01-14T01:15:15.300000 +CVE-2024-57661,0,1,6d08cb67e58ae875891d256b6bd08dc049d206ee925b20ca33928959aac61174,2025-01-14T16:15:34.240000 +CVE-2024-57662,0,1,497a541bda590c2f9ebf3e5ce9ac42735a7d31875c470e2caf657676953587c5,2025-01-14T01:15:15.087000 +CVE-2024-57663,0,1,5ac7de15c7346d57a210074182ab71be8cf5f00fd446326d86f667bd027794a7,2025-01-14T01:15:15.187000 +CVE-2024-57664,0,1,34f3acf7273fba0b7097388524e601d43a7b7780b344226ddbd78e638ed009f9,2025-01-14T01:15:15.300000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 -CVE-2024-57676,0,0,392b9407535234ea88060b71d9d56b63ecbdee48b13a00bc0aabb302edabecc6,2025-01-16T19:15:28.937000 -CVE-2024-57677,0,0,587420cee0d4447f0bd6145f7ebf171b7d8cd1b3d9fbb45d385161991d77af29,2025-01-16T19:15:29.033000 -CVE-2024-57678,0,0,6835383b3053a766029806c0076775d5a30ba4cfd3bfa69e898279602894def2,2025-01-16T19:15:29.130000 -CVE-2024-57679,0,0,9fda0f12cca54a44f03e49f1960e9547205ca4e368b17687ec25083624479d0d,2025-01-16T19:15:29.220000 +CVE-2024-57676,0,1,a49f538a163d3fdd3a676681b99713cf81bdc66c7ca20ed46f30b914e62b2b80,2025-01-16T19:15:28.937000 +CVE-2024-57677,0,1,6bada7bd64d4faa95bdf964d28bc0122443aa69975270ef1a0e46b2cfbef60a5,2025-01-16T19:15:29.033000 +CVE-2024-57678,0,1,60895dee68337829bb9a183df1f25ba3dc4db414ec30a413d78290eab9b69b3d,2025-01-16T19:15:29.130000 +CVE-2024-57679,0,1,bc76049ea394b26d369c311264a51d09d7eca35be077a1c86b06186b0e2c82c3,2025-01-16T19:15:29.220000 CVE-2024-5768,0,0,6c9ff2121591327d1892929b36d619819744c12030a51756837ec582065802b9,2024-11-21T09:48:18.613000 -CVE-2024-57680,0,0,d1911181bb4c5fb23468070277b0a39d0d1c914721682838a3b1e34b4f5807cb,2025-01-16T19:15:29.323000 -CVE-2024-57681,0,0,7b26771db3efdf99fbb1093568f62df72d15864c052a6f0d783eb2a162ef63db,2025-01-16T19:15:29.413000 -CVE-2024-57682,0,0,0d6e69929d204b6ccfeb2e42bd6f48ebc6bc0d0f37e8bd2127f11fe0410f1239,2025-01-16T19:15:29.513000 -CVE-2024-57683,0,0,440374b397e1e19fb6a9ee16c22d170cc0635c62b6919e2f20281fddc1e61aef,2025-01-16T19:15:29.603000 -CVE-2024-57684,0,0,3a309c340f6a612a35a35d49cb3f60932daa24202c0540dc8d0143cefcbf5a31,2025-01-16T20:15:33.340000 -CVE-2024-57686,0,0,9693f74223f7ecaac36b2eca4db89cb00842aaac043c797c5e6ab0d3b74faceb,2025-01-10T15:15:16.003000 -CVE-2024-57687,0,0,1fac24f111ce948aa649d677d5475281ca9e9effa31423b615dde7128b0c7319,2025-01-10T16:15:29.670000 +CVE-2024-57680,0,1,ee7fc7e8f7c961cf1ae9016f17c462c31cdf5a480971780eb31493afa0a7d5ec,2025-01-16T19:15:29.323000 +CVE-2024-57681,0,1,229cfd4e9bf30e8660224f4ef2f78ad35e0f702557e021003ee5e8783fcd0eb2,2025-01-16T19:15:29.413000 +CVE-2024-57682,0,1,c322f70e47271344c39ac95f2a359d01e4837ec421db40823c29065602c367c2,2025-01-16T19:15:29.513000 +CVE-2024-57683,0,1,5d86e0d1a01cfdddaf97afd0fc212e55cfc0791ad907b663eea07c1c0b9cc46b,2025-01-16T19:15:29.603000 +CVE-2024-57684,0,1,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca976,2025-01-16T20:15:33.340000 +CVE-2024-57686,0,1,bff67f4870fa1a425dfb954d4d6446624978b67b9e08d7ce0318060f20535c1f,2025-01-10T15:15:16.003000 +CVE-2024-57687,0,1,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000 CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000 -CVE-2024-57703,0,0,0203df5da323a96584a38b6fa738ccf6034fb9c5e6032c293242307ef835f093,2025-01-16T23:15:08.003000 -CVE-2024-57704,0,0,87a662fc8d0c6064a98eb7da61d2802fb2503a6f07733691bcf11f9afc4ee36d,2025-01-16T23:15:08.113000 +CVE-2024-57703,0,1,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000 +CVE-2024-57704,0,1,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 CVE-2024-5772,0,0,04004702ec5106d11d8a70be9a1c34eceae4a60526afd5c3eb12e840c71e6683,2024-11-21T09:48:19.003000 CVE-2024-57726,0,0,820a1b6bdd15a37e6d3db682d2d771037a99eedc4ad8f92c40f8d91529800064,2025-01-16T21:22:00.710000 @@ -273387,97 +273387,97 @@ CVE-2024-57728,0,0,fb354679bf974c668fb55e36081142c182c86cd0df2050f9f41db69466838 CVE-2024-5773,0,0,a81a8a1444339b4362dba96291597bd9b9bbe8a53c3349e61bbda1dd4baa2ba4,2024-11-21T09:48:19.137000 CVE-2024-5774,0,0,182237f03fac5ad01b6cf92f6ccc93f0d61ab5b7fb7feda9e18228a971243a2a,2024-11-21T09:48:19.287000 CVE-2024-5775,0,0,eff3a9e000ae3b4a06b459cf75b528d8b54ca1fbacd81a4ce76a1b5fdf71ce7c,2024-11-21T09:48:19.440000 -CVE-2024-57757,0,0,636bd9335b57c6c44557e818a7ce600f027c2b9f3f26cf28979952663e4f9608,2025-01-15T00:15:33.670000 +CVE-2024-57757,0,1,d9a58056cab87779016bea1d3843d2f489ba9cc22d13fe5d26b10558db3ac6bf,2025-01-15T00:15:33.670000 CVE-2024-5776,0,0,86888fe7b4b003fb18d3d2ba32b739edbd6c9d68a474b51eae89ea9740b7db86,2024-06-12T08:15:50.920000 -CVE-2024-57760,0,0,524e386f3adeb43cccc2d5f22b548dcf191b9c111d57e50887754333110d8b3c,2025-01-15T00:15:33.780000 -CVE-2024-57761,0,0,cc3837e8d876674c73c0090f8db37371b20c811cdbc28dbb79ae4b01e3074a25,2025-01-15T00:15:33.890000 -CVE-2024-57762,0,0,0dba3fde8c5425105e1e7f3c3dc73ce99d1873223203a9e3c31f6e05ce47b480,2025-01-15T00:15:33.997000 -CVE-2024-57763,0,0,df8dd0c9f7979baedfbc3e4e7812dfc635f31730764945fb60d903b04e5ebd57,2025-01-15T00:15:34.110000 -CVE-2024-57764,0,0,3cd9e45ed954c368ca54c9cbce60c96dcde31d52c07d079203117bd00108dfa3,2025-01-15T00:15:34.217000 -CVE-2024-57765,0,0,6f15a3a607d40a0f75d69003588b78a560775ad59d258daea1d42c4f28b5e872,2025-01-15T00:15:34.323000 -CVE-2024-57766,0,0,e0e048b4421fccb07d8708542e32dcef1a59cbb8b6e613b7067f5ff9210d3a7b,2025-01-15T00:15:34.433000 -CVE-2024-57767,0,0,4f47def2a552fd83c7f1d4d6e4ae3f549133dbbf6dd763e021c9ec2612ee896f,2025-01-15T00:15:34.543000 +CVE-2024-57760,0,1,befacbbd43cf17b963e524a0466bd0f5cabe38c4d6a3c15da6f4575921e08d3f,2025-01-15T00:15:33.780000 +CVE-2024-57761,0,1,fbed92f0a27cd2224558eca36577717aa3a62903bd817dd6d62db472e01324b0,2025-01-15T00:15:33.890000 +CVE-2024-57762,0,1,fc1e0e03c24bf72d7cc8b610f03b90e4c7b8719b796fced52e3521bec40cd3ea,2025-01-15T00:15:33.997000 +CVE-2024-57763,0,1,09da2a5471d970fa6656cb56da23a876d7c2076b86b6232cf37ebe47839f1ce9,2025-01-15T00:15:34.110000 +CVE-2024-57764,0,1,c7e67a5e9e0c9cc0bd1c87c8001a83140b4a64eefef9547c81a33e7c7aee586f,2025-01-15T00:15:34.217000 +CVE-2024-57765,0,1,bb5f0bdcee1790691f17d8834f335b790811b9389ec0c6763671ac65c55be676,2025-01-15T00:15:34.323000 +CVE-2024-57766,0,1,8f0d61778f541b88c287d10c0f6e2af8e8d7fcb63b0a840bbdf68bc276d18da5,2025-01-15T00:15:34.433000 +CVE-2024-57767,0,1,dca7521d8c2d164ca91c3f80ad6518d83fadbebdc631af42baf521d4db6c6f0e,2025-01-15T00:15:34.543000 CVE-2024-57768,0,0,e00f69a24549670426cf3162728515b005047dfd2006716c80c3c15216823f81,2025-01-17T18:15:30.633000 -CVE-2024-57769,0,0,aea34cf08a50e96f92a70cd4d77c89677f767e9d8b6997dc91b80d05d2f4ccd4,2025-01-16T18:15:26.240000 +CVE-2024-57769,0,1,b999fe9cd6d815b37615c202124914c6be25fb061629ca55f8b8761ee0e8f08f,2025-01-16T18:15:26.240000 CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000 -CVE-2024-57770,0,0,8a53671804fae0721e612ad4b61e46de8b57d7cd0199ba1a2b0e09a6e9e11664,2025-01-16T18:15:26.477000 -CVE-2024-57771,0,0,2ed98c34902e22a70e7b63a5e54276d184dbbeae4239fdbb56a8bc0d123677e2,2025-01-16T18:15:26.717000 -CVE-2024-57772,0,0,e6fe6cbb354fa2200298a78f4967828bbfdf37d3f5b00c38e963c3e8388740bf,2025-01-16T18:15:26.940000 -CVE-2024-57773,0,0,601aba151fd19159151205e88e5dd588a10d16eb68de27f849a6227a81932856,2025-01-16T18:15:27.173000 -CVE-2024-57774,0,0,52fce27e3dd31606833944922f51e291b476b3d4e853efcfea2411756ac1f99c,2025-01-16T18:15:27.407000 -CVE-2024-57775,0,0,bced128f47f27969b45b4ad208644666ffdbc83639a349068438129ba6a37530,2025-01-16T18:15:27.633000 -CVE-2024-57776,0,0,c0a67b49a90cc9b9d7a77b20fc281aca2d07f8bee130f1d93a078f1b92e37c86,2025-01-16T18:15:27.870000 +CVE-2024-57770,0,1,c2670ecc7d10147061f09e3a7e216daa7b7961162680fe996d6040fe901c7730,2025-01-16T18:15:26.477000 +CVE-2024-57771,0,1,54d12516a8986c983e0f65536543290fc19c1b9b42cdd7c55c37136f73e96ec5,2025-01-16T18:15:26.717000 +CVE-2024-57772,0,1,eb0dc1204a0b4c137c5f568fdb6e4c75fa150b8774efdffefd163e756f4741ff,2025-01-16T18:15:26.940000 +CVE-2024-57773,0,1,e65d6b7d180053073964fd770776b5f1c4a22c806baf705c6f6acb4a1cdd0d30,2025-01-16T18:15:27.173000 +CVE-2024-57774,0,1,8557cdd2fc625f64456d4c72d742239928d440d054c38c34276e60db398f8f28,2025-01-16T18:15:27.407000 +CVE-2024-57775,0,1,10091268f59d36a89c0555c6e2bbf6b1502819a2ceddda3c031d0797e713b4c8,2025-01-16T18:15:27.633000 +CVE-2024-57776,0,1,eaab98e11b19f3fb779abcf8d8f9f304af86ab319f8e72a23ae3da3c19719e8b,2025-01-16T18:15:27.870000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 -CVE-2024-57784,0,0,9546e8fd431803ef650e343985743ae857cb64ea703a818732196b727c298ed5,2025-01-16T23:15:08.213000 -CVE-2024-57785,0,0,89fb5ec9d122b3520c70c79582f875bef583dd514ebb658a6ebc71dec475f92d,2025-01-16T23:15:08.317000 +CVE-2024-57784,0,1,13e3853bb84451bd96ad42acd016f282a76aebd120900fc78df88a4edeadade0,2025-01-16T23:15:08.213000 +CVE-2024-57785,0,1,135792af397929898d575e62bc51d4dfce68cd8f2d0c7ad555f4b589f8dc76ad,2025-01-16T23:15:08.317000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 -CVE-2024-57791,0,0,83661499662923b8e594bd3c5dc0a8d681b527e42b69f986563d1222446c0028,2025-01-11T13:15:29.253000 -CVE-2024-57792,0,0,6e269b164ed4b92d7ee67a16ce4bb2b798116be1f2f74c49e5fe7106cf774365,2025-01-11T13:15:29.420000 -CVE-2024-57793,0,0,ddff963b18d692955008250e9218f73e3d5ef63f700adbda8c83ad04b140649d,2025-01-11T13:15:29.593000 -CVE-2024-57795,0,0,c2a5063c8f1801ea9df88f89cc652569c28f5949d414c2d9e0f838251918046f,2025-01-15T13:15:11.563000 -CVE-2024-57798,0,0,c0ed58e8d48adaf3dc7d7b1d21c34c9a829d25d23c734c3cd4da62041dc5e18f,2025-01-11T13:15:29.743000 +CVE-2024-57791,0,1,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000 +CVE-2024-57792,0,1,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 +CVE-2024-57793,0,1,cbf0da07a4c9afee3e09b6e7fa843829f62740c20d9e81fcd5d7f4c67ce8d3d2,2025-01-11T13:15:29.593000 +CVE-2024-57795,0,1,c27fd0f8d7d3c2986e45448963a7c33f5baa1cb6168473b82dcd9b787e8c4fce,2025-01-15T13:15:11.563000 +CVE-2024-57798,0,1,4a1f3bb2d59332011559f877ff25acf23b999788a69bcc4818b5054d0f8fede0,2025-01-11T13:15:29.743000 CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000 CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000 -CVE-2024-57800,0,0,c5c42b2c1b3842383a35b5f8d69b8ba4f954a1a479092b7d8b0ba19a17185b1c,2025-01-11T13:15:30.073000 -CVE-2024-57801,0,0,b678c653b3040716f0728d34f9877080bb6c97565222e300a13b3753b95364f6,2025-01-15T13:15:11.713000 -CVE-2024-57802,0,0,60e12d524b3841786218547e3064394971f60c328ca3e8a023f3f8608fd7d0cc,2025-01-15T13:15:11.853000 -CVE-2024-57804,0,0,03a655c7bbcb3c9fd29c388335cd9c43ce0dad312096483bb7f62c252b182ba1,2025-01-11T13:15:30.233000 -CVE-2024-57805,0,0,c0fa1218e16605062717599d97c87173c53c7e6ec913d615ebb3e2b0e18c8587,2025-01-11T13:15:30.420000 -CVE-2024-57806,0,0,019cc1f303b977f37ee697aea77eacdcb7c64dccefa2a11f2e9b2f2ac1ba30eb,2025-01-11T13:15:30.597000 +CVE-2024-57800,0,1,cba23954046252112d98695b858677ce05a5b64f43351feb6661ff0ff5118fe8,2025-01-11T13:15:30.073000 +CVE-2024-57801,0,1,7caf11381547b068d815a747c86b5d5f760de9731595c4d93db0acf80915d939,2025-01-15T13:15:11.713000 +CVE-2024-57802,0,1,0de3a85ddf3b671a4ba53ab202e44e9ff6f9bf3e3dd8d47bf001a675d9aaeeea,2025-01-15T13:15:11.853000 +CVE-2024-57804,0,1,2e8c7c2f68203a9240321499295c1f61d9543b4540c5cc21c37daeb1505f962d,2025-01-11T13:15:30.233000 +CVE-2024-57805,0,1,bc40671e9462a1a591ce748bca1cbad4ea157fda1f58b46b62ec98e226bd31c9,2025-01-11T13:15:30.420000 +CVE-2024-57806,0,1,94bf05899e554571ca6f5148a6d1ee19228706ef703b456f2972589c6eb9756a,2025-01-11T13:15:30.597000 CVE-2024-57807,0,0,7c167a71bf4213c73b2f4023fdde2c2f3e50104e65076319414a8227aa52f9f3,2025-01-16T15:19:34.147000 -CVE-2024-57809,0,0,de2e3d10a38eb17297e0b63db428739f373043b7a0a3a88c9dcbf5bb2a5c6fb9,2025-01-11T14:15:25.080000 +CVE-2024-57809,0,1,51964812a012bb15a8c29d699a7e896d9a20f1214c988c7a07b48dd2bd01f25b,2025-01-11T14:15:25.080000 CVE-2024-5781,0,0,69395241527fa89308022b467956bfc8d570e92d8c337ad970260c71cef498ec,2024-06-12T08:15:51.363000 CVE-2024-57811,0,0,60bcb98410f82c01b6c379325d6adadeedd616825b5491b71cece8e8801178f8,2025-01-16T18:15:28.167000 CVE-2024-5782,0,0,3007fa9c37260ea7caeb87e42b238e099fb02a0dcdaea4137ab796f4ff5698b0,2024-06-12T08:15:51.423000 -CVE-2024-57822,0,0,8458651cb53a99880f0cbbbe484b34e3e7b673f78d525ed0f203f8ee0c783222,2025-01-10T15:15:16.337000 -CVE-2024-57823,0,0,ce9e1886072fcefc22a66f2c450b9ee2aa3eb44d9a6ffc06c176c717eb634915,2025-01-10T14:15:29.583000 +CVE-2024-57822,0,1,43973cb11c0d7745a76972fd2125c40dd56918f079243999a6a248fd7bb74d81,2025-01-10T15:15:16.337000 +CVE-2024-57823,0,1,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075fc75,2025-01-10T14:15:29.583000 CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000 -CVE-2024-57838,0,0,f85a499de384339de4a4a71cb75bd53b174dba57e86a4be11bb2c2c6c084d3f9,2025-01-11T14:15:25.940000 -CVE-2024-57839,0,0,032b45ae1cffa722bef05fa028292895e4d90fa90482cbc8605d00863c104848,2025-01-11T15:15:07.050000 +CVE-2024-57838,0,1,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000 +CVE-2024-57839,0,1,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000 CVE-2024-5784,0,0,79d7c651de1735758dc5225e9f9f2125237472cf1705bb9d1ed95eddc5ac5820,2024-09-03T14:48:19.570000 -CVE-2024-57841,0,0,f5c34dac1e1dd2dd6106cdbc49fda3356663d43b0d48289bdf743514fc12dffd,2025-01-15T13:15:12.130000 -CVE-2024-57843,0,0,dd4f60110148da4865130a4b67434c05bf37cdb05112f1c822d44a309c31d9ef,2025-01-11T15:15:07.170000 -CVE-2024-57844,0,0,3393632a32e62500243729da86efd9a66607ad4f08c4081b932e3ee432c7988a,2025-01-15T13:15:12.277000 -CVE-2024-57849,0,0,54260cfa359dcc8ee204cfec623e823ad41d4caa81589401b2671c7591230d31,2025-01-11T15:15:07.290000 +CVE-2024-57841,0,1,ef8bd805dbe1a5f318c4d06f3f5d21d30958fed0165e45d687f26aa9fa2b10ca,2025-01-15T13:15:12.130000 +CVE-2024-57843,0,1,a291eea3f115dccf31a54bfbd28c6238356a52daec4febc3cf5227594411c753,2025-01-11T15:15:07.170000 +CVE-2024-57844,0,1,f734d8e057021cf9231035e98438abc5d0e9fed583f1c26eb8ba3bf110c62926,2025-01-15T13:15:12.277000 +CVE-2024-57849,0,1,420286e04a2b5df2768777fd4bdfc11c4ee05ccbead76e085b79ccd6c51b560b,2025-01-11T15:15:07.290000 CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000 -CVE-2024-57850,0,0,9a81fc0a298973cadd8035bd9ef5a52d4350cca966d13539c02d81dbf66143be,2025-01-11T15:15:07.423000 -CVE-2024-57857,0,0,87a69076e18c898d29feb4f9ba18aaf14bdd5b721cb93d3f817a29d27d67e0d8,2025-01-15T13:15:12.403000 +CVE-2024-57850,0,1,47b5473b2f10d731d0387dd9768f510a3a9dbe99cecf1312c304ff971055ab13,2025-01-11T15:15:07.423000 +CVE-2024-57857,0,1,42661a463d36aadb20f3e64c41126783ca9e0b1df58ab33691cea597d9ac1a2b,2025-01-15T13:15:12.403000 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000 CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000 -CVE-2024-57874,0,0,fb7bf8e334f98602ef537ee1fff4a394e3778274e92bdaf9be82f3357123b9e3,2025-01-11T15:15:07.680000 -CVE-2024-57875,0,0,f3dcb83145c83305accff33176d8c6888ebdc6e8e8dd674dec8648327cacf2fa,2025-01-11T15:15:07.803000 -CVE-2024-57876,0,0,17df6ee7b8eefc67d5b8d8002ec729347e35d22e1eb6f1ad8cf3fc55eb250f8a,2025-01-11T15:15:07.930000 -CVE-2024-57877,0,0,b7350952263e8e88d95b015a1cb17ea82c9bf87c3880897f0be6efb647f9eef7,2025-01-11T15:15:08.063000 -CVE-2024-57878,0,0,fe97f3ee2690c7f72f90773e6d1b82389119debe0cbd7bd628845864a7ea5a73,2025-01-11T15:15:08.190000 -CVE-2024-57879,0,0,feb067f3861c707c292881016bf990e111102c27bae99249c671b639a4c0298c,2025-01-11T15:15:08.317000 +CVE-2024-57874,0,1,e1e398505659ea2f6049b654f218c3865dc245e6cbf829a65b85cf47f7916af9,2025-01-11T15:15:07.680000 +CVE-2024-57875,0,1,3a16f7ba20f0485e3dd71d1132dd8a89eaffde288852f03ec6f11461188bba68,2025-01-11T15:15:07.803000 +CVE-2024-57876,0,1,86fef3f8a5e8b98f66eadd24a1ef85fb6575aae013277463bce306740c013a1b,2025-01-11T15:15:07.930000 +CVE-2024-57877,0,1,6cc5b6ddda506445b2c50af5c05c5b092ef136c192d216dd4cd3cf15a6a06d3c,2025-01-11T15:15:08.063000 +CVE-2024-57878,0,1,cf90277f404b61eef6e26cab8c74e2048e8048ca6609b3cf2d254f145799e32b,2025-01-11T15:15:08.190000 +CVE-2024-57879,0,1,5750ea5676872443c5ff1996ebeb6500e7c60dbaab10547ac7ff353f213a1b38,2025-01-11T15:15:08.317000 CVE-2024-5788,0,0,26eba16faf8bba170e4c4924cd3861a76450b8d63d3d592b315f9dc173dd2a7c,2024-11-21T09:48:20.137000 -CVE-2024-57880,0,0,f940af194262151ac7da7d4cb3e1ddf4b34bcf4a3d024e7fca35a39078d977cf,2025-01-11T15:15:08.440000 +CVE-2024-57880,0,1,1164249640ccbae8f44ec0303ec00ce8897de783080074e0b0de1571b4e8f28b,2025-01-11T15:15:08.440000 CVE-2024-57881,0,0,6354b126b83992bf0d04724a87e51050df036e4588251687e71e2b731ced1e07,2025-01-16T15:20:10.900000 -CVE-2024-57882,0,0,418a40aa76f79445d7b2a146f6ad30da79438bc996c185e0e91d4d5dc424cf5c,2025-01-15T13:15:12.510000 +CVE-2024-57882,0,1,6a5a222b9df560077f5892d061ac7db32f9186ba703bb88ea108cb3f4408c0e2,2025-01-15T13:15:12.510000 CVE-2024-57883,0,0,3d11082d7ec0dbb44b8c1430df79510b64bcb214ef5956c1802b3be147c414bb,2025-01-17T14:15:32.357000 -CVE-2024-57884,0,0,ed30abf4c955d47564886e0a04d265af02e2566356eff3e6b149390a84ed401b,2025-01-15T13:15:12.757000 -CVE-2024-57885,0,0,da5857e507478371a776524c704c34085bcf0c9f5c034547a16023af34e46bf1,2025-01-15T13:15:12.893000 -CVE-2024-57886,0,0,f33367783cde44f2e0c90f893fcaa2acb06cea90c3a0536e22b58574ce19915f,2025-01-15T13:15:13.010000 -CVE-2024-57887,0,0,71e51ce0464fc4f1aec9b840145444cf365e39e62b900e47d061b33cdd0d9956,2025-01-17T14:15:32.507000 +CVE-2024-57884,0,1,482bcd20cfe19de2feec005e390fbcc76c6b829ae3fa822f3c8e13368b8c2723,2025-01-15T13:15:12.757000 +CVE-2024-57885,0,1,d838707fb126368f8de15f11cb5ff919fce2a51564adfdf488871df2d794faab,2025-01-15T13:15:12.893000 +CVE-2024-57886,0,1,6977c109ba5b94493b63db91c2ff30843c63254e757d9ba705b9d940f6ec57ef,2025-01-15T13:15:13.010000 +CVE-2024-57887,0,1,4d1bef448782b769626e7d766d31ca6a4bb619aa4d2b8f8dc553c5163b84e004,2025-01-17T14:15:32.507000 CVE-2024-57888,0,0,b77add08163ab3a5cedccd21180ed490ae58f6e9fd875661b9225164dabb2172,2025-01-17T14:15:32.620000 -CVE-2024-57889,0,0,15d44ed71ab71981ea405ee4be59d85c049ef4957ac2abc206027af36716a0a7,2025-01-15T13:15:13.347000 +CVE-2024-57889,0,1,62e396df070c9aec292eb26521734ece0a76444ded3816447a98dba23df3e486,2025-01-15T13:15:13.347000 CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979ee,2024-09-26T20:28:29.237000 -CVE-2024-57890,0,0,d48ac845dc4eb12f2fd64e155751d6bdc4768f6b327d509bc895935c85a7fbb9,2025-01-15T13:15:13.473000 -CVE-2024-57891,0,0,3a7cf95d61ece0556c7fefab305dfa727ade915bcc007c8feb463efc25d664af,2025-01-15T13:15:13.590000 -CVE-2024-57892,0,0,13b2ba51291a441f0d2ce8014760b14770260ce918ff0af9560cec365ded3411,2025-01-17T14:15:32.740000 -CVE-2024-57893,0,0,213ebdc4dc4da83bbcd896ca0a5d11ad9a0b511e977490ab0fbcd3fcad00ddbe,2025-01-15T13:15:13.820000 -CVE-2024-57894,0,0,99459d594a10b47424471c043eb4fcb2e78ab563c019ed8612a0a5fc2b4ffced,2025-01-15T13:15:13.943000 -CVE-2024-57895,0,0,bdb5b18f8f06196f9d86e600b04031c10719f69f9cb915b50cfa4ce7f063a232,2025-01-15T13:15:14.060000 -CVE-2024-57896,0,0,695ca207bcb2f8cfbed8c9150e0e7c88f48224ebdbf373bb36e241a5d135c000,2025-01-15T13:15:14.200000 -CVE-2024-57897,0,0,475435fb23d8286f67b400d4d3445af9a689698330ce91d4c50b4cbd38867a76,2025-01-15T13:15:14.317000 -CVE-2024-57898,0,0,c6988f8b05cf505a8470a40cc2f70621905b8b9b8154915feba097ba4157c337,2025-01-15T13:15:14.427000 -CVE-2024-57899,0,0,7f78384f7f87a86acc880c5fa2294ec23b1d695974ed080d5ea5b69c382d3df7,2025-01-15T13:15:14.540000 +CVE-2024-57890,0,1,f3c70425ae2cb2a285944bad8e42a9a1d527585428b7509ecc898caf6892aceb,2025-01-15T13:15:13.473000 +CVE-2024-57891,0,1,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000 +CVE-2024-57892,0,1,66b0aec87d7d9c54dc5504d86884959b0a9e67823dd95abe20de0dae628f552c,2025-01-17T14:15:32.740000 +CVE-2024-57893,0,1,ea76fbdb02327d656582ece1adff77b631ec4a0f910aebc930df923bcb513738,2025-01-15T13:15:13.820000 +CVE-2024-57894,0,1,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000 +CVE-2024-57895,0,1,397cad18dca05cdf13f2100c77f36aeace87ff419dfe43be955058adee27cc6e,2025-01-15T13:15:14.060000 +CVE-2024-57896,0,1,48cafb65a4831cd5ea2747814cf889a4ed3a24655d2763af16f877593496f6ac,2025-01-15T13:15:14.200000 +CVE-2024-57897,0,1,3d8c470fae69b589d24f1b293420d7a6a2c10fa45e69bbcc2f2a6813cfb371e3,2025-01-15T13:15:14.317000 +CVE-2024-57898,0,1,33919a8729fc5ee32309d9f13ff00813ffa8f03e2482ac875a9d69e5d0b52206,2025-01-15T13:15:14.427000 +CVE-2024-57899,0,1,83468965f33ada40980399571d777b372c41a2b30b4775120a1f2be8fe69b89f,2025-01-15T13:15:14.540000 CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000 -CVE-2024-57900,0,0,00e355ac7753d6d985d2125c6590e43a63a456274bf73a0ee21391a5b88b3ef6,2025-01-15T13:15:14.633000 -CVE-2024-57901,0,0,920b4cd8c8333c12b08bb3d2e3d3b87d2596f07dcc906bf029f48240dd205c12,2025-01-15T13:15:14.747000 -CVE-2024-57902,0,0,461456f7e370ab89659e9519ac4955a1e988f8f3f8ca8b1a1f98c9d959893a01,2025-01-15T13:15:14.867000 -CVE-2024-57903,0,0,450700a31606e273b19ca446c3a647aa4094cc105c3141e1153d6976871190a1,2025-01-15T13:15:14.973000 +CVE-2024-57900,0,1,d42b41a2e22eafbffcec6705892bf184ffd6aad5ba8c783f63c792296570e82f,2025-01-15T13:15:14.633000 +CVE-2024-57901,0,1,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d6855e3,2025-01-15T13:15:14.747000 +CVE-2024-57902,0,1,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000 +CVE-2024-57903,0,1,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000 CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000 CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000 CVE-2024-5793,0,0,0b18df4d2dde9f10f63097b806cad3cc9d51ae7c2ac550a36fec1a23c0e391bb,2024-11-21T09:48:20.673000 @@ -273554,7 +273554,7 @@ CVE-2024-5868,0,0,6eded5a1c45568f205df6e34bd9a272010d7a2aabd6120e98b8799a846dc88 CVE-2024-5869,0,0,68c3e0fe848ae034c25ba0cebcc0c0b603f13bafbcf85f0ffdc6bd0f553659c4,2024-09-27T01:06:16.247000 CVE-2024-5870,0,0,5e5fff01583dcc3023fca0497ab0a6cb9a973e707aca05f8f359be6d39f0e46c,2024-09-26T20:24:16.813000 CVE-2024-5871,0,0,b13b26ee8aac204dfd1f0bfd50049d9c4bc75db28e97619d66c22f66fc1e822a,2024-11-21T09:48:30.673000 -CVE-2024-5872,0,0,e1418d80b0045a08db2a76713b0e6899c717ae2269b3b9d595954160935312a5,2025-01-10T21:15:13.367000 +CVE-2024-5872,0,1,9e0dbb26beb67fcb568ee746e66cf304472696e00c98383571f35075d22013a8,2025-01-10T21:15:13.367000 CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000 CVE-2024-5874,0,0,a9e63275a6908bf33435b1a068d43670d23b99f7e26f6c3e737caf48c167229b,2024-11-22T20:15:10.900000 CVE-2024-5875,0,0,44af9bee588327c2ca80a9b9f8de675fcbafdc3655e379b366f773cfa94b6083,2024-11-22T20:15:11.030000 @@ -273988,7 +273988,7 @@ CVE-2024-6338,0,0,66a83af084575500ee819176a1b51e0408d0568ef8a208443ffad480bc0c42 CVE-2024-6339,0,0,4d3375dcde043846beaa8f70838d13fe7d09cf69c89dd5179f0194ef31f2c276,2024-09-27T14:04:31.700000 CVE-2024-6340,0,0,fcf8fed75325bc94a07fd1831106199f21482ff67330bd1320ff92be04484839,2024-11-21T09:49:27.687000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 -CVE-2024-6342,0,0,092d7ef7e4e478ebb0d7b639c028ecbecc404bf14865848ca46c335ef8da8de2,2024-09-10T12:09:50.377000 +CVE-2024-6342,0,1,6cba5b1a0ad165f2daf07821a3756bcb15eba55449d1496fc4cabe02a97eaa54,2024-09-10T12:09:50.377000 CVE-2024-6343,0,0,c44f988264d59a559d293fe3987ba513a727518faf7848c3fce630569f2f5f3d,2024-12-13T16:14:42.787000 CVE-2024-6344,0,0,1e2f1cd9dba358159f7c7eceea3d0d87bd8e14744227edf0085fd0d170077974,2024-11-21T09:49:28.020000 CVE-2024-6345,0,0,883e766c4a79591f1642b35a3e300d939bb720f28c7ab089eb792922769042ba,2024-11-21T09:49:28.170000 @@ -273997,7 +273997,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000 -CVE-2024-6352,0,0,4d147067ca72f1f24736c73c902fef540e6a6e218bee3f4c7ba7242d6936cc0c,2025-01-13T18:15:19.887000 +CVE-2024-6352,0,1,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 CVE-2024-6355,0,0,4c7974dc5e52fdaa43d5f5a202a9f019ba0b6401d733645ab7e0c57b90e3af56,2024-11-21T09:49:28.797000 @@ -274074,7 +274074,7 @@ CVE-2024-6433,0,0,42c6a0efce14f311f1548d33d512d616e158da3b932d3b757e1b72ad689e1d CVE-2024-6434,0,0,6a4274085a2124b428b913ddcbc2570d1d62abe5639e19e73a17b1e138716c77,2024-11-21T09:49:38.717000 CVE-2024-6435,0,0,e68439ae4f00da16a815dc602eaac25d86a6799d0f1ed1436ae376de73e952e9,2024-11-21T09:49:38.837000 CVE-2024-6436,0,0,003111f38e6eaff822f490a93c672c5427f7a7ceda88aa106afb07070524cabd,2024-09-30T12:45:57.823000 -CVE-2024-6437,0,0,0260eff7206af12e6c61788556f7e4e8ce01168e52579b46eaf8c65ba46d851f,2025-01-10T20:15:30.817000 +CVE-2024-6437,0,1,9f95065ce96066148f7024ec7dfa6e498e9b619212324bb228fc08dc7e3104a8,2025-01-10T20:15:30.817000 CVE-2024-6438,0,0,6f01d64ee187171e3e201825e2c65ba11e2d623155ba2ac380e3806be114aae0,2024-11-21T09:49:39.087000 CVE-2024-6439,0,0,90d874cfe554ecbf019e7ef90cde075d12c22a81ecef86cc1ca41723654376c8,2024-11-21T09:49:39.243000 CVE-2024-6440,0,0,459a3ce5f589c457024c7228aae3b65e89090e4cca810605df9eaf39ad5cc1c2,2024-11-21T09:49:39.423000 @@ -274276,7 +274276,7 @@ CVE-2024-6657,0,0,f163680fee98ee1841251ba0750f011cc9e392ae0810a20ee3d4f17874de76 CVE-2024-6658,0,0,f63dc2aecc9b014ab81982cf92e0930d84a67fedd75e8cb612a8e64258ecc1f3,2024-09-23T20:15:05.560000 CVE-2024-6660,0,0,659cbba5e07b3952895ad1550f4e8a05ad31ebb2874a2e794128adfb409ad8b6,2024-11-21T09:50:05.540000 CVE-2024-6661,0,0,3e3784883ba38e2695b124f9cfaa74af8d5b4f9ad0ef41667522b56aaccdec88,2024-11-21T09:50:05.663000 -CVE-2024-6662,0,0,1e0f453f1366d76521834c164d423239eaabd523b0fadd08c81dad6c7faede17,2025-01-10T18:15:26.140000 +CVE-2024-6662,0,1,6a264cf4151b71ee3f953c01fbbad800f4bd1c275bb267dfe83ebcc7513b7b81,2025-01-10T18:15:26.140000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 CVE-2024-6666,0,0,a5043bf96db53bcfafbb6ee366d665f969506e1746935201c50c0da6c4c6d7f3,2024-11-21T09:50:05.803000 @@ -274453,7 +274453,7 @@ CVE-2024-6876,0,0,86cc0bdc0c805c051374e7613a493cc4eee5e10b19d58fefe3b4542003d81f CVE-2024-6877,0,0,f096b514780f6c1378d2b0e6eb685cfea6bb8aaffcf648c422132e0ddacfb602,2024-09-25T18:57:54.607000 CVE-2024-6878,0,0,a444fd971f5ed963b22c061ff870fb3763c7ffd39d15a249eb44a1ba8a65872a,2024-11-21T17:15:25.190000 CVE-2024-6879,0,0,753ea1e54decb561e96e1a46f9fd9688f63066c8a23469e04de04c3099cb82f1,2024-08-28T15:35:24.120000 -CVE-2024-6880,0,0,56595d3234e3c9c76b533dc5dddac6dfad79259e12a78f60368bc31307e9b342,2025-01-10T18:15:26.350000 +CVE-2024-6880,0,1,e4430777d534a094695faaeda2a656c89367c004a02d864f1cff4da96cd5a0c4,2025-01-10T18:15:26.350000 CVE-2024-6881,0,0,f6bbffb5cfade9cc6c088c34f2ee3094971b75058f3fe439a2ef262fe58c5606,2024-11-21T09:50:27.293000 CVE-2024-6883,0,0,662a7f2e2236426ba6db654ada8526e127a6d5a8f172431513289b0cb21bfd25,2024-08-21T12:30:33.697000 CVE-2024-6884,0,0,e6a0d4a43e2f47bba0da23aa77a26e360020a0efe8a3552836db2bb4a7486097,2024-08-08T19:35:22.760000 @@ -274627,13 +274627,13 @@ CVE-2024-7080,0,0,22c7a1cd1bbb4d55b1b34ecbbe985e42e3e2ed6ef3f9681fc2f5bbf914023c CVE-2024-7081,0,0,c6a3753a06d8304cf857866d441a8320a4527c4ef994b8b00ad05725ef579507,2024-11-21T09:50:51.497000 CVE-2024-7082,0,0,2b028759baa437363b0cc7ad3dd78bb2bf3d1d6bef8b78e020b72446eb5c0e80,2024-10-27T17:35:00.537000 CVE-2024-7084,0,0,defb1354da8d1678d2485f21ed63c9a7f4e3a919dea9273a0ffa046a33d17e24,2024-11-01T21:35:06.680000 -CVE-2024-7085,0,0,b271ed7932da2ae5375cd7fbd78fa3b8a9a1c16b08531d3c8a782fd363d8189f,2025-01-15T17:15:18.773000 +CVE-2024-7085,0,1,4013086c222286a4e76113b4bddb85e538f800689e729a8e54574ea5f445fc91,2025-01-15T17:15:18.773000 CVE-2024-7090,0,0,7679e01617b8bc0fdb646a3483b9433c1190d790bc24dfbfcf4e67bf7ce57e8c,2024-08-21T12:30:33.697000 CVE-2024-7091,0,0,2e97b518273552a04ba73841a769980ec5b660c5e31e35e2adff15b2a3f71791,2024-11-21T09:50:52.033000 CVE-2024-7092,0,0,422abf4bd36177ce9961c0f919edf6c6f74cba62c54abe4f5e6a3dbdcfa5204a,2025-01-08T20:53:45.230000 CVE-2024-7093,0,0,290b2b9585ccf417103151a24d8f190abbc7679ec51d5537d6ffb9bc07efb94a,2024-08-02T12:59:43.990000 CVE-2024-7094,0,0,b22ce77ffacf979339f568296208b1cc49b896d3f1ddb1fcde0ad4f63f12731e,2024-08-13T12:58:25.437000 -CVE-2024-7095,0,0,9f54882b2438b50bf5115b42c69f4be13756bdb82f94b6eddf26ca83f330c6d5,2025-01-14T15:15:27.263000 +CVE-2024-7095,0,1,8022420a39cbfcd3372a34a53680c91a4d262f7eb4cb2666208fca7996ad0343,2025-01-14T15:15:27.263000 CVE-2024-7098,0,0,6d3f84e80cfe29d233429433ab17908fcb372f3ed014d96486b0feeee4cd8197,2024-09-20T17:14:53.063000 CVE-2024-7099,0,0,bda544dd9e76b13f20607b0db9189f48ec9b784ebdc1cb4c7f2f85bee57631ea,2024-10-15T12:57:46.880000 CVE-2024-7100,0,0,eb359c221bc21a5def4138cb3d549ae221c77419cecbb0e71e8715e010209ebf,2024-11-21T09:50:52.687000 @@ -274670,7 +274670,7 @@ CVE-2024-7136,0,0,c9b7c1934246d93b2333971d2ef8defed42959b13176d62d2020adb9f2cd26 CVE-2024-7137,0,0,315ca8a4d8d765de04e23f26963a3f09773d43e19e5c1f55bfec2de2390ac1d5,2024-12-19T20:15:07.820000 CVE-2024-7138,0,0,5c76b507d93bfe0849573964a8b74ef29a6c94608dcf9ad8427b4e5898b74f76,2024-12-19T20:15:07.947000 CVE-2024-7139,0,0,522023278c89645da01bf63de201ded1722527d54b07fd76deb6fd63af2bffab,2024-12-19T20:15:08.073000 -CVE-2024-7142,0,0,c720bcedface84d6fcc3a845587df515eafaababff5415179d1359a7c9e86bbc,2025-01-10T22:15:26.403000 +CVE-2024-7142,0,1,b6ebf1ef224547b187fe0c9852385af88b239f02a13bb3208406f7ff52258322,2025-01-10T22:15:26.403000 CVE-2024-7143,0,0,cbb18ddd616be4d0de19ef80dd494e49a9fc2830c5a90dc2455077acae5f057a,2024-11-21T09:50:56.110000 CVE-2024-7144,0,0,3e989e748e38a85b3db1941815e5d921ed75a2233b0a59f112c1cb1f74b3c16a,2024-09-13T14:40:14.420000 CVE-2024-7145,0,0,073fb8bd11ab6d990bf0288270f3cedbc70b03e2b8ff14d66dd5aab6d498859e,2024-09-13T14:39:44.490000 @@ -274773,7 +274773,7 @@ CVE-2024-7243,0,0,d8efedfda209b92e52d5dad9e9c4531992bf4800620fe2fcccf37e9c2dcab6 CVE-2024-7244,0,0,eb11b557c66abb67e1bbc5350acc825117ef0b5327cc2a46248288ad36e4f638,2024-11-26T15:05:19.570000 CVE-2024-7245,0,0,5353f8b5127068a9dd54e7fd614deef0dcf70d45e402d61e0b3dcb255a066a43,2024-11-26T15:06:24.367000 CVE-2024-7246,0,0,5b551756aa64b646c0e8e881fba2a2834e3885531b294d7e37142960ce721d3e,2024-08-06T16:30:24.547000 -CVE-2024-7247,0,0,5bb0d3c34b18805a924cb79bd36852f418d72fe5c05176886cba022485644868,2024-08-13T12:58:25.437000 +CVE-2024-7247,0,1,0f59c1ab6ddf54c0600c59d9109918a8a11b50a8a71b5504df5c5f4ad7603aae,2024-08-13T12:58:25.437000 CVE-2024-7248,0,0,b6af417e2c97216fc5e3a483dd0b083d821b6fb6433a3a88038758c6b286f12f,2024-11-21T09:51:08.503000 CVE-2024-7249,0,0,5aa3a812d1f0251cb8d39b7db15af9ff39e19781022a6d80d602145f3b1a07d1,2024-11-21T09:51:08.627000 CVE-2024-7250,0,0,77e3676540095583ee54282377d752e59ba470ce7bc9b0c39a793c956014b296,2024-11-21T09:51:08.753000 @@ -274843,7 +274843,7 @@ CVE-2024-7318,0,0,8cbca515fa6d8fbd9808eb88225bf271b50136ae9aabf8f4edc8bdb9df7d7f CVE-2024-7319,0,0,4525edc8de27c7880ec08e0f3c2fc246097df2a636951ddea8eaec76b898d5fc,2024-10-07T19:15:11.090000 CVE-2024-7320,0,0,3663c335309fba0eb777ff800cafcae28d107b8f49aacc2ab9010c2b3b0bbe51,2024-08-12T16:47:36.887000 CVE-2024-7321,0,0,a8c12720720f2bd402d58186893bb07a37c72ff78244c59b25b745e59e6b34a4,2024-08-12T16:49:01.887000 -CVE-2024-7322,0,0,104fd3773da1ec9f2bda207b34daadf1128c22bb3d4009141c21da5272515344,2025-01-15T08:15:26.177000 +CVE-2024-7322,0,1,206261dbe9a1bf9ff93e8908028ce404a26709871f8b7772fceb3800ecf1145a,2025-01-15T08:15:26.177000 CVE-2024-7323,0,0,8601d2f72a02fd3ae2c8cdb848b5505e38f292f5bb4774667cf7b2bab4a3b63e,2024-09-11T14:22:46.903000 CVE-2024-7324,0,0,09c95ac35280a11643c9f113bb1122fbd2f0071a06f32fe119264658dda4f997,2024-08-01T12:42:36.933000 CVE-2024-7325,0,0,3cc8d3abb0f14185c057bb972ab039a93906a7d808c343cc1cdb18f358102453,2024-09-11T15:42:50.473000 @@ -274865,10 +274865,10 @@ CVE-2024-7340,0,0,afceb6b3fac1138f8cb83e0f415cec5ebdcab90ac887ac6cc7416d04596c33 CVE-2024-7341,0,0,9879605967e8521e630e3508fca649ab0616466777cf91cc4c4478c8d606e537,2024-10-04T12:48:43.523000 CVE-2024-7342,0,0,bbab372366d62b7492fd885c0fd46da4598051b512f5991327f8cfce46915879,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,7f2632b50e9d4a4da19cdb31448eaac6640ad60d85ef9c956fde33f5c8956343,2024-08-15T18:40:52.707000 -CVE-2024-7344,0,0,26d3a348a8bad46bcd66d152cef7f602228e10777661f0359c31bd09b9d5769b,2025-01-14T17:15:20.383000 +CVE-2024-7344,0,1,6e89fe528ece035b816725b548e48b0d8f9556a8f8d863b30b3219ee4de11fd2,2025-01-14T17:15:20.383000 CVE-2024-7345,0,0,7689b50cbee63ee18ebf904fc91903644247462e42f3178c6191ec55402d6f73,2024-09-05T14:11:00.493000 CVE-2024-7346,0,0,25638c7d38cc54d22ba7fca216c7c1e04ae0c03279aa3b42c264161ca8172985,2024-09-05T14:03:24.040000 -CVE-2024-7347,0,0,052850221e337731d4f88404cf83263003b44cf188813b50c9e6a1df4baaca23,2024-11-21T09:51:20.560000 +CVE-2024-7347,0,1,80bd78827e01668f2a8f57d07d33f259d2d173eeee58a99344a8fc6ac7d3aeb8,2024-11-21T09:51:20.560000 CVE-2024-7348,0,0,09c0d21b00fb7cb86488ca2787685d9b9da3b886a45d9334b1e89a04d5e121f5,2024-11-21T09:51:20.720000 CVE-2024-7349,0,0,ccf23d688d536a2eff13a87ef73563f5aaca69c358d1f3c9dd8bb4ccf304b0b7,2024-09-12T12:43:32.957000 CVE-2024-7350,0,0,fafe078281631d5be201e74994adbfcbb9fc4af4b45d3f1320c0b47fe8799534,2024-08-08T13:04:18.753000 @@ -275096,8 +275096,8 @@ CVE-2024-7602,0,0,7278f511eff3dd7ec59a4b81a9957c41b216b1b8aadad1bb1a37f2e5dc30c1 CVE-2024-7603,0,0,195a943a18594e9339fd034f803f0f92a7f2d6a1bc80d0e908a991f202432048,2024-08-23T16:36:28.327000 CVE-2024-7604,0,0,5a882c366263cdeb1df0cabcb00333a4e04d543fe21390dc320d15cc9b1c2886,2024-08-23T16:37:09.107000 CVE-2024-7605,0,0,689bc3fb8fcf0f982d0857af52a2db47a9011cdaab57f09eb8f47779aa0974f2,2024-09-12T14:24:03.833000 -CVE-2024-7606,0,0,55cd36d3964b049fa4062adccb43938c4e11aee9777f725122be3e15b41776ea,2024-08-30T15:43:41.773000 -CVE-2024-7607,0,0,bd43b24f21484de5aeb077520b0762b38c884d7830890112281ac6c92cd0233a,2024-08-30T15:41:02.407000 +CVE-2024-7606,0,1,d90ab0b9dedc4583ea4e6203b42d7fdb8f9236c4684e256d3a7f92475b21ce85,2024-08-30T15:43:41.773000 +CVE-2024-7607,0,1,908aecb0f089c88d2e87a9760d92d06e1ec6262f27bd9024659959309ee5a896,2024-08-30T15:41:02.407000 CVE-2024-7608,0,0,c2afd41b35d1d8dea18ea5acffbeb0aa2a80a3d4bb047b8406ff6f77c09a2903,2024-08-28T12:15:06.900000 CVE-2024-7609,0,0,bcc0795d8db04146c952637b627c27a826c1c155c0c0f418e614cdf3167e8556,2024-09-23T09:15:03.473000 CVE-2024-7610,0,0,9e76ee1cf25b051ab2f061c293480019e636e1d2dbe58b934668ad3031b88c06,2024-08-29T15:45:27.523000 @@ -275121,7 +275121,7 @@ CVE-2024-7628,0,0,4bd4e14d76545c2e8bcfc51a6645f197df19cd176fabd50da5276351688734 CVE-2024-7629,0,0,7bc9d72619eba9ce5af5b25ffde36344f5d4d93091888459c631aca72d1ccb16,2024-09-27T17:32:43.853000 CVE-2024-7630,0,0,33c672fc773a2e63190d08a9eecf4698c94fc6c6c155959cec5f133d4ce8f81f,2024-08-19T13:00:23.117000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 -CVE-2024-7634,0,0,bb1af52cb8d78a9a601d09ba2f7db8902cdf62a8f1dbfc49044e744e9f8c56e6,2024-08-23T16:18:28.547000 +CVE-2024-7634,0,1,0f7e3d961fc6e1e7c31e9322917d09811bd28394c23d3a5146dc935bb296d7e3,2024-08-23T16:18:28.547000 CVE-2024-7635,0,0,e36460d792c677fe4e87c32f8cc026963fda07d9440df512b0c7708b6927bc4e,2024-08-15T18:12:33.270000 CVE-2024-7636,0,0,60015977cfe4883a2345c9a11b46d14d60bae0b5a7fde2defe825bd04da7318c,2024-08-15T18:13:23.327000 CVE-2024-7637,0,0,10c37678741a2b4d17f774df181bb3827d620076d9c9c2981d772a89161feb4c,2024-08-15T18:15:15.667000 @@ -275551,8 +275551,8 @@ CVE-2024-8144,0,0,696edcb2bb311965c748dca1b652d460d37d41665bb332ac8c5789a18b7571 CVE-2024-8145,0,0,5b5516a02e82f1a24921fba53f44ff719cb4889853174576c8c5cf18949cdb17,2024-09-18T15:34:47.007000 CVE-2024-8146,0,0,3c38a8bf86aa5143d343a4e058bbc1c1d9adb80751bb2e546e609de9556fc1e2,2024-09-24T17:00:38.933000 CVE-2024-8147,0,0,946ab893ddf9a675ac292ab1826a8652381a7ca069f4a6e6887c36e74d1a22f4,2024-09-11T18:37:20.670000 -CVE-2024-8148,0,0,248d5a7f09ea7d455cbb55d8005b3b9844bb82f21d84584ed55e4fdcce4b5ea3,2024-10-07T17:48:28.117000 -CVE-2024-8149,0,0,8bb11edf33644b1a798f86b77694517ffc956da9d8043fc5ff5759091af6393b,2024-10-07T17:48:28.117000 +CVE-2024-8148,0,1,19050abc6a02329d1598540a38d3be670def7449d84f72f465f7712bc4e64706,2024-10-07T17:48:28.117000 +CVE-2024-8149,0,1,1b6da2ce517da81789eb4b04009f8c3dff7d9b5880f014dc3d2d33a48b558a75,2024-10-07T17:48:28.117000 CVE-2024-8150,0,0,b20f5342ff1470679bbc0ab15ce3d915aeb3002367f334c834e9ac120b5cd845,2024-09-12T21:01:57.790000 CVE-2024-8151,0,0,61072cd2dcf67db24ffebac51f604a71bd486239310714fab754dd0fa4ebef4b,2024-08-26T19:07:54.247000 CVE-2024-8152,0,0,384333635aed066971b397f054838e616b07dd646d7f4b75acf4f33ae9eb4767,2024-08-26T19:06:30.997000 @@ -275624,7 +275624,7 @@ CVE-2024-8230,0,0,30b3e89c4400fc9a0469e6c715c05bc0b5a379c6df176bbc381a46fd5bfda1 CVE-2024-8231,0,0,7b1368650149e5f428621f08aabb2898c481bc6c90025aa2d156bedb40168791,2024-10-16T20:01:30.877000 CVE-2024-8232,0,0,a69636827e9fee8b582093e92530655a6c59ea13191cf499db607e808cf33182,2024-09-11T16:26:11.920000 CVE-2024-8233,0,0,38353e8e9e52002108fd36d8ae99e6c7d0606e9c1bcea05bb3580cc7f7f99302,2024-12-12T12:15:28.120000 -CVE-2024-8234,0,0,95ebed0db99ea339d09aa632fba8014d36ee19972c4de55ce87523d4a48f000d,2024-08-30T13:00:05.390000 +CVE-2024-8234,0,1,7cfc5d8a164a47f5aedf548490c7f582455556c6b1c3b4e515dbd9a20ec562e9,2024-08-30T13:00:05.390000 CVE-2024-8235,0,0,92d140a8cdbaca4d63092d44133892839b758a6b944ab2f33fbe74524523db69,2024-11-21T09:52:55.440000 CVE-2024-8236,0,0,a9354591770ec6819f85c9a3fbf166dfa5e7589e439c687e4e3141e2652cb2af,2024-11-26T14:15:22.217000 CVE-2024-8237,0,0,46812219d983c6452eeeb47348e2d08beb1a562759e1675794b4f1f45e3c00ab,2024-12-13T01:32:29.520000 @@ -275929,7 +275929,7 @@ CVE-2024-8599,0,0,13d0ff884a73c291b4096f8b78ca27030351114c1d87f3c5c05bf8cf4b3598 CVE-2024-8600,0,0,467df8817b963ff6dd4943ad648cb11c98233a9da8dfa53fb316598e73a6889f,2024-11-01T16:17:19.680000 CVE-2024-8601,0,0,3acaee371a9188d72925a2deaf0ff4d7e630c2dd4f9352ccbd013d52f89a3544,2024-09-17T17:54:39.767000 CVE-2024-8602,0,0,4be711d34a664a8b5e0b3d37ce84c88b22a5259bad96166dd05534c7898940cb,2024-12-11T09:15:05.890000 -CVE-2024-8603,0,0,870ce3a2e69e9a1df934abf09e1991aaad7bdff3b6fa3ad836dec8ab6df89acb,2025-01-15T16:15:32.190000 +CVE-2024-8603,0,1,2409718fcc414bb02522d3e9ac363685e1c4e7f6010670ca79d8bfc6dc4c649d,2025-01-15T16:15:32.190000 CVE-2024-8604,0,0,b0f4bef2cd9a719a1e9111dc84cb9eb65623a02bb8b15e8ab1025f3d735a01a0,2024-09-10T19:14:57.017000 CVE-2024-8605,0,0,0e102b23464fafd032b82f77759751e1602159cdae8c4c92a81e81701daf2dd4,2024-09-13T15:31:52.140000 CVE-2024-8606,0,0,d6634fb8da7243ac8a8022d5719888e145acab992bdb7a29d6a427971fe505a6,2024-09-30T15:32:34.647000 @@ -276047,7 +276047,7 @@ CVE-2024-8742,0,0,308e661824cddf6864cf8dc772405b7a403f1a5c8cbccab830391bcd577067 CVE-2024-8743,0,0,d000eac132c12d395b2d31c3b5296ecbed232b836aa606d5ef27c7bfbfe9fd35,2024-10-07T17:48:28.117000 CVE-2024-8746,0,0,afd603aeb8dca1fe73fdcb648be43d1030fae8adc5f6b0e1081adaa2a232e0d8,2024-10-17T18:22:18.277000 CVE-2024-8747,0,0,513322b98355e72ed1b6c337850d2b6ec7fe5007e157e4a7beca563e7fc9e2f9,2024-09-26T19:23:12.477000 -CVE-2024-8748,0,0,daa1a2909dc9796922ef2568b920f5e443415adca1fd0d9d0d68ab92d3aedcb4,2024-12-03T02:15:17.620000 +CVE-2024-8748,0,1,ff8ed2981d1d8a95dbaab2b66c52d82f51fd7ff447a0cdd82db5a1fe467a14f5,2024-12-03T02:15:17.620000 CVE-2024-8749,0,0,c1663885aef86ef7f832fab1374d67bde57f4718aa10f6038f84d74ef69eb43c,2024-09-18T18:53:54.860000 CVE-2024-8750,0,0,db5c7732ede9c6aeeb819b710556c9fe4483ed2490be39106efe225cfd99f3df,2024-09-18T20:38:42.123000 CVE-2024-8751,0,0,89cf94ae6304dd9d6914f8bc2d128beb39ec425bea0c0318e2eb645b5f93bdb6,2024-09-13T14:06:04.777000 @@ -276306,7 +276306,7 @@ CVE-2024-9050,0,0,3010fc5c627c8c1972d6f17910d5cdccb5923b375100e48adbc3d5a72e9ff9 CVE-2024-9051,0,0,c5391680d54c46a0bbf9a1fc0deb0ba09610fc9b3f0482409fd6a0ca17d3cbe1,2024-10-15T12:58:51.050000 CVE-2024-9054,0,0,927656c8c5c09baed0e0e2481c9a8a0a983362342cb7c32b1ad1b92f1bc2ff04,2024-10-17T15:19:32.803000 CVE-2024-9057,0,0,da1a5d02a395b3aaf5d692a1b568952646bd6e0d0489aae5adf09df9f0d061b4,2024-10-15T13:58:19.960000 -CVE-2024-9058,0,0,202fc9f2b0ccc36b28d1a9525b98256262f0f10eaffdc4f997bbb9d64ee6382d,2024-12-03T07:15:04.230000 +CVE-2024-9058,0,1,9d53a99366a9ef1bbf4ee3a35eec94be0163410cc37f635f400029db809ccb4e,2024-12-03T07:15:04.230000 CVE-2024-9059,0,0,2de7cdef7dd504aa7a2c0a537071b903a9a4a3ccef9184b58357a333d4e0fec7,2024-11-19T15:53:56.680000 CVE-2024-9060,0,0,115d34d9bb64dc2044107f650f557576e82cb04506528a7a9b45b1634927378a,2024-10-04T13:51:25.567000 CVE-2024-9061,0,0,5eb6cf4b39011a255613e0a9aee627f267b69c291569e2b350b332f4002fa368,2024-10-30T21:11:17.450000 @@ -276368,10 +276368,10 @@ CVE-2024-9125,0,0,a2eaedda1b49b18236ac116998a1e45e7b5806e5e010d7ded75c88431dba6b CVE-2024-9127,0,0,c4d446b51c8121a98d4ccca3ceb1928972a1ed1ad9117dcb67e2e1c732384bbf,2024-10-01T14:09:26.017000 CVE-2024-9129,0,0,3d76a24f7b2544eaf6e94567427057284c66389ed87bd9b0c2b23ac15941c43d,2024-10-23T15:12:34.673000 CVE-2024-9130,0,0,7a17b6638601749177c95ede13421fc94f6381d99406730dd48ab1718340effd,2024-10-04T17:18:59.130000 -CVE-2024-9131,0,0,3932b67581738e6a90780c570e0a4f4bb32c22a15cf00759ed181aca664d53fe,2025-01-10T22:15:26.667000 -CVE-2024-9132,0,0,5e02bb4fdacfd190b910e289b623c8275522b9fa0b9681662d79e5e5dd9dc6ab,2025-01-10T22:15:26.783000 -CVE-2024-9133,0,0,6aa4c7ce050da09ef15b902483e174a9acb44b76477eb064e81df31f6a2ce005,2025-01-10T22:15:26.907000 -CVE-2024-9134,0,0,cda1908980e6deea1fa8d2182b915b4b49e9eeec5e605c4e8a824a8066d73532,2025-01-10T22:15:27.033000 +CVE-2024-9131,0,1,50107691d6f8995fe8a6b7113df12747d01b199eb120271aa41cc0db3834619b,2025-01-10T22:15:26.667000 +CVE-2024-9132,0,1,4c377ed325e14fd1af892554c7d35507ad3abf8234e1ac3ab54429e427bcc737,2025-01-10T22:15:26.783000 +CVE-2024-9133,0,1,fcbfbc2bd4127e72a9aa3ddc848c573d78bc72fa9ddd322a5be2ae12167a11d5,2025-01-10T22:15:26.907000 +CVE-2024-9134,0,1,25a903436b6d7d769fb834ac188d1e6735193281626409ff9b8726ccf7896b79,2025-01-10T22:15:27.033000 CVE-2024-9136,0,0,440b3409a14907c29d57b03ac063b5d398f0722a11dac00ea875af9fd1c6005e,2024-10-01T14:28:31.027000 CVE-2024-9137,0,0,c5ec4625d90142b1b9ff664e82a5d1574ffac90a7294ba0e126897b0851d3e14,2025-01-17T08:15:24.690000 CVE-2024-9138,0,0,a81b81868b0978ee3f26a8278c212cba398f6cf06063add4ee50660e7d201861,2025-01-03T09:15:06.370000 @@ -276389,7 +276389,7 @@ CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea7 CVE-2024-9156,0,0,f51f01b34d81b342f8758ec8a55450b2ee8e6ae57d651f88883c804dd1af5436,2024-10-15T14:40:45.093000 CVE-2024-9158,0,0,0b7269f695a88179972d1f8bd54450607592163690fc2a1df7db61f3d67ca9ad,2024-10-07T16:13:49.027000 CVE-2024-9160,0,0,3abb5898c24414f9fa9bfaf0b3847fc710cb959682db37a2f44261a8e937ba36,2024-09-30T12:45:57.823000 -CVE-2024-9161,0,0,faf31a07aa04e07bada2e0c7c6312e2c69ad178e1ae69d4ebe728ae6438ca9b8,2024-10-07T17:48:28.117000 +CVE-2024-9161,0,1,a18a2df120fe5a2ade69d56dc4c2db1f481e2652c2aaf75ef1af18ac6151e4a5,2024-10-07T17:48:28.117000 CVE-2024-9162,0,0,3ed9f79200cd6e516a6056e3c31f6f6060064775b21e23fe7b8a98c8d0db40ef,2024-10-28T13:58:09.230000 CVE-2024-9164,0,0,d5548ae3a00867f99964259f08e97b03cae6c8fb72f3546b0fe2b1327f21c3ab,2024-12-13T16:33:53.080000 CVE-2024-9165,0,0,dc899508d72791e5c761f96fa2a1f7b8193367cfac67250d9f9f4a221602c30d,2024-11-01T12:57:03.417000 @@ -276407,15 +276407,15 @@ CVE-2024-9180,0,0,ddfbbc6ef10dedd28a9cb332a26718a84f91bc3934f39d4fe574235b72d9f3 CVE-2024-9184,0,0,d3f74914a31d182c104b173f33f2b83a588abd882dcb2745d5dd36e91fc53fa7,2024-10-18T12:52:33.507000 CVE-2024-9186,0,0,3adcb73564458ce0b46f7d7d6987e91e49eac1cb39ac42a7fd9902f78d913984,2024-11-15T20:35:26.383000 CVE-2024-9187,0,0,708aff421b1dcf6140c459abffd229364aef01a063be9847b1709c117f0f99aa,2024-10-15T12:57:46.880000 -CVE-2024-9188,0,0,949f13832cdadf1e6f5fcf70caff241205179ef016d8485c013461d467021ab9,2025-01-10T22:15:27.150000 +CVE-2024-9188,0,1,5dd6784f0ddf222dfed6f3f6f8ef1425cb794ae63276e1d1603c62bc0b0fa2c9,2025-01-10T22:15:27.150000 CVE-2024-9189,0,0,4e8c036fffae828e6f3882cbb1531defe39b113820187b885e346d496fe1295e,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a44,2024-11-05T17:06:41.363000 CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000 CVE-2024-9194,0,0,04a4ea65d38da4fcbaabc5e2d1e4083861c0f3dd2bc313d0389a7e90a03127c9,2024-11-21T17:15:27.480000 -CVE-2024-9197,0,0,f9bffbec095c64650efcec31f7bb6a9b03147767ef4be03a803ee19460c1d69e,2024-12-03T02:15:17.773000 +CVE-2024-9197,0,1,4a33f38b135e0eae44d1b63b43b4a5b6a0b8afd02483d02d2b3eebd267ee203f,2024-12-03T02:15:17.773000 CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000 CVE-2024-9199,0,0,f7f1a8a24bf77060d991f64fa7f7c0b4d559bd9f8178b591e0115e53c808ca9b,2024-10-02T14:33:54.607000 -CVE-2024-9200,0,0,268033b29e5d5ec23682d3c2261f73c93d30dbc35f0494171f700f2cf700f3f2,2024-12-03T02:15:17.913000 +CVE-2024-9200,0,1,5b675f5e9753b62cc26533183a4705a6a29dd74d7cff13aec729d310348a7ea8,2024-12-03T02:15:17.913000 CVE-2024-9201,0,0,a603a5f3c75637d1be95df4b70d6e145f324aff77ebb4cdfe846a3ab7d10d550,2024-10-16T16:55:44.817000 CVE-2024-9202,0,0,9bec358a87a528c01972a943c5055d439c78f9ca4e83bdd54a6636d2aa789bdb,2025-01-09T18:07:29.847000 CVE-2024-9203,0,0,4e20a4fb9410ceed746d6ea9a7aaaba3d229704545b019ce0319b7b1b02a3f4c,2024-09-30T12:46:20.237000 @@ -276513,7 +276513,7 @@ CVE-2024-9306,0,0,84a9ea83565c03ad670918f12a454396eb78292a897f7ffd96803c418d88ca CVE-2024-9307,0,0,5beeccc0d13dd928213a2571e46ba7a17d8dcf0dea0aa18ed538428ef3acf9d0,2024-11-08T21:18:16.210000 CVE-2024-9312,0,0,0fd6178da2444019bc4e09b7bffd86350c5ac6210bde4d3d718739d29bb97fb3,2024-10-15T12:58:51.050000 CVE-2024-9313,0,0,4a370cdecaa476383f96e8d39069d449b031601015e89b01e1554e767bcd3c89,2024-10-04T13:50:43.727000 -CVE-2024-9314,0,0,e62f5816412d6ccaa517980058a31fef75eb1022e535a9e9379569b80314131a,2024-10-07T17:48:28.117000 +CVE-2024-9314,0,1,1ee9881095d3d64e7892961bc10913a640c149487c65cc5aa68787f2e938f9c8,2024-10-07T17:48:28.117000 CVE-2024-9315,0,0,8026b2ac786d7fbe453f3f89758d25b2777e74efe8437294907c4b1a397ee255,2024-10-01T13:33:59.480000 CVE-2024-9316,0,0,f7afc3fe23e1c88afb120837a4286429baf55d1cf2c49bc78c78c0a4fbca89b9,2024-10-02T13:29:29.813000 CVE-2024-9317,0,0,178ecbb80d8ae71f8871864eb13caed40956ec5919d0acddd295315b19ea278b,2024-10-01T13:32:39.140000 @@ -276538,8 +276538,8 @@ CVE-2024-9347,0,0,940da9406d12ee0caf4ee9b86611bdc9bbcdc9df19fd90075163c26f781b22 CVE-2024-9348,0,0,7a3a3a4ecbeb01ca228812ca3f4882abaa9dc1676200c3bcc9675960900d4abe,2024-10-16T16:38:14.557000 CVE-2024-9349,0,0,55d16df237a20343387493b3a6cd09adfd270e82326e8e29d171e5de70fd76c6,2024-10-10T20:25:57.580000 CVE-2024-9350,0,0,657c5995043502e56c0a5ef90cf64491d92d2833df40202d33beba6bb4ff459d,2024-10-29T13:44:03.897000 -CVE-2024-9351,0,0,6ab09b725ad3122da139cd0462080a4368c97f2f828ce0920a1b033929a592ad,2024-10-18T12:53:04.627000 -CVE-2024-9352,0,0,205c476dc7f28d3803fc5e0ba1bec3885621666e16e6cc937d323a311d7c25c0,2024-10-18T12:52:33.507000 +CVE-2024-9351,0,1,8c60356c74b5289b1b5c96d740b2fa05d0f6b4827055024ad840356f123e1f1e,2024-10-18T12:53:04.627000 +CVE-2024-9352,0,1,3b8fb1637c21808559702aff8bbb23ece5b30d262393796f634cb67231e15269,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,8e0d86c3f9aaa2024af022239a79f55d320063d37d43e9df0d1290550d424793,2024-10-08T18:50:51.357000 CVE-2024-9354,0,0,eb04c5105330fca3da944e4cbdaadcc9a14a2f66d98a9175685bb64431637ef1,2025-01-07T07:15:28.140000 CVE-2024-9355,0,0,b0ec2555edb2be21aba884cb9f09977310be30a82039454ba7e0acd9a6463ce0,2024-11-21T20:15:45.247000 @@ -276726,8 +276726,8 @@ CVE-2024-9582,0,0,6c88e6027360fdb4a7811abb4656ed677e99bb646218f90897f5e23c866b2e CVE-2024-9583,0,0,aa4f3f9b033fa37c9a90de980f04f150d9e621c5bb21785813367191c14d792c,2024-10-25T16:28:17.497000 CVE-2024-9584,0,0,567d29a760ee9c5535861847bafecd27aa3529601174432798f2b887b09993c8,2024-11-05T17:04:31.937000 CVE-2024-9585,0,0,88edaaa62474457b47ed76d64b14b66bac9da98dc2e47348845f6205f0ee70a3,2024-11-05T17:05:59.960000 -CVE-2024-9586,0,0,f85928805832e8ddc387144d575eed6d38f59e98e522da3056e9f17e024ce408,2024-10-15T12:58:51.050000 -CVE-2024-9587,0,0,c5755291a83c97ec5d045e663b61aa2811c20931013441c8367eb6b9fd2c26b8,2024-10-15T12:58:51.050000 +CVE-2024-9586,0,1,521406ff787b967a41fb76920d1ca3754314c9d9fc6c3d23a8610bead5396de2,2024-10-15T12:58:51.050000 +CVE-2024-9587,0,1,67d388e5921203f98ee160126dcb278be07f5fbda01307513b30595c4c472da7,2024-10-15T12:58:51.050000 CVE-2024-9588,0,0,a67e73b2a261d9bb69bd24f11e8d3d874ada43d3ef1ceeed16337461fe25c72b,2024-10-25T21:15:39.970000 CVE-2024-9589,0,0,b947c1181a260b70a3b30b41f3d8b0398c4545414c8ef852aad240a7c57d813e,2024-10-29T16:07:54.387000 CVE-2024-9590,0,0,31d8b3dcd29326d9f12acf30409ed90c98c9b1859a9098d17bbc5b51db1b9a93,2024-10-29T16:07:43.737000 @@ -276758,14 +276758,14 @@ CVE-2024-9623,0,0,d78adebd237aa914fa1e336f2ba56f569bbb8366444862605ae66a91ae14b7 CVE-2024-9624,0,0,7aaf353547dfd91f6eaa1a431839c12f16a327aeec130c7f12e5c9f74a154f31,2024-12-17T06:15:21.173000 CVE-2024-9626,0,0,e9628917bf466150170ade3c83ea1ca0718a402c4f4e3732ac05e432b077af9e,2024-10-28T13:58:09.230000 CVE-2024-9627,0,0,bbd2150f084c7938e6b0ce316fceb9870286e9cb9ca4f5a3efb37d7b055e03d3,2024-10-25T21:19:48.757000 -CVE-2024-9628,0,0,0c37d63c25c5beaff0dd4d92044edde72f23ce6ba7d9074231c99cd42e04ccf6,2024-10-25T16:15:10.160000 +CVE-2024-9628,0,1,3fcc5508bf8444698f5b7e8e6701a31f2892d175d8bf30a18b74c01432d0cdc6,2024-10-25T16:15:10.160000 CVE-2024-9629,0,0,ccb2809be6fc0297c8318e4c1f923a6148830a550a06f81de03fb80d95b6e694,2024-10-29T14:34:50.257000 -CVE-2024-9630,0,0,88dc558005b843a6ebc3590f17660d9b6da0d62d865a3432bdb65aacb884dac8,2024-10-25T12:56:07.750000 +CVE-2024-9630,0,1,1fc4ce5cf4ffaf3515a8d80aaec9b224b1f33a831d4a11bba8d9855d12f4a48e,2024-10-25T12:56:07.750000 CVE-2024-9632,0,0,239a4c189d3eed560921482fe12c18bb19732b61a1100ff2b6e56460beb86ea5,2024-11-21T19:15:14.210000 CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe304606828160b,2024-12-12T21:43:44.480000 CVE-2024-9634,0,0,7b5dabf15ae54de4daab48b64d2e27f430eb55d7ab2217a5e19376e8531d6f32,2024-10-16T16:38:14.557000 CVE-2024-9635,0,0,9f77fd7ccc96fa6d4c00f44465f9f4a309bfc7a2ae1c26c3627ef0449f3c9e02,2024-11-23T07:15:05.027000 -CVE-2024-9636,0,0,47e4fcb859ba924f99260aab4edf6abeec61413c79d458738639482ac39379d7,2025-01-15T10:15:08.607000 +CVE-2024-9636,0,1,0b62f247a55adcf843a0ddc11a4709285f570b0022910e18b3e03743a1ef61f4,2025-01-15T10:15:08.607000 CVE-2024-9637,0,0,0f4d16db68000f66da50bae84c41a0f228004e7436fcad95d0969905f72e932a,2024-10-28T13:58:09.230000 CVE-2024-9638,0,0,d242a26cf294563aa693c3b48eace80fd3f0c8397670ca74457232bc92e1deda,2025-01-07T16:15:38.170000 CVE-2024-9641,0,0,1af3f797b9845e72a30c1ec84ed9cc9350f350e1f0f00ee15b2f0dce5766f023,2024-12-12T18:15:28.297000 @@ -276789,7 +276789,7 @@ CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b3676507860927 CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa03544,2024-11-28T09:15:05.710000 CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000 -CVE-2024-9672,0,0,061e80a15aeea3b03a12d8109775a38b18a9082ea48b25cd40a1b2c0322c9214,2024-12-10T00:15:22.893000 +CVE-2024-9672,0,1,3c89226d5118e00e216effd3e434c6d140bba4a05c022b882bff4d4242749c4e,2024-12-10T00:15:22.893000 CVE-2024-9673,0,0,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000 CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000 @@ -276954,8 +276954,8 @@ CVE-2024-9856,0,0,5aa1b6cdf29dd2393bc854c88d9f44d9ff2e324af6e80eee6fa5c0955e5cea CVE-2024-9858,0,0,ca2929ea85dd3f22cd09c051fa794843b77550ad22ad15b5fd1cd0c92da7b3db,2024-10-16T17:35:08.130000 CVE-2024-9859,0,0,86c60906d3d43086e90ad82fc5e0a66c148004233d82b3e814c2c2e043532e28,2025-01-02T16:01:16.520000 CVE-2024-9860,0,0,1ba47332044cf478e4ab9e34b5ce7d360a589302ba3fad0810d75ba6f8914101,2024-10-15T12:57:46.880000 -CVE-2024-9861,0,0,faddf74719c447c20a0d8f47cab0598f03aa97157ac3e59e845bf5889b3dd378,2024-10-18T12:53:04.627000 -CVE-2024-9862,0,0,bb9e8d7fb677ef0a474328a2f764c958c85a9ca1eae60fe8909db13e19514fba,2024-10-18T12:53:04.627000 +CVE-2024-9861,0,1,dc14d85bd92aa29d863eb41c066f0cc824d1507fbd37cb8b354e9b7347b56844,2024-10-18T12:53:04.627000 +CVE-2024-9862,0,1,615fd33d53ebec4244e5df97d4f94fcb435474a16718242c1b0c0cc53044a335,2024-10-18T12:53:04.627000 CVE-2024-9863,0,0,6177d3dfde419a662cdfdb3805c47c7ca2f42ac849e1efadbda4ea00b9e257dc,2024-10-18T12:53:04.627000 CVE-2024-9864,0,0,37f5c57af255acec3da2c04b72172ba620795a28e8c909b9c2e0f3a83632f2e8,2025-01-15T18:27:26.133000 CVE-2024-9865,0,0,104ee46dcd943be7197e319db57c938f5de66330632289d90ffc0672b2178cac,2025-01-15T16:14:54.267000 @@ -277077,34 +277077,34 @@ CVE-2024-9996,0,0,433ba4c226a5a6d2212e25ce0b55b45b5a0aaae59192553eedeafbaec42bc6 CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eba8,2024-11-01T16:27:34.960000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 -CVE-2025-0053,0,0,31ba076c1964d0c2047721906c3d932b6435d5d52aa0fbbd421e62041c7c1d2b,2025-01-14T01:15:15.403000 -CVE-2025-0055,0,0,56d9b6b7fb1e431ca4b19913edab9b466b7533c37eae86ce7146a90f4f8a93e6,2025-01-14T01:15:15.570000 -CVE-2025-0056,0,0,6eef32b903b311f6245e30c3bad6b7cffbee5939ecbf17eb686a7bc89d45f9c7,2025-01-14T01:15:15.730000 -CVE-2025-0057,0,0,39ad2e666cf7c1a464be6c0cc2b10eceb0d1ca7bc189d6514350324a329c4ed7,2025-01-14T01:15:15.883000 -CVE-2025-0058,0,0,8e01cf87b0c42938ddb3d25810667eaf95d7c43362fc84150571732b47122b38,2025-01-14T01:15:16.040000 -CVE-2025-0059,0,0,659ee530ea3238d9638fa3cd285b4a71b4614b2c20bd216cff1068092723db1f,2025-01-14T01:15:16.190000 -CVE-2025-0060,0,0,0123072052eb9366c243c40f403761a097980f89ee3036e9a07b812e57eb4995,2025-01-14T01:15:16.350000 -CVE-2025-0061,0,0,86dd66a072a6c928b35a996f4c470f48282b71c31d33baff5da9438d17de8f64,2025-01-14T01:15:16.500000 -CVE-2025-0063,0,0,bdba0318f3559f5986d6abdffbc882f11f37ed4dc3276d36854976b33309ba0f,2025-01-14T01:15:16.633000 -CVE-2025-0066,0,0,5f2bd058eb0903bd4e166b1d758913882579eda86dd9671bd78acf2f912432b6,2025-01-14T01:15:16.783000 -CVE-2025-0067,0,0,f65cd88aa49aefa17b73a88036a3ffc3c0ac978ce2be5c2afcc40f8c80a45c13,2025-01-14T01:15:16.950000 -CVE-2025-0068,0,0,45a67074f57cc4b99477c0f9d4fe8186fce0d646768ca260dafff01ba2299da2,2025-01-14T01:15:17.107000 -CVE-2025-0069,0,0,37d6c579dd68c15542f1a42834e02c03530808f811472b6a661e2b9f6ba9b6c4,2025-01-14T01:15:17.257000 -CVE-2025-0070,0,0,5fdec7e01b845358a774bcc8f4f3e081d35bb5bc04c0f7ecd82a45b2da92140e,2025-01-14T01:15:17.427000 -CVE-2025-0103,0,0,43b919e6b1501f377e1d154c253d935ca39681ca4273fe7abb5abe968aa2cc26,2025-01-11T03:15:22.020000 -CVE-2025-0104,0,0,1d856232f3ea5e59b0d5145eafe7169946beddbdf4f437f6176deb92e964fd86,2025-01-11T03:15:22.183000 -CVE-2025-0105,0,0,00a855c4c5c24d5ebd8e5baea5f2dd70af28a28ab79f80af836ca3721929b0ef,2025-01-11T03:15:22.317000 -CVE-2025-0106,0,0,ea3891ed02a44c40ad7ee28054a325d82afd4015509da73e6d1926980df4b4d8,2025-01-11T03:15:22.490000 +CVE-2025-0053,0,1,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 +CVE-2025-0055,0,1,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000 +CVE-2025-0056,0,1,be034bcd972f419ff8782984466cba082295f005cb1c5e6f9c99f15962645479,2025-01-14T01:15:15.730000 +CVE-2025-0057,0,1,1ac61283bb0c2cbc4087604b5df17a16843aa1606269b81805952e9e259afc2a,2025-01-14T01:15:15.883000 +CVE-2025-0058,0,1,8c854cc3b9cd8d37f23bdcb243a1d6a5a5ec966a10c671e68823b0f04149defb,2025-01-14T01:15:16.040000 +CVE-2025-0059,0,1,6416879787f54d6a44b6599a708532154a0b00797493957584bb4d5ef539168b,2025-01-14T01:15:16.190000 +CVE-2025-0060,0,1,1cd7402c377fe0eb71c687af689b0d9a4160c668897128edffbfc7ea6f4b4145,2025-01-14T01:15:16.350000 +CVE-2025-0061,0,1,1b8599d27b3c8b95785284a43802c929098c42ac59855f759f4dd597f002bfd5,2025-01-14T01:15:16.500000 +CVE-2025-0063,0,1,e52e2556ff38cc25592bde9486fa1da35995f2773770ff25a347e7df36a48b0b,2025-01-14T01:15:16.633000 +CVE-2025-0066,0,1,41773dd06eda78c1806c873ae42cd1b5433608a0fe1510b7dc5de4c2fa1f4080,2025-01-14T01:15:16.783000 +CVE-2025-0067,0,1,595fadc08a33537ee967fb524f132a140bd7562627c52fe87a8f7e09b94969e8,2025-01-14T01:15:16.950000 +CVE-2025-0068,0,1,335ecdc06a29db245188288060d2d78b12fd2ca685b50ec8e17c976ac125be2f,2025-01-14T01:15:17.107000 +CVE-2025-0069,0,1,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b09a,2025-01-14T01:15:17.257000 +CVE-2025-0070,0,1,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000 +CVE-2025-0103,0,1,352b1007b098afa2d34bba51797ff952dabaabceacfb5b1f82fbf222bdbd51d5,2025-01-11T03:15:22.020000 +CVE-2025-0104,0,1,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa83937432a,2025-01-11T03:15:22.183000 +CVE-2025-0105,0,1,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 +CVE-2025-0106,0,1,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 -CVE-2025-0170,0,0,1e1aaebb3b3ea60ab63e5ab305145d0097f6dd033dad0ff7e58eecea4cfcacf6,2025-01-16T02:15:27.043000 +CVE-2025-0170,0,1,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000 CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000 CVE-2025-0172,0,0,5e6c9a2cc035d62fed9c1b881e3bba0314c8fa73fea7e2b9997776b0e54bdcfc,2025-01-02T18:15:21.327000 CVE-2025-0173,0,0,c1f252ca4cbbf65084a89ab024bca7f0b17a90985239dec13e360a268ca33620,2025-01-02T18:15:21.630000 CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a78f,2025-01-03T02:15:07.480000 CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000 CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000 -CVE-2025-0193,0,0,22e4a67415b5b78f87b1fe2ec603407e11cb7817ac3940a91a886cb7e4d121d7,2025-01-15T11:15:09.280000 +CVE-2025-0193,0,1,4b495b56d409bb2765dbaf3314ca8b3a799ee7c0066963e20e79ccdf36f04c1e,2025-01-15T11:15:09.280000 CVE-2025-0194,0,0,ea5b846283dddc32441a679fd768e96aa19b3c1d104aaa33d0e1c65fbeb54de6,2025-01-09T07:15:27.667000 CVE-2025-0195,0,0,4a31363a70a4527ce2e7dcee4bd65277485625f8cdc86358a3b4c344e22b0b11,2025-01-03T18:15:17.317000 CVE-2025-0196,0,0,458f6c452cca173c50823549ec3211c7f71e44d78eccfc5dd05b05e882d53952,2025-01-03T19:15:12.793000 @@ -277125,17 +277125,17 @@ CVE-2025-0211,0,0,1231f308a8a19fe7e188df08eee04bfbb40d96d8d7aedf4b585262ba30a7b6 CVE-2025-0212,0,0,3c3c12990f6722e6931f7f3acacc45b6601ddb8dd97053741e30a3edcf9fbfdd,2025-01-10T18:57:05.470000 CVE-2025-0213,0,0,6bef0c75dc81eb31e07565360e28f49bf155cd51f023f2885184491d5da7e4da,2025-01-10T18:55:12.317000 CVE-2025-0214,0,0,ab9886cad04501c9f98045ea79a687bab3aa2f4e1c4678d885179cc363adf379,2025-01-04T17:15:07.507000 -CVE-2025-0215,0,0,274cfedfef2de82cff1c516c573f63194c2c3460514b1cb54d9498ab65ee33cc,2025-01-15T23:15:10.453000 +CVE-2025-0215,0,1,08cb0e78d8518652d70806039da4be5d34bb246340a84dd1b7de87a550ad62c9,2025-01-15T23:15:10.453000 CVE-2025-0218,0,0,a91b60f4ed4073b02889d97e309ff15efbe8b9733292847b26c61e47cf8d0fa8,2025-01-07T20:15:30.710000 CVE-2025-0219,0,0,0df779b4bd6d58b0ff20ad0b955940092f8097e652494bd0aaf18d3ba83a47b6,2025-01-05T06:15:05.183000 -CVE-2025-0220,0,0,45395f7f817c1d128320fc6be537026eba23ce1096090b22dad6583d6c985ec0,2025-01-05T13:15:05.850000 +CVE-2025-0220,0,1,269cc2e560c348f1b1994ba372a20953002a070f50bf6cbeed2267ac1c20455b,2025-01-05T13:15:05.850000 CVE-2025-0221,0,0,e357b1ab88efec7b52704640776688eff95bff4f33a5784e0c2522d62f4c04f6,2025-01-05T15:15:17.473000 CVE-2025-0222,0,0,37aeadb5f3e7cf3f96daaaf4c9c79ac6bedbde2921b105178cfbdea615ec7365,2025-01-05T16:15:05.217000 CVE-2025-0223,0,0,fa77f3f10594039dfcdc73e6676cd6a55a919d3f6ff18c758d51141999349e75,2025-01-05T16:15:05.497000 -CVE-2025-0224,0,0,34e927f26263eeac5f0865bb3f665bb84f78262646747e3c7bba3162445b1d7b,2025-01-05T17:15:06.027000 -CVE-2025-0225,0,0,a91ae1eadf32c482242f51bf8f72e22af3b1f7ce3c17b6a2772cbfd812c3104b,2025-01-05T17:15:06.620000 -CVE-2025-0226,0,0,5c7f1a56df5884eb2ed4a351cb56f6a5957723e6a8849f021ed968d386d02c75,2025-01-05T18:15:05.573000 -CVE-2025-0227,0,0,847107568540833be1e5672df6dd7f20806c2636011e125e8c958e2633648ded,2025-01-05T18:15:06.570000 +CVE-2025-0224,0,1,f46551b0ea3c1754c7f4ba497a71da09062f138fd56b447344fcc978180c77ee,2025-01-05T17:15:06.027000 +CVE-2025-0225,0,1,a8cf5b75f12e881bc9c06f6078f6625c3741128601ff8631c6af84bc4496f301,2025-01-05T17:15:06.620000 +CVE-2025-0226,0,1,5a387b1aece44a5d3e3e9bc6302963c238ea87bb624c19e92a150cd3cdaf46e6,2025-01-05T18:15:05.573000 +CVE-2025-0227,0,1,a3437970190e2a2af0dc233f43399ab83691e2bd828238de7278e8ea4b8fb03c,2025-01-05T18:15:06.570000 CVE-2025-0228,0,0,66938b3785f0c012ecf8107395e1d55bdcd9127038aa51a5d2ea2baf0ff1d498,2025-01-10T19:39:09.157000 CVE-2025-0229,0,0,8fff1ef8a125b1f6a9ab4d5590356169efaba829dabd76ed28cada0d33392c6e,2025-01-10T19:45:51.937000 CVE-2025-0230,0,0,4a92fa8518fc0d278c8c3cbf586ef798acb5ea44aa1520ab4d8f925c339cf1bf,2025-01-10T19:48:14.037000 @@ -277178,89 +277178,89 @@ CVE-2025-0339,0,0,cbbfea6db0802da47d039e5c973152ba413cad2d917d267fa4913f6c5b7b2f CVE-2025-0340,0,0,9f8d7dfd4d7674caee1cd6596de44a56e721410bd02446351bb9cfe3109bd378,2025-01-09T07:15:28.260000 CVE-2025-0341,0,0,34691be6c91dee5a7eddd15393d10444959b571a53ae5dc2cf37690cab93d762,2025-01-09T08:15:30.060000 CVE-2025-0342,0,0,c0ced5aaf34287279d842270e764809b2ee2324b19427e671c3863b96f97c211,2025-01-09T08:15:30.310000 -CVE-2025-0343,0,0,b15ff67e3988e943595e3cea0a33d7279440383e3a14bd3c10dc0998480b25fb,2025-01-15T15:15:13.953000 +CVE-2025-0343,0,1,eecaeb2344254abae1f5f670e197415178cf362048810fda7a18edd78eef49c7,2025-01-15T15:15:13.953000 CVE-2025-0344,0,0,01437ae923f1cc2bbba7f217401e4d3cbf96038b1beb917f0e2b7fe28b7c2e1b,2025-01-09T08:15:30.517000 CVE-2025-0345,0,0,c3d5fb4ce1a2ffd9e41165f9ffe772836159a0e2b94ea1d233a347865b0f3929,2025-01-09T09:15:09.220000 CVE-2025-0346,0,0,3ca882ed5f0f6ff30f77b6214e7e7bdd383925e6a59aee9ebd80a0c7383e3bae,2025-01-09T09:15:09.393000 CVE-2025-0347,0,0,ec55ad444ba1a81cdc39b917c4d69e23fb6f894614506108703cecaf8b681d74,2025-01-09T10:15:07.170000 CVE-2025-0348,0,0,caf29c7d10aa1d0bc868897d1f5fe71d1c997b913af05adf015858af50a20840,2025-01-09T10:15:07.700000 CVE-2025-0349,0,0,5c5bde0373ec0c26c713a0d565cd6e4461e0dfe3c3d54fa435cc26640f811d63,2025-01-09T11:15:16.547000 -CVE-2025-0354,0,0,d346f95fc15ab97802a71c3b9eea7692ca5351a1209bc93508539ce9d3279e05,2025-01-15T08:15:26.330000 -CVE-2025-0355,0,0,33e06caab68d0194ce530505431588240b2a7740117cb710b974201c33bb57f0,2025-01-15T08:15:26.493000 -CVE-2025-0356,0,0,536ff409278f7933d4a453ae82fd41c47596f9a16213b1ee32a364925d5f4dda,2025-01-15T08:15:26.650000 +CVE-2025-0354,0,1,efce1f0b08ce1160a0847d2aa933618e48ac6c2332a3b9787b6299e335cc4681,2025-01-15T08:15:26.330000 +CVE-2025-0355,0,1,74a2220c407d4807ac858b34aeda75fee0408821f241c76d755b61749f4d86af,2025-01-15T08:15:26.493000 +CVE-2025-0356,0,1,b7b9d033ece755ec761d5c32be0fa6165ab2adbaf63cb741175769ef6f1d5b52,2025-01-15T08:15:26.650000 CVE-2025-0369,0,0,60e0263b7bdd9bb8b2fbff594a1f912ed9cb257670ae53622ab1064bad30f4a5,2025-01-18T07:15:09.720000 -CVE-2025-0390,0,0,e8680a8850f5f93c327358a0bafb5800686853499fcfad6c845505a58dd62509,2025-01-11T08:15:26.527000 -CVE-2025-0391,0,0,92a57f196719fdf887816695b3a83526079e0969236a36b3dfc45b775c9f93d0,2025-01-11T09:15:05.937000 -CVE-2025-0392,0,0,aa9606366d99278451746d2e901d7f278b325bf8d4482ec56713b1565fb0cf2e,2025-01-11T11:15:06.657000 -CVE-2025-0393,0,0,56b699241aaf51aca5a46ec79f964e450166b4c664d01f0b42fd7672d51339f7,2025-01-14T09:15:21.263000 -CVE-2025-0394,0,0,890e0759a17576662cd63f2be0365eb999eefe856d7c156cfab4ef63ab8c8335,2025-01-14T09:15:21.430000 -CVE-2025-0396,0,0,40cf499d3af0887461cef0ee82c838ac2a8e455615e0ec1716aab5bb9b6cf389,2025-01-12T12:15:17.963000 -CVE-2025-0397,0,0,3df48a7f37b6ddd991a6e6b1d0d3d26e3ecb37c3bfeb145a466570cacbe4e525,2025-01-12T13:15:07.333000 -CVE-2025-0398,0,0,afd394c257e601522591072049c131282d9fd441fccfb2024d6a2bacf7579a14,2025-01-12T14:15:08.993000 -CVE-2025-0399,0,0,d60b1b6ef61b0ec183b16fa9fb492e99dc1a626abcc7c266cc75d7da6f283ba1,2025-01-12T23:15:07.050000 -CVE-2025-0400,0,0,e75b7707074f3934617e4387fdd7dc444ef02cd9e555bb333b33000d55af7a84,2025-01-12T23:15:07.260000 -CVE-2025-0401,0,0,387e19a2812b1284381b4c9d44a677a221e0b3ef26759604ce2f59eba2070a83,2025-01-13T00:15:06.807000 -CVE-2025-0402,0,0,9535638fcb03e30ea11b5c4b5bbda52e7fa7f3950ffb295da164028bcd69947c,2025-01-13T00:15:07.707000 -CVE-2025-0403,0,0,410c24d6d1526a0b93f1cc8d7a91ca28b7a89a1c34c372c6fcb34f8a0ae69847,2025-01-13T00:15:07.873000 -CVE-2025-0404,0,0,9c1c31a342a5cece29ac87c84fe863c6f7ea1dc0117f323ba50b5e921bdd430b,2025-01-13T01:15:07.227000 -CVE-2025-0405,0,0,6203d69c2ea9d8b524135de8a7adf37795735b2b486cc69ec882a2a0f5fe34a6,2025-01-13T19:15:11.227000 -CVE-2025-0406,0,0,9d39f4351b80363b18f117ed5d9911db0718111194c53ca1c3cdbc210fb572d4,2025-01-13T18:15:20.490000 -CVE-2025-0407,0,0,ad3b248e96a0fcb777157f95341630e1089e656ed1e5f38d08eba0350c50a941,2025-01-13T18:15:21.023000 -CVE-2025-0408,0,0,a96acf9e81a811691f8b520b286233eef15e7059c8d8320ce584a1b7a8c2ed8a,2025-01-13T14:15:10.073000 -CVE-2025-0409,0,0,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000 -CVE-2025-0410,0,0,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000 -CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d3c,2025-01-13T04:15:06.477000 +CVE-2025-0390,0,1,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000 +CVE-2025-0391,0,1,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000 +CVE-2025-0392,0,1,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000 +CVE-2025-0393,0,1,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000 +CVE-2025-0394,0,1,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 +CVE-2025-0396,0,1,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000 +CVE-2025-0397,0,1,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000 +CVE-2025-0398,0,1,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000 +CVE-2025-0399,0,1,d2c97a133b7a138693f8890bce8837f3b66615524dad7c71fe27241c6a394490,2025-01-12T23:15:07.050000 +CVE-2025-0400,0,1,bf1703a1d8ec49a4dad24e604cf9e04c4f9446d33106b65b2241abf21b1397aa,2025-01-12T23:15:07.260000 +CVE-2025-0401,0,1,00561882ff10b7c579d77c2f86cd2669a1d241e9d8398746070334cd4947cca7,2025-01-13T00:15:06.807000 +CVE-2025-0402,0,1,7ba2e2fdb43cceec4a71168f81ea2ab92da2f5a6435b6d4a4608738c6b9d3b94,2025-01-13T00:15:07.707000 +CVE-2025-0403,0,1,66abfbb504a6e8fd2c2fefce2aebad4930e8f4a1b270402553f04fac376247c9,2025-01-13T00:15:07.873000 +CVE-2025-0404,0,1,bbe941bc2515b29fa4f3f29f40699d28bc77e3d71e177bfe9add0b9faef27698,2025-01-13T01:15:07.227000 +CVE-2025-0405,0,1,9a61329ccfe59df7f3a52e89d7e567e84eac12ff09248a1b977b50aec3c7d9ff,2025-01-13T19:15:11.227000 +CVE-2025-0406,0,1,0a0b16287b364cd9b069433fc6ec52528b304b9c8b95765f2cf4abf0f1dc3e79,2025-01-13T18:15:20.490000 +CVE-2025-0407,0,1,8d1bea41d96dceb0e8000e5eb9f589c13396bad4054ce09f0d87bbcc36005aa8,2025-01-13T18:15:21.023000 +CVE-2025-0408,0,1,2729cf9415a38755adad695073dad161acc79ef38638b787879efcd1f5040e8e,2025-01-13T14:15:10.073000 +CVE-2025-0409,0,1,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796f0,2025-01-13T18:15:21.430000 +CVE-2025-0410,0,1,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000 +CVE-2025-0412,0,1,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0430,0,0,3df411857494f23f4104c7f6ca6fdc22130d91a76d6c4544b3161220203412c9,2025-01-17T18:15:30.920000 -CVE-2025-0434,0,0,6b09fdee4a1c3fd4134245b9fe1d0b966b891282ee9f6481cd52455196ff3273,2025-01-15T15:15:14.273000 -CVE-2025-0435,0,0,12a908c6bc976560385e7102d635ad66ec30f16edcaf6473415ff2f9c1a74a6e,2025-01-15T15:15:14.430000 -CVE-2025-0436,0,0,857240181b7b3c09b957ab2dbad6e416781a51bbb4f39b3bb16f673e65f24a93,2025-01-15T15:15:14.620000 +CVE-2025-0434,0,1,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000 +CVE-2025-0435,0,1,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000 +CVE-2025-0436,0,1,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000 CVE-2025-0437,0,0,8144e791baf083d7704b74c466b5cfc428fa8bd0723d4a5e124341152ac85113,2025-01-16T20:35:01.140000 -CVE-2025-0438,0,0,40f0515d9c066b2dd61b04257bab55c62a984bd63173c0c1585818cd7db6e9be,2025-01-15T15:15:14.817000 -CVE-2025-0439,0,0,a590b776eae64c78f39e80dda70995610893b1edcbd81c01f8a8d17030aa4390,2025-01-15T15:15:15 -CVE-2025-0440,0,0,0a1c8b7a965f24c577d8b893158c2889c18e935558c6f32f5da5cc0794405274,2025-01-15T15:15:15.247000 -CVE-2025-0441,0,0,e05262218d4acc33932a904d6d1633dce136918d622937b65aee95ead5cc762b,2025-01-15T15:15:15.457000 -CVE-2025-0442,0,0,85ae696c005b15858495905fb9fdc36f1f7538685c08a3b67d7028bec978498b,2025-01-15T15:15:15.620000 -CVE-2025-0443,0,0,036098e88900d992a095ec7921eff7d5eb0bc88075298505df362c92e2ca8fba,2025-01-15T15:15:15.787000 -CVE-2025-0446,0,0,b25847611c152c80ab5af108896abe2a04b8fc1b35d33e188344bafedc3b6b5a,2025-01-15T15:15:15.960000 -CVE-2025-0447,0,0,138036fe549fb5dfab13974a3a7e47ae79c89eaed414c24b8cf74783a36c14e1,2025-01-15T15:15:16.123000 -CVE-2025-0448,0,0,9737e1fa272da2233ef1ed93dd9ff1970ce75261fdc9a589a193db451cacf099,2025-01-15T15:15:16.277000 -CVE-2025-0455,0,0,7e0ad5449b041c53f734be428a31bc6a89dc398ea20bdfa939a9fd70a4abf29c,2025-01-16T02:15:27.203000 -CVE-2025-0456,0,0,c9c279a8e9b15f51a325b001d98fa11372919fecd3f4fd4a6edf61e03b1f1c0f,2025-01-16T02:15:27.387000 -CVE-2025-0457,0,0,405b792def7adc24ffc4fcc8d4e99a3e6be8693d2375d98d328f438c15858c78,2025-01-16T02:15:27.553000 -CVE-2025-0458,0,0,45329d1650f63d093b7e8acb76f7370c8c0262fb6197b3161a1f0db17a2920b7,2025-01-14T16:15:34.397000 -CVE-2025-0459,0,0,7f66205a9ceec34ce8406cb81bab600a3721d11d4c8a05bee0623fea9fbc9cf7,2025-01-14T16:15:34.617000 -CVE-2025-0460,0,0,4ed76bb5f64af8fe8c4011df0eca20c45ae0fdebb5a3f0252615a76ad2d1b042,2025-01-14T16:15:34.800000 -CVE-2025-0461,0,0,778cb53abbad6c462a7bf23509d43b2fd8823f830741a66b5e7c242209e775e0,2025-01-14T16:15:34.997000 -CVE-2025-0462,0,0,91ebd265d9f4b4a8609372c2b8ed60c3013eb48b8066da851324b4541dfdb781,2025-01-14T17:15:21.040000 -CVE-2025-0463,0,0,042529bee5619cab4c0caec0903541a1e907aaf00516bec15ac9a74d5f64267d,2025-01-14T17:15:21.210000 -CVE-2025-0464,0,0,80c2bc95d50c713972edec6dc7d153c62488d8880041d16d73f1c9db54dac997,2025-01-14T17:15:21.387000 -CVE-2025-0465,0,0,6bbd81e7422bebba96c70ce0da9cdbb0423e61273c917a50ebc77b69676af96e,2025-01-14T18:15:29.883000 -CVE-2025-0471,0,0,5f089d238aa93eb77e7a83ddaf8879744fa24cef05bb2da4c110089af4cde236,2025-01-16T13:15:06.973000 -CVE-2025-0472,0,0,59a6947073fccbb91de356be2d0ce5c4b81cc89c211292ee828d31d3d865d81f,2025-01-16T13:15:07.353000 -CVE-2025-0473,0,0,673552e9170396a25fe05497fb932e4bf5857a3a0b866ac4bee1f09976cea019,2025-01-16T13:15:07.540000 -CVE-2025-0474,0,0,469f826f4845a259aa881ad42b8eacd95b41d69c527a4acd303e5e0c3ed0c4b7,2025-01-14T19:15:32.930000 -CVE-2025-0476,0,0,5cf89dbc48f126dc941ccdc658ff72cf7ae3856b9cb1005f07cc2f9dcf852c1f,2025-01-16T00:15:25.217000 -CVE-2025-0480,0,0,e092b69b17ce664f29d203f06bde29cda1f01654d85548b205c10efb41a0322f,2025-01-15T18:15:24.457000 -CVE-2025-0481,0,0,6055fd3353d8c887f362d28d480da0be5338049d687506a3b52d8b7c0af28506,2025-01-15T19:15:26.807000 -CVE-2025-0482,0,0,8b20e5aa158c38b38fb2c143fab4838c1b1e0b2fe8aa5513704bf8dee8f916b0,2025-01-15T21:15:14.653000 -CVE-2025-0483,0,0,893ed5987618ca7c97f5426c8951dfbe2ccc0e9df236c11015b7e50d0b363b68,2025-01-15T20:15:29.040000 -CVE-2025-0484,0,0,b013cc873755fa671111ee9676cdbc5d83472f586ce91385aff0b6bd336451f4,2025-01-15T20:15:29.227000 -CVE-2025-0485,0,0,f73ea3212d3f8bb57645a5a3186a67a483153769046e197e77cb0f8fbcca7e26,2025-01-15T20:15:29.400000 -CVE-2025-0486,0,0,46acd9214cd963a88ec9311c0e6dfcfe4a6ea1db37785856bda1f0ccaad6f2ca,2025-01-15T21:15:14.960000 -CVE-2025-0487,0,0,f254ff4eba12361ad33cafe695d950724dc64dda0c40f08cdaac336df89bb15b,2025-01-15T21:15:15.160000 -CVE-2025-0488,0,0,9be963ad82fec8f83798d8b0fa32da724001a3dc9b24735d83f53a773d58b3bd,2025-01-16T16:15:35.347000 -CVE-2025-0489,0,0,8f94857ceb6b7aac464cda56d55b3ffd3a260fe592b0690d982994fe0513f523,2025-01-16T16:15:35.517000 -CVE-2025-0490,0,0,a264f3de6b2f9060bb1641bb4dda25c4d6261e0fcfd2f30ed64dcd21860eb528,2025-01-16T16:15:35.653000 -CVE-2025-0491,0,0,e2c578f6867a872596ea91113158697f19532a63f0930ed0dee8793b679ca3c5,2025-01-15T22:15:26.990000 -CVE-2025-0492,0,0,8a17b017a98a002e0eca45e84c80fdbdf21fc23599e7b8c3264d472e99151077,2025-01-15T22:15:27.157000 -CVE-2025-0500,0,0,7c3466d64b8c8ab9f735aa3c3f46ce64626b7310542fe424f3c28d5da1451b7e,2025-01-15T19:15:27.003000 -CVE-2025-0501,0,0,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c6547,2025-01-15T19:15:27.190000 -CVE-2025-0502,0,0,3f983c4e65bc0e78af8f9f866ec1bd6cbe586e74611a52dc0d65bfadf6586674,2025-01-15T18:15:24.650000 +CVE-2025-0438,0,1,39caf6a5a4788bf8fc0f6b91aa36aaac29a5413ddbad6f8e163db37af52d3ab3,2025-01-15T15:15:14.817000 +CVE-2025-0439,0,1,0b06da63dc3bcca461d845db4298a4b15ecf0710d9ba4c4d9523a576764e9836,2025-01-15T15:15:15 +CVE-2025-0440,0,1,f9b771ae4043bf8cf99eeaad5bdb101bbcdc5b7cce3f6409b0beeb87f15a5e43,2025-01-15T15:15:15.247000 +CVE-2025-0441,0,1,26332060114c4068ecbb96a794dcaaa6135de1fa3dd0e37a1538f57f411fec18,2025-01-15T15:15:15.457000 +CVE-2025-0442,0,1,442cfc3bdecde4480914197c1dc65a4d90e7086d405c2afa64185312f18ab466,2025-01-15T15:15:15.620000 +CVE-2025-0443,0,1,c1909e796cb00e8de6a9a5854d80254cec51da86d4853de7e67dd141d381210f,2025-01-15T15:15:15.787000 +CVE-2025-0446,0,1,94e6a4f8238ac08191b1b1193dfc6ed660ba2c81f2654a86993face2b3a1da98,2025-01-15T15:15:15.960000 +CVE-2025-0447,0,1,3557744a211333232e7804efa6ea8142b021fe0e2643e57c3966ef0e6eae106e,2025-01-15T15:15:16.123000 +CVE-2025-0448,0,1,fd891759faceb30544c1e8bca8f73da87c02e801462e8b0ca59fcc1cdae9bb12,2025-01-15T15:15:16.277000 +CVE-2025-0455,0,1,0788a35b7031b1503942329db48de69d2dae6db6b33ff6b776c7fa5eff813a90,2025-01-16T02:15:27.203000 +CVE-2025-0456,0,1,c3118eb6282d0d2d5cf0b0b18ba4321a7c4ee4642eefb293f75da78a6b102328,2025-01-16T02:15:27.387000 +CVE-2025-0457,0,1,6c68c67055a4f977d01fcaec54af3a741663b7ba3a654f25dcda2d901b15c7c0,2025-01-16T02:15:27.553000 +CVE-2025-0458,0,1,f78503d7379ac6fcc64df7e6eda98b1cb99cdf21d1bfdb0d3fbe5840c276525f,2025-01-14T16:15:34.397000 +CVE-2025-0459,0,1,827b705be897536f2f89c12748d2e242ee06fd15e69ebe8736e1e5e3b76eb590,2025-01-14T16:15:34.617000 +CVE-2025-0460,0,1,19cc7293fe8d8ca9a359b4bdf88bb76e9ba0569d474f75c96aaf97b890bb35db,2025-01-14T16:15:34.800000 +CVE-2025-0461,0,1,e0de3e04845ddf6b8272dbca563670c19775e54e22a0193604a8ef1778525a4c,2025-01-14T16:15:34.997000 +CVE-2025-0462,0,1,7dad614f764d437d5dfbf965df87b3792548e23ef19b9c5ee869ca20188ceae7,2025-01-14T17:15:21.040000 +CVE-2025-0463,0,1,833cfce061a9e4c6aff0214160b0daaa486ede160bebd86f70699079f3bd166e,2025-01-14T17:15:21.210000 +CVE-2025-0464,0,1,c8401a32c4444b2726245a3c43b8df320378bbc93ad0870418154cbe59af4a9c,2025-01-14T17:15:21.387000 +CVE-2025-0465,0,1,5201faa2dfa57bd14d4b6fb9a33615d85c230f753e445d877363ab9565749298,2025-01-14T18:15:29.883000 +CVE-2025-0471,0,1,9169e9b54a074f1e0d8f97ed160fc9e64cab0efe853cd7456e368c08c8fa7679,2025-01-16T13:15:06.973000 +CVE-2025-0472,0,1,0f40580898fe8da8d58e11b525a8aafe4140ddc85dd699a671742e2ebf135a96,2025-01-16T13:15:07.353000 +CVE-2025-0473,0,1,1dd10a9273539100ae454eabb570ef30f5a1ca54c056c49681717a1070ea05e3,2025-01-16T13:15:07.540000 +CVE-2025-0474,0,1,82177afd4a03f9b6718aa062961dc28425e1582c17c2ed083ad764687f417f46,2025-01-14T19:15:32.930000 +CVE-2025-0476,0,1,d5dedaf074b8e1ffdbcdfb09b37c5419fb4718d4a0a50274a1a3fdd85de6ca12,2025-01-16T00:15:25.217000 +CVE-2025-0480,0,1,0cb09a8f6ce0b89170992f0c154f24058b4f34598442baf21a60641247a52751,2025-01-15T18:15:24.457000 +CVE-2025-0481,0,1,ea23d14dcc3acce7aaf6b481730febc16b60b2cfb742b3ce32274b3236e29b50,2025-01-15T19:15:26.807000 +CVE-2025-0482,0,1,51755e11e1fe85bcdf8c3ef7c747a7a90c189e81d239d3c797b168fc9a111599,2025-01-15T21:15:14.653000 +CVE-2025-0483,0,1,121ceb10d05ea57965d73fd7de54dea21193e629abb8500fadaeee53de942954,2025-01-15T20:15:29.040000 +CVE-2025-0484,0,1,92d63d2b50ec1984b131e9463fd102abf018e44374062d31835457a5d554d3d4,2025-01-15T20:15:29.227000 +CVE-2025-0485,0,1,5dfbf9e60197c677be8996c393b954ccd6f5c08903b3e5a026b6b02b15a407fe,2025-01-15T20:15:29.400000 +CVE-2025-0486,0,1,f674e5967d2ad379c1d35c08c0d5d0cd79e16dc9ca92b0757a840b020e89fc38,2025-01-15T21:15:14.960000 +CVE-2025-0487,0,1,9a6f935b511f835cdcb3153dfd2ce2cc55e17783eef32d34026b854d4ebb41e7,2025-01-15T21:15:15.160000 +CVE-2025-0488,0,1,5a2c8f931caf677c96dc18607ae260506970639c6e34580d9069775d9be6fc5b,2025-01-16T16:15:35.347000 +CVE-2025-0489,0,1,a24dc8200140f72a873da603310104369ecbf6fd64e7830d413cb9f47b4c7d0e,2025-01-16T16:15:35.517000 +CVE-2025-0490,0,1,1f384416061d2dbf3f188e10aae42ad077e67eabf02b270fb3286b559e5f665e,2025-01-16T16:15:35.653000 +CVE-2025-0491,0,1,a2df37225351b197908dab4eef671d4122bfdb72a19e53971029c11f697c589c,2025-01-15T22:15:26.990000 +CVE-2025-0492,0,1,84421fce7cc144b94f0258c9d48e69eeae8d312d182afca6c8016ab8e7304bc8,2025-01-15T22:15:27.157000 +CVE-2025-0500,0,1,becd023656775ff5c4936a59a68e6a89715d3f37dd13ea15331831b7fe4160a8,2025-01-15T19:15:27.003000 +CVE-2025-0501,0,1,ea1a77153105d5c413ffaf8904427d77aca61ab1caf34964f69950874cc4ca25,2025-01-15T19:15:27.190000 +CVE-2025-0502,0,1,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 CVE-2025-0515,0,0,04ba16d00bf299820d0a2921e327edb4cf22faf321c246adae3849e409768183,2025-01-18T07:15:09.903000 -CVE-2025-0518,0,0,f6f7f54f47c0cc56f86ba02b126d49c24a3e7530d58da45540d2064eda773818,2025-01-16T17:15:12.577000 -CVE-2025-0527,0,0,d2b51becab8c01f94a687e28d364a879eb752a601305b6821988eb5f9c5bbc2f,2025-01-17T14:15:32.840000 -CVE-2025-0528,0,0,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000 -CVE-2025-0529,0,0,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000 +CVE-2025-0518,0,1,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 +CVE-2025-0527,0,1,5f842d2c319b31715d60bd1a297bca44c8c2e53a1d74ca710562a1fb7cff2398,2025-01-17T14:15:32.840000 +CVE-2025-0528,0,1,a15c2aaa54c0d6dda4ceb20cf00f64dbe2db0fc4448eba47d2af25047a4d8649,2025-01-17T15:15:12.430000 +CVE-2025-0529,0,1,69e90ad7e3f6788572850afb1656942815d90ae34b98fce961e18202b13be561,2025-01-17T15:15:12.670000 CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000 CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000 CVE-2025-0532,0,0,4d92732b352395641e27304ba949a5d746e81750f3574c04f91dc679f65ac49d,2025-01-17T18:15:31.237000 @@ -277277,178 +277277,180 @@ CVE-2025-0557,0,0,02f1591d13c69cc704deb2418c78ecda10342b88f0da7a742a9052ce142dad CVE-2025-0558,0,0,e6ae7cd63ee086a636ac4e9d186d59f2a3d6ddbb3865e941307bd5dda93830f2,2025-01-18T13:15:20.417000 CVE-2025-0559,0,0,df08034282181cdc941834fd33602e6c18b0d413afe7d3021c77fd9edddb43a9,2025-01-18T14:15:25.420000 CVE-2025-0560,0,0,a8dad0e6326d118750e8c8a516030a35fe209a3585b22295c165d1200aa0617a,2025-01-18T15:15:08.343000 -CVE-2025-0561,1,1,fd9b012ebdaece6d373c25b915aa1ce00990c69daaaaf36bf7683a0e1e96a65c,2025-01-19T00:15:25.077000 -CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000 +CVE-2025-0561,0,0,fd9b012ebdaece6d373c25b915aa1ce00990c69daaaaf36bf7683a0e1e96a65c,2025-01-19T00:15:25.077000 +CVE-2025-0562,1,1,c526f2bbf0ee53dbd7b87b3a977b73812d0b8c8e2d0a2cc04f356d0f5568981e,2025-01-19T02:15:24.380000 +CVE-2025-0563,1,1,c8aedbc0ad6c989f8bd21315356fde60bbf39135f127f9d691ff6d583ecc9784,2025-01-19T02:15:24.560000 +CVE-2025-20016,0,1,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 -CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000 -CVE-2025-20055,0,0,4481d7f4c3cc830705c1eb16fa82e8c2d4adf8a0cdb08b44fd27c81f868a9268,2025-01-14T10:15:07.710000 -CVE-2025-20072,0,0,2136f3a7cab22da66e40db95bad66767ecfd0d993ae429c8c373621ce4a9fdaf,2025-01-16T18:15:28.517000 -CVE-2025-20086,0,0,f06f00b9d9fcd55024711b0c01af1bc7d43df8107ae65daf906a2c6079a313de,2025-01-15T17:15:19.107000 -CVE-2025-20088,0,0,d947ee56da92b2c33874db16a945d4b37e4644d68fcc15e5fd6ff2d06176517e,2025-01-15T17:15:19.243000 +CVE-2025-20036,0,1,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 +CVE-2025-20055,0,1,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 +CVE-2025-20072,0,1,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 +CVE-2025-20086,0,1,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 +CVE-2025-20088,0,1,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 CVE-2025-20123,0,0,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000 CVE-2025-20126,0,0,0fcc9383f8a59c5e0d551ae3c2ee7933f9c74701d79731c282030a0992412e7d,2025-01-08T19:15:38.553000 CVE-2025-20166,0,0,188546bff78f1ed6c60c3dafa709981ac0aa7d116e226da5b14281c3f0f04183,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,ea01454738582257d8f0561c538bde2bc3fca79642eac6232d7fa05917ea3b87,2025-01-08T17:15:17.163000 CVE-2025-20168,0,0,f8a58ad4899086a228f10ada9d537b9205b9094ad2b0c298be3af0260ad230d2,2025-01-08T17:15:17.323000 -CVE-2025-20620,0,0,1e8e0ac38b52cc7a57624834c34b6768518bcb15ec9ff959866d53e2714e094f,2025-01-14T10:15:07.860000 -CVE-2025-20621,0,0,a65c666f7692d0cfe1f7d2220eac9397bf75609cf1b16a162daee04d247c0f37,2025-01-16T19:15:29.960000 -CVE-2025-20630,0,0,fa7d465d0e72226e8edb725874a5f0534c31bc32c30554e38d1b837bd26cc94b,2025-01-16T19:15:30.110000 -CVE-2025-21083,0,0,bde230085acae3b8ee82987a40474bc6f89f698fff6d68c5dc4d6a15adaaf265,2025-01-15T17:15:19.393000 -CVE-2025-21088,0,0,4d97650e61074d15eb4f9ac852002ba22f48e9e2102c319672013d500f9743ea,2025-01-15T16:15:32.413000 -CVE-2025-21101,0,0,b27767eb018ca9208e6e3b4d35ab2fa7cf1157b29665b05a7014c432bc061e47,2025-01-15T05:15:09.097000 +CVE-2025-20620,0,1,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 +CVE-2025-20621,0,1,6a114b51d7b17c045df262a66b6010baf7d9e3634e11632f91e2ccc96791ec1e,2025-01-16T19:15:29.960000 +CVE-2025-20630,0,1,b69f04020608923d2a464ad06edf2aa9ee933f1eafbc166f5b91bfd601e0dcfb,2025-01-16T19:15:30.110000 +CVE-2025-21083,0,1,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 +CVE-2025-21088,0,1,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 +CVE-2025-21101,0,1,1ef0167ef283dbabcdd7bd0e2debfd81378d1bf596b30170903b5a150ed83abb,2025-01-15T05:15:09.097000 CVE-2025-21102,0,0,8153781fb244bf502850065fab180d787cadc10df5675c4bfb3f0250244d97ce,2025-01-08T12:15:22.850000 CVE-2025-21111,0,0,ac99f23afec6fb5ea7aef333a4f2d14bc0359a06e3db388b0b698b212d2c1078,2025-01-08T18:15:20.157000 -CVE-2025-21122,0,0,43e018e554d36ad8c27426d45eac54aac7111a0f7fbc00c5faddfbf20d24d353,2025-01-14T19:15:33.070000 -CVE-2025-21127,0,0,ff3f2190f0b612f83d2bddb73540fbc2cccf294add7d86059214c07a30b1706d,2025-01-14T19:15:33.230000 +CVE-2025-21122,0,1,ea413e582ae453fe56a0d16448a41ab087511f8fc84dce169b1dd1e0cebc7d9c,2025-01-14T19:15:33.070000 +CVE-2025-21127,0,1,f4bc482a58e381a20321cbbdeaa050ed9cde9073a4c43797f44f5c980d42dfdf,2025-01-14T19:15:33.230000 CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000 CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000 CVE-2025-21130,0,0,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000 CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000 CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000 -CVE-2025-21133,0,0,f39e797c9e3761662690c0d0c0e02c0c918947858d1f9156eb425e12cd546319,2025-01-14T19:15:34.187000 +CVE-2025-21133,0,1,9671a59d822b6e305661ebcf4c1ab3b0a6d822c552cc3decfc4e514b8635b11c,2025-01-14T19:15:34.187000 CVE-2025-21134,0,0,c93daea6012e8c7d66590fc258c4a36aadabfb4ef78a3c9c6e5bab6127e3d755,2025-01-16T20:43:02.810000 -CVE-2025-21135,0,0,c9c3ecb3908293d81f3245af42be596eafeb2d021f670b2a2e192c0c24a4a599,2025-01-14T20:15:30.853000 -CVE-2025-21136,0,0,79dae5181fa7da195a50b7fadddf90fba53db25c31080837f1c9ba57a6f51e47,2025-01-14T20:15:31.007000 -CVE-2025-21137,0,0,687083356b2e544e1043ff9bf940d90d5318f3e7185e9a7d2b0e0f2da0415a78,2025-01-14T20:15:31.157000 -CVE-2025-21138,0,0,08c65a1e77cfc78d8e743e64e72429ddf4978a0b5768060c7c4e4497124c9a27,2025-01-14T20:15:31.300000 -CVE-2025-21139,0,0,0ae8a2f402dbe47bc1c1cef9c911e964231513f0bf9de1a55ab8b76a17edd5c4,2025-01-14T20:15:31.457000 -CVE-2025-21171,0,0,0fd0c81a28d023d83d44fb007d96cb31879cfb17caaff9a41eb8631139d98484,2025-01-14T18:15:30.100000 -CVE-2025-21172,0,0,4f24a61268da184b858f9e77120c20e5fc66016bfbd974b21d25930e48989f9c,2025-01-14T18:15:30.300000 -CVE-2025-21173,0,0,5d58cc1bc98454cc231277f66b132069108794b4784bc70fe1c2f951f9b342b5,2025-01-14T19:15:34.583000 -CVE-2025-21176,0,0,fa110a0f22c836c12f0cf2ce220d5de18c4ab88ac77aabb721f68f988794d79a,2025-01-14T18:15:30.650000 -CVE-2025-21178,0,0,1b6a69fe03b4fb3f04715244cc0650d44ad2017e1071e6abf791436e0822e04e,2025-01-14T18:15:30.847000 +CVE-2025-21135,0,1,776c95bb51665d84be5a830d97d2862f122d1a44bd3b4ec372c6a83121f63de6,2025-01-14T20:15:30.853000 +CVE-2025-21136,0,1,b57aa173021a4e4b26744bb856aaa85adac3d80bd05628818f86939614cd6953,2025-01-14T20:15:31.007000 +CVE-2025-21137,0,1,04dde39eb20fd3931b58c237402765acf2b265948eeafdd7ced071dd7ccd4357,2025-01-14T20:15:31.157000 +CVE-2025-21138,0,1,3c71b64539dc5343890da080326b4f06e57aeb97060cfdc1cd37692a585809d2,2025-01-14T20:15:31.300000 +CVE-2025-21139,0,1,b11d440a36e36f684360d582eb402d9046255327ce7d1341503a8e4009e7a588,2025-01-14T20:15:31.457000 +CVE-2025-21171,0,1,d57716ca15720cd6424731568a4ef6ed8026e861e64e057afd6f0c0e42e239fd,2025-01-14T18:15:30.100000 +CVE-2025-21172,0,1,e507c34130e80c6d7033019b7ff6f972bf61409eca72ebd570f655cdb9708747,2025-01-14T18:15:30.300000 +CVE-2025-21173,0,1,35ad3b00f130ff650bc6985e9c58510abac9fbd2f22ee21de290af1f777d528a,2025-01-14T19:15:34.583000 +CVE-2025-21176,0,1,24a3cd046462e2f499d67b72b0cf5d2fbd91b0e878ed5c8363cdc49fdb58a368,2025-01-14T18:15:30.650000 +CVE-2025-21178,0,1,313ae4e0255420332c87f4825c14d5de2516b425bf7ab10262d7813f1cb6e8a0,2025-01-14T18:15:30.847000 CVE-2025-21185,0,0,1af79d3ef8f65c7dfb2c433d952a1d4f646119e4c304c6d9df90c5fba85cd1b8,2025-01-17T20:15:30.227000 -CVE-2025-21186,0,0,91a8abe2a73ddcfa1782c8e7ce8a598c73ba47e42f61be06b2519fd9c6895eba,2025-01-14T18:15:31.020000 -CVE-2025-21187,0,0,b9e3dedb73276bf5967898c1d3b393f17bdb00693d151852eac842fd28055fbf,2025-01-14T18:15:31.187000 -CVE-2025-21189,0,0,4d509212258b8740ea90cead040b9819ec41a61e1c261bb431a52d9cf1d53af4,2025-01-14T18:15:31.377000 -CVE-2025-21193,0,0,17c75fd265980cdd7b45a56f6707ece09be388338b8c2b7c5b7be7fd4aad0383,2025-01-14T18:15:31.637000 -CVE-2025-21202,0,0,1d39bd1cf38d1db4096b20c7a29a364b71755980f834c3fa4fef181a49beff07,2025-01-14T18:15:31.827000 -CVE-2025-21207,0,0,e68d3efb53137871ce76f1e820d697d871f885fa78c1c4c055a003fbaeaf1115,2025-01-14T18:15:32.027000 -CVE-2025-21210,0,0,504bdc5a0f4c733f28c72121c9e1e272a1c6c5fff07a837c179ce4601c83b9ac,2025-01-14T18:15:32.207000 -CVE-2025-21211,0,0,a516198e4a25e4c5db5d2713f8e54e107d219ef06f12af77dd834b3eca6c5d39,2025-01-14T18:15:32.410000 -CVE-2025-21213,0,0,29a5feaf27f203ed75c44a5a933f2149fbfa29f1af4c7bdb2584c1a2a31fe0b9,2025-01-14T18:15:32.600000 -CVE-2025-21214,0,0,6a3eca0c91046e0aade154604ce58fa65d4f9a8155f13059df068cd20ee8e9fa,2025-01-14T18:15:32.777000 -CVE-2025-21215,0,0,6a3cec5d24756485230d6cd078554a06b2ae85748f2925d84e2d4d8260d0dbc1,2025-01-14T18:15:32.973000 -CVE-2025-21217,0,0,0d089e7d6efec07bc4bc9606aa6b02d0e906628d7428000a5a7999602539bd62,2025-01-14T18:15:33.193000 -CVE-2025-21218,0,0,75130bf3499c957e15f419e133dfd7fa4d5325519f0e94e72843be767beceedd,2025-01-14T18:15:33.370000 -CVE-2025-21219,0,0,297fd18139b214ccc7bafb68932ad94f92d31725813932eee9566bfbcc25d4bd,2025-01-14T18:15:33.547000 -CVE-2025-21220,0,0,304d4bf47fd665073491e86de6e53b92d61e5b5396c1756df5f835bc8e8de9c2,2025-01-14T18:15:33.750000 -CVE-2025-21223,0,0,459051a2bea4e62db27554b98e1a6d332074c6ce6927126663d23fd709a41711,2025-01-14T18:15:33.947000 -CVE-2025-21224,0,0,f29b7563f7faf0618b87960e301c65f175fc8c06d752ac25091b765355a7c00e,2025-01-14T18:15:34.150000 -CVE-2025-21225,0,0,86f45cfb3ea95a3e71edf33bb04cdb7bab7c4dca2637a471c50541e0349b3b72,2025-01-14T18:15:34.367000 -CVE-2025-21226,0,0,581652b419a3843b12fac5404c193c71a4c261c91ab991a1062149fc7e772c5f,2025-01-14T18:15:34.560000 -CVE-2025-21227,0,0,ab0799971720cb27bff6e849820c50d8b6b339d7345e78cfeb575f14a8780e17,2025-01-14T18:15:34.753000 -CVE-2025-21228,0,0,79d635afde812b3f1d6adb8af6d5d757fd21894a90ef7777ede91b6fbddc0a11,2025-01-14T18:15:34.950000 -CVE-2025-21229,0,0,2b01e5c454176ec2e871377b158d2c9b30376cc2b7f2d7687c225b903e935491,2025-01-14T18:15:35.153000 -CVE-2025-21230,0,0,132db6a9bf42a02383b06e2b61a7be35e4a6f338e69c437ab492981c69b1a545,2025-01-14T18:15:35.333000 -CVE-2025-21231,0,0,ffb9d7925c440eeeb914d54b290a294ddb562f0253eaf128a20ec06684e29fb6,2025-01-14T18:15:35.513000 -CVE-2025-21232,0,0,4cac9dc0526b91525d5c57fba11404924418b8afbb5248e64ab3523e671085ba,2025-01-14T18:15:35.690000 -CVE-2025-21233,0,0,991aee4e8598698cf82ae3f8ad99b3cb31f8bfb9c477e233ca84bfa683231d39,2025-01-14T18:15:35.870000 -CVE-2025-21234,0,0,b4eef21904ab94795abc4c0a2a3bc28ef68f418a23280310aa0b3e23706c914c,2025-01-14T18:15:36.080000 -CVE-2025-21235,0,0,ec9fa78f5022b847afab0868b8424c1a814ddc724f30fa323422233daec99400,2025-01-14T18:15:36.320000 -CVE-2025-21236,0,0,0201a04b5091024db1a560124d18812725e2a1037471cb27ee38febfb4487629,2025-01-14T18:15:36.667000 -CVE-2025-21237,0,0,a4180322ac7f073cc2ed99ac4813383a078768ebef3fb311de675ee970cd2ad5,2025-01-14T18:15:36.983000 -CVE-2025-21238,0,0,060826a091802c53c33cf99ae570beb2f61f3a1a95abdbf5c9013a0711a0d1cf,2025-01-14T18:15:37.407000 -CVE-2025-21239,0,0,cbf3c6f53a6140ccb53f2cdc15216d5c5ef6645b7eebe84a1e019fb9f543ddba,2025-01-14T18:15:38.010000 -CVE-2025-21240,0,0,5cb10b1678aab745961db4b06e3de0fd283911b490cc27f914f8dc832003ccaf,2025-01-14T18:15:38.770000 -CVE-2025-21241,0,0,2caee0d089a1df131b2b3818a145782f4ce4b1064936b6394ceeac32c1670d10,2025-01-14T18:15:39.490000 -CVE-2025-21242,0,0,edd27ff0a17e643fc66cef3f8e74ae14eaef32ccd33bd38f2d49a4e9d5139a13,2025-01-14T18:15:39.867000 -CVE-2025-21243,0,0,9e7f079c640c18f6b7d9bbe85d7cc0651881a1bdfac010ff7053da78431fef2e,2025-01-14T18:15:40.180000 -CVE-2025-21244,0,0,a779de44a52e433df2fa2060b8bd9d5bb6c1bdbe90779e89b0de7dc850823e6e,2025-01-14T18:15:40.487000 -CVE-2025-21245,0,0,c140bc49a09fc8325a30d99784749f9cd01d3ef5132ce421204276e44b5cc011,2025-01-14T18:15:41.100000 -CVE-2025-21246,0,0,c9d6b4279446694c2a780535768caf2de1cd88131a92048a89a7ae55d31493d3,2025-01-14T18:15:41.790000 -CVE-2025-21248,0,0,ef084e6593385340eb777643684efddafa74040330b0d206361af15a37f074d4,2025-01-14T18:15:42.107000 -CVE-2025-21249,0,0,453109c50f60274cd5f35a797e8692c37dfb84ff00614e1c1e9da3b96f02c391,2025-01-14T18:15:42.360000 -CVE-2025-21250,0,0,0c35f2c374202ff139987e883c830b640d66a049cb4df8219705795036b4192f,2025-01-14T18:15:42.593000 -CVE-2025-21251,0,0,06cf681bb6c8f70605ae7663495230c95e3021b56cd543a909afaed9fb40b66f,2025-01-14T18:15:42.867000 -CVE-2025-21252,0,0,3dc1ceec242fafa25fb9cff385f08151aaec56f7b679ad413e0bd6a45083a119,2025-01-14T18:15:43.180000 -CVE-2025-21255,0,0,6809c435488a9b45b1509038f56683d052bb5039dc439aec58d60a638859cf30,2025-01-14T18:15:43.437000 -CVE-2025-21256,0,0,63c47e564ce002148cd0d7738bb49602fdc93869661898d432c5cb20771b7e7a,2025-01-14T18:15:43.730000 -CVE-2025-21257,0,0,9952820096de06c8abd205fff4c607965163a0ef57bab0a1b2556136f1164825,2025-01-14T18:15:43.990000 -CVE-2025-21258,0,0,79b2604097dfd859daef98ea6a8db0e750b4dcdffa00c1396771688dbd0dbf99,2025-01-14T18:15:44.660000 -CVE-2025-21260,0,0,7d982fa20f992d46cd93fb54667b086878e1f498f9654f6b05e4b1f1f4e3d73e,2025-01-14T18:15:44.927000 -CVE-2025-21261,0,0,67385a83affc6f69df1e284c6eec5877a658143aee60186b7cf5d4a4ec584926,2025-01-14T18:15:45.137000 -CVE-2025-21263,0,0,a5ac346ca0a8fc2cf57cb8d3f82bc07fcd3b25faeb5ee621607c014682a06e7d,2025-01-14T18:15:45.337000 -CVE-2025-21265,0,0,0d86024c16db3b14956acbff340feace8dc48a80c51be0dd5e6c8771fcb20f1d,2025-01-14T18:15:45.583000 -CVE-2025-21266,0,0,38a3d65ac3670508a8615fe43bd1dfc3d262cfb7df353cb38f0d68363dd2da4f,2025-01-14T18:15:45.797000 -CVE-2025-21268,0,0,85244d6088d09e2166e28d3a7bb96584619f3f5fea08bbe30a7156a036e212b6,2025-01-14T18:15:46.023000 -CVE-2025-21269,0,0,862b261106d0dd8652374a88766bae89865f5ee30cc52dd3da484628240a0851,2025-01-14T18:15:46.290000 -CVE-2025-21270,0,0,954a27161d42a5bf043658975245dcd5ccc7beac956674d9a8ea93319d33b932,2025-01-14T18:15:46.503000 -CVE-2025-21271,0,0,50b4325183e7fe2834fbf47bd6e656955aff29b7e46976c0768fc386afd47890,2025-01-14T18:15:46.747000 -CVE-2025-21272,0,0,ecfa3297e2629af6f1f6c8ab45e55253045e6b1969441c248548b1fc87859a20,2025-01-14T18:15:46.987000 -CVE-2025-21273,0,0,ba4f72545d5896704f33c53c1d0fe4ad5103cc97f93e987ccae678ae6e971a67,2025-01-14T18:15:47.240000 -CVE-2025-21274,0,0,04cadb92c08630cc280408f3575445b1deec9c134e7c6331940e4f7982875ca9,2025-01-14T18:15:47.487000 -CVE-2025-21275,0,0,23c36c30b92b3c056276582731dd45867056a98eff952cce6d4ef74bd97c001e,2025-01-14T18:15:47.723000 -CVE-2025-21276,0,0,1c34b616a6a9a47caa9255b3dbe1305935d564476d518ec5233e955926993f2e,2025-01-14T18:15:48.013000 -CVE-2025-21277,0,0,b0a2ef8319a23e1ac4d71ad27d6690dceb8109ff8db16ea87b4a39c35de09f7f,2025-01-14T18:15:48.260000 -CVE-2025-21278,0,0,7633a0907ebbbedf11a145f91a299de68150398a34a10f153ec248b3f5be88bc,2025-01-14T18:15:48.480000 -CVE-2025-21280,0,0,b38a477ba1878c8f28924e9b82ad0d5049fd3efdda70b23dd9fe852b65bd28c0,2025-01-14T18:15:48.690000 -CVE-2025-21281,0,0,3e7203dd5d0d808b11113edc5bbbae474c95c57c07238871114daee2532debdd,2025-01-14T18:15:48.897000 -CVE-2025-21282,0,0,45c91c12b9d01d15b6a7c5fee96ec9fba66a66e53ff0ca1b830e8996a9c1df4c,2025-01-14T18:15:49.110000 -CVE-2025-21284,0,0,3d6b598e5519923b6fb24235b7a8bf8e33264aa775d580393c47512518af86d4,2025-01-14T18:15:49.317000 -CVE-2025-21285,0,0,4f2b1ca4edb5484143f67be379c08e593ae35a8a067fe1b912692cc09b9fa90d,2025-01-14T18:15:49.530000 -CVE-2025-21286,0,0,7ef97d2d98267756b4ba969bb060af3a57cc446d297eb486066c642f4546eb81,2025-01-14T18:15:49.760000 -CVE-2025-21287,0,0,3aa29fc2d9468d7b10f691f804f1bcfb454b82d34f4e0dc41e8f29da15055bac,2025-01-14T18:15:49.947000 -CVE-2025-21288,0,0,7d61f82c74f3c117ba85043f450f1e7c85458208ce0ee578f3bc32bc8ee516ca,2025-01-14T18:15:50.173000 -CVE-2025-21289,0,0,810ad8ad3dc1dd4e1003ab2a7fcff63e989a9f5ee1f3a05c4f51e45ca2d24469,2025-01-14T18:15:50.363000 -CVE-2025-21290,0,0,6f10a8f16d26f8aed6895367682199c6b263d2c297ef3503810426da366a8f93,2025-01-14T18:15:50.587000 -CVE-2025-21291,0,0,88f1257271851222020d269b4c38e2a451954de2a39688728a4e2de33ead6dfa,2025-01-14T18:15:50.767000 -CVE-2025-21292,0,0,152841110f6c515749edf99e8e7a942b014f0291245dc49110d4c44a4f771be5,2025-01-14T18:15:50.927000 -CVE-2025-21293,0,0,ce180d5ce7fd25653d664212f69938cd9eb816c0cf8f3e28225c7dc88eefeba3,2025-01-14T18:15:51.110000 -CVE-2025-21294,0,0,f1ff0bc3f69bdcd56c9a6d8f406b904ea55fed3631b7b298491db310c2e2b189,2025-01-14T18:15:51.320000 -CVE-2025-21295,0,0,25a4aef34e11412168e341a76e1d4e40302901c55f6fa9751dcb230945be7196,2025-01-14T18:15:51.520000 -CVE-2025-21296,0,0,b6d82fb0147e76c90ce87ec2217ecee53845d819abcadc2764657e3501c0b5aa,2025-01-14T18:15:51.710000 -CVE-2025-21297,0,0,a49382c7bd6ef088530b28529bbcdca2306d07a7974dee11867c8fa12bad03df,2025-01-14T18:15:51.890000 -CVE-2025-21298,0,0,8047e191a97fccb0b52a23db66c909a4f7f941a9eef4c5fedb95d63b2279a86d,2025-01-14T18:15:52.080000 -CVE-2025-21299,0,0,252dfe0af6d5b3593c6d8a9114b707a1b9716651d86c0127e85e0e9519532c5c,2025-01-14T18:15:52.270000 -CVE-2025-21300,0,0,a32c499fe7feed82844bc1a555cb04c8192a4c7601be99be3cda5cc6ccf66693,2025-01-14T18:15:52.463000 -CVE-2025-21301,0,0,9ef3775b0aa8768b82f1b747a3f27956d9396c6d366bdf3ec3d7889bd2cc2fd2,2025-01-14T18:15:52.660000 -CVE-2025-21302,0,0,d909c0e900ad4c7be9706d7e164773d3455d3182dd69c11e25f6c10536adf668,2025-01-14T18:15:52.840000 -CVE-2025-21303,0,0,f492fe0782aedbb034de7d9d2e1b048701659f639468d7112fb1c924621e0858,2025-01-14T18:15:53.047000 -CVE-2025-21304,0,0,a0499a7ba15f176b9f4d50ce85384a45739f3c86645976ec1dc1c6e0adf1b809,2025-01-14T18:15:53.237000 -CVE-2025-21305,0,0,92b3c74d6169e3d7857c553644a39ffa3079393d7ca4b25e20cf5c8bb9bf7b41,2025-01-14T18:15:53.450000 -CVE-2025-21306,0,0,ab85ea802ec14aba6ca72f8a886740d3beed0b3e75d23460fd8771e572fc5302,2025-01-14T18:15:53.630000 -CVE-2025-21307,0,0,7d2ab4f59e14e14ddb91b617e3ab7a05599d3729f35515159170a79fc9d33a36,2025-01-14T18:15:53.837000 -CVE-2025-21308,0,0,454dcdbbd5839a6b602f3f80c6a6224afc7fb792811f4ee908e471ff14506ee6,2025-01-14T18:15:54.030000 -CVE-2025-21309,0,0,9ad9b66ceac8cc1542fe3508b658b3a651ddb58a8f411bdec58ffe2b81bee3b3,2025-01-14T18:15:54.210000 -CVE-2025-21310,0,0,1e69e72dc60f620d7797d9015cdce3dc23ba23b6a429540a812557a90dd462a9,2025-01-14T18:15:54.380000 -CVE-2025-21311,0,0,34825484eaa691a3caca15790c01e7b6c7c0301af3b69d74c24d17fe6a1577eb,2025-01-14T18:15:54.567000 -CVE-2025-21312,0,0,2b18ec99831dc9fc781f53e673f961a564496cfa690008a5e5aa6914a9da1186,2025-01-14T18:15:54.770000 -CVE-2025-21313,0,0,e63b4518231e50db2bebafeea823f387976916ea824f82e86f413c6db272d35c,2025-01-14T18:15:55.007000 -CVE-2025-21314,0,0,f1e90716bf75c4a4dcee3acf94d1201505e05a771edd1d19d5f243d37db28e1e,2025-01-14T18:15:55.163000 -CVE-2025-21315,0,0,7816ac753e1130c23b4f4f663ef1bd7d69c0d2f415a529f42ae6be738ce0217f,2025-01-14T18:15:55.343000 -CVE-2025-21316,0,0,e18c68904629f7355a4f4e31ac84a463a2a152709e854f682fb6f116aada552a,2025-01-14T18:15:55.510000 -CVE-2025-21317,0,0,223aec21aa067a9bb448ce97cedff6fec0a312204c85bfe225db45d1a110911a,2025-01-14T18:15:55.697000 -CVE-2025-21318,0,0,3cee286687878dd330e92bed394cbaa5ac7d511e51adc2a226ba8e9227631d6a,2025-01-14T18:15:55.880000 -CVE-2025-21319,0,0,3745316f894e81f3471e016ef489e39db4e520fd92c8a8bb5a221ac06e26529d,2025-01-14T18:15:56.090000 -CVE-2025-21320,0,0,19083e6f6e8363e1985ecbfa7ed5eb05ed9bfa8a16256cbd6f87157132edd18d,2025-01-14T18:15:56.297000 -CVE-2025-21321,0,0,39238e71ff9cce84ad4d75ec88e235c3c13fa3b042168c5d5b3a1d68b9097bd5,2025-01-14T18:15:56.533000 -CVE-2025-21323,0,0,80d2e58831aed30d71ace7fb32f7722200f206121e91e5e1a318cc67246cc38e,2025-01-14T18:15:56.760000 -CVE-2025-21324,0,0,ee4c35a08202d89247477c39a64dd370157d9abbc04c99ad753b64e9498cb517,2025-01-14T18:15:56.970000 -CVE-2025-21325,0,0,55889c91a0cef261931b49b981b96e2166b235b4af72005aebec2c81b77da865,2025-01-17T01:15:31.073000 -CVE-2025-21326,0,0,47b18b7d697f3956a4c899179c4627d3df601a34ea8edb7d401cab7d63bff9a5,2025-01-14T18:15:57.170000 -CVE-2025-21327,0,0,f7abd2485df724fa1d2bc1deb0a30d7e8df242390186f6c16e037e2facbc6c38,2025-01-14T18:15:57.340000 -CVE-2025-21328,0,0,70305526faed98260488cfcbf761b07df229dc3e21c1469ebeafd06439cc1021,2025-01-14T18:15:57.530000 -CVE-2025-21329,0,0,e053eb234509e6346e777591f7eee67377618570069360bf34234fc39e02315b,2025-01-14T18:15:57.733000 -CVE-2025-21330,0,0,80a4977dbce37c5d8567d0fe001790553daf1f6abc63cf234b438f7c67548e09,2025-01-14T18:15:57.940000 -CVE-2025-21331,0,0,7a818162f8ba8eea8880d8fea97ae9fc902e5806f423695656c6540478d1c5e2,2025-01-14T18:15:58.120000 -CVE-2025-21332,0,0,0076c5c8af7fbb5019d64b870d9a3205940a3532bd8cc68bd7aa25391ece3f70,2025-01-14T18:15:58.307000 -CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca8e6,2025-01-15T20:57:37.467000 -CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000 -CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000 -CVE-2025-21336,0,0,0d7c814919cbeed2c3035babb3a91cbe14e7b415bb6bee2c1177f48fe0226072,2025-01-14T18:15:59.143000 -CVE-2025-21338,0,0,829f1e0ae95ccccc175808a7477ceff41739f9dd91a35b6190dbced0f8367cc0,2025-01-14T18:15:59.300000 -CVE-2025-21339,0,0,ba30d4d8ac9f6c58d3589ae53d1f775a6b9e449bd771cb2b76f26b86f2d7f769,2025-01-14T18:15:59.480000 -CVE-2025-21340,0,0,a1bdf525e3619a716e85f3f67e9906ee53b943dc1f19627739b2dba6fa2ecfb3,2025-01-14T18:15:59.673000 -CVE-2025-21341,0,0,911a1fee61af457a75d4aaf7ace6fef89ff0da55a06872399539b0727c8820d1,2025-01-14T18:15:59.853000 -CVE-2025-21343,0,0,141757ea0d334cd722602298b904832865dc7cbb0e26d0b165fb0062298fdc8c,2025-01-14T18:16:00.053000 -CVE-2025-21344,0,0,dd5980c524736ae0b013d0af47e0d5af39d04daf214271b57bdc7d649a6561bb,2025-01-14T18:16:00.227000 -CVE-2025-21345,0,0,89cff8500047db6007a22083f85ad623152c5259f5852d047e15b279294bc90a,2025-01-14T18:16:00.437000 -CVE-2025-21346,0,0,ac949342602fd9f1f1a4bd5c6b152f3df3675f822544dcfa02265b373d1e7a49,2025-01-14T18:16:00.607000 -CVE-2025-21348,0,0,b18bc9f42c837973185b37906f0bca18a0077a98d8987a7deac1373ff7183b8d,2025-01-14T18:16:00.780000 -CVE-2025-21354,0,0,67bb15809fb7626348b06f722bdc42095fcef06c14f355f18c2f99bcdd08e1e7,2025-01-15T00:15:43.170000 -CVE-2025-21356,0,0,26156418338a80fc3382415b36edf58e99a176cdf3ba70297a5f2e24591a5d33,2025-01-14T18:16:01.130000 -CVE-2025-21357,0,0,48f6f50b58a645314e8c3a670faac4c08145ec6653b367344cbcab3656dfb136,2025-01-14T18:16:01.293000 +CVE-2025-21186,0,1,cc2d8a401f7f9d2cfee0bf21abab5b274fd96e0897d49742eb2f3685fa223624,2025-01-14T18:15:31.020000 +CVE-2025-21187,0,1,16c411919c8d70c5bf88b3d7e5ce61dc3c1053f79679db20c0c8f7d2300656b0,2025-01-14T18:15:31.187000 +CVE-2025-21189,0,1,af4658d3043c8d39e52bc68c4687db71941c01caa1f102e9573e17a0f099616a,2025-01-14T18:15:31.377000 +CVE-2025-21193,0,1,57ce14299ca65ae3ae8d98c980a7183a3863b86b3ff4623d95fdfbfb7870abda,2025-01-14T18:15:31.637000 +CVE-2025-21202,0,1,a1a528c477eb1fdbdb1b5eb3999d4d1d40c373cfac8744f7f191a7b68cc42736,2025-01-14T18:15:31.827000 +CVE-2025-21207,0,1,db0bc20ae237c9e13ac4464e33f60df9247a7314671b2290c3cb24780d0a97e9,2025-01-14T18:15:32.027000 +CVE-2025-21210,0,1,2ba96f406ae2510ecf5e708c4761246f74b6da9d79c0fcb90cce0ab4caf0241a,2025-01-14T18:15:32.207000 +CVE-2025-21211,0,1,50c33bf98b419fb0635a2d4bbc5f21cf9be42113c364f68b65842af35b4d064d,2025-01-14T18:15:32.410000 +CVE-2025-21213,0,1,69a7c877c42d58f5b54f710d895e2547a6ae6a0e998756cec7ce69dca8ed6d24,2025-01-14T18:15:32.600000 +CVE-2025-21214,0,1,9fbedb0adf823df1caeeaf8eeedad2eba4ddbf308bc451f0ec3f07fd5b90b508,2025-01-14T18:15:32.777000 +CVE-2025-21215,0,1,dd99fd6adb4d9fe7d97b611ec7f30e0011a6eac978c99df1e2b8ab3debf7e2bc,2025-01-14T18:15:32.973000 +CVE-2025-21217,0,1,e2d8b9761a9ab8148320bd40981be1e1691245d94cc6a9ebc4a11d3f39ed5f74,2025-01-14T18:15:33.193000 +CVE-2025-21218,0,1,bcdf99346f904206b72d0d0e4c75c6294fd6d3391f7fc7eed084efd046d0ef67,2025-01-14T18:15:33.370000 +CVE-2025-21219,0,1,c78ab149c95eb3e10be0ed36812db5397dbffa8f81f1967b1528e87f2590e612,2025-01-14T18:15:33.547000 +CVE-2025-21220,0,1,91a07894d2059fe823aef83211f2444ad0e863aba6e64e6dede13eda8d5bc4cb,2025-01-14T18:15:33.750000 +CVE-2025-21223,0,1,4c818270d1e6701d44b7577c63f93510ccf0eb8af14be92608b1bf4de5928a72,2025-01-14T18:15:33.947000 +CVE-2025-21224,0,1,bd06d963599876c9ea4ac3a5b0014c4d2c5fdcb50dd32a31af065c53a74408e4,2025-01-14T18:15:34.150000 +CVE-2025-21225,0,1,401e286ecd1f590f8322f668289a32e8abbce3248c811adc08e3b9df46402326,2025-01-14T18:15:34.367000 +CVE-2025-21226,0,1,bd8f9fce28764ec6c0ff64ec7cfe411fbac03b3cf73f0c9f9cf542723113b47e,2025-01-14T18:15:34.560000 +CVE-2025-21227,0,1,3f6558b49f41745faa488386dcbfb37c88d1c6ec5be80d672257ca79aee3ce6f,2025-01-14T18:15:34.753000 +CVE-2025-21228,0,1,7a0c0d2f47def3d9f741d4065bd44d0a3128219dcdc86779ea1490fd5c100256,2025-01-14T18:15:34.950000 +CVE-2025-21229,0,1,63e472d3244f9a35bc91bede92660436b5772f677fe25711a7d63b935be963f4,2025-01-14T18:15:35.153000 +CVE-2025-21230,0,1,d33993e5590ad46a525f9b5b48e22200e28c8045a0558a0714e04306afe870c1,2025-01-14T18:15:35.333000 +CVE-2025-21231,0,1,ce46834ebce2061d0aaeb629ca503e557f8998af3962d58059151bc47b32bd1d,2025-01-14T18:15:35.513000 +CVE-2025-21232,0,1,99d3a1ed24a498e936fcc89cd640790ed9aa10b0549fc01d7e66acf113891c7d,2025-01-14T18:15:35.690000 +CVE-2025-21233,0,1,f88650e218ebec2aacc9d230ad62ab78e824eab75da625a093c0983d7d274db7,2025-01-14T18:15:35.870000 +CVE-2025-21234,0,1,dbbbdc336b805e15fd4c8dbee71eb3c91a4703798df56adca3040c08c7cd8a66,2025-01-14T18:15:36.080000 +CVE-2025-21235,0,1,19c4d83a1e58c70e0c8eb9991f0786e29ce77f613481485e1b3ee4846eea7422,2025-01-14T18:15:36.320000 +CVE-2025-21236,0,1,671bb62f128830a499f3873ba77250566992ff4f9ecee5e6801f935066f4bedc,2025-01-14T18:15:36.667000 +CVE-2025-21237,0,1,2bcf03b09f5f9a61118d76a6d0db3f09c048fc4097ba125058d6ad5fa4f22a40,2025-01-14T18:15:36.983000 +CVE-2025-21238,0,1,7174a8bc298f9627dacc32905c5786ce2d984222cee2943a41d403ee9fb789ef,2025-01-14T18:15:37.407000 +CVE-2025-21239,0,1,6afbf47cc85b1842fd5513526dfc72ecf89551dc3c6d676463b13c68e5e80df9,2025-01-14T18:15:38.010000 +CVE-2025-21240,0,1,0cfce1ae2e3503bbe676124d5aa945656e5d407edf63961093fe39a23c9e36f8,2025-01-14T18:15:38.770000 +CVE-2025-21241,0,1,9916379d969c3c4420a0bf768188c1b41a6bd4003058e6fda986de825baf79f8,2025-01-14T18:15:39.490000 +CVE-2025-21242,0,1,5cdbb3b354c5d86845b88e9fd26015b495e3636549c8477b3b87f54dda562c49,2025-01-14T18:15:39.867000 +CVE-2025-21243,0,1,1d6c55156c9f8ecb21989e99db3a6279d84545be26af1a791cc1f5f8bfbdd5c6,2025-01-14T18:15:40.180000 +CVE-2025-21244,0,1,8a0be1382ec2f3cf13953eaee9599be90593b53e43dc34ef337d232d4590239b,2025-01-14T18:15:40.487000 +CVE-2025-21245,0,1,743b82866e5b426ce9b67618b87c8d552af4b5857d2a356629f4f35012af8f6d,2025-01-14T18:15:41.100000 +CVE-2025-21246,0,1,16f8db4a6c84f72b10b115e024c8c65c7692bc218ffc79cca35769302fe911eb,2025-01-14T18:15:41.790000 +CVE-2025-21248,0,1,6a969e596642b208e7c30a8eba50bd44de96703c515c5d32389fce756b248ea9,2025-01-14T18:15:42.107000 +CVE-2025-21249,0,1,c05592e5c4161335f4dc1263cb05bf9e7e7a26539b4f6f7ba5f3cf257fea9023,2025-01-14T18:15:42.360000 +CVE-2025-21250,0,1,dddcbf6c35c00ad2cea85b284acfcb313fb424b2841ec8e52ca76fd921285c2c,2025-01-14T18:15:42.593000 +CVE-2025-21251,0,1,49e025e37a2fc834e9d1cbefbf2b46b55ac9fd0a9c9345bc5104d8e202311136,2025-01-14T18:15:42.867000 +CVE-2025-21252,0,1,678b3c7e402033e98dbe164f4bfdb6ff43bb385229e86f0ae6816d63624410df,2025-01-14T18:15:43.180000 +CVE-2025-21255,0,1,bdb29cdbf339ad6af1837127b1024e7b08bb26553081790e67935282b469c3a1,2025-01-14T18:15:43.437000 +CVE-2025-21256,0,1,3605b36451770ea272fb2275ce03b62a920bd0bbd0296ba75e1ed68232494151,2025-01-14T18:15:43.730000 +CVE-2025-21257,0,1,f6724f59885e126e07cf88f5691b33ac403a13256e48363086395c2739206e6d,2025-01-14T18:15:43.990000 +CVE-2025-21258,0,1,66e38ffc6ca71ab83d4de17b33189538a903da4059e59d32cc15b6afe5c5a245,2025-01-14T18:15:44.660000 +CVE-2025-21260,0,1,a10266ac3b0ec854fe7bbad2f5173a8a9fa71e45a311da8cc9b418eb7ad55ccf,2025-01-14T18:15:44.927000 +CVE-2025-21261,0,1,30794851edfbb5323c9cce2330f18fdf20ec4ae0c2c15429a6b907046e7fa4d4,2025-01-14T18:15:45.137000 +CVE-2025-21263,0,1,2f60429f96c01ab32663556a7b47b8db289164ee720f1301a001d63a16fdc766,2025-01-14T18:15:45.337000 +CVE-2025-21265,0,1,b867b3105e3afd8ffadf43ee9cdcbf50883181ae3f4536a5536cba353fad0042,2025-01-14T18:15:45.583000 +CVE-2025-21266,0,1,4135bc0115ee5bd41b433d3e017d40fee3f673bd467b43b684d6450d81f736a0,2025-01-14T18:15:45.797000 +CVE-2025-21268,0,1,dda7c0218ca85ef3ac1db3cc9062b3f0a39caae431fc8b7648b82cc585f022d1,2025-01-14T18:15:46.023000 +CVE-2025-21269,0,1,4f4a18ab15bf3c30efc7100c8433740a8e8db1e1f34548833db09d6726dd6de2,2025-01-14T18:15:46.290000 +CVE-2025-21270,0,1,01a95b8aa5fb0ffa72b1fdaa827077c9abd134e29a2bbc7577d23d427df8f4f9,2025-01-14T18:15:46.503000 +CVE-2025-21271,0,1,a303c4bb42912154adbab79b14e490f5f53f79ce3a704bde0619d566367b384e,2025-01-14T18:15:46.747000 +CVE-2025-21272,0,1,7c24281d7742d5fe6c0e8e351a79af097081ed29840e243c89b662d27895d619,2025-01-14T18:15:46.987000 +CVE-2025-21273,0,1,76fa4a95ef95afcc759231e79f911226a49adbe29aaf6e443ef380f8b96309ff,2025-01-14T18:15:47.240000 +CVE-2025-21274,0,1,010e0f6c3c3606b38249fe57a14121c514ac3df937539178ac5424a46c2816e5,2025-01-14T18:15:47.487000 +CVE-2025-21275,0,1,c589e77d2c8baddbf950f9fd01b71e95a6f3f42315937d5e036c044492faebbf,2025-01-14T18:15:47.723000 +CVE-2025-21276,0,1,aa947c8fbc92dc01e873841f81c30d113a2d8dda0abb3d2473a5e8923afdab4b,2025-01-14T18:15:48.013000 +CVE-2025-21277,0,1,908690fde51906cc3d8f680c617d52a02626365ac4a002a32afa71ab0482e3fe,2025-01-14T18:15:48.260000 +CVE-2025-21278,0,1,0ef517669f9a03394f8acd314678ec1734dd92568466f6e48b5c8f71492455cf,2025-01-14T18:15:48.480000 +CVE-2025-21280,0,1,f7a466321aa6c89901b0b33316a67c0e6b3bf580a8176f1e94116845401260dc,2025-01-14T18:15:48.690000 +CVE-2025-21281,0,1,1b2dab08d68a84004a4f0814166d68c4cff7b57c0d99e26d4db59dc8b2339c3c,2025-01-14T18:15:48.897000 +CVE-2025-21282,0,1,e9d4089f081dd17150ff4d08e33ad5a312b6bf1e8673173ae087156048ddd2e6,2025-01-14T18:15:49.110000 +CVE-2025-21284,0,1,f4bdf01fcc9232fd479c07c315c5374160ef9d50e2ae7e0c49ae0460edf07fe8,2025-01-14T18:15:49.317000 +CVE-2025-21285,0,1,2e3cd43be4709fcef8cd438db2c88abcb6a55a204bd86cedaaa0a31bcc1cefc9,2025-01-14T18:15:49.530000 +CVE-2025-21286,0,1,89c912a78f6d6e897c6aef73493eabddc8f6d2c491171ac318e8fd5e4bb33214,2025-01-14T18:15:49.760000 +CVE-2025-21287,0,1,f7690295098ee705d02eb9c15f8a12e400af0157e4a77cbd15277653a09ef9d3,2025-01-14T18:15:49.947000 +CVE-2025-21288,0,1,217e8c304c9f59ccaa89f31a56516c6f4b6fd071ee015e18a35e3f0e6f44eabb,2025-01-14T18:15:50.173000 +CVE-2025-21289,0,1,2710118edce7377eaf8cc23272b3a6de58c6007855c379d0e9052019308ca4ec,2025-01-14T18:15:50.363000 +CVE-2025-21290,0,1,ff1b02b5c06d4dbfd27bb5e0c2715537318d5969f8f74cfbf182e1a1d072521f,2025-01-14T18:15:50.587000 +CVE-2025-21291,0,1,9373acc4ed9017ae18d88a078dbeaafe505aa08a3bb3b153a1bfc4242d477c9e,2025-01-14T18:15:50.767000 +CVE-2025-21292,0,1,1d56aa0da27c4d6bf010e008a5f2277eae2376bc162d892a39266d6d7be7181b,2025-01-14T18:15:50.927000 +CVE-2025-21293,0,1,8abec8bd4b21d57b8b66734a8bc448a1fec9d95fccb2d9afcda6e7e26f565a80,2025-01-14T18:15:51.110000 +CVE-2025-21294,0,1,fedfb524dfb12bc80fdc8558d61cae9726c8354a5eae4e4898f996ea62969ad3,2025-01-14T18:15:51.320000 +CVE-2025-21295,0,1,48f4bc3d9829482bc7cde56ded4ff7098eed5d0fa33763bdf735b77196cf3e39,2025-01-14T18:15:51.520000 +CVE-2025-21296,0,1,54b0779742e91e61b0b44332f5073ee2ad181937a5337541753b3bc7d19fdc63,2025-01-14T18:15:51.710000 +CVE-2025-21297,0,1,657ebb03f08dd23df3d85939129419208ff79799427af8330d18aec873813a53,2025-01-14T18:15:51.890000 +CVE-2025-21298,0,1,d1e63b0c916a326c8662f8c16ce27433052de3eb148f464a2fcbefffe416bad3,2025-01-14T18:15:52.080000 +CVE-2025-21299,0,1,0ebbfed27982780a5e64b14a808151ccd5fc9abf059ee4f91e1470d4633224d4,2025-01-14T18:15:52.270000 +CVE-2025-21300,0,1,57ff45fea740626b6aa69f0cf8cdea7eb37ab9dec65f1623d98698b27bcaf6dc,2025-01-14T18:15:52.463000 +CVE-2025-21301,0,1,38b4c64398be56ba7d2879d55d39003dc119893da9d1734bb9878d7b5330b667,2025-01-14T18:15:52.660000 +CVE-2025-21302,0,1,c9075a2bb8ab70db93747ea2f5f42812aa60510151206cd5d129d52b3deb2cc9,2025-01-14T18:15:52.840000 +CVE-2025-21303,0,1,0061827d975754c34d0183488d030d1566cca8dfe733b9dda8913e6de75f24aa,2025-01-14T18:15:53.047000 +CVE-2025-21304,0,1,076cdc783e617646100fe1cab07442aa109a8a2c956c989e1a83d63b0d69b325,2025-01-14T18:15:53.237000 +CVE-2025-21305,0,1,ab3621683b783952dbb3925f29c737b4fef00a92f74f3b56aa9d7c915cdc9720,2025-01-14T18:15:53.450000 +CVE-2025-21306,0,1,2a11d4ea548a32cc71a48bcb2c177c14fab87926d3262d657c107b4a4ebf1cab,2025-01-14T18:15:53.630000 +CVE-2025-21307,0,1,a008e2e7a13c2e619c9ef2b8dbfa162d62312382e95aa9481ad4baf2456b3517,2025-01-14T18:15:53.837000 +CVE-2025-21308,0,1,9d6a1e89ee92ad5d2d076926469336a292eb649a7616cb372b59ba52cfb2ed84,2025-01-14T18:15:54.030000 +CVE-2025-21309,0,1,6fb676ad50506a5290a27dea4673d4e04a130582cce809d6f1164247040043ac,2025-01-14T18:15:54.210000 +CVE-2025-21310,0,1,de04fbca6a85ffa3a7d2728e3dc984d7baea2bdb721fedfdebd7349d94f77da8,2025-01-14T18:15:54.380000 +CVE-2025-21311,0,1,b56c463e369aca2df31d59e80920fd6bff0c923b7be3f999d807397e5f54ee74,2025-01-14T18:15:54.567000 +CVE-2025-21312,0,1,db7e9adf484eecd8c9e33952b10670d4ab4a6c31412fb4f9d1d84b29a5796d2d,2025-01-14T18:15:54.770000 +CVE-2025-21313,0,1,7ac3ef64e6b325e25b46611210f95c57375237478ee561be5061d04148cdca80,2025-01-14T18:15:55.007000 +CVE-2025-21314,0,1,e10d4e44e3792ecb48788730063ade6b797b0fa3f6d495c19fac3cc1f4bb98a3,2025-01-14T18:15:55.163000 +CVE-2025-21315,0,1,c10b1a8b960b1e1181e85f178642ed914cdc07b76cd35a65a7f872286b68f0d6,2025-01-14T18:15:55.343000 +CVE-2025-21316,0,1,34d0eab5cdf1b36f845bb434575b40fcf2167204140b6ca1e15a855260047b02,2025-01-14T18:15:55.510000 +CVE-2025-21317,0,1,3956db2ab97702aa5dd1a057613b40a8fe9a2ea12ef238849dcf289482cafd56,2025-01-14T18:15:55.697000 +CVE-2025-21318,0,1,7952bba1cd36a9e8656b5c28ee43730397689855f442a0fa0983d59eea9e4f36,2025-01-14T18:15:55.880000 +CVE-2025-21319,0,1,09142b68118e06ca94d3e44390fe841d09059e69c90b98be26c8a4b158a90f9e,2025-01-14T18:15:56.090000 +CVE-2025-21320,0,1,9c6d60cc4485a32049e499abb2ddde2f14c58759394fb2cf8cd9709a16fea713,2025-01-14T18:15:56.297000 +CVE-2025-21321,0,1,c4f6754230df3fec09c799fffb941898179c11c46b515e6a08a9d6a56191920e,2025-01-14T18:15:56.533000 +CVE-2025-21323,0,1,05bff40e436d4fd964269ffcbe57d2664279f73cdd69d95fba97e498f129ce68,2025-01-14T18:15:56.760000 +CVE-2025-21324,0,1,29d9ff5cef8d73564a11ecda905c67d63b08d7e144d8c42ffc4c67485891bf2e,2025-01-14T18:15:56.970000 +CVE-2025-21325,0,1,31758d0cc76d6380f02d2304f83926081d1e932ac95a6eee2a71dc7102dbe268,2025-01-17T01:15:31.073000 +CVE-2025-21326,0,1,f128ebb17bc79761064ef5d2acf64a0e08818990a07f55762bbc372c7bbb5913,2025-01-14T18:15:57.170000 +CVE-2025-21327,0,1,fa4fa735c79dc182a158ea200faae71ac032ad71ea3bf6acc11860a598b172c9,2025-01-14T18:15:57.340000 +CVE-2025-21328,0,1,9ba8b624e0483dd931af8b35a715ec393157f6fb8e5851cbe7c501afae670330,2025-01-14T18:15:57.530000 +CVE-2025-21329,0,1,a0895a1c387b8ff9b6c5a245a0e15ad298a5e72612aacc87cbc41ad0b6226729,2025-01-14T18:15:57.733000 +CVE-2025-21330,0,1,21e3ecde8d9ffe16415736ed47cf9a5680408e435ada1559cf08651f2c6b4935,2025-01-14T18:15:57.940000 +CVE-2025-21331,0,1,101302909b239f4f868e23fc9b808dc7bccb05b8b0e26edc4052d6e1282a7640,2025-01-14T18:15:58.120000 +CVE-2025-21332,0,1,724a32e9fe0096405ea20c2070572b131b4fbaa05ef26389e1e1a083afcf6c31,2025-01-14T18:15:58.307000 +CVE-2025-21333,0,1,b9bf6e80537dc7d9a0d6727e5ad9cefea382449fece3415b6b7abba70fdd1c40,2025-01-15T20:57:37.467000 +CVE-2025-21334,0,1,f42cd553e82dcd02e9af50ff7c31ace00ca52d38822fa75e8115e8621b1b54bf,2025-01-15T20:10:39.600000 +CVE-2025-21335,0,1,0ce6a1677fa1113d5abfb0932d14939bebc9cf7a1448545a8c4a9edd7bdb9648,2025-01-15T20:24:16.867000 +CVE-2025-21336,0,1,af1217c3c079fe70e50a3290be6ef804b73ead68ea452bc1da7f852a2375994e,2025-01-14T18:15:59.143000 +CVE-2025-21338,0,1,df5ae1f50d6a6e29de37da59b770b6851f339673c806c0d06694e89435d1ad3c,2025-01-14T18:15:59.300000 +CVE-2025-21339,0,1,b798f8810b0fba395eb7a28480001a1b5635a688ead85a0afc6f2f055a365b25,2025-01-14T18:15:59.480000 +CVE-2025-21340,0,1,f7942bc8896e3955f5a2ab746ce8799f20ecb0a943f7c5346b1055c0003cb491,2025-01-14T18:15:59.673000 +CVE-2025-21341,0,1,d11099426b11e78fa2e04d95b5bd8c0c80d29e7d1c7b96ba4e794f53b8cb3e47,2025-01-14T18:15:59.853000 +CVE-2025-21343,0,1,de3ba1e7311ad108264e29fd92251c2937752c12e9f9ab41438c66d1d21829de,2025-01-14T18:16:00.053000 +CVE-2025-21344,0,1,567e2ecad393c23aff12c6e5f02eeb41ff79ae11a9f44db4e18607c439cc02a9,2025-01-14T18:16:00.227000 +CVE-2025-21345,0,1,ccc75b1d69ebc6cb7ca03cdcc133d176edaa3b343de1915ef0555f09aa38779c,2025-01-14T18:16:00.437000 +CVE-2025-21346,0,1,79a9596fecc49ba053d5d10ceba05fe71ac56b518047d4bd5d53568b87424ca4,2025-01-14T18:16:00.607000 +CVE-2025-21348,0,1,c63dcbb56567e292c00e6ffa7ee747c9fdb42bdf025fa28a6f9b42fd8b87309c,2025-01-14T18:16:00.780000 +CVE-2025-21354,0,1,8bc82b788ffc801c7ed55739c810e83f449e74a982d93ed0137589a3d4f8eb64,2025-01-15T00:15:43.170000 +CVE-2025-21356,0,1,299fe29ff1abb9298f4fdcc264804d4c984ea449de8c7b094cd4abdfde3f1454,2025-01-14T18:16:01.130000 +CVE-2025-21357,0,1,ad788406de1786460b8f11cf1f8853a1562072cd2f1cd8ca4d9ece289856a194,2025-01-14T18:16:01.293000 CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 @@ -277458,22 +277460,22 @@ CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8 CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000 CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 -CVE-2025-21374,0,0,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000 -CVE-2025-21378,0,0,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000 +CVE-2025-21374,0,1,ead24a7108d28044973c820d42729d55cfc82fef0521b5f1e42a7d4613cfef94,2025-01-17T15:39:11.143000 +CVE-2025-21378,0,1,478c90ca0883d4700fd3d97e183ba78b4385e2b09147992cfc6855efafea8f56,2025-01-17T15:42:41.810000 CVE-2025-21380,0,0,4c50921192674428f12ee9508d0865ca454638893a117ed6c41e0d9bb5aca2bc,2025-01-09T23:15:08.340000 -CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000 +CVE-2025-21382,0,1,2e156c697ff05ca319e829bc026533c3a21bc0697174f02aeb4869c8c7c1dab5,2025-01-17T15:42:09.233000 CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b589bd,2025-01-09T22:15:29.980000 -CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 +CVE-2025-21389,0,1,b734af143001cdbe15aeee14fe9e8d94be90a7e77dca2b7c7e3d41d7dfa35e59,2025-01-17T15:44:04.177000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 CVE-2025-21399,0,0,dd7dd15e0bf28105dde42fe08f9af97913f39e43de69ca54f29cd269a806e542,2025-01-17T21:15:11.283000 -CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000 -CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000 +CVE-2025-21402,0,1,cfd0656a5c0196edaf476c2d05711d25a94de6b7e392f4deee80684030d57dc0,2025-01-14T18:16:04.190000 +CVE-2025-21403,0,1,9a78aaa5fb9b94799380b10b0da1d8f532f4da03523ba6e06592273509ccfd42,2025-01-14T18:16:04.350000 CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 -CVE-2025-21409,0,0,3bf5836a71fbbaa0695b5c54fccc80deb4b92732317730f3aa826e45ebb1b888,2025-01-16T20:33:29.353000 -CVE-2025-21411,0,0,d2e29cedca2f1fe913d6878a152d5e3cf8623634997c4c44b466ea286fc6f7de,2025-01-16T20:33:43.177000 -CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec41314d,2025-01-16T20:33:54.607000 -CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000 +CVE-2025-21409,0,1,9a0370401d0fd7e49b65808ae057846090c56ac6a1008c21c4813913a7a82c01,2025-01-16T20:33:29.353000 +CVE-2025-21411,0,1,a2034d74d3fc549cce6a89f8510ff5f65d0c38a3efa1b89761ff7efb0d32d181,2025-01-16T20:33:43.177000 +CVE-2025-21413,0,1,1bf22169990c8a8fedf0d3cfdb98b58deba2a7623e999a561ea4be432b34b8a0,2025-01-16T20:33:54.607000 +CVE-2025-21417,0,1,fd095985c935f49210d9fa1ed1207877c8c15b5405f59c1ff106288b43f18fbc,2025-01-16T20:34:03.303000 CVE-2025-21592,0,0,c76e12f3b53731aaade2a77d1972500240d5eb74acd4fba716952d05d47905b1,2025-01-09T17:15:18.203000 CVE-2025-21593,0,0,9b3446b9a612891bc98169a3bb8c97e2abea25024522a1368e878da109404cd9,2025-01-09T17:15:18.380000 CVE-2025-21596,0,0,aa7c0fc4f0d758bf67e3e13a54dacfc1fc5b4b975f6328e6068299303dc7e966,2025-01-09T17:15:18.593000 @@ -277500,26 +277502,26 @@ CVE-2025-21622,0,0,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c CVE-2025-21623,0,0,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,67d81661ccc165bcb7a2d55cd4301b8865debac4b78d0af97080ff58ad5f038c,2025-01-07T17:15:32.417000 CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000 -CVE-2025-21629,0,0,0a55b872d6685ac8b474198c6b676d3355054a0573b455caf5ce0d0ece6d4823,2025-01-15T13:15:15.220000 +CVE-2025-21629,0,1,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000 CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22132,0,0,92f694afc6ce174171da36824da367c743ab8d73a418a3347309264d0570fa9a,2025-01-07T22:15:31.590000 CVE-2025-22133,0,0,32df1a7a06703aea1606771b300b1836f84903a2a4b183527a9471791c589465,2025-01-08T15:15:21.727000 -CVE-2025-22134,0,0,5a70c0ce162ac0b854d6d3bbdd3ec6b9593f357631139865a18642b36b0e729b,2025-01-13T21:15:14.333000 +CVE-2025-22134,0,1,3c2fd591225b705584c74bda8da9b9be07bc4fac46ac5a8cbc29997594d0c4cf,2025-01-13T21:15:14.333000 CVE-2025-22136,0,0,69d6193ee80a32ca1bd809520bb07993c3975c9a6b70c7fbd917092d41566a08,2025-01-08T16:15:38.770000 CVE-2025-22137,0,0,500e180482a18b49718c6495441b08426af3ad9db841f00b13a599eecbf0088e,2025-01-08T16:15:38.920000 -CVE-2025-22138,0,0,a087960ed7b45237fb6ce07255b7256946803402a6a108b54078743985d727e3,2025-01-13T21:15:14.500000 -CVE-2025-22139,0,0,62fc450acdd2ced803ece4801c69c5eb6552f5e1f8d20b6c12e23641dea96fdd,2025-01-08T20:15:29.693000 +CVE-2025-22138,0,1,7989784f29e902b6c1ae3008544641e14e2af37f2f7bd44b398b101f32993fca,2025-01-13T21:15:14.500000 +CVE-2025-22139,0,1,8329eac2b1a209ed5a35aeea170cae7fc6a8c20d171517dfd9867bf7488b3457,2025-01-08T20:15:29.693000 CVE-2025-22140,0,0,be66f05081c14fb2e0816483c4f45d3f628fc010fe866ea9da650e7ac4d60a3d,2025-01-08T20:15:29.800000 CVE-2025-22141,0,0,a527922fbc8add89576398e2e4e44f71f48d8da972b31e27b0c4985f7420a5dc,2025-01-08T20:15:29.897000 -CVE-2025-22142,0,0,9c88f0b148975f706930696ccbcc2dc52817d450ed0a7485308e47712b5fffa3,2025-01-13T21:15:14.640000 -CVE-2025-22143,0,0,535b34000993ab6e069ce70a88afd72eb8046a8f188d22ed6e3f4d9ac657466d,2025-01-08T20:15:30.003000 -CVE-2025-22144,0,0,33e5ba813b6394d3c01915cfc0bd45d5cd56cbf4b2f6585093ffbfd1d00f9db3,2025-01-13T21:15:14.737000 +CVE-2025-22142,0,1,9e6e684860776a4400bf033058ace20f67dc7378d6ea8dd6ca385d13fd05520d,2025-01-13T21:15:14.640000 +CVE-2025-22143,0,1,f916c93b1d845902d401985c64cce1513eb4a4b4ae74ff3827d172d2a60362f9,2025-01-08T20:15:30.003000 +CVE-2025-22144,0,1,3f61829a0e73448014132f2edce6a94383842f3cf739a2152ba691301c580738,2025-01-13T21:15:14.737000 CVE-2025-22145,0,0,88df2b27b4a7796924aa6277caf85bae572e95291858d2eee15b7f4eb271d86c,2025-01-08T21:15:13.480000 -CVE-2025-22146,0,0,1c93ec5b6025ff5a57e7775f48997be4b9eca8156fa69a81bbc621fcc7eea253,2025-01-15T20:15:30.557000 +CVE-2025-22146,0,1,7d604299ba6a6dd89be2e2cf3b7b21ee971048df32dafde437c080eff11e6e7f,2025-01-15T20:15:30.557000 CVE-2025-22149,0,0,a38f1d25924ff640550a2206f96377b56b7eb734e7bb1771523eee3ff2dd77f7,2025-01-09T18:15:30.233000 CVE-2025-22151,0,0,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d82c1,2025-01-09T19:15:20.410000 -CVE-2025-22152,0,0,f6e16a6363f55c864692fd37f669ef41501d91a264daf32f0f68d6d46b264ef9,2025-01-10T16:15:29.910000 +CVE-2025-22152,0,1,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e722,2025-01-10T16:15:29.910000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000 @@ -277544,10 +277546,10 @@ CVE-2025-22309,0,0,41a5649d9f063abc40e2323ec834921c50bb20c7c3f52cc1cbc06eac9caf5 CVE-2025-22310,0,0,01093bca114875827fdf0ce9f05a34c343d3d135e32d6b40cbb65ecb6d8c931c,2025-01-07T11:15:15.320000 CVE-2025-22312,0,0,a7bf6287b60e0e496be523a78cca84a7ead7f5ce4262b249df941bdb26960569,2025-01-07T11:15:15.480000 CVE-2025-22313,0,0,5a053d272a7f80827a28d46605edf286de3cc07b2584d481167046830126dd01,2025-01-09T16:16:25.653000 -CVE-2025-22314,0,0,0cf2c72c9367dfc1cf7a4ccfaccf346d34bcdbcee150a73735ec6fb9069f3e6f,2025-01-13T14:15:10.270000 +CVE-2025-22314,0,1,b9054b96be0754de8c0a6cb596862922b24d4794887f456f87dfd0bb880d2088,2025-01-13T14:15:10.270000 CVE-2025-22315,0,0,a72855198b7b6c3f24eb2b601132daa754b13da0204b23fceae9c014a71d07ff,2025-01-07T11:15:15.627000 CVE-2025-22316,0,0,0ceb4f4ab42a49cc2d5309a5f4d9e71fec0d3cc6da31bc7e448e3f3e1c046b45,2025-01-07T11:15:15.763000 -CVE-2025-22317,0,0,9e1735953995926f771b7654a067b0ce1d1dd047075191c62af92a3265068e2c,2025-01-15T16:15:34.590000 +CVE-2025-22317,0,1,8c2b42f24e2f8faacd2e0bb645d3a6edfbe8586f973836795d4b0c5487694c1f,2025-01-15T16:15:34.590000 CVE-2025-22319,0,0,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000 CVE-2025-22320,0,0,4a18a096a3e3278530b059a94ed0df6bda5c51f5655f0d9ec304e5a12141712d,2025-01-07T11:15:15.910000 CVE-2025-22321,0,0,c3ec78a4d8f363a8d35d3ed77c77053a584db7552a50bacc2a189071deec2efa,2025-01-07T11:15:16.073000 @@ -277557,21 +277559,21 @@ CVE-2025-22325,0,0,0d9564c3b7a61f07790f6bed4b2e22bb71ad52f4f54ab2a6e38cb0f92019a CVE-2025-22326,0,0,8fe400cf7a337c720766144ab43e8e8b9db3743928ed0cca703def2633d79203,2025-01-07T11:15:16.730000 CVE-2025-22327,0,0,2a92c2fd61b4632ef043e3ea41a846a80060d23d8650e07cab689acf9112c669,2025-01-07T11:15:16.870000 CVE-2025-22328,0,0,bae5ea02b892a469897a505361fc54dac1bb5e3519ad609d0ce29be3676adf98,2025-01-07T11:15:17.020000 -CVE-2025-22329,0,0,9a58b3bb0de706e3a3640a167f4023dc17f692a000148a2d315ab3e692c783d7,2025-01-15T16:15:34.763000 +CVE-2025-22329,0,1,f5d56d1aa2c78408d4025f17e76f097f1bd68e404c811ca09dc38f2add757e56,2025-01-15T16:15:34.763000 CVE-2025-22330,0,0,839502208eee95785526cf7c123f74018642e883627c07e6a080cad1506cc7ff,2025-01-09T16:16:25.840000 CVE-2025-22331,0,0,a2f8402b66c9c90ee6c55cbe4004f833df5c3b164a1649adc2a5ef04d9b0d06a,2025-01-09T16:16:26.180000 CVE-2025-22333,0,0,e1ce540f097535337d77ac62982e232ef112548ec7d9205fe7d663038857be1a,2025-01-07T11:15:17.160000 CVE-2025-22334,0,0,11b4f4e8db4b7785b74aad91051c2e8051c499de944f60aa9b4469a20e495399,2025-01-07T17:15:32.953000 CVE-2025-22335,0,0,4a08b412add701f059cd149e45f878ef3b0f40f24de1ec01f34841e4d73759dc,2025-01-07T16:15:42.703000 CVE-2025-22336,0,0,e498264d94897dc70f78e05983d91aacc96a48160550b893d84ce97145124d6a,2025-01-07T11:15:17.313000 -CVE-2025-22337,0,0,f190e91c9d8ea807e4ceb4e9d18c9e49b4534c5653c41223922439b721f1b65a,2025-01-13T14:15:10.440000 +CVE-2025-22337,0,1,5d41c59b533e15a90ac0eb04123ef238c192c67fdf1a3a5a9bc7681f9252fc36,2025-01-13T14:15:10.440000 CVE-2025-22338,0,0,7129ea122c6554e3c515c55738d8d6c2390b8b27bae9ff6ebda6d0b32cd44085,2025-01-07T16:15:44.117000 CVE-2025-22339,0,0,e3b226b5bf5a3cbff8aebc6d88bcb4fc118cdad6ece13f47708a7ca8d8f13135,2025-01-07T11:15:17.463000 CVE-2025-22342,0,0,541f867dbda194731b8a18481f8f88aab54d4c9b69e4847a11ff394e4e7ae36c,2025-01-07T11:15:17.610000 CVE-2025-22343,0,0,5a249d51bc1bb83b765cbc47fc56c527973dc8aee76835d7267eeba7cb4b3587,2025-01-07T11:15:17.743000 -CVE-2025-22344,0,0,460192c7817aa922c5bfd31cdfb8ed36f115e75ccd3f41e76d497c3cf8e73749,2025-01-13T14:15:10.613000 +CVE-2025-22344,0,1,73b38550cc61c4d4fcec8a1a6c6ebfdcafdd6bf85ac16de00bbc41a01d5f4343,2025-01-13T14:15:10.613000 CVE-2025-22345,0,0,c22f4b13460e8eaf77c12538b40e80ba8816f0eae4ae0faed99079f0a8b51be2,2025-01-09T16:16:26.620000 -CVE-2025-22346,0,0,0477eeedb65b7850c314c01964a6de9de174acebc97bed996661184a98e850f7,2025-01-15T16:15:34.923000 +CVE-2025-22346,0,1,160d88abdf4a329e51877178b9f51918e28459d1f4780556affb79d2084911b4,2025-01-15T16:15:34.923000 CVE-2025-22347,0,0,1525385e6ff22d70c5483300cc97b9f106ab87009c73182f80eb64f0dbf63c86,2025-01-07T11:15:17.897000 CVE-2025-22348,0,0,6352d8359c3f1c39d040d019b0b75df005d1e0125a12d234bd54509ec1298e20,2025-01-07T11:15:18.037000 CVE-2025-22349,0,0,a74f87e7a6e2527d02fc5508fe1814ec7b543150e27bf810ec0f86a600fef419,2025-01-07T11:15:18.183000 @@ -277598,24 +277600,24 @@ CVE-2025-22387,0,0,dd138547075d8154ac170b8fa1fe2fff6d798eaa102e4686c32ded5b7657a CVE-2025-22388,0,0,861b73b67db062deb352be180b2d48906ffed263b47a8a982206529cfeb63b66,2025-01-06T15:15:16.307000 CVE-2025-22389,0,0,64b4c3bed98d63311740979c9a99a1902edafd1044e1f65b92e496841e753fba,2025-01-04T03:15:07.580000 CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6ad14,2025-01-06T17:15:48.170000 -CVE-2025-22394,0,0,5ad882ab083501b4cfa55c7ef153316b9de9b3bf155a6bf08c83abf04335e937,2025-01-15T05:15:10.343000 +CVE-2025-22394,0,1,bd5883db5916f4fb62cd22d509388363d3fe283a637e665acf3a831ed6ef3641,2025-01-15T05:15:10.343000 CVE-2025-22395,0,0,ce7db6acd5106ea1fc693f8e6a4248b50542a5f440a82a6c625194d64974a971,2025-01-07T03:15:06.047000 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 -CVE-2025-22498,0,0,602cdea1765fedaac861c2982ad1521a3b753dc10fa6b88847d1e44ce8fa66ea,2025-01-13T14:15:10.787000 -CVE-2025-22499,0,0,f129575251553a348d23d3a58039fb1f1236c4fb791969761d1863aa9e2ee997,2025-01-13T14:15:10.960000 +CVE-2025-22498,0,1,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 +CVE-2025-22499,0,1,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 CVE-2025-22502,0,0,3183867d6d0bb4304290089bf31cd36b52e2a0152aa74b8aad25d0ed6a2a48d9,2025-01-07T16:15:45.717000 CVE-2025-22503,0,0,2312eda7beecfe6ecfb9249f8a971c65cfe30e58668d20a90b2c6b9852f7f977,2025-01-07T16:15:45.877000 CVE-2025-22504,0,0,a9139c7e10a4bdae0f6c289db8b58ce819e8b48dfb9a72eac5250d51a0c5e3e4,2025-01-09T16:16:27.110000 CVE-2025-22505,0,0,c16051b04eb145418bded72ca77be037cf9fee37f07ce6a67c59037e48b9c11b,2025-01-09T16:16:27.280000 -CVE-2025-22506,0,0,6aa75d5f4b4c691c9fa2774a0bef67fed4e1f6196fbd10a0c5ef9cbc87ce4672,2025-01-13T14:15:11.127000 +CVE-2025-22506,0,1,dd4f7e8cd5bba1f92d667c12097d46cfeb46c7441fe76fb524ad95b719119656,2025-01-13T14:15:11.127000 CVE-2025-22507,0,0,c94c1401c11ff9cd6e4f5b9836ac27c2be70ec71a54af6e374399078e6643932,2025-01-07T16:15:46.040000 CVE-2025-22508,0,0,5d8664a0aa0edd6273a6b83a3d209997381a4764cb066100315f48a722d20397,2025-01-09T16:16:27.433000 CVE-2025-22510,0,0,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000 CVE-2025-22511,0,0,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000 CVE-2025-22512,0,0,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000 -CVE-2025-22514,0,0,7b4ae1e706a1c596e2bec83afc2256d4b5253d8523b00f0754d9c6e7d6c15fdb,2025-01-13T14:15:11.290000 +CVE-2025-22514,0,1,d3fea3865cb0e9cbdd48ba69178aff5ea61ee16cb9d92ed1522341dc3c9564eb,2025-01-13T14:15:11.290000 CVE-2025-22515,0,0,51b7aadc030c956d2c5358cbbea157a89fe0c8781c0772024e256d945eaf061c,2025-01-07T16:15:46.497000 CVE-2025-22516,0,0,1e00a835018f3d8a5a2146e73ca06f663e6b5f20899e52befe5b59b682de3f14,2025-01-07T16:15:46.653000 CVE-2025-22517,0,0,ee21d3d31a992a68c979e6accd10715a11d5e1ec6f6b3eed9bfa95834b0fad80,2025-01-07T16:15:46.820000 @@ -277662,27 +277664,27 @@ CVE-2025-22560,0,0,9ca1212fb17f4181c18e39c7de050eeeb10043eec792b100a6ff2194db9fd CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5a6b,2025-01-09T16:16:28.827000 CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000 CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000 -CVE-2025-22567,0,0,8cec54769048b8fc6401361bea37077bbe73461603d1ca11331c3d14cf001753,2025-01-13T14:15:11.460000 -CVE-2025-22568,0,0,1426f29dcb5162b520681a1a801b755705f857dbe292621e92fe6c71ff9b387a,2025-01-13T14:15:11.610000 -CVE-2025-22569,0,0,f3ddb3819698ec265b264211570c321111dd08281fd0211b8ee5cae4e4307a3b,2025-01-13T14:15:11.787000 -CVE-2025-22570,0,0,d5722d3bb873070f009341a2fb0155b8b41e1e3f28d8cab7797f9b2a400c5790,2025-01-13T14:15:11.940000 +CVE-2025-22567,0,1,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000 +CVE-2025-22568,0,1,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000 +CVE-2025-22569,0,1,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000 +CVE-2025-22570,0,1,81e63174bbd9a8d7742f7e13c0c424e4e252c599a54eb0b708c66a7dc1c203c0,2025-01-13T14:15:11.940000 CVE-2025-22571,0,0,589592d19e0408795b9c88db00be613623e0a28c0ced64bee3ab080db5508985,2025-01-07T16:15:53.187000 CVE-2025-22572,0,0,09d362e6905110bf03efd8d9b3422685fc5a6f559575660b2f11c273a0d7b10c,2025-01-07T16:15:53.357000 CVE-2025-22573,0,0,cef0a0fee2a846fdd99777eab6d59d8922d33c31d91c1289eff639dfb1ced15d,2025-01-07T16:15:53.520000 CVE-2025-22574,0,0,84e101e6655207515e3d308aae10328b324f66020c49c27e6a9a740f08e66749,2025-01-07T16:15:53.667000 -CVE-2025-22576,0,0,5e9dde905cf2f4c317019d04f8b10571a4ae593993697dcb8ba512e694eadd81,2025-01-13T14:15:12.117000 +CVE-2025-22576,0,1,d91ec1220267346d1a0f0443983782bbf181c797facca8f491a7bfecb878d90d,2025-01-13T14:15:12.117000 CVE-2025-22577,0,0,de49ca44634bd4c2dcd4ed4b2c861f3aeca16b15d3e20dc646883514b316145b,2025-01-07T16:15:53.823000 CVE-2025-22578,0,0,a663c0074d74b9b4b7e504663f4236ea23bd746235c7a6cf544a9a518e4833f7,2025-01-07T16:15:53.970000 CVE-2025-22579,0,0,dec211853384da65ca43ab843ad0ef7d38624586cc8219bff72d8bb4860195e9,2025-01-07T16:15:54.130000 CVE-2025-22580,0,0,987481d428d626ab3a636b089b28e62611932bb1aa3674325a18a905b6d8d87d,2025-01-07T16:15:54.303000 CVE-2025-22581,0,0,f24e3c65602b83836f496886c24039cf1c8846e00c33a0a0c021007f597e352b,2025-01-07T16:15:54.467000 CVE-2025-22582,0,0,bbd386f1b2f8f011e4028e09374da7622be33dbcfbf78736ef844c0c8abee84b,2025-01-07T16:15:54.640000 -CVE-2025-22583,0,0,7509643e45ca0ae28d8e94731fc4fcf3bcf2189c118996c4b3c3bcf8e9a05bdf,2025-01-13T14:15:12.300000 +CVE-2025-22583,0,1,de2a8fe4c3ad7849647105ea0099db004d0ca7f5b30a343cebad3e6655fb7553,2025-01-13T14:15:12.300000 CVE-2025-22584,0,0,a02a61639277ff8bb6fdc8638a3a4457abddc62f680cc0b700d343359b21a5fe,2025-01-07T16:15:54.780000 CVE-2025-22585,0,0,5295ca8b2b9600231062f3ce2c1c9e8b8fd93e2117553abf02fe27edb5153724,2025-01-07T16:15:54.923000 -CVE-2025-22586,0,0,c23bdb2929cdacdbbd10eaba3d31398a7797ceb108c744c3c909f15a4388098e,2025-01-13T14:15:12.490000 -CVE-2025-22587,0,0,c8850c04892ec4c98d064009662c61d5399f2c5edf58a85218ea15a5ed588f18,2025-01-15T16:15:35.097000 -CVE-2025-22588,0,0,da15734090afdbfde934b5b2eb6fa1b07fd7889fef76515002e4bfc08c35cbfa,2025-01-13T14:15:12.660000 +CVE-2025-22586,0,1,16804334a047b2f01340eb62615a8dd9316b9a12b35e95c16e6a136bd06b6ac9,2025-01-13T14:15:12.490000 +CVE-2025-22587,0,1,2bf5cc749481686a77b87726094a1b5a9d61f7be75b7c5b80afd006567747bd5,2025-01-15T16:15:35.097000 +CVE-2025-22588,0,1,3237594a1e0f94efbc9060e1729c2d2e97f5964f4414bc5b9057647a8c2b5034,2025-01-13T14:15:12.660000 CVE-2025-22589,0,0,04766fb247e57bcb66805699f5e7d85615d427973633880479f532a655c1369c,2025-01-07T16:15:55.053000 CVE-2025-22590,0,0,c88e366f105099929b737c28e4e59657f86cfa9e8944fe204794560a0673da79,2025-01-07T16:15:55.200000 CVE-2025-22591,0,0,9dc7be8606e10b7ca53ae284810d2833be8121f6bd7b217f458b2b42cfb403cb,2025-01-07T16:15:55.337000 @@ -277690,68 +277692,68 @@ CVE-2025-22592,0,0,f03fcd01ef66d026e28f7de006f4752785662917cd91a853528350917c3e1 CVE-2025-22593,0,0,093cea1b6014e90377f5953318ea38067198a698c0fcd047cf0a30d851148629,2025-01-07T16:15:55.627000 CVE-2025-22594,0,0,968550ed21e0d31a7010b3baeb6cd6c73db41f48ed3b2ec7133582c21723b513,2025-01-09T16:16:28.983000 CVE-2025-22595,0,0,fa050670aab4f0b0b2f6967b3375eb65e696e921ddb4c965d5d1191910703267,2025-01-09T16:16:29.160000 -CVE-2025-22596,0,0,a8207a0d155e70e84968981216ad5f3fc3a5b2db35fde4948f967fd396f31360,2025-01-10T16:15:30.143000 -CVE-2025-22597,0,0,3722ca65d443dd89a5e8cc889025c17e79ade436f09d91535a0218ae72d1a4e6,2025-01-10T16:15:30.343000 -CVE-2025-22598,0,0,e497fe58ac8675da7246094a2662199588779aa650b9c02699534f158225aba0,2025-01-10T16:15:30.540000 -CVE-2025-22599,0,0,645942d1c7d2f7dd12d8618f2017edf7382a16a018a352b649288462de683267,2025-01-10T16:15:30.737000 -CVE-2025-22600,0,0,5bcf7e241f56265340265c8ceca3bc4c44ef112e4d972ba43c49267d66196668,2025-01-10T16:15:30.940000 -CVE-2025-22613,0,0,d3bda9ab1a79994fa54fa2d35c5110316bf68eb778a480fd77573dad09decd9a,2025-01-14T01:15:17.580000 -CVE-2025-22614,0,0,470c2186a81e3a4a1063c9d12d0b1725291ceeeed6e985d307b9cbabda486365,2025-01-13T21:15:14.967000 -CVE-2025-22615,0,0,143733b613da0f1ccd4dcf42ec7d715d537cb9eeddc9c112f747129ea2be52be,2025-01-13T21:15:15.110000 -CVE-2025-22616,0,0,9a78c0cf78bfa4b70ea72030baef3c33dcf751df12c4ce8ed2d5c8a191c222df,2025-01-13T21:15:15.237000 -CVE-2025-22617,0,0,8d30c70fa1d720ba2271097d858adaee9808cc2e3c52f32eca25fcdd6e069af3,2025-01-13T21:15:15.370000 -CVE-2025-22618,0,0,1ad7fa1181900d9f38f040eca215f17c9ecef221c8c783163e3739bfe17658da,2025-01-13T21:15:15.500000 -CVE-2025-22619,0,0,9bc2494c01ec879aa9ba8280bbaca4fb2bf9985bc23e713f8b5ac09c2a61cce2,2025-01-13T21:15:15.620000 +CVE-2025-22596,0,1,c43212a15616bcb1cf3460c6d15e4d3a8d8fa467dca592cff9e51daf0d3b0dbc,2025-01-10T16:15:30.143000 +CVE-2025-22597,0,1,42b7f0ad3f97eec140e81e3432e0004fde0e857d31ddfb4970711f713c7795eb,2025-01-10T16:15:30.343000 +CVE-2025-22598,0,1,71a9628cd5b8a378efc6a4f0fbba9bc5be356eced51ee0c58585106238174184,2025-01-10T16:15:30.540000 +CVE-2025-22599,0,1,b57c2c3eae861ece051af1f1ef69acd0bb3a29c0b52e5a721d4d190a6e483927,2025-01-10T16:15:30.737000 +CVE-2025-22600,0,1,d4d2827dc6878ccbad7b7bb4cb346a62426d6f55b5376cb57fe133465e20f0b1,2025-01-10T16:15:30.940000 +CVE-2025-22613,0,1,aad2f12635038b5a8cde416e18c507c3fb94ff08ed3ac7216fed29e0755971c1,2025-01-14T01:15:17.580000 +CVE-2025-22614,0,1,d656f7b32b5f198b4bb45970b1a94ba1a87474675109e3354122f9cf920f1c84,2025-01-13T21:15:14.967000 +CVE-2025-22615,0,1,2a8f7e50fe035fc366011623a2b600d00f80d19938ec5c5a0af1c9fd13d1c4e2,2025-01-13T21:15:15.110000 +CVE-2025-22616,0,1,7f488b29b5a5992519491e6ff0642ab58c7b42ed9dd948a09cb33aeb51796d30,2025-01-13T21:15:15.237000 +CVE-2025-22617,0,1,20232c8c5ca40cd4ba4748fa93af15a5fbc45a8f7c51b1d0fff39e9d450de300,2025-01-13T21:15:15.370000 +CVE-2025-22618,0,1,ad61907d0f72e0ce3f21a94e69cc540d7b1cd780e0ad571607d65d3ecdbef45a,2025-01-13T21:15:15.500000 +CVE-2025-22619,0,1,13eaf69e13cd48ca237219c7a91847c694b4162a944b2e77691398b837195a0e,2025-01-13T21:15:15.620000 CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000 -CVE-2025-22724,0,0,f334bb9a455fec9f6a1b15578c6ecfb193da0354244edca5cf02705c5c397aaf,2025-01-15T16:15:35.250000 -CVE-2025-22729,0,0,0d7821b7cab1d00af0cb0f769e4369e3049323c076754aaa9d76dd63cc27e301,2025-01-15T16:15:35.400000 -CVE-2025-22731,0,0,e39d5812c1a7621283533989e2370948626b76cc8bd7e5ebcf4183bb36df99f6,2025-01-15T16:15:35.550000 -CVE-2025-22734,0,0,2ec55300d3a0d3080cf0a07301ffe35a174f313299a14b79b4ed2be351d96c13,2025-01-15T16:15:35.703000 -CVE-2025-22736,0,0,85497cd64a87c35ec9f63da7c5b26d3802af2e6a4ca6fcc833b3d53494961c13,2025-01-15T16:15:35.877000 -CVE-2025-22737,0,0,cc12a7aad2281ce6eaca632d89ca87b2860b5913d5b65e2b104b526421d39da0,2025-01-15T16:15:36.030000 -CVE-2025-22738,0,0,fea4c3445ab003f51d56dfd09f9e2dbaf87312960fd6c56275154b26f67418ce,2025-01-15T16:15:36.187000 -CVE-2025-22742,0,0,4f14d2b1648a7058b2fac1b7d99903827ed4eb1fbb447c2b07d4120a788f511f,2025-01-15T16:15:36.350000 -CVE-2025-22743,0,0,1c934f0b87dc44e699e51b84c6a790cde57e82a179082067dd748c0601098fd7,2025-01-15T16:15:36.503000 -CVE-2025-22744,0,0,c9ac4bbc1ae5d100d5b5f273b322844d1a815c5be0f13dc5dba5f172e9109942,2025-01-15T16:15:36.657000 -CVE-2025-22745,0,0,5fa3eaa5bbeec5b15b5d93f2fa5647ed673040555f0fce896cd48ec429f3a148,2025-01-15T16:15:36.810000 -CVE-2025-22746,0,0,6f3c3f00a37cffdbfd476eb4e95027587e30286add2041b4abe15abe7e2816d9,2025-01-15T16:15:36.980000 -CVE-2025-22747,0,0,c323e5e191fe9b40e2b12aa1935868764aafb62ce0d9120adbbce78db91e085f,2025-01-15T16:15:37.150000 -CVE-2025-22748,0,0,7b38ac44600b5f9c91d83b79e9149192f1552db2d4a8c140611c15b29c6448fe,2025-01-15T16:15:37.300000 -CVE-2025-22749,0,0,38f9a3fa2978bae8d7e39a355da60a35755d9b54bf8c77eb5e83a27b2f35e9f6,2025-01-15T16:15:37.450000 -CVE-2025-22750,0,0,a92b311b67e88e10675d84a6ca45ad752fbd6ec58828529c711199a3abf9643f,2025-01-15T16:15:37.610000 -CVE-2025-22751,0,0,8634ca7d4345dbc6f55894d57ac5df6ade0c4253fc2f9a09824498ebcdb41f7d,2025-01-15T16:15:37.770000 -CVE-2025-22752,0,0,63b4b6433e9460add8a222e29c993f2a8b84f565a3d64101717163020480023b,2025-01-15T16:15:37.933000 -CVE-2025-22753,0,0,e6fbe7aa7b7aac38072d31478e26e404600c3fac25cd64c3895910beeacd1b53,2025-01-15T16:15:38.090000 -CVE-2025-22754,0,0,43a991ed495ffa1634bee140b3388c0aacf320c5e1c557bcd5bdc1ea8561132d,2025-01-15T16:15:38.260000 -CVE-2025-22755,0,0,bb13b885740e826e6d34ae2b1dff00042f0ea9f6c0de17a7f46bd1baf0f9b8a8,2025-01-15T16:15:38.417000 -CVE-2025-22758,0,0,b33214b34747dc32d1d87437a7d36233eae5ad887867842176638c7ac70ccfa4,2025-01-15T16:15:38.577000 -CVE-2025-22759,0,0,16a667345da01a36e7fa327ef9177bebfb408f8a605c4f4add3b5e2af8f2c665,2025-01-15T16:15:38.733000 -CVE-2025-22760,0,0,9804be8ad0dead2869ef8b9e44ced876f79e6d0c11b0fbc7083d9631a85b2c44,2025-01-15T16:15:38.890000 -CVE-2025-22761,0,0,c99a1f82fe661f99e3bb731e84724aa19708d8258eac7105dfbb51b44d2f00e3,2025-01-15T16:15:39.053000 -CVE-2025-22762,0,0,61161482ae940f6331a95800adf91b73e14555ad11171d81e7109f479afb00cd,2025-01-15T16:15:39.227000 -CVE-2025-22764,0,0,ff5a784911e2ad30fadc0355c1844cb2fc4597bf1de453e9595ae18876cec5e2,2025-01-15T16:15:39.373000 -CVE-2025-22765,0,0,41d9a30bdf6b10be9fd8016a7a9183464bc2809c4cb7a1359e8c07066c3f1216,2025-01-15T16:15:39.543000 -CVE-2025-22766,0,0,47d45299d23e50b256010d2c0fc217a29af8906a182f62528d3709d289d83fdd,2025-01-15T16:15:39.700000 -CVE-2025-22769,0,0,500fe2840eee0923fa8fe111ac7ac65823c35d178f82fc6bf09e2d590be0cbaa,2025-01-15T16:15:39.860000 -CVE-2025-22773,0,0,7e7e3c4321e4ffe8bb29b2e2566c40feea84d0b1c160129e52b3674b68a0213e,2025-01-15T16:15:40.027000 -CVE-2025-22776,0,0,8f83efa1d104eab4080a949df04343fea85c3a79920cd5008ebad7d2361cfa48,2025-01-15T16:15:40.193000 -CVE-2025-22777,0,0,242cf60b2d99589847386f8f1b61f59a4927e791bc9c8d5220d1b9fa42c9eebc,2025-01-13T18:15:22 -CVE-2025-22778,0,0,06dace0c25b972e12118131a766f6980020282ee98e57ef6bfe94268915cfd78,2025-01-15T16:15:40.350000 -CVE-2025-22779,0,0,74ebf34613499a633ec4091288a6ed871ff6f1081f35b4ca4d4653924b6fbf61,2025-01-15T16:15:40.510000 -CVE-2025-22780,0,0,528fe7fd0865798af0fdcb4327964665df52869debd40c243156f607dabe454a,2025-01-15T16:15:40.660000 -CVE-2025-22781,0,0,f05c86566817aef66ba6d3d66fc5386e9f1ee878109ab42340e850880744c87e,2025-01-15T16:15:40.813000 -CVE-2025-22782,0,0,4e515e5713e0af43e200b0f266f1d8fc84fa20292b281be56cb60d169f0987e3,2025-01-15T16:15:40.973000 -CVE-2025-22784,0,0,304d27bd01a9bb80d4d004b8c5272f67a7d37a97d6a3e9864f00ede557dfcb48,2025-01-15T16:15:41.127000 -CVE-2025-22785,0,0,e5847fc367a19c80997d0dccdfb4a914eaaa3247443e3068051852784fa9ee55,2025-01-15T16:15:41.290000 -CVE-2025-22786,0,0,13247896769e56851e32523c75ae90c0717ce32cebdf276edbc70b8b81cd33f7,2025-01-15T16:15:41.440000 -CVE-2025-22787,0,0,5cdb0c2fa214a1f93f82073f576f6732b55407f2cb9cb36bb28d355be9f7e4da,2025-01-15T16:15:41.603000 -CVE-2025-22788,0,0,5eecb43464f1175a3a30a415812b1f3359eb78a53b497df1a62be411738be62b,2025-01-15T16:15:41.750000 -CVE-2025-22793,0,0,41d43638f08ac0c52339b318999e4663ca821429d6d225f5da9ea71b3aee96c0,2025-01-15T16:15:41.897000 -CVE-2025-22795,0,0,f2141b479f436338bb70d59db971704d1423dbd73238c22ffec34b4921657863,2025-01-15T16:15:42.053000 -CVE-2025-22797,0,0,81304ef406d23f48a52b41fdc95d6fe1f75802054d4025a5310349a1d28722fc,2025-01-15T16:15:42.200000 -CVE-2025-22798,0,0,1081212035e1c010a0e378b82a27a9a6f52ba0dedbcacf1ec7292ce4c9f34cb4,2025-01-15T16:15:42.343000 -CVE-2025-22799,0,0,d3116ecccb1ba55ce1c03f70d8fe65be1b503eadc521b22f98573d423c65e144,2025-01-15T16:15:42.490000 -CVE-2025-22800,0,0,556018ca5feeb4d9fcefc62c608e69c8352f4bbcf6b60060e80b8843fc3177b7,2025-01-13T14:15:13.067000 +CVE-2025-22724,0,1,4b71697c4166f64157fa259051322142853491130762e53a926cbeb456975423,2025-01-15T16:15:35.250000 +CVE-2025-22729,0,1,b385c13a23a149f64df46d7196231b40966fb99b0f0f2a85978036f7c5cdb1e2,2025-01-15T16:15:35.400000 +CVE-2025-22731,0,1,591ca873395a60ee615f6aa95897c12d402f7661783a3bda5439845de448c196,2025-01-15T16:15:35.550000 +CVE-2025-22734,0,1,ebb588399299ed7786c13a4d873d6a5e5a3c44188d8c165fdc0198076e15c29b,2025-01-15T16:15:35.703000 +CVE-2025-22736,0,1,0f002f9c72e82e1a6604d70abaa51b2bc570bcdd5574d8a2c1f2e2cb9ae96bef,2025-01-15T16:15:35.877000 +CVE-2025-22737,0,1,d993d76148f4207aebc67a18a146e07d4f4f3ca83cc7e5580153e5155464b350,2025-01-15T16:15:36.030000 +CVE-2025-22738,0,1,edb589b683f4ed743fa5b90fa486af301e0f80b88774faf71aed08aa4a667bf8,2025-01-15T16:15:36.187000 +CVE-2025-22742,0,1,11a4a56fc317da9c8dfee788933cef43a2971f0d29d36632165000485ef746b0,2025-01-15T16:15:36.350000 +CVE-2025-22743,0,1,76f32fc2f88d28b097346bb603b63ac7aee93ae537a00506ea3d57cf32b7feb9,2025-01-15T16:15:36.503000 +CVE-2025-22744,0,1,9c4303b28715077c0dbe485fb40535cf186962e58a22a39419bcf9fb85bca699,2025-01-15T16:15:36.657000 +CVE-2025-22745,0,1,15b9d19793afa8aa0804e593e556b6c51e0e12b68563e4aa0958ffe0e821f980,2025-01-15T16:15:36.810000 +CVE-2025-22746,0,1,70a3521108ae06cb57a1ba5e2aa06b2ef20a5baf0167317631d0fcefe387b9ba,2025-01-15T16:15:36.980000 +CVE-2025-22747,0,1,df680ff70de622b17ea72e0677a3843fb66c8c08066825c5826d303838d0e711,2025-01-15T16:15:37.150000 +CVE-2025-22748,0,1,dd95e339dbdb927ab767598a6db9d7670f508f9fd9f6074176991aea27d33f1c,2025-01-15T16:15:37.300000 +CVE-2025-22749,0,1,22bd22a1519c79928fd4dabb253b4ff7ea492f2307e8c4b5583e8d33d9a002b9,2025-01-15T16:15:37.450000 +CVE-2025-22750,0,1,e117f1a59ca3b62c4bf28d79a6cc26ba4682538e7b458aae7463a179f7d24532,2025-01-15T16:15:37.610000 +CVE-2025-22751,0,1,4b800595318411f16cd75e639bb5b6bd513a9af5aafb5b4f3e45af882062deac,2025-01-15T16:15:37.770000 +CVE-2025-22752,0,1,41bc182eb31d3ed08c47c2f1a14594b9475edefd40e6ac88496a43b932ffd105,2025-01-15T16:15:37.933000 +CVE-2025-22753,0,1,1392ba1976b2f3737be53da9e82e2a71b66804802fe541ed64804556b77dc379,2025-01-15T16:15:38.090000 +CVE-2025-22754,0,1,c0a20ff0dc7d11a65b9241a7172e5329fe4a137b477ec9e87a12160d75b634c6,2025-01-15T16:15:38.260000 +CVE-2025-22755,0,1,8f6b0a04551af49856a2271381efe0b139629609cf6cdbb88a9b44d66b8939d8,2025-01-15T16:15:38.417000 +CVE-2025-22758,0,1,75af2175b66bedd5905c80abd56322cb37a48c8bc3ca46887b18b8750dd877d0,2025-01-15T16:15:38.577000 +CVE-2025-22759,0,1,9fd34399fa1530c21c9cfdecd9f53c69ec53b7cabdae01a2ee26417453f72f17,2025-01-15T16:15:38.733000 +CVE-2025-22760,0,1,ceaff3b523ed1ab68ca9afc6e8dcc1721a356d85b9c6dbcc0d6dd64777fa93b0,2025-01-15T16:15:38.890000 +CVE-2025-22761,0,1,1f457b8943bcdd333039377fe4c764bd2dfdb88365d9eefe6cccfdb7a18f652c,2025-01-15T16:15:39.053000 +CVE-2025-22762,0,1,9c306109b16ba65d05e7076b45fa1179d0a359bb35d83cde3f7d3c02ff96f6bc,2025-01-15T16:15:39.227000 +CVE-2025-22764,0,1,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4fd3,2025-01-15T16:15:39.373000 +CVE-2025-22765,0,1,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000 +CVE-2025-22766,0,1,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000 +CVE-2025-22769,0,1,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 +CVE-2025-22773,0,1,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 +CVE-2025-22776,0,1,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa83c,2025-01-15T16:15:40.193000 +CVE-2025-22777,0,1,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22 +CVE-2025-22778,0,1,a2bc20469f55e874da32fca9be88da64c934748fc51c1927967277612aa1f61f,2025-01-15T16:15:40.350000 +CVE-2025-22779,0,1,1dbe2ad312835dc346b83ea64bb7019d11586a48cc8d249ef5a6c76c895b3238,2025-01-15T16:15:40.510000 +CVE-2025-22780,0,1,2d5a324e293c4c4f1be80441263a70eba23c271f2f2cb79bdaadc07dcabb9591,2025-01-15T16:15:40.660000 +CVE-2025-22781,0,1,1afa1e21c86cac8ee7b1d1071985c89e8ee67ff99915e1b488521ef5a115afa5,2025-01-15T16:15:40.813000 +CVE-2025-22782,0,1,4d4a57c4ca0b47080b236548a74a5ed3bac54edcb8336bdf840fd3b341ca7ef9,2025-01-15T16:15:40.973000 +CVE-2025-22784,0,1,92af1dcbc21436bcacbb4f07d9a62f95575ba7fc084cf7ac65c2b20d13664c0a,2025-01-15T16:15:41.127000 +CVE-2025-22785,0,1,aa4353d5806fe5723076a35c33b8891ff3a61998eca5d33194fb5785a62e2d25,2025-01-15T16:15:41.290000 +CVE-2025-22786,0,1,bbe34793af48ca2408914a3f7c7ee4c16a9abc2b55fa750872644376b8835093,2025-01-15T16:15:41.440000 +CVE-2025-22787,0,1,61c6ac678e37e56bdf009616d68873da6951821ed07437bc8836d50664142439,2025-01-15T16:15:41.603000 +CVE-2025-22788,0,1,af55bbe385e5ad19db90f54f67dcad4a6458802599e6dbb5e4a7878a0103b5e0,2025-01-15T16:15:41.750000 +CVE-2025-22793,0,1,1e0903441186396148f438dd4c5bf609b6c2892614e2b8eb44fcfefd5125737c,2025-01-15T16:15:41.897000 +CVE-2025-22795,0,1,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9b7c,2025-01-15T16:15:42.053000 +CVE-2025-22797,0,1,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000 +CVE-2025-22798,0,1,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 +CVE-2025-22799,0,1,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000 +CVE-2025-22800,0,1,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000 CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 CVE-2025-22803,0,0,40579bef037b2313067d92dc65978feb36bebc6c2ed9d74c87c1ec3f2a0020b9,2025-01-09T16:16:29.627000 @@ -277777,284 +277779,284 @@ CVE-2025-22823,0,0,16e8a59cbcc2bfc06c602dd1c4fa5e368ef951a41870f5a6e53ff24ecf09b CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f7e1,2025-01-09T16:16:32.893000 CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 -CVE-2025-22828,0,0,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000 +CVE-2025-22828,0,1,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 -CVE-2025-22905,0,0,abc87a85c7bc7d9d749537f6e4185a3608bb9fb9938aa6d93312fdeb15cc69d3,2025-01-16T15:15:15.180000 -CVE-2025-22906,0,0,c442b828ae2bdbc2d39f15b231587f53bcedbd794c904b4144293ba283dc2985,2025-01-16T15:15:15.357000 -CVE-2025-22907,0,0,afe94c593034a06a548c8df5f439a7a34ed21665762277eb367e4b3ea8c24c00,2025-01-16T15:15:15.547000 -CVE-2025-22912,0,0,766f040be3df03b040356c69b2efd09905e002e58e9533a9231fa2503e62df36,2025-01-16T15:15:15.717000 -CVE-2025-22913,0,0,f239c8371b8d3437623235654e9889410bf3102a7c3bba6b0cdc259cb15be933,2025-01-16T15:15:15.903000 -CVE-2025-22916,0,0,d04fdd5ab17cd7ad4479340bde8debf906714d99a9d8f5873b258c0ba700819d,2025-01-16T15:15:16.113000 +CVE-2025-22905,0,1,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000 +CVE-2025-22906,0,1,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000 +CVE-2025-22907,0,1,7f4df8d028c2fe44cc7562e2d8471c7b2f2133589b9f732904dbb3e904199aa7,2025-01-16T15:15:15.547000 +CVE-2025-22912,0,1,76a106dcfc3b15a68f41cb86af5f0bc6ce507166c1320e2c062df05ffbaedd44,2025-01-16T15:15:15.717000 +CVE-2025-22913,0,1,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497585,2025-01-16T15:15:15.903000 +CVE-2025-22916,0,1,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 -CVE-2025-22949,0,0,9276342af8ee37607a1ffae2d3f1aeab3d942e0b55b28a72d519f8d3d1707262,2025-01-14T15:15:28.637000 -CVE-2025-22963,0,0,ddb005db611e43367f0caf5873d662acfb7b90267f1a87ba259499e665e1b39e,2025-01-13T16:15:19.367000 -CVE-2025-22964,0,0,a90086eb39175894fd8a6f5a5a2d3d26692d372646feda1a5970b8ceedca9205,2025-01-15T23:15:10.650000 -CVE-2025-22968,0,0,57a69808ab0990561b0328d97b2c8de740ae46feda81744f1a799a0ff4b4728e,2025-01-16T16:15:35.917000 -CVE-2025-22976,0,0,be87cf5daa830b3fd7b6b45b4ae729caebe4fca6715c7a1a0f6c966a078f7afb,2025-01-15T23:15:10.783000 -CVE-2025-22983,0,0,818f0a40d17098ac93c0b9b96dbd9489c7b8bd9e521ddba6a0116d1bc14ba669,2025-01-14T16:15:35.603000 -CVE-2025-22984,0,0,1a545998f559ee7e76b6e0da26fd2ee7d20b16b478982f1cd328aa26a28e86f8,2025-01-14T16:15:35.710000 -CVE-2025-22996,0,0,8353f71e1021a99be2843ee26c19df5f4da352df92661e6ab1f14b6f88fb0dd3,2025-01-15T17:15:21.837000 -CVE-2025-22997,0,0,784fa7ead53bc349c92561866d97c2fb20b9fab0d953b0c5445a13195ff35fef,2025-01-15T17:15:22.193000 +CVE-2025-22949,0,1,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 +CVE-2025-22963,0,1,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 +CVE-2025-22964,0,1,e69aed1923aea3897411457b44976dbc204f41e7c2ec36d989f628a69185179c,2025-01-15T23:15:10.650000 +CVE-2025-22968,0,1,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 +CVE-2025-22976,0,1,7635385bbb1168f03f689653f73812b5306e7c676072ca854591d831ffee9997,2025-01-15T23:15:10.783000 +CVE-2025-22983,0,1,a4325d671f457e3a88359f4b166998f53b22f358b22808393b6eeb33cff62cc1,2025-01-14T16:15:35.603000 +CVE-2025-22984,0,1,c374cc7c54df2dedb6ecac62cfd3186e913633b44b128647ebb7edc501f96a0c,2025-01-14T16:15:35.710000 +CVE-2025-22996,0,1,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 +CVE-2025-22997,0,1,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000 -CVE-2025-23016,0,0,31a93833611c1f04fca5216d55a04a7c92375e0aedfa95a405475196dac4f70b,2025-01-10T12:15:25.480000 -CVE-2025-23018,0,0,04057ebd16387f0035876264d984029a54f25d41dceb84c91b788d3f78ef776b,2025-01-14T20:15:32.440000 -CVE-2025-23019,0,0,2441b4edcc7db27f67ae614720ac0c1927e9c7e1651443ff935f830ebd7e09ee,2025-01-14T20:15:32.577000 +CVE-2025-23016,0,1,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000 +CVE-2025-23018,0,1,ad3bfa51bcf887bbb40aaa96a9f2385adb490b1540d4c17f9f0c08d58715f76c,2025-01-14T20:15:32.440000 +CVE-2025-23019,0,1,f5678b9e97164f5ca15685d3770c991471a036e8822f1be1e10245ba7a506053,2025-01-14T20:15:32.577000 CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000 -CVE-2025-23025,0,0,f4b524917c3f2ae79a72000669e7e15a2c902b1018ad0ade175bcf650f3999c5,2025-01-14T18:16:05.650000 -CVE-2025-23026,0,0,ed958ffacbf5e1edbdbd3317221932c83fc1c7f5d58e41c777938a850fce7ab9,2025-01-13T21:15:15.897000 -CVE-2025-23027,0,0,997c996b11a67c7e089e56fbd48e5f5dd49b8616ec28b2fbc8fd53aace203e73,2025-01-13T20:15:30.150000 -CVE-2025-23030,0,0,928196be33f31d23d7db3cae63ce80ba7bb2a0166f82076e3dfd6d18d53cd5fa,2025-01-14T01:15:17.690000 -CVE-2025-23031,0,0,b47058c46bd058b5769d1f7510345dbfc76d2e74a7d6a6b49ec209640f377610,2025-01-14T01:15:17.833000 -CVE-2025-23032,0,0,ee177e5adebd93645ecde63040e035ad48ed986078caaf8c686012eeae9343bf,2025-01-14T01:15:17.980000 -CVE-2025-23033,0,0,34eed6e08f9d760a8d75f356ec259903bf3a41162e50afaf92bb936b7afa0754,2025-01-14T01:15:18.127000 -CVE-2025-23034,0,0,10492cd2ad4c8a22cbc79831d8a4cfdcfe445ece83d175c5ba9be4101fcb0cf0,2025-01-14T01:15:18.273000 -CVE-2025-23035,0,0,15119e210304923b04825a533afb7d64de389165b45e441f65e24ce625e498d2,2025-01-14T01:15:18.413000 -CVE-2025-23036,0,0,2fb507a6612e29adcef56fa56aa33311d41bce13c8a87d5f9d3d69910ed84b10,2025-01-14T01:15:18.563000 -CVE-2025-23037,0,0,a1e1381f9e34163ba825239477ba56ff2234c19dc9e437125649d99c36cd92cc,2025-01-14T01:15:18.717000 -CVE-2025-23038,0,0,1de4cc81179ad5c8416ead223772d5e98b46dd173dbfd59e0eb5993af28ad908,2025-01-14T01:15:18.867000 +CVE-2025-23025,0,1,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000 +CVE-2025-23026,0,1,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000 +CVE-2025-23027,0,1,21e7f0bf367301f9d9767775ff2fd1e8d057729c5ff745babdc630ff49bcccd7,2025-01-13T20:15:30.150000 +CVE-2025-23030,0,1,5f5488f3db88e8c895880e2de98df446e60223d5e62859723fef77413b8f908c,2025-01-14T01:15:17.690000 +CVE-2025-23031,0,1,2703053b13ed5e9a113496ca6487c0768e722bf303bd843f213558ab4f1e3cfe,2025-01-14T01:15:17.833000 +CVE-2025-23032,0,1,de6528be93400e7c6a12523068c65ae2de0c74bc389f9c5ab57be51bbf210243,2025-01-14T01:15:17.980000 +CVE-2025-23033,0,1,973c0f9116953a0bb6507e5c8e7f3404533c4eae5854be5c42d04001cffc82b3,2025-01-14T01:15:18.127000 +CVE-2025-23034,0,1,0e7a7fba799188fe38105a00a4fa672c314969c7c37b0d76f32d9aec9edd0085,2025-01-14T01:15:18.273000 +CVE-2025-23035,0,1,81465ccfb56e217fe2ecb3ca3f250da427a8eae026b8a08248c7ffdc5d18b58b,2025-01-14T01:15:18.413000 +CVE-2025-23036,0,1,a664e1f5756b5c8a2ba6b15f70f7fe75642c53b97e7a5e9d82b1f0ad0f464499,2025-01-14T01:15:18.563000 +CVE-2025-23037,0,1,bba935f3814accd2dad6ca6d2fce59e40a56c8238ed43f73a2e894aba2d72b36,2025-01-14T01:15:18.717000 +CVE-2025-23038,0,1,f2cad0907d419559c315d8ea07607ee4f285e136c4ef4195db4d0a456779f91a,2025-01-14T01:15:18.867000 CVE-2025-23039,0,0,0f4c8b18d96f18300eb9751f08f87708b6a9147a90f825f661850c792e0bc10b,2025-01-17T21:15:11.560000 -CVE-2025-23040,0,0,01c74eb3bbfb2cd1f602a038f7c0e18be82bfb3ffcbee44004a2e80cdc5995d7,2025-01-15T18:15:24.797000 -CVE-2025-23041,0,0,d87dedc1a7db6bd5664f42801252448bdb5151d09c41aace5826158a53a32d97,2025-01-14T19:15:44.713000 -CVE-2025-23042,0,0,1110c74e58afce403252b0074fffd93e05f17f43b2190d384fd7a07c01cb5ad5,2025-01-14T19:15:44.863000 -CVE-2025-23051,0,0,20f1630a5cf7de442c47b85ccce910c9d7c47de7da0731e262d679edb6239030,2025-01-14T18:16:05.813000 -CVE-2025-23052,0,0,e2f12af0b1300c1357b14545385b24cac1e992c318abd21cc80f6ba5399627e8,2025-01-14T18:16:05.960000 -CVE-2025-23061,0,0,a6c3b5301ab640979ecc1385c0e8baad67a2dda7ca4f8406f3accc3144183064,2025-01-15T05:15:10.517000 -CVE-2025-23072,0,0,bcd438dd11b872ccfe7c65fbfa40a8438dd575e8d8a7173131c56ab29b33ee68,2025-01-14T19:15:45.007000 +CVE-2025-23040,0,1,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8c5d,2025-01-15T18:15:24.797000 +CVE-2025-23041,0,1,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000 +CVE-2025-23042,0,1,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000 +CVE-2025-23051,0,1,ead28ea498e407b35677db2fede84778fbf7362b4c34bf925c1b3ec9947a64af,2025-01-14T18:16:05.813000 +CVE-2025-23052,0,1,b3ec00cf9abf09fc23b8acce2e1e1cc722adc57628431f397d03db4729b24d0f,2025-01-14T18:16:05.960000 +CVE-2025-23061,0,1,b4f49d5cfe4a6ddd334224104c930dfc4f06696fe9671dfd7fb46829caa69bfb,2025-01-15T05:15:10.517000 +CVE-2025-23072,0,1,f803acd8ba8ed1daeb7212104bb06cc237ee13347918da6bd6a4010b2c78db92,2025-01-14T19:15:45.007000 CVE-2025-23073,0,0,3f1ca33e1e6c2403ab6f9de7fc1811a7d128779940b346e0cb2840f9e69dc5f4,2025-01-15T16:15:42.933000 -CVE-2025-23074,0,0,3bd54e8aff6e0667e581df8dc64519113334429e2ff9b1a1f41a90fdedea5c6b,2025-01-14T19:15:45.223000 -CVE-2025-23078,0,0,6e2234483d99611921814b7d4b760ef5cfe8faae35f477da1f41cf4c536bce4f,2025-01-13T19:15:11.540000 -CVE-2025-23079,0,0,688568487a54a31b09fc20fca3268a4665f027f5a20c0e7845588469ec59e859,2025-01-13T18:15:22.470000 -CVE-2025-23080,0,0,7f79bf8f3b921f5e2fcc3bfea99fb1a5c67fc1f5c6452fc22f7c45ab38cb19d5,2025-01-14T18:16:06.110000 +CVE-2025-23074,0,1,206a2af543ca6657a199f9491f0048cd272bd743dfecba4ee04d71878a7c7688,2025-01-14T19:15:45.223000 +CVE-2025-23078,0,1,8bda6faadb3d18d3682b255005bfb16cf35e9f6cfe4a7caad9b59be2c100ed47,2025-01-13T19:15:11.540000 +CVE-2025-23079,0,1,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881b1c,2025-01-13T18:15:22.470000 +CVE-2025-23080,0,1,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000 CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb146,2025-01-16T16:15:36.090000 -CVE-2025-23082,0,0,bc34747e12b52ad3683d82cd426e550c84713f2181fb67b0b2397b0a5a87d8fb,2025-01-14T16:15:36.200000 -CVE-2025-23108,0,0,bf7d5127026a7b3e24519e57e5514e9c8f61188c4fc8ae46ad1a8e414e8fd737,2025-01-13T18:15:22.680000 -CVE-2025-23109,0,0,b22a40d0cd6f5709ff1c9b97ba4e1adbf7087ff55aed713db176344e389fb640,2025-01-13T18:15:22.903000 -CVE-2025-23110,0,0,867db813d57403bbcc6a3d328d580ab49b5acf4f7dd1d1514716e26b355a6df2,2025-01-10T22:15:27.550000 -CVE-2025-23111,0,0,1ad7a709e810907fc4a775b3bc42be99357664fb7b9ea9c87353d91f6efcd984,2025-01-10T22:15:27.723000 -CVE-2025-23112,0,0,a562dc16cabefbf7dbab5fd0ace202da598b5a780a77bf2dded3f9d697b20716,2025-01-10T22:15:27.863000 -CVE-2025-23113,0,0,5f1e9d8edc60cb14480e82bacace951a4d0edc30dda4fb97d8d9600d5a3b4ff0,2025-01-10T23:15:08.810000 +CVE-2025-23082,0,1,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000 +CVE-2025-23108,0,1,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000 +CVE-2025-23109,0,1,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000 +CVE-2025-23110,0,1,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b077fa,2025-01-10T22:15:27.550000 +CVE-2025-23111,0,1,d3dc6414a9d0db9ed3cb07471714e79beac7db7fd4adde1f55f9ce769eca585e,2025-01-10T22:15:27.723000 +CVE-2025-23112,0,1,15db9896b5b2ea6c9a640fa45af2c0a8239e079375c847ac6ebc4eb1f4c0822a,2025-01-10T22:15:27.863000 +CVE-2025-23113,0,1,1f4b2afdfc961e6cff47003c2a8a61938611b1820102bae5e7ebdff42c0ff218,2025-01-10T23:15:08.810000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000 CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000 CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 -CVE-2025-23198,0,0,38d064f9eeb5dbdc89e5c2cab94de1a30dcf1ab278ad387ee52fa20cdcf4c8e5,2025-01-16T23:15:08.410000 -CVE-2025-23199,0,0,dd0c2d35f6e256939803dab93415f9b547ee1909db113c76af2a7fe5a5e3c989,2025-01-16T23:15:08.567000 -CVE-2025-23200,0,0,059d55c00b9698c0e7fb0e2a5468e34b0267f568df56955bd779c82b44a99f4d,2025-01-16T23:15:08.720000 -CVE-2025-23201,0,0,b8e7e9379c2984feb102e6af9826e4aebb2824dc378f94af55ada00bfab366bf,2025-01-16T23:15:08.880000 +CVE-2025-23198,0,1,8821b8df90adb16cf3625e528f68c391c0bcfa1c8e1e079b50c30f527c621897,2025-01-16T23:15:08.410000 +CVE-2025-23199,0,1,3b82f03297e12f7b25649af5d3a8aa211e1441848bb66c00094132bcfe252a94,2025-01-16T23:15:08.567000 +CVE-2025-23200,0,1,76f8b53439f8a2997652c579cc0769759091077ab1b58d306f6ddac70c67ff17,2025-01-16T23:15:08.720000 +CVE-2025-23201,0,1,1b3a64d48937b528e5dcf493da21f95120ce400124ea2d74eb5a80f41b9d79a2,2025-01-16T23:15:08.880000 CVE-2025-23202,0,0,ebb9b3c0ec35ea830eb49777cc26a7423c92a02686e756805e9c6768f34595bd,2025-01-17T21:15:11.713000 CVE-2025-23205,0,0,5dde18f3e1001012d88c0b2d8c423eb8fb8c3ba6cae70cd1181e6ed64426f77c,2025-01-17T21:15:11.850000 CVE-2025-23206,0,0,ea12574764f66c161153bcbbbe1a91d389bf6c6631d0c7b641a3ca1fa029cc28,2025-01-17T21:15:12.003000 CVE-2025-23207,0,0,e5de4237889cfabf27065c43b82af396f478aa914ba2d9d161effc65eaba9de4,2025-01-17T22:15:29.523000 CVE-2025-23208,0,0,722b719f9dcffb0743a2a700fd962fc8d87ee9dd12d5c90b42efdfb8cdbc3a0a,2025-01-17T23:15:13.107000 CVE-2025-23209,0,0,b5f5728016cefcd5c65fac9ec6e4863e254ca00e3ac538f16ec17bdaa0bbd53c,2025-01-18T01:15:07.633000 -CVE-2025-23366,0,0,9c322475015bf02d1585352d78c1a1b463f803a5f9fa5af211a6e73349c16f8f,2025-01-14T18:16:06.290000 -CVE-2025-23423,0,0,b6f59e601cdbaad011f370832d8ff10b7231d5875d4fb9da3b536bb65b8259e8,2025-01-16T20:15:33.573000 -CVE-2025-23424,0,0,af50c9c9dec5ab1ce79e37d50537a1d0fe21f0f1e703c32c29cd7fa3dc996735,2025-01-16T20:15:33.723000 -CVE-2025-23426,0,0,da1018a73261aac5a2b4f238cd6f302a4e1e133abbe0c8f6a7182ec916efe32a,2025-01-16T20:15:33.877000 -CVE-2025-23429,0,0,92abcae65a651d5b622dd653fa65692c399402aa26ffd969c6c831aa8379215e,2025-01-16T20:15:34.057000 -CVE-2025-23430,0,0,60b19b589ccf280e1c904471033eb09508c559c9147250502dd56eae329b1242,2025-01-16T20:15:34.287000 -CVE-2025-23432,0,0,ec5cba36ef2b26e7f9355a80c0a1dcf65bb2f3fabb7fa8de2d29bb0796c937b7,2025-01-16T20:15:34.467000 -CVE-2025-23434,0,0,1a8864c8e97fe8c485e6c051ea9cc1c944fd2b00e688e67a0e56ff10a0894de8,2025-01-16T20:15:34.607000 -CVE-2025-23435,0,0,34b7e40de48187a89a1e11a99f8672ce681670b032cc85574b82a28fd8112fb4,2025-01-16T20:15:34.770000 -CVE-2025-23436,0,0,d127d00d66151db96cec56277058c487b132add0f7bc3439ec2bf6c9b89ac48d,2025-01-16T20:15:34.920000 -CVE-2025-23438,0,0,c60100b5f6556da84df13e9b110209c8689cedc095671bd11e34a427897219a5,2025-01-16T20:15:35.067000 -CVE-2025-23442,0,0,0adc3b717cf8bd8b25bd54b650e3388b823da8e6fd0baa5a3ec7ee07e26edbeb,2025-01-16T20:15:35.210000 -CVE-2025-23444,0,0,6924dc355446d465d8b58c0f2996858e47fe4455f32f5c96b3862ff0606fa7fc,2025-01-16T20:15:35.360000 -CVE-2025-23445,0,0,5a0d071330f88160e7eed1b47552865828b72156d3ebfed5c967d86d7f4c1ec4,2025-01-16T20:15:35.513000 -CVE-2025-23452,0,0,701717c5247ac87d56fba966afcfc8745becc1043656cd56bc8d611a1ef8b6d8,2025-01-16T20:15:35.730000 -CVE-2025-23453,0,0,b44ca31010abbf14d0270dccc9206be73eb6c895d8ac4d1fd2bf022c4192b439,2025-01-16T20:15:35.883000 -CVE-2025-23455,0,0,fde001dd00d3abc3e1521471530c9bd7f91a52f62656721cbe42f9a8f0a83070,2025-01-16T20:15:36.033000 -CVE-2025-23456,0,0,06ce93af52627c73c1bdecdd3d24a95c333bc9dfab69a18c51cd134edbb7763d,2025-01-16T20:15:36.247000 -CVE-2025-23463,0,0,3ee91e4b1e74bea90989a01143b675b49bd1548c0849979bcbf92c07a5d4278e,2025-01-16T20:15:36.397000 -CVE-2025-23467,0,0,8924c5a493c09538d6a6c976762b66eb780ce06fb8cc86b58ab323230acb1946,2025-01-16T20:15:36.547000 -CVE-2025-23470,0,0,2037ffb67f4816e6678b1001047b842571a8b65f5276915c64da3695bde71775,2025-01-16T20:15:36.700000 -CVE-2025-23471,0,0,9fce40228629c107f47b736cf0020477687c00b89e969a479477ccc14a218a94,2025-01-16T20:15:36.840000 -CVE-2025-23476,0,0,9696718a971751e7721a14ae1341800da97f8c36f9d9bbd4960e3aea9c1915f9,2025-01-16T20:15:36.990000 -CVE-2025-23483,0,0,84318389a82aeab4b161887b6fc62d027bde782c4b4be1e8cb4b1acf339000e4,2025-01-16T20:15:37.133000 -CVE-2025-23497,0,0,6a9c2da9900458d5cb1a061c746e16b19c6a26af0807b7748e8031c6525ac8c5,2025-01-16T20:15:37.293000 -CVE-2025-23499,0,0,fc2a31d72ee03832a972ba4a2d022d25f15b93b9469635891a3e608c297e2e1d,2025-01-16T20:15:37.440000 -CVE-2025-23501,0,0,40b851b519926f0dbd64f4ad13f99ee302d31e1ea1cd96d293bee9ecc7736e71,2025-01-16T20:15:37.593000 -CVE-2025-23508,0,0,3c566806322c6c5b821bb9d1d255973fe72db58af4c3254a32cf53777681c906,2025-01-16T20:15:37.737000 -CVE-2025-23510,0,0,bbceb2ad8a45ce45a08a391d9fdbb08063cb574d6cbc35f482d62f2062111489,2025-01-16T20:15:37.890000 -CVE-2025-23511,0,0,aab2b46f6752056471f8e11040251d32337faf2d847b46d9d44f7cae8a5790c0,2025-01-16T20:15:38.040000 -CVE-2025-23513,0,0,929832e5a9a94c89aad2e5dae6e951cf5adbc51f6c8dd8c2baee4a28075868fc,2025-01-16T20:15:38.193000 -CVE-2025-23514,0,0,bf5fb8cc1f21add62996c76e5d04d893c728272a01ec9aa5712bf75ab859c083,2025-01-16T20:15:38.337000 -CVE-2025-23528,0,0,4395d802338bd6dd9e5997e780cbf02e4b9272f71ef8651bd19df4261e208517,2025-01-16T20:15:38.480000 -CVE-2025-23530,0,0,e8e30857156d259540051b6ec9293bdfd3b3647bcd265a6753139efd0e9479ed,2025-01-16T20:15:38.630000 -CVE-2025-23532,0,0,01b2cfce49915566f445981cb1ae069ed0bba7b48c0d7759a7af3142952ee996,2025-01-16T20:15:38.783000 -CVE-2025-23533,0,0,06e30167196cd7345a7856e38d61b04a188db8c39e5685c606a9a21d9294c341,2025-01-16T20:15:38.930000 -CVE-2025-23537,0,0,c8004735b24a456c2206f4e611f2c883dab7c6d1b56ff2355c03ee20b3f89337,2025-01-16T20:15:39.070000 -CVE-2025-23547,0,0,358ab86fee53bfb11e5bcc7dd20ec566c17a449195af04426627e64458841376,2025-01-16T20:15:39.220000 -CVE-2025-23557,0,0,122e8cb6782981745bbbeba4bcad42cdbc7e15583b84bff7ec68bc36c7c83fb8,2025-01-16T20:15:39.363000 -CVE-2025-23558,0,0,2e566318ce388c2945fb5a8422679125ac62b679e31b1fbd8300a048bea6af3a,2025-01-16T20:15:39.503000 -CVE-2025-23559,0,0,547fb637b77394e45badefd1dee6c34753c4485f26d776a8c467a65fab4eed47,2025-01-16T20:15:39.650000 -CVE-2025-23560,0,0,84a6e2fff43c2d7850eeee143d2ec6bfc15fc7c159e31c4ee64d24c03104fa1a,2025-01-16T20:15:39.797000 -CVE-2025-23566,0,0,3f5dde794781116025c0061f6147cc96adf7d279d68261737ec287c647c4bd25,2025-01-16T20:15:39.947000 -CVE-2025-23567,0,0,dc46f6550d087389fd45a335f6cc3abcb5ea1ac74dbd1cf932a5cf76c114e016,2025-01-16T20:15:40.090000 -CVE-2025-23569,0,0,aba2fe45b4813ca8c28746dc03dc8699f12f25719c98a702713038e19fc6355b,2025-01-16T20:15:40.230000 -CVE-2025-23572,0,0,03938c80a2a3d819c133e7431cb9eed5f235c8309eef405313f8648bf9a1eb5e,2025-01-16T20:15:40.403000 -CVE-2025-23573,0,0,f72dafe6716b1b1fd5ceb3df99788ab4eb4d075a2316dbd71a752a3f58b20af7,2025-01-16T20:15:40.740000 -CVE-2025-23577,0,0,c28b131193e91d90b213ba0ee51ca18a69b0c0df3248f5700bcdde8602ca652d,2025-01-16T20:15:40.877000 -CVE-2025-23617,0,0,b8f15f79999711a57bb1f9cf64e4d87a3fbf5004b175627f4843098a490c5c81,2025-01-16T20:15:41.027000 -CVE-2025-23618,0,0,146ab39e789b3aa2eaf91cf134b1bfe73fa5c6f077da70b378c4defb9d52b6eb,2025-01-16T20:15:41.193000 -CVE-2025-23620,0,0,73ed9ca1e8327d7b15caab2d47dd65816bb39a7c575b32bba346902029cc695a,2025-01-16T20:15:41.340000 -CVE-2025-23623,0,0,1d36d5b5d68a239f28052076e4c7ec82086b8cd2838b3940609e8d58d0b9f039,2025-01-16T20:15:41.480000 -CVE-2025-23627,0,0,860733670829159e71fec4d700cdfbca7d0adb97da0342bf8166ea6b564a82e2,2025-01-16T20:15:41.617000 -CVE-2025-23639,0,0,497e892821f931f513f5f765bb16d30ca6e309c18da0c90d683002b05b37d54b,2025-01-16T20:15:41.763000 -CVE-2025-23640,0,0,7251a70336f746b22ef311fc3e0437ad2e901fb6eb25a140216bf9c2bb95d429,2025-01-16T20:15:41.900000 -CVE-2025-23641,0,0,6802618b9c88a681edead299110cb8b03b7f0930f419d8818a7098b91f831b9a,2025-01-16T20:15:42.037000 -CVE-2025-23642,0,0,efa2800eab11e4cb1de7885422b3de458a6ab7fdcf665110c4528824df44e5ef,2025-01-16T20:15:42.190000 -CVE-2025-23644,0,0,76245b76b2f6175618b119a6338054ba5126bc043f2b36bcdb8689fe140aea5e,2025-01-16T20:15:42.323000 -CVE-2025-23649,0,0,b082c2a051de0a684fca8a1cfd2e89f28b43fad2fcad9cf6ba2a921b6f21912c,2025-01-16T20:15:42.463000 -CVE-2025-23654,0,0,b412852599475c08e76e80fe1ecbd101f79a59480c6f163128d7ba2234d5aff9,2025-01-16T20:15:42.607000 -CVE-2025-23659,0,0,f7e11ae9031bc8a146f5ad3171564491d39fb1fe9b6ac88a296124b65bc77320,2025-01-16T20:15:42.750000 -CVE-2025-23660,0,0,d83e551f2c776a6a2ecb95b8f618168431e07c917e6e21e4bb225ef5d173454f,2025-01-16T20:15:42.893000 -CVE-2025-23661,0,0,5d1bc3ff7d601bab4e659a733b20605fb2af3b53e32f13a0b589b55b0e572858,2025-01-16T20:15:43.037000 -CVE-2025-23662,0,0,37143449dd56328dd9044eeec7140fb5741a5e83ccdd728b52d1066cdcb0f346,2025-01-16T20:15:43.167000 -CVE-2025-23664,0,0,a54fb798f5bfd80c609525e24bde3106b1becc39c2eb0a0d5df8f9d3e68a9a4f,2025-01-16T20:15:43.320000 -CVE-2025-23665,0,0,1be67c53e089c6bd76265171bb99adf71767dc0cfffe4995b0e502f20e1403a4,2025-01-16T20:15:43.460000 -CVE-2025-23673,0,0,6333e4b38ef648e71a6bcb2935d76a0c522352fbdeeb65706d14ad3de29092cb,2025-01-16T20:15:43.620000 -CVE-2025-23675,0,0,3d1ec1e8cea2dbfebb767462f782f619a7a2516abdd4f0c4932b1551250a6a4f,2025-01-16T20:15:43.753000 -CVE-2025-23677,0,0,cd611e88b28a793533662a1072d8f746bc8c6f2c98f60859625afc8bb1b8b58a,2025-01-16T20:15:43.900000 -CVE-2025-23689,0,0,90b3656cf02e584db275c4f4a442dc7f4ad4fa32914032fd319e570ef771aff4,2025-01-16T20:15:44.040000 -CVE-2025-23690,0,0,5b0c2a203e6280cfa2d12357c3f1653b9bab9e021b8cb1e274b3db6ac334e912,2025-01-16T20:15:44.197000 -CVE-2025-23691,0,0,af455fc4293a5123b7be8bb1120b8ff6f749f0509037c08fc97880f32cfe4aef,2025-01-16T20:15:44.353000 -CVE-2025-23692,0,0,f981c3b5d1d979c04c8e89cb26c1175103d8767011670e950a5611fa4b878e6d,2025-01-16T20:15:44.503000 -CVE-2025-23693,0,0,da96fb751d63026af0608dc419f713c1bf960ece346d581b9916737107460c62,2025-01-16T20:15:44.637000 -CVE-2025-23694,0,0,edebc3f671e98f59a648409e827efb365fc7fc08bfc6ab1277245eec985fe130,2025-01-16T20:15:44.780000 -CVE-2025-23698,0,0,e38b2db5dd2be0579bc1f50032024621ecd8f0f6c2e46bd0b0ce47a8f586aa7c,2025-01-16T20:15:44.910000 -CVE-2025-23699,0,0,5db36419e9beba7908b810fe2d625e8f2b6b163cd41dd00c55f5374ee9d02748,2025-01-16T20:15:45.060000 -CVE-2025-23702,0,0,ea4eafa6aba881dc0871b579de731e4414f66f44db6ee5710b06eb2b700eb4d0,2025-01-16T20:15:45.213000 -CVE-2025-23703,0,0,c6fe3c7bd6a64142936928233f79fd2c642912924583f677b289790981082b2f,2025-01-16T20:15:45.350000 -CVE-2025-23708,0,0,2ede054cb4f94456ef6d295dfeb91ef72c3e735f77c6931bd1f19b56e7b204e3,2025-01-16T20:15:45.493000 -CVE-2025-23710,0,0,77c29f99e8113aa1cd463419ef41d6366a3196a40af8d97949ffdc3f1d3e2c69,2025-01-16T20:15:45.643000 -CVE-2025-23712,0,0,f4b75932ef05a8c6377584a34aa5370274433077a7f0426155155247d4f2571e,2025-01-16T20:15:45.800000 -CVE-2025-23713,0,0,6a8d43d30df45151e50a3e21cc5c41cd05290edbde0dcf9499b4f66adc1cc093,2025-01-16T20:15:45.940000 -CVE-2025-23715,0,0,157864ffa5b9b917829fe0585449d5c195123d0afecd0966072b39a84754c6d5,2025-01-16T20:15:46.083000 -CVE-2025-23717,0,0,07da5a25929356c6d2e8004efdfcd695993fbb014f380e0decbf9275c462914b,2025-01-16T20:15:46.247000 -CVE-2025-23720,0,0,10989cd13bbe74f8cf71efa50e93952eba1b6797839bf614519725f4d4e52b78,2025-01-16T20:15:46.397000 -CVE-2025-23743,0,0,70a0d9da026bb696b137f6a0387a3c2369ac0de4e94463c8a5f2321034b23668,2025-01-16T20:15:46.550000 -CVE-2025-23745,0,0,0697eede581a05c0c95206408d3800bae7c1b58cf62eae2776083a82ed3c25d3,2025-01-16T20:15:46.687000 -CVE-2025-23749,0,0,5c9c7277ca1f479bf37fa787c4b36bbddd0994b1e3f41306b37c2a21f383a26a,2025-01-16T20:15:46.830000 -CVE-2025-23760,0,0,dfb8fe7e98acbfe61f22dd85ba7bdfc7ab63fa81acb7d5a54fd3e4060f58194c,2025-01-16T21:15:18.257000 -CVE-2025-23761,0,0,daf7bbad5912d446bf56c6995a85fe59553bb2b3b2e88ecb02ae97c2db64ff69,2025-01-16T21:15:18.410000 -CVE-2025-23764,0,0,16903214ff3ba40661737f7359e15f403188b515156766ee5cc2b322b70e04f2,2025-01-16T21:15:18.550000 -CVE-2025-23765,0,0,146ee22abc2298c53adb53f57448cc189f18e9f3b2eadf188c499dbac47e91d6,2025-01-16T21:15:18.700000 -CVE-2025-23767,0,0,34b0223f37db1d9edb9475c4182bed37d6082eec913b35ecf776d2398ea943ea,2025-01-16T20:15:46.967000 -CVE-2025-23772,0,0,17337f9827481474b330ff54bb59476436ce287e524b6aef5ffd5a57408117dc,2025-01-16T21:15:18.860000 -CVE-2025-23775,0,0,edd4bdbcbeba939a3d228f0deb3ca31d7128bede3be357815aafb3cc1a9ddb18,2025-01-16T21:15:19.007000 -CVE-2025-23776,0,0,0518d58de70ed37f485669f13d4f766175a43861aba20981c5372123aeb2d805,2025-01-16T21:15:19.160000 -CVE-2025-23777,0,0,991f1f15e89e5b1a31ff18eb580685a4693dd14a60fdcde93850cba697e311a0,2025-01-16T21:15:19.323000 -CVE-2025-23778,0,0,e4107c5799f620524105090e3bf8d54060c299a35b3f47afe0472e1ffc2d0f8d,2025-01-16T21:15:19.483000 -CVE-2025-23779,0,0,1ec4289ba719974e4920615716ff8b8022aaefda4b59a12e9eff5e2d58d1fffa,2025-01-16T21:15:19.640000 -CVE-2025-23780,0,0,f9a88857d7f5259d88a672bb593215424c65247aff303aef9d796957c2a2b419,2025-01-16T21:15:19.800000 -CVE-2025-23783,0,0,669f118ecfaf3185f1aff828dc928071d3e565935e8b38f6a23270d577a7302a,2025-01-16T20:15:47.100000 -CVE-2025-23785,0,0,c039843b201451da685514508e900f6b96d41518fc63d6782cc6436533bf967e,2025-01-16T21:15:19.967000 -CVE-2025-23791,0,0,d7ed949cf9a902e3bb816cb35f22378df5a6d8d5b677b49e5c98b443c98e7fa8,2025-01-16T21:15:20.113000 -CVE-2025-23793,0,0,84a3b02bc1d9c00c5b97d5a0c8825e3181e362cf72e123778fff001efc15042b,2025-01-16T21:15:20.267000 -CVE-2025-23794,0,0,d65dbe7e22552b45e02a2e4f207070fda73b11a281bd8601e7eece0455332db6,2025-01-16T21:15:20.397000 -CVE-2025-23795,0,0,3c2f9a17869f00429ab5fd64d71414d1dc3d58855d5e3dda77b1ff3efdb12cdb,2025-01-16T21:15:20.567000 -CVE-2025-23796,0,0,c4e4a1ba7816ce4925089d029b2815daf5b68800fbec9b4249f56c45cb699823,2025-01-16T21:15:20.727000 -CVE-2025-23797,0,0,4e22b68dc26e47b4fbca1d16e6afe8a0beab66d65c5169be93820e4417bc380b,2025-01-16T21:15:20.877000 -CVE-2025-23800,0,0,51e9c6197cf1bc11f5ec76ac70fec1f1298e36e63d3b542a6e2054b35122b487,2025-01-16T21:15:21.040000 -CVE-2025-23801,0,0,1c722627c08b3e578573c45449cf28b48d67f82b8cbbf66b6b2828cea5520e5a,2025-01-16T21:15:21.190000 -CVE-2025-23802,0,0,ac917ea5064a16da92e29d236eafb80d0c4fbf3d88b35add7e539a32acde67cd,2025-01-16T21:15:21.350000 -CVE-2025-23804,0,0,f8fab0930dedbb38cacf0b518bdd5c79f0427cb1f6a61309f283cf9466a5dbb7,2025-01-16T21:15:21.497000 -CVE-2025-23805,0,0,25a603ccd375761cc600683a3109aae9e75bbc4b20fdc6090e5d0618fcba0c01,2025-01-16T21:15:21.643000 -CVE-2025-23807,0,0,05769db744c3eb444bd03e3a2be2b327a053eff2f156dc22cb48b00a0cb62666,2025-01-16T21:15:21.800000 -CVE-2025-23808,0,0,0affe52cbdd44de4bcd61cb28a830705562be1ba7f32550fcf751933b7644fcc,2025-01-16T21:15:21.957000 -CVE-2025-23810,0,0,b1ec9846e1045b8c1853353bbeaf92eca1d2dbd0a1ec49ec1a95cebc9e8199f1,2025-01-16T21:15:22.107000 -CVE-2025-23815,0,0,e823d0795d344a30c068baad427b9b2bee191e2ae723f7e0cf58b63e457cb02f,2025-01-16T21:15:22.257000 -CVE-2025-23816,0,0,b3e66e64482679ccbb0b0bd8a7d08d05f6b3b4b61a3182cce3d9fa934d38023f,2025-01-16T21:15:22.407000 -CVE-2025-23817,0,0,de5d42e9c15bba432c4d8cd5295e5239c90f8b58a9c15b1fb14a2a73b5f73d64,2025-01-16T21:15:22.560000 -CVE-2025-23818,0,0,ff9e95c30480383f43a4d2c349da06e03a6030b86339faf7a18f7bdef57f1530,2025-01-16T21:15:22.693000 -CVE-2025-23820,0,0,eae4bdd9f1977a8d56ce7268f1216c6b973654f75a89e4739b91f2480e3fc72f,2025-01-16T21:15:22.847000 -CVE-2025-23821,0,0,4af57699a46f42d309c250cba471faf95ed634029035bf8ab51f5f602650f466,2025-01-16T21:15:22.997000 -CVE-2025-23822,0,0,75180b7f70834d5dbd2bd73746e3390c3818be49f78718dbffb012659f73f449,2025-01-16T21:15:23.143000 -CVE-2025-23823,0,0,bccc31d9351f4ba41a5c9b261e6f756ab31c8b418b7881b290f5d055baa1e408,2025-01-16T21:15:23.297000 -CVE-2025-23824,0,0,c2818200884bd2cdfa0e45b8a0b7e30ade70629083cc0b6ab34418ebe9c862d1,2025-01-16T21:15:23.437000 -CVE-2025-23825,0,0,8b3e3bea5ef95b4d45245d893b1fca3110f32b530160c2e9b832531290aa5418,2025-01-16T21:15:23.577000 -CVE-2025-23826,0,0,4575b472d849a47de84faa778beb4ecdf0cc24e8023289586550aada81643f50,2025-01-16T21:15:23.720000 -CVE-2025-23827,0,0,a54065d6652043f8c2196133d0a938a7d71dbcd608c3bc9bbb2cba2e5663523f,2025-01-16T21:15:23.873000 -CVE-2025-23828,0,0,9598df6b3618a5b884d05c588f5e10787b80bfa281bf843b5094a7d351b77d66,2025-01-16T21:15:24.047000 -CVE-2025-23830,0,0,665c908ee02876be1a75f2fe6cdd311ca00a558fe5090729dc5c6a6aa152358f,2025-01-16T21:15:24.213000 -CVE-2025-23831,0,0,9748e2fd6de3a3c0523051dbb2242d424fa408cf542a187998f8ff55c08c0596,2025-01-16T21:15:24.360000 -CVE-2025-23832,0,0,006bd9f9b77903ff3865fee18e68dc883cd89775ed2902d9720c631f21ac728d,2025-01-16T21:15:24.510000 -CVE-2025-23833,0,0,8b732b32e0927aec7fb7a993a0cf53731dd5081c102c2cba22f58b80dc5e522d,2025-01-16T21:15:24.653000 -CVE-2025-23841,0,0,ae4d04ba5d499c24475bb0df84322bdf250e5dfcbc845e635e0d2eaeeeb0aca6,2025-01-16T21:15:24.793000 -CVE-2025-23842,0,0,8080e4c5742146aa32f5687592ba2cee234d3717d83d964471ebb424bd18f5c9,2025-01-16T21:15:24.940000 -CVE-2025-23844,0,0,38dd9457e7b72ebced68626eb9ec562c77029a18af3797e297e679ebfaf41540,2025-01-16T21:15:25.080000 -CVE-2025-23848,0,0,f39ebfcdcf77f8de01e9e24011122fac0dd90149ee2715657dbed7e5bcbb8aa6,2025-01-16T21:15:25.220000 -CVE-2025-23854,0,0,703e4e711ccb13bb2dcb57231a3fbbdacb45f3c2af61972d154b8ac30bfe30f4,2025-01-16T21:15:25.357000 -CVE-2025-23856,0,0,0c67d2551cadc06713c525afede73a945827f33ea2ac9a8f7929a952366ac48d,2025-01-16T21:15:25.507000 -CVE-2025-23859,0,0,2abba808316f256f5bea8bf0a53d5f262cb3eca7d05cebc79606f24377117ec4,2025-01-16T21:15:25.667000 -CVE-2025-23860,0,0,dd1aa960ab42d13f18e01c26bae3690f8839eae47a4a22d3bed90ee44f069135,2025-01-16T21:15:25.810000 -CVE-2025-23861,0,0,73833e7a6bfddbeda04b94e6ff057d3b36ca13364c8dccbc8984ef80e34cca79,2025-01-16T21:15:25.967000 -CVE-2025-23862,0,0,a6a02c421b5f3d49e899174d8330c61efd7b1f5c9fd831c2f14f5e9dac6201d2,2025-01-16T21:15:26.127000 -CVE-2025-23863,0,0,c5d4664b2a7b88b9faa532fce0af06e02379c15be99c595385c1c1010cf300bd,2025-01-16T21:15:26.290000 -CVE-2025-23864,0,0,02716b7968703b6a492a70f361484f980e612c4c2a524dc5a4cebb791edcd0c2,2025-01-16T21:15:26.430000 -CVE-2025-23865,0,0,a77fdac26a71a9f04003f65c543db194c7e9ce0a4662e9b977e2476f60ffa259,2025-01-16T21:15:26.583000 -CVE-2025-23868,0,0,69a01c7a011c24e1c7e402fd4b282c245a2166fe114556b563e6b6be48890e07,2025-01-16T21:15:26.730000 -CVE-2025-23869,0,0,6cbc2dfc07c24efce84e8a7d5fb18f1ab2a2e9c693c7278b8257b8d6ac6a0f34,2025-01-16T21:15:26.893000 -CVE-2025-23870,0,0,8c3c68aa036ac62e39a0c806bff701b1b6f167a18b3102e0a65cfc03c3267b70,2025-01-16T21:15:27.040000 -CVE-2025-23871,0,0,e07b1b4b8880ddadb4acb5a25a5c8fb84a0f670fccbd1ad3a3edb45d71b9f87b,2025-01-16T21:15:27.200000 -CVE-2025-23872,0,0,f3ab09a1370d361e3deddee871edbc1f7012d974c82ba55c21e9bf8095035cb4,2025-01-16T21:15:27.357000 -CVE-2025-23873,0,0,5abe3690568fafac4600261fda4ad27d6e4f7f40cbab64832d5a525e619b3335,2025-01-16T21:15:27.863000 -CVE-2025-23875,0,0,3048767a5c3ffc17cf9e43a0838ecdafc26d848e4f44c2387d16f99b9ee253c5,2025-01-16T21:15:28.323000 -CVE-2025-23876,0,0,dae1bd76114c47b5c9e7778b952f2651511e0e2343b1b9d4da809e3f6cb2b018,2025-01-16T21:15:28.763000 -CVE-2025-23877,0,0,3b858ae18282015a7cad71182ae3e6bbd46184eefc9eae0e8fee917088b08413,2025-01-16T21:15:28.963000 -CVE-2025-23878,0,0,7e8a8c12aac4293d34e12b29278e1f98d3f1be26dcd1eaff7dc40ec278c59725,2025-01-16T21:15:29.140000 -CVE-2025-23880,0,0,0d1391c5263d72cc6a95472f3dc1c0f281e650a26a7ddcecdbef8c049fa37a01,2025-01-16T21:15:29.310000 -CVE-2025-23884,0,0,0e28d9ce9eea19bf08f8fbdc9fa6361769cf23b8d8b178762f9e568984e30ae2,2025-01-16T21:15:29.730000 -CVE-2025-23886,0,0,756f1c0fb25feb92eb56985995291fb94bc8d33c1c46e479449039aa8fee2ca3,2025-01-16T21:15:29.927000 -CVE-2025-23887,0,0,3c0ae64b3a0b013361ca8a3f83b0310e11011023e7e02096ecadca0c8fe31c71,2025-01-16T21:15:30.087000 -CVE-2025-23890,0,0,448fdea19522ae506a8c8dc36b5820c327b631acf64a3ea5151943be64d1aab3,2025-01-16T21:15:30.253000 -CVE-2025-23891,0,0,3a3e30d0ce1a90cfb7526d133857fe100dddfa230ae58fab5c6bfad8b493fb43,2025-01-16T21:15:30.417000 -CVE-2025-23892,0,0,c8e1e5d17c089a2e7c461f13ed03012cbd407382b606e57d81f8c1556eb8ebcd,2025-01-16T21:15:30.580000 -CVE-2025-23893,0,0,ec9eb7891f0577dd059c75846dfee80b01c12fd1456bfe571aef645b8ab26e3e,2025-01-16T21:15:30.797000 -CVE-2025-23895,0,0,86169daa07533c9b7298f7e0dd553a859f07b3cba7a289c910007f91d28f10a6,2025-01-16T21:15:30.967000 -CVE-2025-23896,0,0,1ac8f39231c8648fc26ba293762480dfdfc864719bacb27b9839907969136ea7,2025-01-16T21:15:31.137000 -CVE-2025-23897,0,0,d7c72d4bcdacfb681fb83f21c2089b57cf91700edf16033b0a23c3f30c8e25f6,2025-01-16T21:15:31.310000 -CVE-2025-23898,0,0,94a05d6120debc34eb73c1996731ae4205eff74ed1458d0a2afa65014aafa16e,2025-01-16T21:15:31.497000 -CVE-2025-23899,0,0,621fd72c1b19e694feda9d1804605beaee758d60805d50b46436033f153b0f6a,2025-01-16T21:15:31.680000 -CVE-2025-23900,0,0,bbc5dc6cb4e2aeae613dcb4b9ba9a640335cc24bc19da987bdc9cf283f8b2022,2025-01-16T21:15:31.857000 -CVE-2025-23901,0,0,1aa0018e9b602b18582c4f08be680021b7ebf9361ea1e27b0493d8775c5630fa,2025-01-16T21:15:32.027000 -CVE-2025-23902,0,0,cc1f3759ff047b83a218eeb8e0fa8689086cdaab9ecc989357bfd5d9b3613738,2025-01-16T21:15:32.173000 -CVE-2025-23907,0,0,8b673919d8a26e0b8542b569a15defe07b1070d11c9d3a142bdc8110b3dbb9b8,2025-01-16T21:15:32.333000 -CVE-2025-23908,0,0,f4aea4886455b943a82398d27cf81971f6543a1b7315547cffb337ed2d5bbb9b,2025-01-16T21:15:32.480000 -CVE-2025-23909,0,0,4655191ba54a46e8ad44ceb415671c215e00df1c27858eb26e364b2e8a99539a,2025-01-16T21:15:32.637000 -CVE-2025-23911,0,0,bb6a04f1d52acd419ec1557cf2304b294389b555115cda34437a52f9ae54aebb,2025-01-16T21:15:32.780000 -CVE-2025-23912,0,0,afa3e70d878650818b542bbe9acf1e512fbc472df127ee87348473b1c11088d1,2025-01-16T21:15:32.930000 -CVE-2025-23913,0,0,4aceae34a47d8f242b20a963f931d6f2eb00520dc3fb112b7f942f8920946a77,2025-01-16T21:15:33.100000 -CVE-2025-23915,0,0,2c18f2e7d11b615404e0cb30ed66a3ff3685742f2e5d784797356ccf0aa6c1d1,2025-01-16T21:15:33.253000 -CVE-2025-23916,0,0,1bee6857ea5d97d893dec6bc60e85cff1341e2e8634123c8ef4c2b8269a99645,2025-01-16T21:15:33.433000 -CVE-2025-23917,0,0,f1cc65239c1da181840377dcb6096a93bb060a03c2fee757264cb475b8846f74,2025-01-16T21:15:33.580000 -CVE-2025-23919,0,0,beb94c35f08d079ace783be407e2870279d774d184d6f4305b1bd27035e0e73c,2025-01-16T21:15:33.743000 -CVE-2025-23922,0,0,e4ad85b25a3e3224fb13da111f313df61389446683ff70f336001db2ad827dc7,2025-01-16T21:15:33.890000 -CVE-2025-23924,0,0,143dce9934c28c37f8ce08ab3a9deefcc4fde3de1405d891dd80f2ff22d93764,2025-01-16T21:15:34.040000 -CVE-2025-23925,0,0,28a480726472e0a89dcd9a148fc9c8f8273a30fd41c8133459dd95258a70266d,2025-01-16T21:15:34.187000 -CVE-2025-23926,0,0,2d558e9cd95b5d69f878adf175a7947d703442c9af21442a6ef0023bb5cae7e2,2025-01-16T21:15:34.343000 -CVE-2025-23927,0,0,070c3b9a911ccd537565d01568ef4b281baeb4111cda72fdf3d5a0f539a9a525,2025-01-16T21:15:34.507000 -CVE-2025-23928,0,0,e395e083a5ba91587df400f7ea188403350a776ba86502a05dc20177f9ecd2e7,2025-01-16T21:15:34.663000 -CVE-2025-23929,0,0,ffd01b1c946391aa54b0abb1b90c88c445c67a6d228aae3d943587fc4f5a3fef,2025-01-16T21:15:34.817000 -CVE-2025-23930,0,0,d89ffff0b6d6070e04276c1c0bc31dd5554e4b3fe92b8442342fc8c8bd4f5223,2025-01-16T21:15:34.987000 -CVE-2025-23933,0,0,821aacd7ad1496d3307b386fd18985e62b9efa5a5a96658ecd1d549fe62e6ee8,2025-01-16T21:15:35.210000 -CVE-2025-23934,0,0,d6702db603480a8803b508215d4e82bbdf4ff19905b833c96cea00f0bb36024c,2025-01-16T21:15:35.367000 -CVE-2025-23935,0,0,4c0afc24b40eb6112cf2f59bcdcf33775c037e89b8981e94ef47d199c75ab422,2025-01-16T21:15:35.513000 -CVE-2025-23936,0,0,e01488dde29a5987293f8b5d21af996d795a6f11836952868ec57824e67b04ec,2025-01-16T21:15:35.677000 -CVE-2025-23939,0,0,bd08c7ba8f9b7d189aa31afdf472c64ffe2693797d6409cf7f15f103cda29733,2025-01-16T21:15:35.910000 -CVE-2025-23940,0,0,d2c2c3a305e45e253abf2dceb6bb9f6fc5c4d95ac43304d139a2372017b6be19,2025-01-16T21:15:36.087000 -CVE-2025-23941,0,0,028bec5cdcf64a1555069a5b48df8bc0781e3d1e2b446bddbee4dc7eccb5a6a6,2025-01-16T21:15:36.230000 -CVE-2025-23943,0,0,9f28093bdffd448a4241466b2409cb7549653c48d966f6ef1c9cd9e4c9b45315,2025-01-16T21:15:36.373000 -CVE-2025-23946,0,0,4da9c3f31f618bb79bf59e75bb386fb13b911cdc1ad529753eab0c0c8611ef09,2025-01-16T21:15:36.520000 -CVE-2025-23947,0,0,7085a2a8bf1b5c11a04c5f151eaee2dcc052453c98ecb3dd3b082b449993708f,2025-01-16T21:15:36.670000 -CVE-2025-23950,0,0,f2678fd8671771ab95af7a2657f0ec84fbef0aeeb81d5b8114b27ac5a92aaa52,2025-01-16T21:15:36.817000 -CVE-2025-23951,0,0,c28c53797386464fa4d424e47c76dbe6cf131dc6e286da31876265caa6d7bcfa,2025-01-16T21:15:36.983000 -CVE-2025-23954,0,0,70013f89afcea329b66d286f455d312b86f3111879c59873216edd96b773f472,2025-01-16T21:15:37.133000 -CVE-2025-23955,0,0,21f3f6caf404fbb6128bb5cef6f4717f7d69063e002703d20504affebea95470,2025-01-16T21:15:37.277000 -CVE-2025-23957,0,0,def9a590bbfbe1bdd199031d5b537107c910a13627eed8754a67689fb3ea3c53,2025-01-16T21:15:37.420000 -CVE-2025-23961,0,0,73f26e31fb45011521266035c4f348c32d86db6155ef28dc802330a3fcc16246,2025-01-16T21:15:37.573000 -CVE-2025-23962,0,0,c447d999f315d7d0b8caaccf8cdec98cdde48c24698a82d8b4ec4f151ac3d4b9,2025-01-16T21:15:37.730000 -CVE-2025-23963,0,0,3a3972a4a48c01010fa7de0241e29dd5257dbb24eccd147fdfb40fdf09c008fb,2025-01-16T21:15:37.873000 -CVE-2025-23965,0,0,f3db305f2adceba72de99bd907760f1044181da02bde4dfc6a7032302399f1dc,2025-01-16T21:15:38.023000 +CVE-2025-23366,0,1,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 +CVE-2025-23423,0,1,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 +CVE-2025-23424,0,1,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 +CVE-2025-23426,0,1,2229e7d1ff76d0c5e969c3251982ab349229fc474aaf0fa42cebd6f9eb1f7a85,2025-01-16T20:15:33.877000 +CVE-2025-23429,0,1,2e8256da44ff61177c4f2a5d237cc05baadd69659454e348a75499c81473e2a7,2025-01-16T20:15:34.057000 +CVE-2025-23430,0,1,d6a6f32e23dfcc5842a2f98f2cef617f4db5d83551088778a76b915d16293a79,2025-01-16T20:15:34.287000 +CVE-2025-23432,0,1,e754a47d3de4a683f85700167b4d6315e5e70c68f0936fe6c95c5e783cb9730f,2025-01-16T20:15:34.467000 +CVE-2025-23434,0,1,f44f7ad85e29b672c8bca7ccf3a8ff077acd5c80e8883e15c08b84c2d2d93953,2025-01-16T20:15:34.607000 +CVE-2025-23435,0,1,6945949396459e98e52f3a5c95f90747ab0b3d87702a11bee1fbbbd38b17e9e7,2025-01-16T20:15:34.770000 +CVE-2025-23436,0,1,08242c4461d18884c3a6e4bd2512fa98787dc7ff698cde97d27e848859dd0948,2025-01-16T20:15:34.920000 +CVE-2025-23438,0,1,d5b99d41ae258b81c318d76badc751e3c16a7fbfb5848a85ee9570d47579e418,2025-01-16T20:15:35.067000 +CVE-2025-23442,0,1,ff778f6541faf895ad64165d80b689e528bc89a7807a8adddefabde77d4edffa,2025-01-16T20:15:35.210000 +CVE-2025-23444,0,1,bd139aa5f0d5452b293e56da4268a8dc616b5f5ec3a0335035b071fc8609deb1,2025-01-16T20:15:35.360000 +CVE-2025-23445,0,1,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec309f9,2025-01-16T20:15:35.513000 +CVE-2025-23452,0,1,9ae20555b511c9e710c7a052682906033b9071856145809833c544b191d171ae,2025-01-16T20:15:35.730000 +CVE-2025-23453,0,1,559af2b40776602b954faf6eb051d0ee733c24375fc61f4efde0fb69b854694c,2025-01-16T20:15:35.883000 +CVE-2025-23455,0,1,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000 +CVE-2025-23456,0,1,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000 +CVE-2025-23463,0,1,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 +CVE-2025-23467,0,1,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000 +CVE-2025-23470,0,1,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000 +CVE-2025-23471,0,1,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000 +CVE-2025-23476,0,1,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934c03,2025-01-16T20:15:36.990000 +CVE-2025-23483,0,1,4bc6ad2f14d9de9a0797c4da2efee9475ed740963c9329c34f76f07dc090372d,2025-01-16T20:15:37.133000 +CVE-2025-23497,0,1,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000 +CVE-2025-23499,0,1,18de021795ada6e9003ac109fee0e567e9be54c39a2e050c169b423a62e8fca7,2025-01-16T20:15:37.440000 +CVE-2025-23501,0,1,2ca3004ea38a2bebeea912643e9114dc05292b671294dc56e8b3bf1f4edc5f4c,2025-01-16T20:15:37.593000 +CVE-2025-23508,0,1,790c1f1efcbcf318bf4001598b0da1f3fe803cd0e7ef29b63714b6cf9d49876c,2025-01-16T20:15:37.737000 +CVE-2025-23510,0,1,0551a63cb17b341b73a80a568037ce1923b810839cf988e2aae99d670ecbccb1,2025-01-16T20:15:37.890000 +CVE-2025-23511,0,1,996d3c261b7453d558ae9e3bf08bfd98e9228b013a71ca7506bf459ee4c525d6,2025-01-16T20:15:38.040000 +CVE-2025-23513,0,1,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4f06,2025-01-16T20:15:38.193000 +CVE-2025-23514,0,1,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 +CVE-2025-23528,0,1,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 +CVE-2025-23530,0,1,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000 +CVE-2025-23532,0,1,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000 +CVE-2025-23533,0,1,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 +CVE-2025-23537,0,1,79e57ef42623bfacf08bcf48f182a917b206d07a7014897deba86aa5721ba1be,2025-01-16T20:15:39.070000 +CVE-2025-23547,0,1,6f6ff07f3f424280073fce42bfdec78cd39e7aff8dc91e913640e544d32ed50a,2025-01-16T20:15:39.220000 +CVE-2025-23557,0,1,4948e4f74dc87131949549d056234a4050a760fc1ac3fba66738bd84c832aa2e,2025-01-16T20:15:39.363000 +CVE-2025-23558,0,1,4291468aaa8c22c74e0bbb0da124051b4e99d0d01c1849f5de31eebeb38c94a6,2025-01-16T20:15:39.503000 +CVE-2025-23559,0,1,f107280d0e32fb23f5905ab5f11f98c3b724795adfc26ea0537d5d8ff93e33a0,2025-01-16T20:15:39.650000 +CVE-2025-23560,0,1,19b166e58f91145a20070e52b1a91deda6a79a11328a651eb2f155e7b5e396b0,2025-01-16T20:15:39.797000 +CVE-2025-23566,0,1,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf8fd,2025-01-16T20:15:39.947000 +CVE-2025-23567,0,1,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000 +CVE-2025-23569,0,1,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 +CVE-2025-23572,0,1,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 +CVE-2025-23573,0,1,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 +CVE-2025-23577,0,1,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000 +CVE-2025-23617,0,1,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb142408e,2025-01-16T20:15:41.027000 +CVE-2025-23618,0,1,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000 +CVE-2025-23620,0,1,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000 +CVE-2025-23623,0,1,3a19bc13049e6280f5b56d5b01402a56d91485d47ecc589213c73480465da52e,2025-01-16T20:15:41.480000 +CVE-2025-23627,0,1,a0e2c69c295a72f80218793a17c28928376cacd73ebedddc83b23cca208996f3,2025-01-16T20:15:41.617000 +CVE-2025-23639,0,1,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000 +CVE-2025-23640,0,1,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000 +CVE-2025-23641,0,1,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000 +CVE-2025-23642,0,1,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa37662e,2025-01-16T20:15:42.190000 +CVE-2025-23644,0,1,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 +CVE-2025-23649,0,1,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 +CVE-2025-23654,0,1,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 +CVE-2025-23659,0,1,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000 +CVE-2025-23660,0,1,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000 +CVE-2025-23661,0,1,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000 +CVE-2025-23662,0,1,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000 +CVE-2025-23664,0,1,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 +CVE-2025-23665,0,1,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 +CVE-2025-23673,0,1,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000 +CVE-2025-23675,0,1,458c1564a7ab6b017d8c9eba76dd37a8a1853b4061aa5abc64dc3ca26db82593,2025-01-16T20:15:43.753000 +CVE-2025-23677,0,1,4f1d78d3726e731bfdb135ac6135bd5100b5ae0cb26c60d465015a36da99e6d2,2025-01-16T20:15:43.900000 +CVE-2025-23689,0,1,3a077a022662cdd0d4798ac2d9b9685961bbdf05d3a8d2e748b53124c3ed929b,2025-01-16T20:15:44.040000 +CVE-2025-23690,0,1,b9e8b4ce7cf418df7c2c552d6aa61f7715b27609fc2dbb370252e45d7528a647,2025-01-16T20:15:44.197000 +CVE-2025-23691,0,1,8bccb2407b1830314e082c5ccc8a74914d5f3fb937895330615769bfb1ba0062,2025-01-16T20:15:44.353000 +CVE-2025-23692,0,1,2e17dc09b58fdef7a64a307b9ebb3a4288c1a3ecd370c86b93c09184b7a088a4,2025-01-16T20:15:44.503000 +CVE-2025-23693,0,1,35d2dbe83503ee70f28839300571a6bba777b599f92d984a8e0b4e211b5751b4,2025-01-16T20:15:44.637000 +CVE-2025-23694,0,1,47fbe05d2104a10812a77806de68baefc74a15965356e2e1bafbd830b42b3650,2025-01-16T20:15:44.780000 +CVE-2025-23698,0,1,b0aad547409e3d2f2bb0d70a09a8547f4cac544665b4cf85000d48948b843e58,2025-01-16T20:15:44.910000 +CVE-2025-23699,0,1,21e2b4434b6bbb2f1d160ef769c9fc35e826158249f91b861f8551b4bb2b9f2f,2025-01-16T20:15:45.060000 +CVE-2025-23702,0,1,c6087cb20ed5d5e18a0f143ed78da44b9304f988bd02c1f96e1ffd07550520eb,2025-01-16T20:15:45.213000 +CVE-2025-23703,0,1,80d20080ae636ff64d3abc90ff0d9b20e73943a9d0425a8d457e36c9952ac466,2025-01-16T20:15:45.350000 +CVE-2025-23708,0,1,eca4a26e61bfe7d5a4e9902977260b188ae344ef1b45725f171e324e5412b97a,2025-01-16T20:15:45.493000 +CVE-2025-23710,0,1,45dbc592fe3473641cdbf2e1a14db4016a63a47b44096e0e2c864d61e4448449,2025-01-16T20:15:45.643000 +CVE-2025-23712,0,1,94aa96484213156f9d49bbdc6963c4fd02ab0d8cdee27a020eca5b412a516f8b,2025-01-16T20:15:45.800000 +CVE-2025-23713,0,1,e91ea4a4691cd6ea54cef5c014a380cbfb6e447d22416c2178d1e94d8d5e41a9,2025-01-16T20:15:45.940000 +CVE-2025-23715,0,1,0640be33a6d521fa9ce6237978250a0e811e0054ca0a5799459a317b8874e4f3,2025-01-16T20:15:46.083000 +CVE-2025-23717,0,1,79ec33c46c47146faede274dbb2e9b9df8747f6c2068f93e33c80d094e53ab2c,2025-01-16T20:15:46.247000 +CVE-2025-23720,0,1,4f4258f5d82ee9a1c0adeb945db0c0e48cfc2254164386bb711744a2792e3be7,2025-01-16T20:15:46.397000 +CVE-2025-23743,0,1,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827cf0,2025-01-16T20:15:46.550000 +CVE-2025-23745,0,1,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 +CVE-2025-23749,0,1,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000 +CVE-2025-23760,0,1,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000 +CVE-2025-23761,0,1,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 +CVE-2025-23764,0,1,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000 +CVE-2025-23765,0,1,2796d242b4e694c96282a5c8ffeecba3b80388403b475a6ae706c6a35a37e943,2025-01-16T21:15:18.700000 +CVE-2025-23767,0,1,76b955d01b413ad0d12074ad466dc5f46f00daa50de12aab124eaa31dd6c7055,2025-01-16T20:15:46.967000 +CVE-2025-23772,0,1,982ec2219b56005812368f626d4b56d161e9940f6a430166e5a95ac8a677bf4d,2025-01-16T21:15:18.860000 +CVE-2025-23775,0,1,881e3af0467c920e3a0da1ed882de028f641d7f31ac26735099153067f58bff2,2025-01-16T21:15:19.007000 +CVE-2025-23776,0,1,37de3b2b14e271fcfbb20da8692ccd78a75aacda39d2827a4094c19b2c20520c,2025-01-16T21:15:19.160000 +CVE-2025-23777,0,1,4a326f48ab7f72fda28a2029d2e8fcff1eb6ecc0b79f9b4a29e6b77da3703898,2025-01-16T21:15:19.323000 +CVE-2025-23778,0,1,ec507f7d7972e2e40560045a380302593c7d0acc005e784a6facac59ad9068bf,2025-01-16T21:15:19.483000 +CVE-2025-23779,0,1,529f2e7055a40628327b34353ab55d9e33e7bfdf9dee62cd6c791680554374f9,2025-01-16T21:15:19.640000 +CVE-2025-23780,0,1,8e8a5a259b47149e41183320f4a6badd26f64cf46f39776b5541a103424e4292,2025-01-16T21:15:19.800000 +CVE-2025-23783,0,1,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cdf1c,2025-01-16T20:15:47.100000 +CVE-2025-23785,0,1,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000 +CVE-2025-23791,0,1,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000 +CVE-2025-23793,0,1,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000 +CVE-2025-23794,0,1,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282b72,2025-01-16T21:15:20.397000 +CVE-2025-23795,0,1,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000 +CVE-2025-23796,0,1,0a3fabd756343760fb9fd7ea1faf1fd87c92ac1431e709162d1ddbc10e973b0c,2025-01-16T21:15:20.727000 +CVE-2025-23797,0,1,082b5b5ea2fb63d11c655fbf0b483df0d8fb7cfd44eb169c32045a13b0f3b570,2025-01-16T21:15:20.877000 +CVE-2025-23800,0,1,878d719ae1f903e32e2d6add2209886c141de252f651652314e69251a4a34fb9,2025-01-16T21:15:21.040000 +CVE-2025-23801,0,1,f35c3b1c7ca35d2725621e19aa2aa2edc970115b0f68db658f0c8dc9dcb2d2ec,2025-01-16T21:15:21.190000 +CVE-2025-23802,0,1,c4f195bb87a3033611183b9369b140030963b1f0853d1ac42f2e5edb0b688d0d,2025-01-16T21:15:21.350000 +CVE-2025-23804,0,1,f01e041339f930aed71b2815914fa94f4834913754ef387be79590cf4f99c081,2025-01-16T21:15:21.497000 +CVE-2025-23805,0,1,3a5cec6a0d5f7ce2298f7397b6ff24f9044aef89b62bccf77a5ee52165d1206a,2025-01-16T21:15:21.643000 +CVE-2025-23807,0,1,c8793edd44edeaeef736793be45847bc259f064ecf1054a483762c7668919c71,2025-01-16T21:15:21.800000 +CVE-2025-23808,0,1,bc9ac4b7d3fac9a3e82e2e48ff9c8301d6a5068db6fc11c17fa56f429c0d18b5,2025-01-16T21:15:21.957000 +CVE-2025-23810,0,1,3d886969fb81b13e95f7725e8aa5117b9c91c9b06310f0521237e64ca9eef400,2025-01-16T21:15:22.107000 +CVE-2025-23815,0,1,4a53eeb2a80c868296a8df4afc48475dd10d854a2810a22ebcb90f3a1fb7faf3,2025-01-16T21:15:22.257000 +CVE-2025-23816,0,1,99e7a2982284cfe1c4b342546ab2ac7819e99932258e5aada2c1a28f9b0c569b,2025-01-16T21:15:22.407000 +CVE-2025-23817,0,1,64c5a2eba1c8283bdb068da6e45257681009c02912f79237808c3a614cc30aa9,2025-01-16T21:15:22.560000 +CVE-2025-23818,0,1,74773d3155d8075e91447c90276c07a950f673cde3ae565f4ad7ab13f70d65cd,2025-01-16T21:15:22.693000 +CVE-2025-23820,0,1,13e803342af77943212968f5d91f0564dab8d8c497735895117111ee94a876b9,2025-01-16T21:15:22.847000 +CVE-2025-23821,0,1,e706bdd1d30ae9432cea30d451fa9863d9a0eeb73467a53ec0906ddcd878d85b,2025-01-16T21:15:22.997000 +CVE-2025-23822,0,1,2510d8d95e7b13b2165f625cbf5a81f81068c2a5d3401eafab3e85bbadb8578f,2025-01-16T21:15:23.143000 +CVE-2025-23823,0,1,910904c1831795485e46b756ffb3694a55d1df59ae71e5ff39a3a6bbdfbbb733,2025-01-16T21:15:23.297000 +CVE-2025-23824,0,1,bc58295bde73fc7d981a7be61850cb53deac5571013f4d53edefa71553d77c54,2025-01-16T21:15:23.437000 +CVE-2025-23825,0,1,071b5ab2f842a4dac9b41a43284e1d60e4dd4711f28bd3ba85186d4acb27b48a,2025-01-16T21:15:23.577000 +CVE-2025-23826,0,1,31cc4f889fe54c4f547abb60cc2ead671f3ef1f0e15ebb2f69c4ac4c9eb9f183,2025-01-16T21:15:23.720000 +CVE-2025-23827,0,1,2ba64e27ab682dd5ec54367bbedbdcbbff79cebacb1bc86ea6bb734008f4861b,2025-01-16T21:15:23.873000 +CVE-2025-23828,0,1,5cbd4d2f58506793d3df94a0bc780e8d14ab5e4da9eff853b88189304863a098,2025-01-16T21:15:24.047000 +CVE-2025-23830,0,1,b29c1dbb724e30118134483053c6856e5726b7a86f2f6d719fdcfca154e0a8a7,2025-01-16T21:15:24.213000 +CVE-2025-23831,0,1,5197c9bfacc7e149482a79695ac12aead57f227753093688448b8bbc9868aa27,2025-01-16T21:15:24.360000 +CVE-2025-23832,0,1,2679ff496b3a637ccd709dc676c5ecac70472f75fa8b558e60904410452695ff,2025-01-16T21:15:24.510000 +CVE-2025-23833,0,1,4c637caa193ae54ea0fefd3799a58624823ed2bc221582b8c4c01c5796d4268d,2025-01-16T21:15:24.653000 +CVE-2025-23841,0,1,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000 +CVE-2025-23842,0,1,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000 +CVE-2025-23844,0,1,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 +CVE-2025-23848,0,1,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 +CVE-2025-23854,0,1,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 +CVE-2025-23856,0,1,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 +CVE-2025-23859,0,1,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000 +CVE-2025-23860,0,1,68c2fb44fb8ada24220e6a3afa3fc47dfedf0ddacb9f55359fb799e87e5c89d1,2025-01-16T21:15:25.810000 +CVE-2025-23861,0,1,f02923f8288238a7c8d2644033afd089fdda6178201a2de961581fdcbb2bc812,2025-01-16T21:15:25.967000 +CVE-2025-23862,0,1,43e455fddf90f3c34447a467c3335ac8042fb5f9707f4b791661628b9dceca7a,2025-01-16T21:15:26.127000 +CVE-2025-23863,0,1,d95616b48be55928594c24e61ae94fcfcf2463e7aaa3a762196667a8aa388657,2025-01-16T21:15:26.290000 +CVE-2025-23864,0,1,1556074f6c47d6d73c0cc3aa4d602a6ab24890828b110133a498f4cdba0dea65,2025-01-16T21:15:26.430000 +CVE-2025-23865,0,1,0f3c21c1c89d126d4283426d805a410361dee62541d9cde4b5cadf45f81c85ed,2025-01-16T21:15:26.583000 +CVE-2025-23868,0,1,f054cc8161a63226e2f01ef4b9a1ba0ad43bff6340146631c56121e88c3bba58,2025-01-16T21:15:26.730000 +CVE-2025-23869,0,1,4ff4bed04cf3b4deb5ef6b86c7b6e6145ded54a8b4752207bd266af492da5b3e,2025-01-16T21:15:26.893000 +CVE-2025-23870,0,1,aa54609d2783feb35973271834ffff0b27116b97fe710c44aedeaea0cd9f042a,2025-01-16T21:15:27.040000 +CVE-2025-23871,0,1,d9dbe04e8340ac78b18cddcea5b8bfc0e9baf12244cfae716035b32809abf62b,2025-01-16T21:15:27.200000 +CVE-2025-23872,0,1,ad5d143e05278154fbef8060b107468b95d0105b74d84c1bd9fc37a9fe01c905,2025-01-16T21:15:27.357000 +CVE-2025-23873,0,1,21fcc6c8e584e8c276265223255a97771a21324b69d85135cc089e2cd5c60517,2025-01-16T21:15:27.863000 +CVE-2025-23875,0,1,16f54e792dc7d4a56ea38d4496bd3b79642a5531dd27f8c7625708b8f89725af,2025-01-16T21:15:28.323000 +CVE-2025-23876,0,1,f11fbcf0ce95bac97cefd73d61ac714e53732fcd35e4b468f025890b159066c2,2025-01-16T21:15:28.763000 +CVE-2025-23877,0,1,67025350455285a68998b55a0ec477bcc912252817d20c216ea4c1dcc27f2fb9,2025-01-16T21:15:28.963000 +CVE-2025-23878,0,1,807177fe8c69371ec7b74f4303cca26584dc822ecc32e3bde8ff81af05f082df,2025-01-16T21:15:29.140000 +CVE-2025-23880,0,1,71a75ff3204104210dc427f5d046fe7419ca87cd3fedcae98d2508e2784497e7,2025-01-16T21:15:29.310000 +CVE-2025-23884,0,1,2def982b7cbe8992747b18233289c0f945bb92c66265a1e1ac9f76f2473c47c3,2025-01-16T21:15:29.730000 +CVE-2025-23886,0,1,5adc366069b87d101e00a6524456b5154407eae636225dee1ada8aae236060c3,2025-01-16T21:15:29.927000 +CVE-2025-23887,0,1,a17bdf8e65f60d3c4a1321c98888258c25a1548bb756f03e22626cb0bf3ab535,2025-01-16T21:15:30.087000 +CVE-2025-23890,0,1,06096d84655a8da17a5b965f3272a549498ff12dc69e0803b4b53bf2d3e511fd,2025-01-16T21:15:30.253000 +CVE-2025-23891,0,1,067509fca70a94da8bfba15188aa14a59b65e478f2187e1845f8151c6444963f,2025-01-16T21:15:30.417000 +CVE-2025-23892,0,1,2815c48f9855c15c2bcac6a572f7de134068a4319b8bd6e8a763867a75cbfad5,2025-01-16T21:15:30.580000 +CVE-2025-23893,0,1,a4a9f6251fc57ea25ea019d27ce11802eb6e7a61659770654bba0552cdead6b7,2025-01-16T21:15:30.797000 +CVE-2025-23895,0,1,0f6552a4efe4730b5fca6c1776d00ca6c96003dac49556dc3bb1c6b196286682,2025-01-16T21:15:30.967000 +CVE-2025-23896,0,1,69eaaa34a46e8604218c9d61f1ccb999822d545454f0b80f6a3f239fa3cba4e3,2025-01-16T21:15:31.137000 +CVE-2025-23897,0,1,b2f6344d86a531aa7a0520ca26d3ad0846e4161c55365af159a9362ee03debee,2025-01-16T21:15:31.310000 +CVE-2025-23898,0,1,162a8fa96d4ddcbc3397f2f2c42321f0d3ed549c467508db248d37a09a8f074d,2025-01-16T21:15:31.497000 +CVE-2025-23899,0,1,598182d1621caa24bf3c481ede2ce2b83897d5764a80f40ca9f00a668f077b93,2025-01-16T21:15:31.680000 +CVE-2025-23900,0,1,68aba21ddce77b08fbaa0dad71c040e65c232f030b0b325ddea5744be386b9b2,2025-01-16T21:15:31.857000 +CVE-2025-23901,0,1,bf3c3b7205ed6fc1b684ded669be915dd1c9b905481743bdf15fb28a8c514c0e,2025-01-16T21:15:32.027000 +CVE-2025-23902,0,1,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb7023083e,2025-01-16T21:15:32.173000 +CVE-2025-23907,0,1,62f2d830555983225c93d67a33766339f0b5f5b8104b470ef809680dd862709a,2025-01-16T21:15:32.333000 +CVE-2025-23908,0,1,4b396a8852131d43d79fe1137cb49df2e0d52a86fdb32e54e4afe34ce1d8d3d5,2025-01-16T21:15:32.480000 +CVE-2025-23909,0,1,076770cf61637e2194048d503e6efbb5af30e3d945de88d9df8b24a008808b14,2025-01-16T21:15:32.637000 +CVE-2025-23911,0,1,c84f3c03cbebcde516d9e7d2eb31121dc76cbe9eae3d6a160197ca5c801b3a0a,2025-01-16T21:15:32.780000 +CVE-2025-23912,0,1,71f7ed0446b35740cd65fa0532ba539441677e227c9d6f0291e2824b2aeca7a5,2025-01-16T21:15:32.930000 +CVE-2025-23913,0,1,1c0db589efde0430efbdd4fb08728bf77f22a5c19824f1868ffb6f7669d99839,2025-01-16T21:15:33.100000 +CVE-2025-23915,0,1,fa24c11495785c31783d19f6d79202d5ec4bca34e91b58aa8e740d106f4a1d45,2025-01-16T21:15:33.253000 +CVE-2025-23916,0,1,df230f94ac1ab867fbfdcf489fe576668e9fd039e54487be35c133ed2b81a0af,2025-01-16T21:15:33.433000 +CVE-2025-23917,0,1,7adbd4e05f39d3ad757642f9dc07ad1eff7d27e478b9d8ca9b60045924a3a9d1,2025-01-16T21:15:33.580000 +CVE-2025-23919,0,1,530a6f7b84536027ccf362bf86724781949239704cbb67f8ff6c932f12c95e60,2025-01-16T21:15:33.743000 +CVE-2025-23922,0,1,bb97fee5262b013c016123296c4a3d7cf40c3875e8a2ea8b79c5b398ca7c549f,2025-01-16T21:15:33.890000 +CVE-2025-23924,0,1,d12978221d16424d8c65d853599bf7bdb6e6b9e944d35a5a447045d9d423687a,2025-01-16T21:15:34.040000 +CVE-2025-23925,0,1,147c33496e609cb0b342453122e8ad0181b83b87a4b33c441f136e208bcf4a46,2025-01-16T21:15:34.187000 +CVE-2025-23926,0,1,3f860fb67d7dad3938306eea5a6699fafd6068686a18b0a289deb3c2af9a86e4,2025-01-16T21:15:34.343000 +CVE-2025-23927,0,1,8d9bc571b10adf5f0a5277b4afea3bff2ef4c187801274cc14acbeffd320cbbf,2025-01-16T21:15:34.507000 +CVE-2025-23928,0,1,dda7521d0ca3a1016d24ef4001c08678b9721ea4cf47bd8a5c455160651349dd,2025-01-16T21:15:34.663000 +CVE-2025-23929,0,1,7a78b750dcc7312313e19411143a886e72bc0ae48e8c8ee26d293e169e386b25,2025-01-16T21:15:34.817000 +CVE-2025-23930,0,1,6ba6d73f7443c4991c12a7db93d08a3afb46e790500ca2b79d23bef6b9715d9d,2025-01-16T21:15:34.987000 +CVE-2025-23933,0,1,5314812bb5bb73b3b9600ea0aa8e888771464c5c0299b578bc9a093b69f0f8ef,2025-01-16T21:15:35.210000 +CVE-2025-23934,0,1,a8cb5365e4d11290f220de8207cb9b17a94fa7b952841219eee098e5e9d7f9bb,2025-01-16T21:15:35.367000 +CVE-2025-23935,0,1,9d94e38cc5252425c16e22bbae5e8fd55332ed37693e2532154d3f3758f684a5,2025-01-16T21:15:35.513000 +CVE-2025-23936,0,1,98ce9dfbd803e0feff46465ce5ff38cf3522df4082c1a68d72eabd4f11de5228,2025-01-16T21:15:35.677000 +CVE-2025-23939,0,1,b227fdb5ca72e62491a5d98a4ab01cce82bbd9f83860732763526745b1f362c4,2025-01-16T21:15:35.910000 +CVE-2025-23940,0,1,9e516bed5aa526650bb86798b45bda26374c4c5498fa69a2ccaa76e3d1fb0ffa,2025-01-16T21:15:36.087000 +CVE-2025-23941,0,1,1c0020dfccb64dc56163de9642fbb38130446635c08bc70e04e868e60ee25c62,2025-01-16T21:15:36.230000 +CVE-2025-23943,0,1,b11e5fd30a25f84e994f31d10cb8bcc269623009eb1bca3cbe37db51ed9b30fe,2025-01-16T21:15:36.373000 +CVE-2025-23946,0,1,9de3ccf4350f51c6d8e67eab9fdaace2b0128c36302335bbd7ddc29cf4115806,2025-01-16T21:15:36.520000 +CVE-2025-23947,0,1,b918dd9018ba545f112604d29f16795478738d9868aa76eb24c352a7a4e3c4ec,2025-01-16T21:15:36.670000 +CVE-2025-23950,0,1,4ac29c4dd1a428d4afa0ee44a692bfd3a045bfda7b0c1933c7ec004bbdec77a8,2025-01-16T21:15:36.817000 +CVE-2025-23951,0,1,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb84b,2025-01-16T21:15:36.983000 +CVE-2025-23954,0,1,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144287,2025-01-16T21:15:37.133000 +CVE-2025-23955,0,1,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000 +CVE-2025-23957,0,1,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000 +CVE-2025-23961,0,1,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000 +CVE-2025-23962,0,1,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000 +CVE-2025-23963,0,1,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 +CVE-2025-23965,0,1,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000