From 78eb57e9bbedd4b4c1c974606cc3e89a2aef9dc4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 16 May 2024 14:03:20 +0000 Subject: [PATCH] Auto-Update: 2024-05-16T14:00:29.963246+00:00 --- CVE-2023/CVE-2023-402xx/CVE-2023-40297.json | 8 +- CVE-2024/CVE-2024-207xx/CVE-2024-20791.json | 4 +- CVE-2024/CVE-2024-207xx/CVE-2024-20792.json | 4 +- CVE-2024/CVE-2024-207xx/CVE-2024-20793.json | 4 +- CVE-2024/CVE-2024-23xx/CVE-2024-2358.json | 4 +- CVE-2024/CVE-2024-23xx/CVE-2024-2361.json | 4 +- CVE-2024/CVE-2024-23xx/CVE-2024-2366.json | 4 +- CVE-2024/CVE-2024-268xx/CVE-2024-26821.json | 29 +-- CVE-2024/CVE-2024-272xx/CVE-2024-27243.json | 8 +- CVE-2024/CVE-2024-272xx/CVE-2024-27244.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30274.json | 4 +- CVE-2024/CVE-2024-302xx/CVE-2024-30275.json | 4 +- CVE-2024/CVE-2024-302xx/CVE-2024-30281.json | 4 +- CVE-2024/CVE-2024-302xx/CVE-2024-30282.json | 4 +- CVE-2024/CVE-2024-302xx/CVE-2024-30283.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30286.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30287.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30288.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30289.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30290.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30291.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30292.json | 55 ++++ CVE-2024/CVE-2024-302xx/CVE-2024-30293.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30294.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30295.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30296.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30297.json | 8 +- CVE-2024/CVE-2024-302xx/CVE-2024-30298.json | 8 +- CVE-2024/CVE-2024-303xx/CVE-2024-30307.json | 8 +- CVE-2024/CVE-2024-303xx/CVE-2024-30308.json | 8 +- CVE-2024/CVE-2024-303xx/CVE-2024-30309.json | 8 +- CVE-2024/CVE-2024-303xx/CVE-2024-30314.json | 55 ++++ CVE-2024/CVE-2024-314xx/CVE-2024-31409.json | 8 +- CVE-2024/CVE-2024-314xx/CVE-2024-31410.json | 8 +- CVE-2024/CVE-2024-318xx/CVE-2024-31856.json | 8 +- CVE-2024/CVE-2024-31xx/CVE-2024-3126.json | 8 +- CVE-2024/CVE-2024-320xx/CVE-2024-32042.json | 8 +- CVE-2024/CVE-2024-320xx/CVE-2024-32047.json | 8 +- CVE-2024/CVE-2024-320xx/CVE-2024-32053.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33615.json | 8 +- CVE-2024/CVE-2024-336xx/CVE-2024-33625.json | 8 +- CVE-2024/CVE-2024-340xx/CVE-2024-34025.json | 8 +- CVE-2024/CVE-2024-349xx/CVE-2024-34906.json | 8 +- CVE-2024/CVE-2024-349xx/CVE-2024-34909.json | 8 +- CVE-2024/CVE-2024-349xx/CVE-2024-34913.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3403.json | 8 +- CVE-2024/CVE-2024-34xx/CVE-2024-3435.json | 8 +- CVE-2024/CVE-2024-351xx/CVE-2024-35102.json | 8 +- CVE-2024/CVE-2024-351xx/CVE-2024-35183.json | 8 +- CVE-2024/CVE-2024-351xx/CVE-2024-35184.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35299.json | 4 +- CVE-2024/CVE-2024-353xx/CVE-2024-35300.json | 4 +- CVE-2024/CVE-2024-353xx/CVE-2024-35301.json | 4 +- CVE-2024/CVE-2024-353xx/CVE-2024-35302.json | 4 +- CVE-2024/CVE-2024-36xx/CVE-2024-3641.json | 4 +- CVE-2024/CVE-2024-36xx/CVE-2024-3642.json | 4 +- CVE-2024/CVE-2024-36xx/CVE-2024-3643.json | 4 +- CVE-2024/CVE-2024-36xx/CVE-2024-3644.json | 4 +- CVE-2024/CVE-2024-37xx/CVE-2024-3750.json | 4 +- CVE-2024/CVE-2024-38xx/CVE-2024-3848.json | 8 +- CVE-2024/CVE-2024-38xx/CVE-2024-3851.json | 8 +- CVE-2024/CVE-2024-38xx/CVE-2024-3887.json | 8 +- CVE-2024/CVE-2024-40xx/CVE-2024-4078.json | 8 +- CVE-2024/CVE-2024-41xx/CVE-2024-4181.json | 8 +- CVE-2024/CVE-2024-42xx/CVE-2024-4222.json | 4 +- CVE-2024/CVE-2024-42xx/CVE-2024-4223.json | 8 +- CVE-2024/CVE-2024-42xx/CVE-2024-4263.json | 8 +- CVE-2024/CVE-2024-42xx/CVE-2024-4279.json | 4 +- CVE-2024/CVE-2024-42xx/CVE-2024-4288.json | 4 +- CVE-2024/CVE-2024-43xx/CVE-2024-4318.json | 4 +- CVE-2024/CVE-2024-43xx/CVE-2024-4321.json | 8 +- CVE-2024/CVE-2024-43xx/CVE-2024-4322.json | 8 +- CVE-2024/CVE-2024-43xx/CVE-2024-4326.json | 8 +- CVE-2024/CVE-2024-43xx/CVE-2024-4351.json | 4 +- CVE-2024/CVE-2024-43xx/CVE-2024-4352.json | 4 +- CVE-2024/CVE-2024-43xx/CVE-2024-4385.json | 4 +- CVE-2024/CVE-2024-43xx/CVE-2024-4391.json | 8 +- CVE-2024/CVE-2024-44xx/CVE-2024-4400.json | 4 +- CVE-2024/CVE-2024-44xx/CVE-2024-4478.json | 4 +- CVE-2024/CVE-2024-45xx/CVE-2024-4546.json | 4 +- CVE-2024/CVE-2024-45xx/CVE-2024-4580.json | 55 ++++ CVE-2024/CVE-2024-46xx/CVE-2024-4617.json | 4 +- CVE-2024/CVE-2024-46xx/CVE-2024-4634.json | 4 +- CVE-2024/CVE-2024-46xx/CVE-2024-4635.json | 4 +- CVE-2024/CVE-2024-46xx/CVE-2024-4642.json | 8 +- CVE-2024/CVE-2024-47xx/CVE-2024-4760.json | 55 ++++ CVE-2024/CVE-2024-48xx/CVE-2024-4826.json | 55 ++++ CVE-2024/CVE-2024-48xx/CVE-2024-4838.json | 4 +- CVE-2024/CVE-2024-48xx/CVE-2024-4843.json | 4 +- CVE-2024/CVE-2024-48xx/CVE-2024-4844.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4904.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4906.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4907.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4908.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4909.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4910.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4911.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4912.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4913.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4914.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4915.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4916.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4917.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4918.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4919.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4920.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4921.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4922.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4923.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4925.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4926.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4927.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4928.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4929.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4930.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4931.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4932.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4933.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4945.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4946.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4947.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4948.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4949.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4950.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4960.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4961.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4962.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4963.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4964.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4965.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4966.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4967.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4968.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4972.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4973.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4974.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4975.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4976.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4984.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4991.json | 55 ++++ CVE-2024/CVE-2024-49xx/CVE-2024-4992.json | 55 ++++ CVE-2024/CVE-2024-49xx/CVE-2024-4993.json | 55 ++++ CVE-2024/CVE-2024-49xx/CVE-2024-4999.json | 32 +++ README.md | 65 +++-- _state.csv | 270 +++++++++++--------- 145 files changed, 1565 insertions(+), 424 deletions(-) create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30283.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30286.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30287.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30288.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30289.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30290.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30291.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30292.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30314.json create mode 100644 CVE-2024/CVE-2024-45xx/CVE-2024-4580.json create mode 100644 CVE-2024/CVE-2024-47xx/CVE-2024-4760.json create mode 100644 CVE-2024/CVE-2024-48xx/CVE-2024-4826.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4991.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4992.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4993.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4999.json diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json index d8d977201be..431a98b8b1f 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40297.json @@ -2,12 +2,16 @@ "id": "CVE-2023-40297", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:08.767", - "lastModified": "2024-05-15T20:15:08.767", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component." + }, + { + "lang": "es", + "value": "Stakater Forecastle 1.0.139 y anteriores permite el directory traversal %5C../ en el componente del sitio web." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json index 8831d44f745..0402f444e4c 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20791", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:08.967", - "lastModified": "2024-05-16T09:15:08.967", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json index ed3491694b6..e1e167531b7 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20792", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:09.313", - "lastModified": "2024-05-16T09:15:09.313", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json index f12442d9039..9d2fc1db039 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20793", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:09.560", - "lastModified": "2024-05-16T09:15:09.560", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json index eb4f99e64d7..7ad988459e4 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2358", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:09.800", - "lastModified": "2024-05-16T09:15:09.800", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json index 16e4d632ed0..f87f1ceddd2 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2361.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2361", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:10.060", - "lastModified": "2024-05-16T09:15:10.060", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json index 37687d0301f..7d6464b937c 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2366", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:10.287", - "lastModified": "2024-05-16T09:15:10.287", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26821.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26821.json index 87ebe4f7daa..cda29089fce 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26821.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26821.json @@ -2,35 +2,14 @@ "id": "CVE-2024-26821", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:08.917", - "lastModified": "2024-04-17T12:48:07.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-16T13:15:47.693", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: relax mount_setattr() permission checks\n\nWhen we added mount_setattr() I added additional checks compared to the\nlegacy do_reconfigure_mnt() and do_change_type() helpers used by regular\nmount(2). If that mount had a parent then verify that the caller and the\nmount namespace the mount is attached to match and if not make sure that\nit's an anonymous mount.\n\nThe real rootfs falls into neither category. It is neither an anoymous\nmount because it is obviously attached to the initial mount namespace\nbut it also obviously doesn't have a parent mount. So that means legacy\nmount(2) allows changing mount properties on the real rootfs but\nmount_setattr(2) blocks this. I never thought much about this but of\ncourse someone on this planet of earth changes properties on the real\nrootfs as can be seen in [1].\n\nSince util-linux finally switched to the new mount api in 2.39 not so\nlong ago it also relies on mount_setattr() and that surfaced this issue\nwhen Fedora 39 finally switched to it. Fix this." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs: relajar las comprobaciones de permisos de mount_setattr() Cuando agregamos mount_setattr(), agregu\u00e9 comprobaciones adicionales en comparaci\u00f3n con los ayudantes heredados do_reconfigure_mnt() y do_change_type() utilizados por el mount(2) normal. Si ese montaje ten\u00eda un padre, verifique que la persona que llama y el espacio de nombres del montaje coincidan y, de lo contrario, aseg\u00farese de que sea un montaje an\u00f3nimo. Los rootfs reales no entran en ninguna de las dos categor\u00edas. No es un montaje an\u00f3nimo porque obviamente est\u00e1 adjunto al espacio de nombres de montaje inicial pero obviamente tampoco tiene un montaje principal. Eso significa que el montaje heredado (2) permite cambiar las propiedades de montaje en los rootfs reales, pero mount_setattr (2) bloquea esto. Nunca pens\u00e9 mucho en esto pero, por supuesto, alguien en este planeta tierra cambia las propiedades de las ra\u00edces reales como se puede ver en [1]. Dado que util-linux finalmente cambi\u00f3 a la nueva API de montaje en 2.39 no hace mucho, tambi\u00e9n depende de mount_setattr() y surgi\u00f3 este problema cuando Fedora 39 finalmente cambi\u00f3 a ella. Arregla esto." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/2a7a31e1fb9717845d9d5e2a8c6e48848147801e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/31f71f2d7a081fc6c6bdf06865beedf6db5b0ca4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/46f5ab762d048dad224436978315cbc2fa79c630", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/95de4ad173ca0e61034f3145d66917970961c210", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27243.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27243.json index 0e4bf7a87e8..8308a8b53ce 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27243.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27243.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27243", "sourceIdentifier": "security@zoom.us", "published": "2024-05-15T21:15:07.987", - "lastModified": "2024-05-15T21:15:07.987", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom Workplace Apps and SDK\u2019s may allow an authenticated user to conduct a denial of service via network access." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer en algunas aplicaciones y SDK de Zoom Workplace puede permitir que un usuario autenticado lleve a cabo una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27244.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27244.json index 13ed76f7242..3f169b60a18 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27244.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27244.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27244", "sourceIdentifier": "security@zoom.us", "published": "2024-05-15T21:15:08.220", - "lastModified": "2024-05-15T21:15:08.220", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insufficient verification of data authenticity in the installer for Zoom Workplace VDI App for Windows may allow an authenticated user to conduct an escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n insuficiente de la autenticidad de los datos en el instalador de la aplicaci\u00f3n Zoom Workplace VDI para Windows puede permitir que un usuario autenticado realice una escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json index 49842e70b6d..21de723f12c 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30274.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30274", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:10.527", - "lastModified": "2024-05-16T09:15:10.527", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json index 97c32644374..43612648db5 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30275", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:10.750", - "lastModified": "2024-05-16T09:15:10.750", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json index 3e62c855558..86e596970eb 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30281.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30281", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.007", - "lastModified": "2024-05-16T09:15:11.007", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json index fef6852293b..87a3689d38a 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30282", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.253", - "lastModified": "2024-05-16T09:15:11.253", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json new file mode 100644 index 00000000000..eb2c2dd6415 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30283", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:08.407", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json new file mode 100644 index 00000000000..25504eec4ce --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30286", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:09.097", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json new file mode 100644 index 00000000000..625387275a4 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30287", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:09.700", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json new file mode 100644 index 00000000000..a680cdf0b52 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30288", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:10.330", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json new file mode 100644 index 00000000000..34029ce34d4 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30289", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:10.897", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json new file mode 100644 index 00000000000..7d7b87fd900 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30290", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:11.527", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json new file mode 100644 index 00000000000..5aa7fb19e93 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30291", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:12.107", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json new file mode 100644 index 00000000000..7efb9026260 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30292", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:12.713", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json index 178c4ded3fd..9e1e878ad7a 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30293", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.497", - "lastModified": "2024-05-16T09:15:11.497", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json index 01c3068797d..2a608ac107a 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30294", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.763", - "lastModified": "2024-05-16T09:15:11.763", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json index cceb7bbc445..5ed1c7e6d64 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30295", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.990", - "lastModified": "2024-05-16T09:15:11.990", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de desreferencia de puntero NULL que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json index d403dbda491..26c9d64fee3 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30296", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.213", - "lastModified": "2024-05-16T09:15:12.213", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json index 5bcbd330d53..f640b0ef3d5 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30297", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.447", - "lastModified": "2024-05-16T09:15:12.447", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.2, 23.0.5 y anteriores de Animate se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30298.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30298.json index 00ce91cb584..7147ca6d226 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30298.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30298.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30298", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.680", - "lastModified": "2024-05-16T09:15:12.680", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.2, 23.0.5 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones de Animate 24.0.2, 23.0.5 y anteriores Respuesta: se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json index 01f665165b3..15bb4fd7ee6 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30307", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.910", - "lastModified": "2024-05-16T09:15:12.910", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Substance3D - Painter versions 9.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Substance3D: las versiones 9.1.2 y anteriores de Painter se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json index 57a9b21c880..74a80377464 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30308", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:13.137", - "lastModified": "2024-05-16T09:15:13.137", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Substance3D - Painter versions 9.1.2 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Substance3D: versiones de Painter 9.1.2 y anteriores. Respuesta: se ven afectados por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json index dc838b7a9cc..e03025b53a9 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30309", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:13.377", - "lastModified": "2024-05-16T09:15:13.377", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Substance3D - Painter versions 9.1.2 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Substance3D - Painter versiones 9.1.2 y anteriores. Respuesta: se ven afectados por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json new file mode 100644 index 00000000000..e2e353e75a8 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30314", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-05-16T12:15:13.280", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Dreamweaver Desktop versions 21.3 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does require user interaction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31409.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31409.json index 029f13bf359..4c066f766dd 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31409.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31409.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31409", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:11.203", - "lastModified": "2024-05-15T20:15:11.203", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Certain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device." + }, + { + "lang": "es", + "value": "Ciertos comodines MQTT no est\u00e1n bloqueados en el sistema CyberPower PowerPanel, lo que podr\u00eda provocar que un atacante obtenga datos de todo el sistema despu\u00e9s de obtener acceso a cualquier dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31410.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31410.json index d62b8794909..8628f231bdc 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31410.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31410.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31410", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:11.473", - "lastModified": "2024-05-15T20:15:11.473", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data." + }, + { + "lang": "es", + "value": "Los dispositivos que gestiona CyberPower PowerPanel utilizan certificados id\u00e9nticos basados en una clave criptogr\u00e1fica codificada. Esto puede permitir que un atacante se haga pasar por cualquier cliente del sistema y env\u00ede datos maliciosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31856.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31856.json index dda3cbf6dd9..2c3849eee37 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31856.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31856.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31856", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:11.710", - "lastModified": "2024-05-15T20:15:11.710", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode." + }, + { + "lang": "es", + "value": "Un atacante con ciertos permisos MQTT puede crear mensajes maliciosos para todos los dispositivos CyberPower PowerPanel. Esto podr\u00eda provocar que un atacante inyecte sintaxis SQL, escriba archivos arbitrarios en el sistema y ejecute c\u00f3digo remoto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json index 307a0b4e77f..d22d1d2de8d 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3126.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3126", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:13.840", - "lastModified": "2024-05-16T09:15:13.840", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'lollms_xtts.py' script. The vulnerability arises due to the improper neutralization of special elements used in an OS command. The affected function utilizes 'subprocess.Popen' to execute a command constructed with a Python f-string, without adequately sanitizing the 'xtts_base_url' input. This flaw allows attackers to execute arbitrary commands remotely by manipulating the 'xtts_base_url' parameter. The vulnerability affects versions up to and including the latest version before 9.5. Successful exploitation could lead to arbitrary remote code execution (RCE) on the system where the application is deployed." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n 'run_xtts_api_server' de la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro del script 'lollms_xtts.py'. La vulnerabilidad surge debido a la neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo. La funci\u00f3n afectada utiliza 'subprocess.Popen' para ejecutar un comando construido con una cadena f de Python, sin desinfectar adecuadamente la entrada 'xtts_base_url'. Esta falla permite a los atacantes ejecutar comandos arbitrarios de forma remota manipulando el par\u00e1metro 'xtts_base_url'. La vulnerabilidad afecta a versiones hasta la \u00faltima versi\u00f3n anterior a la 9.5 incluida. Una explotaci\u00f3n exitosa podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo (RCE) arbitraria en el sistema donde se implementa la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32042.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32042.json index 2c8250f01e5..eaf0fe92157 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32042.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32042.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32042", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:11.950", - "lastModified": "2024-05-15T20:15:11.950", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered." + }, + { + "lang": "es", + "value": "La clave utilizada para cifrar las contrase\u00f1as almacenadas en la base de datos se puede encontrar en el c\u00f3digo de la aplicaci\u00f3n CyberPower PowerPanel, lo que permite recuperar las contrase\u00f1as." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32047.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32047.json index aac01e2cdd4..298665f8104 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32047.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32047.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32047", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:12.197", - "lastModified": "2024-05-15T20:15:12.197", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server." + }, + { + "lang": "es", + "value": "Las credenciales codificadas para el servidor de prueba CyberPower PowerPanel se pueden encontrar en el c\u00f3digo de producci\u00f3n. Esto podr\u00eda provocar que un atacante obtenga acceso al servidor de prueba o de producci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32053.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32053.json index 1f3c987a0e2..209871f363a 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32053.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32053.json @@ -2,12 +2,16 @@ "id": "CVE-2024-32053", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:12.443", - "lastModified": "2024-05-15T20:15:12.443", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Hard-coded credentials are used by the\u00a0\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application." + }, + { + "lang": "es", + "value": "La plataforma CyberPower PowerPanel utiliza credenciales codificadas para autenticarse en la base de datos, otros servicios y la nube. Esto podr\u00eda resultar en que un atacante obtenga acceso a servicios con los privilegios de una aplicaci\u00f3n empresarial Powerpanel." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33615.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33615.json index ab23b03f3a2..25566e3e90c 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33615.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33615.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33615", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:12.687", - "lastModified": "2024-05-15T20:15:12.687", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A specially crafted Zip file containing path traversal characters can be\n imported to the \nCyberPower PowerPanel \n\nserver, which allows file writing to the server outside\n the intended scope, and could allow an attacker to achieve remote code \nexecution." + }, + { + "lang": "es", + "value": "Se puede importar al servidor CyberPower PowerPanel un archivo Zip especialmente manipulado que contiene caracteres de recorrido de ruta, lo que permite escribir archivos en el servidor fuera del alcance previsto y podr\u00eda permitir a un atacante lograr la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33625.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33625.json index bfca87ba20d..f85c57c6d4e 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33625.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33625.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33625", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:12.927", - "lastModified": "2024-05-15T20:15:12.927", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "CyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication." + }, + { + "lang": "es", + "value": "El c\u00f3digo de la aplicaci\u00f3n empresarial CyberPower PowerPanel contiene una clave de firma JWT codificada. Esto podr\u00eda resultar en que un atacante falsifique tokens JWT para eludir la autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34025.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34025.json index db163754b73..0ee52effb0b 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34025.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34025.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34025", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-05-15T20:15:13.190", - "lastModified": "2024-05-15T20:15:13.190", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "CyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges." + }, + { + "lang": "es", + "value": "El c\u00f3digo de la aplicaci\u00f3n empresarial CyberPower PowerPanel contiene un conjunto codificado de credenciales de autenticaci\u00f3n. Esto podr\u00eda provocar que un atacante eluda la autenticaci\u00f3n y obtenga privilegios de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json index 8d3388d998c..aee9b7cb65b 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34906.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34906", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:13.460", - "lastModified": "2024-05-15T20:15:13.460", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in dootask v0.30.13 allows attackers to execute arbitrary code via uploading a crafted PDF file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en dootask v0.30.13 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json index 5979d341cb7..5d28b9f2a62 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34909.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34909", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:13.570", - "lastModified": "2024-05-15T20:15:13.570", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in KYKMS v1.0.1 and below allows attackers to execute arbitrary code via uploading a crafted PDF file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitraria en KYKMS v1.0.1 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34913.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34913.json index 96214da8d78..d0e014162e9 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34913.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34913.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34913", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T20:15:13.657", - "lastModified": "2024-05-15T20:15:13.657", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in r-pan-scaffolding v5.0 and below allows attackers to execute arbitrary code via uploading a crafted PDF file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitraria en r-pan-scaffolding v5.0 y versiones anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PDF manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3403.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3403.json index d5123dcc39b..f97fee79fac 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3403.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3403.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3403", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:14.053", - "lastModified": "2024-05-16T09:15:14.053", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the 'Search in Docs' feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files." + }, + { + "lang": "es", + "value": "imartinez/privategpt versi\u00f3n 0.2.0 es vulnerable a una vulnerabilidad de inclusi\u00f3n de archivos local que permite a los atacantes leer archivos arbitrarios del sistema de archivos. Al manipular la funcionalidad de carga de archivos para ingerir archivos locales arbitrarios, los atacantes pueden explotar la funci\u00f3n \"Buscar en Documentos\" o consultar la IA para recuperar o revelar el contenido de cualquier archivo en el sistema. Esta vulnerabilidad podr\u00eda provocar varios impactos, que incluyen, entre otros, la ejecuci\u00f3n remota de c\u00f3digo mediante la obtenci\u00f3n de claves SSH privadas, el acceso no autorizado a archivos privados, la divulgaci\u00f3n del c\u00f3digo fuente que facilita m\u00e1s ataques y la exposici\u00f3n de archivos de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json index 6da3440f5f9..271e1e2115a 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3435.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3435", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:14.290", - "lastModified": "2024-05-16T09:15:14.290", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en el endpoint 'save_settings' de la aplicaci\u00f3n parisneo/lollms-webui, que afecta a las versiones hasta la \u00faltima versi\u00f3n anterior a la 9.5. La vulnerabilidad surge debido a una sanitizaci\u00f3n insuficiente del par\u00e1metro 'config' en la funci\u00f3n 'apply_settings', lo que permite a un atacante manipular la configuraci\u00f3n de la aplicaci\u00f3n enviando payloads JSON especialmente manipuladas. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo (RCE) al pasar por alto los parches existentes manipulados para mitigar dichas vulnerabilidades." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35102.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35102.json index 13ac512c7cf..cdde77a6eef 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35102.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35102.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35102", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T19:15:08.063", - "lastModified": "2024-05-15T19:15:08.063", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insecure Permissions vulnerability in VITEC AvediaServer (Model avsrv-m8105) 8.6.2-1 allows a remote attacker to escalate privileges via a crafted script." + }, + { + "lang": "es", + "value": "Vulnerabilidad de permisos inseguros en VITEC AvediaServer (modelo avsrv-m8105) 8.6.2-1 permite a un atacante remoto escalar privilegios mediante un script manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35183.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35183.json index 92abaefdb2d..480c079696b 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35183.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35183.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35183", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-15T22:15:08.580", - "lastModified": "2024-05-15T22:15:08.580", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "wolfictl is a command line tool for working with Wolfi. A git authentication issue in versions prior to 0.16.10 allows a local user\u2019s GitHub token to be sent to remote servers other than `github.com`. Most git-dependent functionality in wolfictl relies on its own `git` package, which contains centralized logic for implementing interactions with git repositories. Some of this functionality requires authentication in order to access private repositories. A central function `GetGitAuth` looks for a GitHub token in the environment variable `GITHUB_TOKEN` and returns it as an HTTP basic auth object to be used with the `github.com/go-git/go-git/v5` library. Most callers (direct or indirect) of `GetGitAuth` use the token to authenticate to github.com only; however, in some cases callers were passing this authentication without checking that the remote git repository was hosted on github.com. This behavior has existed in one form or another since commit 0d06e1578300327c212dda26a5ab31d09352b9d0 - committed January 25, 2023. This impacts anyone who ran the `wolfictl check update` commands with a Melange configuration that included a `git-checkout` directive step that referenced a git repository not hosted on github.com. This also impacts anyone who ran `wolfictl update ` with a remote URL outside of github.com. Additionally, these subcommands must have run with the `GITHUB_TOKEN` environment variable set to a valid GitHub token. Users should upgrade to version 0.16.10 to receive a patch." + }, + { + "lang": "es", + "value": "wolfictl es una herramienta de l\u00ednea de comandos para trabajar con Wolfi. Un problema de autenticaci\u00f3n de Git en versiones anteriores a la 0.16.10 permite que el token de GitHub de un usuario local se env\u00ede a servidores remotos distintos de `github.com`. La mayor parte de la funcionalidad dependiente de git en wolfictl se basa en su propio paquete `git`, que contiene l\u00f3gica centralizada para implementar interacciones con repositorios de git. Algunas de estas funciones requieren autenticaci\u00f3n para poder acceder a repositorios privados. Una funci\u00f3n central `GetGitAuth` busca un token de GitHub en la variable de entorno `GITHUB_TOKEN` y lo devuelve como un objeto de autenticaci\u00f3n b\u00e1sica HTTP para usar con la librer\u00eda `github.com/go-git/go-git/v5`. La mayor\u00eda de las personas que llaman (directas o indirectas) a `GetGitAuth` usan el token para autenticarse en github.com \u00fanicamente; sin embargo, en algunos casos las personas que llamaban pasaban esta autenticaci\u00f3n sin verificar que el repositorio git remoto estuviera alojado en github.com. Este comportamiento ha existido de una forma u otra desde el commit 0d06e1578300327c212dda26a5ab31d09352b9d0, confirmada el 25 de enero de 2023. Esto afecta a cualquiera que haya ejecutado los comandos `wolfictl check update` con una configuraci\u00f3n de Melange que inclu\u00eda un paso de directiva `git-checkout` que hac\u00eda referencia a un repositorio de git. no alojado en github.com. Esto tambi\u00e9n afecta a cualquiera que haya ejecutado `wolfictl update ` con una URL remota fuera de github.com. Adem\u00e1s, estos subcomandos deben haberse ejecutado con la variable de entorno `GITHUB_TOKEN` configurada en un token de GitHub v\u00e1lido. Los usuarios deben actualizar a la versi\u00f3n 0.16.10 para recibir un parche." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35184.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35184.json index 0b83e833cef..5c300d9e54d 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35184.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35184.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35184", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-15T22:15:08.867", - "lastModified": "2024-05-15T22:15:08.867", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Paperless-ngx is a document management system that transforms physical documents into a searchable online archive. Starting in version 2.5.0 and prior to version 2.8.6, remote user authentication allows API access even if API access is explicitly disabled. Version 2.8.6 contains a patchc for the issue." + }, + { + "lang": "es", + "value": "Paperless-ngx es un sistema de gesti\u00f3n de documentos que transforma documentos f\u00edsicos en un archivo en l\u00ednea con capacidad de b\u00fasqueda. A partir de la versi\u00f3n 2.5.0 y antes de la versi\u00f3n 2.8.6, la autenticaci\u00f3n de usuario remoto permite el acceso a la API incluso si el acceso a la API est\u00e1 expl\u00edcitamente deshabilitado. La versi\u00f3n 2.8.6 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json index 82753ae124e..9e136c71902 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35299", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-16T11:15:47.460", - "lastModified": "2024-05-16T11:15:47.460", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json index 485ed0df87e..ddf3148e7de 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35300.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35300", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-16T11:15:47.720", - "lastModified": "2024-05-16T11:15:47.720", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json index 3f4669b3fa7..05546839b13 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35301", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-16T11:15:47.947", - "lastModified": "2024-05-16T11:15:47.947", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json index 70c68abc9af..b702ba3b926 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35302", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-16T11:15:48.160", - "lastModified": "2024-05-16T11:15:48.160", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json index 361d18cf4fc..5bccee01fdf 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3641.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3641", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-16T06:15:08.703", - "lastModified": "2024-05-16T06:15:08.703", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json index 69d6c722faf..f63f01f63d8 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3642", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-16T06:15:09.770", - "lastModified": "2024-05-16T06:15:09.770", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3643.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3643.json index 0ad5d2343b4..95b35fc052b 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3643.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3643", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-16T06:15:10.053", - "lastModified": "2024-05-16T06:15:10.053", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json index dc25037d375..437e10ef4fb 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3644.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3644", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-16T06:15:10.370", - "lastModified": "2024-05-16T06:15:10.370", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json index 519218f47e4..bb502bf5c1c 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3750", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T03:15:07.913", - "lastModified": "2024-05-16T03:15:07.913", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json index d262a427037..416ad1c6c37 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3848", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:14.543", - "lastModified": "2024-05-16T09:15:14.543", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en mlflow/mlflow versi\u00f3n 2.11.0, identificada como una derivaci\u00f3n para el CVE-2023-6909 abordado anteriormente. La vulnerabilidad surge del manejo de las URL de artefactos por parte de la aplicaci\u00f3n, donde se puede usar un car\u00e1cter '#' para insertar una ruta en el fragmento, omitiendo efectivamente la validaci\u00f3n. Esto permite a un atacante construir una URL que, cuando se procesa, ignora el esquema del protocolo y utiliza la ruta proporcionada para acceder al sistema de archivos. Como resultado, un atacante puede leer archivos arbitrarios, incluida informaci\u00f3n confidencial como SSH y claves de la nube, aprovechando la forma en que la aplicaci\u00f3n convierte la URL en una ruta del sistema de archivos. El problema surge de una validaci\u00f3n insuficiente de la parte del fragmento de la URL, lo que lleva a una lectura arbitraria del archivo a trav\u00e9s del path traversal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3851.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3851.json index 910a634884c..41c2daa63f9 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3851.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3851.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3851", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:14.823", - "lastModified": "2024-05-16T09:15:14.823", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A stored Cross-Site Scripting (XSS) vulnerability exists in the 'imartinez/privategpt' repository due to improper validation of file uploads. Attackers can exploit this vulnerability by uploading malicious HTML files, such as those containing JavaScript payloads, which are then executed in the context of the victim's session when accessed. This could lead to the execution of arbitrary JavaScript code in the context of the user's browser session, potentially resulting in phishing attacks or other malicious actions. The vulnerability affects the latest version of the repository." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en el repositorio 'imartinez/privategpt' debido a una validaci\u00f3n incorrecta de la carga de archivos. Los atacantes pueden aprovechar esta vulnerabilidad cargando archivos HTML maliciosos, como los que contienen payloads de JavaScript, que luego se ejecutan en el contexto de la sesi\u00f3n de la v\u00edctima cuando se accede a ellos. Esto podr\u00eda dar lugar a la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador del usuario, lo que podr\u00eda dar lugar a ataques de phishing u otras acciones maliciosas. La vulnerabilidad afecta a la \u00faltima versi\u00f3n del repositorio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json index ffd485a0b52..42678b92ed0 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3887.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3887", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:15.070", - "lastModified": "2024-05-16T09:15:15.070", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Form Builder widget in all versions up to, and including, 1.3.974 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Form Builder en todas las versiones hasta la 1.3.974 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4078.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4078.json index 9e15ffe3e48..49fbebcff3a 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4078.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4078.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4078", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:15.313", - "lastModified": "2024-05-16T09:15:15.313", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability in the parisneo/lollms, specifically in the `/unInstall_binding` endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the `name` parameter in the `unInstall_binding` function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious `__init__.py` file. This vulnerability affects the latest version of the software. The exploitation of this vulnerability could lead to remote code execution on the system where parisneo/lollms is deployed." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en parisneo/lollms, espec\u00edficamente en el endpoint `/unInstall_binding`, permite la ejecuci\u00f3n de c\u00f3digo arbitrario debido a una sanitizaci\u00f3n insuficiente de la entrada del usuario. El problema surge de la falta de sanitizaci\u00f3n de rutas al manejar el par\u00e1metro `name` en la funci\u00f3n `unInstall_binding`, lo que permite a un atacante atravesar directorios y ejecutar c\u00f3digo arbitrario cargando un archivo `__init__.py` malicioso. Esta vulnerabilidad afecta a la \u00faltima versi\u00f3n del software. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo en el sistema donde est\u00e1 implementado parisneo/lollms." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4181.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4181.json index 1b0237e77a6..8f4af1f0028 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4181.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4181.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4181", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:15.553", - "lastModified": "2024-05-16T09:15:15.553", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la clase RunGptLLM de la librer\u00eda llama_index, versi\u00f3n 0.9.47, utilizada por el marco RunGpt de JinaAI para conectarse a los modelos de aprendizaje de idiomas (LLM). La vulnerabilidad surge del uso inadecuado de la funci\u00f3n de evaluaci\u00f3n, lo que permite que un proveedor de alojamiento LLM malicioso o comprometido ejecute comandos arbitrarios en la m\u00e1quina del cliente. Este problema se solucion\u00f3 en la versi\u00f3n 0.10.13. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda llevar a que un proveedor de alojamiento obtenga control total sobre las m\u00e1quinas cliente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json index 07a3721dc7b..81810c07720 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4222", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:08.687", - "lastModified": "2024-05-16T10:15:08.687", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json index 32aef0c42ff..ee21834d36b 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4223", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:15.810", - "lastModified": "2024-05-16T09:15:15.810", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Tutor LMS plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to add, modify, or delete data." + }, + { + "lang": "es", + "value": "El complemento Tutor LMS para WordPress es vulnerable al acceso no autorizado a datos, modificaci\u00f3n de datos, p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones en todas las versiones hasta la 2.7.0 inclusive. Esto hace posible que atacantes no autenticados agreguen, modifiquen o eliminen datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json index 4bef6f4a1e6..7046dee01b4 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4263.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4263", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:16.037", - "lastModified": "2024-05-16T09:15:16.037", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, where low privilege users with only EDIT permissions on an experiment can delete any artifacts. This issue arises due to the lack of proper validation for DELETE requests by users with EDIT permissions, allowing them to perform unauthorized deletions of artifacts. The vulnerability specifically affects the handling of artifact deletions within the application, as demonstrated by the ability of a low privilege user to delete a directory inside an artifact using a DELETE request, despite the official documentation stating that users with EDIT permission can only read and update artifacts, not delete them." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de control de acceso roto en las versiones mlflow/mlflow anteriores a la 2.10.1, donde los usuarios con privilegios bajos y con solo permisos EDITAR en un experimento pueden eliminar cualquier artefacto. Este problema surge debido a la falta de una validaci\u00f3n adecuada para las solicitudes DELETE realizadas por usuarios con permisos EDIT, lo que les permite realizar eliminaciones no autorizadas de artefactos. La vulnerabilidad afecta espec\u00edficamente el manejo de eliminaciones de artefactos dentro de la aplicaci\u00f3n, como lo demuestra la capacidad de un usuario con privilegios bajos de eliminar un directorio dentro de un artefacto mediante una solicitud DELETE, a pesar de que la documentaci\u00f3n oficial indica que los usuarios con permiso EDITAR solo pueden leer y actualizar. artefactos, no eliminarlos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json index 3d59a5abd3c..cab2a2d9197 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4279", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:10.667", - "lastModified": "2024-05-16T06:15:10.667", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json index 05f765d874e..b7c0b92b305 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4288", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:48.373", - "lastModified": "2024-05-16T11:15:48.373", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json index 37d86b1a706..1b91c30a0d9 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4318", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:11.480", - "lastModified": "2024-05-16T06:15:11.480", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4321.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4321.json index ba312f03e27..59efa524332 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4321.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4321.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4321", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:16.327", - "lastModified": "2024-05-16T09:15:16.327", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales (LFI) en la aplicaci\u00f3n gaizhenbiao/chuanhuchatgpt, espec\u00edficamente dentro de la funcionalidad para cargar el historial de chat. La vulnerabilidad surge debido a una validaci\u00f3n de entrada incorrecta al manejar rutas de archivos durante el proceso de carga del historial de chat. Un atacante puede aprovechar esta vulnerabilidad interceptando solicitudes y manipulando el par\u00e1metro 'nombre' para especificar rutas de archivo arbitrarias. Esto permite al atacante leer archivos confidenciales en el servidor, lo que provoca una fuga de informaci\u00f3n, incluidas claves API e informaci\u00f3n privada. El problema afecta a la versi\u00f3n 20240310 de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json index 06af788d066..c746efef72c 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4322.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4322", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:16.613", - "lastModified": "2024-05-16T09:15:16.613", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `/list_personalities` endpoint. By manipulating the `category` parameter, an attacker can traverse the directory structure and list any directory on the system. This issue affects the latest version of the application. The vulnerability is due to improper handling of user-supplied input in the `list_personalities` function, where the `category` parameter can be controlled to specify arbitrary directories for listing. Successful exploitation of this vulnerability could allow an attacker to list all folders in the drive on the system, potentially leading to information disclosure." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro del endpoint `/list_personalities`. Al manipular el par\u00e1metro \"categor\u00eda\", un atacante puede atravesar la estructura del directorio y enumerar cualquier directorio del sistema. Este problema afecta a la \u00faltima versi\u00f3n de la aplicaci\u00f3n. La vulnerabilidad se debe al manejo inadecuado de la entrada proporcionada por el usuario en la funci\u00f3n `list_personalities`, donde el par\u00e1metro `category` se puede controlar para especificar directorios arbitrarios para listar. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante enumerar todas las carpetas en la unidad del sistema, lo que podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json index b7ace5f3897..13f9e573bed 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4326.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4326", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:16.887", - "lastModified": "2024-05-16T09:15:16.887", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the `/apply_settings` and `/execute_code` endpoints. Attackers can bypass protections by setting the host to localhost, enabling code execution, and disabling code validation through the `/apply_settings` endpoint. Subsequently, arbitrary commands can be executed remotely via the `/execute_code` endpoint, exploiting the delay in settings enforcement. This issue was addressed in version 9.5." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en las versiones parisneo/lollms-webui hasta 9.3 permite a atacantes remotos ejecutar c\u00f3digo arbitrario. La vulnerabilidad se debe a una protecci\u00f3n insuficiente de los endpoints `/apply_settings` y `/execute_code`. Los atacantes pueden eludir las protecciones configurando el host en localhost, habilitando la ejecuci\u00f3n de c\u00f3digo y deshabilitando la validaci\u00f3n de c\u00f3digo a trav\u00e9s del endpoint `/apply_settings`. Posteriormente, se pueden ejecutar comandos arbitrarios de forma remota a trav\u00e9s del endpoint `/execute_code`, aprovechando el retraso en la aplicaci\u00f3n de la configuraci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 9.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json index 242d987ebd6..f51b22bd19f 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4351", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:09.890", - "lastModified": "2024-05-16T10:15:09.890", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json index 474488c2dbf..a7f0b154d91 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4352", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:10.470", - "lastModified": "2024-05-16T10:15:10.470", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json index 53a8d3b5cc0..d1c5767366b 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4385", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:48.577", - "lastModified": "2024-05-16T11:15:48.577", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json index 0b8a0e5a5bf..4cfef4b9429 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4391.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4391", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:17.143", - "lastModified": "2024-05-16T09:15:17.143", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Event Calendar widget in all versions up to, and including, 3.10.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Happy Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Calendario de eventos del complemento en todas las versiones hasta la 3.10.7 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json index f45dddd1630..3f8a0283bc9 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4400", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:48.773", - "lastModified": "2024-05-16T11:15:48.773", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json index f373ece2632..0fef7fc7421 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4478", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T08:15:38.200", - "lastModified": "2024-05-16T08:15:38.200", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json index 09dc798eaec..4e28746a7c6 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4546", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T08:15:38.487", - "lastModified": "2024-05-16T08:15:38.487", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json new file mode 100644 index 00000000000..7d8bf079707 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4580.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4580", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-16T12:15:13.857", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The Master Addons \u2013 Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in versions up to, and including, 2.0.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1546", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L1068", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3087193/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e3ac84-dd82-42b0-80b9-c876731170d5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json index 7490308c205..79585e33125 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4617", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:48.967", - "lastModified": "2024-05-16T11:15:48.967", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json index 73941603ead..b7a3f09684b 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4634.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4634", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:49.153", - "lastModified": "2024-05-16T11:15:49.153", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json index d8e62f9c5e0..f9efadb6913 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4635", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:12.090", - "lastModified": "2024-05-16T06:15:12.090", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4642.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4642.json index a5422a50d6a..c93ac2c352e 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4642.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4642.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4642", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:17.360", - "lastModified": "2024-05-16T09:15:17.360", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the wandb/wandb repository due to improper handling of HTTP 302 redirects. This issue allows team members with access to the 'User settings -> Webhooks' function to exploit this vulnerability to access internal HTTP(s) servers. In severe cases, such as on AWS instances, this could potentially be abused to achieve remote code execution on the victim's machine. The vulnerability is present in the latest version of the repository." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Server Side Request Forgery (SSRF) en el repositorio wandb/wandb debido a un manejo inadecuado de las redirecciones HTTP 302. Este problema permite a los miembros del equipo con acceso a la funci\u00f3n 'Configuraci\u00f3n de usuario -> Webhooks' aprovechar esta vulnerabilidad para acceder a servidores HTTP internos. En casos graves, como en instancias de AWS, se podr\u00eda abusar de esto para lograr la ejecuci\u00f3n remota de c\u00f3digo en la m\u00e1quina de la v\u00edctima. La vulnerabilidad est\u00e1 presente en la \u00faltima versi\u00f3n del repositorio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json new file mode 100644 index 00000000000..4f09e64c927 --- /dev/null +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4760.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4760", + "sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", + "published": "2024-05-16T13:15:47.893", + "lastModified": "2024-05-16T13:15:47.893", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A voltage glitch during the startup of EEFC NVM controllers on Microchip SAM E70/S70/V70/V71 microcontrollers allows access to the memory bus via the debug interface even if the security bit is set." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1247" + } + ] + } + ], + "references": [ + { + "url": "https://www.0x01team.com/hw_security/bypassing-microchip-atmel-sam-e70-s70-v70-v71-security/", + "source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json new file mode 100644 index 00000000000..7945702527b --- /dev/null +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4826.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4826", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-05-16T12:15:14.330", + "lastModified": "2024-05-16T13:15:48.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in Simple PHP Shopping Cart affecting version 0.9. This vulnerability could allow an attacker to retrieve all the information stored in the database by sending a specially crafted SQL query, due to the lack of proper sanitisation of the category_id parameter in the category.php file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-simple-php-shopping-cart", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json index 0a3504cca1b..8479ed94b40 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4838.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4838", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:49.343", - "lastModified": "2024-05-16T11:15:49.343", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json index 727fc2cf185..e3b33c8041c 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4843", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-05-16T06:15:12.690", - "lastModified": "2024-05-16T06:15:12.690", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json index 3effe9f1802..07eee6cdd93 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4844.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4844", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-05-16T07:15:50.743", - "lastModified": "2024-05-16T07:15:50.743", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4904.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4904.json index dd35373cc1c..eba87381bca 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4904.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4904.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4904", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T20:15:13.750", - "lastModified": "2024-05-15T20:15:13.750", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Byzoro Smart S200 Management Platform up to 20240507. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264437 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Byzoro Smart S200 Management Platform hasta 20240507 y fue calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /useratte/userattestation.php. La manipulaci\u00f3n del argumento web_img conduce a una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264437. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4906.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4906.json index f7bf4c075d6..6f303ff1ace 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4906.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4906.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4906", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T19:15:08.203", - "lastModified": "2024-05-15T19:15:08.203", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/show_student1.php. The manipulation of the argument grade leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264441 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Complete Web-Based School Management System 1.0 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /view/show_student1.php. La manipulaci\u00f3n del grado del argumento conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264441." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4907.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4907.json index cff79cad0c2..9cd4559c14b 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4907.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4907.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4907", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T19:15:08.607", - "lastModified": "2024-05-15T19:15:08.607", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Campcodes Complete Web-Based School Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/show_student2.php. The manipulation of the argument grade leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264442 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Complete Web-Based School Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /view/show_student2.php. La manipulaci\u00f3n del grado del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-264442 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4908.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4908.json index 362fad60016..9eeeb580218 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4908.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4908.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4908", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T19:15:08.980", - "lastModified": "2024-05-15T19:15:08.980", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /view/student_attendance_history1.php. The manipulation of the argument index leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264443." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Complete Web-Based School Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /view/student_attendance_history1.php. La manipulaci\u00f3n del \u00edndice del argumento conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264443." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4909.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4909.json index 28386093a43..5afb12f180c 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4909.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4909.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4909", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T19:15:09.320", - "lastModified": "2024-05-15T19:15:09.320", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /view/student_due_payment.php. The manipulation of the argument due_year leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264444." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Web-Based School Management System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /view/student_due_paid.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento debido_a\u00f1o conduce a la inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-264444." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4910.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4910.json index 4dbd2364c3c..5db906c31f3 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4910.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4910.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4910", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T20:15:14.167", - "lastModified": "2024-05-15T20:15:14.167", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Web-Based School Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /view/student_exam_mark_insert_form1.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del grado del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264445." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4911.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4911.json index 16f603e3e45..2b01a7f7fa1 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4911.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4911.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4911", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T21:15:08.447", - "lastModified": "2024-05-15T21:15:08.447", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument exam leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264446 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Web-Based School Management System 1.0. Ha sido calificado como cr\u00edtico. Una funci\u00f3n desconocida del archivo /view/student_exam_mark_update_form.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del examen de argumentos conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-264446 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4912.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4912.json index 4f509c439a3..28e9a856b29 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4912.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4912.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4912", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T21:15:08.720", - "lastModified": "2024-05-15T21:15:08.720", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Campcodes Online Examination System 1.0. This affects an unknown part of the file addExamExe.php. The manipulation of the argument examTitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264447." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Una parte desconocida del archivo addExamExe.php afecta a una parte desconocida. La manipulaci\u00f3n del argumento examTitle conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264447." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4913.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4913.json index 15fe5651f1a..9c3eb742652 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4913.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4913.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4913", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T21:15:09.000", - "lastModified": "2024-05-15T21:15:09.000", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Campcodes Online Examination System 1.0. This vulnerability affects unknown code of the file exam.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264448." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo exam.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-264448." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4914.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4914.json index 22ebcc47a57..2f012735448 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4914.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4914.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4914", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T22:15:09.153", - "lastModified": "2024-05-15T22:15:09.153", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Campcodes Online Examination System 1.0. This issue affects some unknown processing of the file ranking-exam.php. The manipulation of the argument exam_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264449 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo ranking-exam.php. La manipulaci\u00f3n del argumento exam_id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264449." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4915.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4915.json index 2691f617b8a..8e3b250ec43 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4915.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4915.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4915", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T22:15:09.563", - "lastModified": "2024-05-15T22:15:09.563", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Campcodes Online Examination System 1.0. Affected is an unknown function of the file result.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-264450 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo result.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-264450 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4916.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4916.json index a258de4e924..f736f7d394f 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4916.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4916.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4916", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T23:15:07.607", - "lastModified": "2024-05-15T23:15:07.607", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Campcodes Online Examination System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file selExamAttemptExe.php. The manipulation of the argument thisId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264451." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo selExamAttemptExe.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento thisId conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264451." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4917.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4917.json index d0e29128c83..69d0aefb3fe 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4917.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4917.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4917", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T23:15:07.920", - "lastModified": "2024-05-15T23:15:07.920", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Examination System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file submitAnswerExe.php. The manipulation of the argument exmne_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264452." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Campcodes Online Examination System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo submitAnswerExe.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento exmne_id conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-264452." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4918.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4918.json index 9881fab3b6b..cb4409b361c 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4918.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4918.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4918", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-15T23:15:08.210", - "lastModified": "2024-05-15T23:15:08.210", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been classified as critical. This affects an unknown part of the file updateQuestion.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264453 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Examination System 1.0. Ha sido clasificada como cr\u00edtica. Una parte desconocida del archivo updateQuestion.php afecta a esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264453." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json index 7a1d7511a75..5ee150ef902 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4919", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T00:15:08.280", - "lastModified": "2024-05-16T00:15:08.280", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /adminpanel/admin/query/addCourseExe.php. The manipulation of the argument course_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264454 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Examination System 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /adminpanel/admin/query/addCourseExe.php. La manipulaci\u00f3n del argumento nombre_curso conduce a la inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-264454 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json index 557be67c2dc..8abb6c0ec81 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4920", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T00:15:08.563", - "lastModified": "2024-05-16T00:15:08.563", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264455." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el sitio del foro de discusi\u00f3n en l\u00ednea SourceCodester 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo RegisterH.php. La manipulaci\u00f3n del argumento ima conduce a una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264455." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json index 961ee1282c6..0af51e1d195 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4921", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T01:15:07.540", - "lastModified": "2024-05-16T01:15:07.540", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json index 8f129af8c31..3937e5af5b2 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4922", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T01:15:07.813", - "lastModified": "2024-05-16T01:15:07.813", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json index 9c14b49de6e..bf7fc0eed7f 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4923", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T02:15:07.900", - "lastModified": "2024-05-16T02:15:07.900", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4925.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4925.json index 5d04f8b79e8..57e83951879 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4925.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4925", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T02:15:08.390", - "lastModified": "2024-05-16T02:15:08.390", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4926.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4926.json index 491429523c0..1f559c1bf80 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4926.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4926.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4926", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T02:15:08.693", - "lastModified": "2024-05-16T02:15:08.693", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4927.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4927.json index 5cfbf949728..3a62111a1e4 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4927.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4927.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4927", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T03:15:08.123", - "lastModified": "2024-05-16T03:15:08.123", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4928.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4928.json index 62d444ff04a..6d5e975247b 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4928.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4928", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T03:15:08.387", - "lastModified": "2024-05-16T03:15:08.387", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4929.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4929.json index 5fafdc81c21..1e826c7b5d2 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4929.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4929", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T04:15:09.997", - "lastModified": "2024-05-16T04:15:09.997", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4930.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4930.json index 5fe9475a5ba..7dc831d89a1 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4930.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4930.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4930", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T04:15:14.873", - "lastModified": "2024-05-16T04:15:14.873", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4931.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4931.json index 3e8691beb0d..8d0c17e5353 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4931.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4931.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4931", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T05:15:51.297", - "lastModified": "2024-05-16T05:15:51.297", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4932.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4932.json index 29e380e14aa..68911b8606f 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4932.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4932.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4932", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T05:15:51.653", - "lastModified": "2024-05-16T05:15:51.653", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4933.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4933.json index 3db83047307..f957b7ec705 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4933.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4933", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T05:15:51.923", - "lastModified": "2024-05-16T05:15:51.923", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4945.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4945.json index 3e1f146d831..fede500ebbc 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4945.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4945", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T05:15:52.187", - "lastModified": "2024-05-16T05:15:52.187", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4946.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4946.json index f27e28fad64..815bb3dc170 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4946.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4946", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T06:15:13.547", - "lastModified": "2024-05-16T06:15:13.547", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json index 305af446193..d77bc45736b 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4947.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4947", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.273", - "lastModified": "2024-05-15T21:15:09.273", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Type Confusion en V8 en Google Chrome anterior a 125.0.6422.60 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de la sandbox a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json index da35c8fbc29..49b69bb0d9c 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4948.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4948", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.347", - "lastModified": "2024-05-15T21:15:09.347", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free en Dawn en Google Chrome anterior a 125.0.6422.60 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json index 38b9c2904ff..a313b4b4c35 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4949.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4949", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.430", - "lastModified": "2024-05-15T21:15:09.430", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "Use after free en V8 en Google Chrome anterior a 125.0.6422.60 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json index 917e4a2b067..d8848aecc69 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4950.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4950", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-15T21:15:09.493", - "lastModified": "2024-05-15T21:15:09.493", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)" + }, + { + "lang": "es", + "value": "La implementaci\u00f3n inapropiada en Descargas en Google Chrome anterior a 125.0.6422.60 permiti\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos espec\u00edficos de la interfaz de usuario para realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4960.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4960.json index 55763d7c450..653f3495f91 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4960.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4960", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T06:15:14.650", - "lastModified": "2024-05-16T06:15:14.650", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4961.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4961.json index a390f7d3368..8df260899cb 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4961.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4961.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4961", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T06:15:15.653", - "lastModified": "2024-05-16T06:15:15.653", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4962.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4962.json index d6de7d8e356..978ebdaba2f 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4962.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4962", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T07:15:52.070", - "lastModified": "2024-05-16T07:15:52.070", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4963.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4963.json index 3d3ad0d5165..4987c032a6d 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4963.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4963.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4963", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T07:15:53.317", - "lastModified": "2024-05-16T07:15:53.317", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4964.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4964.json index da725981d11..ef202850672 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4964.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4964", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T08:15:38.693", - "lastModified": "2024-05-16T08:15:38.693", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4965.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4965.json index f92f5342ed2..22501d1875e 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4965.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4965", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T08:15:39.030", - "lastModified": "2024-05-16T08:15:39.030", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4966.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4966.json index c985b6fcfad..66b45e24d49 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4966.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4966", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T08:15:39.317", - "lastModified": "2024-05-16T08:15:39.317", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4967.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4967.json index fdd079cdcb7..0fb2fb5aa71 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4967.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4967.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4967", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T09:15:17.617", - "lastModified": "2024-05-16T09:15:17.617", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Interactive Map with Marker 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /endpoint/delete-mark.php. The manipulation of the argument mark leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264535." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Interactive Map con Marker 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /endpoint/delete-mark.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento mark conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-264535." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4968.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4968.json index 0fd11f39734..93d7b7328e4 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4968.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4968.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4968", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T09:15:17.953", - "lastModified": "2024-05-16T09:15:17.953", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Interactive Map with Marker 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Marker Name of the component Add Marker. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264536." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Interactive Map con Marker 1.0. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo Marker Name del componente Add Marker es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-264536." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json index d3292a47d0d..a73aff80f48 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4972", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T09:15:18.277", - "lastModified": "2024-05-16T09:15:18.277", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Simple Chat System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264537 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en code-projects Simple Chat System 1.0 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /login.php. La manipulaci\u00f3n del argumento correo electr\u00f3nico/contrase\u00f1a conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-264537." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json index 31ecb204f81..c4b3560b45c 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4973", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:10.973", - "lastModified": "2024-05-16T10:15:10.973", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json index 8d96f87709c..c9ce6205a91 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4974", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:11.973", - "lastModified": "2024-05-16T10:15:11.973", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json index 38910505cd7..cb3227d604c 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4975", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:12.703", - "lastModified": "2024-05-16T10:15:12.703", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json index df52d20da7b..2644bb5f763 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4976", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-05-15T21:15:09.560", - "lastModified": "2024-05-15T21:15:09.560", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Out-of-bounds array write in Xpdf 4.05 and earlier, due to missing object type check in AcroForm field reference." + }, + { + "lang": "es", + "value": "Escritura de matriz fuera de los l\u00edmites en Xpdf 4.05 y versiones anteriores, debido a que falta la verificaci\u00f3n del tipo de objeto en la referencia del campo AcroForm." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json index 9aa1f15ad8f..d5d8f781317 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4984", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T02:15:09.003", - "lastModified": "2024-05-16T02:15:09.003", - "vulnStatus": "Received", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json new file mode 100644 index 00000000000..c7405c9ae6e --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4991.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4991", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-05-16T12:15:14.510", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_pass/aksi_pass.php parameter in nama_lengkap. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-siadmin", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json new file mode 100644 index 00000000000..947c3c961f6 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4992.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4992", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-05-16T12:15:14.950", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_kuliah/aksi_kuliah.php parameter in nim. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-siadmin", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json new file mode 100644 index 00000000000..3131cf50a8a --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4993.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4993", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-05-16T12:15:15.290", + "lastModified": "2024-05-16T13:03:05.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in SiAdmin 1.1 that allows XSS via the /show.php query parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and thereby steal their cookie session credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-siadmin", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json new file mode 100644 index 00000000000..a1b5cf1921e --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4999.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-4999", + "sourceIdentifier": "research@onekey.com", + "published": "2024-05-16T13:15:48.357", + "lastModified": "2024-05-16T13:15:48.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of multiple Ligowave devices could allow an authenticated remote\u00a0attacker to execute arbitrary commands with elevated privileges.This issue affects UNITY: through 6.95-2; PRO: through 6.95-1.Rt3883; MIMO: through 6.95-1.Rt2880; APC Propeller: through 2-5.95-4.Rt3352." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "research@onekey.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://onekey.com/blog/security-advisory-remote-code-execution-in-ligowave-devices/", + "source": "research@onekey.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0d14d6d16fb..e0e13b7fe71 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-16T12:00:53.372950+00:00 +2024-05-16T14:00:29.963246+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-16T11:15:49.343000+00:00 +2024-05-16T13:15:48.357000+00:00 ``` ### Last Data Feed Release @@ -33,35 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -250147 +250163 ``` ### CVEs added in the last Commit Recently added CVEs: `16` -- [CVE-2024-35299](CVE-2024/CVE-2024-352xx/CVE-2024-35299.json) (`2024-05-16T11:15:47.460`) -- [CVE-2024-35300](CVE-2024/CVE-2024-353xx/CVE-2024-35300.json) (`2024-05-16T11:15:47.720`) -- [CVE-2024-35301](CVE-2024/CVE-2024-353xx/CVE-2024-35301.json) (`2024-05-16T11:15:47.947`) -- [CVE-2024-35302](CVE-2024/CVE-2024-353xx/CVE-2024-35302.json) (`2024-05-16T11:15:48.160`) -- [CVE-2024-4222](CVE-2024/CVE-2024-42xx/CVE-2024-4222.json) (`2024-05-16T10:15:08.687`) -- [CVE-2024-4288](CVE-2024/CVE-2024-42xx/CVE-2024-4288.json) (`2024-05-16T11:15:48.373`) -- [CVE-2024-4351](CVE-2024/CVE-2024-43xx/CVE-2024-4351.json) (`2024-05-16T10:15:09.890`) -- [CVE-2024-4352](CVE-2024/CVE-2024-43xx/CVE-2024-4352.json) (`2024-05-16T10:15:10.470`) -- [CVE-2024-4385](CVE-2024/CVE-2024-43xx/CVE-2024-4385.json) (`2024-05-16T11:15:48.577`) -- [CVE-2024-4400](CVE-2024/CVE-2024-44xx/CVE-2024-4400.json) (`2024-05-16T11:15:48.773`) -- [CVE-2024-4617](CVE-2024/CVE-2024-46xx/CVE-2024-4617.json) (`2024-05-16T11:15:48.967`) -- [CVE-2024-4634](CVE-2024/CVE-2024-46xx/CVE-2024-4634.json) (`2024-05-16T11:15:49.153`) -- [CVE-2024-4838](CVE-2024/CVE-2024-48xx/CVE-2024-4838.json) (`2024-05-16T11:15:49.343`) -- [CVE-2024-4973](CVE-2024/CVE-2024-49xx/CVE-2024-4973.json) (`2024-05-16T10:15:10.973`) -- [CVE-2024-4974](CVE-2024/CVE-2024-49xx/CVE-2024-4974.json) (`2024-05-16T10:15:11.973`) -- [CVE-2024-4975](CVE-2024/CVE-2024-49xx/CVE-2024-4975.json) (`2024-05-16T10:15:12.703`) +- [CVE-2024-30283](CVE-2024/CVE-2024-302xx/CVE-2024-30283.json) (`2024-05-16T12:15:08.407`) +- [CVE-2024-30286](CVE-2024/CVE-2024-302xx/CVE-2024-30286.json) (`2024-05-16T12:15:09.097`) +- [CVE-2024-30287](CVE-2024/CVE-2024-302xx/CVE-2024-30287.json) (`2024-05-16T12:15:09.700`) +- [CVE-2024-30288](CVE-2024/CVE-2024-302xx/CVE-2024-30288.json) (`2024-05-16T12:15:10.330`) +- [CVE-2024-30289](CVE-2024/CVE-2024-302xx/CVE-2024-30289.json) (`2024-05-16T12:15:10.897`) +- [CVE-2024-30290](CVE-2024/CVE-2024-302xx/CVE-2024-30290.json) (`2024-05-16T12:15:11.527`) +- [CVE-2024-30291](CVE-2024/CVE-2024-302xx/CVE-2024-30291.json) (`2024-05-16T12:15:12.107`) +- [CVE-2024-30292](CVE-2024/CVE-2024-302xx/CVE-2024-30292.json) (`2024-05-16T12:15:12.713`) +- [CVE-2024-30314](CVE-2024/CVE-2024-303xx/CVE-2024-30314.json) (`2024-05-16T12:15:13.280`) +- [CVE-2024-4580](CVE-2024/CVE-2024-45xx/CVE-2024-4580.json) (`2024-05-16T12:15:13.857`) +- [CVE-2024-4760](CVE-2024/CVE-2024-47xx/CVE-2024-4760.json) (`2024-05-16T13:15:47.893`) +- [CVE-2024-4826](CVE-2024/CVE-2024-48xx/CVE-2024-4826.json) (`2024-05-16T12:15:14.330`) +- [CVE-2024-4991](CVE-2024/CVE-2024-49xx/CVE-2024-4991.json) (`2024-05-16T12:15:14.510`) +- [CVE-2024-4992](CVE-2024/CVE-2024-49xx/CVE-2024-4992.json) (`2024-05-16T12:15:14.950`) +- [CVE-2024-4993](CVE-2024/CVE-2024-49xx/CVE-2024-4993.json) (`2024-05-16T12:15:15.290`) +- [CVE-2024-4999](CVE-2024/CVE-2024-49xx/CVE-2024-4999.json) (`2024-05-16T13:15:48.357`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `127` +- [CVE-2024-4930](CVE-2024/CVE-2024-49xx/CVE-2024-4930.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4931](CVE-2024/CVE-2024-49xx/CVE-2024-4931.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4932](CVE-2024/CVE-2024-49xx/CVE-2024-4932.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4933](CVE-2024/CVE-2024-49xx/CVE-2024-4933.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4945](CVE-2024/CVE-2024-49xx/CVE-2024-4945.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4946](CVE-2024/CVE-2024-49xx/CVE-2024-4946.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4947](CVE-2024/CVE-2024-49xx/CVE-2024-4947.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4948](CVE-2024/CVE-2024-49xx/CVE-2024-4948.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4949](CVE-2024/CVE-2024-49xx/CVE-2024-4949.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4950](CVE-2024/CVE-2024-49xx/CVE-2024-4950.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4960](CVE-2024/CVE-2024-49xx/CVE-2024-4960.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4961](CVE-2024/CVE-2024-49xx/CVE-2024-4961.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4962](CVE-2024/CVE-2024-49xx/CVE-2024-4962.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4963](CVE-2024/CVE-2024-49xx/CVE-2024-4963.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4964](CVE-2024/CVE-2024-49xx/CVE-2024-4964.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4965](CVE-2024/CVE-2024-49xx/CVE-2024-4965.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4966](CVE-2024/CVE-2024-49xx/CVE-2024-4966.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4967](CVE-2024/CVE-2024-49xx/CVE-2024-4967.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4968](CVE-2024/CVE-2024-49xx/CVE-2024-4968.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4972](CVE-2024/CVE-2024-49xx/CVE-2024-4972.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4973](CVE-2024/CVE-2024-49xx/CVE-2024-4973.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4974](CVE-2024/CVE-2024-49xx/CVE-2024-4974.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4975](CVE-2024/CVE-2024-49xx/CVE-2024-4975.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4976](CVE-2024/CVE-2024-49xx/CVE-2024-4976.json) (`2024-05-16T13:03:05.353`) +- [CVE-2024-4984](CVE-2024/CVE-2024-49xx/CVE-2024-4984.json) (`2024-05-16T13:03:05.353`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0064171ef11..5dfdda3fbf9 100644 --- a/_state.csv +++ b/_state.csv @@ -229320,7 +229320,7 @@ CVE-2023-40293,0,0,3e91b40761ee299655829605f60c684af2a5be7622d2e61ae3ccedf339529 CVE-2023-40294,0,0,d4bd6509d5c1ac7e980af451b8a70fd7d25239a642ad089d43c8d5295f4c19e4,2023-08-21T17:25:38.010000 CVE-2023-40295,0,0,a743eadcf15cc96af9c3861d2210341230395528d845a64c1ccef9069b916475,2023-08-21T17:35:53.970000 CVE-2023-40296,0,0,6fa5b6a6cc075360dfd806c6ac6e24533f004f65081952e873daa3d057118e65,2023-08-22T16:26:40.227000 -CVE-2023-40297,0,0,e62d2327e729521dda43bbd10b29ddfb3c1f9e9a9de6f06ccce8d75e4976cad5,2024-05-15T20:15:08.767000 +CVE-2023-40297,0,1,18cef25866662f88b02caa3ef4414d199858a4b2ce5bde6b3864469aba4c5e4a,2024-05-16T13:03:05.353000 CVE-2023-40299,0,0,c403d355d03425836ef9677b0a19b2c1f60383456e53bb25ea5048d388ab5ab5,2023-10-12T17:32:03.607000 CVE-2023-4030,0,0,d357275122959a0f2477f9ecad7a5c2fbfddb1530041a10f12b3e5e5399828d2,2023-08-24T20:29:39.293000 CVE-2023-40300,0,0,12b768d230215ee821727c2018b2bf2ec81a405ef96ae608fc36f431cdf69658,2023-12-12T18:55:01.573000 @@ -241386,9 +241386,9 @@ CVE-2024-20779,0,0,6fd5665d768cb852ea47732221a85e067d0080ad0de1ca2d2241cb625c59d CVE-2024-2078,0,0,1f3625edc40ce981dfa798326c49d364352417c97edbdeb08f2797c1a0a609b2,2024-03-01T14:04:04.827000 CVE-2024-20780,0,0,ec1b341950c30681e570ac487b080ed639019cf375cf8a334e95e6a235124aee,2024-04-10T13:23:38.787000 CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000 -CVE-2024-20791,0,0,84c1fcc1cf2a2f9248bc07ac3a30e99d65c6562db5c647af61281c7d1985725b,2024-05-16T09:15:08.967000 -CVE-2024-20792,0,0,edfc1eee897f9bdb22af8fe557d6e04ca7053655344d1e3b6c23ef6edd5c52b4,2024-05-16T09:15:09.313000 -CVE-2024-20793,0,0,c6e04f85678f218a2953c51b0c33b925324cdec398e48bdc733638cbd18428f4,2024-05-16T09:15:09.560000 +CVE-2024-20791,0,1,6ae32de89b08b66010819c96a63cf49f80a9e718d1409ae2a6de7b882e299c4b,2024-05-16T13:03:05.353000 +CVE-2024-20792,0,1,a8a71e807ddcdd15b2aca7fa7925ba09db515fd84458ec98a3300e57fc319478,2024-05-16T13:03:05.353000 +CVE-2024-20793,0,1,84baa74cf8b8ec2238418b9ecfbbab63983fe0f74c289ae68c175927e88ce50a,2024-05-16T13:03:05.353000 CVE-2024-20794,0,0,4fe1712e563ebe7ce315d7e522a29bf13a19a3e9ef230be176694920d61afc35,2024-04-11T12:47:44.137000 CVE-2024-20795,0,0,cd7ff50f8ca961947e205c660b3364abe9f8ebb2130c9ff9ad7235f8951a7a63,2024-04-11T12:47:44.137000 CVE-2024-20796,0,0,9f91cdf60843a0b7b0c45e20f9d786e0895d9dcbe5e5ddd6c81933919004da26,2024-04-11T12:47:44.137000 @@ -242996,7 +242996,7 @@ CVE-2024-23560,0,0,39262a3d1a015486541c11a9acaae3509226c69e322cbf4650c4cfad43009 CVE-2024-23561,0,0,a22fcf5dfd91b5d6ac506750080d833a3983c3c231b1230f7c5930b307faa639,2024-04-16T13:24:07.103000 CVE-2024-2357,0,0,2af3f167a5f07c033333870e1f5044e9ac66d1548287fd20eff05541e2132cfb,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,fa772848f65b9fbe0b2af01b9b9bd28d30a4b44840aadc43b28ff198f7906160,2024-05-14T16:13:02.773000 -CVE-2024-2358,0,0,3be16f8ef71cfe052eae2ae6426efb1299f3092c560fd6816cd53dcb3dd7e074,2024-05-16T09:15:09.800000 +CVE-2024-2358,0,1,a1b0ff86c10dcc0cc90254078c2507c7f215f808024299c95ae7b33a0c1059e0,2024-05-16T13:03:05.353000 CVE-2024-23584,0,0,0a74df816091d3b0eb89fda75cd2dbdfa4a27fc3d1fc7171d6cfed2608adfd53,2024-04-11T01:24:48.327000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000 @@ -243010,7 +243010,7 @@ CVE-2024-23606,0,0,d18ee66738a0da29eed7ca7740f6d3a4a5bb4a5d8a6f1fc93eccc3dec2fe5 CVE-2024-23607,0,0,9d7c732921220f83b5eff07690b54ea6a115e7a3e6165a5081dc42626650ab39,2024-02-14T18:04:45.380000 CVE-2024-23608,0,0,3de025d97d44c421580b59364372ba43cab7d3ef0ff9a5a0120be3556bbac80a,2024-03-12T12:40:13.500000 CVE-2024-23609,0,0,b3be023bb78290eb112f306f7c609bf3dbdddb2899da6c9044083739ccf10869,2024-03-12T12:40:13.500000 -CVE-2024-2361,0,0,bcde77055f2de3e9d14ac8291d73be388724508ea1dc9144724d47e3cdaeebe4,2024-05-16T09:15:10.060000 +CVE-2024-2361,0,1,2fc81a79b37ce6edc21fe117fe73a9bce4c57dbdbaf8210324e8070b9439641b,2024-05-16T13:03:05.353000 CVE-2024-23610,0,0,ed01f5879c3263ca1842cb29bf18f310cc2dd5aaf50dffe03c49f8b4e513a3ea,2024-03-12T12:40:13.500000 CVE-2024-23611,0,0,efc77da11ed29bd672c8a01121d66b481444a3909d7d6d570c57883210aa579f,2024-03-12T12:40:13.500000 CVE-2024-23612,0,0,905fa11223afb6b2fa02b73efda7bdd729dee0c227ce723282717a065d8df6b3,2024-03-12T12:40:13.500000 @@ -243060,7 +243060,7 @@ CVE-2024-23655,0,0,b4fe4299d47f9606e4fc07c80e04bb15761ba2650f126678feb918b4172cc CVE-2024-23656,0,0,695cb145f7353545c42b021c49ddb6b311a4d25b9fa1e7632b8b33e1235c65fb,2024-01-31T23:26:14.650000 CVE-2024-23658,0,0,4fd332de96fe33333de93e4a2a6d5b75daef55cd44cb46bff5d3000338fc5623,2024-04-08T18:48:40.217000 CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32583,2024-01-25T14:58:22.470000 -CVE-2024-2366,0,0,964193c234b21012eaa98c62f515d3878c1342fd340b15cc7b2c5082dd1a0314,2024-05-16T09:15:10.287000 +CVE-2024-2366,0,1,561eca4f7d46892009230ef936eca60ce1d593865f21bb5667643256074aa468,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000 CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000 @@ -244978,7 +244978,7 @@ CVE-2024-26818,0,0,40d26d3276805e6255d3381973075daff640f2dd2a4dd14cbf39bd569614d CVE-2024-26819,0,0,06d730ad66f717e3ecec94095811f6f9ed240664c50d7732b1864909f513ae5d,2024-04-18T13:15:17.797000 CVE-2024-2682,0,0,07a14a310dd9f2d8128ad4d69eee10563e9d029e64b1235f5ada65cd2f7533b1,2024-05-14T15:20:24.890000 CVE-2024-26820,0,0,c8fae26c827412dafe3366c4bb847c85025609a6c5e9371962183b119db767ae,2024-04-17T12:48:07.510000 -CVE-2024-26821,0,0,81fd4716fafd20c99603abae1db13b2068f1e763e6251e86b6b153d4fc41f4ab,2024-04-17T12:48:07.510000 +CVE-2024-26821,0,1,c635c148d41a7a372a1506ed5cbdf4e1a9777cfcab62a42f9f842c5ce3db560c,2024-05-16T13:15:47.693000 CVE-2024-26822,0,0,3373cd9df298397a50e6cc4662867b05a6afb8a025fccfd5e08e2ad618675584,2024-04-17T12:48:07.510000 CVE-2024-26823,0,0,5aafeba587448416d05e5a5a45c02f351c1873fc1ff3f22835930b6b7315f6cd,2024-04-17T12:48:07.510000 CVE-2024-26824,0,0,7b86d4671a489a33c0d3d97b50ccd27d8d19ed1c5836eca3fe2d38f7c1821f3c,2024-04-17T12:48:07.510000 @@ -245355,8 +245355,8 @@ CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb0 CVE-2024-27237,0,0,c9df1e7ac4a8ec03918c32a86c9c817e799f7110838b8d32905600c71cb57808,2024-03-12T12:40:13.500000 CVE-2024-2724,0,0,d84af29dc771f15bf9bc747f8064ec43ed6ea62cecc1d0bdf5353519ea88d1ba,2024-03-22T15:34:43.663000 CVE-2024-27242,0,0,4bcf7143849c415b8cba90784829de5a74333601b3e2c00d25c6430d064be462,2024-04-10T13:24:00.070000 -CVE-2024-27243,0,0,e44f20f525e45fccb02d77d3a6200843def346a565e57649276c04506a3f5eb0,2024-05-15T21:15:07.987000 -CVE-2024-27244,0,0,c6337efca1fe10fb443e4701968ffd92ffe4a5ff6932dae35f9eb59e356d64a3,2024-05-15T21:15:08.220000 +CVE-2024-27243,0,1,2b438b981dda77cf2b01f0e78528609f060bc3cec7a93d74833902b89a562071,2024-05-16T13:03:05.353000 +CVE-2024-27244,0,1,86955bff2ac9401078421ec8919e6b2e957c90d0fc8f6e684bc98e3522394cb8,2024-05-16T13:03:05.353000 CVE-2024-27247,0,0,9590a32000c7161883bd601f17b84889ac73a7794287ae1fd94cd04419528997,2024-04-10T13:24:00.070000 CVE-2024-2725,0,0,f5993e44d4dd2cf17ff419f8f154eb7cefc4802f6428c3ec1541fed0378bb103,2024-03-22T15:34:43.663000 CVE-2024-27254,0,0,6863e2c846e99549e249a94dae3c18d1781ed3b7e7fcc2d6019a28e44086daf5,2024-04-03T17:24:18.150000 @@ -246989,19 +246989,27 @@ CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe8241952 CVE-2024-30271,0,0,7934d49c76a773104fea3a055c8dca49939c18c3dc4eab227ecf5b491d16669d,2024-04-12T12:44:04.930000 CVE-2024-30272,0,0,fe18d25a398b5738660bb343d4a7fb499e0a8c129d952f35b1144eb8f7e44fa0,2024-04-12T12:44:04.930000 CVE-2024-30273,0,0,430d9deac2ea84fb25615ee056f7341da6ab62ae3551a67df5079d8156e28185,2024-04-12T12:44:04.930000 -CVE-2024-30274,0,0,98319c1f12962c392bc43707c5379cf05d11a9b0d1cccaf9176e497769d6d04d,2024-05-16T09:15:10.527000 -CVE-2024-30275,0,0,4dc5196e1adceb46a2cd58d6de25d9d0263dafeeeea9ce442be18438e4c3bd28,2024-05-16T09:15:10.750000 +CVE-2024-30274,0,1,ea320b2fc32c0fdb476d2c0ab4efda98deb6788048802c1cc3928ca8bdf326a3,2024-05-16T13:03:05.353000 +CVE-2024-30275,0,1,d16e773c605f70022ed5df1bd2ddfcc850ca04e2873a45192df9e9ce97353724,2024-05-16T13:03:05.353000 CVE-2024-3028,0,0,080bb069f1a2cade59952c14793e39c6c54825fa436573f5b60987254afab568,2024-04-16T13:24:07.103000 -CVE-2024-30281,0,0,ceb11143d1c3b200aeec3632b6967e0f862464b26fbed385406ffe2e513cac36,2024-05-16T09:15:11.007000 -CVE-2024-30282,0,0,6a26e26231e329b0120e71ef045faafa06a35c403d616cb625145ff9615424fc,2024-05-16T09:15:11.253000 +CVE-2024-30281,0,1,de4a03f18b4d362e45c8abd1d6a2f653d277028d1f9b089d721cd515134066fb,2024-05-16T13:03:05.353000 +CVE-2024-30282,0,1,5f4dd18d8e113ef668a516844d6f217f536cbf6f4c0912668c34afd05c7f5ed6,2024-05-16T13:03:05.353000 +CVE-2024-30283,1,1,d016ab1adceabc449a300839a0d59bab19f5cef9c141512a42f842dcd3276181,2024-05-16T13:03:05.353000 CVE-2024-30284,0,0,de189b1e4b9646a0079d952b8a9620298ad4d9a49b7d510b99107352710be095,2024-05-15T16:40:19.330000 +CVE-2024-30286,1,1,4f24ea00811d924f7c95395e4ce68660a23a4d0d504f59684c8bd0e0433119fe,2024-05-16T13:03:05.353000 +CVE-2024-30287,1,1,e25e3f94581971c337365b513d45d471b03ffee4a671a13d203f01bcb59d237f,2024-05-16T13:03:05.353000 +CVE-2024-30288,1,1,9e839541318e0cbdd32825ada1ba66896088dabc691fad8b615ec251fbdb6d90,2024-05-16T13:03:05.353000 +CVE-2024-30289,1,1,0eadf55d933c9e25ae8eab7349ace5161ec753c237121e705d3e478320588ccc,2024-05-16T13:03:05.353000 CVE-2024-3029,0,0,54e489ae31021cd62a123b17a985eef09bd69f22c945608ba51d64fcde83450f,2024-04-16T13:24:07.103000 -CVE-2024-30293,0,0,5229f6413859d63f684be1f139a602b63976381916c02fe9ab7b527e7952eb01,2024-05-16T09:15:11.497000 -CVE-2024-30294,0,0,68f09da97f8e68bcf60217ae404b845d55d0cf8c176be99cae376d98cb187f9b,2024-05-16T09:15:11.763000 -CVE-2024-30295,0,0,eb97f8e6c1f98c31e8aa0dcbf9176eaa02e05985db79db30801caa905b3fc6ca,2024-05-16T09:15:11.990000 -CVE-2024-30296,0,0,5468a5ceec33e007623544be201af8985e419821d51d5fc813d08cff897920bf,2024-05-16T09:15:12.213000 -CVE-2024-30297,0,0,3b3016292d18933cc04b0d37897381e1c2847cab088e155388d705c73ec537f3,2024-05-16T09:15:12.447000 -CVE-2024-30298,0,0,89d1d221addd6e5d77df812fffb315d1a425182ad17dfad15eea78d738113dae,2024-05-16T09:15:12.680000 +CVE-2024-30290,1,1,d4ecfadd9511c41ce5b60b98d35c738a90a764fe251753800b5cb760a7c3a234,2024-05-16T13:03:05.353000 +CVE-2024-30291,1,1,ecebe2e8ee7dd2e4d244469fbb821421d880352409ecd453d77731dc3d00aa83,2024-05-16T13:03:05.353000 +CVE-2024-30292,1,1,ffd68cd78f1cb3098255ef829318b866628808694de7d60ea95b38aa8c3a5d38,2024-05-16T13:03:05.353000 +CVE-2024-30293,0,1,d66a767afdb263cc85be84edc38e0fe7403b5a5ee05f28f01d5e9abd43f2594e,2024-05-16T13:03:05.353000 +CVE-2024-30294,0,1,202477e60625413613eb7ebadc2a5590d98481839b08fac1b5f89caaf72c6ce0,2024-05-16T13:03:05.353000 +CVE-2024-30295,0,1,a88181db062ed482266f5ce5ad82ec889d5ade290954436d9fbe03393ebb0224,2024-05-16T13:03:05.353000 +CVE-2024-30296,0,1,87a509062e2352e34c30432a8081e5dbeeb79743dc41024ed33539c241483d4e,2024-05-16T13:03:05.353000 +CVE-2024-30297,0,1,e6b13016cac12082ed7be4ed198a4df564383ab39f445c6a93f8d1afc0e87645,2024-05-16T13:03:05.353000 +CVE-2024-30298,0,1,9df1fa6a01ce64ceb75f4234ba08b1b39922e960158b57b3d399c7b03186b1c5,2024-05-16T13:03:05.353000 CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000 CVE-2024-30301,0,0,34b23729cd9edf28be4c2d988192584b2980a0ec70b16064c51311fdd3e3b57c,2024-05-03T12:50:34.250000 CVE-2024-30302,0,0,6456cd77762c99d131718f53b35582a1960091e5036976e625fc5fc658a078e0,2024-05-03T12:50:34.250000 @@ -247009,12 +247017,13 @@ CVE-2024-30303,0,0,6f33b81c4af944bbf96dcd2699ecddcaedfa18b6645e1843afc4e3d8d61b0 CVE-2024-30304,0,0,c008b216bc83741e9c3f86a48d2f036636f57f601f0be3b09d08b9238e3b8d69,2024-05-03T12:50:34.250000 CVE-2024-30305,0,0,f9170aedfcb56d495924dc338c4bff877992c1a111fc2374df14a2f13d9685ae,2024-05-03T12:50:34.250000 CVE-2024-30306,0,0,3d0be5fa22f6a17837661930cea95c4e979049e02e29ef28995e28fef468bf8e,2024-05-03T12:50:34.250000 -CVE-2024-30307,0,0,379cf774e0980b572fa36f9cbbf65e122356d9ab84ede91da916c6da6f49f17b,2024-05-16T09:15:12.910000 -CVE-2024-30308,0,0,56086f6c7fe17dca2188049767c6d6ef045efc78e3f0061ef066827cbf28e1a0,2024-05-16T09:15:13.137000 -CVE-2024-30309,0,0,92125248f7e2f2a958a2999230312e44cf8675da6cc8130d1c989e150704a7f0,2024-05-16T09:15:13.377000 +CVE-2024-30307,0,1,6e7406a4fee3c149832c8723729925e94f09d6dc076fc2ca51727bd677880d55,2024-05-16T13:03:05.353000 +CVE-2024-30308,0,1,f3c5be7d3593e31136ef89f2d31bd59ace724f63e9e028bd0ea1801ed0623fb5,2024-05-16T13:03:05.353000 +CVE-2024-30309,0,1,b045cc13c21fbf23773bc2a57f1ac3e04d9d6fedb3a00268af23b72213c07cc5,2024-05-16T13:03:05.353000 CVE-2024-30310,0,0,292e05954c7c556b9dd93d8fb2d73a6e02f4c15df54e0c88a8121bc251029ac7,2024-05-15T16:40:19.330000 CVE-2024-30311,0,0,4637fc86d9203a92d21203b252ac4cacdd358c424403e73dfa12bc430db08077,2024-05-15T16:40:19.330000 CVE-2024-30312,0,0,ca26a8ea8bea0527c18456ddc207847852cd3131056e5651de97b059feef616c,2024-05-15T16:40:19.330000 +CVE-2024-30314,1,1,37e6a4df2863b81c606d7dd50e3fd5f86e04221f3a89b631364e8deec966c8be,2024-05-16T13:03:05.353000 CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000 CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000 @@ -247557,7 +247566,7 @@ CVE-2024-31256,0,0,e48b38259a099cbb76cf911e6af5cabc5863a73c22401e27fabcfed8f4418 CVE-2024-31257,0,0,fa456292adcc4270e79a5301f489c6e165d5b1b11341822d1fab40735b36b372,2024-04-08T18:48:40.217000 CVE-2024-31258,0,0,70ba64c3e0672c516aea184bf9b51e94fe678827f2f5693d4b3dbfedfe55d45c,2024-04-08T18:48:40.217000 CVE-2024-31259,0,0,efdb49628f40b67578a55906f9ed71383df344a163aa9aaab9057d7f21783b9d,2024-04-10T19:49:51.183000 -CVE-2024-3126,0,0,88c67ea82f93932465920adbd4aaaca3e57e069581ed190eaea3190f57162831,2024-05-16T09:15:13.840000 +CVE-2024-3126,0,1,abed2f33a31fa9d44eaba62dcf6e7ca4c66b70bf191854f8eed8245cdc8001f8,2024-05-16T13:03:05.353000 CVE-2024-31260,0,0,7e6454e18ac0aac4dfbd56f1964329148e3fb0d2e57f0c69ea3f924848606c06,2024-04-08T18:48:40.217000 CVE-2024-31262,0,0,2a9bcea0985fcaddd83893245a1b9fdc06643313b9df1f9c0a4fa4b5530f3f61,2024-04-15T13:15:51.577000 CVE-2024-31263,0,0,8f2890afedcc5d88494c2f6c1c034154cfb17cbd4a58e7b9478e628be5899862,2024-04-15T13:15:51.577000 @@ -247651,9 +247660,9 @@ CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7 CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000 CVE-2024-3140,0,0,2744d4fc444c3f2c4374003cc63b6e233618c3b69d8d4c39689a5f4bd63a4f88,2024-05-14T15:40:01.177000 CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000 -CVE-2024-31409,0,0,75121b5fd6befad9837845a75d72c51008b62cb175e0851e507e0f538bc5ad0d,2024-05-15T20:15:11.203000 +CVE-2024-31409,0,1,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,bad35b74388efc9a159a74689bd08287dcf312f9e2c82d7b8d2698820a1f4d16,2024-05-14T15:40:01.717000 -CVE-2024-31410,0,0,62f60a42e8c97728999144148612a776755f39d5a3f19a64a21e380500f53c38,2024-05-15T20:15:11.473000 +CVE-2024-31410,0,1,d8bf6820d8f5d6884591de8f3ef108bfc6b4975173a66f374f2676ccab21cc0b,2024-05-16T13:03:05.353000 CVE-2024-31412,0,0,bf5e4b7125888123ed114d5a41d3a9e2f2c13a81227e8af339e531675aae10d6,2024-05-01T19:50:25.633000 CVE-2024-31413,0,0,698cad7cc2e917bb34bb0c2eff1e375ca818f5fcbe8e16911c403ef0fbd2428b,2024-05-01T19:50:25.633000 CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a6d2,2024-04-03T17:24:18.150000 @@ -247829,7 +247838,7 @@ CVE-2024-3185,0,0,7fcf61647d547b77181d5225cd4d3f1f2099e2653d1cd7f2d6fbb610b985c0 CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000 CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000 CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000 -CVE-2024-31856,0,0,2fb6a67e4bccfcb957f4ff072409a4238fd92fa1a8ccff2d33cdd48ef9d0d60d,2024-05-15T20:15:11.710000 +CVE-2024-31856,0,1,62a52705b8ee623f45839141fd2c99784658855012cca1de7b4c490712cad657,2024-05-16T13:03:05.353000 CVE-2024-31857,0,0,3e7ac60afeec75094fbcaec8b53e1a238b7bcb05ca078ef7a1edb4dbe4dfc654,2024-04-23T12:52:09.397000 CVE-2024-31860,0,0,a2cd98cb7498e7c2656edd8e2839918c590dac3d691d82a031a70fae29aab7e2,2024-05-01T18:15:23.393000 CVE-2024-31861,0,0,9373eb863c6ff79969ca8cd07d1a0b13ff0cef9f98ab0a21b4aa070f1acd5bf4,2024-05-01T18:15:23.450000 @@ -247940,13 +247949,13 @@ CVE-2024-32039,0,0,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6 CVE-2024-3204,0,0,bc0f1978e5e6211ff53bd820ee230ce63d55ef94ae9e4225c8cae3bc2ba7740b,2024-05-14T15:40:27.180000 CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000 CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000 -CVE-2024-32042,0,0,18f96607196f60df563ea4d0006bcb08eebbb7c581c1ac075c7d9087f3444b53,2024-05-15T20:15:11.950000 +CVE-2024-32042,0,1,5dfe56871973e211f47062020d55ad1dc7e201605332475bfbb2390642296464,2024-05-16T13:03:05.353000 CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000 -CVE-2024-32047,0,0,81aa201d8f391c623ace611d56c3632457de0b4fca5b72f90454ed1713dff2dc,2024-05-15T20:15:12.197000 +CVE-2024-32047,0,1,f009d59be96ce9fa193a4aa9724cc4cc41ffb33bc61e4f05b98fbbfa91a9068b,2024-05-16T13:03:05.353000 CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000 CVE-2024-3205,0,0,10c74c58b3966e2a00c16f7270bdcbd811aa5b381e01a238860c78cea2b79c84,2024-05-14T15:40:27.550000 CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000 -CVE-2024-32053,0,0,4aad82d61cd1c4047b29c959274705961fb06a479ecc985fe1208eb7f2f4de71,2024-05-15T20:15:12.443000 +CVE-2024-32053,0,1,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000 CVE-2024-32055,0,0,3f8e8a5289d54fb272f8396bfe2ad3739e217a3be6adbbeaee8406791320efbb,2024-05-14T19:17:55.627000 CVE-2024-32057,0,0,51b57062e41a1f932a85024c46a8a2ec9ea669d7244ddac01bd3050c5649adf5,2024-05-14T19:17:55.627000 CVE-2024-32058,0,0,53257fd9b340d779398d943b31a969b49b3889080b3875550678d88fe76d1bbe,2024-05-14T19:17:55.627000 @@ -248732,9 +248741,9 @@ CVE-2024-33604,0,0,3ab2c002c5d377b142c243de99829b91e6a82788bf0b2eb8f577e38ce442a CVE-2024-33608,0,0,75bd6a7cfea3f46ff885a646fe991c9389ed68527f615bf970851ddf524ca214,2024-05-08T17:05:24.083000 CVE-2024-3361,0,0,987fc9016e6caaea2a05e0ecaac54b996dc88be59c54c7758912ef93d8b301eb,2024-05-14T15:40:45.990000 CVE-2024-33612,0,0,0425b598952d370f8a45e51ed1855ee3ad8884230e79284f598bf766f7d5da62,2024-05-08T17:05:24.083000 -CVE-2024-33615,0,0,ecf057e01e02da48e43be47a3267679fd8628e752ae9702d34b92a2ff396f4a4,2024-05-15T20:15:12.687000 +CVE-2024-33615,0,1,41b28b8b67e3206017b00ab76deab87329a0ebd842ccfa49e74f1fc56f1b83a8,2024-05-16T13:03:05.353000 CVE-2024-3362,0,0,6ecfba6acd565e85eacdb7075415486f6ca2cf37583c56497e03b226e597b508,2024-05-14T15:40:46.150000 -CVE-2024-33625,0,0,5178fcf8dfcf7ff7b204eb214114f384509c97b72381770cf1a5dd5cf54c62d7,2024-05-15T20:15:12.927000 +CVE-2024-33625,0,1,a7a653e26a738155ef4ac75e4b2ab045de169bb09a26b4098fd362fd9fccf1a6,2024-05-16T13:03:05.353000 CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000 CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000 CVE-2024-3363,0,0,3541abf9d89d8ffa40b51384a23b6439efdfda78eac97dfab7c1dcd2ccb27dba,2024-05-14T15:40:46.557000 @@ -248918,8 +248927,8 @@ CVE-2024-3400,0,0,bb755e0acb269b886784f5549d850dac352a6e059a8f5cb5827539d3e41b8b CVE-2024-34010,0,0,c31f2f180475c1f3f2204c1feb2010c5ada948eb1b4d37517c54f97316341f08,2024-04-30T13:11:16.690000 CVE-2024-34011,0,0,4e2e0fb5d64e6e75da5ff3561c6f86ff1f891a3646e890e015512c561d328a58,2024-04-30T13:11:16.690000 CVE-2024-34020,0,0,9d9b11f4db84c3770acd92b1150bad9b802c58de4fce781bba37a89c232e029f,2024-04-30T13:11:16.690000 -CVE-2024-34025,0,0,efef57ec9aa0e082e9a5c83219cb61ece32e743eacd52a5ecd541daf92a87dd0,2024-05-15T20:15:13.190000 -CVE-2024-3403,0,0,0ff37daf2372805ac30027e840237445aa10d3423a566d4adcb8f9fc6e5c7e3d,2024-05-16T09:15:14.053000 +CVE-2024-34025,0,1,7910ed3f49f27cc3d6e29efd0456c14b8fa97ed1ac57b4183c41d497d3215ba0,2024-05-16T13:03:05.353000 +CVE-2024-3403,0,1,351b7361a62b75fa01065ca2b4d00dead5236a2356f9f11be8885ee6cd82884b,2024-05-16T13:03:05.353000 CVE-2024-34031,0,0,32832cbb1e8c12d82b1b4f0b17dd8da5298483e844da3b9dfde76f943f816f64,2024-05-03T12:50:34.250000 CVE-2024-34032,0,0,5a4c84545c086e02a753cbdc2a69955417aff416961e34fcc07fc6e9fddc4770,2024-05-03T12:50:34.250000 CVE-2024-34033,0,0,719a8ff9b4eb14602d2888920177741310f8b0330069ca799cf076b91625a4df,2024-05-03T12:50:34.250000 @@ -249050,7 +249059,7 @@ CVE-2024-34345,0,0,d2c3cc183c82ea7b4f617c9ff27811917d958958dad5b1a41c76d87c4d115 CVE-2024-34346,0,0,f52097ade7b5e4599f6ef6850f0ed1a9b313d490e9105e7facad506e728d0b5f,2024-05-08T13:15:00.690000 CVE-2024-34347,0,0,b22bdf1911ccdb7a910b449ec61ee1d039df1c1ee42b8aae7edaca22aca3f542,2024-05-08T17:05:24.083000 CVE-2024-34349,0,0,42841c63beb4ad614ee7eec172d9057889e0fa8346de0be819d108ce11a51d43,2024-05-14T16:12:23.490000 -CVE-2024-3435,0,0,75f1a3563b0b2c8ef4dec74095f16f3069bd1d11b570e59916f874dc58791c4f,2024-05-16T09:15:14.290000 +CVE-2024-3435,0,1,1849e952e8da18df234e8f2ddaa04f2d3afd1aa32d3a0d62aedeee7f62d2b942,2024-05-16T13:03:05.353000 CVE-2024-34350,0,0,b35bff4939683632a07d29af9806f27846effefb8db7cd604be55f1e2a72ece3,2024-05-14T16:12:23.490000 CVE-2024-34351,0,0,05a31c0cff96a1a03f38991b29fb847fa63542071a7ab11bf21ea9c29c09e87f,2024-05-14T16:12:23.490000 CVE-2024-34352,0,0,7bf0c84df9b40c2d6624f82804a4c68550f215fecd750b8a8f6fc3d0822c5ecc,2024-05-14T16:12:23.490000 @@ -249273,10 +249282,10 @@ CVE-2024-3488,0,0,d6ddf0f923c322dee9b1adbf84db0f6fa06c73b8cc2a3ea94ab21e4aa0e421 CVE-2024-3489,0,0,407fc99ac607d8b254895aa9dc68afca4c0fff929cb004325e3c06bd83280a91,2024-05-02T18:00:37.360000 CVE-2024-34899,0,0,a85a36cd499c09d94efbeda56212d2ba58c2478d4fddc573ece3a4dbf1232e63,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000 -CVE-2024-34906,0,0,47527fcdfd69ac5314a6e330311f17ba651fcfaa2f59fdfa90c62d2e0c088d22,2024-05-15T20:15:13.460000 -CVE-2024-34909,0,0,18b038e3cd8824227114274d526008cb38f6fd3f1f837d580c42a9692d89eb19,2024-05-15T20:15:13.570000 +CVE-2024-34906,0,1,5da8e7b5dfdd61c36e5ec7d5094a7023cf6cb03548c4df93f1c5486b98c5dc1f,2024-05-16T13:03:05.353000 +CVE-2024-34909,0,1,01ea3dd31a619cdf5c2dc10bf1a54f703ead61f0f32182e831117765047efcbe,2024-05-16T13:03:05.353000 CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000 -CVE-2024-34913,0,0,a53e1bbb348c8d111f61abb25b3cd4602a13f6853d4612e95a84b25de9bcf03f,2024-05-15T20:15:13.657000 +CVE-2024-34913,0,1,cd99fcd1c9a447c22a0c8c6d2fe09f57f41c6bae75d10850bf762035ab33c3a0,2024-05-16T13:03:05.353000 CVE-2024-34914,0,0,5bc7d29eabf3d60ac7563aebb997ef32f71e2c79c881b0df9620a63718fdc787,2024-05-14T19:17:55.627000 CVE-2024-34921,0,0,e6321f463933f9111e0a5517ef67fece2dbb43da2af562174271b850a60b5090,2024-05-14T16:12:23.490000 CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000 @@ -249303,7 +249312,7 @@ CVE-2024-35050,0,0,40188866046a91f191c7f1639193ce449b408a68c45e9e97f9642e7aafb53 CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000 CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000 CVE-2024-35099,0,0,93e942b92f9cdfe43455da9473fe46e57ccc0e6f1660402d8f3a7786b97c7b2a,2024-05-14T16:11:39.510000 -CVE-2024-35102,0,0,7da50a60dd60f1e8d0d29c1c6c16eeb50c73c2afd5ccd062fa12f4bca86353d6,2024-05-15T19:15:08.063000 +CVE-2024-35102,0,1,781492c1bcdcbb91cc24f5b5ff3eacf4542faa6544199a3dcb435c0e7da31a06,2024-05-16T13:03:05.353000 CVE-2024-35108,0,0,3f3dd71c8bba83e52560608eda839ceb07358fe0eac2940e38801ea6c4f52fe7,2024-05-15T16:40:19.330000 CVE-2024-35109,0,0,22ca550b25f858548d0753bd84153c4f353fa8f289d5d5402f105e17ad6c273f,2024-05-15T16:40:19.330000 CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000 @@ -249320,8 +249329,8 @@ CVE-2024-35171,0,0,4de8630e1bf094fb4a1152804e48c3dc58f770e96c7438fb408daec36dac0 CVE-2024-35172,0,0,618cb47da87cf9e4af4d56e1768459895814dd5f5800a2fcf0693eda1c64c373,2024-05-14T16:11:39.510000 CVE-2024-35175,0,0,30316f8adabe4b77ff55cf2c3104d884482b10f6e8ef0ea78ba2a92e169ff280,2024-05-15T16:40:19.330000 CVE-2024-35179,0,0,4433fc22ade8274a4e17f50ac56484b62a8701a589dbfa040c3c094fd870b93d,2024-05-15T16:40:19.330000 -CVE-2024-35183,0,0,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000 -CVE-2024-35184,0,0,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000 +CVE-2024-35183,0,1,a13a6c65b498bd81e5f60be29399a7cfffb17ddb2446f175a9bf7af049e805cc,2024-05-16T13:03:05.353000 +CVE-2024-35184,0,1,b9e43a79a8d3cf5f3dc97bfbc13e9d1e865d4c1cbd767526b45c719d87dddf99,2024-05-16T13:03:05.353000 CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000 CVE-2024-35204,0,0,8d3cad343b73c9eacef2ac3c1c032cedd053b4ea3c17c07fa5f2f20d60725516,2024-05-14T16:11:39.510000 CVE-2024-35205,0,0,6c3c195f1e9ea6788d75f2fe16efcfbee96980b75a7c4536e4d4b7d48d63c4ae,2024-05-14T16:11:39.510000 @@ -249333,11 +249342,11 @@ CVE-2024-3525,0,0,232397f212cd14372b1e3b850634c484a2e06d7f62e9baeb904fbc914d2f7d CVE-2024-3526,0,0,1136d7fa37ad87088aba3d7762ab20233727fd29ab68a12f8f5022dc2eb60bf9,2024-05-14T15:41:33.840000 CVE-2024-3528,0,0,6e915ee0305235be90df3a4c34c20b51db5d7f6edae5939042125561235bf98e,2024-05-14T15:41:34.497000 CVE-2024-3529,0,0,dee6d578e8bf53f212686d8e1a2558b04349a65d0d87589a3e5c83f1154b83a2,2024-05-14T15:41:35.240000 -CVE-2024-35299,1,1,28c9d58d0900f1c6a1a3d69988c6cd0249faa9848121bb0ade4898aa5d264a14,2024-05-16T11:15:47.460000 +CVE-2024-35299,0,1,3e4e645ea2334a2d70a8ac0e5a235ab378675ad9f04d95540b17d9c98a4ac10a,2024-05-16T13:03:05.353000 CVE-2024-3530,0,0,ecc7f13ac588d93ca667e2a21c815689e8b52faea0093418d2fbcb51e6e2f902,2024-05-14T15:41:36.290000 -CVE-2024-35300,1,1,3eb4cd284acc802770b1e249a407d90cf90e973e96b00b4ba09f808ba6632515,2024-05-16T11:15:47.720000 -CVE-2024-35301,1,1,4141ea521d5f0c6d9ff0a8f1bb039e768a00e2e36075df734b1cc71c16afb1b7,2024-05-16T11:15:47.947000 -CVE-2024-35302,1,1,c91c603182fc505617208ad6bff2e9b7eceea39b9b98e6a1ecdff4d97f05bf4d,2024-05-16T11:15:48.160000 +CVE-2024-35300,0,1,c9948d6a23b607dc905f5cedb43ddb5e762c784721f0ec88d5b26fbba2ccfab0,2024-05-16T13:03:05.353000 +CVE-2024-35301,0,1,31d70387ac3b77f8178b091609121b2e771e2d3b5ff0653a25e667cb9a2a6795,2024-05-16T13:03:05.353000 +CVE-2024-35302,0,1,bedc04fb48b1aec9300bbc7bdb129eb3a111fcae4692e0504ff52487ec0a7795,2024-05-16T13:03:05.353000 CVE-2024-3531,0,0,1c3ef115f6f668fdc9b2aa97e3f222fe509ad6ffedfcda1acf667aa09f08bb99,2024-05-14T15:41:37 CVE-2024-3532,0,0,e19eb182b942f2966d1ffa6bfeef9b695fc8a3bf03ad7d24214c3a77c308be51,2024-05-14T15:41:37.727000 CVE-2024-3533,0,0,285939b8eb8f64426711777dc721792b5bbed26581d3603727e2188dd34efb15,2024-05-14T15:41:38.537000 @@ -249406,10 +249415,10 @@ CVE-2024-3630,0,0,926139967a60c2fbb973591bfaf02247176107857bd2016db228b1bad05093 CVE-2024-3631,0,0,23ed89adaefd79fb5d4ee26d730630bda7cfdcd82c863393b1235437ef1ba153,2024-05-15T16:40:19.330000 CVE-2024-3634,0,0,c3f42805e4dda629640e8954ef2ceb56e7ae10c94dfd6ea4087a1beeea605aaf,2024-05-15T16:40:19.330000 CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000 -CVE-2024-3641,0,0,c2c736069181bb65e29c0da7bca489a775aa681088f4ee928d86de4924e35b70,2024-05-16T06:15:08.703000 -CVE-2024-3642,0,0,dfcb658191217b0847b0136fb1181db07bc4bc30be62a8d122326f31cb93ccc8,2024-05-16T06:15:09.770000 -CVE-2024-3643,0,0,9c63838f3108e1184b5f6296a67d9a667ca829e16dd541cd6e0af5d2ae7c4c4f,2024-05-16T06:15:10.053000 -CVE-2024-3644,0,0,60ce9d7c14633a7757759403191393c379c01f763c9f518cf2d6452724743e9d,2024-05-16T06:15:10.370000 +CVE-2024-3641,0,1,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 +CVE-2024-3642,0,1,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 +CVE-2024-3643,0,1,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d3b,2024-05-16T13:03:05.353000 +CVE-2024-3644,0,1,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 CVE-2024-3647,0,0,ca25e9298939397c868176f0412c03a959d2ccf69e0a681bb97da636a0c7782e,2024-05-02T18:00:37.360000 @@ -249481,7 +249490,7 @@ CVE-2024-3746,0,0,ab6567509a82c4f0182861199dbafd1145e3e92d047a264ff58554ba2ee7e5 CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000 CVE-2024-3748,0,0,8dc8a611bd9f5bde0a6bec19ad153dd24957816690b71b2453b98a3801431ad7,2024-05-15T16:40:19.330000 CVE-2024-3749,0,0,c726dfa1c35319d7b5d35900d21f1a9428dd6574780a76dc1de2b442602e3b93,2024-05-15T16:40:19.330000 -CVE-2024-3750,0,0,4931eb415a569aa05d07a07fa0b78c822c497b564387d5c8543b969e21ac189c,2024-05-16T03:15:07.913000 +CVE-2024-3750,0,1,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000 CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000 @@ -249551,9 +249560,9 @@ CVE-2024-3844,0,0,557b2843dd1fca85a530c46acabf2e2b3fe4cb4e29b4ec8be3ca0b11ef9703 CVE-2024-3845,0,0,0eb4004f99da1c2122444a8d1de5d3db39129e713bf386d7b60bb455af744c00,2024-05-03T03:16:29.210000 CVE-2024-3846,0,0,c48e0a8a684c17ee6ebfa3dd6ef492735a7e1f61d2741ebafccef32d97787cb1,2024-05-03T03:16:29.250000 CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000 -CVE-2024-3848,0,0,22d27e3583c56a7627f0f1ae3b75b229e0ccefd6c73209929a0e4e492c324ef9,2024-05-16T09:15:14.543000 +CVE-2024-3848,0,1,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000 CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000 -CVE-2024-3851,0,0,eb8ca0ceab3fa7108454f861bcc754e7813bd67207c8a1611774bf62e824605c,2024-05-16T09:15:14.823000 +CVE-2024-3851,0,1,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 @@ -249586,7 +249595,7 @@ CVE-2024-3881,0,0,74a4058853729df1fb1315606b5cebfa0071662bdd4c60c29b9ba4bc731d1c CVE-2024-3882,0,0,77fc3072d2ae06401cbd6f6cc4aa444206292cc3aceefec11f7aeda9349d0617,2024-05-14T15:42:31.770000 CVE-2024-3883,0,0,c0ee3c129d03d9b7803729c6b8ba3c3dbf4ee4f2b39f81dd559f9f8568fb1be9,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c391224,2024-05-02T18:00:37.360000 -CVE-2024-3887,0,0,468c7db526d6e01bfe525db6b50e40191f5e907039f5fd4142c6473421eedc62,2024-05-16T09:15:15.070000 +CVE-2024-3887,0,1,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000 CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000 CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000 CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535ead,2024-05-02T18:00:37.360000 @@ -249679,7 +249688,7 @@ CVE-2024-4073,0,0,979f929e9236abc637be3ba3fab56222fdbb52c10c37a595f7976ff0071f8d CVE-2024-4074,0,0,23e3928f2d175cd1573ccf8d82982542aa52a9779eb1786c1604cafc880eb67b,2024-05-14T15:42:50.427000 CVE-2024-4075,0,0,1a331c5266fda5965e4b46414d3c3187800e75b373d3dbdb555fcd76397522d0,2024-05-14T15:42:50.910000 CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000 -CVE-2024-4078,0,0,e37785070466f909ef665985bf1c6e2b98b495fa707be01bc1cfee6bb3fed691,2024-05-16T09:15:15.313000 +CVE-2024-4078,0,1,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000 CVE-2024-4082,0,0,822cb60507068dc3bdea8ede7c156d1acb09f7f663880578b2edf582bf4058a8,2024-05-14T16:11:39.510000 CVE-2024-4083,0,0,90b3f0c23e53e5107774f39811ea28166caf07e02a51ec5c595625bec75a4f5e,2024-05-02T18:00:37.360000 CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000 @@ -249736,7 +249745,7 @@ CVE-2024-4172,0,0,9433dc17402f860ca979750f4355fa76a4430fa9c85c0faf807710819409ba CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000 CVE-2024-4174,0,0,c142274bead27dee8f65c018633c5143a8f9b64dc6c6d83b389a2c439d2fca3c,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee4a,2024-04-25T13:18:02.660000 -CVE-2024-4181,0,0,5b533ed9ea6918ccca6cd30920f865ebd33d7dce37f6e48c0e7bc300becfa3a7,2024-05-16T09:15:15.553000 +CVE-2024-4181,0,1,ae08963d7323466f42108cc4145b2377e0c682d334302c4a8213f2b0fcb1ee61,2024-05-16T13:03:05.353000 CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000 CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000 CVE-2024-4185,0,0,4997c26f83a14bd54a98f3da542941a3f7d6c6c6777c0f0d023281d709e1d844,2024-04-30T13:11:16.690000 @@ -249754,8 +249763,8 @@ CVE-2024-4209,0,0,d8400e0dd8f4909c53290c35079fb7499a08d2e56ed4f79281678d45054145 CVE-2024-4213,0,0,33db088b2047cab4402e24074b0626ffc423161f2f205cab9408ae51552f548f,2024-05-14T16:11:39.510000 CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000 CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000 -CVE-2024-4222,1,1,66c6a0da46b9583eee837e54f993022777c49b6881fc4e32ea2ebe2c67973276,2024-05-16T10:15:08.687000 -CVE-2024-4223,0,0,73b2af3470645781ab6d7b830ecc1ee4ba99e1befd345fc536b1f799c47de840,2024-05-16T09:15:15.810000 +CVE-2024-4222,0,1,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3a7,2024-05-16T13:03:05.353000 +CVE-2024-4223,0,1,7874da25b7633a9d0c04e6bbae5b506aa967cf75a9b041fe171571206fd80286,2024-05-16T13:03:05.353000 CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000 CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000 CVE-2024-4231,0,0,5f6eefd3118de859e766ff7371d861540e851b237d24ae37e54276d33b65dc83,2024-05-14T16:11:39.510000 @@ -249783,14 +249792,14 @@ CVE-2024-4252,0,0,45106f386c6c3e24e46826c9df7e9bed2cb35ee41d1ec9edcc6c0271a5dc78 CVE-2024-4255,0,0,5f92555334907f19d336f1106a438e0a7a71240d1d7940ebeb6ff93247aa5f87,2024-05-14T15:43:11.787000 CVE-2024-4256,0,0,bd1d037d6cd9f2246956dcc85f608c167ddb1fb6371e03152412427f6950122c,2024-05-14T15:43:11.890000 CVE-2024-4257,0,0,686afb2bdc1867e065959576dafa6e091563f36d275fffebd240115b17e62655,2024-05-14T15:43:12 -CVE-2024-4263,0,0,eceb4ef92ea40b22be30d2fdc106c3692234e676992fb77f73599351925f17c5,2024-05-16T09:15:16.037000 +CVE-2024-4263,0,1,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000 CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000 CVE-2024-4275,0,0,78dbf52771ddf59505b9222514d00cf39d2cb883e25965ab29139ce3d748873c,2024-05-14T16:11:39.510000 CVE-2024-4277,0,0,28c68fbd8fbf742ea35db69404ff5cf06f67a7656a1fd7514e44e23e67f2b3ef,2024-05-14T16:11:39.510000 -CVE-2024-4279,0,0,2ac6bd0b10e6e7f652d9e3858e14943b37c33b2f252a487abb99bbfbc2deb934,2024-05-16T06:15:10.667000 +CVE-2024-4279,0,1,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a36,2024-05-16T13:03:05.353000 CVE-2024-4280,0,0,7aeafddb0fd83afa23fda482b3f98dd67daeefdc6486dcc1d229d77652fac665,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000 -CVE-2024-4288,1,1,bf317dca33abc7376097e14e6fac16a3b6295231eabc51e40e800f7bfda0f248,2024-05-16T11:15:48.373000 +CVE-2024-4288,0,1,9367649ffe77365cb201f95bc69986ffb5e481ba50542c3f0953c5f2e0eb0d2a,2024-05-16T13:03:05.353000 CVE-2024-4291,0,0,99733dd1187908a84b94fea97d567381592a65c8716487f97acf2ee13215c059,2024-05-14T15:43:13.120000 CVE-2024-4292,0,0,3b6aa08fcb4b6a600a1ef0df2555383988c6668b4d57edabafa7ec2f6c6e4d87,2024-05-14T15:43:13.250000 CVE-2024-4293,0,0,78c2c63971dccf67f883d0b9bda5b98e3812b00552648b1ea2d1f88b11addac2,2024-05-14T15:43:13.400000 @@ -249813,11 +249822,11 @@ CVE-2024-4312,0,0,59fbf303153e0d85b8066207fb91c9445249544d5462e1272c1306971dcf6c CVE-2024-4314,0,0,1abe213d6359155fbc7a923a6e4d64b59f3117ef3b0bed7e9addf21bcf8fc7a2,2024-05-14T16:11:39.510000 CVE-2024-4316,0,0,4eb558b43c841d372c5646b0ff6f31e7b1e5f7c5b425e59da2142a83b01fc710,2024-05-14T16:11:39.510000 CVE-2024-4317,0,0,2c3dc7f9b6a3b150a489d24a5609d4e1b33dc890cef48ba2f73e55381d4c5f9c,2024-05-14T16:11:39.510000 -CVE-2024-4318,0,0,d24f2ab57d12f01d40cb03b1f03d2be7573aa3e153bbb498909fbc1fd235f4b9,2024-05-16T06:15:11.480000 -CVE-2024-4321,0,0,907e50f00958a46dcff50083dda9221d639bf7fc4d37ada6a89b2540f6ebb825,2024-05-16T09:15:16.327000 -CVE-2024-4322,0,0,647dea61af651a73ed1bc87b6c1fb14b5488806a433031dca1232b872308bd4e,2024-05-16T09:15:16.613000 +CVE-2024-4318,0,1,239860e6603bb5bfa00e4ee1537bbc84372d89871f96aaff86d4c34891350e3a,2024-05-16T13:03:05.353000 +CVE-2024-4321,0,1,52291df02a369d9bb947287933b2cb70cdba5b6bd48fddb1c2e0073aed4231c4,2024-05-16T13:03:05.353000 +CVE-2024-4322,0,1,26c76f88e5d4d6383f99407dee54ae56585f3dcb15c99e63b32362e726df8b5e,2024-05-16T13:03:05.353000 CVE-2024-4324,0,0,7ffaeab065d0c9a1857569b7bf1dcf908cb9c5c673c6c887858b7e3bb59f5daf,2024-05-02T18:00:37.360000 -CVE-2024-4326,0,0,6b17ab8a33579465c3ad48c7f6b9b08d9f4839d29978bb64177cee451d3569ce,2024-05-16T09:15:16.887000 +CVE-2024-4326,0,1,8dbb64b51f21b806e292a7e05ea5c1051e35374391354831c3514fc08d15ec8e,2024-05-16T13:03:05.353000 CVE-2024-4327,0,0,20184bec92cc4082f2f126e139d861bc6fcef5b3844d9de9bb39897b0f981d4a,2024-05-14T15:43:17.490000 CVE-2024-4329,0,0,06b73c5bc760ef811acf316cbe7dd6deaf968eed416c3cec66b38549d21201e2,2024-05-14T16:11:39.510000 CVE-2024-4331,0,0,bfd934b1b2f76cc8bd478cc4e561b67ba50f4f419d76b2999ea5119ff2a84bcd,2024-05-04T02:15:06.800000 @@ -249832,8 +249841,8 @@ CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc83 CVE-2024-4346,0,0,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000 CVE-2024-4348,0,0,7ecf9e2f00b440e06f89d6de0f2df4f5974c418de77e873b94dee542bc66d4a9,2024-05-14T15:43:25.100000 CVE-2024-4349,0,0,b0d1c3b85ef1776752c2fc81adc9e145cc6f1d929f017c205ea9b4290d878b74,2024-05-14T15:43:26.100000 -CVE-2024-4351,1,1,d049c5cdb27d304b0be4416043d2bf23872a7dd6cc544e80ac48a9857f3cdeae,2024-05-16T10:15:09.890000 -CVE-2024-4352,1,1,78d4fb60e4fa25d9b98175333c8cea8cf4994ee9e3753c3b87ae41c3822b2c54,2024-05-16T10:15:10.470000 +CVE-2024-4351,0,1,84a993fcb461a8c61255d21736701361dc3f453bf42043de26320f65ada00121,2024-05-16T13:03:05.353000 +CVE-2024-4352,0,1,ec2049b13794d7b7eea90d377463d8f5c3179de2c6e69d57554c5eced6269751,2024-05-16T13:03:05.353000 CVE-2024-4357,0,0,33cb7b166449bad445492f17a8c037924e4da5ea5b4742ac02321837721bff0d,2024-05-15T18:35:11.453000 CVE-2024-4363,0,0,731dcd1f4c4c888e4437518d0f6d54c108b1221ced167b35922e12ec173e95de,2024-05-15T16:40:19.330000 CVE-2024-4367,0,0,afc88763d21b72640d447a05ef1cc5bae3b59696ba891e4d36a74743b38e403b,2024-05-14T19:17:55.627000 @@ -249842,14 +249851,14 @@ CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7 CVE-2024-4370,0,0,9cb4b287947cccbb5312f0b956bd28c5e0677f742a744bda42968ce33f6a04bb,2024-05-15T16:40:19.330000 CVE-2024-4373,0,0,1ffc43bce359a7dc4906a84b6fc8a1ff35c385d778f8a99a36e9677433d92d07,2024-05-15T16:40:19.330000 CVE-2024-4383,0,0,5a1fe08151a13ea21e71cf2d0c78ad0aa3b9532b0b753d777378763b8935a44b,2024-05-14T16:11:39.510000 -CVE-2024-4385,1,1,319e16d7d7c4dfee8e269c810c45d361a9b012a909e15a5b4c6439529ef1d710,2024-05-16T11:15:48.577000 +CVE-2024-4385,0,1,ca3b527b38ef117a25bd1a563993108f86670c5409f332b50d53521ab7d618e2,2024-05-16T13:03:05.353000 CVE-2024-4386,0,0,e3470cc6a1cc1ee4032b4297ad39fc1eda67f128aadce11b5ef951d1e0deaf83,2024-05-14T16:11:39.510000 -CVE-2024-4391,0,0,2dd0f00951be0cb0d40e88fa9eac9621c3b5d50fb9f35286f15e10d56c3b553a,2024-05-16T09:15:17.143000 +CVE-2024-4391,0,1,606dfcb7000017430c9016faa846742a8e75fccee77649ce6753dd6affa1593a,2024-05-16T13:03:05.353000 CVE-2024-4392,0,0,295add67f1c1835ca48b184321ee2a614cdfb2bd5847957c4de906f109f41ee2,2024-05-14T19:17:55.627000 CVE-2024-4393,0,0,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000 CVE-2024-4397,0,0,1ff0cac198df7cdb84e188713151ab4768a8ae04de0af598021ab791140ea920,2024-05-14T16:11:39.510000 CVE-2024-4398,0,0,c4adc8d0b7b0cdb0d7e7d14528e27ff15f786e7096a9582a346b6e526bbd5221,2024-05-14T16:11:39.510000 -CVE-2024-4400,1,1,1d423cd3cefa3cc0565188dc784aa5397f8f0b80b814e4ecc83379b84d2bcf68,2024-05-16T11:15:48.773000 +CVE-2024-4400,0,1,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000 CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000 CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000 CVE-2024-4411,0,0,7bc2dec9e85e3c2f34aefee79c9c8516d53b19ba8298d9195aff70401d86400f,2024-05-14T16:11:39.510000 @@ -249878,7 +249887,7 @@ CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93b CVE-2024-4463,0,0,975e23bc9e7f0154e2009775a50a2df78ff69b5c2a62059914a1d542e202b13d,2024-05-14T16:11:39.510000 CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000 CVE-2024-4473,0,0,81fb6dbfe6aaee127784dc2cfed1f04fdcd41dea2aad9b26fe171f473a639d18,2024-05-14T19:17:55.627000 -CVE-2024-4478,0,0,9ee3a9ca49e503fb6dd123f904a35118cb9c7e0845d39decb45a57e5cebe7068,2024-05-16T08:15:38.200000 +CVE-2024-4478,0,1,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000 CVE-2024-4481,0,0,f4e88735e685a956ddff0451c5ba00613ef12685069f33ac86d9c0c9e1325cfe,2024-05-14T16:11:39.510000 CVE-2024-4487,0,0,fe915244444c7ae676a3d6f03ff06d22db2b051f791884b5d79919009e1c2774,2024-05-14T16:11:39.510000 CVE-2024-4490,0,0,db931a57623721d9d456777f6c98711532655ce3f4d4b4a093bb6c6e9a0d0631,2024-05-14T16:11:39.510000 @@ -249923,7 +249932,7 @@ CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b CVE-2024-4539,0,0,63732024d49bbbf95790ba66c38f1657d2ab759ea30361f0750a4e1742125c7a,2024-05-14T16:11:39.510000 CVE-2024-4542,0,0,b982be3556520cf91cc9a2972ab154a1fd89e45937d49d0eaf1d2077dc0ceefb,2024-05-14T16:11:39.510000 CVE-2024-4545,0,0,5fcd5daa61f9786b1338451b9ddcf8c8b2d6711d43a7127d1e6d820486e2ecc9,2024-05-14T16:11:39.510000 -CVE-2024-4546,0,0,ce545448a30bf131007c673f595d9a98f0bdc1563318d69aa176665903d01ccf,2024-05-16T08:15:38.487000 +CVE-2024-4546,0,1,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000 CVE-2024-4547,0,0,6b600f363e41b63ee43a4b2365298fb38de96fd61b910d0724ca38ee29a8a8df,2024-05-06T16:00:59.253000 CVE-2024-4548,0,0,255fb62729cbf70b5d240d036752cc7d31677deac2357745733c1172bc76cfe7,2024-05-06T16:00:59.253000 CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ace3,2024-05-06T21:15:48.783000 @@ -249938,6 +249947,7 @@ CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8a CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000 CVE-2024-4574,0,0,3c2d56d811d9d7c95ce1787a36f32d9383cfa50b4f3bab969a802cdbc20f7a3f,2024-05-14T16:11:39.510000 CVE-2024-4579,0,0,92215db7ae90e73ed5f9ed593ac042a14c345d9cfa9b9e96b650abf914d87abf,2024-05-14T15:44:07.607000 +CVE-2024-4580,1,1,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d971,2024-05-16T13:03:05.353000 CVE-2024-4582,0,0,3a1e49566706021e32dc82c617b03e7012a0bd831ab28018bd58f09e5c38d7ef,2024-05-14T15:44:07.703000 CVE-2024-4583,0,0,0a27a5207097437fd0683162361e2088f7fba4b61fcf297ae0c30984ee41825d,2024-05-14T15:44:07.850000 CVE-2024-4584,0,0,00d56193bad736c4d3a73c844982d93017a43f16851962e17bc66e33d82fda6b,2024-05-14T15:44:08.027000 @@ -249960,16 +249970,16 @@ CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c CVE-2024-4605,0,0,a4edcc830b87308032d99d0feea9a229ab6e4f42dd443adbf886b62b0aa44528,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,3cb7c67f52970802d09367b8e1299e023e023c69e85466074593b74325edd330,2024-05-14T16:11:39.510000 CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000 -CVE-2024-4617,1,1,3d8025719981c3626bc1ba309f4c898577ed3b2578f1e7ccd55e9b6757e40d5b,2024-05-16T11:15:48.967000 +CVE-2024-4617,0,1,a9ac6f97f78093fda60c756da599c06372e99e21d7b1347de185ba0119cb6cca,2024-05-16T13:03:05.353000 CVE-2024-4618,0,0,2c2ff682e4ce5d6b8070b11795aac4e89df6536fa089f1d6d721027dca3a2ac9,2024-05-15T16:40:19.330000 CVE-2024-4622,0,0,db6b68bd807a8a0ddb358e449d01643070e9098450ab994d9259859922691c59,2024-05-15T18:35:11.453000 CVE-2024-4624,0,0,2f2dfaacad2af40d5d5be1945c7dfb7bd2ed3b09b9d237413e46013b6e4c845a,2024-05-14T19:17:55.627000 CVE-2024-4630,0,0,9ee39c9e70c3fde26d4ddaa20f9f4583498b5ac1a624dc38857653acd661b1f9,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000 -CVE-2024-4634,1,1,7bc11a0c355b18fbe69f522beb3dffb85e7f65664c30e4c55970d2bb1faa5ce6,2024-05-16T11:15:49.153000 -CVE-2024-4635,0,0,50fd8f7f5db531f8bedaa09f8b425a92825a91facd7129de67b4f16b3c31db60,2024-05-16T06:15:12.090000 +CVE-2024-4634,0,1,26305cc83de7193b57243a5cab6ca5caf74694a0d7bbca15218a554118aa8eb8,2024-05-16T13:03:05.353000 +CVE-2024-4635,0,1,39b2c6bf6977107b11329776563f920ebcfe13f250d063c0984d8282a28a8353,2024-05-16T13:03:05.353000 CVE-2024-4636,0,0,7626c868e066027a522192c74e27577bfe95437bdd86013fd6693eefb1ef5c81,2024-05-15T16:40:19.330000 -CVE-2024-4642,0,0,e9f40fa00442edfd0d7d226835bb93bc2e8b19f819574759bb1087a5ae35c8e4,2024-05-16T09:15:17.360000 +CVE-2024-4642,0,1,cd827ff874c6f7120bd85b4f660d40657887af4a5036634ec6a89610c2aa6514,2024-05-16T13:03:05.353000 CVE-2024-4644,0,0,0fbd9df577d4302041330f9a7bc7fdd69e588e0f0c78920c1382b2bed37c1f1c,2024-05-14T15:44:13.613000 CVE-2024-4645,0,0,2b9f7a703a2aa52d907a1c026b10663f1b251b0b170d9ffa49ce909ae1af0e08,2024-05-08T13:15:17.563000 CVE-2024-4646,0,0,a5d56cb26b4826698ebd4e143c40a283ceb7be944ba2ce47aa30b27aa4103ced,2024-05-14T15:44:13.827000 @@ -250032,6 +250042,7 @@ CVE-2024-4736,0,0,e4d06087e1882aaff25701cd3a044c6201b15e2764fcf11d2265206d665993 CVE-2024-4737,0,0,bfb4b2c8212ccf694e4ea54dd95fb9645e59e585b5fb9cdc8914cf5a29e42b17,2024-05-14T16:11:39.510000 CVE-2024-4738,0,0,964e2562b60d372b2143fecad9829c1acdb4daff75d659a050643ddcd83e904d,2024-05-14T16:11:39.510000 CVE-2024-4747,0,0,a3ae6d00ee8ee4bada1688a80cf3dcc71578205e028aa220fe0d295385244b43,2024-05-14T16:11:39.510000 +CVE-2024-4760,1,1,fe17496020775858ede2279955c89d7cd2ed068d736758a008d23b0325cfc802,2024-05-16T13:15:47.893000 CVE-2024-4761,0,0,da03d5911760bd4ca331ad33be8d043fbe59c031584c57814bca4379dc0c4256,2024-05-14T19:17:55.627000 CVE-2024-4764,0,0,1ce71353b9d55abf261ec64b79822c804e2d05038b12e07efb15b19542c85283,2024-05-14T19:17:55.627000 CVE-2024-4765,0,0,940f5000f62119fc819a1c6e56fca66a58cb674478c2a5875e655065b86df5a1,2024-05-14T19:17:55.627000 @@ -250081,11 +250092,12 @@ CVE-2024-4822,0,0,aa15929882cb3b183256f12091f4f730b093d0429ec93cc3d87b04f30f0ba3 CVE-2024-4823,0,0,8f31bcd40817f289d241c4794563294d4e400345d0538e98840e69ced9022cee,2024-05-14T16:11:39.510000 CVE-2024-4824,0,0,12997f7cb79ce3030574eecdb24c333619e16861704962f1656fbd26f7680d48,2024-05-14T16:11:39.510000 CVE-2024-4825,0,0,1e0f749d21405e7cf2edd3aac0c05b5f99c8de86001892a511648a80a7280ab0,2024-05-14T16:11:39.510000 +CVE-2024-4826,1,1,af3613d04b75e94cea034c72d0262809043a8c645db91b90f9ab3d043b9e8532,2024-05-16T13:15:48.163000 CVE-2024-4837,0,0,98aa18fa41c916e1bd621beebea0d7870bfc50e824dc02b9686403b5c337ef1b,2024-05-15T18:35:11.453000 -CVE-2024-4838,1,1,5a94396b2e6ef53aed57f4d1dc0608064e013358da60182748f6e7e998501b22,2024-05-16T11:15:49.343000 +CVE-2024-4838,0,1,213892fd4e00ded7d0e7161081f565f4e4fb5fc98a2507596b17757660a932b0,2024-05-16T13:03:05.353000 CVE-2024-4840,0,0,c9ca0895b4a51cab0e2c0d59965d65e29a18e7a3fb86aea7f8e73c28a9d25dc4,2024-05-14T16:11:39.510000 -CVE-2024-4843,0,0,3818dc820acf6e4fe82f48c8f8f73db1472d9b9cc2125ea1604de8ad3989a7cd,2024-05-16T06:15:12.690000 -CVE-2024-4844,0,0,847ae9c7847e01c3e32c5a3c03c48c67b55d2183294ad6cb4301d83ba2064b5d,2024-05-16T07:15:50.743000 +CVE-2024-4843,0,1,58cfe808f738fd9393d526b6ae9c349063459aa7046a90d478177ce3db0c98a6,2024-05-16T13:03:05.353000 +CVE-2024-4844,0,1,9cc52c71da3e5a51bc8bac3549d843df2f9b393e878f774cc4555ff01bf8c6f2,2024-05-16T13:03:05.353000 CVE-2024-4847,0,0,bba6603a81b56f6d60e806e2e7574571e772d40efe56d1512e7524611ff51b1c,2024-05-15T16:40:19.330000 CVE-2024-4853,0,0,08d9956cd1fc82aacd4cc52b553fb1ad7c9d41ecc90cc195f4a6a68d3e7942e4,2024-05-14T16:11:39.510000 CVE-2024-4854,0,0,3d480ab215b58518bc8b4d2ff21b01ce90d2ee2286e511ec2300ae6a56284679,2024-05-14T16:11:39.510000 @@ -250096,53 +250108,57 @@ CVE-2024-4871,0,0,8ab16008698c56948c2f0ae8cf729bc698d4cce8f05c254b91a2ba1c9d6200 CVE-2024-4893,0,0,8ffb453add192bbe3edd5219a0cc1fecef136881814a15b6a6fff19e64221c30,2024-05-15T16:40:19.330000 CVE-2024-4894,0,0,6ac5cb6e261d69ae931137ad62bda7bde45e9f279ec9c4c45067086e1e08f8a1,2024-05-15T16:40:19.330000 CVE-2024-4903,0,0,c9b4ffdf46fc8451d7269331919432007ce882add1bc99c6aee19d392a06ed4c,2024-05-15T16:40:19.330000 -CVE-2024-4904,0,0,820f404bd5f1471552c81d52ea4d478ea95c67f4035d4dafb5d9d0ead535fdc0,2024-05-15T20:15:13.750000 +CVE-2024-4904,0,1,1037a096bc4b5cece6d7f194c77f643aebf74ed29ca88fb2536169f02db6c792,2024-05-16T13:03:05.353000 CVE-2024-4905,0,0,c8a95f887e4224ee07a1acc6bff2a43dfef4589e656da09459f2781a65331d7b,2024-05-15T18:35:11.453000 -CVE-2024-4906,0,0,2c601a955269aafb6830d9cede65bbd366a0f024c1801724d970935df42f3f51,2024-05-15T19:15:08.203000 -CVE-2024-4907,0,0,3113954bbefa43c45c3595d8fd618aaa69e1f187ec4fb5985c7de73ea2928b89,2024-05-15T19:15:08.607000 -CVE-2024-4908,0,0,49953f13c6eb1739a4b893e978dfff6e9d81247d9e887ebf79651c9ba7eae5fb,2024-05-15T19:15:08.980000 -CVE-2024-4909,0,0,33c70ce6259d6da0a92a6c71c0ea14d1539f9c07a708d9f99240c99eb1475c60,2024-05-15T19:15:09.320000 -CVE-2024-4910,0,0,a82052dfa103200f3b9fc39482e4d4d960a5e5de9c8e240b89074cee62e90b4e,2024-05-15T20:15:14.167000 -CVE-2024-4911,0,0,8d1608f0fa29a13cf0a21881c2ede6ff746ff4b49cb14c00be575f111b962149,2024-05-15T21:15:08.447000 -CVE-2024-4912,0,0,959608c998df40105cb04722815b6866fe50f22984a019f9f852ebbd393b327c,2024-05-15T21:15:08.720000 -CVE-2024-4913,0,0,ef1882efdbb97e7e5b3a9f1d624c71c7c6ca83c593dde5ac79d713777664dae8,2024-05-15T21:15:09 -CVE-2024-4914,0,0,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000 -CVE-2024-4915,0,0,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000 -CVE-2024-4916,0,0,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000 -CVE-2024-4917,0,0,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000 -CVE-2024-4918,0,0,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000 -CVE-2024-4919,0,0,9395e269c4d639503899daba02f8f8ef3e889bf0a909530d3bcbde59080f90c7,2024-05-16T00:15:08.280000 -CVE-2024-4920,0,0,7d4fbcd3c2333b8cd5d13050df57570cc73655912e9f0607ef2981105e7b4eff,2024-05-16T00:15:08.563000 -CVE-2024-4921,0,0,74bf965278d37dd3b4a08b96a0a79c85e131f73322be52ee99eaef8e8fd7e138,2024-05-16T01:15:07.540000 -CVE-2024-4922,0,0,107d8830fcd4c6b9ffa0f0768c22eb2d976c5b1746e34d23ce3bb57a1b3c122b,2024-05-16T01:15:07.813000 -CVE-2024-4923,0,0,bb2c35fdebd5fffc304fad5e8db801119694d20cf2b08b991d3ba0f96fe32724,2024-05-16T02:15:07.900000 -CVE-2024-4925,0,0,f27597173421d84a6aac0b72a1bbddc32a9683af76ff6d49d4515a214314382f,2024-05-16T02:15:08.390000 -CVE-2024-4926,0,0,4f98e2141ed005b65ace4243520c4a74cf195b626ffbd2348d2371f0030a111c,2024-05-16T02:15:08.693000 -CVE-2024-4927,0,0,75241ddb08f272d96e505368d4085d15e400ffeb74f400a01614a704de643552,2024-05-16T03:15:08.123000 -CVE-2024-4928,0,0,323f47d5f31773ee017d1eb20a2af002adaec5ddcf60bb89f3fe599cd45a64e6,2024-05-16T03:15:08.387000 -CVE-2024-4929,0,0,edfd15fc5d94d8ac95e936a84c0de715965d27f6e5272229617201c4208e15f1,2024-05-16T04:15:09.997000 -CVE-2024-4930,0,0,3d4b0e3126e39683b6520266d82fa17aa1b61b155692c5e1fd3ac967e9b971ec,2024-05-16T04:15:14.873000 -CVE-2024-4931,0,0,e8aef8669aecd123bcf043fff54871e4465e2968f0b1250d2d302a5f8fecabe4,2024-05-16T05:15:51.297000 -CVE-2024-4932,0,0,058543e447fe0a6c6e3ca8a3b483a4b014e7d28d3f060e226c444a4c1c5a9a03,2024-05-16T05:15:51.653000 -CVE-2024-4933,0,0,ab99dc1911a1d20350ea3b7f0ab187ed2ed291967036718a5441324a0985fe0a,2024-05-16T05:15:51.923000 -CVE-2024-4945,0,0,f7ff43915bb3447a49348ea8439196c37097175d385373eb27c5110d3bca27db,2024-05-16T05:15:52.187000 -CVE-2024-4946,0,0,56d2009b3ea2f42166976333c587ee672b667eb69299fd030e9cac0c5f8a0cfd,2024-05-16T06:15:13.547000 -CVE-2024-4947,0,0,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000 -CVE-2024-4948,0,0,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000 -CVE-2024-4949,0,0,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000 -CVE-2024-4950,0,0,efed32b4f23b877a04e85fe2ab12f10b9d3c39ad2529470125a1a9db3cdcfb9e,2024-05-15T21:15:09.493000 -CVE-2024-4960,0,0,c49508adf3f3a5eb1425f7e931390bfce6357a2941a524ce558affdebf7d9038,2024-05-16T06:15:14.650000 -CVE-2024-4961,0,0,b5bf727b57104372660c156a79de4dd7fcbd334baec39df64f2fcd679ab82991,2024-05-16T06:15:15.653000 -CVE-2024-4962,0,0,3baa8333e1c6ce33c5d2777d789b5621e22d7c0e10ef51ecf2767ae021e895b8,2024-05-16T07:15:52.070000 -CVE-2024-4963,0,0,1a3c037e8b3229455ecd984a22cb3ed58fa4dd2659d4c4795a0e51d745b1c4c3,2024-05-16T07:15:53.317000 -CVE-2024-4964,0,0,55f90ad29b754c21ca9d1fa535e11a061c8fe0cfb67d718b34b2ccaadbfb8fc4,2024-05-16T08:15:38.693000 -CVE-2024-4965,0,0,602151299830335e4f70a5de411ed18ae6705f03482fbbacb9e245dfc480860c,2024-05-16T08:15:39.030000 -CVE-2024-4966,0,0,3f150234c0e98b35a6d2f4be20767869b72be1ba86a814694da423ea839cb488,2024-05-16T08:15:39.317000 -CVE-2024-4967,0,0,db8d26f0eea9278bcb73faa55b13dcfb8b86b9f2db8911931d6533a8592f10ad,2024-05-16T09:15:17.617000 -CVE-2024-4968,0,0,2583853c2d1d9ee7413ce00b029724878269cacaaef11ea2f503583844de8d60,2024-05-16T09:15:17.953000 -CVE-2024-4972,0,0,b8bae170c0377c422553effab6338d5dde5f7c618852ec869cea22c5bed54839,2024-05-16T09:15:18.277000 -CVE-2024-4973,1,1,659758aa50393766728e77a17f3b77fd4a0bd25675537047ea9c79c9a93473fa,2024-05-16T10:15:10.973000 -CVE-2024-4974,1,1,157a5a418e414f77bc33081e0f5bde862464305ec7536cc63a9fe5f2563d351b,2024-05-16T10:15:11.973000 -CVE-2024-4975,1,1,7ff8d8a05a36e7895b7046f263d7cb82c747885091612ebc13ed563bcedd6233,2024-05-16T10:15:12.703000 -CVE-2024-4976,0,0,7bb4e20b87953c4b97f492da11cca71d462ce6af7b37913524811fb56920cd3a,2024-05-15T21:15:09.560000 -CVE-2024-4984,0,0,ae1bf2c0289bb389f179eb37322fc8de1d2045b7a529e537ac0945a8c2d06fe0,2024-05-16T02:15:09.003000 +CVE-2024-4906,0,1,fc45f4a730306998ea60cb110365e3e6a793a756cd6e2d47c1bc5ac2f1af94a3,2024-05-16T13:03:05.353000 +CVE-2024-4907,0,1,22a164518aca68979ca94e036dc5956f299a5278f5ed2a6a0e2ea648a66689a2,2024-05-16T13:03:05.353000 +CVE-2024-4908,0,1,9104e002639f9298e392cf07bc0c94e0dcba88e37241aaa21bfe970224005e40,2024-05-16T13:03:05.353000 +CVE-2024-4909,0,1,ba02efa9db2e696ad906b35090a464bd1517a9b41502af9159a4c2b6148ae116,2024-05-16T13:03:05.353000 +CVE-2024-4910,0,1,c7461c9ca5b3a6a09c2bf9522b56299cf6c7aaccd9ac494be4daccdbed020ddb,2024-05-16T13:03:05.353000 +CVE-2024-4911,0,1,2afff9405fdaaa57d50159caf2c2a1811784bee4954c88e8ddefa36f26b6beff,2024-05-16T13:03:05.353000 +CVE-2024-4912,0,1,e5c53ffadf30d1f13fb695f1f4f9e7e51a7838a3b1940b40ab75c0172f2add31,2024-05-16T13:03:05.353000 +CVE-2024-4913,0,1,811dd5aa96c75bdf5d8307da9e3310d5f6a6ecbd5019abd4cda8eca8aec2b9c5,2024-05-16T13:03:05.353000 +CVE-2024-4914,0,1,ec2c7eb307b3aa2c92e421507270a7d508f0459b155124c0c517dfdc5b4d2388,2024-05-16T13:03:05.353000 +CVE-2024-4915,0,1,a5fbfa9d058ec6a75f77d7389967879849a8cb7204af88b251d431dddf742b18,2024-05-16T13:03:05.353000 +CVE-2024-4916,0,1,7ad9a9c1a6c9fe86208ecf70e840eb59714d0b2a0b29a25fd067da9cd788d703,2024-05-16T13:03:05.353000 +CVE-2024-4917,0,1,75c8ce1986970d501ca41931630c2ac38fcf9ad976001f4a6e9a45d3dd94216e,2024-05-16T13:03:05.353000 +CVE-2024-4918,0,1,cc94c27ad2b67737b19d4ef733e2542b7d9fb43aaef6a7bc8449d18c76681c2b,2024-05-16T13:03:05.353000 +CVE-2024-4919,0,1,77f8aab8914342a406e1a3f34067d8c6698052b91cd5f4b16d5e5c35956694f7,2024-05-16T13:03:05.353000 +CVE-2024-4920,0,1,456e4d2cc50f4132e6d4449f9d8158e415a0fe6757be77f959a57280fd9ce9f9,2024-05-16T13:03:05.353000 +CVE-2024-4921,0,1,23733bd78220539f4f71da3b0dfe53dd5a0d7ae3450a85108c6ee5fff855ad09,2024-05-16T13:03:05.353000 +CVE-2024-4922,0,1,14bb7362fccfca94d1f7f16b4e9eea5f4439677ab4c4860a4bf76e6903b1f93c,2024-05-16T13:03:05.353000 +CVE-2024-4923,0,1,b9efab1d3c5403c7ddc150e1317cf670ff5003575e632bdd9b8b53cff7f3d57d,2024-05-16T13:03:05.353000 +CVE-2024-4925,0,1,87849de92c34c411fa863a31cc4c90d2c3aa6dcb0e3f44a007bb6fee06305a5d,2024-05-16T13:03:05.353000 +CVE-2024-4926,0,1,4476c9fb0ed274c937ddc3bed3844df7667886eb4ac8b672009622546baf9cba,2024-05-16T13:03:05.353000 +CVE-2024-4927,0,1,4bacf3857c1e1b3c5f7735b35e2e472f71aa0d37512849834ca790fa413335f8,2024-05-16T13:03:05.353000 +CVE-2024-4928,0,1,2d65965ee7f4c2842f6870396793c694d34c9ef67d4c82c86ef63b3301c1a173,2024-05-16T13:03:05.353000 +CVE-2024-4929,0,1,52a69ce4bdd2407afef454a0517cd1fa449b53614a7da50eee17128804b2f8e4,2024-05-16T13:03:05.353000 +CVE-2024-4930,0,1,c6a8c21679dcd80a6a4b283e156cc5f3f84bd18756eae1c7dbe348c8bb94f429,2024-05-16T13:03:05.353000 +CVE-2024-4931,0,1,e162dba3310cbf5f9dd04446b9050556a4ced2fc00d136a965cbf29f1c94a7cb,2024-05-16T13:03:05.353000 +CVE-2024-4932,0,1,beb55ea8709d0d43e6444aa2b73d587993e6df6c95cc0756036ee157298aee31,2024-05-16T13:03:05.353000 +CVE-2024-4933,0,1,842d176c737cff14ff647ca6e1f753dbd3c448eb759480edcae7000f55e65687,2024-05-16T13:03:05.353000 +CVE-2024-4945,0,1,c585bd04b527957711db5a367af50e20d5a9663d54b8acb4be497de427c0e6a1,2024-05-16T13:03:05.353000 +CVE-2024-4946,0,1,7dd2422a669fd6ecda3497d81820d0f07fed1e35ea3a23b8df3d9696eba637f7,2024-05-16T13:03:05.353000 +CVE-2024-4947,0,1,d99daa970efeabb8f4dd091c927b07b74399731d4a362b2b49e66334d24d2a77,2024-05-16T13:03:05.353000 +CVE-2024-4948,0,1,2b5345a3a2ad0f0e256c8a9888ed4459968962a0ab1b7459292f31a2fc3a82d1,2024-05-16T13:03:05.353000 +CVE-2024-4949,0,1,259df003248cd164c42bd8e14c2329886e112004798407d6615ac49c44fb7c83,2024-05-16T13:03:05.353000 +CVE-2024-4950,0,1,ee7f090411e231f963c331a4d42c01705715794d425732d14831f9be8aa12a99,2024-05-16T13:03:05.353000 +CVE-2024-4960,0,1,045d52fd9e9983444ccc99702bb2aa9442d1563c91fc52cfc8bacb83bb9b31f2,2024-05-16T13:03:05.353000 +CVE-2024-4961,0,1,bb995187a5aba5612716089a4579787e30edb21381af42fcf7cc9d47be72cc56,2024-05-16T13:03:05.353000 +CVE-2024-4962,0,1,855485e80ab61f647eda491277a3676b0da192e4635ab162bf9871a75a582ca3,2024-05-16T13:03:05.353000 +CVE-2024-4963,0,1,864e65051491b6e4b85217e662eef3883fcd8fba9157c3a074a6cd258669b44c,2024-05-16T13:03:05.353000 +CVE-2024-4964,0,1,f5e5806583684f322c11c84dee2639108805c230c9cfb222a29ec0e7f838da21,2024-05-16T13:03:05.353000 +CVE-2024-4965,0,1,dd820e51e8630561d17bdf9abafcdd8295bab88ecb32fe5adccb05fc6ace1944,2024-05-16T13:03:05.353000 +CVE-2024-4966,0,1,d7c8c73acbbdb1d5dc14c6e3f9fa6c9c86c94ecc7200048e82e7e5d776be5bae,2024-05-16T13:03:05.353000 +CVE-2024-4967,0,1,791e6c02ef3c8b8b193e2a56fed1b54ea5e591117f27b280526bfbbfed3c86f4,2024-05-16T13:03:05.353000 +CVE-2024-4968,0,1,4d228af221df1bd9400afcc1e651b824959d6170e1f161c1b9c00cc9b68d55a3,2024-05-16T13:03:05.353000 +CVE-2024-4972,0,1,ff00b44d2a65cc4eec3ff19724d530c23eb9593917ce5aa24b3a56cce2dfbbe6,2024-05-16T13:03:05.353000 +CVE-2024-4973,0,1,71f6f2731011fff414425658cfff916e1a7d2854906dae3f57debbf07e010843,2024-05-16T13:03:05.353000 +CVE-2024-4974,0,1,0951fc664efc6d7dca6c52a3fc722bfae9f854fe7b428cbd2e8630d3d2d72b6d,2024-05-16T13:03:05.353000 +CVE-2024-4975,0,1,692c2f2cf0c5fa3f3862dba8afc79921f45df3dcc238f4d22a7ada6856fc7f47,2024-05-16T13:03:05.353000 +CVE-2024-4976,0,1,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000 +CVE-2024-4984,0,1,c181b2792419ab292757f17fa7ed54efe54e64b1f0d7a8e32f201040654607f4,2024-05-16T13:03:05.353000 +CVE-2024-4991,1,1,180b9ed28c0cce46df550147eebf5773d3a2c46d3490c6ab8f019084050e5a01,2024-05-16T13:03:05.353000 +CVE-2024-4992,1,1,504a91a45451c38d9b5beed8f2c88cac747dfe187af29754ed23c5e483929557,2024-05-16T13:03:05.353000 +CVE-2024-4993,1,1,54558f9e3463a1500143cda3bf9ee67127625c6afa1872d34f1d786cf2569f73,2024-05-16T13:03:05.353000 +CVE-2024-4999,1,1,2035a14b65869bdbc02694d03902260c2efca42393ca2ad76f1e87c0f09d90ed,2024-05-16T13:15:48.357000