diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31234.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31234.json index 35e59c1cefc..3fe39dd5749 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31234.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31234.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Tilda Publishing.This issue affects Tilda Publishing: from n/a through 0.3.23.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Tilda Publishing. Este problema afecta a Tilda Publishing: desde n/a hasta 0.3.23." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38906.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38906.json index 208035abf15..a8589e7ec53 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38906.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38906.json @@ -2,12 +2,12 @@ "id": "CVE-2023-38906", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T00:15:07.920", - "lastModified": "2024-01-19T20:15:11.007", + "lastModified": "2024-05-07T15:15:08.110", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message." + "value": "An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9, Smart Camera Tapo series C200 1.1.18, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message." }, { "lang": "es", @@ -92,6 +92,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/", + "source": "cve@mitre.org" + }, { "url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38907.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38907.json index 199faaf58cf..216f51222fd 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38907.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38907.json @@ -2,12 +2,12 @@ "id": "CVE-2023-38907", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-25T23:15:09.543", - "lastModified": "2024-01-19T20:15:11.103", + "lastModified": "2024-05-07T15:15:08.250", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function." + "value": "An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key." }, { "lang": "es", @@ -103,6 +103,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/", + "source": "cve@mitre.org" + }, { "url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38908.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38908.json index dd42a8af5b4..4e773171387 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38908.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38908.json @@ -2,12 +2,12 @@ "id": "CVE-2023-38908", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T01:15:08.153", - "lastModified": "2024-01-19T20:15:11.197", + "lastModified": "2024-05-07T15:15:08.350", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function." + "value": "An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function." }, { "lang": "es", @@ -100,6 +100,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/", + "source": "cve@mitre.org" + }, { "url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38909.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38909.json index 7a9ff358f87..4bfb7ee5aae 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38909.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38909.json @@ -2,12 +2,12 @@ "id": "CVE-2023-38909", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T01:15:08.537", - "lastModified": "2024-01-19T20:15:11.273", + "lastModified": "2024-05-07T15:15:08.433", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function." + "value": "An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function." }, { "lang": "es", @@ -101,6 +101,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/", + "source": "cve@mitre.org" + }, { "url": "https://www.scitepress.org/Papers/2023/120929/120929.pdf", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json new file mode 100644 index 00000000000..ca1a3a95cb3 --- /dev/null +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46012", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T14:15:10.003", + "lastModified": "2024-05-07T14:15:10.003", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability LINKSYS EA7500 3.0.1.207964 allows a remote attacker to execute arbitrary code via an HTTP request to the IGD UPnP." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desbordamiento de b\u00fafer LINKSYS EA7500 3.0.1.207964 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP al IGD UPnP." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/dest-3/CVE-2023-46012/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6810.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6810.json index 3f9c04aad74..986cbed0c75 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6810.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6810.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The ClickCease Click Fraud Protection plugin for WordPress is vulnerable to unauthorized access of data due to an improper capability check on the get_settings function in all versions up to, and including, 3.2.4. This makes it possible for authenticated attackers, with author access and above, to retrieve the plugin's configured API keys." + }, + { + "lang": "es", + "value": "El complemento ClickCease Click Fraud Protection para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad incorrecta en la funci\u00f3n get_settings en todas las versiones hasta la 3.2.4 incluida. Esto hace posible que los atacantes autenticados, con acceso de autor y superior, recuperen las claves API configuradas del complemento." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7240.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7240.json index 9a220b15db2..dd89b54041e 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7240.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7240.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "\u00a0An improper authorization level has been detected in the login panel. It may lead to\nunauthenticated Server Side Request Forgery and allows to perform open services\nenumeration. Server makes query to provided server (Server IP/DNS field) and is\ntriggering connection to arbitrary address.\n\n" + }, + { + "lang": "es", + "value": "Se ha detectado un nivel de autorizaci\u00f3n inadecuado en el panel de inicio de sesi\u00f3n. Puede provocar Server Side Request Forgery no autenticadas y permite realizar una enumeraci\u00f3n de servicios abiertos. El servidor realiza una consulta al servidor proporcionado (campo IP/DNS del servidor) y activa la conexi\u00f3n a una direcci\u00f3n arbitraria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20821.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20821.json index d7e757008ac..449c85634a1 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20821.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20821.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability possible to reconfigure OTP allows local attackers to transit RMA(Return Merchandise Authorization) mode, which disables security features. This attack needs additional privilege to control TEE." + }, + { + "lang": "es", + "value": "Una vulnerabilidad posible para reconfigurar OTP permite a atacantes locales transitar el modo RMA (Autorizaci\u00f3n de devoluci\u00f3n de mercanc\u00eda), que desactiva las funciones de seguridad. Este ataque necesita privilegios adicionales para controlar TEE." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20855.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20855.json index 3cfa340643a..cd11e48240f 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20855.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20855.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper access control vulnerability in multitasking framework prior to SMR May-2024 Release 1 allows physical attackers to access unlocked screen for a while." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado en el framework multitarea anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes f\u00edsicos acceder a la pantalla desbloqueada por un tiempo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20856.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20856.json index bae9d6fffbd..703c260052c 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20856.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20856.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Authentication vulnerability in Secure Folder prior to SMR May-2024 Release 1 allows physical attackers to access Secure Folder without proper authentication in a specific scenario." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en Secure Folder anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes f\u00edsicos acceder a Secure Folder sin la autenticaci\u00f3n adecuada en un escenario espec\u00edfico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20857.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20857.json index 5e7d3af14ce..2ae7bc984ca 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20857.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20857.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper access control vulnerability in startListening of CocktailBarService prior to SMR May-2024 Release 1 allows local attackers to access information of current application." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de acceso inadecuado en startListening de CocktailBarService antes de SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes locales acceder a informaci\u00f3n de la aplicaci\u00f3n actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20858.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20858.json index 144dc01a2c5..e9bfa407372 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20858.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20858.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper access control vulnerability in setCocktailHostCallbacks of CocktailBarService prior to SMR May-2024 Release 1 allows local attackers to access information of current application." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de acceso inadecuado en setCocktailHostCallbacks de CocktailBarService antes de SMR Mayo-2024 Versi\u00f3n 1 permite a atacantes locales acceder a informaci\u00f3n de la aplicaci\u00f3n actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20859.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20859.json index 73ab882bb1f..46f4ad47d6c 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20859.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20859.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper access control vulnerability in FactoryCamera prior to SMR May-2024 Release 1 allows local attackers to take pictures without privilege." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado en FactoryCamera antes de la versi\u00f3n 1 de SMR de mayo de 2024 permite a atacantes locales tomar fotograf\u00edas sin privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20860.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20860.json index 87268f056ad..98aaa3e08a7 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20860.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20860.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper export of android application components vulnerability in TelephonyUI prior to SMR May-2024 Release 1 allows local attackers to reboot the device without proper permission." + }, + { + "lang": "es", + "value": "La exportaci\u00f3n incorrecta de la vulnerabilidad de los componentes de la aplicaci\u00f3n de Android en TelephonyUI antes de la versi\u00f3n 1 de mayo de 2024 de SMR permite a los atacantes locales reiniciar el dispositivo sin el permiso adecuado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20861.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20861.json index ed227222197..0adc7d0883f 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20861.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20861.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Use after free vulnerability in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to cause memory corruption." + }, + { + "lang": "es", + "value": "Vulnerabilidad de use after free en SveService anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes locales con privilegios provocar da\u00f1os en la memoria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20862.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20862.json index 7107fc3fb03..4e367752449 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20862.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20862.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Out-of-bounds write in SveService prior to SMR May-2024 Release 1 allows local privileged attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en SveService antes de SMR, mayo de 2024, versi\u00f3n 1, permite a atacantes locales con privilegios ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20863.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20863.json index 0e85a3f26f5..3e25dce823b 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20863.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20863.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Out of bounds write vulnerability in SNAP in HAL prior to SMR May-2024 Release 1 allows local privileged attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escritura fuera de los l\u00edmites en SNAP en HAL antes de SMR, versi\u00f3n 1 de mayo de 2024, permite a atacantes locales con privilegios ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20864.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20864.json index 70d8bcebdbc..d5d682bbf49 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20864.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20864.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper access control vulnerability in DarManagerService prior to SMR May-2024 Release 1 allows local attackers to monitor system resources." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso inadecuado en DarManagerService anterior a SMR de mayo de 2024, versi\u00f3n 1, permite a atacantes locales monitorear los recursos del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20865.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20865.json index 5efac642b8b..7836ef9f676 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20865.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20865.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Authentication bypass in bootloader prior to SMR May-2024 Release 1 allows physical attackers to flash arbitrary images." + }, + { + "lang": "es", + "value": "La omisi\u00f3n de autenticaci\u00f3n en el gestor de arranque anterior a SMR May-2024 Release 1 permite a atacantes f\u00edsicos mostrar im\u00e1genes arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20866.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20866.json index ec348dbe156..4f553538992 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20866.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20866.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Authentication bypass vulnerability in Setupwizard prior to SMR May-2024 Release 1 allows physical attackers to skip activation step." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en el asistente de configuraci\u00f3n anterior a SMR, versi\u00f3n 1 de mayo de 2024, permite a los atacantes f\u00edsicos omitir el paso de activaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20867.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20867.json index 1b41415fb49..1bfed39f68e 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20867.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20867.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper privilege management vulnerability in Samsung Email prior to version 6.1.91.14 allows local attackers to access sensitive information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en Samsung Email anterior a la versi\u00f3n 6.1.91.14 permite a atacantes locales acceder a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20868.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20868.json index a45accf4cc7..194fa3782a9 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20868.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20868.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper input validation in Samsung Notes prior to version 4.4.15 allows local attackers to delete files with Samsung Notes privilege under certain conditions." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en Samsung Notes anterior a la versi\u00f3n 4.4.15 permite a atacantes locales eliminar archivos con privilegios de Samsung Notes bajo ciertas condiciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20869.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20869.json index 7339d3d558e..c14ca7b380f 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20869.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20869.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper privilege management vulnerability in Samsung Internet prior to version 25.0.0.41 allows local attackers to bypass protection for cookies." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en Samsung Internet anterior a la versi\u00f3n 25.0.0.41 permite a atacantes locales eludir la protecci\u00f3n de cookies." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20870.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20870.json index 7468864d59d..c9d3f9a294c 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20870.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20870.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.71.8 allows local attackers to write arbitrary files with the privilege of Galaxy Store." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n inadecuada de la intenci\u00f3n mediante la vulnerabilidad del receptor de transmisi\u00f3n en Galaxy Store antes de la versi\u00f3n 4.5.71.8 permite a atacantes locales escribir archivos arbitrarios con el privilegio de Galaxy Store." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20871.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20871.json index 98d45861965..db2a8f7c4f1 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20871.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20871.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper authorization vulnerability in Samsung Keyboard prior to version One UI 5.1.1 allows physical attackers to partially bypass the factory reset protection." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n inadecuada en el teclado Samsung anterior a la versi\u00f3n One UI 5.1.1 permite a atacantes f\u00edsicos eludir parcialmente la protecci\u00f3n de restablecimiento de f\u00e1brica." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20872.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20872.json index c7cdcc16a68..05772496f0d 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20872.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20872.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper handling of insufficient privileges vulnerability in TalkbackSE prior to version Android 14 allows local attackers to modify setting value of TalkbackSE." + }, + { + "lang": "es", + "value": "El manejo inadecuado de la vulnerabilidad de privilegios insuficientes en TalkbackSE anterior a la versi\u00f3n Android 14 permite a atacantes locales modificar el valor de configuraci\u00f3n de TalkbackSE." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22472.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22472.json index aeb8e003000..13a690b37aa 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22472.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22472.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "\nA buffer Overflow vulnerability in Silicon Labs 500 Series Z-Wave devices may allow Denial of Service, and potential Remote Code execution\n\nThis issue affects all versions of Silicon Labs\u00a0500 Series SDK prior to v6.85.2\n\nrunning on Silicon Labs 500 series Z-wave devices.\n\n" + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en los dispositivos Z-Wave de la serie 500 de Silicon Labs puede permitir una denegaci\u00f3n de servicio y una posible ejecuci\u00f3n remota de c\u00f3digo. Este problema afecta a todas las versiones del SDK de la serie 500 de Silicon Labs anteriores a la v6.85.2 que se ejecutan en dispositivos Z-wave de la serie 500 de Silicon Labs." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json index a839a2a514a..d9cd44b3e45 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23808.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free o provocan DOS mediante la desreferencia del puntero NULL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json index a929537c0c6..fad40fbab0c 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27217.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en aplicaciones preinstaladas mediante use after free. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28148.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28148.json new file mode 100644 index 00000000000..827d38b2bac --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28148.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-28148", + "sourceIdentifier": "security@apache.org", + "published": "2024-05-07T14:15:10.103", + "lastModified": "2024-05-07T14:15:10.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An authenticated user could potentially access metadata for a datasource they are not authorized to view by submitting a targeted REST API request.This issue affects Apache Superset: before 4.0.0.\n\nUsers are recommended to upgrade to version 4.0.0, which fixes the issue.\n\n" + }, + { + "lang": "es", + "value": "Un usuario autenticado podr\u00eda acceder a los metadatos de una fuente de datos para la que no est\u00e1 autorizado a ver enviando una solicitud de API REST espec\u00edfica. Este problema afecta a Apache Superset: anterior a 4.0.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.0.0, que soluciona el problema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/n27wlbd05oc6bgjh28d5pxzsrrph8dgo", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json new file mode 100644 index 00000000000..a4acfb0cf0c --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-29889", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T14:15:10.330", + "lastModified": "2024-05-07T14:15:10.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15." + }, + { + "lang": "es", + "value": "GLPI es un paquete gratuito de software de gesti\u00f3n de TI y activos. Antes de 10.0.15, un usuario autenticado pod\u00eda explotar una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n de b\u00fasquedas guardadas para alterar los datos de la cuenta de otro usuario y tomar el control de ella. Esta vulnerabilidad se solucion\u00f3 en 10.0.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json index 6fb4bb5e347..39597032c14 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29941.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Insecure storage of the ICT MIFARE and DESFire encryption keys in the firmware\nbinary allows malicious actors to create credentials for any site code and card number that is using the default\nICT encryption.\n\n" + }, + { + "lang": "es", + "value": "El almacenamiento inseguro de las claves de cifrado ICT MIFARE y DESFire en el binario del firmware permite a actores malintencionados crear credenciales para cualquier c\u00f3digo de sitio y n\u00famero de tarjeta que utilice el cifrado ICT predeterminado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2913.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2913.json index ae16a238b05..fdf3a24d3b9 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2913.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2913.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A race condition vulnerability exists in the mintplex-labs/anything-llm repository, specifically within the user invite acceptance process. Attackers can exploit this vulnerability by sending multiple concurrent requests to accept a single user invite, allowing the creation of multiple user accounts from a single invite link intended for only one user. This bypasses the intended security mechanism that restricts invite acceptance to a single user, leading to unauthorized user creation without detection in the invite tab. The issue is due to the lack of validation for concurrent requests in the backend." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n en el repositorio mintplex-labs/anything-llm, espec\u00edficamente dentro del proceso de aceptaci\u00f3n de invitaci\u00f3n del usuario. Los atacantes pueden aprovechar esta vulnerabilidad enviando m\u00faltiples solicitudes simult\u00e1neas para aceptar una invitaci\u00f3n de un solo usuario, lo que permite la creaci\u00f3n de m\u00faltiples cuentas de usuario desde un \u00fanico enlace de invitaci\u00f3n destinado a un solo usuario. Esto evita el mecanismo de seguridad previsto que restringe la aceptaci\u00f3n de invitaciones a un solo usuario, lo que lleva a la creaci\u00f3n de usuarios no autorizados sin detecci\u00f3n en la pesta\u00f1a de invitaci\u00f3n. El problema se debe a la falta de validaci\u00f3n de solicitudes simult\u00e1neas en el backend." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30973.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30973.json index 3577d55e8a0..878ea88ec81 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30973.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30973.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An issue in V-SOL G/EPON ONU HG323AC-B with firmware version V2.0.08-210715 allows an attacker to execute arbtirary code and obtain sensitive information via crafted POST request to /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc." + }, + { + "lang": "es", + "value": "Un problema en V-SOL G/EPON ONU HG323AC-B con la versi\u00f3n de firmware V2.0.08-210715 permite a un atacante ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada para /boaform/getASPdata/formFirewall, /boaform/getASPdata/formAcc ." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json index a232903b3d6..e8258702af0 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31078.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una falla del servicio mediante la desreferencia del puntero NULL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31456.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31456.json new file mode 100644 index 00000000000..3bf4f3ea4b1 --- /dev/null +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31456.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-31456", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T14:15:10.550", + "lastModified": "2024-05-07T14:15:10.550", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability from map search. This vulnerability is fixed in 10.0.15." + }, + { + "lang": "es", + "value": "GLPI es un paquete gratuito de software de gesti\u00f3n de TI y activos. Antes de 10.0.15, un usuario autenticado pod\u00eda aprovechar una vulnerabilidad de inyecci\u00f3n SQL desde la b\u00fasqueda de mapas. Esta vulnerabilidad se solucion\u00f3 en 10.0.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json new file mode 100644 index 00000000000..7a6decd6706 --- /dev/null +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32369.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-32369", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:08.520", + "lastModified": "2024-05-07T15:15:08.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the start and limit parameter in the mliWhiteList.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cwe.mitre.org/data/definitions/89.html", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chucrutis/CVE-2024-32369", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json new file mode 100644 index 00000000000..9a9227a64ce --- /dev/null +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32370.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-32370", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:08.597", + "lastModified": "2024-05-07T15:15:08.597", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cwe.mitre.org/data/definitions/639.html", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chucrutis/CVE-2024-32370", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json new file mode 100644 index 00000000000..fe5284a048a --- /dev/null +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32371.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-32371", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:08.653", + "lastModified": "2024-05-07T15:15:08.653", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a regular user account to escalate their privileges and gain administrative access by changing the type parameter from 1 to 0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cwe.mitre.org/data/definitions/639.html", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chucrutis/CVE-2024-32371", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32663.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32663.json new file mode 100644 index 00000000000..45ca7d881c5 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32663.json @@ -0,0 +1,83 @@ +{ + "id": "CVE-2024-32663", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T15:15:08.713", + "lastModified": "2024-05-07T15:15:08.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing `app-layer.protocols.http2.max-table-size` value (default is 65536)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/08d93f7c3762781b743f88f9fdc4389eb9c3eb64", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/c0af92295e833d1db29b184d63cd3b829451d7fd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/d24b37a103c04bb2667e449e080ba4c8e56bb019", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/e68ec4b227d19498f364a41eb25d3182f0383ca5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266r", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6892", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6900", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32664.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32664.json new file mode 100644 index 00000000000..1705cbe04a3 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32664.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-32664", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T15:15:08.937", + "lastModified": "2024-05-07T15:15:08.937", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, specially crafted traffic or datasets can cause a limited buffer overflow. This vulnerability is fixed in 7.0.5 and 6.0.19. Workarounds include not use rules with `base64_decode` keyword with `bytes` option with value 1, 2 or 5 and for 7.0.x, setting `app-layer.protocols.smtp.mime.body-md5` to false." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/311002baf288a225f62cf18a90c5fdd294447379", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/d5ffecf11ad2c6fe89265e518f5d7443caf26ba4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-79vh-hpwq-3jh7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32867.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32867.json new file mode 100644 index 00000000000..cf09546e3de --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32867.json @@ -0,0 +1,91 @@ +{ + "id": "CVE-2024-32867", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T15:15:09.143", + "lastModified": "2024-05-07T15:15:09.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, various problems in handling of fragmentation anomalies can lead to mis-detection of rules and policy. This vulnerability is fixed in 7.0.5 or 6.0.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/commit/1e110d0a71db46571040b937e17a4bc9f91d6de9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/2f39ba75f153ba9bdf8eedc2a839cc973dbaea66", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/414f97c6695c5a2e1d378a36a6f50d7288767634", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/bf3d420fb709ebe074019a99e3bd3a2364524a4b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/d13bd2ae217a6d2ceb347f74d27cbfcd37b9bda9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/commit/e6267758ed5da27f804f0c1c07f9423bdf4d72b8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-xvrx-88mv-xcq5", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6672", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6673", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/6677", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json new file mode 100644 index 00000000000..05f18713533 --- /dev/null +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33120.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-33120", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:09.353", + "lastModified": "2024-05-07T15:15:09.353", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Roothub v2.5 was discovered to contain an arbitrary file upload vulnerability via the customPath parameter in the upload() function. This vulnerability allows attackers to execute arbitrary code via a crafted JSP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://roothub.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33120.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33122.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33122.json new file mode 100644 index 00000000000..0986c731685 --- /dev/null +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33122.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33122", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:09.417", + "lastModified": "2024-05-07T15:15:09.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Roothub v2.6 was discovered to contain a SQL injection vulnerability via the topic parameter in the list() function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33122.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json new file mode 100644 index 00000000000..9153f6f5682 --- /dev/null +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33124.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33124", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:09.477", + "lastModified": "2024-05-07T15:15:09.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Roothub v2.6 was discovered to contain a SQL injection vulnerability via the nodeTitle parameter in the parentNode() function.." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33124.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json new file mode 100644 index 00000000000..b4549eab65d --- /dev/null +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33434.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-33434", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T14:15:10.760", + "lastModified": "2024-05-07T14:15:10.760", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the `filename` argument into the `buildStr` string without any sanitization or filtering." + }, + { + "lang": "es", + "value": "Un problema en tiagorlampert CHAOS antes de 1b451cf62582295b7225caf5a7b506f0bad56f6b y 24c9e109b5be34df7b2bce8368eae669c481ed5e permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la concatenaci\u00f3n insegura del argumento `filename` en la cadena `buildStr` sin ninguna sanitizaci\u00f3n o filtrado." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/tiagorlampert/CHAOS/pull/95", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json new file mode 100644 index 00000000000..2d68d744765 --- /dev/null +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33780.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-33780", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T14:15:10.820", + "lastModified": "2024-05-07T14:15:10.820", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MP-SPDZ v0.3.8 was discovered to contain a segmentation violation via the function osuCrypto::copyOut at /Tools/SilentPprf.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n osuCrypto::copyOut en /Tools/SilentPprf.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf-3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json new file mode 100644 index 00000000000..aa4cfb35ba4 --- /dev/null +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-33781", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T14:15:10.880", + "lastModified": "2024-05-07T14:15:10.880", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function octetStream::get_bytes in /Tools/octetStream.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n octetStream::get_bytes en /Tools/octetStream.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-octetStream", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json new file mode 100644 index 00000000000..9f1c0ea3683 --- /dev/null +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33782.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-33782", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T14:15:10.933", + "lastModified": "2024-05-07T14:15:10.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function OTExtensionWithMatrix::extend in /OT/OTExtensionWithMatrix.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n OTExtensionWithMatrix::extend en /OT/OTExtensionWithMatrix.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-OTExtensionWithMatrix", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json new file mode 100644 index 00000000000..53b83378534 --- /dev/null +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33783.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-33783", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T14:15:10.990", + "lastModified": "2024-05-07T14:15:10.990", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MP-SPDZ v0.3.8 was discovered to contain a segmentation violation via the function osuCrypto::SilentMultiPprfReceiver::expand in /Tools/SilentPprf.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda una infracci\u00f3n de segmentaci\u00f3n mediante la funci\u00f3n osuCrypto::SilentMultiPprfReceiver::expand en /Tools/SilentPprf.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/SEGV-SlientPprf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34084.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34084.json new file mode 100644 index 00000000000..a9eb0ee5006 --- /dev/null +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34084.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-34084", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T15:15:09.540", + "lastModified": "2024-05-07T15:15:09.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Minder's `HandleGithubWebhook` is susceptible to a denial of service attack from an untrusted HTTP request. The vulnerability exists before the request has been validated, and as such the request is still untrusted at the point of failure. This allows an attacker with the ability to send requests to `HandleGithubWebhook` to crash the Minder controlplane and deny other users from using it. This vulnerability is fixed in 0.0.48." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/stacklok/minder/commit/3e5a527d2f1b535159206161d1d519602c75bd0d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/stacklok/minder/security/advisories/GHSA-9c5w-9q3f-3hv7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34342.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34342.json new file mode 100644 index 00000000000..c2642c7e9e0 --- /dev/null +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34342.json @@ -0,0 +1,75 @@ +{ + "id": "CVE-2024-34342", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-07T15:15:09.730", + "lastModified": "2024-05-07T15:15:09.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "react-pdf displays PDFs in React apps. If PDF.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. This vulnerability is fixed in 7.7.3 and 8.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/mozilla/pdf.js/pull/18015", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wojtekmaj/react-pdf/commit/208f28dd47fe38c33ce4bac4205b2b0a0bb207fe", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wojtekmaj/react-pdf/commit/671e6eaa2e373e404040c13cc6b668fe39839cad", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/wojtekmaj/react-pdf/security/advisories/GHSA-87hq-q4gp-9wr4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json new file mode 100644 index 00000000000..1c88fb13af2 --- /dev/null +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34523.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-34523", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-07T15:15:09.930", + "lastModified": "2024-05-07T15:15:09.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "AChecker 1.5 allows remote attackers to read the contents of arbitrary files via the download.php path parameter by using Unauthenticated Path Traversal. This occurs through readfile in PHP. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/inclusive-design/AChecker/blob/main/checker/download.php", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3628.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3628.json index d3dfe008e20..9ad7aef774e 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3628.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3628.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The EasyEvent WordPress plugin through 1.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + }, + { + "lang": "es", + "value": "El complemento EasyEvent WordPress hasta la versi\u00f3n 1.0.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de cross site scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json index d31703c2ef1..a3ee0e53dd5 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3757.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque una falla del servicio a trav\u00e9s de un desbordamiento de enteros." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json index a2542f66da9..c231fca3271 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3758.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local ejecute c\u00f3digo arbitrario en TCB a trav\u00e9s de un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json index 4c46ef9307b..355f6a157e4 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3759.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free." + }, + { + "lang": "es", + "value": "En OpenHarmony v4.0.0 y versiones anteriores permiten a un atacante local la ejecuci\u00f3n de c\u00f3digo arbitrario en TCB mediante use after free." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4186.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4186.json index 1b48016775c..c8abdb33997 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4186.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4186.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled." + }, + { + "lang": "es", + "value": "El complemento Build App Online para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 3.0.5 incluida. Esto se debe a que el valor predeterminado 'eb_user_email_verification_key' est\u00e1 vac\u00edo y falta la marca de verificaci\u00f3n no vac\u00eda en la funci\u00f3n 'eb_user_email_verify'. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso a la identificaci\u00f3n del usuario. Esto s\u00f3lo se puede explotar si la configuraci\u00f3n 'Verificaci\u00f3n de correo electr\u00f3nico' est\u00e1 habilitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4345.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4345.json index b2ec1dade3a..b435d5358ef 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4345.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4345.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'process' function in the 'startklarDropZoneUploadProcess' class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Startklar Elementor Addons para WordPress es vulnerable a cargas de archivos arbitrarias debido a una validaci\u00f3n insuficiente del tipo de archivo en la funci\u00f3n 'proceso' en la clase 'startklarDropZoneUploadProcess' en versiones hasta la 1.7.13 incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4346.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4346.json index c17c313d7ab..915a1ecdac3 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4346.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4346.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.7.13. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Startklar Elementor Addons para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos en todas las versiones hasta la 1.7.13 incluida. Esto se debe a que el complemento no valida correctamente la ruta de un archivo cargado antes de eliminarlo. Esto hace posible que atacantes no autenticados eliminen archivos arbitrarios, incluido el archivo wp-config.php, lo que puede hacer posible la toma del sitio y la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json index 1037931141c..98ddade8ab1 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "In Eclipse Dataspace Components from version 0.2.1 to 0.6.2, in the EDC Connector component ( https://github.com/eclipse-edc/Connector ), an attacker might obtain OAuth2 client secrets from the vault.\n\nIn Eclipse Dataspace Components from version 0.2.1 to 0.6.2, we have identified a security vulnerability in the EDC Connector component ( https://github.com/eclipse-edc/Connector ) regarding the OAuth2-protected data sink feature. When using a custom, OAuth2-protected data sink, the OAuth2-specific data address properties are resolved by the provider data plane. Problematically, the consumer-provided clientSecretKey, which indicates the OAuth2 client secret to retrieve from a secrets vault, is resolved in the context of the provider's vault, not the consumer. This secret's value is then sent to the tokenUrl, also consumer-controlled, as part of an OAuth2 client credentials grant. The returned access token is then sent as a bearer token to the data sink URL.\n\nThis feature is now disabled entirely, because not all code paths necessary for a successful realization were fully implemented.\n\n" + }, + { + "lang": "es", + "value": "En los componentes de Eclipse Dataspace de la versi\u00f3n 0.2.1 a 0.6.2, en el componente EDC Connector (https://github.com/eclipse-edc/Connector), un atacante podr\u00eda obtener secretos del cliente OAuth2 de la b\u00f3veda. En los componentes de Eclipse Dataspace de la versi\u00f3n 0.2.1 a 0.6.2, hemos identificado una vulnerabilidad de seguridad en el componente EDC Connector (https://github.com/eclipse-edc/Connector) con respecto a la funci\u00f3n de receptor de datos protegido por OAuth2. Cuando se utiliza un receptor de datos personalizado protegido por OAuth2, el plano de datos del proveedor resuelve las propiedades de direcci\u00f3n de datos espec\u00edficas de OAuth2. Lo problem\u00e1tico es que la clientSecretKey proporcionada por el consumidor, que indica el secreto del cliente OAuth2 para recuperar de una b\u00f3veda de secretos, se resuelve en el contexto de la b\u00f3veda del proveedor, no en el del consumidor. Luego, el valor de este secreto se env\u00eda a tokenUrl, tambi\u00e9n controlado por el consumidor, como parte de una concesi\u00f3n de credenciales de cliente OAuth2. El token de acceso devuelto se env\u00eda luego como token de portador a la URL del receptor de datos. Esta caracter\u00edstica ahora est\u00e1 completamente deshabilitada porque no se implementaron completamente todas las rutas de c\u00f3digo necesarias para una realizaci\u00f3n exitosa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4537.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4537.json index ed98586684f..5769ca9f55c 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4537.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4537.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain the download URL of another user to obtain the purchased ticket." + }, + { + "lang": "es", + "value": "Vulnerabilidad IDOR en Janto Ticketing Software que afecta a la versi\u00f3n 4.3r10. Esta vulnerabilidad podr\u00eda permitir que un usuario remoto obtenga la URL de descarga de otro usuario para obtener el billete comprado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4538.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4538.json index bef70dba279..768340e06b7 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4538.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4538.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "IDOR vulnerability in Janto Ticketing Software affecting version 4.3r10. This vulnerability could allow a remote user to obtain a user's event ticket by creating a specific request with the ticket reference ID, leading to the exposure of sensitive user data." + }, + { + "lang": "es", + "value": "Vulnerabilidad IDOR en Janto Ticketing Software que afecta a la versi\u00f3n 4.3r10. Esta vulnerabilidad podr\u00eda permitir que un usuario remoto obtenga una entrada para un evento mediante la creaci\u00f3n de una solicitud espec\u00edfica con el ID de referencia de la entrada, lo que provocar\u00eda la exposici\u00f3n de datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4582.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4582.json index f6d301370fd..50b79103fe2 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4582.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4582.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in Faraday GM8181 and GM828x up to 20240429. Affected is an unknown function of the component NTP Service. The manipulation of the argument ntp_srv leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-263304." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Faraday GM8181 y GM828x hasta 20240429 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente NTP Service es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ntp_srv conduce a la inyecci\u00f3n de comandos del sistema operativo. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-263304." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4583.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4583.json index 8c2ceda7d07..584653c70c1 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4583.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4583.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in Faraday GM8181 and GM828x up to 20240429. Affected by this vulnerability is an unknown functionality of the component Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-263305 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en Faraday GM8181 y GM828x hasta 20240429. Una funci\u00f3n desconocida del componente Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-263305." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json index 111a3171e8a..07d3cb986f5 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Faraday GM8181 and GM828x up to 20240429. Affected by this issue is some unknown functionality of the file /command_port.ini. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263306 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad clasificada como problem\u00e1tica ha sido encontrada en Faraday GM8181 y GM828x hasta 20240429. Una funci\u00f3n desconocida del archivo /command_port.ini es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-263306 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json index 953a22c4544..33f1414e40f 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4585.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/member_type.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263307. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /src/dede/member_type.php. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263307. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json index 27230267b7a..b1ed58918cb 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4586.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability has been found in DedeCMS 5.7 and classified as problematic. This vulnerability affects unknown code of the file /src/dede/shops_delivery.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263308. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /src/dede/shops_delivery.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-263308. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json index da05807b54c..3159d5f08f3 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4587.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in DedeCMS 5.7 and classified as problematic. This issue affects some unknown processing of the file /src/dede/tpl.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263309 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /src/dede/tpl.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-263309. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json index da01eca43e2..8b7062a12c5 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4588.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/mytag_add.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263310 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en DedeCMS 5.7. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /src/dede/mytag_add.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-263310 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json index 86af87f1a37..117395981cd 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4589.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "A vulnerability was found in DedeCMS 5.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /src/dede/mytag_edit.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263311. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en DedeCMS 5.7. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo /src/dede/mytag_edit.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263311. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json new file mode 100644 index 00000000000..fcf4037c6fe --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4590.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-4590", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-07T14:15:11.050", + "lastModified": "2024-05-07T14:15:11.050", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in DedeCMS 5.7. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /src/dede/sys_info.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263312. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en DedeCMS 5.7. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /src/dede/sys_info.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-263312. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hckwzh/cms/blob/main/21.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263312", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263312", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.324958", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json new file mode 100644 index 00000000000..0cb45ed6ebb --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4591.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-4591", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-07T14:15:11.277", + "lastModified": "2024-05-07T14:15:11.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in DedeCMS 5.7. This affects an unknown part of the file /src/dede/sys_group_add.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263313 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /src/dede/sys_group_add.php. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-263313. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hckwzh/cms/blob/main/22.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263313", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263313", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.324959", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json new file mode 100644 index 00000000000..359f7f90967 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4592.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-4592", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-07T14:15:11.510", + "lastModified": "2024-05-07T14:15:11.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in DedeCMS 5.7. This vulnerability affects unknown code of the file /src/dede/sys_group_edit.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263314 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /src/dede/sys_group_edit.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-263314 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hckwzh/cms/blob/main/23.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263314", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263314", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.324960", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json new file mode 100644 index 00000000000..73666a91bd4 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4593.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-4593", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-07T14:15:11.747", + "lastModified": "2024-05-07T14:15:11.747", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7. This issue affects some unknown processing of the file /src/dede/sys_multiserv.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263315. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /src/dede/sys_multiserv.php. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-263315. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hckwzh/cms/blob/main/24.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263315", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263315", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.324961", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json new file mode 100644 index 00000000000..bbabe2b0cd9 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4594.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4594", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-07T15:15:10.040", + "lastModified": "2024-05-07T15:15:10.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in DedeCMS 5.7. Affected is an unknown function of the file /src/dede/sys_safe.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263316. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hckwzh/cms/blob/main/25.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263316", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263316", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.324963", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json new file mode 100644 index 00000000000..41768991671 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4595", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-07T15:15:10.273", + "lastModified": "2024-05-07T15:15:10.273", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SEMCMS up to 4.8 and classified as critical. Affected by this vulnerability is the function locate of the file function.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263317 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gatsby2003/Semcms/blob/main/semcms0-sqlinjection.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263317", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263317", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.326715", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4599.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4599.json index a01652e1bb7..149276b03fd 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4599.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4599.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Remote denial of service vulnerability in LAN Messenger affecting version 3.4.0. This vulnerability allows an attacker to crash the LAN Messenger service by sending a long string directly and continuously over the UDP protocol." + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n remota de servicio en LAN Messenger que afecta a la versi\u00f3n 3.4.0. Esta vulnerabilidad permite a un atacante bloquear el servicio LAN Messenger enviando una cadena larga directa y continuamente a trav\u00e9s del protocolo UDP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4600.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4600.json index c3aed3b2929..d57cb11d49c 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4600.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4600.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery vulnerability in Socomec Net Vision, version 7.20. This vulnerability could allow an attacker to trick registered users into performing critical actions, such as adding and updating accounts, due to lack of proper sanitisation of the \u2018set_param.cgi\u2019 file." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery en Socomec Net Vision, versi\u00f3n 7.20. Esta vulnerabilidad podr\u00eda permitir a un atacante enga\u00f1ar a los usuarios registrados para que realicen acciones cr\u00edticas, como agregar y actualizar cuentas, debido a la falta de una desinfecci\u00f3n adecuada del archivo 'set_param.cgi'." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4601.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4601.json index 24efbccffa0..3b4ea6d76ee 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4601.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4601.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An incorrect authentication vulnerability has been found in Socomec Net Vision affecting version 7.20. This vulnerability allows an attacker to perform a brute force attack on the application and recover a valid session, because the application uses a five-digit integer value." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad de autenticaci\u00f3n incorrecta en Socomec Net Vision que afecta a la versi\u00f3n 7.20. Esta vulnerabilidad permite a un atacante realizar un ataque de fuerza bruta en la aplicaci\u00f3n y recuperar una sesi\u00f3n v\u00e1lida, porque la aplicaci\u00f3n utiliza un valor entero de cinco d\u00edgitos." } ], "metrics": { diff --git a/README.md b/README.md index b6cc6e70ab5..a567c388de2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-07T14:00:42.453599+00:00 +2024-05-07T16:00:38.282013+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-07T13:39:32.710000+00:00 +2024-05-07T15:15:10.273000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -248842 +248869 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `27` -- [CVE-2023-31234](CVE-2023/CVE-2023-312xx/CVE-2023-31234.json) (`2024-05-07T13:15:47.703`) -- [CVE-2023-7240](CVE-2023/CVE-2023-72xx/CVE-2023-7240.json) (`2024-05-07T13:15:47.973`) -- [CVE-2024-4536](CVE-2024/CVE-2024-45xx/CVE-2024-4536.json) (`2024-05-07T13:15:48.513`) -- [CVE-2024-4537](CVE-2024/CVE-2024-45xx/CVE-2024-4537.json) (`2024-05-07T12:15:09.833`) -- [CVE-2024-4538](CVE-2024/CVE-2024-45xx/CVE-2024-4538.json) (`2024-05-07T12:15:10.030`) -- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-05-07T12:15:10.223`) -- [CVE-2024-4585](CVE-2024/CVE-2024-45xx/CVE-2024-4585.json) (`2024-05-07T12:15:10.457`) -- [CVE-2024-4586](CVE-2024/CVE-2024-45xx/CVE-2024-4586.json) (`2024-05-07T13:15:48.770`) -- [CVE-2024-4587](CVE-2024/CVE-2024-45xx/CVE-2024-4587.json) (`2024-05-07T13:15:49.043`) -- [CVE-2024-4588](CVE-2024/CVE-2024-45xx/CVE-2024-4588.json) (`2024-05-07T13:15:49.323`) -- [CVE-2024-4589](CVE-2024/CVE-2024-45xx/CVE-2024-4589.json) (`2024-05-07T13:15:49.603`) -- [CVE-2024-4600](CVE-2024/CVE-2024-46xx/CVE-2024-4600.json) (`2024-05-07T12:15:10.683`) -- [CVE-2024-4601](CVE-2024/CVE-2024-46xx/CVE-2024-4601.json) (`2024-05-07T12:15:10.880`) +- [CVE-2024-29889](CVE-2024/CVE-2024-298xx/CVE-2024-29889.json) (`2024-05-07T14:15:10.330`) +- [CVE-2024-31456](CVE-2024/CVE-2024-314xx/CVE-2024-31456.json) (`2024-05-07T14:15:10.550`) +- [CVE-2024-32369](CVE-2024/CVE-2024-323xx/CVE-2024-32369.json) (`2024-05-07T15:15:08.520`) +- [CVE-2024-32370](CVE-2024/CVE-2024-323xx/CVE-2024-32370.json) (`2024-05-07T15:15:08.597`) +- [CVE-2024-32371](CVE-2024/CVE-2024-323xx/CVE-2024-32371.json) (`2024-05-07T15:15:08.653`) +- [CVE-2024-32663](CVE-2024/CVE-2024-326xx/CVE-2024-32663.json) (`2024-05-07T15:15:08.713`) +- [CVE-2024-32664](CVE-2024/CVE-2024-326xx/CVE-2024-32664.json) (`2024-05-07T15:15:08.937`) +- [CVE-2024-32867](CVE-2024/CVE-2024-328xx/CVE-2024-32867.json) (`2024-05-07T15:15:09.143`) +- [CVE-2024-33120](CVE-2024/CVE-2024-331xx/CVE-2024-33120.json) (`2024-05-07T15:15:09.353`) +- [CVE-2024-33122](CVE-2024/CVE-2024-331xx/CVE-2024-33122.json) (`2024-05-07T15:15:09.417`) +- [CVE-2024-33124](CVE-2024/CVE-2024-331xx/CVE-2024-33124.json) (`2024-05-07T15:15:09.477`) +- [CVE-2024-33434](CVE-2024/CVE-2024-334xx/CVE-2024-33434.json) (`2024-05-07T14:15:10.760`) +- [CVE-2024-33780](CVE-2024/CVE-2024-337xx/CVE-2024-33780.json) (`2024-05-07T14:15:10.820`) +- [CVE-2024-33781](CVE-2024/CVE-2024-337xx/CVE-2024-33781.json) (`2024-05-07T14:15:10.880`) +- [CVE-2024-33782](CVE-2024/CVE-2024-337xx/CVE-2024-33782.json) (`2024-05-07T14:15:10.933`) +- [CVE-2024-33783](CVE-2024/CVE-2024-337xx/CVE-2024-33783.json) (`2024-05-07T14:15:10.990`) +- [CVE-2024-34084](CVE-2024/CVE-2024-340xx/CVE-2024-34084.json) (`2024-05-07T15:15:09.540`) +- [CVE-2024-34342](CVE-2024/CVE-2024-343xx/CVE-2024-34342.json) (`2024-05-07T15:15:09.730`) +- [CVE-2024-34523](CVE-2024/CVE-2024-345xx/CVE-2024-34523.json) (`2024-05-07T15:15:09.930`) +- [CVE-2024-4590](CVE-2024/CVE-2024-45xx/CVE-2024-4590.json) (`2024-05-07T14:15:11.050`) +- [CVE-2024-4591](CVE-2024/CVE-2024-45xx/CVE-2024-4591.json) (`2024-05-07T14:15:11.277`) +- [CVE-2024-4592](CVE-2024/CVE-2024-45xx/CVE-2024-4592.json) (`2024-05-07T14:15:11.510`) +- [CVE-2024-4593](CVE-2024/CVE-2024-45xx/CVE-2024-4593.json) (`2024-05-07T14:15:11.747`) +- [CVE-2024-4594](CVE-2024/CVE-2024-45xx/CVE-2024-4594.json) (`2024-05-07T15:15:10.040`) +- [CVE-2024-4595](CVE-2024/CVE-2024-45xx/CVE-2024-4595.json) (`2024-05-07T15:15:10.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `64` +Recently modified CVEs: `54` -- [CVE-2024-33121](CVE-2024/CVE-2024-331xx/CVE-2024-33121.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33570](CVE-2024/CVE-2024-335xx/CVE-2024-33570.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33576](CVE-2024/CVE-2024-335xx/CVE-2024-33576.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33599](CVE-2024/CVE-2024-335xx/CVE-2024-33599.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33600](CVE-2024/CVE-2024-336xx/CVE-2024-33600.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33601](CVE-2024/CVE-2024-336xx/CVE-2024-33601.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33602](CVE-2024/CVE-2024-336xx/CVE-2024-33602.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33907](CVE-2024/CVE-2024-339xx/CVE-2024-33907.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-33908](CVE-2024/CVE-2024-339xx/CVE-2024-33908.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-34413](CVE-2024/CVE-2024-344xx/CVE-2024-34413.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-34455](CVE-2024/CVE-2024-344xx/CVE-2024-34455.json) (`2024-05-07T12:15:09.747`) -- [CVE-2024-34532](CVE-2024/CVE-2024-345xx/CVE-2024-34532.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-34533](CVE-2024/CVE-2024-345xx/CVE-2024-34533.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-34534](CVE-2024/CVE-2024-345xx/CVE-2024-34534.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-2913](CVE-2024/CVE-2024-29xx/CVE-2024-2913.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-29941](CVE-2024/CVE-2024-299xx/CVE-2024-29941.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-30973](CVE-2024/CVE-2024-309xx/CVE-2024-30973.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-31078](CVE-2024/CVE-2024-310xx/CVE-2024-31078.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-3628](CVE-2024/CVE-2024-36xx/CVE-2024-3628.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-3757](CVE-2024/CVE-2024-37xx/CVE-2024-3757.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-3758](CVE-2024/CVE-2024-37xx/CVE-2024-3758.json) (`2024-05-07T13:39:32.710`) @@ -80,10 +82,20 @@ Recently modified CVEs: `64` - [CVE-2024-4186](CVE-2024/CVE-2024-41xx/CVE-2024-4186.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-4345](CVE-2024/CVE-2024-43xx/CVE-2024-4345.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-4346](CVE-2024/CVE-2024-43xx/CVE-2024-4346.json) (`2024-05-07T13:39:32.710`) -- [CVE-2024-4568](CVE-2024/CVE-2024-45xx/CVE-2024-4568.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4536](CVE-2024/CVE-2024-45xx/CVE-2024-4536.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4537](CVE-2024/CVE-2024-45xx/CVE-2024-4537.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4538](CVE-2024/CVE-2024-45xx/CVE-2024-4538.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-4582](CVE-2024/CVE-2024-45xx/CVE-2024-4582.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-4583](CVE-2024/CVE-2024-45xx/CVE-2024-4583.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4585](CVE-2024/CVE-2024-45xx/CVE-2024-4585.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4586](CVE-2024/CVE-2024-45xx/CVE-2024-4586.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4587](CVE-2024/CVE-2024-45xx/CVE-2024-4587.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4588](CVE-2024/CVE-2024-45xx/CVE-2024-4588.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4589](CVE-2024/CVE-2024-45xx/CVE-2024-4589.json) (`2024-05-07T13:39:32.710`) - [CVE-2024-4599](CVE-2024/CVE-2024-45xx/CVE-2024-4599.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4600](CVE-2024/CVE-2024-46xx/CVE-2024-4600.json) (`2024-05-07T13:39:32.710`) +- [CVE-2024-4601](CVE-2024/CVE-2024-46xx/CVE-2024-4601.json) (`2024-05-07T13:39:32.710`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1f0ce821a62..7977ce1b5d4 100644 --- a/_state.csv +++ b/_state.csv @@ -198730,7 +198730,7 @@ CVE-2022-31470,0,0,da45f0e101cb2279831f150221f5784badae5d441cb3a004dc43144c822c0 CVE-2022-31471,0,0,ec0f29e37f8bf7a7a4901e6f51a0bfcb59e247202b8f2c932e9f086fbccb6fc7,2022-08-01T18:56:10.177000 CVE-2022-31472,0,0,863139ca51f69847a77d3516f865fe25e5a3ccd3b751fae7dfb8778e1ed81720,2022-07-15T12:15:39.223000 CVE-2022-31473,0,0,86e3b13263322637f9043580feb349c6d5db1633c10ea86051ab6ef1536dcfae,2022-08-10T23:36:48.057000 -CVE-2022-31474,0,1,74556ae60f2fd8f1574485741a8cfaab9b61960ee159dda03943e917f843c20d,2024-05-07T13:15:47.487000 +CVE-2022-31474,0,0,74556ae60f2fd8f1574485741a8cfaab9b61960ee159dda03943e917f843c20d,2024-05-07T13:15:47.487000 CVE-2022-31475,0,0,e690085c41613d4ce17469aedbb7b65689dafac4d30f059a25e001de2f358f35,2023-08-08T14:22:24.967000 CVE-2022-31476,0,0,e6c9b8e5799a477d2dec8c05c08d08c41827d098f4af05443057a2b31ebba970,2023-08-08T14:22:24.967000 CVE-2022-31477,0,0,572033cd11684fb1665bdc7cb1dcdf68ce62fb9b581c38a5d573e2a7f40763c0,2023-11-07T03:47:38.243000 @@ -222592,7 +222592,7 @@ CVE-2023-31230,0,0,7a5840326515617fab0ae808406bf516580abd72a8a54ce94870139ef1479 CVE-2023-31231,0,0,84eac62e69db002070ef9020c293211cc624ba9bc7a273bdf4db2f223bf8f24c,2023-12-27T20:21:21.870000 CVE-2023-31232,0,0,c132c95f482830077369b28ecac65713932b48f2431a73dcb51e25bc5de386e0,2023-08-23T18:43:09.977000 CVE-2023-31233,0,0,032470d9319b440030f236a9bd932092e68d1bcdc2018aa1aae3b8627b30f2d0,2023-05-25T16:32:35.533000 -CVE-2023-31234,1,1,5e523c524d8d4321fb027bf552c6c148624a365f5eb6fcb3db2e6018f561a9c5,2024-05-07T13:39:32.710000 +CVE-2023-31234,0,1,adfd5b685c8b19295cd1ad28d9342a6ab797f798f5f63160642924351cc25ba6,2024-05-07T13:39:32.710000 CVE-2023-31235,0,0,449d00ce42470559fda6cd5f557249d2289786d9db988dc445b4da4a785efa82,2023-11-15T17:48:46.407000 CVE-2023-31236,0,0,3de36842f0d7d5af4c90d2f96438510ce2e5a8a378c75f2fff6ae2017a069265,2023-06-16T03:56:37.700000 CVE-2023-31237,0,0,9ea6c992a70fd536fccf2aee3eb9b83ec35046868686b6313e07dabea52154ab,2024-01-05T16:10:09.050000 @@ -224334,7 +224334,7 @@ CVE-2023-33538,0,0,0b4fd8c21e2d660710ef2a7384987739ad3eb61f96e16b9227f955ca26346 CVE-2023-3354,0,0,862bc4cd5fd3240c4a7eadd35341de2f97dd88cae29299dc7d0f3119dc347a60,2024-03-11T18:15:15.843000 CVE-2023-33544,0,0,9e6d80f78e40db4298dd7cf1f4fe3f60783706a7c64a6d079cdc96127578517b,2023-06-08T02:30:24.810000 CVE-2023-33546,0,0,c7cd3293781e050d42bca7ee17f22f78ebf4dc4807edba198e17d1897dc51b18,2024-04-11T01:20:24.653000 -CVE-2023-33548,0,1,44627278eb508a5a82511345258b3240cf0a47600d8f8c09bc15697ac9c4f796,2024-05-07T13:39:32.710000 +CVE-2023-33548,0,0,44627278eb508a5a82511345258b3240cf0a47600d8f8c09bc15697ac9c4f796,2024-05-07T13:39:32.710000 CVE-2023-3355,0,0,bf8f2e2213ab9d0315acf02bb3acbefe7d8167091f2a1af8149753c8e02648d3,2023-11-07T04:18:35.013000 CVE-2023-33551,0,0,43bfe49239080e93b99a41c0e71f0baa51c737526b7eac3f50eee5e70315af9d,2023-11-07T04:14:58.203000 CVE-2023-33552,0,0,1dd212c6d94471b31455682339ae3b585755fb6501372079e291a0d6cd792f31,2023-11-07T04:14:59.210000 @@ -228213,10 +228213,10 @@ CVE-2023-3890,0,0,8b0f1a2e2c6675421a4692c9b64c2bed0d012bc59ed4e6b608771dfc4ad755 CVE-2023-38902,0,0,bf9b56be84cb8e1808eaadb94d0b5ff0d1002e428402439de4d2119727134882,2023-08-23T16:55:24.197000 CVE-2023-38904,0,0,3ef41414756c078d43e73944776d15a18f9ff9bc0ecc6eade64774a4f8179f49,2023-08-22T18:14:55.080000 CVE-2023-38905,0,0,df40cc58a14265a2a3f14db3026008c7c3f94514b3c3a24514eb47ed6f7f4429,2023-08-23T16:57:38.907000 -CVE-2023-38906,0,0,13c9481b7d8b3aaa69390b4773a6f0f75dcc851f1ddbda38a46a8fc077204d07,2024-01-19T20:15:11.007000 -CVE-2023-38907,0,0,3039940e4b0b5d6f6d1cccea74cf8f151d3a3c00b485a9fb256408144b928813,2024-01-19T20:15:11.103000 -CVE-2023-38908,0,0,d32cf93ea607447cb83bd2d0206762596b8b6a9c2506739aef069fda253fd419,2024-01-19T20:15:11.197000 -CVE-2023-38909,0,0,ca3527b7fd24f9b9d0e5ed485960f28453a1b790379f1598bb34bbc2b64876d2,2024-01-19T20:15:11.273000 +CVE-2023-38906,0,1,e7b4b93f598441f1dab90d21949621d9df6edf0066dee10147672a287acbffdd,2024-05-07T15:15:08.110000 +CVE-2023-38907,0,1,da85d229891384fa30fdaf6eaacf1325fb4094b7013756303c49a7ff93bb5486,2024-05-07T15:15:08.250000 +CVE-2023-38908,0,1,81701dbdfc46c1891eaf071e777c07f7fd5ca0772c81b6b6c644ce43bb8b5c2f,2024-05-07T15:15:08.350000 +CVE-2023-38909,0,1,cdb9187b500cd084cc211501e51acc81e73f9e9b4aedc1e6e437c5d609ccd4d6,2024-05-07T15:15:08.433000 CVE-2023-3891,0,0,9e1f6d30938080f1eb44a4b977a3c1be0cd44658dd5595dcbab492e639cb2338,2023-09-20T18:55:02.363000 CVE-2023-38910,0,0,7d613e14f2c3f984ca9a3c9da17d5f723287fae066bd7a465f708354967e2cac,2023-08-22T00:58:18.610000 CVE-2023-38911,0,0,82a232b015c314242065c66e1353e672c7ab411275c4cc10b1c8fd66da310b81,2023-08-22T00:58:46.030000 @@ -229456,7 +229456,7 @@ CVE-2023-4053,0,0,9787b30a0ef7d7cf973a583af17f7d010dcb2bb33d0c223bb76d4a1c297415 CVE-2023-40530,0,0,21cacd9fb10ef624626a204e9c8129f4ca480d965c3773bc34cf254a0cabcffe,2023-08-31T16:29:12.807000 CVE-2023-40531,0,0,11c7b73527e42cdd3db8f2c1d2b037aff1fdef1beab5f14aad46252f86ee7a63,2023-09-11T13:42:39.903000 CVE-2023-40532,0,0,db222b38a4f974689b91eda1581b15889aa08c13350a30489ae75d231e0a63eb,2023-09-28T14:18:03.137000 -CVE-2023-40533,0,1,74604f18c8cfae49610e4c74aacfdc127bf675bb31b57a4da42d1902026402bb,2024-05-07T12:15:09.223000 +CVE-2023-40533,0,0,74604f18c8cfae49610e4c74aacfdc127bf675bb31b57a4da42d1902026402bb,2024-05-07T12:15:09.223000 CVE-2023-40534,0,0,b373d4682c6281ff566b9bd7e2d50ff0a4a1ad35bb4fad887d43e035a0a0f7c2,2023-10-19T16:08:42.063000 CVE-2023-40535,0,0,65c755be28ea6f1cd3238d546e4572d48154f16f53855d7a36a0bf39f6134420,2023-09-08T18:49:20.803000 CVE-2023-40537,0,0,916c6a425f514cfd905244cc37fbdc6e4f0f4c6dc191df586bff22adece1466b,2023-10-19T16:43:11.323000 @@ -233084,6 +233084,7 @@ CVE-2023-46007,0,0,6d540cf7917d33d1f9d983e500b20f05d5c29bcca54bb5f0e94646ac8afd8 CVE-2023-46009,0,0,1eea79869ff9979be475d14a391a108d5bb4d81ac6b06bd913ba7c8e20cd6553,2024-03-01T06:15:48.187000 CVE-2023-4601,0,0,6769fd6a42be6e49717a30413418f1331d95f3a7efb61d44991f6c94c2c61c8d,2023-10-28T03:47:10.133000 CVE-2023-46010,0,0,5c3101c7e3486cee898c26544050cd1e4dac93f563bf83b1f90e9001eb81a654,2023-11-01T17:22:21.600000 +CVE-2023-46012,1,1,db20ba4c77ae4a725206900f2ba07341f8e45798d4b628ca9be8884e939fccc2,2024-05-07T14:15:10.003000 CVE-2023-46014,0,0,d4729429d3274daf3dacb04f38f72ea86d397cc5ddcddf9cf33a1c589166a976,2023-11-16T17:32:08.327000 CVE-2023-46015,0,0,a925f4893e8c378bbe13c70dd87f1a6e101207e6c0972bf6dc467f19c6b90d64,2023-11-16T17:31:55.777000 CVE-2023-46016,0,0,aee2ef485dc27314bd5b66585658e6faf5cbfcbe4e851aa29624c3312fd47461,2023-11-16T17:31:46.947000 @@ -235579,7 +235580,7 @@ CVE-2023-49598,0,0,f21311a5870d33c6d00267bfb1edabf32c3f3d36935aaf458c13cbd552a1d CVE-2023-49599,0,0,26bc9ca331158350ffd55dbb3e19c0f5df4aa8eba07f3e59287b262d3f247262,2024-01-17T15:14:39.320000 CVE-2023-4960,0,0,ead2f6df7dc3ef62ad43e7bf5719f8fc950bb797ad00a312f90d4c48e90fdf03,2024-01-17T21:53:01.497000 CVE-2023-49602,0,0,b819540c46961cc462137affd730f87426ab2599914f382da5da66c46bfa6156,2024-03-04T13:58:23.447000 -CVE-2023-49606,0,1,1bbbe78925df82daa0a7747ef300e8fad91e18c0e2441aac076db8d5c2fb1bac,2024-05-07T12:15:09.413000 +CVE-2023-49606,0,0,1bbbe78925df82daa0a7747ef300e8fad91e18c0e2441aac076db8d5c2fb1bac,2024-05-07T12:15:09.413000 CVE-2023-49607,0,0,5d00c2f24c1ef5120519e52e04520fca38cec096180912776c98c9538a20ba71,2023-12-14T18:29:44.217000 CVE-2023-49609,0,0,cfadb254c8ff32da8dcb4f73efed6c3b90ecd1a350b850cb898b392245d841db,2024-02-14T18:15:46.380000 CVE-2023-4961,0,0,e4aa63ee50fe794744abd71721cecf1e73ef1f06e678ada5c85e909d11885a1b,2023-11-07T04:23:13.490000 @@ -238900,7 +238901,7 @@ CVE-2023-6806,0,0,f3b4a07dd94526f1cc5727f439cb459ecde0c71dc1006bd9e80e6b18a8d9a2 CVE-2023-6807,0,0,8211ca38107dc4f9b4127c6352451c7045672cf7336c16fcb14315bbd9ab0669,2024-02-27T14:21:27.377000 CVE-2023-6808,0,0,453d7720ba5e9cbfc061121430ec5679037ea2f22b990571ad72c0ac48f6ec8b,2024-02-09T16:49:29.023000 CVE-2023-6809,0,0,da849ebc66bf4be9594f5a16c6489da06b73ea4d1114ad0ea42cbcbd1d55570a,2024-03-13T18:16:18.563000 -CVE-2023-6810,0,1,c090f1bb536ad3b998163ef63cf46799e4b462d3281e6ed3c4c6820fa5bdbeeb,2024-05-07T13:39:32.710000 +CVE-2023-6810,0,1,3101b378ed04a5c8247ef1debed918ebc9eb8103dd1b234528b91dafd5921a75,2024-05-07T13:39:32.710000 CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a92,2024-04-11T12:47:44.137000 CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000 CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000 @@ -239269,7 +239270,7 @@ CVE-2023-7235,0,0,5a57373c824e0c960ebb1d7ed373397d379b4a945d30165f19c755e196b873 CVE-2023-7236,0,0,6e6e77097018fc5492b471c7ac49370efcc2a5846a727fd6ec447da2257b6339,2024-03-18T19:40:00.173000 CVE-2023-7237,0,0,2cb3706433adcf4b4550bf0863cb95155cc1f865add3f6a25d68233a7696874d,2024-04-11T01:23:42.717000 CVE-2023-7238,0,0,7187ce9bc4d8ddad00e06886245b2e662c42772077283e0d271ebcd7974e5802,2024-01-30T14:20:10.613000 -CVE-2023-7240,1,1,e7e6a81ccc38559f4df6ee13c1a40f9a16c45fc917ce13635c64737e9592babb,2024-05-07T13:39:32.710000 +CVE-2023-7240,0,1,c8028c5f2283c3d1834fed408ed706bec776a0edaef60da9c34b705dd8ae213f,2024-05-07T13:39:32.710000 CVE-2023-7241,0,0,d4fceec5a7fe5473cc271cfc706947ffdb49bbdf96c33423e2911d3a96606af8,2024-05-01T19:50:25.633000 CVE-2023-7242,0,0,db2d6d5cc91868613ca46292b47ef3b5a3c4ae96f4def2aa8c9c1271db71c444,2024-03-07T17:50:48.090000 CVE-2023-7243,0,0,c43192a066d4b9535821b574845a0af87800cbe78fe61a46f4663ee5807e93c6,2024-03-07T17:51:08.413000 @@ -240664,7 +240665,7 @@ CVE-2024-1688,0,0,00b4663231fd4363af58c5c1074d228a7c964744d2f38e0ca153752afc0e62 CVE-2024-1690,0,0,f64df43faf81ef2a8a790a9c7a5603e22ee6007009a611d7b1688df810896620,2024-03-13T18:15:58.530000 CVE-2024-1691,0,0,f122d989b2d57485de350b354a899ca74c01df04d45a49a682097dfa29b4d980,2024-03-13T18:15:58.530000 CVE-2024-1692,0,0,ef8c2f206aee0606f4bca6d6f966b02bdbb84047340b5cc369611d2c6473005f,2024-04-01T01:12:59.077000 -CVE-2024-1695,0,1,7fe18c9cbac30241384ca3bf0665e46f72ea6ee4e4c64dee52dbbf5f058010dc,2024-05-07T13:39:32.710000 +CVE-2024-1695,0,0,7fe18c9cbac30241384ca3bf0665e46f72ea6ee4e4c64dee52dbbf5f058010dc,2024-05-07T13:39:32.710000 CVE-2024-1696,0,0,99a90d5f5f3ed72de58d46078f56367f3c20ea4ece7ee2f1509d303d1823a04c,2024-03-12T12:40:13.500000 CVE-2024-1697,0,0,f12238fd2cf039d39a224b6767f588eae71af5d9fa3c34248b412c33612f7c95,2024-03-25T01:51:01.223000 CVE-2024-1698,0,0,75dca8418f9d56ec0cfe8b6a5fe8dbac72155e2590b7f1e80f716b71405b9b9b,2024-02-27T14:20:06.637000 @@ -241250,7 +241251,7 @@ CVE-2024-20818,0,0,af19f7cf2bfe5c7b118ed1ba8cb5ab4e5101b649035ef6947f4838f591d6b CVE-2024-20819,0,0,e95f6d9489be9463c30426796663bf903448c130b6751dbc9c1955025823a39a,2024-03-12T13:15:49.597000 CVE-2024-2082,0,0,1da00d13c70c67cbac7f285f62e1e9ae31630ddedf1c25e28ac44a84c5c65c37,2024-05-02T18:00:37.360000 CVE-2024-20820,0,0,64165a1c6841919f66314f55bda16e2960850deaf1751bd280429c34ada3d646,2024-04-02T01:15:51.440000 -CVE-2024-20821,0,1,2ae8c4f8f0cfa0bb9c4156f0b17d6659b61733c8e3940f63e2394fcef42f8157,2024-05-07T13:39:32.710000 +CVE-2024-20821,0,1,f2bdec76bf7af89f73cf2d8b75af153eab2536cb0fce6c013ae4b2545950f996,2024-05-07T13:39:32.710000 CVE-2024-20822,0,0,98819c10bc4ccb26ad7071c41bcb0ec9515bc16477a819737e98a30f68f61abb,2024-02-09T17:30:17.653000 CVE-2024-20823,0,0,6f9e92713ae3566f4ff641bdca0209f8f9dd0eb39f9e9ca31277f9552beefba5,2024-02-09T17:30:06.773000 CVE-2024-20824,0,0,e999a6032be9250359143914aa49fcd31e6ac7c99ceb57a4324f9e75baeb901d,2024-02-09T17:31:03.593000 @@ -241287,25 +241288,25 @@ CVE-2024-20851,0,0,297204ff3342a0021fed72f789d061868b3c384706199689d6e8354fbcf49 CVE-2024-20852,0,0,dbe0d512055041a9852263beae871d6f46b7f7bc092fee634563eb7a16f7bbd3,2024-04-02T12:50:42.233000 CVE-2024-20853,0,0,21647721741a24bcef92dd57781f3a2cba514b2f44535681c89171caa34d7468,2024-04-02T12:50:42.233000 CVE-2024-20854,0,0,a8ee7f368d46d792404f5081c6231f71ce96557f0887c2cbc687cba899ce3bce,2024-04-02T12:50:42.233000 -CVE-2024-20855,0,1,abf7dd3244cf280e0e7bd1fb2c41ce076f26335ba98783ca945ed54adf8c5291,2024-05-07T13:39:32.710000 -CVE-2024-20856,0,1,5a27b269d9d70e31351e7ae3bcd319b86c0f2ee81fab615abbd0775ca5595ae7,2024-05-07T13:39:32.710000 -CVE-2024-20857,0,1,24b9af38bffa656d1bca3a5b963a1b783d3129cf757129280fa7f22261ea66d3,2024-05-07T13:39:32.710000 -CVE-2024-20858,0,1,215b81ffe37f966bf0e10599b0f862bdec13da0572f4d0a7c2b1faf45d853ed0,2024-05-07T13:39:32.710000 -CVE-2024-20859,0,1,bc3a7ead23bf12249caf07a1bc99ac89a9bc8a458fb28efdb40de0520fdcc9ea,2024-05-07T13:39:32.710000 +CVE-2024-20855,0,1,5a31d8261ac9fb93e3fbd9d059170791e8715d725754bcfb29b0adc00d13410e,2024-05-07T13:39:32.710000 +CVE-2024-20856,0,1,1c592c9e4d319305b2170b4872282564ba94b291068e185ac30629ca62d7d510,2024-05-07T13:39:32.710000 +CVE-2024-20857,0,1,4bf646193b847c650d0fd5cc8042165e642140e87639a78791056f42e042659d,2024-05-07T13:39:32.710000 +CVE-2024-20858,0,1,365ded7c9719d06412d3536df096076e93235858bcda7feae2a0b0302afff1b3,2024-05-07T13:39:32.710000 +CVE-2024-20859,0,1,faa73fa4e0e021bacabbe322b4cc2aef17f24bb376d16ca5cb2baec65e4d0977,2024-05-07T13:39:32.710000 CVE-2024-2086,0,0,593e47a6623f413790b465bc3b99a950a75ce5580beddc3dd255ab6599671f6d,2024-04-01T01:12:59.077000 -CVE-2024-20860,0,1,212d6a3b6e2276206ded4b627b73366319e6a63dc0bb56005aa75e931d216374,2024-05-07T13:39:32.710000 -CVE-2024-20861,0,1,5c8d925653de5f24c278b71f10a7782291fdfbfa2f698e6ed4fbc3956b72b55f,2024-05-07T13:39:32.710000 -CVE-2024-20862,0,1,344d145ee115dedf9bb4d6ec73fa6db81ce042163637414e3fe17be8ffae817f,2024-05-07T13:39:32.710000 -CVE-2024-20863,0,1,f4f3ddc37c315344512ad957df85f40e1d3de2caf8e15b75b22f294fffc0036e,2024-05-07T13:39:32.710000 -CVE-2024-20864,0,1,c0c6eb5747571dddc4affa3508e0d83b74fe8d29b92bda12c6f2a13da8905203,2024-05-07T13:39:32.710000 -CVE-2024-20865,0,1,0b4e33abf6a914cbe0870270ca92ad4abd3a0e74ab09e59640fc91fe066cca04,2024-05-07T13:39:32.710000 -CVE-2024-20866,0,1,a8fd4a1fcbd4782df59e8b61a84a3d55e13ce68d38e2b0f99f31affdb3acc9e7,2024-05-07T13:39:32.710000 -CVE-2024-20867,0,1,cd705404a9812e0f73aa3ce26c5e30f498818bcbc2fed3b547aa4721a6b70b78,2024-05-07T13:39:32.710000 -CVE-2024-20868,0,1,69246330a7bdba6be53f72a296a7111b7e50f14804cddee20f8801b074c3947a,2024-05-07T13:39:32.710000 -CVE-2024-20869,0,1,bdbe1b6ea61ede5aba43b9a63e966809633cc70df6dfa05beb38e28c36d28e40,2024-05-07T13:39:32.710000 -CVE-2024-20870,0,1,c2bfc61cca6463242d8ada003b148362bf8b972a364195dff6605d51676909cc,2024-05-07T13:39:32.710000 -CVE-2024-20871,0,1,01640e6055c127167e1bec157d1b484d5b01023057aae49c178af50b06ea3a52,2024-05-07T13:39:32.710000 -CVE-2024-20872,0,1,75ff1ce26d44926e8add13daefc47dd59f4cd8ff23559d81da24f383db836c64,2024-05-07T13:39:32.710000 +CVE-2024-20860,0,1,833d0df937164a52b771b2f7c02b69469462d810f4481b6476ba29c5f6e981cb,2024-05-07T13:39:32.710000 +CVE-2024-20861,0,1,794576e650b0f3309f10dc4ffd901d857a354f8ba5cee5cf4cd98ea3135ca365,2024-05-07T13:39:32.710000 +CVE-2024-20862,0,1,05d7570db3a1cde070e21472d5fd69b5830764f3a5425aca7a4a496d4095af5b,2024-05-07T13:39:32.710000 +CVE-2024-20863,0,1,dab3717abd5b9267afb4abcddb5b1b579970bcadda744aaacf88dda6202baf58,2024-05-07T13:39:32.710000 +CVE-2024-20864,0,1,efa6fa2b23ca50b4cd485f4853889cb39291f2ae822fa96cda394c5298a1d7d0,2024-05-07T13:39:32.710000 +CVE-2024-20865,0,1,b88b18d01269cecb6d4e01795ba44f2e59ecd8836bad073817623026acbd57c6,2024-05-07T13:39:32.710000 +CVE-2024-20866,0,1,58d3db3c436cd4edcfbee612570f2e77cc32989fe5de8d87bea6a0e56551a1d4,2024-05-07T13:39:32.710000 +CVE-2024-20867,0,1,0e6b5e18a9f86247a6a1090b01cf596581daded4155bfbc09972d6cdc5714d2a,2024-05-07T13:39:32.710000 +CVE-2024-20868,0,1,23d1ca1dba7a2ad9810a7b603f4dc59801094aa235b5516b22a3aa3c056e5066,2024-05-07T13:39:32.710000 +CVE-2024-20869,0,1,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243546,2024-05-07T13:39:32.710000 +CVE-2024-20870,0,1,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000 +CVE-2024-20871,0,1,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000 +CVE-2024-20872,0,1,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000 CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000 CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000 CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000 @@ -242289,7 +242290,7 @@ CVE-2024-22459,0,0,080f34b8e7c0260f0594dad3190a87f1b9dc1d3f20b007347a68c39e9679b CVE-2024-22463,0,0,e06d0fc84faf19f9d1987e144eee2bee02d608165b7a56c96c529a1ee137e834,2024-03-04T15:35:25.673000 CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000 CVE-2024-2247,0,0,d47546a6b73ddee0cb6fd88f3ec9a57023bd3004d425b99bc080c7d9ccfa2e42,2024-03-14T10:15:07.027000 -CVE-2024-22472,0,1,b89a95f2a1a16438186a46e67a4c65c3f9f2396af8e1dfc32977d99e3e11e6a2,2024-05-07T13:39:32.710000 +CVE-2024-22472,0,1,4ab7182b892f9b0334d117f1f559304c9baa050ae6c095fdd3688919803d9fc3,2024-05-07T13:39:32.710000 CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000 CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000 CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000 @@ -242961,7 +242962,7 @@ CVE-2024-23804,0,0,aaddc8b077c906317cfa8e521b86ad623b3f3e2ab478a4e0f77aaba9dfb60 CVE-2024-23805,0,0,1d90a5040b1edecdd83d7e40e4948dc26b952fad0f84f463a88867b10bbf10ff,2024-02-14T18:04:45.380000 CVE-2024-23806,0,0,3c7dd05f0d84cb4b37bdcdbac4571706a903d21147ebee955315287ef797b6ba,2024-02-15T05:01:56.693000 CVE-2024-23807,0,0,df12edcc395b0843ea97d6f3fbf434aff9cef06784aae4873fcae58a24a3d141,2024-02-29T13:49:29.390000 -CVE-2024-23808,0,1,e4ea908a673bd7a1aaa55e1b7fadca453eb09780caef5bff8365109f98095956,2024-05-07T13:39:32.710000 +CVE-2024-23808,0,1,5be188e2ed229b6d1c42bb6f499af717d633f551dde12260911eb0c8cbdc2703,2024-05-07T13:39:32.710000 CVE-2024-23809,0,0,e4465b9152c477fa0b8b9ba353cffba5c3ae3843ad0f849fa715a6b77d4c4ae7,2024-04-02T15:15:53.217000 CVE-2024-23810,0,0,fcc523095813c9aa174bae9d5d18aa598f3c0429a0b756712e53ba2ee896842a,2024-02-13T14:01:00.987000 CVE-2024-23811,0,0,626bc7786e498ad37af14e3917801ad7d39c61c22419a48d031d889eeb5a7ea3,2024-02-13T14:01:00.987000 @@ -245063,7 +245064,7 @@ CVE-2024-27211,0,0,18a4fb425205868a4eaec308d0eef6e2f3454a5b2c2908d8b6e292778bde1 CVE-2024-27212,0,0,8b542e0613f1e0f6bcd156d0337a4f6e89ee1dcb82ff0694045f78e4a68c7c58,2024-03-15T20:15:08.910000 CVE-2024-27213,0,0,33892e4d94d0b54e6d4249626fe053cc0b69e36c215b31fa7aad394b0392111e,2024-03-12T12:40:13.500000 CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000 -CVE-2024-27217,0,1,9affc301c0d73f5b5d352af55d1168545c757168fab77b2151f5cfb89c453b78,2024-05-07T13:39:32.710000 +CVE-2024-27217,0,1,25a1fc7fabcc75fc807bf6a5db3f5c89cc55eb85ba089fca9a9406f8ad59992a,2024-05-07T13:39:32.710000 CVE-2024-27218,0,0,c7e909155330ee918ef1bfc60d0a60842268f5244100d74ebd3f7830cb6dafd2,2024-03-15T20:15:08.960000 CVE-2024-27219,0,0,7a0a76842ad14d87eee010cdcc49f2a5889b1688d4e2b22f53088926c2436c2a,2024-03-12T12:40:13.500000 CVE-2024-2722,0,0,4472c421148aed40b9ad9d2bd6309a877d23ad4a39ab06bc594f81babbe2f7cf,2024-03-22T15:34:43.663000 @@ -245510,6 +245511,7 @@ CVE-2024-2813,0,0,3865aecff2b91b62589698cb7c5e00900ba25735c720a1f987c1446276b2b6 CVE-2024-28130,0,0,cbec5f7662fe045bb02cd420ce819fd5bf0b6932c239a81cf021f71390340ca7,2024-04-24T13:39:42.883000 CVE-2024-28131,0,0,71ad2488de19c24d1ea9f5cf9bb09689eb95070aa628709b8cf1a59fb2b5934d,2024-03-26T12:55:05.010000 CVE-2024-2814,0,0,5e97abae59e20490512eaa4d4563fb81e8669546976139cfba889d604f681692,2024-04-11T01:25:37.477000 +CVE-2024-28148,1,1,1f334143a01e00b749c0f15afa7ad62f70f5fd441fdc9b18d597dd91077a344c,2024-05-07T14:15:10.103000 CVE-2024-28149,0,0,41104aad52a41f735bff830317158bdc9ba92207034c216d3619939dc1f50d3c,2024-05-01T18:15:16.697000 CVE-2024-2815,0,0,5fcd9bcf87c81d43d417a572f612813115fb87bda28605b295db5da996c4b852,2024-04-11T01:25:37.570000 CVE-2024-28150,0,0,8f73eeb6d8dfd3e2b21f5672a6d045b793eb4817035deb2939de0c9c1177c467,2024-05-01T18:15:16.747000 @@ -245776,7 +245778,7 @@ CVE-2024-28716,0,0,233ac8d363ac194959e51b7b6e78a16c94cfcf615e05cc4cca6cee73b40ed CVE-2024-28717,0,0,f3e85174e10e6b2a875251d258bba0061735240c3fbf9f5c26ab3fb13ae8132b,2024-04-22T13:28:34.007000 CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000 CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000 -CVE-2024-28725,0,1,5d6528e8744d76688217494d6011ccce2f402c87e1721e307b2ae6f6dd89ec12,2024-05-07T13:39:32.710000 +CVE-2024-28725,0,0,5d6528e8744d76688217494d6011ccce2f402c87e1721e307b2ae6f6dd89ec12,2024-05-07T13:39:32.710000 CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000 CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000 CVE-2024-28734,0,0,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000 @@ -246012,7 +246014,7 @@ CVE-2024-29126,0,0,0b79b403693aaf9c7e5913e80ff094ac46679e95aebf4152f34d3ef9f7148 CVE-2024-29127,0,0,e9f78e19445942ea45feb1efb6740d368decd0d9fd92fbb7f6217ca73bcee889,2024-03-19T14:31:27.883000 CVE-2024-29128,0,0,d04b46dfc40328b876fdc916a43fa7604fa03f240de5b2e8b86271d20186b1ca,2024-03-19T14:31:27.883000 CVE-2024-29129,0,0,a7c8734a1d99d99da881b37063436fc7d70f1e96d6183e82074470bef23a602e,2024-03-19T14:31:27.883000 -CVE-2024-2913,0,1,11365a40ae478e4f27dc855796bfa3016510ca9ac036c5e9fc77bf6b3c451f0a,2024-05-07T13:39:32.710000 +CVE-2024-2913,0,1,57384cfe83d625c12223f74456bcf5c1bb18f28b7413731c95c28c9d3fd49a41,2024-05-07T13:39:32.710000 CVE-2024-29130,0,0,ce58c0744ffcb2d9cf875af96e8272ed1e3181995922f97c96a8939275c844b7,2024-03-19T14:31:27.883000 CVE-2024-29131,0,0,6dbc951f2aa0a9755b2bbdaa4d19905af93dd93bd4d25c017134d25c3898b424,2024-05-01T18:15:18.090000 CVE-2024-29133,0,0,6d247a2a3b8929a01a554821f00c7bbb378a28b457c9c68818a91f35f629cc39,2024-05-01T17:15:31.283000 @@ -246335,6 +246337,7 @@ CVE-2024-29883,0,0,2b273945f2fe373c1b813e8632fabdd32ad73b5047625c95bb74eb36bf061 CVE-2024-29886,0,0,f5b2c9f6684cda9bf24c98d4026d908adcfed51ea0d73992d07eab4a69ba7ea0,2024-03-28T02:01:21.693000 CVE-2024-29887,0,0,3c169b291bd201b76db21cdc6bc1993eb4e303abce042e0ed9996949f9bbc40e,2024-03-28T02:01:13.303000 CVE-2024-29888,0,0,5b6ba13db8aac1230b401585872523e19bc778561fe0a48fb1eb3f88b621dd8e,2024-03-28T02:01:13.303000 +CVE-2024-29889,1,1,def01bf097f489cbbbe47086e903f908086d9ad44741049218a625c235821727,2024-05-07T14:15:10.330000 CVE-2024-2989,0,0,985e790440accc4b745af83479155b6a6b46fe3ff8cf140b5b808b1078518e6c,2024-04-11T01:25:44.177000 CVE-2024-29890,0,0,323e289288096e79423f991b34b54769daba4b9ed11a0f9953eb686c77f03631,2024-04-01T01:12:59.077000 CVE-2024-29891,0,0,e9e9eeda5be8e5bab460a9a5c404e594ba98dd74ce43f0bcc6e6f38c530b911d,2024-03-28T02:01:13.303000 @@ -246386,7 +246389,7 @@ CVE-2024-29935,0,0,be0415ab39e2424d7707b3e026043937bddf40f9f881b75f312fe4db29a75 CVE-2024-29936,0,0,a0aa951ea6a61ca1da8503010b43db132d71646708e0e57d95e11fe2a44ec10b,2024-03-27T12:29:30.307000 CVE-2024-29937,0,0,cdd1fd1a57199ebd6cafb76fa77d6bf4c6b90236c50377042f461f6ac9babff6,2024-04-11T12:47:44.137000 CVE-2024-2994,0,0,de6c04df0e9f8de4e560093b2cf89202918172d57c506b82e636ef6cb9957d81,2024-04-11T01:25:44.640000 -CVE-2024-29941,0,1,6084f897c7cd075e0dfc987f459645d6f91da81f7dbae53a5872c0eeaace3ad0,2024-05-07T13:39:32.710000 +CVE-2024-29941,0,1,c8366f83ecfc48c2afbbe69788063c4363da34d25498360032e4073eb86672a9,2024-05-07T13:39:32.710000 CVE-2024-29943,0,0,7068f3aaca8e1e080468ea07f9763f838e8d9ceb1f502d8b2bb56d270ef56f2f,2024-05-01T18:15:18.933000 CVE-2024-29944,0,0,59ef64fc7119589746b7ad82f7cc667d1e8ed3ea80b24b438153f375cffbb5e9,2024-05-01T18:15:18.987000 CVE-2024-29945,0,0,216b7153a77839bedb4bb1c536945361a5963d79dfd22094fc46f227d0975c54,2024-04-10T01:15:18.693000 @@ -246933,7 +246936,7 @@ CVE-2024-30926,0,0,800c22b0daa9f7d2b9aeb1272151dd94a2cd3ce872169a6858767bbe8e780 CVE-2024-30927,0,0,7f5fb9dbb74187186c12e2f8edd52380a2fe14d4923fe303fe1e826ee9046ff5,2024-04-19T13:10:25.637000 CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000 CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000 -CVE-2024-3093,0,1,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000 +CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000 CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000 CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000 CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000 @@ -246945,7 +246948,7 @@ CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e CVE-2024-3096,0,0,13c78a6e73aead16232dc164a15de56938b00baab3c6940a2000c803dd2e4bee,2024-05-01T17:15:37.723000 CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000 CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000 -CVE-2024-30973,0,1,86223a603c66c29c271be7b4b8c9e7a80922cbcc5a85e7a1487a497e11c0be84,2024-05-07T13:39:32.710000 +CVE-2024-30973,0,1,60d233d75a25952277335789c679aa444f3525d6e5b6af0f3b5901b26ae4a555,2024-05-07T13:39:32.710000 CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000 CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000 CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000 @@ -246989,7 +246992,7 @@ CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c794 CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000 CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b3114,2024-05-02T18:00:37.360000 CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000 -CVE-2024-31078,0,1,5275efeb1b6fe40a14652836f5d9cde19c9d5a7c3b068f27cc054508562ef312,2024-05-07T13:39:32.710000 +CVE-2024-31078,0,1,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000 CVE-2024-3108,0,0,0d66f03cf377bb2d07f802576b4c74da72215aae418a6da84f3f123e5c208eaa,2024-05-03T14:17:53.690000 CVE-2024-31080,0,0,f054913239e9fff00b61da9bc96b207964c9acbdd383172b674082b38bf77b8e,2024-05-01T18:15:22.810000 CVE-2024-31081,0,0,136635ec06154c204154356b9c36d8a3fc773c3e25bcb66a4a971f2dbdc8623f,2024-05-01T18:15:22.920000 @@ -247059,7 +247062,7 @@ CVE-2024-31219,0,0,d2d2811e70f71b6e8f1f63a3f7bda6856d7eb5bcd23ce2727f866e79d3b49 CVE-2024-31220,0,0,5364fec01a2c522837b9bb1f12dd2e109f09573a57ee59445d858fa07dd681f7,2024-04-08T18:49:25.863000 CVE-2024-31221,0,0,093d7a2a638171e5d3f8cc3b06e5a6b3ca8a7674a42c7ed40ef62927f76d1926,2024-04-08T18:48:40.217000 CVE-2024-31224,0,0,2f84ceb3d774709c2492171042eddaeb6b6b98a31b06a1f67434414d962c7206,2024-04-08T18:48:40.217000 -CVE-2024-31225,0,1,5752a2a442fe279bccc3b7ddc7819796c22970000c602eb85a11b0aa1dc0b196,2024-05-07T12:15:09.507000 +CVE-2024-31225,0,0,5752a2a442fe279bccc3b7ddc7819796c22970000c602eb85a11b0aa1dc0b196,2024-05-07T12:15:09.507000 CVE-2024-31229,0,0,7de33a876b6efca66be6426e83eb27e50104659e2ffe406707b9d46bf22d8ac4,2024-04-18T13:04:28.900000 CVE-2024-31230,0,0,52cfa4cc0c105e0f4a014468a390d1fae46fb176c8f9a3fd8a419c5888fe92a6,2024-04-10T19:49:51.183000 CVE-2024-31233,0,0,d489633661459fa8fba7247a4e042c4067793ed99651e43e0cd0674db1c81416,2024-04-08T18:48:40.217000 @@ -247207,6 +247210,7 @@ CVE-2024-31452,0,0,45e5c903cec7cbe18673da15b04f8c57c9e71a7a28162860a533aebab0360 CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000 CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000 CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000 +CVE-2024-31456,1,1,4d733cb2c8933ced63265d9a109ee6a67d0b98d29b060ebe1a70c2b2f1594386,2024-05-07T14:15:10.550000 CVE-2024-31457,0,0,aff1a7801fbb865d930cb2fb46573de892421c651bc9c2a65dfb3d401e53fdac,2024-04-10T13:24:00.070000 CVE-2024-3146,0,0,1cbea39c0b5c8d0d8af37ab4c1019f1ec3a190542aee7f2e86ced34d06f5796b,2024-04-11T01:25:55.180000 CVE-2024-31461,0,0,767e617f714634fb260487a93ce2566660f42b8ac8c16cf9a8eaae2e849cbeef,2024-04-19T16:15:10.293000 @@ -247397,8 +247401,8 @@ CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02 CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000 CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000 CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000 -CVE-2024-32017,0,1,c47f78232c4c3749a77898f284cf5dd751f8e553e59dc7410a9242dddea7ca2b,2024-05-07T12:15:09.593000 -CVE-2024-32018,0,1,ed367d82895b9d9075702d5ab3b6c086d7325180d4e88bf52d874df7314b6c9a,2024-05-07T12:15:09.667000 +CVE-2024-32017,0,0,c47f78232c4c3749a77898f284cf5dd751f8e553e59dc7410a9242dddea7ca2b,2024-05-07T12:15:09.593000 +CVE-2024-32018,0,0,ed367d82895b9d9075702d5ab3b6c086d7325180d4e88bf52d874df7314b6c9a,2024-05-07T12:15:09.667000 CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000 CVE-2024-3202,0,0,3543d902eafc8c4c40bfe450a4b784b21d5eb2e30d7be93129e4c6731c6d0980,2024-04-11T01:25:55.733000 CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000 @@ -247557,7 +247561,10 @@ CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75 CVE-2024-32358,0,0,4361acd373c6387e4e9f8c587956d55ed79588179fa5465dd154715a342d96e5,2024-04-25T17:24:59.967000 CVE-2024-32359,0,0,b4d29b953e327824af6c91976648aff102dd83fb9c76233181d51fd1f9cb1231,2024-05-02T18:00:37.360000 CVE-2024-32368,0,0,e5f9ac1f5e4b7deacae1b8adfb72b39f31c0e06e3a2c110e19b743f4b05d773c,2024-04-22T19:24:12.920000 +CVE-2024-32369,1,1,fd6352ea14f58b0f271e42d3c75bb120c5a6c7b04bee43e1b46f7721712c871b,2024-05-07T15:15:08.520000 CVE-2024-3237,0,0,a7f77baf4ea920e0a476bb9398bd9c23d610a4f066f0a85817137f6854639dca,2024-05-06T12:44:56.377000 +CVE-2024-32370,1,1,f8f0d606d58f4f7f6b91610addc88b801e211b038db657218245b7431ab38587,2024-05-07T15:15:08.597000 +CVE-2024-32371,1,1,17344cf4dfe2c66216b4f61f3b9793b96c7ed1b8cb7ff77de8905ac2e655f56b,2024-05-07T15:15:08.653000 CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000 CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000 CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000 @@ -247757,6 +247764,8 @@ CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb322 CVE-2024-32660,0,0,2b6893745d0df7661f2e37660ac94578f9985808468863ff8b86e7efb0633a68,2024-04-24T13:39:42.883000 CVE-2024-32661,0,0,0b4f6f6bf08605ad36c3697d5c10f022921cc6cf1c11c6d2a8c37ca647145a89,2024-04-24T13:39:42.883000 CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4ec18,2024-04-24T13:39:42.883000 +CVE-2024-32663,1,1,a690ef3b5b17bef27c427355893a78667914c67c065789e9e38f8915d1fed449,2024-05-07T15:15:08.713000 +CVE-2024-32664,1,1,dfcf217e0dfa158ebf1d84f74046f62642f4a355ef311c10e2d5090ab74b6217,2024-05-07T15:15:08.937000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000 CVE-2024-32676,0,0,3585205cf50aeb554d2a389a3c92c05231728f39aed4a3ec7d0a9db1453b1c81,2024-04-25T13:18:02.660000 @@ -247846,6 +247855,7 @@ CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932 CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4676,2024-04-24T13:39:42.883000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 CVE-2024-32866,0,0,20522d9aebf09a5d43cbab0aa4b3dc9ed937958cfd0ea9d3803e03cb59093366,2024-04-24T13:39:42.883000 +CVE-2024-32867,1,1,f7d15de1501ebc4f0522be086f34b55c69ad4504c3eb5ac370f6749aa94cf9c0,2024-05-07T15:15:09.143000 CVE-2024-32868,0,0,ed4beb9301bd2682ab27b10353d7158266a640938b5fd2758f3ebb745eea4605,2024-04-26T12:58:17.720000 CVE-2024-32869,0,0,0e473f01ce255dcdc5f11b871766f1c1758b18f6cf26ba19adbc6c7e41a0ee7b,2024-04-24T13:39:42.883000 CVE-2024-3287,0,0,2931e418698389557efec190f461462acdf2a1c0b7ebc46c55a5a74f6f678a7b,2024-05-02T18:00:37.360000 @@ -247903,10 +247913,13 @@ CVE-2024-33110,0,0,2fdbb6d02980c9f3e1fa4804c98683e39019b62fc282cbeaec08a4d5ae9de CVE-2024-33111,0,0,d601ea56564c0f51c21c02b085600174c929f48bb58d4974d7158465b8d78895,2024-05-06T16:00:59.253000 CVE-2024-33112,0,0,dbcd84d30f55157f3580af0bc9df4e9ec13d32c09118a2513b547c834b9fb0f7,2024-05-06T16:00:59.253000 CVE-2024-33113,0,0,fb9a754c446bd5781c14f13124ea6a5ad5288a7a6262e75f906b014a83614e62,2024-05-06T16:00:59.253000 -CVE-2024-33117,0,1,1141f5bd55b81d658c6e3c7994ad48fc5e0cf3dec4b9ba799562c98fbb5ae9de,2024-05-07T13:39:32.710000 -CVE-2024-33118,0,1,ac34c28b0f9855a32e215f883b1aed7f164e30a3dc6b5ffd7f9c6f2ff28b9096,2024-05-07T13:39:32.710000 +CVE-2024-33117,0,0,1141f5bd55b81d658c6e3c7994ad48fc5e0cf3dec4b9ba799562c98fbb5ae9de,2024-05-07T13:39:32.710000 +CVE-2024-33118,0,0,ac34c28b0f9855a32e215f883b1aed7f164e30a3dc6b5ffd7f9c6f2ff28b9096,2024-05-07T13:39:32.710000 CVE-2024-3312,0,0,600190b8b1b98d908237811e0b165781ecf00c4b37f62f7ea411c1ef102136dd,2024-05-02T18:00:37.360000 -CVE-2024-33121,0,1,a062e45141ba707414d4b0cabfd8c30afec0fd96441288a3da042ff169c24117,2024-05-07T13:39:32.710000 +CVE-2024-33120,1,1,367818054670470a12271e5429a6a7cd3b7b85ee69ec764bd56da986a53b5de2,2024-05-07T15:15:09.353000 +CVE-2024-33121,0,0,a062e45141ba707414d4b0cabfd8c30afec0fd96441288a3da042ff169c24117,2024-05-07T13:39:32.710000 +CVE-2024-33122,1,1,4f662425157b1d77179c7810cf5a3aa23654f5ea6e0ee5c9caa14c0c83491053,2024-05-07T15:15:09.417000 +CVE-2024-33124,1,1,20d4dab979bb7843f0c5aa0442e063eb9419c02e0e84a1f97c30a633884144a0,2024-05-07T15:15:09.477000 CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000 CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000 CVE-2024-3315,0,0,b04b498365bf550d192eb8f6355a94ceb3682fd952e63a5ca20359721d079b72,2024-04-11T01:25:58.317000 @@ -247985,6 +247998,7 @@ CVE-2024-33429,0,0,a8c998123b524ea49b295a5500fc8c6d4ba14ca4f9af69ccfbc5cd4926bf1 CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000 CVE-2024-33430,0,0,1bdac97a272b556d66774c83b6b8c517f39c5a8905e843160e381ea022d71681,2024-05-01T19:50:25.633000 CVE-2024-33431,0,0,5986fe6c65cec4f439551162bddebc0d25402085e567befaeb51ade3480d9475,2024-05-01T19:50:25.633000 +CVE-2024-33434,1,1,8d8d54f4b744dfc11ee0ee0517167bd4a9d7ea6bd25cc6e246b5b45c658073f6,2024-05-07T14:15:10.760000 CVE-2024-33435,0,0,3e0c971a04385b3ffb3c64bb77cb05b33804069513b05364eced055a4dc4fd72,2024-04-30T13:11:16.690000 CVE-2024-33436,0,0,701c454e4625ea3667a2a4c57b2b8813ef0906b2788ee031a4fb999b217c8733,2024-05-01T13:02:20.750000 CVE-2024-33437,0,0,1ec2ac47d7b1ab44be8b75609a46c1e8607276ea4a6f55841f41e488acd680a8,2024-05-01T13:02:20.750000 @@ -248034,10 +248048,10 @@ CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000 CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000 CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000 -CVE-2024-33570,0,1,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000 +CVE-2024-33570,0,0,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000 CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000 CVE-2024-33575,0,0,ba650f18eda31a51989bac6516ae56cab367e4b24de4dc251d448b46a52e51ca,2024-04-29T12:42:03.667000 -CVE-2024-33576,0,1,afeccf39ea64ea858ce0f73e9ac8d3f7813955ee6b94e1666af6f7ba451357db,2024-05-07T13:39:32.710000 +CVE-2024-33576,0,0,afeccf39ea64ea858ce0f73e9ac8d3f7813955ee6b94e1666af6f7ba451357db,2024-05-07T13:39:32.710000 CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000 CVE-2024-33584,0,0,6d7dee1507503c0af4ba1324f7b4ab2bc1354ebe6068cc4c504f0a0ba046981a,2024-04-29T12:42:03.667000 CVE-2024-33585,0,0,837ce5babfebb1512ee13fb227ab0484b75f13fa24da494e01fcfeae343002c8,2024-04-30T13:11:16.690000 @@ -248055,11 +248069,11 @@ CVE-2024-33595,0,0,9c0a5e357485e97bd37e4a8a4c64b78a12bc525f19900b053d25792d45335 CVE-2024-33596,0,0,b3721b937a96269507cd9ddd114ba8a363a11b6063a18e3be1015bcf017e8cae,2024-04-29T12:42:03.667000 CVE-2024-33597,0,0,73ad27e9a74492edae643f04b7bfaa672e2650fc44661d9f5727922b2ebdac6e,2024-04-29T12:42:03.667000 CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e18e0,2024-04-26T12:58:17.720000 -CVE-2024-33599,0,1,9c222b70e190fc4cd86b3eab3d2845025c20bb26f9dde6453be9593bd2c1a037,2024-05-07T13:39:32.710000 +CVE-2024-33599,0,0,9c222b70e190fc4cd86b3eab3d2845025c20bb26f9dde6453be9593bd2c1a037,2024-05-07T13:39:32.710000 CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000 -CVE-2024-33600,0,1,392d663a20e37ea99d531b2d1494f9731213af52e8d86eceeba8709856ff36b8,2024-05-07T13:39:32.710000 -CVE-2024-33601,0,1,677e02c7b9a7354d12f1558cb835f8d17e5599681a196d853572e599231ef4d5,2024-05-07T13:39:32.710000 -CVE-2024-33602,0,1,15d94cc4914bd563b5cebd7d733d131cd923c30c1c31fb52ef556530a056ad7c,2024-05-07T13:39:32.710000 +CVE-2024-33600,0,0,392d663a20e37ea99d531b2d1494f9731213af52e8d86eceeba8709856ff36b8,2024-05-07T13:39:32.710000 +CVE-2024-33601,0,0,677e02c7b9a7354d12f1558cb835f8d17e5599681a196d853572e599231ef4d5,2024-05-07T13:39:32.710000 +CVE-2024-33602,0,0,15d94cc4914bd563b5cebd7d733d131cd923c30c1c31fb52ef556530a056ad7c,2024-05-07T13:39:32.710000 CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000 CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000 CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000 @@ -248136,6 +248150,10 @@ CVE-2024-33768,0,0,0791da19a973c725c5712ab1092941eb1087a449fcb98acf7c76b570d62aa CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000 CVE-2024-33775,0,0,ac6a91cce7dd410c87c357ff8a5fa6fd6e4ed140c42f5f7a0a578039144c916c,2024-05-02T16:15:08.243000 CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000 +CVE-2024-33780,1,1,451be84c2c525fc306d121dcd9fee3c49b91dbbf56a4959c548a722dbe877018,2024-05-07T14:15:10.820000 +CVE-2024-33781,1,1,f4f7e643ed06dfe34d7e50b920d433e4e1edac48ecbf5cf28dae804cd66afb83,2024-05-07T14:15:10.880000 +CVE-2024-33782,1,1,4e147f1d19b5edd200dfdb727ecd3e0f98db7a7ea5c40b73ab4a443953c3bb57,2024-05-07T14:15:10.933000 +CVE-2024-33783,1,1,2be8992d1551df1d9eb166d3e98e19315d9bff6f5817991b06258008fab98bb7,2024-05-07T14:15:10.990000 CVE-2024-33786,0,0,9c9799d563bc0d4c1c04d7279223efdf5fe0cf06bfa6bc6c2187b74f74410331,2024-05-03T14:17:53.690000 CVE-2024-33787,0,0,938d987ff7025b8de50748f3c8129ead7b6e1120b58c6cfd6b1d65c8e7b6d00a,2024-05-03T14:17:53.690000 CVE-2024-33788,0,0,cb54b61cb7baf2715794935e7d05d4995f4a9ec96d60289fe517e2f17611210d,2024-05-06T16:00:59.253000 @@ -248164,8 +248182,8 @@ CVE-2024-33899,0,0,3953877290e7ea59299fc2e6fd3641cdc5f0dd0a60947ca4a9fd862e9c59d CVE-2024-33903,0,0,d2659cb95032f4bf4e82ec7ebb3e3a955a9eb80acf170b021644b79abb230380,2024-04-29T12:42:03.667000 CVE-2024-33904,0,0,4e23880abf5747270fb682428cdb1c8d9da3ad9f2ae0530104035f429e5a2c50,2024-04-29T12:42:03.667000 CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000 -CVE-2024-33907,0,1,61fea348950e38683146d14305d27d67cff3f826a8055e478155b8c1d0ac0243,2024-05-07T13:39:32.710000 -CVE-2024-33908,0,1,a88a69da4efefbaf00105bd137ff32d6ed2880bc8a96e30239b8820c98589ef1,2024-05-07T13:39:32.710000 +CVE-2024-33907,0,0,61fea348950e38683146d14305d27d67cff3f826a8055e478155b8c1d0ac0243,2024-05-07T13:39:32.710000 +CVE-2024-33908,0,0,a88a69da4efefbaf00105bd137ff32d6ed2880bc8a96e30239b8820c98589ef1,2024-05-07T13:39:32.710000 CVE-2024-33910,0,0,1eecf8c9980abe02f4540fa449a7017e954404b33c113c3603477a004b96954f,2024-05-06T19:53:38.797000 CVE-2024-33911,0,0,d2216d18af7fbb067b283f4026a40e6ff4696a0c62b77138aebc217a926306fc,2024-05-02T13:27:25.103000 CVE-2024-33912,0,0,dde67555fbfdf9a274f05bf5eeaf0d855650c05d1c13363d279840fb3e774c4d,2024-05-06T19:53:38.797000 @@ -248228,6 +248246,7 @@ CVE-2024-34072,0,0,777211e19119fd714cb117ad917347df8c8d31d8f2a7116f05acd4dee767c CVE-2024-34073,0,0,59627a6f2139e186e386d9bee02b29e3f553b11a42322943c49172b647fa4488,2024-05-03T12:48:41.067000 CVE-2024-34075,0,0,74b8f52c18ba96760f5713abb933f8324f683e778d08e9874ae839df6792f5b8,2024-05-06T12:44:56.377000 CVE-2024-34078,0,0,1763c773ba6f4a58b6d621ab41ac83901c998db7a940162cceef17ca482ef5db,2024-05-06T16:00:59.253000 +CVE-2024-34084,1,1,bb1b4815f1c77827629a2b14346d479fd4254f157487b036e8228aa192b0e03e,2024-05-07T15:15:09.540000 CVE-2024-34088,0,0,6883a0b70d0dde6a9cd88ea6282b05e33733ec87c48078fd4a071d0cb0aef5b0,2024-04-30T19:35:36.960000 CVE-2024-34089,0,0,15b2c0a47fbcc5be5a3bf97fe1a554c3063f6b19ce95e2c291ace7a6dfa23f2b,2024-05-06T19:53:38.797000 CVE-2024-34090,0,0,8608bf721bcec5d06420a9e10150e606e4fa123798b3cf5eb08292efdd0a1900,2024-05-06T19:53:38.797000 @@ -248267,6 +248286,7 @@ CVE-2024-3431,0,0,71ddfcbe759169c8f204f418e8f847a54a9d0260ae81f8f299182963de778e CVE-2024-3432,0,0,571dfda74b07ff884b2ea3fb23e5b381f434b6d6f92c90abefd93bb60b98ed52,2024-04-11T01:26:02.150000 CVE-2024-3433,0,0,9daf2209e24504628b986e1f65ece6eda07fd4ab55bdd47fe9779359663e710e,2024-04-11T01:26:02.227000 CVE-2024-3434,0,0,954da8a67c7ed83cd00d8f12a08610158a6b6e85c4d2c5bfe68c69ad1cf2e22e,2024-04-11T01:26:02.303000 +CVE-2024-34342,1,1,1507e0cd4f8127f9fd74539ab17296eb45f964f4b6237f5766c3568b7c2d4eee,2024-05-07T15:15:09.730000 CVE-2024-3436,0,0,d56d6daef5f64944191e2814a0e8e0368edbb9fb66b8510fd7eacfe56842ed00,2024-04-11T01:26:02.383000 CVE-2024-34366,0,0,0d3f5bedc206c2395fd40f02a930e96a2ecd55a373d55f2b02f6aeccbb807ecf,2024-05-06T19:53:38.797000 CVE-2024-34367,0,0,09cdc74d280ef140661f2da3bf1a0a89bd8cdc87b8783ab4e406f707e957795e,2024-05-06T19:53:38.797000 @@ -248305,7 +248325,7 @@ CVE-2024-34404,0,0,b55f98a0483eb8227a5f45093fc640c957fa16f8c8c8bb014d71320a18d26 CVE-2024-34408,0,0,3c2f335ba274ff508132a154cc309c40bc38b19efdd9298e3de175f41fa5750b,2024-05-03T12:48:41.067000 CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000 CVE-2024-34412,0,0,351dac1423dc8e8517c032f303060fddddfb4b70d0143bb8c231e0e9db5dba48,2024-05-06T19:53:38.797000 -CVE-2024-34413,0,1,e5e744c34345ba6294637a8f85597b78c532aba1fad9c01dda8872ea5e3b50da,2024-05-07T13:39:32.710000 +CVE-2024-34413,0,0,e5e744c34345ba6294637a8f85597b78c532aba1fad9c01dda8872ea5e3b50da,2024-05-07T13:39:32.710000 CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000 CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000 CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000 @@ -248314,7 +248334,7 @@ CVE-2024-34447,0,0,61f22f72dc958826fcb7eaf40fe11c9681f5ba2d32a613978ac67658e68b4 CVE-2024-34449,0,0,24c537d2cf9215e7f09318a469a30752a9e17b9c5c5ae725d1583657f8eba5f3,2024-05-06T12:44:56.377000 CVE-2024-3445,0,0,c9628f9221624aa27cf7f5ca164e4ed34c93be648ba2ac6a84e0908c02d87fc9,2024-04-11T01:26:03.137000 CVE-2024-34453,0,0,5da0d4c8fa5172c0606affa6991cff2d5ad5006dd04be79361a4961f0a5a4112,2024-05-06T12:44:56.377000 -CVE-2024-34455,0,1,c62a91bb162e764fd7071791775662b012da343b0768a1a106502210378ab16a,2024-05-07T12:15:09.747000 +CVE-2024-34455,0,0,c62a91bb162e764fd7071791775662b012da343b0768a1a106502210378ab16a,2024-05-07T12:15:09.747000 CVE-2024-3446,0,0,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000 CVE-2024-34460,0,0,60e094b8fea98a1e6c2d84a5c3e79aa2608a4215bbc69ee3d50736a9170ecb62,2024-05-06T12:44:56.377000 CVE-2024-34461,0,0,3644faf8cb5166658e9f89c472700c7639846808287959d2eb6d40da466508d1,2024-05-06T12:44:56.377000 @@ -248349,14 +248369,15 @@ CVE-2024-34510,0,0,c138a041eb79436b7de1c3b83e6398f2cca519d06db1d89f8e56261c2f134 CVE-2024-34511,0,0,a745a802193c49ede413f08dfe649e6d8af96591b11565b9629a902fd64f729e,2024-05-06T12:44:56.377000 CVE-2024-34515,0,0,441befe9d7895975a107d349ce498a32367020a3c4dfee18c54aff40defe61ba,2024-05-06T12:44:56.377000 CVE-2024-34519,0,0,dc55bf4efdc02447b88606effbca2705017883549b899ce04066550f5ba0192a,2024-05-06T12:44:56.377000 +CVE-2024-34523,1,1,9c01465a3a70b18156aaf37eb09d11209cf9596ff8e8bfe6f99c9c639f415055,2024-05-07T15:15:09.930000 CVE-2024-34524,0,0,d417e5a0d59b38b90abb8bf99fa8b826de53fcdc98b24be237ef86e8f5a71704,2024-05-06T12:44:56.377000 CVE-2024-34525,0,0,47b03a3cb11dba60daef24d345e95f0ce48a6514d3d6c91b75b0b1ba043b0755,2024-05-06T12:44:56.377000 CVE-2024-34527,0,0,d1b19e0463b4b5732ec21b94042db824362fcc949c5cf728b91e262225191d66,2024-05-06T12:44:56.377000 CVE-2024-34528,0,0,ca5f9116c6b755deee8a1d55c8d870549125fec04f55c0df98aac91e67527b2e,2024-05-06T12:44:56.377000 CVE-2024-34529,0,0,513f9f96810a2d252b2d86f77a6ce296918ff9f2567069a0db024109e56c5976,2024-05-06T12:44:56.377000 -CVE-2024-34532,0,1,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d635c,2024-05-07T13:39:32.710000 -CVE-2024-34533,0,1,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000 -CVE-2024-34534,0,1,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000 +CVE-2024-34532,0,0,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d635c,2024-05-07T13:39:32.710000 +CVE-2024-34533,0,0,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000 +CVE-2024-34534,0,0,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000 CVE-2024-34538,0,0,ad2e465bd4501134b8655c84262a62a1ec8a7e4ecf43c5e35b8118420879cc3c,2024-05-06T12:44:56.377000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000 @@ -248457,7 +248478,7 @@ CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000 CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 -CVE-2024-3628,0,1,8f121caf10c5aa64c1102fac83294f4969f49de2ec79b7438a238040e55ba25e,2024-05-07T13:39:32.710000 +CVE-2024-3628,0,1,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 CVE-2024-3637,0,0,22cd3d6efad3fe2c302e0ada66b5da05c991e8a68aae7c8c5cbad701e10a3484,2024-05-03T12:48:41.067000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 @@ -248526,9 +248547,9 @@ CVE-2024-3747,0,0,7d9f76a0b00dda2450be7453047de386dc88bdd58855be8a05089d3c9c6f1f CVE-2024-3752,0,0,3b8c2287d488264d2226cc79c4669713ff7333060b5a327eae3c0502197f7531,2024-05-06T12:44:56.377000 CVE-2024-3755,0,0,a3840cfae2b8b48da33739aeda3d1d13951c8010f3b55f1ea4e95af38154a4be,2024-05-06T12:44:56.377000 CVE-2024-3756,0,0,3e2af0f622528b24cb6f6c9f16defba4a832347684bf8edaa795cc14aee30554,2024-05-06T12:44:56.377000 -CVE-2024-3757,0,1,2e3730d24d1473d3d4cb79982dc34114b234144990afc0b8d6857bab780c4469,2024-05-07T13:39:32.710000 -CVE-2024-3758,0,1,026bc66053a27b646475f6e5176a3ac95ff86ab7f4f9613bcb8871ee22b57948,2024-05-07T13:39:32.710000 -CVE-2024-3759,0,1,a3b49886194b34205d645040328f5ec99890367459b8949ab5be47fc57223437,2024-05-07T13:39:32.710000 +CVE-2024-3757,0,1,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000 +CVE-2024-3758,0,1,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000 +CVE-2024-3759,0,1,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000 CVE-2024-3762,0,0,8786cfd326f85cef30984c56459dfc9fe93a76e6338c27d090dd8d173488b8b0,2024-04-15T13:15:31.997000 CVE-2024-3763,0,0,1eebac5877c8c886e0c3f8814e0dc9f66bf992c6afa583c2dc485461fb17eebd,2024-04-15T13:15:31.997000 CVE-2024-3764,0,0,bc0166392f0fa682ac423224b68b272d1fbe64e8573563127fc316656ba68a89,2024-04-16T07:15:13.437000 @@ -248719,7 +248740,7 @@ CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000 CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000 CVE-2024-4185,0,0,4997c26f83a14bd54a98f3da542941a3f7d6c6c6777c0f0d023281d709e1d844,2024-04-30T13:11:16.690000 -CVE-2024-4186,0,1,2f2c57d522ba5b50628130977857372708a7bd282ecd1042a747663d043205a6,2024-05-07T13:39:32.710000 +CVE-2024-4186,0,1,c459d76d4346b2737077f5ae7b0a1b0ace4353328a79efd93c790decc23cc54f,2024-05-07T13:39:32.710000 CVE-2024-4192,0,0,d6751fa9142aaa91446de5baa4aa2b6db344761a0aff4ab695cf6603148e6a9a,2024-05-01T13:02:20.750000 CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000 CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000 @@ -248776,8 +248797,8 @@ CVE-2024-4334,0,0,d2c55786eb37c22aeaa962eb29c298610af66b07b247fefb5533e21481037f CVE-2024-4336,0,0,bea5a7f53013b694022e2bd0018a4064fb0ebf2c6ec290178b3a567f091ff450,2024-04-30T13:11:16.690000 CVE-2024-4337,0,0,08997cb0f3d0ed65aebc3b58ae13b7e381ac12042dd4375a545df1f240dc7b83,2024-04-30T13:11:16.690000 CVE-2024-4340,0,0,cc413663d0b28645506d2728a6df6437d317b717b85c09519211319a2c38a0e2,2024-04-30T17:52:35.057000 -CVE-2024-4345,0,1,f34e556567faaa754024403a92599953f3467ad2d03139f9359f3e798c0070c9,2024-05-07T13:39:32.710000 -CVE-2024-4346,0,1,5cab2db18282085ab0cb83d37ffdf2bf648794f7b00382d9f16065c41620ccd1,2024-05-07T13:39:32.710000 +CVE-2024-4345,0,1,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc8333,2024-05-07T13:39:32.710000 +CVE-2024-4346,0,1,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000 CVE-2024-4348,0,0,58c372bcfdfd13a40dcad9095bf019969258123c09df37a486f5ad5f3ede8e4f,2024-05-01T13:02:20.750000 CVE-2024-4349,0,0,f37ccdd1092fa74fa2c30a0fd9ee697b77c3abde136f8542413ea2c7851c4bb8,2024-05-06T14:15:08.090000 CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000 @@ -248823,21 +248844,27 @@ CVE-2024-4525,0,0,fec7346bfe6a0a659c359f751d3de5ef45d3f22d169ce3cdb4356d5ad2cad8 CVE-2024-4526,0,0,cc7912fe528d3a419c138bcd5341c693816e62d16c0baadf4a5615a547fa0e1e,2024-05-06T12:44:56.377000 CVE-2024-4527,0,0,934eed00f5a6845863bd7a3d14c3476fd2d41f7025ec36c7327276b14006fee8,2024-05-06T12:44:56.377000 CVE-2024-4528,0,0,36dcc8b8b66fc0f90a0b262a3028f956c42e37c806a1123835953924f58fffe5,2024-05-06T12:44:56.377000 -CVE-2024-4536,1,1,df0ccf281761acbc6c5357983e1b96c847d15ec791372db49ef3680f37c21bde,2024-05-07T13:39:32.710000 -CVE-2024-4537,1,1,f9525170aaf4fa5d26daed93759c2be2b3d43a7ac11ec21f6f6c860be5c13780,2024-05-07T13:39:32.710000 -CVE-2024-4538,1,1,ebe7955bae618829b08cc6f1eacecca8be8a6f64d04a6deade73c04be3b6fe29,2024-05-07T13:39:32.710000 +CVE-2024-4536,0,1,6d02ed0759b0f2029154ac1e9fa623fe4e250972d7d12c9e4f8d0247100613d5,2024-05-07T13:39:32.710000 +CVE-2024-4537,0,1,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922c5,2024-05-07T13:39:32.710000 +CVE-2024-4538,0,1,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000 CVE-2024-4547,0,0,56470b9434f2725c00dfd9ee62f975ef4bfc22f18b14f8aed962b18c333ab6c0,2024-05-06T16:00:59.253000 CVE-2024-4548,0,0,11b46ed29382c99da745482bdfcdacd655637cd95de07a1656d3fb9ac7c4dbd1,2024-05-06T16:00:59.253000 CVE-2024-4549,0,0,6e3cb93e17192899fa37dff35241dc11d5390bcb4fff79238246d111b471c30f,2024-05-06T21:15:48.783000 -CVE-2024-4568,0,1,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 -CVE-2024-4582,0,1,b7c2a49a3134eb9d3f36ded2458af296b46c55bf2e016ce639ee7c41cd43bae5,2024-05-07T13:39:32.710000 -CVE-2024-4583,0,1,9edb314948285e7fe9829d40ab06a819a5825203a22fcd62e9644d5b8411bd62,2024-05-07T13:39:32.710000 -CVE-2024-4584,1,1,8a5e5f77f92d660d5f3bd3475dec8caf68ec4179055a0fcc2f82a0dfb1ac1079,2024-05-07T13:39:32.710000 -CVE-2024-4585,1,1,e22e7d7850ce29794d5ad9683c35b869451774644518d09cb93389dd2337636c,2024-05-07T13:39:32.710000 -CVE-2024-4586,1,1,f32ec776dc833ab19d98f20cd53f505c0c9320603c78623d529cb82c3b43f769,2024-05-07T13:39:32.710000 -CVE-2024-4587,1,1,76ebe890a3e836dc91e6853eab14bee7d868d227912cb95ba8932ea2b2ed9058,2024-05-07T13:39:32.710000 -CVE-2024-4588,1,1,b8d967221e835069f0c1b11111ddf71543b8c086bf51ea0ac10a2f853487aa45,2024-05-07T13:39:32.710000 -CVE-2024-4589,1,1,f83c362b46f7d6c14bea4729f709ffbe7af76217ed34ce930294dc0dd6aadc55,2024-05-07T13:39:32.710000 -CVE-2024-4599,0,1,5bdf40d9d16eda8e3c5b51ce4d5106f270ac89ffce0afe04201bc59e04b4ee88,2024-05-07T13:39:32.710000 -CVE-2024-4600,1,1,a60534dd0ec93d29d75eae53f678e7490e66bf912ae9a2da375a7cef304b4ab8,2024-05-07T13:39:32.710000 -CVE-2024-4601,1,1,43a982f8666a3d1fd9282a88b9ffd85df9905e0624d92099ae6d9a74a56fa37e,2024-05-07T13:39:32.710000 +CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 +CVE-2024-4582,0,1,5cd56e21b40b166c29ee260f4ded179be026a0ecc50535347a4fd31993c23c36,2024-05-07T13:39:32.710000 +CVE-2024-4583,0,1,4a644a30c01a98a0fcdadfb78e2bd1c6842d9a5fcf9ec5c0351f9f1539b0ead7,2024-05-07T13:39:32.710000 +CVE-2024-4584,0,1,5ffe086d27e0f5caa665e2531a2697bb8e37e2c32e33db351779fbbc3358327c,2024-05-07T13:39:32.710000 +CVE-2024-4585,0,1,49360dd764ba21ea28d42519ac841829f157a76a4d8490fb7956e27f6b39b3e8,2024-05-07T13:39:32.710000 +CVE-2024-4586,0,1,049a33ffa3d3d83485facbf3fa75da9694447c6fcb68727ecd0ec9dff4297deb,2024-05-07T13:39:32.710000 +CVE-2024-4587,0,1,f71d02d1347059cb40434b40fdb4ab6f4e2c47a12b26b28b2760532b37961e32,2024-05-07T13:39:32.710000 +CVE-2024-4588,0,1,af706a56d97772ee71c3c2907c758707a365ef550d5ebff974d479ca27adaaa9,2024-05-07T13:39:32.710000 +CVE-2024-4589,0,1,1b5e9718f5b37fa98a617a771a596c9447fedc13d9048938ad95077fe1059931,2024-05-07T13:39:32.710000 +CVE-2024-4590,1,1,98b558cad237e7397f39c3ecd6307628d88978c3d6a806800715cea83a41c971,2024-05-07T14:15:11.050000 +CVE-2024-4591,1,1,505f206e83572b0aceef4a362530b9cb9eba18087a17a379ba7912d44bf9c8cd,2024-05-07T14:15:11.277000 +CVE-2024-4592,1,1,cbb611439d75710490602298c90c0c9f44c9233bc1143e2c1d76fd73262342d5,2024-05-07T14:15:11.510000 +CVE-2024-4593,1,1,cf3c6a789cccf30d4f1e235b26bf7083865fa815934d94586b89a1aafe3b80b0,2024-05-07T14:15:11.747000 +CVE-2024-4594,1,1,49a39b0efa6669fdcb807e7f151ddae1ee2ef7abe70ba6ed5a34954f6a3d81d5,2024-05-07T15:15:10.040000 +CVE-2024-4595,1,1,aa10098a1ca0c8e5863b2a5e7b8f742f83bf109d43a045f4259c64f8b0539dbd,2024-05-07T15:15:10.273000 +CVE-2024-4599,0,1,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000 +CVE-2024-4600,0,1,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000 +CVE-2024-4601,0,1,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000