From 7ce508a856cc1ce9d7472ca53c09a5413641f397 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 29 Oct 2024 15:03:51 +0000 Subject: [PATCH] Auto-Update: 2024-10-29T15:00:51.520398+00:00 --- CVE-1999/CVE-1999-00xx/CVE-1999-0006.json | 4 +- CVE-1999/CVE-1999-00xx/CVE-1999-0022.json | 4 +- CVE-1999/CVE-1999-00xx/CVE-1999-0036.json | 4 +- CVE-2003/CVE-2003-00xx/CVE-2003-0063.json | 12 +- CVE-2017/CVE-2017-201xx/CVE-2017-20195.json | 4 +- CVE-2017/CVE-2017-98xx/CVE-2017-9855.json | 4 +- CVE-2018/CVE-2018-143xx/CVE-2018-14335.json | 4 +- CVE-2020/CVE-2020-143xx/CVE-2020-14318.json | 12 +- CVE-2020/CVE-2020-229xx/CVE-2020-22916.json | 22 +- CVE-2020/CVE-2020-85xx/CVE-2020-8549.json | 6 +- CVE-2021/CVE-2021-373xx/CVE-2021-37386.json | 32 +- CVE-2021/CVE-2021-408xx/CVE-2021-40812.json | 32 +- CVE-2021/CVE-2021-426xx/CVE-2021-42694.json | 4 +- CVE-2021/CVE-2021-469xx/CVE-2021-46920.json | 24 +- CVE-2021/CVE-2021-469xx/CVE-2021-46925.json | 34 +- CVE-2022/CVE-2022-314xx/CVE-2022-31456.json | 22 +- CVE-2022/CVE-2022-424xx/CVE-2022-42451.json | 24 +- CVE-2022/CVE-2022-443xx/CVE-2022-44349.json | 24 +- CVE-2022/CVE-2022-467xx/CVE-2022-46722.json | 24 +- CVE-2022/CVE-2022-467xx/CVE-2022-46724.json | 34 +- CVE-2022/CVE-2022-469xx/CVE-2022-46900.json | 22 +- CVE-2023/CVE-2023-378xx/CVE-2023-37822.json | 91 ++- CVE-2023/CVE-2023-521xx/CVE-2023-52123.json | 6 +- CVE-2024/CVE-2024-07xx/CVE-2024-0726.json | 8 +- CVE-2024/CVE-2024-100xx/CVE-2024-10000.json | 8 +- CVE-2024/CVE-2024-100xx/CVE-2024-10008.json | 8 +- CVE-2024/CVE-2024-100xx/CVE-2024-10048.json | 8 +- CVE-2024/CVE-2024-100xx/CVE-2024-10049.json | 36 +- CVE-2024/CVE-2024-101xx/CVE-2024-10181.json | 4 +- CVE-2024/CVE-2024-101xx/CVE-2024-10184.json | 4 +- CVE-2024/CVE-2024-101xx/CVE-2024-10185.json | 4 +- CVE-2024/CVE-2024-102xx/CVE-2024-10214.json | 8 +- CVE-2024/CVE-2024-102xx/CVE-2024-10226.json | 64 +++ CVE-2024/CVE-2024-102xx/CVE-2024-10227.json | 8 +- CVE-2024/CVE-2024-102xx/CVE-2024-10233.json | 4 +- CVE-2024/CVE-2024-102xx/CVE-2024-10241.json | 8 +- CVE-2024/CVE-2024-102xx/CVE-2024-10266.json | 4 +- CVE-2024/CVE-2024-103xx/CVE-2024-10312.json | 8 +- CVE-2024/CVE-2024-103xx/CVE-2024-10360.json | 4 +- CVE-2024/CVE-2024-104xx/CVE-2024-10423.json | 18 +- CVE-2024/CVE-2024-104xx/CVE-2024-10424.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10425.json | 6 +- CVE-2024/CVE-2024-104xx/CVE-2024-10436.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10437.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10448.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10449.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10450.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10455.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10458.json | 41 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10459.json | 41 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10460.json | 37 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10461.json | 72 +++ CVE-2024/CVE-2024-104xx/CVE-2024-10462.json | 37 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10463.json | 41 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10464.json | 37 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10465.json | 37 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10466.json | 37 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10467.json | 37 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10468.json | 29 + CVE-2024/CVE-2024-104xx/CVE-2024-10469.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10474.json | 48 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10477.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10478.json | 8 +- CVE-2024/CVE-2024-104xx/CVE-2024-10479.json | 8 +- CVE-2024/CVE-2024-220xx/CVE-2024-22065.json | 8 +- CVE-2024/CVE-2024-220xx/CVE-2024-22066.json | 8 +- CVE-2024/CVE-2024-278xx/CVE-2024-27849.json | 8 +- CVE-2024/CVE-2024-301xx/CVE-2024-30106.json | 8 +- CVE-2024/CVE-2024-316xx/CVE-2024-31682.json | 4 +- CVE-2024/CVE-2024-345xx/CVE-2024-34537.json | 8 +- CVE-2024/CVE-2024-392xx/CVE-2024-39205.json | 8 +- CVE-2024/CVE-2024-39xx/CVE-2024-3980.json | 4 +- CVE-2024/CVE-2024-407xx/CVE-2024-40792.json | 8 +- CVE-2024/CVE-2024-408xx/CVE-2024-40851.json | 8 +- CVE-2024/CVE-2024-408xx/CVE-2024-40853.json | 8 +- CVE-2024/CVE-2024-408xx/CVE-2024-40855.json | 8 +- CVE-2024/CVE-2024-408xx/CVE-2024-40867.json | 8 +- CVE-2024/CVE-2024-411xx/CVE-2024-41153.json | 56 ++ CVE-2024/CVE-2024-411xx/CVE-2024-41156.json | 56 ++ CVE-2024/CVE-2024-420xx/CVE-2024-42011.json | 8 +- CVE-2024/CVE-2024-420xx/CVE-2024-42028.json | 8 +- CVE-2024/CVE-2024-429xx/CVE-2024-42930.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44122.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44123.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44126.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44137.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44144.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44145.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44155.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44156.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44159.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44174.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44175.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44194.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44196.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44197.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44203.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44208.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44213.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44215.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44216.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44217.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44218.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44222.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44228.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44229.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44235.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44236.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44237.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44239.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44240.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44244.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44247.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44251.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44252.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44253.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44254.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44255.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44256.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44257.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44258.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44259.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44260.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44261.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44262.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44263.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44264.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44265.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44267.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44269.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44270.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44273.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44274.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44275.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44277.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44278.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44279.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44280.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44281.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44282.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44283.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44284.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44285.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44287.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44289.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44294.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44295.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44296.json | 8 +- CVE-2024/CVE-2024-442xx/CVE-2024-44297.json | 8 +- CVE-2024/CVE-2024-443xx/CVE-2024-44301.json | 8 +- CVE-2024/CVE-2024-443xx/CVE-2024-44302.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45477.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45656.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45802.json | 8 +- CVE-2024/CVE-2024-468xx/CVE-2024-46872.json | 8 +- CVE-2024/CVE-2024-474xx/CVE-2024-47401.json | 8 +- CVE-2024/CVE-2024-476xx/CVE-2024-47640.json | 56 ++ CVE-2024/CVE-2024-478xx/CVE-2024-47827.json | 8 +- CVE-2024/CVE-2024-481xx/CVE-2024-48107.json | 8 +- CVE-2024/CVE-2024-481xx/CVE-2024-48177.json | 8 +- CVE-2024/CVE-2024-481xx/CVE-2024-48178.json | 8 +- CVE-2024/CVE-2024-481xx/CVE-2024-48191.json | 8 +- CVE-2024/CVE-2024-481xx/CVE-2024-48195.json | 8 +- CVE-2024/CVE-2024-481xx/CVE-2024-48196.json | 8 +- CVE-2024/CVE-2024-482xx/CVE-2024-48291.json | 8 +- CVE-2024/CVE-2024-483xx/CVE-2024-48356.json | 8 +- CVE-2024/CVE-2024-483xx/CVE-2024-48357.json | 8 +- CVE-2024/CVE-2024-484xx/CVE-2024-48465.json | 8 +- CVE-2024/CVE-2024-485xx/CVE-2024-48509.json | 56 +- CVE-2024/CVE-2024-485xx/CVE-2024-48594.json | 8 +- CVE-2024/CVE-2024-488xx/CVE-2024-48825.json | 8 +- CVE-2024/CVE-2024-488xx/CVE-2024-48826.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4872.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49632.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49634.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49635.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49636.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49637.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49638.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49639.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49640.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49641.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49642.json | 8 +- CVE-2024/CVE-2024-496xx/CVE-2024-49643.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49645.json | 56 ++ CVE-2024/CVE-2024-496xx/CVE-2024-49646.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49647.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49648.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49650.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49651.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49654.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49656.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49659.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49660.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49661.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49662.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49663.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49664.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49665.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49667.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49670.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49672.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49673.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49678.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49679.json | 4 +- CVE-2024/CVE-2024-496xx/CVE-2024-49692.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49755.json | 8 +- CVE-2024/CVE-2024-497xx/CVE-2024-49761.json | 8 +- CVE-2024/CVE-2024-497xx/CVE-2024-49771.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50052.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50068.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50069.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50070.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50071.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50072.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50073.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50074.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50075.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50076.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50077.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50078.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50079.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50080.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50081.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50082.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50083.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50084.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50085.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50086.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50087.json | 8 +- CVE-2024/CVE-2024-500xx/CVE-2024-50088.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50407.json | 4 +- CVE-2024/CVE-2024-504xx/CVE-2024-50409.json | 4 +- CVE-2024/CVE-2024-504xx/CVE-2024-50410.json | 4 +- CVE-2024/CVE-2024-504xx/CVE-2024-50411.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50412.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50413.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50414.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50415.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50418.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50420.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50426.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50427.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50429.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50431.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50432.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50433.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50434.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50435.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50436.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50437.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50438.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50439.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50440.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50441.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50443.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50445.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50446.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50447.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50448.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50449.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50451.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50453.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50457.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50458.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50460.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50461.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50462.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50464.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50467.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50468.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50469.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50473.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50475.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50476.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50480.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50481.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50482.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50484.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50485.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50490.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50493.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50494.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50495.json | 8 +- CVE-2024/CVE-2024-504xx/CVE-2024-50496.json | 8 +- CVE-2024/CVE-2024-505xx/CVE-2024-50550.json | 8 +- CVE-2024/CVE-2024-510xx/CVE-2024-51075.json | 21 + CVE-2024/CVE-2024-510xx/CVE-2024-51076.json | 21 + CVE-2024/CVE-2024-511xx/CVE-2024-51180.json | 21 + CVE-2024/CVE-2024-511xx/CVE-2024-51181.json | 21 + CVE-2024/CVE-2024-515xx/CVE-2024-51506.json | 8 +- CVE-2024/CVE-2024-515xx/CVE-2024-51507.json | 8 +- CVE-2024/CVE-2024-515xx/CVE-2024-51508.json | 8 +- CVE-2024/CVE-2024-515xx/CVE-2024-51509.json | 8 +- CVE-2024/CVE-2024-55xx/CVE-2024-5532.json | 8 +- CVE-2024/CVE-2024-58xx/CVE-2024-5823.json | 60 ++ CVE-2024/CVE-2024-59xx/CVE-2024-5982.json | 82 +++ CVE-2024/CVE-2024-62xx/CVE-2024-6245.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6581.json | 60 ++ CVE-2024/CVE-2024-66xx/CVE-2024-6673.json | 60 ++ CVE-2024/CVE-2024-66xx/CVE-2024-6674.json | 60 ++ CVE-2024/CVE-2024-68xx/CVE-2024-6868.json | 60 ++ CVE-2024/CVE-2024-70xx/CVE-2024-7010.json | 60 ++ CVE-2024/CVE-2024-70xx/CVE-2024-7042.json | 60 ++ CVE-2024/CVE-2024-74xx/CVE-2024-7472.json | 60 ++ CVE-2024/CVE-2024-74xx/CVE-2024-7473.json | 60 ++ CVE-2024/CVE-2024-74xx/CVE-2024-7474.json | 82 +++ CVE-2024/CVE-2024-74xx/CVE-2024-7475.json | 82 +++ CVE-2024/CVE-2024-77xx/CVE-2024-7774.json | 60 ++ CVE-2024/CVE-2024-77xx/CVE-2024-7783.json | 60 ++ CVE-2024/CVE-2024-78xx/CVE-2024-7807.json | 70 +++ CVE-2024/CVE-2024-79xx/CVE-2024-7962.json | 60 ++ CVE-2024/CVE-2024-81xx/CVE-2024-8143.json | 60 ++ CVE-2024/CVE-2024-83xx/CVE-2024-8309.json | 60 ++ CVE-2024/CVE-2024-87xx/CVE-2024-8740.json | 36 +- CVE-2024/CVE-2024-87xx/CVE-2024-8790.json | 36 +- CVE-2024/CVE-2024-89xx/CVE-2024-8916.json | 58 +- CVE-2024/CVE-2024-93xx/CVE-2024-9350.json | 36 +- CVE-2024/CVE-2024-93xx/CVE-2024-9376.json | 4 +- CVE-2024/CVE-2024-94xx/CVE-2024-9438.json | 8 +- CVE-2024/CVE-2024-95xx/CVE-2024-9505.json | 68 +++ CVE-2024/CVE-2024-95xx/CVE-2024-9593.json | 65 ++- CVE-2024/CVE-2024-96xx/CVE-2024-9629.json | 8 +- CVE-2024/CVE-2024-98xx/CVE-2024-9825.json | 8 +- README.md | 86 ++- _state.csv | 598 +++++++++++--------- 326 files changed, 5029 insertions(+), 901 deletions(-) create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10226.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10458.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10459.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10460.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10461.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10462.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10463.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10464.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10465.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10466.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10467.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10468.json create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10474.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41153.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41156.json create mode 100644 CVE-2024/CVE-2024-476xx/CVE-2024-47640.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49632.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49634.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49635.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49636.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49637.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49638.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49639.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49640.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49641.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49643.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49645.json create mode 100644 CVE-2024/CVE-2024-510xx/CVE-2024-51075.json create mode 100644 CVE-2024/CVE-2024-510xx/CVE-2024-51076.json create mode 100644 CVE-2024/CVE-2024-511xx/CVE-2024-51180.json create mode 100644 CVE-2024/CVE-2024-511xx/CVE-2024-51181.json create mode 100644 CVE-2024/CVE-2024-58xx/CVE-2024-5823.json create mode 100644 CVE-2024/CVE-2024-59xx/CVE-2024-5982.json create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6581.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6673.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6674.json create mode 100644 CVE-2024/CVE-2024-68xx/CVE-2024-6868.json create mode 100644 CVE-2024/CVE-2024-70xx/CVE-2024-7010.json create mode 100644 CVE-2024/CVE-2024-70xx/CVE-2024-7042.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7472.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7473.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7474.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7475.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7774.json create mode 100644 CVE-2024/CVE-2024-77xx/CVE-2024-7783.json create mode 100644 CVE-2024/CVE-2024-78xx/CVE-2024-7807.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7962.json create mode 100644 CVE-2024/CVE-2024-81xx/CVE-2024-8143.json create mode 100644 CVE-2024/CVE-2024-83xx/CVE-2024-8309.json create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9505.json diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0006.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0006.json index 78f990224ff..6732153113f 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0006.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0006.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0006", "sourceIdentifier": "cve@mitre.org", "published": "1998-07-14T04:00:00.000", - "lastModified": "2024-08-01T19:35:03.600", + "lastModified": "2024-10-29T14:35:00.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -77,7 +77,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0022.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0022.json index 2a362797561..17b8eb8fbd8 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0022.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0022.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0022", "sourceIdentifier": "cve@mitre.org", "published": "1996-07-03T04:00:00.000", - "lastModified": "2024-08-01T20:35:03.600", + "lastModified": "2024-10-29T14:35:02.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -77,7 +77,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0036.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0036.json index 075c005f0d0..df29c7335b7 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0036.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0036.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0036", "sourceIdentifier": "cve@mitre.org", "published": "1997-05-26T04:00:00.000", - "lastModified": "2024-08-01T20:35:05.300", + "lastModified": "2024-10-29T14:35:02.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -77,7 +77,7 @@ "description": [ { "lang": "en", - "value": "CWE-645" + "value": "CWE-434" } ] } diff --git a/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json b/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json index 8e42a8bec74..cf6755d3205 100644 --- a/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json +++ b/CVE-2003/CVE-2003-00xx/CVE-2003-0063.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0063", "sourceIdentifier": "cve@mitre.org", "published": "2003-03-03T05:00:00.000", - "lastModified": "2024-08-22T15:35:00.600", + "lastModified": "2024-10-29T14:35:03.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,16 +74,6 @@ "value": "NVD-CWE-Other" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-150" - } - ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json index 5b220b7577f..70d1b072f61 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20195.json @@ -2,8 +2,8 @@ "id": "CVE-2017-20195", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-29T12:15:02.917", - "lastModified": "2024-10-29T12:15:02.917", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json index b8703a7a23e..f2fd571972e 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9855.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9855", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-05T17:29:00.553", - "lastModified": "2024-08-05T18:15:29.867", + "lastModified": "2024-10-29T14:35:04.070", "vulnStatus": "Modified", "cveTags": [ { @@ -110,7 +110,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-863" } ] } diff --git a/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json b/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json index fda440c8cae..f12317d0b34 100644 --- a/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json +++ b/CVE-2018/CVE-2018-143xx/CVE-2018-14335.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14335", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-24T13:29:00.603", - "lastModified": "2024-08-01T13:41:39.203", + "lastModified": "2024-10-29T14:35:05.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -103,7 +103,7 @@ "description": [ { "lang": "en", - "value": "CWE-277" + "value": "CWE-276" } ] } diff --git a/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json b/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json index fd8ea323e6f..2812eaf8991 100644 --- a/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json +++ b/CVE-2020/CVE-2020-143xx/CVE-2020-14318.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14318", "sourceIdentifier": "secalert@redhat.com", "published": "2020-12-03T16:15:12.077", - "lastModified": "2024-07-03T01:36:17.507", + "lastModified": "2024-10-29T14:35:06.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,16 +104,6 @@ "value": "CWE-269" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-266" - } - ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-229xx/CVE-2020-22916.json b/CVE-2020/CVE-2020-229xx/CVE-2020-22916.json index aca96f48dfe..07fb61535dd 100644 --- a/CVE-2020/CVE-2020-229xx/CVE-2020-22916.json +++ b/CVE-2020/CVE-2020-229xx/CVE-2020-22916.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22916", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:19.407", - "lastModified": "2024-08-04T15:15:49.027", + "lastModified": "2024-10-29T14:35:06.790", "vulnStatus": "Modified", "cveTags": [ { @@ -43,6 +43,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2020/CVE-2020-85xx/CVE-2020-8549.json b/CVE-2020/CVE-2020-85xx/CVE-2020-8549.json index 07e0606e323..64d7790d4f6 100644 --- a/CVE-2020/CVE-2020-85xx/CVE-2020-8549.json +++ b/CVE-2020/CVE-2020-85xx/CVE-2020-8549.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8549", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-03T17:15:17.250", - "lastModified": "2022-04-08T10:32:50.943", + "lastModified": "2024-10-29T14:02:29.840", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:machothemes:strong_testimonials:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.40.1", - "matchCriteriaId": "B76F84AF-6616-4881-B568-6E6EF605ABE6" + "matchCriteriaId": "D190BB57-9043-4262-B8EB-60EBAB0F8E40" } ] } diff --git a/CVE-2021/CVE-2021-373xx/CVE-2021-37386.json b/CVE-2021/CVE-2021-373xx/CVE-2021-37386.json index 2f6dfd4c24d..dc99e9c4f3c 100644 --- a/CVE-2021/CVE-2021-373xx/CVE-2021-37386.json +++ b/CVE-2021/CVE-2021-373xx/CVE-2021-37386.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37386", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T17:15:09.377", - "lastModified": "2023-08-22T22:15:08.200", + "lastModified": "2024-10-29T14:35:07.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 5.3 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 5.3 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-408xx/CVE-2021-40812.json b/CVE-2021/CVE-2021-408xx/CVE-2021-40812.json index 3890f560f4b..8771c5b0238 100644 --- a/CVE-2021/CVE-2021-408xx/CVE-2021-40812.json +++ b/CVE-2021/CVE-2021-408xx/CVE-2021-40812.json @@ -2,7 +2,7 @@ "id": "CVE-2021-40812", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-08T21:15:14.083", - "lastModified": "2024-04-07T01:17:53.437", + "lastModified": "2024-10-29T14:35:07.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json b/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json index 2a49872e544..ba94668465b 100644 --- a/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json +++ b/CVE-2021/CVE-2021-426xx/CVE-2021-42694.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42694", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T04:15:08.043", - "lastModified": "2024-08-04T04:16:06.790", + "lastModified": "2024-10-29T14:35:08.773", "vulnStatus": "Modified", "cveTags": [ { @@ -108,7 +108,7 @@ "description": [ { "lang": "en", - "value": "CWE-1007" + "value": "CWE-94" } ] } diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46920.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46920.json index 1c1963e93ad..0076bbac5ed 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46920.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46920.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46920", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T07:15:08.987", - "lastModified": "2024-04-10T14:52:39.323", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T14:35:10.437", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46925.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46925.json index 08f61509afc..a28f4812888 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46925.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46925.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46925", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T10:15:07.237", - "lastModified": "2024-04-10T15:22:29.233", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T14:35:10.930", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-314xx/CVE-2022-31456.json b/CVE-2022/CVE-2022-314xx/CVE-2022-31456.json index af5baf6c2f0..e7aac25849f 100644 --- a/CVE-2022/CVE-2022-314xx/CVE-2022-31456.json +++ b/CVE-2022/CVE-2022-314xx/CVE-2022-31456.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31456", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-26T20:15:12.380", - "lastModified": "2023-11-07T03:47:37.840", + "lastModified": "2024-10-29T14:35:12.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json index 78d4a7035f3..f543abd2930 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42451", "sourceIdentifier": "psirt@hcl.com", "published": "2023-10-11T06:15:09.387", - "lastModified": "2023-10-23T15:02:36.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T14:35:12.397", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,6 +56,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44349.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44349.json index fb9abc42c22..4618d24ba8c 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44349.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44349.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44349", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-01T10:15:07.677", - "lastModified": "2023-09-06T20:58:14.480", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T14:35:12.720", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46722.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46722.json index 39081d529c6..3c801e898ca 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46722.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46722.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46722", "sourceIdentifier": "product-security@apple.com", "published": "2023-08-14T23:15:10.303", - "lastModified": "2023-08-19T00:43:34.500", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T14:35:12.967", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46724.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46724.json index 5937982286a..e0d2181ef26 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46724.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46724.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46724", "sourceIdentifier": "product-security@apple.com", "published": "2023-08-14T23:15:10.360", - "lastModified": "2023-08-19T00:43:43.330", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T14:35:13.290", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46900.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46900.json index 4d6553098cc..22f0a24e31d 100644 --- a/CVE-2022/CVE-2022-469xx/CVE-2022-46900.json +++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46900.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46900", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-25T20:15:13.087", - "lastModified": "2023-08-08T13:15:09.817", + "lastModified": "2024-10-29T14:35:14.353", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json index 94a0b2ecbba..1fd8afa9b3c 100644 --- a/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37822", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-03T18:15:04.443", - "lastModified": "2024-10-04T14:15:05.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T14:47:05.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,100 @@ "value": "Se descubri\u00f3 que Eufy HomeBase 2 modelo T8010X v3.2.8.3h utiliza el protocolo inal\u00e1mbrico obsoleto WPA2-PSK." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:eufy:homebase_2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.3.4.1h", + "matchCriteriaId": "241B6040-EA43-462E-94D5-8F788B8B9612" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:eufy:homebase_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "731A91CE-0078-4D0E-B90B-D7D323ACC346" + } + ] + } + ] + } + ], "references": [ { "url": "http://anker.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://eufy.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.usenix.org/conference/woot24/presentation/goeman", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] }, { "url": "https://www.usenix.org/system/files/woot24-goeman.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52123.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52123.json index 17034cf0a05..b73d76e8b6b 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52123.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52123.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52123", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T09:15:08.800", - "lastModified": "2024-01-11T14:28:17.513", + "lastModified": "2024-10-29T14:02:29.840", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:machothemes:strong_testimonials:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "3.1.10", - "matchCriteriaId": "1E16AF02-B3B6-4BFE-B533-F19E3E7EDEB5" + "matchCriteriaId": "8EDDB770-D683-46AF-81A6-C4F0C06B52A6" } ] } diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0726.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0726.json index 20d3cecfa42..1bfd55d2986 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0726.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0726.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0726", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T18:15:08.350", - "lastModified": "2024-05-17T02:34:54.650", - "vulnStatus": "Modified", + "lastModified": "2024-10-29T13:15:26.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -115,8 +115,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yugeshverma:student_project_allocation_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "308E559F-7023-4284-9154-DC8EA6930349" + "criteria": "cpe:2.3:a:projectworlds:student_project_allocation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8A452D93-DCCE-4A81-8133-5BE96CCA6FF0" } ] } diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10000.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10000.json index 8b53605afcf..ad165ff01d8 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10000.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10000.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10000", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T06:15:13.333", - "lastModified": "2024-10-29T06:15:13.333", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Masteriyo LMS \u2013 eLearning and Online Course Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the question's content parameter in all versions up to, and including, 1.13.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with student-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Masteriyo LMS \u2013 eLearning and Online Course Builder for WordPress para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro de contenido de la pregunta en todas las versiones hasta la 1.13.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de estudiante y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10008.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10008.json index 1eb38f00e30..9d658ffe895 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10008.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10008.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10008", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T06:15:13.743", - "lastModified": "2024-10-29T06:15:13.743", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Masteriyo LMS \u2013 eLearning and Online Course Builder for WordPress plugin for WordPress is vulnerable to unauthorized user profile modification due to missing authorization checks on the /wp-json/masteriyo/v1/users/$id REST API endpoint in all versions up to, and including, 1.13.3. This makes it possible for authenticated attackers, with student-level access and above, to modify the roles of arbitrary users. As a result, attackers can escalate their privileges to the Administrator and demote existing administrators to students." + }, + { + "lang": "es", + "value": "El complemento Masteriyo LMS \u2013 eLearning and Online Course Builder for WordPress para WordPress es vulnerable a modificaciones no autorizadas de perfiles de usuarios debido a la falta de comprobaciones de autorizaci\u00f3n en el endpoint de la API REST /wp-json/masteriyo/v1/users/$id en todas las versiones hasta la 1.13.3 incluida. Esto permite que atacantes autenticados, con acceso de nivel de estudiante y superior, modifiquen los roles de usuarios arbitrarios. Como resultado, los atacantes pueden escalar sus privilegios al nivel de Administrador y degradar a los administradores existentes al nivel de estudiantes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10048.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10048.json index ae8946f5d7d..a3f9819eca4 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10048.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10048.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10048", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T09:15:06.403", - "lastModified": "2024-10-29T09:15:06.403", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post Status Notifier Lite and Premium plugins for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page\u2019 parameter in all versions up to, and including, 1.11.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "Los complementos Post Status Notifier Lite y Premium para WordPress son vulnerables a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 1.11.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json index bbf02ac0455..b0f5cc7f66a 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10049", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:04.977", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T14:49:04.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Edit WooCommerce Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018page\u2019 parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Edit WooCommerce Templates para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'page' en todas las versiones hasta la 1.1.2 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:edit_woocommerce_templates_project:edit_woocommerce_templates:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.1.2", + "matchCriteriaId": "2C47F560-A2D3-4D11-B33D-09C25F0BAE22" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/woo-edit-templates/trunk/includes/list-table-theme-templates.php#L87", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3704b365-cbdf-4c74-9619-59f0a10e3c6a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json index 556a5c2d91b..eef17ac8e57 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10181", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T12:15:03.433", - "lastModified": "2024-10-29T12:15:03.433", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10184.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10184.json index 90a56bddb8b..82d6dc49ab9 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10184.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10184", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:02.930", - "lastModified": "2024-10-29T11:15:02.930", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10185.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10185.json index 7117c1daf0c..c07a7254f14 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10185.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10185", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.167", - "lastModified": "2024-10-29T11:15:03.167", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10214.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10214.json index 2b0f4f31fb4..064929c64a9 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10214.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10214.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10214", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-10-28T15:15:04.020", - "lastModified": "2024-10-28T15:15:04.020", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 icorrectly issues two sessions when using desktop SSO - one in the browser and one in desktop with incorrect settings." + }, + { + "lang": "es", + "value": "Las versiones 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 de Mattermost emiten incorrectamente dos sesiones al usar SSO de escritorio: una en el navegador y otra en el escritorio con configuraciones incorrectas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json new file mode 100644 index 00000000000..8f39c3ee108 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-10226", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-29T14:15:06.170", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Arconix Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'box' shortcode in all versions up to, and including, 2.1.13 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3176718/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/arconix-shortcodes/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94bae97d-2959-4ace-992d-1f4b1ccc8c3b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10227.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10227.json index 33ca75c21b2..6476c6624bf 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10227.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10227.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10227", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T10:15:03.183", - "lastModified": "2024-10-29T10:15:03.183", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affiliate-toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's atkp_product shortcode in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento affiliate-toolkit para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado atkp_product del complemento en todas las versiones hasta la 3.6.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10233.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10233.json index 5d932f79426..61751de6203 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10233.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10233", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.377", - "lastModified": "2024-10-29T11:15:03.377", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10241.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10241.json index b11f29690c1..e0a865a3185 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10241.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10241.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10241", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-10-29T08:15:11.990", - "lastModified": "2024-10-29T08:15:11.990", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.5.x <= 9.5.9 fail to properly filter the channel data when ElasticSearch is enabled which allows a user to get\u00a0private channel names by using cmd+K/ctrl+K." + }, + { + "lang": "es", + "value": "Las versiones 9.5.x <= 9.5.9 de Mattermost no pueden filtrar correctamente los datos del canal cuando ElasticSearch est\u00e1 habilitado, lo que permite que un usuario obtenga nombres de canales privados mediante cmd+K/ctrl+K." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json index 8e7a06d0d8a..f11b834f5f3 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10266", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.590", - "lastModified": "2024-10-29T11:15:03.590", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json index 94f0fe7228a..b170eedcce7 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10312", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T08:15:12.330", - "lastModified": "2024-10-29T08:15:12.330", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.4 via the render function in elements/tabs/tabs.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data." + }, + { + "lang": "es", + "value": "El complemento Exclusive Addons for Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.7.4 incluida a trav\u00e9s de la funci\u00f3n de renderizado en elements/tabs/tabs.php. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos confidenciales de plantillas privadas, pendientes y en borrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json index 8c257a6b743..ca93d49e9cb 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10360", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.797", - "lastModified": "2024-10-29T11:15:03.797", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10423.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10423.json index ebb238b102a..c65610afaef 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10423.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10423", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T18:15:03.323", - "lastModified": "2024-10-29T00:08:57.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T13:11:44.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,19 +66,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 5.9 }, { @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yugeshverma:student_project_allocation_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "308E559F-7023-4284-9154-DC8EA6930349" + "criteria": "cpe:2.3:a:projectworlds:student_project_allocation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8A452D93-DCCE-4A81-8133-5BE96CCA6FF0" } ] } diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10424.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10424.json index fa4a545502c..0a7cc330707 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10424.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10424", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T19:15:04.273", - "lastModified": "2024-10-29T00:45:01.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T13:11:42.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yugeshverma:student_project_allocation_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "308E559F-7023-4284-9154-DC8EA6930349" + "criteria": "cpe:2.3:a:projectworlds:student_project_allocation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8A452D93-DCCE-4A81-8133-5BE96CCA6FF0" } ] } diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10425.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10425.json index d0d9b24875e..e3372c968d8 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10425.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10425.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10425", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T19:15:04.537", - "lastModified": "2024-10-29T00:57:33.760", + "lastModified": "2024-10-29T13:14:31.863", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -159,8 +159,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:phpgurukul:student_project_allocation_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B00C5204-6D74-4935-8F56-F043D6701BE6" + "criteria": "cpe:2.3:a:projectworlds:student_project_allocation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8A452D93-DCCE-4A81-8133-5BE96CCA6FF0" } ] } diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10436.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10436.json index 9e07ae9bfe0..dec476fb694 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10436.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10436.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10436", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T10:15:03.900", - "lastModified": "2024-10-29T10:15:03.900", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.2.1 via the get_condition_value function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento WPC Smart Messages for WooCommerce para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 4.2.1 incluida a trav\u00e9s de la funci\u00f3n get_condition_value. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10437.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10437.json index 5564580db27..443bff14c76 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10437.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10437.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10437", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T10:15:04.140", - "lastModified": "2024-10-29T10:15:04.140", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to unauthorized Smar Message activation/deactivation due to a missing capability check on the ajax_enable function in all versions up to, and including, 4.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate or deactivate smart messages." + }, + { + "lang": "es", + "value": "El complemento WPC Smart Messages for WooCommerce para WordPress es vulnerable a la activaci\u00f3n o desactivaci\u00f3n no autorizada de mensajes inteligentes debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ajax_enable en todas las versiones hasta la 4.2.1 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, activen o desactiven los mensajes inteligentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10448.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10448.json index ec54c199a77..a65a241747c 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10448.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10448.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10448", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-28T14:15:04.143", - "lastModified": "2024-10-28T14:15:04.143", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /file/delete.php. The manipulation of the argument bid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other endpoints might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Blood Bank Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /file/delete.php. La manipulaci\u00f3n del argumento bid conduce a cross-site request forgery. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros endpoints." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10449.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10449.json index f69a94c78c8..8f7779e577b 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10449.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10449.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10449", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-28T15:15:04.303", - "lastModified": "2024-10-28T15:15:04.303", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips Hospital Appointment System 1.0. Afecta a una parte desconocida del archivo /loginAction.php. La manipulaci\u00f3n del argumento Username provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10450.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10450.json index 4cd4a7a4760..3383c1f54e7 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10450.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10450.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10450", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-28T15:15:04.560", - "lastModified": "2024-10-28T15:15:04.560", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /kortex_lite/control/edit_profile.php of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SourceCodester Kortex Lite Advocate Office Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /kortex_lite/control/edit_profile.php del componente POST Parameter Handler. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json index e53a645f062..8dd0b33ab5f 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10455.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10455", "sourceIdentifier": "cve@gitlab.com", "published": "2024-10-28T14:15:04.423", - "lastModified": "2024-10-28T14:15:04.423", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reachable Assertion in BPv7 parser in \u00b5D3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block" + }, + { + "lang": "es", + "value": "La aserci\u00f3n alcanzable en el analizador BPv7 en \u00b5D3TN v0.14.0 permite que un atacante interrumpa el servicio a trav\u00e9s de un bloque de extensi\u00f3n mal formado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json new file mode 100644 index 00000000000..4ac3f7dcb62 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-10458", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:03.623", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921733", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json new file mode 100644 index 00000000000..13cafe5dada --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-10459", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:03.713", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1919087", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10460.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10460.json new file mode 100644 index 00000000000..d82b4103b97 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10460.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-10460", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:03.800", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912537", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10461.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10461.json new file mode 100644 index 00000000000..4b077f28ed1 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10461.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-10461", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:03.880", + "lastModified": "2024-10-29T14:35:16.270", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914521", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json new file mode 100644 index 00000000000..6e7fab169be --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-10462", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:03.963", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920423", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json new file mode 100644 index 00000000000..fabb9d080df --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-10463", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.040", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920800", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json new file mode 100644 index 00000000000..c97ed8c1ca6 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-10464", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.120", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1913000", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json new file mode 100644 index 00000000000..946c4f7849d --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-10465", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.197", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A clipboard \"paste\" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918853", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json new file mode 100644 index 00000000000..5f6b792b456 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-10466", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.273", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json new file mode 100644 index 00000000000..ca75384fd84 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-10467", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.350", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json new file mode 100644 index 00000000000..576a84da2c7 --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-10468", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.447", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Potential race conditions in IndexedDB could have caused memory corruption, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132 and Thunderbird < 132." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914982", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10469.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10469.json index 95ea5428c5d..64bcba1d623 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10469.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10469.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10469", "sourceIdentifier": "cret@cert.org", "published": "2024-10-28T16:15:03.667", - "lastModified": "2024-10-28T16:15:03.667", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VINCE versions before 3.0.9 is vulnerable to exposure of User information to authenticated users." + }, + { + "lang": "es", + "value": "Las versiones de VINCE anteriores a 3.0.9 son vulnerables a la exposici\u00f3n de informaci\u00f3n del usuario a usuarios autenticados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10474.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10474.json new file mode 100644 index 00000000000..1d5bf345a2c --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10474.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-10474", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-29T13:15:04.513", + "lastModified": "2024-10-29T14:35:17.140", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Focus was incorrectly allowing internal links to utilize the app scheme used for deeplinking, which could result in links potentially circumventing some URL safety checks This vulnerability affects Focus for iOS < 132." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863832", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-60/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10477.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10477.json index 00326cf5bf8..aaf766d688b 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10477.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10477.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10477", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-29T01:15:02.843", - "lastModified": "2024-10-29T01:15:02.843", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in LinZhaoguan pb-cms up to 2.0.1. This vulnerability affects unknown code of the file /admin#permissions of the component Permission Management Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en LinZhaoguan pb-cms hasta la versi\u00f3n 2.0.1. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin#permissions del componente Permission Management Page. La manipulaci\u00f3n conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10478.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10478.json index 68e1e99334f..24394702897 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10478.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10478.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10478", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-29T01:15:03.160", - "lastModified": "2024-10-29T01:15:03.160", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in LinZhaoguan pb-cms up to 2.0.1. This issue affects some unknown processing of the file /admin#article/edit?id=2 of the component Edit Article Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en LinZhaoguan pb-cms hasta la versi\u00f3n 2.0.1. Este problema afecta a algunos procesos desconocidos del archivo /admin#article/edit?id=2 del componente Edit Article Handler. La manipulaci\u00f3n conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10479.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10479.json index f4e8cce4a62..798249d59f3 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10479.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10479.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10479", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-29T02:15:06.433", - "lastModified": "2024-10-29T02:15:06.433", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in LinZhaoguan pb-cms up to 2.0.1. Affected is an unknown function of the file /admin#themes of the component Theme Management Module. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en LinZhaoguan pb-cms hasta la versi\u00f3n 2.0.1. Se trata de una funci\u00f3n desconocida del archivo /admin#themes del componente Theme Management Module. La manipulaci\u00f3n provoca Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json index ba9b2ced26e..de02feedbc2 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22065.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22065", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-10-29T02:15:06.933", - "lastModified": "2024-10-29T02:15:06.933", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a command injection vulnerability in ZTE MF258 Pro product. Due to insufficient validation of Ping Diagnosis interface parameter, an authenticated attacker could use the vulnerability to execute arbitrary commands." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el producto ZTE MF258 Pro. Debido a una validaci\u00f3n insuficiente del par\u00e1metro de interfaz Ping Diagnosis, un atacante autenticado podr\u00eda usar la vulnerabilidad para ejecutar comandos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22066.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22066.json index 0d664543374..634a243c9d7 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22066.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22066.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22066", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-10-29T09:15:06.800", - "lastModified": "2024-10-29T09:15:06.800", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 intelligent multi service router . An authenticated attacker could use the vulnerability to obtain sensitive information about the device." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escalada de privilegios en el enrutador multiservicio inteligente ZTE ZXR10 ZSR V2. Un atacante autenticado podr\u00eda usar la vulnerabilidad para obtener informaci\u00f3n confidencial sobre el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json index b369c04c8b1..1b41ab0e7e9 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27849", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.093", - "lastModified": "2024-10-28T21:15:04.093", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15. An app may be able to read sensitive location information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30106.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30106.json index 42ea19d370c..a39be543c9c 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30106.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30106.json @@ -2,13 +2,17 @@ "id": "CVE-2024-30106", "sourceIdentifier": "psirt@hcl.com", "published": "2024-10-28T22:15:02.583", - "lastModified": "2024-10-28T22:15:02.583", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL Connections is vulnerable to an information disclosure vulnerability, due to an IBM WebSphere Application Server error, which could allow a user to obtain sensitive information they are not entitled to due to the improper handling of request data." + }, + { + "lang": "es", + "value": "HCL Connections es vulnerable a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n, debido a un error de IBM WebSphere Application Server, que podr\u00eda permitir que un usuario obtenga informaci\u00f3n confidencial a la que no tiene derecho debido al manejo inadecuado de los datos solicitados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json index aef293273b8..349dc157fc2 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31682.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31682", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T20:15:09.010", - "lastModified": "2024-08-01T13:51:05.133", + "lastModified": "2024-10-29T14:35:17.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-863" } ] } diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34537.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34537.json index 05100b67181..fdf64fe6b8c 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34537.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34537.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34537", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T14:15:04.740", - "lastModified": "2024-10-28T17:35:05.300", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TYPO3 before 13.3.1 allows denial of service (interface error) in the Bookmark Toolbar (ext:backend), exploitable by an administrator-level backend user account via manipulated data saved in the bookmark toolbar of the backend user interface. The fixed versions are 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, and 13.3.1." + }, + { + "lang": "es", + "value": "TYPO3 anterior a la versi\u00f3n 13.3.1 permite la denegaci\u00f3n de servicio (error de interfaz) en la barra de marcadores (ext:backend), que puede ser explotada por una cuenta de usuario de backend de nivel de administrador mediante datos manipulados guardados en la barra de marcadores de la interfaz de usuario de backend. Las versiones corregidas son 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS y 13.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39205.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39205.json index ffa876c5298..d3593a7c20a 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39205.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39205.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39205", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.517", - "lastModified": "2024-10-28T20:15:05.517", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request." + }, + { + "lang": "es", + "value": "Un problema en pyload-ng v0.5.0b3.dev85 que se ejecuta en python3.11 o anterior permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud HTTP manipulada espec\u00edficamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json index 16c5eeecd73..8a18c42dbc9 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json @@ -2,13 +2,13 @@ "id": "CVE-2024-3980", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.210", - "lastModified": "2024-08-30T16:15:09.517", + "lastModified": "2024-10-29T14:15:06.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The product allows user input to control or influence paths or file\nnames that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are\ncritical to the application." + "value": "The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names\nthat are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or\nother files that are critical to the application." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json index d20b70c8276..14c49d8350e 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40792", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.670", - "lastModified": "2024-10-28T21:15:04.670", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15. A malicious app may be able to change network settings." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n maliciosa podr\u00eda cambiar la configuraci\u00f3n de red." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json index 69e0d346225..2d4bab4c55e 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40851", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.740", - "lastModified": "2024-10-28T21:15:04.740", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker with physical access may be able to access contact photos from the lock screen." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante con acceso f\u00edsico podr\u00eda acceder a las fotos de los contactos desde la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json index 93be021ed1d..24247743c51 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40853", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.810", - "lastModified": "2024-10-28T21:15:04.810", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18 and iPadOS 18. An attacker may be able to use Siri to enable Auto-Answer Calls." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Un atacante podr\u00eda usar Siri para habilitar la funci\u00f3n de respuesta autom\u00e1tica a llamadas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json index 367d0254904..3cf915e2083 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40855", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.870", - "lastModified": "2024-10-28T21:15:04.870", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. A sandboxed app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n aislada puede tener acceso a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json index 492140936e0..ab25ad966e5 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40867", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.937", - "lastModified": "2024-10-28T21:15:04.937", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A custom URL scheme handling issue was addressed with improved input validation. This issue is fixed in iOS 18.1 and iPadOS 18.1. A remote attacker may be able to break out of Web Content sandbox." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de manejo de esquemas de URL personalizados con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante remoto podr\u00eda evadir el entorno limitado de contenido web." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41153.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41153.json new file mode 100644 index 00000000000..3de0cb65664 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41153.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41153", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2024-10-29T13:15:04.600", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command injection vulnerability in the Edge Computing UI for the\nTRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an attacker with write access to the\nweb UI can execute commands on the device with root privileges,\nfar more extensive than what the write privilege intends." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41156.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41156.json new file mode 100644 index 00000000000..4352e4d2672 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41156.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41156", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2024-10-29T13:15:04.847", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Profile files from TRO600 series radios are extracted in plain-text\nand encrypted file formats. Profile files provide potential attackers\nvaluable configuration information about the Tropos network. Profiles\ncan only be exported by authenticated users with write access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-212" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json index 13222313c84..db5c0cdb0bd 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42011", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:05.043", - "lastModified": "2024-10-28T21:15:05.043", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Spotify app 8.9.58 for iOS has a buffer overflow in its use of strcat." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n Spotify 8.9.58 para iOS tiene un desbordamiento de b\u00fafer en el uso de strcat." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42028.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42028.json index 03cff51f395..001c9368854 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42028.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42028.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42028", "sourceIdentifier": "support@hackerone.com", "published": "2024-10-28T16:15:03.820", - "lastModified": "2024-10-28T19:35:25.640", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Local privilege escalation vulnerability found in a Self-Hosted UniFi Network Server with UniFi Network Application (Version 8.4.62 and earlier) allows a malicious actor with a local operational system user to execute high privilege actions on UniFi Network Server." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de escalada de privilegios locales encontrada en Self-Hosted UniFi Network Server with UniFi Network Application (versi\u00f3n 8.4.62 y anteriores) permite que un actor malicioso con un usuario del sistema operativo local ejecute acciones con altos privilegios en el servidor de red UniFi." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42930.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42930.json index df6d1c28bb5..49c782b9092 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42930.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42930.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42930", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.643", - "lastModified": "2024-10-28T20:15:05.643", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PbootCMS 3.2.8 is vulnerable to URL Redirect." + }, + { + "lang": "es", + "value": "PbootCMS 3.2.8 es vulnerable a la redirecci\u00f3n de URL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json index e06b79cee87..57796b5bf03 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44122", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.123", - "lastModified": "2024-10-28T21:15:05.123", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An application may be able to break out of its sandbox." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda salir de su entorno limitado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json index d39163bbb15..9ceadd65a4e 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44123", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.190", - "lastModified": "2024-10-28T21:15:05.190", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15, iOS 18 and iPadOS 18. A malicious app with root privileges may be able to access keyboard input and location information without user consent." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15, iOS 18 y iPadOS 18. Una aplicaci\u00f3n maliciosa con privilegios de superusuario podr\u00eda acceder a la informaci\u00f3n de ubicaci\u00f3n y a la entrada del teclado sin el consentimiento del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json index 2751a0c1e0a..0506d3b6b84 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44126", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.263", - "lastModified": "2024-10-28T21:15:05.263", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, iOS 17.7 and iPadOS 17.7, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. Processing a maliciously crafted file may lead to heap corruption." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15, iOS 17.7 y iPadOS 17.7, macOS Sonoma 14.7, visionOS 2, iOS 18 y iPadOS 18. El procesamiento de un archivo manipulado con fines malintencionados puede provocar da\u00f1os en el mont\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json index 0e2974a616c..cc9ed595583 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44137", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.330", - "lastModified": "2024-10-28T21:15:05.330", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An attacker with physical access may be able to share items from the lock screen." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15 y macOS Sonoma 14.7.1. Un atacante con acceso f\u00edsico podr\u00eda compartir elementos desde la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json index aabfe369888..dba6c095bea 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44144", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.397", - "lastModified": "2024-10-28T21:15:05.397", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow was addressed with improved size validation. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1, tvOS 18, watchOS 11, visionOS 2, iOS 18 and iPadOS 18. Processing a maliciously crafted file may lead to unexpected app termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un desbordamiento de b\u00fafer mejorando la validaci\u00f3n de tama\u00f1o. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1, tvOS 18, watchOS 11, visionOS 2, iOS 18 y iPadOS 18. El procesamiento de un archivo manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json index 6ab6d7b5fe9..4ffba4eccdf 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44145", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:02.820", - "lastModified": "2024-10-28T22:15:02.820", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15, iOS 18 and iPadOS 18. An attacker with physical access to a macOS device with Sidecar enabled may be able to bypass the Lock Screen." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sequoia 15, iOS 18 y iPadOS 18. Un atacante con acceso f\u00edsico a un dispositivo macOS con Sidecar habilitado podr\u00eda ser capaz de eludir la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json index 77d97a5008f..d1b1d210288 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44155", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.460", - "lastModified": "2024-10-28T21:15:05.460", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A custom URL scheme handling issue was addressed with improved input validation. This issue is fixed in Safari 18, iOS 17.7.1 and iPadOS 17.7.1, macOS Sequoia 15, watchOS 11, iOS 18 and iPadOS 18. Maliciously crafted web content may violate iframe sandboxing policy." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de manejo de esquemas de URL personalizados con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en Safari 18, iOS 17.7.1 y iPadOS 17.7.1, macOS Sequoia 15, watchOS 11, iOS 18 y iPadOS 18. El contenido web manipulado con fines malintencionados puede infringir la pol\u00edtica de la sandbox de iframe." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json index 67887bd8588..de055da2063 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44156", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.543", - "lastModified": "2024-10-28T21:15:05.543", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to bypass Privacy preferences." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una vulnerabilidad de eliminaci\u00f3n de ruta al evitar que el c\u00f3digo vulnerable se ejecutara con privilegios. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda eludir las preferencias de privacidad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json index d654f954a73..3f97e8c4b6c 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44159", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.603", - "lastModified": "2024-10-28T21:15:05.603", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to bypass Privacy preferences." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una vulnerabilidad de eliminaci\u00f3n de ruta al evitar que el c\u00f3digo vulnerable se ejecutara con privilegios. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda eludir las preferencias de privacidad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json index 1a0dbd6c469..a4031eea562 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44174", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.667", - "lastModified": "2024-10-28T21:15:05.667", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15. An attacker may be able to view restricted content from the lock screen." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json index ff9385146da..b87ac22b613 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44175", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.737", - "lastModified": "2024-10-28T21:15:05.737", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15, macOS Sonoma 14.7.1. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sequoia 15 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json index 4f360436aaa..8186ed046bc 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44194", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.800", - "lastModified": "2024-10-28T21:15:05.800", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 11.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en watchOS 11.1, visionOS 2.1, iOS 18.1 y iPadOS 18.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json index 8ad718a48c5..298e04cc1b6 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44196", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.860", - "lastModified": "2024-10-28T21:15:05.860", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json index a58e3b1e211..f56446f8915 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44197", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.917", - "lastModified": "2024-10-28T21:15:05.917", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious app may be able to cause a denial-of-service." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada puede provocar una denegaci\u00f3n de servicio." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44203.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44203.json index 417ac92a550..198663d7dae 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44203.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44203.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44203", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.977", - "lastModified": "2024-10-28T21:15:05.977", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access a user's Photos Library." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n puede acceder a la librer\u00eda de fotos de un usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json index 88cb2cefc92..5ad44baa46c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44208", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.043", - "lastModified": "2024-10-28T21:15:06.043", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15. An app may be able to bypass certain Privacy preferences." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda omitir ciertas preferencias de privacidad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json index 66f1ec76639..ab5f84b7ce1 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44213", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.110", - "lastModified": "2024-10-28T21:15:06.110", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker in a privileged network position may be able to leak sensitive user information." + }, + { + "lang": "es", + "value": "Exist\u00eda un problema en el an\u00e1lisis de las URL. Este problema se solucion\u00f3 mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante en una posici\u00f3n privilegiada en la red podr\u00eda filtrar informaci\u00f3n confidencial del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json index bf3e1d9904e..3f6f590248f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44215", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.167", - "lastModified": "2024-10-28T21:15:06.167", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Processing an image may result in disclosure of process memory." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de una imagen puede provocar la divulgaci\u00f3n de la memoria del proceso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json index f0a5c0fd50e..14ef9ef4f24 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44216", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:02.893", - "lastModified": "2024-10-28T22:15:02.893", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales en el entorno aislado. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json index 8ba2c32525e..b3a915e6b71 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44217", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:02.960", - "lastModified": "2024-10-28T22:15:02.960", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in iOS 18 and iPadOS 18. Password autofill may fill in passwords after failing authentication." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos eliminando el c\u00f3digo vulnerable y agregando comprobaciones adicionales. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. El autocompletado de contrase\u00f1as puede completar las contrase\u00f1as despu\u00e9s de una autenticaci\u00f3n fallida." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json index 7d83072b430..32e3feb4c18 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44218", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.237", - "lastModified": "2024-10-28T21:15:06.237", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved checks. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, macOS Sonoma 14.7.1, iOS 18.1 and iPadOS 18.1. Processing a maliciously crafted file may lead to heap corruption." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, macOS Sonoma 14.7.1, iOS 18.1 y iPadOS 18.1. El procesamiento de un archivo manipulado con fines malintencionados puede provocar da\u00f1os en el mont\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json index 297af1a6df4..87e6ede27f8 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44222", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.297", - "lastModified": "2024-10-28T21:15:06.297", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to read sensitive location information." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json index 1ca4ee433b0..fef5e05e5e2 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44228", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.357", - "lastModified": "2024-10-28T21:15:06.357", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved permissions checking. This issue is fixed in Xcode 16. An app may be able to inherit Xcode permissions and access user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la verificaci\u00f3n de permisos. Este problema se solucion\u00f3 en Xcode 16. Una aplicaci\u00f3n puede heredar permisos de Xcode y acceder a datos de usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json index 000061148c9..81758530a44 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44229", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.417", - "lastModified": "2024-10-28T21:15:06.417", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information leakage was addressed with additional validation. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1. Private browsing may leak some browsing history." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una fuga de informaci\u00f3n con una validaci\u00f3n adicional. Este problema se solucion\u00f3 en visionOS 2.1, iOS 18.1 y iPadOS 18.1. La navegaci\u00f3n privada puede filtrar parte del historial de navegaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json index 88ea97e03d7..f26cdcb901a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44235", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.470", - "lastModified": "2024-10-28T21:15:06.470", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json index f34acdc6ee0..d33157d86a1 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44236", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.520", - "lastModified": "2024-10-28T21:15:06.520", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Processing a maliciously crafted file may lead to unexpected app termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso fuera de los l\u00edmites con una comprobaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El procesamiento de un archivo manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44237.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44237.json index 5529e7a838e..22902c73819 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44237.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44237.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44237", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.037", - "lastModified": "2024-10-28T22:15:03.037", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Processing a maliciously crafted file may lead to unexpected app termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso fuera de los l\u00edmites con una comprobaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El procesamiento de un archivo manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json index 434ae1774e1..428d0c08357 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44239", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.580", - "lastModified": "2024-10-28T21:15:06.580", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. An app may be able to leak sensitive kernel state." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n con una mejor redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. Es posible que una aplicaci\u00f3n filtre informaci\u00f3n confidencial del estado del kernel." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json index 49d375ed900..2727b9b3bdb 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44240", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.107", - "lastModified": "2024-10-28T22:15:03.107", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Processing a maliciously crafted font may result in the disclosure of process memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de una fuente manipulada con fines malintencionados puede provocar la divulgaci\u00f3n de la memoria del proceso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json index d30172cfce3..ca59cd6f76a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44244", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.637", - "lastModified": "2024-10-28T21:15:06.637", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1. Processing maliciously crafted web content may lead to an unexpected process crash." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, watchOS 11.1, visionOS 2.1 y tvOS 18.1. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un bloqueo inesperado del proceso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json index 9393025396c..c26ef73c8b4 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44247", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.697", - "lastModified": "2024-10-28T21:15:06.697", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious application may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json index 9b2c6f930a5..093f812316b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44251", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.757", - "lastModified": "2024-10-28T21:15:06.757", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json index 4a77927cafa..a64e90026b0 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44252", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.813", - "lastModified": "2024-10-28T21:15:06.813", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved file handling. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, tvOS 18.1. Restoring a maliciously crafted backup file may lead to modification of protected system files." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de l\u00f3gica mejorando el manejo de archivos. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, visionOS 2.1 y tvOS 18.1. Restaurar un archivo de copia de seguridad manipulado con fines malintencionados puede provocar la modificaci\u00f3n de archivos de sistema protegidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json index 357c28c08a7..bc02d52b9dc 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44253", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.870", - "lastModified": "2024-10-28T21:15:06.870", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json index b8569a58677..f1911eeb806 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44254", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.933", - "lastModified": "2024-10-28T21:15:06.933", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 11.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, iOS 18.1 and iPadOS 18.1. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en watchOS 11.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, iOS 18.1 y iPadOS 18.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json index 704f95c3289..9380ece68fd 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44255", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.003", - "lastModified": "2024-10-28T21:15:07.003", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path handling issue was addressed with improved logic. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, tvOS 18.1. A malicious app may be able to run arbitrary shortcuts without user consent." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de manejo de rutas con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en visionOS 2.1, iOS 18.1 y iPadOS 18.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y tvOS 18.1. Una aplicaci\u00f3n maliciosa podr\u00eda ejecutar accesos directos arbitrarios sin el consentimiento del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json index 33379433a4d..469cd08a2b0 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44256", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.177", - "lastModified": "2024-10-28T22:15:03.177", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to break out of its sandbox." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con una mejora en la desinfecci\u00f3n de entradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda salir de su zona protegida." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json index e3c2c9cb6c4..1fe000f3a4a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44257", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.243", - "lastModified": "2024-10-28T22:15:03.243", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json index 2255f8f4a6f..cd6cb3579bc 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44258", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.083", - "lastModified": "2024-10-28T21:15:07.083", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, tvOS 18.1. Restoring a maliciously crafted backup file may lead to modification of protected system files." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con un manejo mejorado de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, visionOS 2.1 y tvOS 18.1. Restaurar un archivo de copia de seguridad manipulado con fines malintencionados puede provocar la modificaci\u00f3n de archivos de sistema protegidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json index 06756d05a56..ced37a6c2b8 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44259", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.160", - "lastModified": "2024-10-28T21:15:07.160", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1. An attacker may be able to misuse a trust relationship to download malicious content." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, visionOS 2.1, iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda hacer un uso indebido de una relaci\u00f3n de confianza para descargar contenido malicioso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44260.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44260.json index 754c8538bba..6e32013e0bc 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44260.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44260.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44260", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.313", - "lastModified": "2024-10-28T22:15:03.313", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious app with root privileges may be able to modify the contents of system files." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n maliciosa con privilegios de superusuario puede modificar el contenido de los archivos del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json index b10ae14e4b2..dee0bc7cfa0 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44261.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44261", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.220", - "lastModified": "2024-10-28T21:15:07.220", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json index 52b53f5ee92..cf461c07178 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44262", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.277", - "lastModified": "2024-10-28T21:15:07.277", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in visionOS 2.1. A user may be able to view sensitive user information." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en visionOS 2.1. Un usuario puede ver informaci\u00f3n confidencial del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json index e27f7959167..78854e84f38 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44263", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.333", - "lastModified": "2024-10-28T21:15:07.333", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved state management. This issue is fixed in iOS 18.1 and iPadOS 18.1. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema l\u00f3gico con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json index ab524933dd5..5fbc56c6356 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44264", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.393", - "lastModified": "2024-10-28T21:15:07.393", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious app may be able to create symlinks to protected regions of the disk." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda crear enlaces simb\u00f3licos a regiones protegidas del disco." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json index 015fd5b5fc3..65d29e122a8 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44265", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.457", - "lastModified": "2024-10-28T21:15:07.457", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante con acceso f\u00edsico puede introducir eventos del controlador de juego en aplicaciones que se ejecutan en un dispositivo bloqueado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json index 5d59ae21f8b..a195e157ab8 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44267", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.513", - "lastModified": "2024-10-28T21:15:07.513", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious application may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json index e26d6399044..7b789d56be5 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44269", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.577", - "lastModified": "2024-10-28T21:15:07.577", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. A malicious app may use shortcuts to access restricted files." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. Una aplicaci\u00f3n maliciosa puede usar accesos directos para acceder a archivos restringidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json index 8ba943a87b3..19ec02f9d7d 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44270", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.667", - "lastModified": "2024-10-28T21:15:07.667", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A sandboxed process may be able to circumvent sandbox restrictions." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de l\u00f3gica mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un proceso aislado puede eludir las restricciones de la zona protegida." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json index 8309b84d513..2ec627d4ffd 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44273", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.737", - "lastModified": "2024-10-28T21:15:07.737", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 18.1 and iPadOS 18.1, visionOS 2.1, macOS Sonoma 14.7.1, watchOS 11.1, tvOS 18.1. A malicious app may be able to access private information." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con un manejo mejorado de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, visionOS 2.1, macOS Sonoma 14.7.1, watchOS 11.1 y tvOS 18.1. Una aplicaci\u00f3n maliciosa podr\u00eda tener acceso a informaci\u00f3n privada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json index da1a56f96b8..0d4d5e4ceb7 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44274", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.807", - "lastModified": "2024-10-28T21:15:07.807", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved authentication. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, iOS 18.1 and iPadOS 18.1. An attacker with physical access to a locked device may be able to view sensitive user information." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con una autenticaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, watchOS 11.1, iOS 18.1 y iPadOS 18.1. Un atacante con acceso f\u00edsico a un dispositivo bloqueado podr\u00eda ver informaci\u00f3n confidencial del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json index 61f20bf81ad..42e9c11385a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44275", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.877", - "lastModified": "2024-10-28T21:15:07.877", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious application may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json index 3a55dffbd6d..e90eaf4690e 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44277.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44277", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.950", - "lastModified": "2024-10-28T21:15:07.950", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 18.1 and iPadOS 18.1, visionOS 2.1, tvOS 18.1. An app may be able to cause unexpected system termination or corrupt kernel memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, visionOS 2.1 y tvOS 18.1. Es posible que una aplicaci\u00f3n pueda provocar la finalizaci\u00f3n inesperada del sistema o da\u00f1ar la memoria del n\u00facleo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json index 059025d14ec..30af290da52 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44278.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44278", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.027", - "lastModified": "2024-10-28T21:15:08.027", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. A sandboxed app may be able to access sensitive user data in system logs." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. Una aplicaci\u00f3n aislada puede acceder a datos confidenciales del usuario en los registros del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json index 2b0c8a5167a..c3be9667000 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44279", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.110", - "lastModified": "2024-10-28T21:15:08.110", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Parsing a file may lead to disclosure of user information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json index 355ef7606db..bd1bfe5c1f5 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44280", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.180", - "lastModified": "2024-10-28T21:15:08.180", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json index 99ad2f0e01a..68b18c53ffe 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44281", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.263", - "lastModified": "2024-10-28T21:15:08.263", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Parsing a file may lead to disclosure of user information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json index b7dd4ad12be..13c69ead288 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44282", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.340", - "lastModified": "2024-10-28T21:15:08.340", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Parsing a file may lead to disclosure of user information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44283.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44283.json index 644d327503f..cfe4a7c4f5c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44283.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44283.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44283", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.380", - "lastModified": "2024-10-28T22:15:03.380", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Parsing a maliciously crafted file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una comprobaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El an\u00e1lisis de un archivo manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json index 358d55f9701..712aea68f1f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44284", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.450", - "lastModified": "2024-10-28T21:15:08.450", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Parsing a maliciously crafted file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Analizar un archivo manipulado con fines malintencionados puede provocar el cierre inesperado de la aplicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json index e62896f007d..b03b114773a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44285", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.520", - "lastModified": "2024-10-28T21:15:08.520", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1. An app may be able to cause unexpected system termination or corrupt kernel memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de use-after-free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, watchOS 11.1, visionOS 2.1 y tvOS 18.1. Es posible que una aplicaci\u00f3n pueda provocar la finalizaci\u00f3n inesperada del sistema o da\u00f1ar la memoria del n\u00facleo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json index 1b59bf5581e..c8e33cee90c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44287", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.600", - "lastModified": "2024-10-28T21:15:08.600", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious application may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json index 75f0b44e2df..91e7ddda459 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44289", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.680", - "lastModified": "2024-10-28T21:15:08.680", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to read sensitive location information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json index 7970ab39d1a..74df359245c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44294", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.757", - "lastModified": "2024-10-28T21:15:08.757", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker with root privileges may be able to delete protected system files." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una vulnerabilidad de eliminaci\u00f3n de rutas al evitar que el c\u00f3digo vulnerable se ejecutara con privilegios. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante con privilegios de superusuario podr\u00eda eliminar archivos de sistema protegidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44295.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44295.json index 05f047661c9..361b5e7cfeb 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44295.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44295.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44295", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.453", - "lastModified": "2024-10-28T22:15:03.453", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con comprobaciones de derechos adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json index a3d42520492..b39f05dea18 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44296", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.830", - "lastModified": "2024-10-28T21:15:08.830", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, visionOS 2.1. Processing maliciously crafted web content may prevent Content Security Policy from being enforced." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de contenido web manipulado con fines malintencionados puede impedir que se aplique la Pol\u00edtica de seguridad de contenido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json index b598a0afe8b..703bd9436fc 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44297", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.910", - "lastModified": "2024-10-28T21:15:08.910", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Processing a maliciously crafted message may lead to a denial-of-service." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de un mensaje manipulado con fines malintencionados puede provocar una denegaci\u00f3n de servicio." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44301.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44301.json index 550f5734021..4ce7f12a7f7 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44301.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44301.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44301", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.977", - "lastModified": "2024-10-28T21:15:08.977", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious application may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json index 4aa40078dae..02ccee6f9b6 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44302", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:09.040", - "lastModified": "2024-10-28T21:15:09.040", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Processing a maliciously crafted font may result in the disclosure of process memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de una fuente manipulada con fines malintencionados puede provocar la divulgaci\u00f3n de la memoria del proceso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45477.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45477.json index 2e00e642a2f..72a89ed8eb0 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45477.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45477.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45477", "sourceIdentifier": "security@apache.org", "published": "2024-10-29T09:15:07.053", - "lastModified": "2024-10-29T09:15:07.053", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.28.0 or 2.0.0-M4 is the recommended mitigation." + }, + { + "lang": "es", + "value": "Apache NiFi 1.10.0 a 1.27.0 y 2.0.0-M1 a 2.0.0-M3 admiten un campo de descripci\u00f3n para los par\u00e1metros en una configuraci\u00f3n de contexto de par\u00e1metros que es vulnerable a cross-site scripting. Un usuario autenticado, autorizado para configurar un contexto de par\u00e1metros, puede ingresar c\u00f3digo JavaScript arbitrario, que el navegador del cliente ejecutar\u00e1 dentro del contexto de sesi\u00f3n del usuario autenticado. La actualizaci\u00f3n a Apache NiFi 1.28.0 o 2.0.0-M4 es la mitigaci\u00f3n recomendada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45656.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45656.json index 73d8f8920f9..9a095c45089 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45656.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45656.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45656", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-29T01:15:03.823", - "lastModified": "2024-10-29T01:15:03.823", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Flexible Service Processor (FSP) FW860.00 through FW860.B3, FW950.00 through FW950.C0, FW1030.00 through FW1030.61, FW1050.00 through FW1050.21, and FW1060.00 through FW1060.10 has static credentials which may allow network users to gain service privileges to the FSP." + }, + { + "lang": "es", + "value": "IBM Flexible Service Processor (FSP) FW860.00 a FW860.B3, FW950.00 a FW950.C0, FW1030.00 a FW1030.61, FW1050.00 a FW1050.21 y FW1060.00 a FW1060.10 tienen credenciales est\u00e1ticas que pueden permitir a los usuarios de la red obtener privilegios de servicio para el FSP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45802.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45802.json index f3b839ce19c..845ce2bd4cf 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45802.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45802.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45802", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-28T15:15:04.857", - "lastModified": "2024-10-28T15:15:04.857", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10." + }, + { + "lang": "es", + "value": "Squid es un proxy de almacenamiento en cach\u00e9 de c\u00f3digo abierto para la Web compatible con HTTP, HTTPS, FTP y m\u00e1s. Debido a errores de validaci\u00f3n de entrada, liberaci\u00f3n prematura de recursos durante el tiempo de vida \u00fatil esperado y falta de liberaci\u00f3n de recursos despu\u00e9s del tiempo de vida \u00fatil efectivo, Squid es vulnerable a ataques de denegaci\u00f3n de servicio por parte de un servidor confiable contra todos los clientes que utilicen el proxy. Este error se corrigi\u00f3 en la configuraci\u00f3n de compilaci\u00f3n predeterminada de la versi\u00f3n 6.10 de Squid." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46872.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46872.json index ce332444490..e802ae367f6 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46872.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46872.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46872", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-10-29T09:15:07.350", - "lastModified": "2024-10-29T09:15:07.350", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 fail to sanitize user inputs in the frontend that are used for redirection which allows for a one-click client-side path traversal that is leading to CSRF in Playbooks" + }, + { + "lang": "es", + "value": "Las versiones 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 de Mattermost no pueden desinfectar las entradas del usuario en el frontend que se utilizan para la redirecci\u00f3n, lo que permite un path traversal del lado del cliente con un solo clic que conduce a CSRF en Playbooks." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json index e8824b61210..577ab829745 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47401.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47401", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-10-29T09:15:07.753", - "lastModified": "2024-10-29T09:15:07.753", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 and 9.5.x <= 9.5.9 fail to\u00a0prevent detailed error messages from being displayed\u00a0in Playbooks which allows an attacker to generate a large response and cause an amplified GraphQL response which in turn could cause the application to crash by sending a specially crafted request to Playbooks." + }, + { + "lang": "es", + "value": "Las versiones 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 y 9.5.x <= 9.5.9 de Mattermost no evitan que se muestren mensajes de error detallados en Playbooks, lo que permite a un atacante generar una respuesta grande y causar una respuesta GraphQL amplificada que, a su vez, podr\u00eda provocar que la aplicaci\u00f3n se bloquee al enviar una solicitud especialmente manipulada a Playbooks." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47640.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47640.json new file mode 100644 index 00000000000..76d25ada3a2 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47640.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47640", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T14:15:06.867", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs WP ERP allows Reflected XSS.This issue affects WP ERP: from n/a through 1.13.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/erp/wordpress-wp-erp-plugin-1-13-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json index 464e05072f4..7bd4b31001f 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47827.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47827", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-28T16:15:03.990", - "lastModified": "2024-10-28T16:15:03.990", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2." + }, + { + "lang": "es", + "value": "Argo Workflows es un motor de flujo de trabajo nativo de contenedores de c\u00f3digo abierto para orquestar trabajos paralelos en Kubernetes. Debido a una condici\u00f3n de ejecuci\u00f3n en una variable global en 3.6.0-rc1, cualquier usuario con acceso para ejecutar un flujo de trabajo puede hacer que el controlador de flujos de trabajo de Argo se bloquee cuando as\u00ed lo ordene. Esta vulnerabilidad se solucion\u00f3 en 3.6.0-rc2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json index d8ac6e68a62..a3db56b2bbe 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48107", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.453", - "lastModified": "2024-10-28T21:15:09.453", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server." + }, + { + "lang": "es", + "value": "SparkShop <=1.1.7 es vulnerable a server-side request forgery (SSRF). Esta vulnerabilidad permite realizar ataques para escanear puertos en la intranet o red local donde reside el servidor, atacar aplicaciones que se ejecutan en la intranet o red local o leer metadatos en el servidor en la nube." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json index 93a2671147d..de880d37f67 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48177", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.523", - "lastModified": "2024-10-28T21:15:09.523", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MRCMS 3.1.2 contains a SQL injection vulnerability via the RID parameter in /admin/article/delete.do." + }, + { + "lang": "es", + "value": "MRCMS 3.1.2 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro RID en /admin/article/delete.do." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json index 81b95bd9744..cb59eec4dc8 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48178", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.843", - "lastModified": "2024-10-28T20:15:05.843", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "newbee-mall v1.0.0 is vulnerable to Server-Side Request Forgery (SSRF) via the goodsCoverImg parameter." + }, + { + "lang": "es", + "value": "newbee-mall v1.0.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s del par\u00e1metro goodsCoverImg." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48191.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48191.json index 9ecb8c3ab1d..f87f4b82f75 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48191.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48191.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48191", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T14:15:04.860", - "lastModified": "2024-10-28T16:35:09.317", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/doAdminAction.php?act=delAdmin&id=17" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que dingfanzu CMS 1.0 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/doAdminAction.php?act=delAdmin&id=17" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json index 18aeb803918..375cc8e5e94 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48195", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.903", - "lastModified": "2024-10-28T20:15:05.903", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in eyouCMS v.1.6.7 allows a remote attacker to obtain sensitive information via a crafted script to the post parameter." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en eyouCMS v.1.6.7 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una secuencia de comandos especialmente manipulada para el par\u00e1metro post." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json index af760080185..1423d4acb13 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48196", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.960", - "lastModified": "2024-10-28T20:15:05.960", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in eyouCMS v.1.6.7 allows a remote attacker to obtain sensitive information via a crafted script to the post parameter." + }, + { + "lang": "es", + "value": "Un problema en eyouCMS v.1.6.7 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de un script manipulado espec\u00edficamente para el par\u00e1metro post." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48291.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48291.json index 1f8faa83516..cf291a918b3 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48291.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48291.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48291", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T15:15:05.090", - "lastModified": "2024-10-28T16:35:10.100", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/doAdminAction.php?act=editAdmin&id=17" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que dingfanzu CMS 1.0 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/doAdminAction.php?act=editAdmin&id=17" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json index 908f697c81a..03ba33ec836 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48356", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.627", - "lastModified": "2024-10-28T21:15:09.627", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LyLme Spage <=1.6.0 is vulnerable to SQL Injection via /admin/group.php." + }, + { + "lang": "es", + "value": "LyLme Spage <=1.6.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/group.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json index 68c8a33c19a..6a334edde5e 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48357", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.050", - "lastModified": "2024-10-28T20:15:06.050", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LyLme Spage 1.2.0 through 1.6.0 is vulnerable to SQL Injection via /admin/apply.php." + }, + { + "lang": "es", + "value": "LyLme Spage 1.2.0 a 1.6.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/apply.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json index 8da155f74dd..efc2634843f 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48465", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.120", - "lastModified": "2024-10-28T20:15:06.120", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MRBS version 1.5.0 has an SQL injection vulnerability in the edit_entry_handler.php file, specifically in the rooms%5B%5D parameter" + }, + { + "lang": "es", + "value": "La versi\u00f3n 1.5.0 de MRBS tiene una vulnerabilidad de inyecci\u00f3n SQL en el archivo edit_entry_handler.php, espec\u00edficamente en el par\u00e1metro rooms%5B%5D" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json index 98ca2a067e2..6c9739a84e1 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48509", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.943", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T13:38:16.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:learning_with_texts_project:learning_with_texts:2.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9C7F073F-0E17-491D-A38D-28DEB4269C42" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/%40ChadSecurity/the-cve-2024-48509-vulnerability-overview-df58a6be6864", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json index 47bf16f694d..3174045f4f1 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48594", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.690", - "lastModified": "2024-10-28T21:15:09.690", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "File Upload vulnerability in Prison Management System v.1.0 allows a remote attacker to execute arbitrary code via the file upload component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga de archivos en Prison Management System v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente de carga de archivos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json index 5f774a90262..8402cbc231c 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48825", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.173", - "lastModified": "2024-10-28T20:15:06.173", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC7 v.15.03.06.44 ate_ifconfig_set has pre-authentication command injection allowing remote attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": "Tenda AC7 v.15.03.06.44 ate_ifconfig_set tiene inyecci\u00f3n de comando de pre-autenticaci\u00f3n que permite a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json index 863793bbadc..5bb4c66e4d1 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48826", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.237", - "lastModified": "2024-10-28T20:15:06.237", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC7 v.15.03.06.44 ate_iwpriv_set has pre-authentication command injection allowing remote attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": "Tenda AC7 v.15.03.06.44 ate_iwpriv_set tiene inyecci\u00f3n de comando de pre-autenticaci\u00f3n que permite a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json index 1a946dfbc36..e6f90410a65 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json @@ -2,13 +2,13 @@ "id": "CVE-2024-4872", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.890", - "lastModified": "2024-09-05T09:15:03.743", + "lastModified": "2024-10-29T14:15:07.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The product does not validate any query towards persistent\ndata, resulting in a risk of injection attacks." + "value": "A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability\nan attacker must have a valid credential." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json new file mode 100644 index 00000000000..9e141c3aa99 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49632", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T14:15:07.227", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Coral Web Design CWD 3D Image Gallery allows Reflected XSS.This issue affects CWD 3D Image Gallery: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cwd-3d-image-gallery/wordpress-cwd-3d-image-gallery-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json new file mode 100644 index 00000000000..494c95aa55d --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49634", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T14:15:07.547", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Rimon Habib BP Member Type Manager allows Reflected XSS.This issue affects BP Member Type Manager: from n/a through 1.01." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bp-member-type-manager/wordpress-bp-member-type-manager-plugin-1-01-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json new file mode 100644 index 00000000000..9d5bd6029db --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49635", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:05.133", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Manzurul Haque Banner Slider allows Reflected XSS.This issue affects Banner Slider: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/banner-slider/wordpress-banner-slider-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49636.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49636.json new file mode 100644 index 00000000000..ae757a3048e --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49636.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49636", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:05.367", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Prashant Mavinkurve Agile Video Player Lite allows Reflected XSS.This issue affects Agile Video Player Lite: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/agile-video-player/wordpress-agile-video-player-lite-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49637.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49637.json new file mode 100644 index 00000000000..cd3b537c2ff --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49637", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:05.590", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Foxskav Bet WC 2018 Russia allows Reflected XSS.This issue affects Bet WC 2018 Russia: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bet-wc-2018-russia/wordpress-bet-wc-2018-russia-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json new file mode 100644 index 00000000000..5a904cd2cb2 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49638", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:05.817", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ali Azlan Risk Warning Bar allows Reflected XSS.This issue affects Risk Warning Bar: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/risk-warning-bar/wordpress-risk-warning-bar-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json new file mode 100644 index 00000000000..66c00f7526c --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49639", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:06.080", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Edward Stoever Monitor.Chat allows Reflected XSS.This issue affects Monitor.Chat: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/monitor-chat/wordpress-monitor-chat-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json new file mode 100644 index 00000000000..41fd96653bf --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49640", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:06.297", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AmaderCode Lab ACL Floating Cart for WooCommerce allows Reflected XSS.This issue affects ACL Floating Cart for WooCommerce: from n/a through 0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/acl-floating-cart-for-woocommerce/wordpress-acl-floating-cart-for-woocommerce-plugin-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json new file mode 100644 index 00000000000..f32938e49c7 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49641", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:06.510", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tidaweb Tida URL Screenshot allows Reflected XSS.This issue affects Tida URL Screenshot: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tida-url-screenshot/wordpress-tida-url-screenshot-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49642.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49642.json index 2e507ad09dd..f68b68cd0e7 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49642.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49642.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49642", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:08.017", - "lastModified": "2024-10-29T09:15:08.017", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Rafasashi Todo Custom Field allows Reflected XSS.This issue affects Todo Custom Field: from n/a through 3.0.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Rafasashi Todo Custom Field permite XSS reflejado. Este problema afecta al campo personalizado Todo: desde n/a hasta 3.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49643.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49643.json new file mode 100644 index 00000000000..1c4e29aec93 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49643.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49643", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:06.743", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Abdullah Irfan Whitelist allows Reflected XSS.This issue affects Whitelist: from n/a through 3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fifthsegment-whitelist/wordpress-whitelist-plugin-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49645.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49645.json new file mode 100644 index 00000000000..32e2767e0c3 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49645.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49645", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T13:15:06.960", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ilias Gomatos Affiliate Platform allows Reflected XSS.This issue affects Affiliate Platform: from n/a through 1.4.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/smdp-affiliate-platform/wordpress-affiliate-platform-plugin-1-4-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json index 6a847846226..9dc995cb79a 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49646.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49646", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:03.690", - "lastModified": "2024-10-29T12:15:03.690", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json index 841646fbacf..984e41ae5de 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49647", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:03.930", - "lastModified": "2024-10-29T12:15:03.930", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json index 95334ba2620..7dfda5f5363 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49648", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:04.153", - "lastModified": "2024-10-29T12:15:04.153", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json index 2310836072f..c04a87aa81d 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49650.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49650", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:04.380", - "lastModified": "2024-10-29T12:15:04.380", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49651.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49651.json index 7eea76f4e5d..c9e22b58809 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49651.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49651", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:04.597", - "lastModified": "2024-10-29T12:15:04.597", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49654.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49654.json index b50df4f585f..717f65fdcec 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49654.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49654", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:04.827", - "lastModified": "2024-10-29T12:15:04.827", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49656.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49656.json index 6eaeba0393d..389726326c0 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49656.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49656", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:05.073", - "lastModified": "2024-10-29T12:15:05.073", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49659.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49659.json index b9e23373a2a..6b7e081e899 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49659.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49659.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49659", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:05.330", - "lastModified": "2024-10-29T12:15:05.330", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49660.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49660.json index a5fa8e06aec..6aaf8bfb38d 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49660.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49660.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49660", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:05.570", - "lastModified": "2024-10-29T12:15:05.570", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49661.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49661.json index 913a0011dc4..d7ec3225694 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49661.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49661", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:05.793", - "lastModified": "2024-10-29T12:15:05.793", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49662.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49662.json index 2f0aec46e05..ddaa431318f 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49662.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49662", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:06.037", - "lastModified": "2024-10-29T12:15:06.037", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49663.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49663.json index 5205598e10f..a81a7594a5a 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49663.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49663", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:06.290", - "lastModified": "2024-10-29T12:15:06.290", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49664.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49664.json index aeca9c6ecab..09e572988e3 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49664.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49664.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49664", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:06.517", - "lastModified": "2024-10-29T12:15:06.517", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49665.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49665.json index 77d5a3e30cb..124237ecbe4 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49665.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49665", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:06.753", - "lastModified": "2024-10-29T12:15:06.753", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49667.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49667.json index 1aca1f3e21b..7ed9a038b74 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49667.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49667", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T12:15:06.980", - "lastModified": "2024-10-29T12:15:06.980", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49670.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49670.json index 45ec60f03d7..97e846919b0 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49670.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49670", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:04.017", - "lastModified": "2024-10-29T11:15:04.017", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json index 5e1baba2645..8b8875f8f44 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49672", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:04.223", - "lastModified": "2024-10-29T11:15:04.223", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49673.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49673.json index 6105fa6d8dc..7c33a2401f3 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49673.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49673.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49673", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:04.410", - "lastModified": "2024-10-29T11:15:04.410", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49678.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49678.json index 09da3ab2fae..80d351b7329 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49678.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49678", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:04.607", - "lastModified": "2024-10-29T11:15:04.607", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49679.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49679.json index a2ca173a426..5b7782c1c2e 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49679.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49679.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49679", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:04.813", - "lastModified": "2024-10-29T11:15:04.813", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49692.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49692.json index 48a31f5c010..2c90f585bd6 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49692.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49692.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49692", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:05.017", - "lastModified": "2024-10-29T11:15:05.017", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49755.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49755.json index 7a06b08aec2..00a54d8e168 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49755.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49755.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49755", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-28T20:15:06.297", - "lastModified": "2024-10-28T20:15:06.297", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Duende IdentityServer is an OpenID Connect and OAuth 2.x framework for ASP.NET Core. IdentityServer's local API authentication handler performs insufficient validation of the cnf claim in DPoP access tokens. This allows an attacker to use leaked DPoP access tokens at local api endpoints even without possessing the private key for signing proof tokens. Note that this only impacts custom endpoints within an IdentityServer implementation that have explicitly used the LocalApiAuthenticationHandler for authentication. This vulnerability is patched in IdentityServer 7.0.8. Version 6.3 and below are unaffected, as they do not support DPoP in Local APIs." + }, + { + "lang": "es", + "value": "Duende IdentityServer es un framework de trabajo de OpenID Connect y OAuth 2.x para ASP.NET Core. El controlador de autenticaci\u00f3n de API local de IdentityServer realiza una validaci\u00f3n insuficiente de la reclamaci\u00f3n cnf en tokens de acceso DPoP. Esto permite que un atacante utilice tokens de acceso DPoP filtrados en endpoints de API locales incluso sin poseer la clave privada para firmar tokens de prueba. Tenga en cuenta que esto solo afecta a los endpoints personalizados dentro de una implementaci\u00f3n de IdentityServer que hayan utilizado expl\u00edcitamente LocalApiAuthenticationHandler para la autenticaci\u00f3n. Esta vulnerabilidad est\u00e1 corregida en IdentityServer 7.0.8. La versi\u00f3n 6.3 y anteriores no se ven afectadas, ya que no admiten DPoP en API locales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json index 44065f73c7d..b30ba201841 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49761.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49761", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-28T15:15:05.157", - "lastModified": "2024-10-28T15:15:05.157", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability." + }, + { + "lang": "es", + "value": "REXML es un conjunto de herramientas XML para Ruby. La gema REXML anterior a la versi\u00f3n 3.3.9 tiene una vulnerabilidad ReDoS cuando analiza un XML que tiene muchos d\u00edgitos entre &# y x...; en una referencia de car\u00e1cter num\u00e9rico hexadecimal (&#x...;). Esto no sucede con Ruby 3.2 o posterior. Ruby 3.1 es el \u00fanico Ruby afectado que se mantiene. La gema REXML 3.3.9 o posterior incluye el parche para corregir la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json index 12aea2af899..ebaa7150d9e 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49771.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49771", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-28T17:15:04.540", - "lastModified": "2024-10-28T17:15:04.540", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MPXJ is an open source library to read and write project plans from a variety of file formats and databases. The patch for the historical vulnerability CVE-2020-35460 in MPXJ is incomplete as there is still a possibility that a malicious path could be constructed which would not be picked up by the original fix and allow files to be written to arbitrary locations. The issue is addressed in MPXJ version 13.5.1." + }, + { + "lang": "es", + "value": "MPXJ es una librer\u00eda de c\u00f3digo abierto para leer y escribir planes de proyectos desde una variedad de formatos de archivos y bases de datos. El parche para la vulnerabilidad hist\u00f3rica CVE-2020-35460 en MPXJ est\u00e1 incompleto, ya que a\u00fan existe la posibilidad de que se construya una ruta maliciosa que no ser\u00eda detectada por la soluci\u00f3n original y permitir\u00eda escribir archivos en ubicaciones arbitrarias. El problema se soluciona en la versi\u00f3n 13.5.1 de MPXJ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50052.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50052.json index 9fdd9a1b93a..4cd2450f9b6 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50052.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50052.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50052", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-10-29T08:15:12.553", - "lastModified": "2024-10-29T08:15:12.553", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 fail to\u00a0check that the origin of the message in an integration action matches with the original post metadata\u00a0which allows an authenticated user to delete an arbitrary post." + }, + { + "lang": "es", + "value": "Las versiones de Mattermost 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 no verifican que el origen del mensaje en una acci\u00f3n de integraci\u00f3n coincida con los metadatos de la publicaci\u00f3n original, lo que permite que un usuario autenticado elimine una publicaci\u00f3n arbitraria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json index 2b605577e31..ebe1ac5bc84 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50068", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.107", - "lastModified": "2024-10-29T01:15:04.107", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets()\n\nThe sysfs_target->regions allocated in damon_sysfs_regions_alloc() is not\nfreed in damon_sysfs_test_add_targets(), which cause the following memory\nleak, free it to fix it.\n\n\tunreferenced object 0xffffff80c2a8db80 (size 96):\n\t comm \"kunit_try_catch\", pid 187, jiffies 4294894363\n\t hex dump (first 32 bytes):\n\t 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n\t 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n\t backtrace (crc 0):\n\t [<0000000001e3714d>] kmemleak_alloc+0x34/0x40\n\t [<000000008e6835c1>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t [<000000001286d9f8>] damon_sysfs_test_add_targets+0x1cc/0x738\n\t [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac\n\t [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t [<00000000adf936cf>] kthread+0x2e8/0x374\n\t [<0000000041bb1628>] ret_from_fork+0x10/0x20" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/tests/sysfs-kunit.h: corrige p\u00e9rdida de memoria en damon_sysfs_test_add_targets(). La regi\u00f3n sysfs_target->regions asignada en damon_sysfs_regions_alloc() no se libera en damon_sysfs_test_add_targets(), lo que causa la siguiente p\u00e9rdida de memoria; lib\u00e9rela para corregirla. objeto sin referencia 0xffffff80c2a8db80 (tama\u00f1o 96): comm \"kunit_try_catch\", pid 187, jiffies 4294894363 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000008e6835c1>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000001286d9f8>] damon_sysfs_test_add_targets+0x1cc/0x738 [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json index 557f910c650..e3b13b4313f 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50069", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.180", - "lastModified": "2024-10-29T01:15:04.180", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: apple: check devm_kasprintf() returned value\n\ndevm_kasprintf() can return a NULL pointer on failure but this returned\nvalue is not checked. Fix this lack and check the returned value.\n\nFound by code review." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: apple: comprobar el valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba. Corrija esta falla y compruebe el valor devuelto. Encontrado por revisi\u00f3n de c\u00f3digo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json index 7be230a80ed..5a7e53a48ba 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50070", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.257", - "lastModified": "2024-10-29T01:15:04.257", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: stm32: check devm_kasprintf() returned value\n\ndevm_kasprintf() can return a NULL pointer on failure but this returned\nvalue is not checked. Fix this lack and check the returned value.\n\nFound by code review." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: stm32: comprobar el valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba. Corrija esta falla y compruebe el valor devuelto. Encontrado por revisi\u00f3n de c\u00f3digo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json index b2dfcef5946..0e20d5057fd 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50071", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.327", - "lastModified": "2024-10-29T01:15:04.327", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nuvoton: fix a double free in ma35_pinctrl_dt_node_to_map_func()\n\n'new_map' is allocated using devm_* which takes care of freeing the\nallocated data on device removal, call to\n\n\t.dt_free_map = pinconf_generic_dt_free_map\n\ndouble frees the map as pinconf_generic_dt_free_map() calls\npinctrl_utils_free_map().\n\nFix this by using kcalloc() instead of auto-managed devm_kcalloc()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: nuvoton: corrige una liberaci\u00f3n doble en ma35_pinctrl_dt_node_to_map_func() 'new_map' se asigna utilizando devm_* que se encarga de liberar los datos asignados al quitar el dispositivo, llamar a .dt_free_map = pinconf_generic_dt_free_map libera el mapa dos veces mientras pinconf_generic_dt_free_map() llama a pinctrl_utils_free_map(). Corrija esto utilizando kcalloc() en lugar de devm_kcalloc() administrado autom\u00e1ticamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50072.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50072.json index 19ab636e0d4..9bacea1f764 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50072.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50072.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50072", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.393", - "lastModified": "2024-10-29T01:15:04.393", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/bugs: Use code segment selector for VERW operand\n\nRobert Gill reported below #GP in 32-bit mode when dosemu software was\nexecuting vm86() system call:\n\n general protection fault: 0000 [#1] PREEMPT SMP\n CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1\n Hardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010\n EIP: restore_all_switch_stack+0xbe/0xcf\n EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000\n ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc\n DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046\n CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0\n Call Trace:\n show_regs+0x70/0x78\n die_addr+0x29/0x70\n exc_general_protection+0x13c/0x348\n exc_bounds+0x98/0x98\n handle_exception+0x14d/0x14d\n exc_bounds+0x98/0x98\n restore_all_switch_stack+0xbe/0xcf\n exc_bounds+0x98/0x98\n restore_all_switch_stack+0xbe/0xcf\n\nThis only happens in 32-bit mode when VERW based mitigations like MDS/RFDS\nare enabled. This is because segment registers with an arbitrary user value\ncan result in #GP when executing VERW. Intel SDM vol. 2C documents the\nfollowing behavior for VERW instruction:\n\n #GP(0) - If a memory operand effective address is outside the CS, DS, ES,\n\t FS, or GS segment limit.\n\nCLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user\nspace. Use %cs selector to reference VERW operand. This ensures VERW will\nnot #GP for an arbitrary user %ds.\n\n[ mingo: Fixed the SOB chain. ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/bugs: Usar selector de segmento de c\u00f3digo para el operando VERW Robert Gill inform\u00f3 lo siguiente: #GP en modo de 32 bits cuando el software dosemu estaba ejecutando la llamada al sistema vm86(): error de protecci\u00f3n general: 0000 [#1] PREEMPT SMP CPU: 4 PID: 4610 Comm: dosemu.bin No contaminado 6.6.21-gentoo-x86 #1 Nombre del hardware: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 30/10/2010 EIP: restore_all_switch_stack+0xbe/0xcf EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000 ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046 CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0 Seguimiento de llamadas: show_regs+0x70/0x78 die_addr+0x29/0x70 exc_general_protection+0x13c/0x348 exc_bounds+0x98/0x98 handle_exception+0x14d/0x14d exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf Esto solo sucede en el modo de 32 bits cuando se habilitan las mitigaciones basadas en VERW como MDS/RFDS. Esto se debe a que los registros de segmento con un valor de usuario arbitrario pueden generar #GP al ejecutar VERW. Intel SDM vol. 2C documenta el siguiente comportamiento para la instrucci\u00f3n VERW: #GP(0) - Si la direcci\u00f3n efectiva de un operando de memoria est\u00e1 fuera del l\u00edmite de segmento CS, DS, ES, FS o GS. La macro CLEAR_CPU_BUFFERS ejecuta la instrucci\u00f3n VERW antes de regresar al espacio de usuario. Use el selector %cs para hacer referencia al operando VERW. Esto garantiza que VERW no genere #GP para un usuario arbitrario %ds. [ mingo: Se corrigi\u00f3 la cadena SOB. ]" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50073.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50073.json index 7798f1ddc47..b92997bc277 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50073.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50073.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50073", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.463", - "lastModified": "2024-10-29T01:15:04.463", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: Fix use-after-free in gsm_cleanup_mux\n\nBUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0\ndrivers/tty/n_gsm.c:3160 [n_gsm]\nRead of size 8 at addr ffff88815fe99c00 by task poc/3379\nCPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56\nHardware name: VMware, Inc. VMware Virtual Platform/440BX\nDesktop Reference Platform, BIOS 6.00 11/12/2020\nCall Trace:\n \n gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]\n __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389\n update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500\n __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846\n __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107\n __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]\n ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195\n ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79\n __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338\n __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\nAllocated by task 65:\n gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]\n gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]\n gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]\n gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]\n tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391\n tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39\n flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445\n process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229\n worker_thread+0x3dc/0x950 kernel/workqueue.c:3391\n kthread+0x2a3/0x370 kernel/kthread.c:389\n ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257\n\nFreed by task 3367:\n kfree+0x126/0x420 mm/slub.c:4580\n gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]\n gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]\n tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818\n\n[Analysis]\ngsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux\ncan be freed by multi threads through ioctl,which leads\nto the occurrence of uaf. Protect it by gsm tx lock." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: n_gsm: Fix use-after-free en gsm_cleanup_mux ERROR: KASAN: slab-use-after-free en gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88815fe99c00 por la tarea poc/3379 CPU: 0 UID: 0 PID: 3379 Comm: poc No contaminado 6.11.0+ #56 Nombre del hardware: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/11/2020 Seguimiento de llamadas: gsm_cleanup_mux+0x77b/0x7b0 controladores/tty/n_gsm.c:3160 [n_gsm] __pfx_gsm_cleanup_mux+0x10/0x10 controladores/tty/n_gsm.c:3124 [n_gsm] __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161 gsmld_ioctl+0x395/0x1450 controladores/tty/n_gsm.c:3408 [n_gsm] _raw_spin_lock_irqsave+0x92/0xf0 arquitectura/x86/include/asm/atomic.h:107 __pfx_gsmld_ioctl+0x10/0x10 controladores/tty/n_gsm.c:3822 [n_gsm] ktime_get+0x5e/0x140 n\u00facleo/tiempo/tiempo de mantenimiento.c:195 ldsem_down_read+0x94/0x4e0 arquitectura/x86/include/asm/atomic64_64.h:79 __pfx_ldsem_down_read+0x10/0x10 controladores/tty/tty_ldsem.c:338 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818 Asignado por la tarea 65: gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm] gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm] gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm] gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm] tty_ldisc_receive_buf+0x101/0x1e0 controladores/tty/tty_buffer.c:391 puerto_tty_default_receive_buf+0x61/0xa0 controladores/tty/tty_port.c:39 vaciado_a_ldisc+0x1b0/0x750 controladores/tty/tty_buffer.c:445 proceso_trabajos_programados+0x2b0/0x10d0 kernel/workqueue.c:3229 subproceso_trabajador+0x3dc/0x950 kernel/workqueue.c:3391 kthread+0x2a3/0x370 kernel/kthread.c:389 ret_de_la_bifurcaci\u00f3n+0x2d/0x70 arch/x86/kernel/process.c:147 ret_de_la_bifurcaci\u00f3n_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257 Liberado por la tarea 3367: kfree+0x126/0x420 mm/slub.c:4580 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm] tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818 [An\u00e1lisis] gsm_msg en tx_ctrl_list o tx_data_list de gsm_mux puede ser liberado por m\u00faltiples subprocesos a trav\u00e9s de ioctl, lo que lleva a la aparici\u00f3n de uaf. Prot\u00e9jalo con cerradura gsm tx." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50074.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50074.json index 25e68e665b1..0785ee3e91f 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50074.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50074.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50074", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.540", - "lastModified": "2024-10-29T01:15:04.540", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nparport: Proper fix for array out-of-bounds access\n\nThe recent fix for array out-of-bounds accesses replaced sprintf()\ncalls blindly with snprintf(). However, since snprintf() returns the\nwould-be-printed size, not the actually output size, the length\ncalculation can still go over the given limit.\n\nUse scnprintf() instead of snprintf(), which returns the actually\noutput letters, for addressing the potential out-of-bounds access\nproperly." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: parport: Soluci\u00f3n adecuada para el acceso fuera de los l\u00edmites a matrices La soluci\u00f3n reciente para los accesos fuera de los l\u00edmites a matrices reemplaz\u00f3 las llamadas sprintf() ciegamente con snprintf(). Sin embargo, dado que snprintf() devuelve el tama\u00f1o que se imprimir\u00e1, no el tama\u00f1o de salida real, el c\u00e1lculo de la longitud a\u00fan puede superar el l\u00edmite dado. Utilice scnprintf() en lugar de snprintf(), que devuelve las letras de salida reales, para abordar el posible acceso fuera de los l\u00edmites correctamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50075.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50075.json index bcbed7112ae..fa32b2576ee 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50075.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50075.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50075", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.613", - "lastModified": "2024-10-29T01:15:04.613", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: tegra: fix checked USB2 port number\n\nIf USB virtualizatoin is enabled, USB2 ports are shared between all\nVirtual Functions. The USB2 port number owned by an USB2 root hub in\na Virtual Function may be less than total USB2 phy number supported\nby the Tegra XUSB controller.\n\nUsing total USB2 phy number as port number to check all PORTSC values\nwould cause invalid memory access.\n\n[ 116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f\n...\n[ 117.213640] Call trace:\n[ 117.216783] tegra_xusb_enter_elpg+0x23c/0x658\n[ 117.222021] tegra_xusb_runtime_suspend+0x40/0x68\n[ 117.227260] pm_generic_runtime_suspend+0x30/0x50\n[ 117.232847] __rpm_callback+0x84/0x3c0\n[ 117.237038] rpm_suspend+0x2dc/0x740\n[ 117.241229] pm_runtime_work+0xa0/0xb8\n[ 117.245769] process_scheduled_works+0x24c/0x478\n[ 117.251007] worker_thread+0x23c/0x328\n[ 117.255547] kthread+0x104/0x1b0\n[ 117.259389] ret_from_fork+0x10/0x20\n[ 117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xhci: tegra: fix checked USB2 port number Si la virtualizaci\u00f3n USB est\u00e1 habilitada, los puertos USB2 se comparten entre todas las funciones virtuales. El n\u00famero de puerto USB2 que posee un concentrador ra\u00edz USB2 en una funci\u00f3n virtual puede ser menor que el n\u00famero total de puertos USB2 compatibles con el controlador Tegra XUSB. El uso del n\u00famero total de puertos USB2 como n\u00famero de puerto para verificar todos los valores PORTSC provocar\u00eda un acceso no v\u00e1lido a la memoria. [ 116.923438] No se puede manejar la solicitud de paginaci\u00f3n del n\u00facleo en la direcci\u00f3n virtual 006c622f7665642f ... [ 117.213640] Rastreo de llamadas: [ 117.216783] tegra_xusb_enter_elpg+0x23c/0x658 [ 117.222021] tegra_xusb_runtime_suspend+0x40/0x68 [ 117.227260] pm_generic_runtime_suspend+0x30/0x50 [ 117.232847] __rpm_callback+0x84/0x3c0 [ 117.237038] rpm_suspend+0x2dc/0x740 [ 117.241229] pm_runtime_work+0xa0/0xb8 [ 117.245769] proceso_trabajo_programado+0x24c/0x478 [ 117.251007] subproceso_trabajador+0x23c/0x328 [ 117.255547] kthread+0x104/0x1b0 [ 117.259389] ret_from_fork+0x10/0x20 [ 117.263582] C\u00f3digo: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50076.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50076.json index df96a5c0398..7d96525508c 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50076.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50076", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.697", - "lastModified": "2024-10-29T01:15:04.697", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: prevent kernel-infoleak in con_font_get()\n\nfont.data may not initialize all memory spaces depending on the implementation\nof vc->vc_sw->con_font_get. This may cause info-leak, so to prevent this, it\nis safest to modify it to initialize the allocated memory space to 0, and it\ngenerally does not affect the overall performance of the system." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vt: prevent kernel-infoleak en con_font_get() font.data puede no inicializar todos los espacios de memoria dependiendo de la implementaci\u00f3n de vc->vc_sw->con_font_get. Esto puede causar una fuga de informaci\u00f3n, por lo que para evitarlo, es m\u00e1s seguro modificarlo para inicializar el espacio de memoria asignado a 0 y, por lo general, no afecta el rendimiento general del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50077.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50077.json index b2eaeeea21f..c7d23864614 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50077.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50077.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50077", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.773", - "lastModified": "2024-10-29T01:15:04.773", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix multiple init when debugfs is disabled\n\nIf bt_debugfs is not created successfully, which happens if either\nCONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init()\nreturns early and does not set iso_inited to true. This means that a\nsubsequent call to iso_init() will result in duplicate calls to\nproto_register(), bt_sock_register(), etc.\n\nWith CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the\nduplicate call to proto_register() triggers this BUG():\n\n list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250,\n next=ffffffffc0b280d0.\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:35!\n Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI\n CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1\n RIP: 0010:__list_add_valid_or_report+0x9a/0xa0\n ...\n __list_add_valid_or_report+0x9a/0xa0\n proto_register+0x2b5/0x340\n iso_init+0x23/0x150 [bluetooth]\n set_iso_socket_func+0x68/0x1b0 [bluetooth]\n kmem_cache_free+0x308/0x330\n hci_sock_sendmsg+0x990/0x9e0 [bluetooth]\n __sock_sendmsg+0x7b/0x80\n sock_write_iter+0x9a/0x110\n do_iter_readv_writev+0x11d/0x220\n vfs_writev+0x180/0x3e0\n do_writev+0xca/0x100\n ...\n\nThis change removes the early return. The check for iso_debugfs being\nNULL was unnecessary, it is always NULL when iso_inited is false." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: ISO: Fix multiple init when debugfs is disabled Si bt_debugfs no se crea correctamente, lo que sucede si CONFIG_DEBUG_FS o CONFIG_DEBUG_FS_ALLOW_ALL no est\u00e1n configurados, entonces iso_init() regresa antes y no configura iso_inited como verdadero. Esto significa que una llamada posterior a iso_init() dar\u00e1 como resultado llamadas duplicadas a proto_register(), bt_sock_register(), etc. Con CONFIG_LIST_HARDENED y CONFIG_BUG_ON_DATA_CORRUPTION habilitados, la llamada duplicada a proto_register() activa este BUG(): list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250, next=ffffffffc0b280d0. ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en lib/list_debug.c:35! Ups: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP PTI CPU: 2 PID: 887 Comm: bluetoothd No contaminado 6.10.11-1-ao-desktop #1 RIP: 0010:__list_add_valid_or_report+0x9a/0xa0 ... __list_add_valid_or_report+0x9a/0xa0 proto_register+0x2b5/0x340 iso_init+0x23/0x150 [bluetooth] set_iso_socket_func+0x68/0x1b0 [bluetooth] kmem_cache_free+0x308/0x330 hci_sock_sendmsg+0x990/0x9e0 [bluetooth] __sock_sendmsg+0x7b/0x80 sock_write_iter+0x9a/0x110 do_iter_readv_writev+0x11d/0x220 vfs_writev+0x180/0x3e0 do_writev+0xca/0x100 ... Este cambio elimina el retorno anticipado. La comprobaci\u00f3n de que iso_debugfs sea NULL no era necesaria, siempre es NULL cuando iso_inited es falso." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50078.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50078.json index 943dedb7f50..e11c9f45459 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50078.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50078.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50078", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.853", - "lastModified": "2024-10-29T01:15:04.853", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Call iso_exit() on module unload\n\nIf iso_init() has been called, iso_exit() must be called on module\nunload. Without that, the struct proto that iso_init() registered with\nproto_register() becomes invalid, which could cause unpredictable\nproblems later. In my case, with CONFIG_LIST_HARDENED and\nCONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually\ntriggers this BUG():\n\n list_add corruption. next->prev should be prev (ffffffffb5355fd0),\n but was 0000000000000068. (next=ffffffffc0a010d0).\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:29!\n Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI\n CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1\n RIP: 0010:__list_add_valid_or_report+0x61/0xa0\n ...\n __list_add_valid_or_report+0x61/0xa0\n proto_register+0x299/0x320\n hci_sock_init+0x16/0xc0 [bluetooth]\n bt_init+0x68/0xd0 [bluetooth]\n __pfx_bt_init+0x10/0x10 [bluetooth]\n do_one_initcall+0x80/0x2f0\n do_init_module+0x8b/0x230\n __do_sys_init_module+0x15f/0x190\n do_syscall_64+0x68/0x110\n ..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Llamada a iso_exit() en la descarga del m\u00f3dulo Si se ha llamado a iso_init(), se debe llamar a iso_exit() en la descarga del m\u00f3dulo. Sin eso, el struct proto que iso_init() registr\u00f3 con proto_register() se vuelve inv\u00e1lido, lo que podr\u00eda causar problemas impredecibles m\u00e1s adelante. En mi caso, con CONFIG_LIST_HARDENED y CONFIG_BUG_ON_DATA_CORRUPTION habilitados, cargar el m\u00f3dulo nuevamente generalmente desencadena este BUG(): corrupci\u00f3n de list_add. next->prev deber\u00eda ser prev (ffffffffb5355fd0), pero era 0000000000000068. (next=ffffffffc0a010d0). ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en lib/list_debug.c:29! Ups: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 4159 Comm: modprobe No contaminado 6.10.11-4+bt2-ao-desktop #1 RIP: 0010:__list_add_valid_or_report+0x61/0xa0 ... __list_add_valid_or_report+0x61/0xa0 proto_register+0x299/0x320 hci_sock_init+0x16/0xc0 [bluetooth] bt_init+0x68/0xd0 [bluetooth] __pfx_bt_init+0x10/0x10 [bluetooth] do_one_initcall+0x80/0x2f0 do_init_module+0x8b/0x230 __do_sys_init_module+0x15f/0x190 hacer_llamada_al_sistema_64+0x68/0x110 ..." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json index 4eec1d9fa0e..76c46ae71be 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50079", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.927", - "lastModified": "2024-10-29T01:15:04.927", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/sqpoll: ensure task state is TASK_RUNNING when running task_work\n\nWhen the sqpoll is exiting and cancels pending work items, it may need\nto run task_work. If this happens from within io_uring_cancel_generic(),\nthen it may be under waiting for the io_uring_task waitqueue. This\nresults in the below splat from the scheduler, as the ring mutex may be\nattempted grabbed while in a TASK_INTERRUPTIBLE state.\n\nEnsure that the task state is set appropriately for that, just like what\nis done for the other cases in io_run_task_work().\n\ndo not call blocking ops when !TASK_RUNNING; state=1 set at [<0000000029387fd2>] prepare_to_wait+0x88/0x2fc\nWARNING: CPU: 6 PID: 59939 at kernel/sched/core.c:8561 __might_sleep+0xf4/0x140\nModules linked in:\nCPU: 6 UID: 0 PID: 59939 Comm: iou-sqp-59938 Not tainted 6.12.0-rc3-00113-g8d020023b155 #7456\nHardware name: linux,dummy-virt (DT)\npstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\npc : __might_sleep+0xf4/0x140\nlr : __might_sleep+0xf4/0x140\nsp : ffff80008c5e7830\nx29: ffff80008c5e7830 x28: ffff0000d93088c0 x27: ffff60001c2d7230\nx26: dfff800000000000 x25: ffff0000e16b9180 x24: ffff80008c5e7a50\nx23: 1ffff000118bcf4a x22: ffff0000e16b9180 x21: ffff0000e16b9180\nx20: 000000000000011b x19: ffff80008310fac0 x18: 1ffff000118bcd90\nx17: 30303c5b20746120 x16: 74657320313d6574 x15: 0720072007200720\nx14: 0720072007200720 x13: 0720072007200720 x12: ffff600036c64f0b\nx11: 1fffe00036c64f0a x10: ffff600036c64f0a x9 : dfff800000000000\nx8 : 00009fffc939b0f6 x7 : ffff0001b6327853 x6 : 0000000000000001\nx5 : ffff0001b6327850 x4 : ffff600036c64f0b x3 : ffff8000803c35bc\nx2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000e16b9180\nCall trace:\n __might_sleep+0xf4/0x140\n mutex_lock+0x84/0x124\n io_handle_tw_list+0xf4/0x260\n tctx_task_work_run+0x94/0x340\n io_run_task_work+0x1ec/0x3c0\n io_uring_cancel_generic+0x364/0x524\n io_sq_thread+0x820/0x124c\n ret_from_fork+0x10/0x20" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/sqpoll: asegurarse de que el estado de la tarea sea TASK_RUNNING al ejecutar task_work Cuando sqpoll sale y cancela elementos de trabajo pendientes, es posible que deba ejecutar task_work. Si esto sucede desde dentro de io_uring_cancel_generic(), es posible que est\u00e9 esperando la cola de espera de io_uring_task. Esto da como resultado el siguiente splat del programador, ya que se puede intentar capturar el mutex de anillo mientras se est\u00e1 en un estado TASK_INTERRUPTIBLE. Aseg\u00farese de que el estado de la tarea est\u00e9 configurado adecuadamente para eso, al igual que lo que se hace para los otros casos en io_run_task_work(). no llame a operaciones de bloqueo cuando !TASK_RUNNING; estado=1 establecido en [<0000000029387fd2>] prepare_to_wait+0x88/0x2fc ADVERTENCIA: CPU: 6 PID: 59939 en kernel/sched/core.c:8561 __might_sleep+0xf4/0x140 M\u00f3dulos vinculados: CPU: 6 UID: 0 PID: 59939 Comm: iou-sqp-59938 No contaminado 6.12.0-rc3-00113-g8d020023b155 #7456 Nombre del hardware: linux,dummy-virt (DT) pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : __might_sleep+0xf4/0x140 lr : __might_sleep+0xf4/0x140 sp : ffff80008c5e7830 x29: ffff80008c5e7830 x28: ffff0000d93088c0 x27: ffff60001c2d7230 x26: dfff800000000000 x25: ffff0000e16b9180 x24: ffff80008c5e7a50 x23: 1ffff000118bcf4a x22: ffff0000e16b9180 x21: ffff0000e16b9180 x20: 000000000000011b x19: ffff80008310fac0 x18: 1ffff000118bcd90 x17: 30303c5b20746120 x16: 74657320313d6574 x15: 0720072007200720 x14: 0720072007200720 x13: 0720072007200720 x12: ffff600036c64f0b x11: 1fffe00036c64f0a x10: ffff600036c64f0a x9: dfff800000000000 x8: 00009fffc939b0f6 x7: ffff0001b6327853 x6 : 0000000000000001 x5 : ffff0001b6327850 x4 : ffff600036c64f0b x3 : ffff8000803c35bc x2 : 000000000000000 x1 : 0000000000000000 x0 : ffff0000e16b9180 Rastreo de llamadas: __might_sleep+0xf4/0x140 mutex_lock+0x84/0x124 io_handle_tw_list+0xf4/0x260 tctx_task_work_run+0x94/0x340 io_run_task_work+0x1ec/0x3c0 io_uring_cancel_generic+0x364/0x524 io_sq_thread+0x820/0x124c ret_from_fork+0x10/0x20" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json index 17467f08745..2b28747a1f2 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50080", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.000", - "lastModified": "2024-10-29T01:15:05.000", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nublk: don't allow user copy for unprivileged device\n\nUBLK_F_USER_COPY requires userspace to call write() on ublk char\ndevice for filling request buffer, and unprivileged device can't\nbe trusted.\n\nSo don't allow user copy for unprivileged device." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ublk: no se permite la copia de usuario para dispositivos sin privilegios UBLK_F_USER_COPY requiere que el espacio de usuario llame a write() en el dispositivo char ublk para llenar el b\u00fafer de solicitud y no se puede confiar en el dispositivo sin privilegios. Por lo tanto, no se permite la copia de usuario para dispositivos sin privilegios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json index a8954750a09..d2b2f0ba0ed 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50081", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.073", - "lastModified": "2024-10-29T01:15:05.073", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: setup queue ->tag_set before initializing hctx\n\nCommit 7b815817aa58 (\"blk-mq: add helper for checking if one CPU is mapped to specified hctx\")\nneeds to check queue mapping via tag set in hctx's cpuhp handler.\n\nHowever, q->tag_set may not be setup yet when the cpuhp handler is\nenabled, then kernel oops is triggered.\n\nFix the issue by setup queue tag_set before initializing hctx." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-mq: configurar queue ->tag_set antes de inicializar hctx el commit 7b815817aa58 (\"blk-mq: agregar asistente para verificar si una CPU est\u00e1 asignada a hctx especificado\") necesita verificar la asignaci\u00f3n de cola a trav\u00e9s del conjunto de etiquetas en el controlador cpuhp de hctx. Sin embargo, es posible que q->tag_set a\u00fan no est\u00e9 configurado cuando el controlador cpuhp est\u00e1 habilitado, luego se activa el error del kernel. Solucione el problema configurando queue tag_set antes de inicializar hctx." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json index df7ae20ae32..26308beda8a 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50082", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.147", - "lastModified": "2024-10-29T01:15:05.147", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race\n\nWe're seeing crashes from rq_qos_wake_function that look like this:\n\n BUG: unable to handle page fault for address: ffffafe180a40084\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0\n Oops: Oops: 0002 [#1] PREEMPT SMP PTI\n CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40\n Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00\n RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011\n RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084\n RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011\n R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002\n R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003\n FS: 0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n \n try_to_wake_up+0x5a/0x6a0\n rq_qos_wake_function+0x71/0x80\n __wake_up_common+0x75/0xa0\n __wake_up+0x36/0x60\n scale_up.part.0+0x50/0x110\n wb_timer_fn+0x227/0x450\n ...\n\nSo rq_qos_wake_function() calls wake_up_process(data->task), which calls\ntry_to_wake_up(), which faults in raw_spin_lock_irqsave(&p->pi_lock).\n\np comes from data->task, and data comes from the waitqueue entry, which\nis stored on the waiter's stack in rq_qos_wait(). Analyzing the core\ndump with drgn, I found that the waiter had already woken up and moved\non to a completely unrelated code path, clobbering what was previously\ndata->task. Meanwhile, the waker was passing the clobbered garbage in\ndata->task to wake_up_process(), leading to the crash.\n\nWhat's happening is that in between rq_qos_wake_function() deleting the\nwaitqueue entry and calling wake_up_process(), rq_qos_wait() is finding\nthat it already got a token and returning. The race looks like this:\n\nrq_qos_wait() rq_qos_wake_function()\n==============================================================\nprepare_to_wait_exclusive()\n data->got_token = true;\n list_del_init(&curr->entry);\nif (data.got_token)\n break;\nfinish_wait(&rqw->wait, &data.wq);\n ^- returns immediately because\n list_empty_careful(&wq_entry->entry)\n is true\n... return, go do something else ...\n wake_up_process(data->task)\n (NO LONGER VALID!)-^\n\nNormally, finish_wait() is supposed to synchronize against the waker.\nBut, as noted above, it is returning immediately because the waitqueue\nentry has already been removed from the waitqueue.\n\nThe bug is that rq_qos_wake_function() is accessing the waitqueue entry\nAFTER deleting it. Note that autoremove_wake_function() wakes the waiter\nand THEN deletes the waitqueue entry, which is the proper order.\n\nFix it by swapping the order. We also need to use\nlist_del_init_careful() to match the list_empty_careful() in\nfinish_wait()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-rq-qos: se corrige el fallo en la ejecuci\u00f3n rq_qos_wait vs. rq_qos_wake_function Estamos viendo fallos de rq_qos_wake_function que se parecen a esto: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffffafe180a40084 #PF: acceso de escritura de supervisor en modo kernel #PF: error_code(0x0002) - p\u00e1gina no presente PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0 Oops: Oops: 0002 [#1] PREEMPT SMP PTI CPU: 17 UID: 0 PID: 0 Comm: swapper/17 No contaminado 6.12.0-rc3-00013-geca631b8fe80 #11 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 01/04/2014 RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40 C\u00f3digo: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00 RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046 RAX: 000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084 RBP: 0000000000000000 R08: 000000000001e7240 R09: 0000000000000011 R10: 00000000000000028 R11: 00000000000000888 R12: 0000000000000002 R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003 FS: 000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: try_to_wake_up+0x5a/0x6a0 rq_qos_wake_function+0x71/0x80 __wake_up_common+0x75/0xa0 __wake_up+0x36/0x60 scale_up.part.0+0x50/0x110 wb_timer_fn+0x227/0x450 ... Entonces rq_qos_wake_function() llama a wake_up_process(data->task), que llama a try_to_wake_up(), que falla en raw_spin_lock_irqsave(&p->pi_lock). p viene de data->task, y data viene de la entrada de la cola de espera, que se almacena en la pila del que espera en rq_qos_wait(). Al analizar el volcado de memoria con drgn, descubr\u00ed que el que espera ya se hab\u00eda despertado y se hab\u00eda movido a una ruta de c\u00f3digo completamente no relacionada, destruyendo lo que antes era data->task. Mientras tanto, el waker estaba pasando la basura golpeada en data->task a wake_up_process(), lo que provoc\u00f3 el bloqueo. Lo que est\u00e1 sucediendo es que entre rq_qos_wake_function() eliminando la entrada de la cola de espera y llamando a wake_up_process(), rq_qos_wait() descubre que ya obtuvo un token y regresa. La ejecuci\u00f3n se ve as\u00ed: rq_qos_wait() rq_qos_wake_function() ============================================================ prepare_to_wait_exclusive() data->got_token = true; list_del_init(&curr->entry); if (data.got_token) break; finish_wait(&rqw->wait, &data.wq); ^- retorna inmediatamente porque list_empty_careful(&wq_entry->entry) es verdadero... retorna, ve a hacer otra cosa... wake_up_process(data->task) (\u00a1YA NO ES V\u00c1LIDO!)-^ Normalmente, se supone que finish_wait() se sincroniza con el activador. Pero, como se se\u00f1al\u00f3 anteriormente, retorna inmediatamente porque la entrada de la cola de espera ya se elimin\u00f3 de la cola de espera. El error es que rq_qos_wake_function() est\u00e1 accediendo a la entrada de la cola de espera DESPU\u00c9S de eliminarla. Tenga en cuenta que autoremove_wake_function() despierta al que espera y LUEGO elimina la entrada de la cola de espera, que es el orden correcto. Arr\u00e9glelo intercambiando el orden. Tambi\u00e9n debemos usar list_del_init_careful() para que coincida con list_empty_careful() en finish_wait()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json index c8ad3d626fa..e2dd12763f6 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50083", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.240", - "lastModified": "2024-10-29T01:15:05.240", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix mptcp DSS corruption due to large pmtu xmit\n\nSyzkaller was able to trigger a DSS corruption:\n\n TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 5227 at net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695\n Modules linked in:\n CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\n RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695\n Code: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 <0f> 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff\n RSP: 0018:ffffc90000006db8 EFLAGS: 00010246\n RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00\n RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 00000000000055f0\n RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8\n R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 0000000000000000\n R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5\n FS: 000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n move_skbs_to_msk net/mptcp/protocol.c:811 [inline]\n mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854\n subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490\n tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283\n tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237\n tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915\n tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2350\n ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233\n NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314\n NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314\n __netif_receive_skb_one_core net/core/dev.c:5662 [inline]\n __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775\n process_backlog+0x662/0x15b0 net/core/dev.c:6107\n __napi_poll+0xcb/0x490 net/core/dev.c:6771\n napi_poll net/core/dev.c:6840 [inline]\n net_rx_action+0x89b/0x1240 net/core/dev.c:6962\n handle_softirqs+0x2c5/0x980 kernel/softirq.c:554\n do_softirq+0x11b/0x1e0 kernel/softirq.c:455\n \n \n __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382\n local_bh_enable include/linux/bottom_half.h:33 [inline]\n rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]\n __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451\n dev_queue_xmit include/linux/netdevice.h:3094 [inline]\n neigh_hh_output include/net/neighbour.h:526 [inline]\n neigh_output include/net/neighbour.h:540 [inline]\n ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236\n ip_local_out net/ipv4/ip_output.c:130 [inline]\n __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536\n __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466\n tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\n tcp_mtu_probe net/ipv4/tcp_output.c:2547 [inline]\n tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752\n __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015\n tcp_push_pending_frames include/net/tcp.h:2107 [inline]\n tcp_data_snd_check net/ipv4/tcp_input.c:5714 [inline]\n tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239\n tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915\n sk_backlog_rcv include/net/sock.h:1113 [inline]\n __release_sock+0x214/0x350 net/core/sock.c:3072\n release_sock+0x61/0x1f0 net/core/sock.c:3626\n mptcp_push_\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: se corrige la corrupci\u00f3n de DSS de mptcp debido a una gran xmit pmtu Syzkaller pudo desencadenar una corrupci\u00f3n de DSS: TCP: request_sock_subflow_v4: Posible inundaci\u00f3n de SYN en el puerto [::]:20002. Env\u00edo de cookies. ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 5227 en net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 M\u00f3dulos vinculados en: CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 No contaminado 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 C\u00f3digo: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 <0f> 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff RSP: 0018:ffffc90000006db8 EFLAGS: 00010246 RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00 RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 000000000000055f0 RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8 R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 000000000000000 R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5 FS: 000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: move_skbs_to_msk net/mptcp/protocol.c:811 [en l\u00ednea] mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854 subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490 tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283 tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237 tcp_v4_do_rcv+0x96d/0xc70 red/ipv4/tcp_ipv4.c:1915 tcp_v4_rcv+0x2dc0/0x37f0 red/ipv4/tcp_ipv4.c:2350 entrega_protocolo_ip_rcu+0x22e/0x440 red/ipv4/ip_input.c:205 entrega_local_ip_finish+0x341/0x5f0 red/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 incluir/linux/netfilter.h:314 NF_HOOK+0x3a4/0x450 incluir/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5662 [en l\u00ednea] __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775 process_backlog+0x662/0x15b0 net/core/dev.c:6107 __napi_poll+0xcb/0x490 net/core/dev.c:6771 napi_poll net/core/dev.c:6840 [en l\u00ednea] net_rx_action+0x89b/0x1240 net/core/dev.c:6962 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 do_softirq+0x11b/0x1e0 kernel/softirq.c:455 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [en l\u00ednea] rcu_read_unlock_bh include/linux/rcupdate.h:919 [en l\u00ednea] __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451 dev_queue_xmit include/linux/netdevice.h:3094 [en l\u00ednea] neigh_hh_output include/net/neighbour.h:526 [en l\u00ednea] neigh_output include/net/neighbour.h:540 [en l\u00ednea] ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236 ip_local_out net/ipv4/ip_output.c:130 [en l\u00ednea] __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466 tcp_transmit_skb net/ipv4/tcp_output.c:1484 [en l\u00ednea] tcp_mtu_probe net/ipv4/tcp_output.c:2547 [en l\u00ednea] tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752 __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015 tcp_push_pending_frames incluir/net/tcp.h:2107 [en l\u00ednea] tcp_data_snd_check net/ipv4/tcp_input.c:5714 [en l\u00ednea] tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239 tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915 sk_backlog_rcv incluir/net/sock.h:1113 [en l\u00ednea] __release_sock+0x214/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 mptcp_push_ ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50084.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50084.json index d4f6d8f2704..4af6cefa7a1 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50084.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50084.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50084", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.327", - "lastModified": "2024-10-29T01:15:05.327", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()\n\nCommit a3c1e45156ad (\"net: microchip: vcap: Fix use-after-free error in\nkunit test\") fixed the use-after-free error, but introduced below\nmemory leaks by removing necessary vcap_free_rule(), add it to fix it.\n\n\tunreferenced object 0xffffff80ca58b700 (size 192):\n\t comm \"kunit_try_catch\", pid 1215, jiffies 4294898264\n\t hex dump (first 32 bytes):\n\t 00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00 ..z.........d...\n\t 00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff ................\n\t backtrace (crc 9c09c3fe):\n\t [<0000000052a0be73>] kmemleak_alloc+0x34/0x40\n\t [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t [<0000000040a01b8d>] vcap_alloc_rule+0x3cc/0x9c4\n\t [<000000003fe86110>] vcap_api_encode_rule_test+0x1ac/0x16b0\n\t [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac\n\t [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t [<00000000c5d82c9a>] kthread+0x2e8/0x374\n\t [<00000000f4287308>] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0400 (size 64):\n\t comm \"kunit_try_catch\", pid 1215, jiffies 4294898265\n\t hex dump (first 32 bytes):\n\t 80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff ..........X.....\n\t 39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff 9...............\n\t backtrace (crc daf014e9):\n\t [<0000000052a0be73>] kmemleak_alloc+0x34/0x40\n\t [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528\n\t [<00000000dfdb1e81>] vcap_api_encode_rule_test+0x224/0x16b0\n\t [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac\n\t [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t [<00000000c5d82c9a>] kthread+0x2e8/0x374\n\t [<00000000f4287308>] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0700 (size 64):\n\t comm \"kunit_try_catch\", pid 1215, jiffies 4294898265\n\t hex dump (first 32 bytes):\n\t 80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff ........(.X.....\n\t 3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff <......../......\n\t backtrace (crc 8d877792):\n\t [<0000000052a0be73>] kmemleak_alloc+0x34/0x40\n\t [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t [<000000006eadfab7>] vcap_rule_add_action+0x2d0/0x52c\n\t [<00000000323475d1>] vcap_api_encode_rule_test+0x4d4/0x16b0\n\t [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac\n\t [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t [<00000000c5d82c9a>] kthread+0x2e8/0x374\n\t [<00000000f4287308>] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0900 (size 64):\n\t comm \"kunit_try_catch\", pid 1215, jiffies 4294898266\n\t hex dump (first 32 bytes):\n\t 80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff ................\n\t 7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00 }...............\n\t backtrace (crc 34181e56):\n\t [<0000000052a0be73>] kmemleak_alloc+0x34/0x40\n\t [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528\n\t [<00000000991e3564>] vcap_val_rule+0xcf0/0x13e8\n\t [<00000000fc9868e5>] vcap_api_encode_rule_test+0x678/0x16b0\n\t [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac\n\t [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t [<00000000c5d82c9a>] kthread+0x2e8/0x374\n\t [<00000000f4287308>] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80cc0b0980 (size 64):\n\t comm \"kunit_try_catch\", pid 1215, jiffies 4294898266\n\t hex dump (first 32 bytes):\n\t 18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 ff ff ff ..X.............\n\t 67 00 00 00 00 00 00 00 01 01 74 88 c0 ff ff ff g.........t.....\n\t backtrace (crc 275fd9be):\n\t [<0000000052a0be73>] kmemleak_alloc+0x34/0x40\n\t [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528\n\t [<000000001396a1a2>] test_add_de\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() el commit a3c1e45156ad (\"net: microchip: vcap: Fix use-after-free error in kunit test\") corrigi\u00f3 el error use-after-free, pero introdujo las siguientes fugas de memoria al eliminar vcap_free_rule() necesario, agr\u00e9guelo para solucionarlo. objeto sin referencia 0xffffff80ca58b700 (tama\u00f1o 192): comm \"kunit_try_catch\", pid 1215, jiffies 4294898264 volcado hexadecimal (primeros 32 bytes): 00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00 ..z.........d... 00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff ................ backtrace (crc 9c09c3fe): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<0000000040a01b8d>] vcap_alloc_rule+0x3cc/0x9c4 [<000000003fe86110>] vcap_api_encode_rule_test+0x1ac/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0400 (tama\u00f1o 64): comm \"kunit_try_catch\", pid 1215, jiffies 4294898265 volcado hexadecimal (primeros 32 bytes): 80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff ..........X..... 39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff 9................ seguimiento inverso (crc daf014e9): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528 [<00000000dfdb1e81>] vcap_api_encode_rule_test+0x224/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0700 (tama\u00f1o 64): comm \"kunit_try_catch\", pid 1215, jiffies 4294898265 volcado hexadecimal (primeros 32 bytes): 80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff ........(.X..... 3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff <......../...... seguimiento inverso (crc 8d877792): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000006eadfab7>] vcap_rule_add_action+0x2d0/0x52c [<00000000323475d1>] vcap_api_encode_rule_test+0x4d4/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0900 (tama\u00f1o 64): comm \"kunit_try_catch\", pid 1215, jiffies 4294898266 volcado hexadecimal (primeros 32 bytes): 80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff ................ 7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00 }............... seguimiento inverso (crc 34181e56): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528 [<00000000991e3564>] vcap_val_rule+0xcf0/0x13e8 [<00000000fc9868e5>] vcap_api_encode_rule_test+0x678/0x16b0 [<00000000b3595fc4>] kunit_try_run_case+0x13c/0x3ac [<0000000010f5d2bf>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000c5d82c9a>] kthread+0x2e8/0x374 [<00000000f4287308>] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80cc0b0980 (tama\u00f1o 64): comm \"kunit_try_catch\", pid 1215, jiffies 4294898266 volcado hexadecimal (primeros 32 bytes): 18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 y siguientes y siguientes y siguientes ..X............. 67 00 00 00 00 00 00 00 01 01 74 88 c0 y siguientes y siguientes y siguientes g.........t..... seguimiento inverso (crc 275fd9be): [<0000000052a0be73>] kmemleak_alloc+0x34/0x40 [<0000000043605459>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000000ff63fd4>] vcap_rule_add_key+0x2cc/0x528 [<0" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50085.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50085.json index 3b606324ff0..99873914716 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50085.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50085.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50085", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.400", - "lastModified": "2024-10-29T01:15:05.400", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow\n\nSyzkaller reported this splat:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in mptcp_pm_nl_rm_addr_or_subflow+0xb44/0xcc0 net/mptcp/pm_netlink.c:881\n Read of size 4 at addr ffff8880569ac858 by task syz.1.2799/14662\n\n CPU: 0 UID: 0 PID: 14662 Comm: syz.1.2799 Not tainted 6.12.0-rc2-syzkaller-00307-g36c254515dc6 #0\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n Call Trace:\n \n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc3/0x620 mm/kasan/report.c:488\n kasan_report+0xd9/0x110 mm/kasan/report.c:601\n mptcp_pm_nl_rm_addr_or_subflow+0xb44/0xcc0 net/mptcp/pm_netlink.c:881\n mptcp_pm_nl_rm_subflow_received net/mptcp/pm_netlink.c:914 [inline]\n mptcp_nl_remove_id_zero_address+0x305/0x4a0 net/mptcp/pm_netlink.c:1572\n mptcp_pm_nl_del_addr_doit+0x5c9/0x770 net/mptcp/pm_netlink.c:1603\n genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x165/0x410 net/netlink/af_netlink.c:2551\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]\n netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1357\n netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1901\n sock_sendmsg_nosec net/socket.c:729 [inline]\n __sock_sendmsg net/socket.c:744 [inline]\n ____sys_sendmsg+0x9ae/0xb40 net/socket.c:2607\n ___sys_sendmsg+0x135/0x1e0 net/socket.c:2661\n __sys_sendmsg+0x117/0x1f0 net/socket.c:2690\n do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]\n __do_fast_syscall_32+0x73/0x120 arch/x86/entry/common.c:386\n do_fast_syscall_32+0x32/0x80 arch/x86/entry/common.c:411\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n RIP: 0023:0xf7fe4579\n Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00\n RSP: 002b:00000000f574556c EFLAGS: 00000296 ORIG_RAX: 0000000000000172\n RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000020000140\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n \n\n Allocated by task 5387:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n kmalloc_noprof include/linux/slab.h:878 [inline]\n kzalloc_noprof include/linux/slab.h:1014 [inline]\n subflow_create_ctx+0x87/0x2a0 net/mptcp/subflow.c:1803\n subflow_ulp_init+0xc3/0x4d0 net/mptcp/subflow.c:1956\n __tcp_set_ulp net/ipv4/tcp_ulp.c:146 [inline]\n tcp_set_ulp+0x326/0x7f0 net/ipv4/tcp_ulp.c:167\n mptcp_subflow_create_socket+0x4ae/0x10a0 net/mptcp/subflow.c:1764\n __mptcp_subflow_connect+0x3cc/0x1490 net/mptcp/subflow.c:1592\n mptcp_pm_create_subflow_or_signal_addr+0xbda/0x23a0 net/mptcp/pm_netlink.c:642\n mptcp_pm_nl_fully_established net/mptcp/pm_netlink.c:650 [inline]\n mptcp_pm_nl_work+0x3a1/0x4f0 net/mptcp/pm_netlink.c:943\n mptcp_worker+0x15a/0x1240 net/mptcp/protocol.c:2777\n process_one_work+0x958/0x1b30 kernel/workqueue.c:3229\n process_scheduled_works kernel/workqueue.c:3310 [inline]\n worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/ke\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: pm: correcci\u00f3n de lectura UaF en mptcp_pm_nl_rm_addr_or_subflow Syzkaller inform\u00f3 este splat: ===================================================================== ERROR: KASAN: slab-use-after-free en mptcp_pm_nl_rm_addr_or_subflow+0xb44/0xcc0 net/mptcp/pm_netlink.c:881 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff8880569ac858 por la tarea syz.1.2799/14662 CPU: 0 UID: 0 PID: 14662 Comm: syz.1.2799 No contaminado 6.12.0-rc2-syzkaller-00307-g36c254515dc6 #0 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 mptcp_pm_nl_rm_addr_or_subflow+0xb44/0xcc0 net/mptcp/pm_netlink.c:881 mptcp_pm_nl_rm_subflow_received net/mptcp/pm_netlink.c:914 [en l\u00ednea] mptcp_nl_remove_id_zero_address+0x305/0x4a0 net/mptcp/pm_netlink.c:1572 mptcp_pm_nl_del_addr_doit+0x5c9/0x770 net/mptcp/pm_netlink.c:1603 genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115 genl_family_rcv_msg net/netlink/genetlink.c:1195 [en l\u00ednea] genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210 netlink_rcv_skb+0x165/0x410 net/netlink/af_netlink.c:2551 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [en l\u00ednea] netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec red/socket.c:729 [en l\u00ednea] __sock_sendmsg red/socket.c:744 [en l\u00ednea] ____sys_sendmsg+0x9ae/0xb40 red/socket.c:2607 ___sys_sendmsg+0x135/0x1e0 red/socket.c:2661 __sys_sendmsg+0x117/0x1f0 red/socket.c:2690 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [en l\u00ednea] __do_fast_syscall_32+0x73/0x120 arch/x86/entry/common.c:386 do_fast_syscall_32+0x32/0x80 arch/x86/entry/common.c:411 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf7fe4579 C\u00f3digo: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 RSP: 002b:00000000f574556c EFLAGS: 00000296 ORIG_RAX: 0000000000000172 RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000020000140 RDX: 0000000000000000 RSI: 000000000000000 RDI: 000000000000000 RBP: 000000000000000 R08: 000000000000000 R09: 0000000000000000 R10: 00000000000000000 R11: 0000000000000296 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Asignado por la tarea 5387: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [en l\u00ednea] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394 kmalloc_noprof include/linux/slab.h:878 [en l\u00ednea] kzalloc_noprof include/linux/slab.h:1014 [en l\u00ednea] subflow_create_ctx+0x87/0x2a0 net/mptcp/subflow.c:1803 subflow_ulp_init+0xc3/0x4d0 net/mptcp/subflow.c:1956 __tcp_set_ulp net/ipv4/tcp_ulp.c:146 [en l\u00ednea] tcp_set_ulp+0x326/0x7f0 net/ipv4/tcp_ulp.c:167 mptcp_subflow_create_socket+0x4ae/0x10a0 net/mptcp/subflow.c:1764 __mptcp_subflow_connect+0x3cc/0x1490 net/mptcp/subflow.c:1592 mptcp_pm_create_subflow_or_signal_addr+0xbda/0x23a0 net/mptcp/pm_netlink.c:642 mptcp_pm_nl_fully_established net/mptcp/pm_netlink.c:650 [en l\u00ednea] mptcp_pm_nl_work+0x3a1/0x4f0 net/mptcp/pm_netlink.c:943 mptcp_worker+0x15a/0x1240 net/mptcp/protocol.c:2777 proceso_uno_trabajo+0x958/0x1b30 kernel/workqueue.c:3229 proceso_trabajo_programado kernel/workqueue.c:3310 [en l\u00ednea] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/ke ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json index 52ceb69f474..db4b6c57f85 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50086", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.487", - "lastModified": "2024-10-29T01:15:05.487", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix user-after-free from session log off\n\nThere is racy issue between smb2 session log off and smb2 session setup.\nIt will cause user-after-free from session log off.\nThis add session_lock when setting SMB2_SESSION_EXPIRED and referece\ncount to session struct not to free session while it is being used." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige el problema de user-after-free del cierre de sesi\u00f3n. Hay un problema de velocidad entre el cierre de sesi\u00f3n de smb2 y la configuraci\u00f3n de la sesi\u00f3n de smb2. Esto provocar\u00e1 que el user-after-free cierre la sesi\u00f3n. Esto agrega session_lock al configurar SMB2_SESSION_EXPIRED y hace referencia a count en la estructura de sesi\u00f3n para no liberar la sesi\u00f3n mientras se est\u00e1 utilizando." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50087.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50087.json index d23d5282bcf..4497ed0ab0f 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50087.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50087.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50087", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.560", - "lastModified": "2024-10-29T01:15:05.560", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix uninitialized pointer free on read_alloc_one_name() error\n\nThe function read_alloc_one_name() does not initialize the name field of\nthe passed fscrypt_str struct if kmalloc fails to allocate the\ncorresponding buffer. Thus, it is not guaranteed that\nfscrypt_str.name is initialized when freeing it.\n\nThis is a follow-up to the linked patch that fixes the remaining\ninstances of the bug introduced by commit e43eec81c516 (\"btrfs: use\nstruct qstr instead of name and namelen pairs\")." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: fix uninitialized pointer free on read_alloc_one_name() error La funci\u00f3n read_alloc_one_name() no inicializa el campo de nombre de la estructura fscrypt_str pasada si kmalloc no puede asignar el b\u00fafer correspondiente. Por lo tanto, no se garantiza que fscrypt_str.name se inicialice al liberarlo. Este es un seguimiento del parche vinculado que corrige las instancias restantes del error introducido por el commit e43eec81c516 (\"btrfs: use struct qstr instead of name and namelen pairs\")." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50088.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50088.json index 3e2063a915d..45e834154fa 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50088.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50088.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50088", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.640", - "lastModified": "2024-10-29T01:15:05.640", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix uninitialized pointer free in add_inode_ref()\n\nThe add_inode_ref() function does not initialize the \"name\" struct when\nit is declared. If any of the following calls to \"read_one_inode()\nreturns NULL,\n\n\tdir = read_one_inode(root, parent_objectid);\n\tif (!dir) {\n\t\tret = -ENOENT;\n\t\tgoto out;\n\t}\n\n\tinode = read_one_inode(root, inode_objectid);\n\tif (!inode) {\n\t\tret = -EIO;\n\t\tgoto out;\n\t}\n\nthen \"name.name\" would be freed on \"out\" before being initialized.\n\nout:\n\t...\n\tkfree(name.name);\n\nThis issue was reported by Coverity with CID 1526744." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: se corrige la liberaci\u00f3n de un puntero no inicializado en add_inode_ref() La funci\u00f3n add_inode_ref() no inicializa la estructura \"name\" cuando se declara. Si alguna de las siguientes llamadas a \"read_one_inode() devuelve NULL, dir = read_one_inode(root, parent_objectid); if (!dir) { ret = -ENOENT; goto out; } inode = read_one_inode(root, inode_objectid); if (!inode) { ret = -EIO; goto out; } entonces \"name.name\" se liberar\u00eda en \"out\" antes de inicializarse. out: ... kfree(name.name); Este problema fue informado por Coverity con CID 1526744." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50407.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50407.json index 64d79d4c2ae..709c1c9bd0d 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50407.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50407.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50407", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:05.237", - "lastModified": "2024-10-29T11:15:05.237", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50409.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50409.json index 0a7464958ea..3c279026613 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50409.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50409", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:05.460", - "lastModified": "2024-10-29T11:15:05.460", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50410.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50410.json index 60728e4bfbf..267f37941d2 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50410.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50410", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:05.657", - "lastModified": "2024-10-29T11:15:05.657", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50411.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50411.json index 608ab5092b6..6d3d33d6a35 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50411.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50411.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50411", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:08.333", - "lastModified": "2024-10-29T09:15:08.333", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kevon Adonis WP Abstracts allows Stored XSS.This issue affects WP Abstracts: from n/a through 2.7.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Kevon Adonis WP Abstracts permite XSS almacenado. Este problema afecta a WP Abstracts: desde n/a hasta 2.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50412.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50412.json index 87bbed9e822..5d73d47e537 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50412.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50412.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50412", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:08.610", - "lastModified": "2024-10-29T09:15:08.610", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jules Colle Conditional Fields for Contact Form 7 allows Stored XSS.This issue affects Conditional Fields for Contact Form 7: from n/a through 2.4.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Jules Colle Conditional Fields for Contact Form 7 permite XSS almacenado. Este problema afecta a los campos condicionales para el formulario de contacto 7: desde n/a hasta 2.4.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50413.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50413.json index ad146acf371..405718f950f 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50413.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50413.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50413", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:08.847", - "lastModified": "2024-10-29T09:15:08.847", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in codection Import and export users and customers allows Stored XSS.This issue affects Import and export users and customers: from n/a through 1.27.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en codection Import and export users and customers permite XSS almacenado. Este problema afecta a la importaci\u00f3n y exportaci\u00f3n de usuarios y clientes: desde n/a hasta 1.27.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50414.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50414.json index 6431855c999..585558907a9 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50414.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50414.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50414", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:09.230", - "lastModified": "2024-10-29T09:15:09.230", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VirusTran Button contact VR allows Stored XSS.This issue affects Button contact VR: from n/a through 4.7.9.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en VirusTran Button contact VR permite XSS almacenado. Este problema afecta a Button contact VR: desde n/a hasta 4.7.9.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50415.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50415.json index 51ab835797a..eac86ffbb66 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50415.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50415.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50415", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:09.530", - "lastModified": "2024-10-29T09:15:09.530", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pagup Ads.Txt & App-ads.Txt Manager for WordPress allows Stored XSS.This issue affects Ads.Txt & App-ads.Txt Manager for WordPress: from n/a through 1.1.7.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Pagup Ads.Txt y App-ads.Txt Manager para WordPress permite XSS almacenado. Este problema afecta a Ads.Txt y App-ads.Txt Manager para WordPress: desde n/a hasta 1.1.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50418.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50418.json index a754530a4f6..2f40cc16664 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50418.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50418.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50418", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:09.777", - "lastModified": "2024-10-29T09:15:09.777", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Time Slot Booking Time Slot allows Stored XSS.This issue affects Time Slot: from n/a through 1.3.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Time Slot Booking Time Slot permiten XSS almacenado. Este problema afecta a los intervalos de tiempo: desde n/a hasta 1.3.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50420.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50420.json index ed70282baa0..d889c37142f 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50420.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50420.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50420", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:10.150", - "lastModified": "2024-10-29T09:15:10.150", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in adirectory aDirectory allows Upload a Web Shell to a Web Server.This issue affects aDirectory: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en aDirectory aDirectory permite cargar un Web Shell a un servidor web. Este problema afecta a aDirectory: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json index 935b6e72777..628216ed01b 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50426.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50426", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:10.383", - "lastModified": "2024-10-29T09:15:10.383", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Survey Maker team Survey Maker allows Stored XSS.This issue affects Survey Maker: from n/a through 5.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Survey Maker team Survey Maker permite XSS almacenado. Este problema afecta a Survey Maker: desde n/a hasta 5.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50427.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50427.json index 4ba663c0cd2..efbe5698831 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50427.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50427.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50427", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:10.710", - "lastModified": "2024-10-29T09:15:10.710", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Devsoft Baltic O\u00dc SurveyJS: Drag & Drop WordPress Form Builder.This issue affects SurveyJS: Drag & Drop WordPress Form Builder: from n/a through 1.9.136." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Devsoft Baltic O\u00dc SurveyJS: Drag & Drop WordPress Form Builder. Este problema afecta a SurveyJS: Drag & Drop WordPress Form Builder: desde n/a hasta 1.9.136." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50429.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50429.json index 69795b33ef0..1c114b84b23 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50429.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50429.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50429", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T19:15:13.957", - "lastModified": "2024-10-28T19:15:13.957", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPBlockArt Magazine Blocks allows Stored XSS.This issue affects Magazine Blocks: from n/a through 1.3.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WPBlockArt Magazine Blocks permite XSS almacenado. Este problema afecta a los bloques de revista: desde n/a hasta 1.3.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50431.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50431.json index 0c71a1bc1fd..d0bd25bcdf1 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50431.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50431.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50431", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T19:15:14.170", - "lastModified": "2024-10-28T19:15:14.170", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Cloudways Breeze allows Stored XSS.This issue affects Breeze: from n/a through 2.1.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Cloudways Breeze permite XSS almacenado. Este problema afecta a Breeze: desde n/a hasta 2.1.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50432.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50432.json index c4d0e4f1e92..dfae7880c2f 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50432.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50432.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50432", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T19:15:14.363", - "lastModified": "2024-10-28T19:15:14.363", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Post Grid and Gutenberg Blocks allows Stored XSS.This issue affects Post Grid and Gutenberg Blocks: from n/a through 2.2.93." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en PickPlugins Post Grid y Gutenberg Blocks permite XSS almacenado. Este problema afecta a Post Grid y Gutenberg Blocks: desde n/a hasta 2.2.93." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50433.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50433.json index d1a5f5d6b0b..94260b1afbb 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50433.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50433.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50433", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T19:15:14.560", - "lastModified": "2024-10-28T19:15:14.560", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wowDevs Sky Addons for Elementor allows Stored XSS.This issue affects Sky Addons for Elementor: from n/a through 2.5.15." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en wowDevs Sky Addons for Elementor permite XSS almacenado. Este problema afecta a Sky Addons for Elementor: desde n/a hasta 2.5.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50434.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50434.json index 382daeeb8c4..037eba09c6e 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50434.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50434.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50434", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:06.577", - "lastModified": "2024-10-28T20:15:06.577", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme Horse NewsCard.This issue affects NewsCard: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Theme Horse NewsCard. Este problema afecta a NewsCard: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50435.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50435.json index 20b6cecf609..6dba232ea6a 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50435.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50435.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50435", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:06.810", - "lastModified": "2024-10-28T20:15:06.810", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme Horse Meta News.This issue affects Meta News: from n/a through 1.1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Theme Horse Meta News. Este problema afecta a Meta News: desde n/a hasta 1.1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50436.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50436.json index 091367748fc..ee6938ebaf5 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50436.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50436.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50436", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:07.030", - "lastModified": "2024-10-28T20:15:07.030", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme Horse Clean Retina.This issue affects Clean Retina: from n/a through 3.0.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Theme Horse Clean Retina. Este problema afecta a Clean Retina: desde n/a hasta 3.0.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50437.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50437.json index 5aa9c6138bc..7b60f303923 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50437.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50437.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50437", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T19:15:14.750", - "lastModified": "2024-10-28T19:15:14.750", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AyeCode GeoDirectory allows Stored XSS.This issue affects GeoDirectory: from n/a through 2.3.80." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en AyeCode GeoDirectory permite XSS almacenado. Este problema afecta a GeoDirectory: desde n/a hasta 2.3.80." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50438.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50438.json index c0523e656f5..c450dab15fc 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50438.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50438.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50438", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:05.100", - "lastModified": "2024-10-28T18:15:05.100", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Andy Moyle Church Admin allows Reflected XSS.This issue affects Church Admin: from n/a before 5.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Andy Moyle Church Admin permite XSS reflejado. Este problema afecta a Church Admin: desde n/a antes de 5.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50439.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50439.json index a132fba0e04..e52fb21c173 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50439.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50439.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50439", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:05.323", - "lastModified": "2024-10-28T18:15:05.323", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Astra Widgets allows Stored XSS.This issue affects Astra Widgets: from n/a through 1.2.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Brainstorm Force Astra Widgets permite XSS almacenado. Este problema afecta a Astra Widgets: desde n/a hasta 1.2.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50440.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50440.json index b94312527e7..abbcb2f42e2 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50440.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50440.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50440", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:05.567", - "lastModified": "2024-10-28T18:15:05.567", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chris Coyier CodePen Embedded Pens Shortcode allows Stored XSS.This issue affects CodePen Embedded Pens Shortcode: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Chris Coyier CodePen Embedded Pens Shortcode permite XSS almacenado. Este problema afecta a CodePen Embedded Pens Shortcode: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50441.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50441.json index d35a0202093..c074bacc990 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50441.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50441.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50441", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:05.790", - "lastModified": "2024-10-28T18:15:05.790", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CozyThemes Cozy Blocks allows Stored XSS.This issue affects Cozy Blocks: from n/a through 2.0.15." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CozyThemes Cozy Blocks permite XSS almacenado. Este problema afecta a Cozy Blocks: desde n/a hasta 2.0.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50443.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50443.json index 2e964b2207b..83534284e5a 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50443.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50443.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50443", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T14:15:04.920", - "lastModified": "2024-10-28T14:35:12.707", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Post Grid Team by WPXPO PostX allows Stored XSS.This issue affects PostX: from n/a through 4.1.12." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Post Grid Team de WPXPO PostX permite XSS almacenado. Este problema afecta a PostX: desde n/a hasta 4.1.12." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50445.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50445.json index ae88b331d22..439edbb405b 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50445.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50445.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50445", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:06.000", - "lastModified": "2024-10-28T18:15:06.000", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Merkulove Selection Lite allows Stored XSS.This issue affects Selection Lite: from n/a through 1.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Merkulove Selection Lite permite XSS almacenado. Este problema afecta a Selection Lite: desde n/a hasta 1.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50446.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50446.json index c7f678a1781..55ed7c1e019 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50446.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50446.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50446", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:06.203", - "lastModified": "2024-10-28T18:15:06.203", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FuturioWP Futurio Extra allows Stored XSS.This issue affects Futurio Extra: from n/a through 2.0.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en FuturioWP Futurio Extra permite XSS almacenado. Este problema afecta a Futurio Extra: desde n/a hasta 2.0.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50447.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50447.json index 1a768a1d432..dfbaa1e7acf 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50447.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50447.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50447", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:06.473", - "lastModified": "2024-10-28T18:15:06.473", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EnvoThemes Envo's Elementor Templates & Widgets for WooCommerce allows Stored XSS.This issue affects Envo's Elementor Templates & Widgets for WooCommerce: from n/a through 1.4.19." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en EnvoThemes Envo's Elementor Templates & Widgets for WooCommerce permiten XSS almacenados. Este problema afecta a las plantillas y widgets Elementor de Envo para WooCommerce: desde n/a hasta 1.4.19." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50448.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50448.json index e5e0ad3b7cf..c44dd7da2ed 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50448.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50448.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50448", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:06.707", - "lastModified": "2024-10-28T18:15:06.707", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Reflected XSS.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.14.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en YITH YITH WooCommerce Product Add-Ons permite XSS reflejado. Este problema afecta a YITH WooCommerce Product Add-Ons: desde n/a hasta 4.14.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50449.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50449.json index dc7be19d125..1082b1fb884 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50449.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50449.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50449", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:06.907", - "lastModified": "2024-10-28T18:15:06.907", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RedefiningTheWeb PDF Generator Addon for Elementor Page Builder allows Stored XSS.This issue affects PDF Generator Addon for Elementor Page Builder: from n/a through 1.7.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en RedefiningTheWeb PDF Generator Addon for Elementor Page Builder permite XSS almacenado. Este problema afecta al complemento generador de PDF para Elementor Page Builder: desde n/a hasta 1.7.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json index 4578012946a..0b5419221e6 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50451.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50451", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.123", - "lastModified": "2024-10-28T18:15:07.123", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Stored XSS.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) permite XSS almacenado. Este problema afecta al filtro de metadatos y taxonom\u00edas de WordPress (MDTF): desde n/a hasta 1.3.3.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json index 884c8e8c060..7b7d945fcfc 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50453", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:07.463", - "lastModified": "2024-10-28T20:15:07.463", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Relative Path Traversal vulnerability in Webangon The Pack Elementor addons allows PHP Local File Inclusion.This issue affects The Pack Elementor addons: from n/a through 2.0.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Relative Path Traversal en Webangon The Pack Elementor addons permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a los complementos The Pack Elementor: desde n/a hasta 2.0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50457.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50457.json index 24bb31525ee..93f13d53f47 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50457.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50457.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50457", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:07.713", - "lastModified": "2024-10-28T20:15:07.713", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": ":Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Qode Interactive Qode Essential Addons. Este problema afecta a Qode Essential Addons: desde n/a hasta 1.6.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json index d7ead1a99ca..a23992e1be4 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50458.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50458", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.327", - "lastModified": "2024-10-28T18:15:07.327", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Codeus Advanced Sermons allows Stored XSS.This issue affects Advanced Sermons: from n/a through 3.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WP Codeus Advanced Sermons permite XSS almacenado. Este problema afecta a Advanced Sermons: desde n/a hasta 3.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json index 284265d8754..c96c9df92c3 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50460.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50460", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.537", - "lastModified": "2024-10-28T18:15:07.537", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FirelightWP Firelight Lightbox allows Stored XSS.This issue affects Firelight Lightbox: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en FirelightWP Firelight Lightbox permite XSS almacenado. Este problema afecta a Firelight Lightbox: desde n/a hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json index ff5a94e051e..cf8e44460c6 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50461.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50461", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.737", - "lastModified": "2024-10-28T18:15:07.737", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper EmbedPress allows Stored XSS.This issue affects EmbedPress: from n/a through 4.0.14." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WPDeveloper EmbedPress permite XSS almacenado. Este problema afecta a EmbedPress: desde n/a hasta 4.0.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50462.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50462.json index 61496dc8231..8ff42cc6bf0 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50462.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50462.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50462", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:07.953", - "lastModified": "2024-10-28T18:15:07.953", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fla-shop Interactive World Map allows Stored XSS.This issue affects Interactive World Map: from n/a through 3.4.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Fla-shop Interactive World Map permite XSS almacenado. Este problema afecta a Interactive World Map: desde n/a hasta 3.4.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50464.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50464.json index 1722bac26e2..e4c5dcf0a12 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50464.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50464.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50464", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:08.163", - "lastModified": "2024-10-28T18:15:08.163", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Kodex Posts likes de Pierre Lebedel permite XSS almacenado. Este problema afecta a Kodex Posts likes: desde n/a hasta 2.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50467.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50467.json index f1c2552e0b8..921d8540fea 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50467.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50467.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50467", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:08.370", - "lastModified": "2024-10-28T18:15:08.370", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebXApp Scrollbar by webxapp \u2013 Best vertical/horizontal scrollbars plugin allows Stored XSS.This issue affects Scrollbar by webxapp \u2013 Best vertical/horizontal scrollbars plugin: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WebXApp Scrollbar by webxapp \u2013 Best vertical/horizontal scrollbars permite XSS almacenado. Este problema afecta a Scrollbar de webxapp \u2013 El mejor complemento de barras de desplazamiento verticales/horizontales: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50468.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50468.json index c213b0abdca..c920fa924aa 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50468.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50468.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50468", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:08.570", - "lastModified": "2024-10-28T18:15:08.570", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Robinson Raptor Editor allows DOM-Based XSS.This issue affects Raptor Editor: from n/a through 1.0.20." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Michael Robinson Raptor Editor permite XSS basado en DOM. Este problema afecta a Raptor Editor: desde n/a hasta 1.0.20." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50469.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50469.json index 38bfeda7fbb..d86023a2778 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50469.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50469.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50469", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T18:15:08.770", - "lastModified": "2024-10-28T18:15:08.770", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Team Bright Vessel Textboxes allows DOM-Based XSS.This issue affects Textboxes: from n/a through 0.1.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Team Bright Vessel Textboxes permite XSS basado en DOM. Este problema afecta a los cuadros de texto: desde n/a hasta 0.1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50473.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50473.json index f660e96ca79..a00876b2742 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50473.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50473.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50473", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:10.977", - "lastModified": "2024-10-29T09:15:10.977", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Ajar Productions Ajar in5 Embed allows Upload a Web Shell to a Web Server.This issue affects Ajar in5 Embed: from n/a through 3.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Ajar Productions Ajar in5 Embed permite cargar un shell web a un servidor web. Este problema afecta a Ajar in5 Embed: desde n/a hasta 3.1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50475.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50475.json index 804c9f95304..dcf8e86d699 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50475.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50475.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50475", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:11.203", - "lastModified": "2024-10-29T09:15:11.203", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Scott Gamon Signup Page allows Privilege Escalation.This issue affects Signup Page: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Scott Gamon Signup Page permite la escalada de privilegios. Este problema afecta a la p\u00e1gina de registro: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50476.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50476.json index 17db1329127..20a72c3b6d5 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50476.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50476.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50476", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:11.533", - "lastModified": "2024-10-29T09:15:11.533", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in GR\u00dcN Software Group GmbH GR\u00dcN spendino Spendenformular allows Privilege Escalation.This issue affects GR\u00dcN spendino Spendenformular: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en GR\u00dcN Software Group GmbH GR\u00dcN spendino Spendenformular permite la escalada de privilegios. Este problema afecta a GR\u00dcN spendino Spendenformular: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50480.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50480.json index 12d7e0a8ed8..1196ace22dc 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50480.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50480.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50480", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T08:15:12.767", - "lastModified": "2024-10-29T08:15:12.767", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in azexo Marketing Automation by AZEXO allows Upload a Web Shell to a Web Server.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso azexo Marketing Automation by AZEXO permite cargar un shell web a un servidor web. Este problema afecta a Marketing Automation de AZEXO: desde n/a hasta la versi\u00f3n 1.27.80." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50481.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50481.json index 9d08d63fc2d..7a3414badad 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50481.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50481.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50481", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:11.787", - "lastModified": "2024-10-29T09:15:11.787", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Stack Themes Bstone Demo Importer allows Privilege Escalation.This issue affects Bstone Demo Importer: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Stack Themes Bstone Demo Importer permite la escalada de privilegios. Este problema afecta a Bstone Demo Importer: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50482.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50482.json index a87a8a465ff..f2800db7582 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50482.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50482.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50482", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T08:15:13.010", - "lastModified": "2024-10-29T08:15:13.010", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Chetan Khandla Woocommerce Product Design allows Upload a Web Shell to a Web Server.This issue affects Woocommerce Product Design: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Chetan Khandla Woocommerce Product Design permite cargar un shell web a un servidor web. Este problema afecta a Woocommerce Product Design: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50484.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50484.json index aa0698e1f0f..f549e1b8464 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50484.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50484.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50484", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T08:15:13.237", - "lastModified": "2024-10-29T08:15:13.237", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in mahlamusa Multi Purpose Mail Form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en mahlamusa Multi Purpose Mail Form permite cargar un shell web a un servidor web. Este problema afecta al formulario de correo multiprop\u00f3sito: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50485.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50485.json index 83cbbb45404..f8595fd08a3 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50485.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50485.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50485", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:12.137", - "lastModified": "2024-10-29T09:15:12.137", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Incorrect Privilege Assignment vulnerability in Udit Rawat Exam Matrix allows Privilege Escalation.This issue affects Exam Matrix: from n/a through 1.5." + }, + { + "lang": "es", + "value": ":La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Udit Rawat Exam Matrix permite la escalada de privilegios. Este problema afecta a Exam Matrix: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50490.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50490.json index 3ffceb9f8f5..e9d7242237f 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50490.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50490.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50490", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T09:15:12.497", - "lastModified": "2024-10-29T09:15:12.497", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Szabolcs Szecsenyi PegaPoll allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects PegaPoll: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Szabolcs Szecsenyi PegaPoll permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a PegaPoll: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50493.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50493.json index da99b61b30f..ac40958aabd 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50493.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50493.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50493", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T08:15:13.457", - "lastModified": "2024-10-29T08:15:13.457", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in masterhomepage Automatic Translation allows Upload a Web Shell to a Web Server.This issue affects Automatic Translation: from n/a through 1.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en masterhomepage Automatic Translation permite cargar un shell web a un servidor web. Este problema afecta a la traducci\u00f3n autom\u00e1tica: desde n/a hasta 1.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50494.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50494.json index 96ed835e2fb..ba83b596040 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50494.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50494.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50494", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T08:15:13.690", - "lastModified": "2024-10-29T08:15:13.690", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Amin Omer Sudan Payment Gateway for WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Sudan Payment Gateway for WooCommerce: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Amin Omer Sudan Payment Gateway para WooCommerce permite cargar un shell web a un servidor web. Este problema afecta a Sudan Payment Gateway para WooCommerce: desde n/a hasta 1.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50495.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50495.json index 0c1235a788c..fceb86b0cb1 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50495.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50495.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50495", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T21:15:09.800", - "lastModified": "2024-10-28T21:15:09.800", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in WidgiLabs Plugin Propagator allows Upload a Web Shell to a Web Server.This issue affects Plugin Propagator: from n/a through 0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en WidgiLabs Plugin Propagator permite cargar un shell web a un servidor web. Este problema afecta al complemento Propagator: desde n/a hasta 0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50496.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50496.json index 06e6eef77a2..d9dbbacffb5 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50496.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50496.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50496", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T21:15:10.057", - "lastModified": "2024-10-28T21:15:10.057", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Web and Print Design AR For WordPress allows Upload a Web Shell to a Web Server.This issue affects AR For WordPress: from n/a through 6.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Web and Print Design AR For WordPress permite cargar un shell web a un servidor web. Este problema afecta a AR For WordPress: desde n/a hasta 6.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json index 1b56923fd3e..a39d9c21214 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50550.json @@ -2,13 +2,17 @@ "id": "CVE-2024-50550", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T10:15:04.663", - "lastModified": "2024-10-29T10:15:04.663", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from n/a through 6.5.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en LiteSpeed Technologies LiteSpeed Cache permite la escalada de privilegios. Este problema afecta a LiteSpeed Cache: desde n/a hasta 6.5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json new file mode 100644 index 00000000000..fff2bf56fe9 --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51075", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-29T14:15:08.080", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /odms/admin/user-search.php in PHPGurukul Online DJ Booking Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Online%20DJ%20Booking/DJ%20online%20Cross%20Site%20Scripting%20%20u.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json new file mode 100644 index 00000000000..ef714cff84c --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51076", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-29T14:15:08.183", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /odms/admin/booking-search.php in PHPGurukul Online DJ Booking Management System 1.0, which allows remote attackers to execute arbitrary code via the \"searchdata\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Online%20DJ%20Booking/Reflected%20Cross%20Site%20Scripting%20b.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json new file mode 100644 index 00000000000..363f592c5be --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51180", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-29T13:15:07.190", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifscfinder/index.php in PHPGurukul IFSC Code Finder Project v1.0, which allows remote attackers to execute arbitrary code via the \"searchifsccode\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/IFSC%20Code%20Finder/IFSC%20Code%20Finder%20do.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json new file mode 100644 index 00000000000..37c10ba462a --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51181", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-29T13:15:07.297", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifscfinder/admin/profile.php in PHPGurukul IFSC Code Finder Project v1.0, which allows remote attackers to execute arbitrary code via \" searchifsccode\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/IFSC%20Code%20Finder/IFSC%20Code%20Finder%20Admin.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json index be228fb1f04..d3bc1d815e0 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51506", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.667", - "lastModified": "2024-10-28T23:15:02.667", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tiki through 27.0 allows users who have certain permissions to insert a \"Create a Wiki Pages\" stored XSS payload in the description." + }, + { + "lang": "es", + "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado \"Crear una p\u00e1gina Wiki\" en la descripci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json index 0ac98f07591..1dd4774e700 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51507", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.753", - "lastModified": "2024-10-28T23:15:02.753", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tiki through 27.0 allows users who have certain permissions to insert a \"Create/Edit External Wiki\" stored XSS payload in the Name." + }, + { + "lang": "es", + "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado \"Crear/Editar Wiki Externo\" en el Nombre." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json index 61be4437278..0cd1e20a437 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51508", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.837", - "lastModified": "2024-10-28T23:15:02.837", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tiki through 27.0 allows users who have certain permissions to insert a \"Create/Edit External Wiki\" stored XSS payload in the Index." + }, + { + "lang": "es", + "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado \"Crear/Editar Wiki Externo\" en el \u00cdndice." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json index 571790533fe..ae5ef050d79 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51509", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.907", - "lastModified": "2024-10-28T23:15:02.907", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tiki through 27.0 allows users who have certain permissions to insert a \"Modules\" (aka tiki-admin_modules.php) stored XSS payload in the Name." + }, + { + "lang": "es", + "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado en \"M\u00f3dulos\" (tambi\u00e9n conocido como tiki-admin_modules.php) en el Nombre." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5532.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5532.json index 11e678da529..39fed43f5b3 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5532.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5532.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5532", "sourceIdentifier": "security@opentext.com", "published": "2024-10-28T19:15:15.010", - "lastModified": "2024-10-28T19:15:15.010", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText\u2122 Operations Agent.\u00a0\n\nThe XSS vulnerability could allow an attacker with local admin permissions to manipulate the content of the internal status page of the Agent on the local system. \n\nThis issue affects Operations Agent: 12.20, 12.21, 12.22, 12.23, 12.24, 12.25, 12.26." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en OpenText\u2122 Operations Agent. La vulnerabilidad XSS podr\u00eda permitir que un atacante con permisos de administrador local manipule el contenido de la p\u00e1gina de estado interna del agente en el sistema local. Este problema afecta a Operations Agent: 12.20, 12.21, 12.22, 12.23, 12.24, 12.25, 12.26." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5823.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5823.json new file mode 100644 index 00000000000..7ada9159a9f --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5823.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-5823", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:07.380", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions <= 20240410. This vulnerability allows an attacker to gain unauthorized access to overwrite critical configuration files within the system. Exploiting this vulnerability can lead to unauthorized changes in system behavior or security settings. Additionally, tampering with these configuration files can result in a denial of service (DoS) condition, disrupting normal system operation." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/720c23d755a4a955dcb0a54e8c200a2247a27f8b", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/ca361701-7d68-4df6-8da0-caad4b85b9ae", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json new file mode 100644 index 00000000000..ce84494dad4 --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5982.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-5982", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:07.637", + "lastModified": "2024-10-29T14:35:20.400", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/base_model.py allows arbitrary file uploads, potentially leading to remote code execution (RCE). The get_history_names function in utils.py permits arbitrary directory creation. Additionally, the load_template function in utils.py can be exploited to leak the first column of CSV files. These issues stem from improper sanitization of user inputs concatenated with directory paths using os.path.join." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/952fc8c3cbacead858311747cddd4bedcb4721d7", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/5d5c5356-e893-44d1-b5ca-642aa05d96bb", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json index d078aa54fc1..64722e98613 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6245.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6245", "sourceIdentifier": "cve@asrg.io", "published": "2024-10-28T17:15:04.780", - "lastModified": "2024-10-28T17:15:04.780", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of Default Credentials vulnerability in Maruti Suzuki SmartPlay on Linux (Infotainment Hub modules) allows attacker to try common or default usernames and passwords.The issue was detected on a 2022 Maruti Suzuki Brezza in India Market.\n\nThis issue affects SmartPlay: 66T0.05.50." + }, + { + "lang": "es", + "value": "La vulnerabilidad de uso de credenciales predeterminadas en Maruti Suzuki SmartPlay en Linux (m\u00f3dulos Infotainment Hub) permite a un atacante probar nombres de usuario y contrase\u00f1as comunes o predeterminados. El problema se detect\u00f3 en un Maruti Suzuki Brezza 2022 en el mercado de la India. Este problema afecta a SmartPlay: 66T0.05.50." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6581.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6581.json new file mode 100644 index 00000000000..982f780917a --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6581.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6581", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:07.840", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code execution. The sanitize_svg function only removes script elements and 'on*' event attributes, but does not account for other potential vectors for XSS within SVG files. This vulnerability can be exploited when authorized users access a malicious URL containing the crafted SVG file." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/parisneo/lollms/commit/328b960a0de2097e13654ac752253e9541521ddd", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/ad68ecd6-44e2-449b-8e7e-f2b71b1b43c7", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6673.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6673.json new file mode 100644 index 00000000000..383b8e1805c --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6673.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6673", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:08.040", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the `install_comfyui` endpoint of the `lollms_comfyui.py` file in the parisneo/lollms-webui repository, versions v9.9 to the latest. The endpoint uses the GET method without requiring a client ID, allowing an attacker to trick a victim into installing ComfyUI. If the victim's device does not have sufficient capacity, this can result in a crash." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/parisneo/lollms-webui/commit/c1bb1ad19752aa7541675b398495eaf98fd589f1", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/a38f9a7d-b357-427d-adac-f9654d8c0e3c", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6674.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6674.json new file mode 100644 index 00000000000..f9b9013052c --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6674.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6674", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:08.263", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CORS misconfiguration in parisneo/lollms-webui prior to version 10 allows attackers to steal sensitive information such as logs, browser sessions, and settings containing private API keys from other services. This vulnerability can also enable attackers to perform actions on behalf of a user, such as deleting a project or sending a message. The issue impacts the confidentiality and integrity of the information." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/parisneo/lollms-webui/commit/c1bb1ad19752aa7541675b398495eaf98fd589f1", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/e688f71b-a3a4-4f6d-b48a-837073fa6908", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json new file mode 100644 index 00000000000..14ae80573c6 --- /dev/null +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6868.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6868", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:08.473", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mudler/localai/commit/a181dd0ebc5d3092fc50f61674d552604fe8ef9c", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/752d2376-2d9a-4e17-b462-3c267f9dd229", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json new file mode 100644 index 00000000000..4090b53d728 --- /dev/null +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7010.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7010", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:08.683", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mudler/localai/commit/db1159b6511e8fa09e594f9db0fec6ab4e142468", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/e286ed00-6383-47de-b5bc-9b9fad67c362", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7042.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7042.json new file mode 100644 index 00000000000..9050be46313 --- /dev/null +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7042.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7042", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:08.883", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.5 and all versions with this class allows for prompt injection, leading to SQL injection. This vulnerability permits unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/langchain-ai/langchainjs/commit/615b9d9ab30a2d23a2f95fb8d7acfdf4b41ad7a6", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/b612defb-1104-4fff-9fef-001ab07c7b2d", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7472.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7472.json new file mode 100644 index 00000000000..d6f49ffb138 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7472.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7472", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:09.093", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \\xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lunary-ai/lunary/commit/a39837d7c49936a0c435d241f37ca2ea7904d2cd", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/dc1feec6-1efb-4538-9b56-ab25deb80948", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json new file mode 100644 index 00000000000..fe7c621c30b --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7473", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:09.320", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An IDOR vulnerability exists in the 'Evaluations' function of the 'umgws datasets' section in lunary-ai/lunary versions 1.3.2. This vulnerability allows an authenticated user to update other users' prompts by manipulating the 'id' parameter in the request. The issue is fixed in version 1.4.3." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lunary-ai/lunary/commit/88b55b01fcbab0fbbc5b8032a38d0345af98ecfa", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/afecd927-b5f6-44ba-9147-5c45091beda5", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json new file mode 100644 index 00000000000..62d2fe59707 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-7474", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:09.530", + "lastModified": "2024-10-29T14:35:21.207", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Reference (IDOR) vulnerability exists. A user can view or delete external users by manipulating the 'id' parameter in the request URL. The application does not perform adequate checks on the 'id' parameter, allowing unauthorized access to external user data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/95d8b993-3347-4ef5-a2b3-1f57219b7871", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7475.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7475.json new file mode 100644 index 00000000000..dc0c40e7b9f --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7475.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-7475", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:09.737", + "lastModified": "2024-10-29T14:35:21.403", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper access control vulnerability in lunary-ai/lunary version 1.3.2 allows an attacker to update the SAML configuration without authorization. This vulnerability can lead to manipulation of authentication processes, fraudulent login requests, and theft of user information. Appropriate access controls should be implemented to ensure that the SAML configuration can only be updated by authorized users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/78c824f7-3b6d-443d-bb76-0f8031c6c126", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json new file mode 100644 index 00000000000..644a8659705 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7774", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:09.930", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-29" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/langchain-ai/langchainjs/commit/a0fad77d6b569e5872bd4a9d33be0c0785e538a9", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/8fe40685-b714-4191-af7a-3de5e5628cee", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json new file mode 100644 index 00000000000..70a050ff259 --- /dev/null +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7783", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:10.137", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mintplex-labs/anything-llm version latest contains a vulnerability where sensitive information, specifically a password, is improperly stored within a JWT (JSON Web Token) used as a bearer token in single user mode. When decoded, the JWT reveals the password in plaintext. This improper storage of sensitive information poses significant security risks, as an attacker who gains access to the JWT can easily decode it and retrieve the password. The issue is fixed in version 1.0.3." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mintplex-labs/anything-llm/commit/4430ddb05988470bc8f0479e7d07db1f7d4646ba", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/20e9950f-ad41-4d6b-8bd0-c7f7051695b3", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json new file mode 100644 index 00000000000..96ebdb97e0f --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json @@ -0,0 +1,70 @@ +{ + "id": "CVE-2024-7807", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:10.360", + "lastModified": "2024-10-29T14:35:21.773", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/919222d285d73b9dcd71fb34de379eef8c90d175", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/db67276d-36ee-4487-9165-b621c67ef8a3", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json new file mode 100644 index 00000000000..53ca4a1aaf4 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7962", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:10.557", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-29" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/2836fd1db3efcd5ede63c0e7fbbdf677730dbb51", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/83f0a8e1-490c-49e7-b334-02125ee0f1b1", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json new file mode 100644 index 00000000000..44ae9a4ac70 --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8143", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:10.750", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /file endpoint that allows authenticated users to access the chat history of other users. When a user logs in, a directory is created in the history folder with the user's name. By manipulating the /file endpoint, an authenticated user can enumerate and access files in other users' directories, leading to unauthorized access to private chat histories. This vulnerability can be exploited to read any user's private chat history." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1057" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/ccc7479ace5c9e1a1d9f4daf2e794ffd3865fc2b", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/71c5ea4b-524a-4173-8fd4-2fbabd69502e", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8309.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8309.json new file mode 100644 index 00000000000..01c0eda140b --- /dev/null +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8309.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8309", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-10-29T13:15:10.950", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/langchain-ai/langchain/commit/c2a3021bb0c5f54649d380b42a0684ca5778c255", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json index 66c516a68c1..31b9ad1bafc 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8740", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:05.437", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T14:46:02.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GetResponse Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento GetResponse Forms de Optin Cat para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.5.6 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fatcatapps:getresponse_forms:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.6", + "matchCriteriaId": "C4A10128-24EA-4C17-BB86-EB626999375C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/getresponse/tags/2.4.1/includes/eoi-subscribers.php#L353", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/51d14f45-4c30-4225-998d-f4f829e09bc0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json index 77c719f94a9..cf5d81142c6 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8790", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:05.647", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T14:44:59.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Share With Floating Bar plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Social Share With Floating Bar para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.0.3 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeinwp:social_share_with_floating_bar:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.0.3", + "matchCriteriaId": "4676569A-0507-488D-8AFC-875484B22797" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/social-share-with-floating-bar/tags/1.0.3/inc/class-social-share-with-floating-bar-settings.php#L312", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec35484-8561-4a8c-bf67-0a880f915fb1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json index b9eac2b0328..e9e3edce826 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json @@ -2,20 +2,44 @@ "id": "CVE-2024-8916", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:05.857", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T14:37:42.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Suki Sites Import plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Suki Sites Import para WordPress es vulnerable a Cross-Site Scripting Almacenado mediante cargas de archivos SVG en todas las versiones hasta la 1.2.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sukiwp:suki_sites_import:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.1", + "matchCriteriaId": "43A09933-F0CF-4C77-B6C4-6F6466CD7E06" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/suki-sites-import/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c6dd146-a99e-4317-a703-de34735317c8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json index b47d01dcfbf..9edb20cf7d8 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9350", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:06.070", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T13:44:03.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DPD Baltic Shipping plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_value' parameter in all versions up to, and including, 1.2.83 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento DPD Baltic Shipping para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'search_value' en todas las versiones hasta la 1.2.83 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dpd:dpd_baltic_shipping:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.83", + "matchCriteriaId": "291D0F94-2CFE-417E-96D6-D2E77ACD1733" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/woo-shipping-dpd-baltic/trunk/includes/class-dpd.php#L318", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6251d0f6-b536-4122-8fdf-bb77665a4f41?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9376.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9376.json index e7db8d4180f..27785f763bc 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9376.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9376", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T10:15:04.880", - "lastModified": "2024-10-29T10:15:04.880", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9438.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9438.json index 09a08c1957f..d27f4b0be58 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9438.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9438.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9438", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T09:15:12.753", - "lastModified": "2024-10-29T09:15:12.753", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SEUR Oficial plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'change_service' parameter in all versions up to, and including, 2.2.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento SEUR Oficial para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'change_service' en todas las versiones hasta la 2.2.11 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json new file mode 100644 index 00000000000..8db883f2c0e --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-9505", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-29T14:15:08.500", + "lastModified": "2024-10-29T14:34:04.427", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3177345/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/beaver-builder-lite-version/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cfab048-efc6-4c7c-a1bd-0a9daf8779bc?source=cve", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wpbeaverbuilder.com/change-logs/", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json index c854dd83601..2212bf78d68 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9593.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9593", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T18:15:04.540", - "lastModified": "2024-10-21T17:10:22.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T13:40:23.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 } ] }, @@ -51,18 +71,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpplugin:time_clock:*:*:*:*:pro:wordpress:*:*", + "versionEndIncluding": "1.1.4", + "matchCriteriaId": "B057E167-BA8B-4556-924E-9F1641ABB35F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpplugin:time_clock:*:*:*:*:-:wordpress:*:*", + "versionEndIncluding": "1.2.2", + "matchCriteriaId": "C1CE6396-E04F-47F3-B8D0-E1A0CB2DEEB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/time-clock/tags/1.2.2/includes/admin/ajax_functions_admin.php#L58", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3171046/time-clock#file40", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/247e599a-74e2-41d5-a1ba-978a807e6544?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9629.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9629.json index eb7159f8bd0..aa3a0961f14 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9629.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9629.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9629", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-28T18:15:09.040", - "lastModified": "2024-10-28T18:15:09.040", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Contact Form 7 + Telegram plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'wpcf7_Telegram::ajax' function in versions up to, and including, 0.8.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to approve, pause and refuse subscriptions." + }, + { + "lang": "es", + "value": "El complemento Contact Form 7 + Telegram para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos y a la p\u00e9rdida de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n 'wpcf7_Telegram::ajax' en versiones hasta la 0.8.5 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, aprueben, pausen y rechacen suscripciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9825.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9825.json index 0d8d2accb62..63def6d7aca 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9825.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9825.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9825", "sourceIdentifier": "security@progress.com", "published": "2024-10-28T19:15:15.170", - "lastModified": "2024-10-28T19:15:15.170", - "vulnStatus": "Received", + "lastModified": "2024-10-29T14:34:50.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Chef Habitat builder-api on-prem-builder package \u00a0with any version lower than habitat/builder-api/10315/20240913162802 is vulnerable to indirect object reference (IDOR) by un-authorized deletion of personal token. \u00a0Habitat builder consumes builder-api habitat package as a dependency and the vulnerability was specifically due to builder-api habitat package.\n\nThe fix was made available in habitat/builder-api/10315/20240913162802\u00a0and all the subsequent versions after that. We would recommend user to always use on-prem stable channel." + }, + { + "lang": "es", + "value": "El paquete de compilaci\u00f3n local de Chef Habitat builder-api con cualquier versi\u00f3n anterior a la de h\u00e1bitat/builder-api/10315/20240913162802 es vulnerable a una referencia indirecta a objetos (IDOR) mediante la eliminaci\u00f3n no autorizada del token personal. Habitat Builder consume el paquete de compilaci\u00f3n local builder-api como una dependencia y la vulnerabilidad se debi\u00f3 espec\u00edficamente al paquete de compilaci\u00f3n local builder-api. La soluci\u00f3n se puso a disposici\u00f3n en h\u00e1bitat/builder-api/10315/20240913162802 y todas las versiones posteriores. Recomendamos a los usuarios que siempre utilicen el canal estable local." } ], "metrics": { diff --git a/README.md b/README.md index ba9207c7b87..f2ee51e4c3e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-29T13:00:19.603254+00:00 +2024-10-29T15:00:51.520398+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-29T12:15:06.980000+00:00 +2024-10-29T14:49:04.463000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267493 +267543 ``` ### CVEs added in the last Commit -Recently added CVEs: `31` +Recently added CVEs: `50` -- [CVE-2024-10360](CVE-2024/CVE-2024-103xx/CVE-2024-10360.json) (`2024-10-29T11:15:03.797`) -- [CVE-2024-49646](CVE-2024/CVE-2024-496xx/CVE-2024-49646.json) (`2024-10-29T12:15:03.690`) -- [CVE-2024-49647](CVE-2024/CVE-2024-496xx/CVE-2024-49647.json) (`2024-10-29T12:15:03.930`) -- [CVE-2024-49648](CVE-2024/CVE-2024-496xx/CVE-2024-49648.json) (`2024-10-29T12:15:04.153`) -- [CVE-2024-49650](CVE-2024/CVE-2024-496xx/CVE-2024-49650.json) (`2024-10-29T12:15:04.380`) -- [CVE-2024-49651](CVE-2024/CVE-2024-496xx/CVE-2024-49651.json) (`2024-10-29T12:15:04.597`) -- [CVE-2024-49654](CVE-2024/CVE-2024-496xx/CVE-2024-49654.json) (`2024-10-29T12:15:04.827`) -- [CVE-2024-49656](CVE-2024/CVE-2024-496xx/CVE-2024-49656.json) (`2024-10-29T12:15:05.073`) -- [CVE-2024-49659](CVE-2024/CVE-2024-496xx/CVE-2024-49659.json) (`2024-10-29T12:15:05.330`) -- [CVE-2024-49660](CVE-2024/CVE-2024-496xx/CVE-2024-49660.json) (`2024-10-29T12:15:05.570`) -- [CVE-2024-49661](CVE-2024/CVE-2024-496xx/CVE-2024-49661.json) (`2024-10-29T12:15:05.793`) -- [CVE-2024-49662](CVE-2024/CVE-2024-496xx/CVE-2024-49662.json) (`2024-10-29T12:15:06.037`) -- [CVE-2024-49663](CVE-2024/CVE-2024-496xx/CVE-2024-49663.json) (`2024-10-29T12:15:06.290`) -- [CVE-2024-49664](CVE-2024/CVE-2024-496xx/CVE-2024-49664.json) (`2024-10-29T12:15:06.517`) -- [CVE-2024-49665](CVE-2024/CVE-2024-496xx/CVE-2024-49665.json) (`2024-10-29T12:15:06.753`) -- [CVE-2024-49667](CVE-2024/CVE-2024-496xx/CVE-2024-49667.json) (`2024-10-29T12:15:06.980`) -- [CVE-2024-49670](CVE-2024/CVE-2024-496xx/CVE-2024-49670.json) (`2024-10-29T11:15:04.017`) -- [CVE-2024-49672](CVE-2024/CVE-2024-496xx/CVE-2024-49672.json) (`2024-10-29T11:15:04.223`) -- [CVE-2024-49673](CVE-2024/CVE-2024-496xx/CVE-2024-49673.json) (`2024-10-29T11:15:04.410`) -- [CVE-2024-49678](CVE-2024/CVE-2024-496xx/CVE-2024-49678.json) (`2024-10-29T11:15:04.607`) -- [CVE-2024-49679](CVE-2024/CVE-2024-496xx/CVE-2024-49679.json) (`2024-10-29T11:15:04.813`) -- [CVE-2024-49692](CVE-2024/CVE-2024-496xx/CVE-2024-49692.json) (`2024-10-29T11:15:05.017`) -- [CVE-2024-50407](CVE-2024/CVE-2024-504xx/CVE-2024-50407.json) (`2024-10-29T11:15:05.237`) -- [CVE-2024-50409](CVE-2024/CVE-2024-504xx/CVE-2024-50409.json) (`2024-10-29T11:15:05.460`) -- [CVE-2024-50410](CVE-2024/CVE-2024-504xx/CVE-2024-50410.json) (`2024-10-29T11:15:05.657`) +- [CVE-2024-49643](CVE-2024/CVE-2024-496xx/CVE-2024-49643.json) (`2024-10-29T13:15:06.743`) +- [CVE-2024-49645](CVE-2024/CVE-2024-496xx/CVE-2024-49645.json) (`2024-10-29T13:15:06.960`) +- [CVE-2024-51075](CVE-2024/CVE-2024-510xx/CVE-2024-51075.json) (`2024-10-29T14:15:08.080`) +- [CVE-2024-51076](CVE-2024/CVE-2024-510xx/CVE-2024-51076.json) (`2024-10-29T14:15:08.183`) +- [CVE-2024-51180](CVE-2024/CVE-2024-511xx/CVE-2024-51180.json) (`2024-10-29T13:15:07.190`) +- [CVE-2024-51181](CVE-2024/CVE-2024-511xx/CVE-2024-51181.json) (`2024-10-29T13:15:07.297`) +- [CVE-2024-5823](CVE-2024/CVE-2024-58xx/CVE-2024-5823.json) (`2024-10-29T13:15:07.380`) +- [CVE-2024-5982](CVE-2024/CVE-2024-59xx/CVE-2024-5982.json) (`2024-10-29T13:15:07.637`) +- [CVE-2024-6581](CVE-2024/CVE-2024-65xx/CVE-2024-6581.json) (`2024-10-29T13:15:07.840`) +- [CVE-2024-6673](CVE-2024/CVE-2024-66xx/CVE-2024-6673.json) (`2024-10-29T13:15:08.040`) +- [CVE-2024-6674](CVE-2024/CVE-2024-66xx/CVE-2024-6674.json) (`2024-10-29T13:15:08.263`) +- [CVE-2024-6868](CVE-2024/CVE-2024-68xx/CVE-2024-6868.json) (`2024-10-29T13:15:08.473`) +- [CVE-2024-7010](CVE-2024/CVE-2024-70xx/CVE-2024-7010.json) (`2024-10-29T13:15:08.683`) +- [CVE-2024-7042](CVE-2024/CVE-2024-70xx/CVE-2024-7042.json) (`2024-10-29T13:15:08.883`) +- [CVE-2024-7472](CVE-2024/CVE-2024-74xx/CVE-2024-7472.json) (`2024-10-29T13:15:09.093`) +- [CVE-2024-7473](CVE-2024/CVE-2024-74xx/CVE-2024-7473.json) (`2024-10-29T13:15:09.320`) +- [CVE-2024-7474](CVE-2024/CVE-2024-74xx/CVE-2024-7474.json) (`2024-10-29T13:15:09.530`) +- [CVE-2024-7475](CVE-2024/CVE-2024-74xx/CVE-2024-7475.json) (`2024-10-29T13:15:09.737`) +- [CVE-2024-7774](CVE-2024/CVE-2024-77xx/CVE-2024-7774.json) (`2024-10-29T13:15:09.930`) +- [CVE-2024-7783](CVE-2024/CVE-2024-77xx/CVE-2024-7783.json) (`2024-10-29T13:15:10.137`) +- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2024-10-29T13:15:10.360`) +- [CVE-2024-7962](CVE-2024/CVE-2024-79xx/CVE-2024-7962.json) (`2024-10-29T13:15:10.557`) +- [CVE-2024-8143](CVE-2024/CVE-2024-81xx/CVE-2024-8143.json) (`2024-10-29T13:15:10.750`) +- [CVE-2024-8309](CVE-2024/CVE-2024-83xx/CVE-2024-8309.json) (`2024-10-29T13:15:10.950`) +- [CVE-2024-9505](CVE-2024/CVE-2024-95xx/CVE-2024-9505.json) (`2024-10-29T14:15:08.500`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `274` -- [CVE-2024-9376](CVE-2024/CVE-2024-93xx/CVE-2024-9376.json) (`2024-10-29T10:15:04.880`) +- [CVE-2024-50481](CVE-2024/CVE-2024-504xx/CVE-2024-50481.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50482](CVE-2024/CVE-2024-504xx/CVE-2024-50482.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50484](CVE-2024/CVE-2024-504xx/CVE-2024-50484.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50485](CVE-2024/CVE-2024-504xx/CVE-2024-50485.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50490](CVE-2024/CVE-2024-504xx/CVE-2024-50490.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50493](CVE-2024/CVE-2024-504xx/CVE-2024-50493.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50494](CVE-2024/CVE-2024-504xx/CVE-2024-50494.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50495](CVE-2024/CVE-2024-504xx/CVE-2024-50495.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50496](CVE-2024/CVE-2024-504xx/CVE-2024-50496.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-50550](CVE-2024/CVE-2024-505xx/CVE-2024-50550.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-51506](CVE-2024/CVE-2024-515xx/CVE-2024-51506.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-51507](CVE-2024/CVE-2024-515xx/CVE-2024-51507.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-51508](CVE-2024/CVE-2024-515xx/CVE-2024-51508.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-51509](CVE-2024/CVE-2024-515xx/CVE-2024-51509.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-5532](CVE-2024/CVE-2024-55xx/CVE-2024-5532.json) (`2024-10-29T14:34:50.257`) +- [CVE-2024-6245](CVE-2024/CVE-2024-62xx/CVE-2024-6245.json) (`2024-10-29T14:34:50.257`) +- [CVE-2024-8740](CVE-2024/CVE-2024-87xx/CVE-2024-8740.json) (`2024-10-29T14:46:02.103`) +- [CVE-2024-8790](CVE-2024/CVE-2024-87xx/CVE-2024-8790.json) (`2024-10-29T14:44:59.497`) +- [CVE-2024-8916](CVE-2024/CVE-2024-89xx/CVE-2024-8916.json) (`2024-10-29T14:37:42.877`) +- [CVE-2024-9350](CVE-2024/CVE-2024-93xx/CVE-2024-9350.json) (`2024-10-29T13:44:03.897`) +- [CVE-2024-9376](CVE-2024/CVE-2024-93xx/CVE-2024-9376.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-9438](CVE-2024/CVE-2024-94xx/CVE-2024-9438.json) (`2024-10-29T14:34:04.427`) +- [CVE-2024-9593](CVE-2024/CVE-2024-95xx/CVE-2024-9593.json) (`2024-10-29T13:40:23.983`) +- [CVE-2024-9629](CVE-2024/CVE-2024-96xx/CVE-2024-9629.json) (`2024-10-29T14:34:50.257`) +- [CVE-2024-9825](CVE-2024/CVE-2024-98xx/CVE-2024-9825.json) (`2024-10-29T14:34:50.257`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ed35546abcd..859fe572b85 100644 --- a/_state.csv +++ b/_state.csv @@ -4,7 +4,7 @@ CVE-1999-0002,0,0,52ad26bc78bc155140feacd4d850b7ed9051fb5126f4883feb1552eb8bfb60 CVE-1999-0003,0,0,3a125ee5553459e11723b19dc50c18dfd3195cf8dd418ba15cf0249d29090526,2018-10-30T16:26:22.357000 CVE-1999-0004,0,0,f08da57ccc696d31a7cb70b7295a6515680992e2031c9aa9fe117bcc9a4cd3fe,2018-10-12T21:29:02.120000 CVE-1999-0005,0,0,8b017dd50eb7824c23a2900de39cb981ff0974e42c3499b8b54bdd369b7b5e20,2008-09-09T12:33:31.117000 -CVE-1999-0006,0,0,7aef32128af26dd1310817664bae47e1de253ed849bc4797bc574148a32892b7,2024-08-01T19:35:03.600000 +CVE-1999-0006,0,1,48f21e030b02e3518c9b1f40c086ca15a7e4bff1297da6d8fe275b422fd5f503,2024-10-29T14:35:00.930000 CVE-1999-0007,0,0,5667e64786a829159abdd94021a3fe54fd18268a2befb79ceda4747e6e2e83a6,2020-04-02T13:31:03.237000 CVE-1999-0008,0,0,f126f01ab79dda86a2d2b539ee9d9e2b20cb5fea1756509c890b57d81d941634,2018-10-30T16:26:22.357000 CVE-1999-0009,0,0,2ad374e3241b0e0481e637ce2ac40875a9368043e4fbd5a2e3c7019c6ef02a59,2018-10-30T16:26:22.357000 @@ -20,7 +20,7 @@ CVE-1999-0018,0,0,9f125eee321be1905535dae949eaa3bdc345a55047d20826c9103319587eac CVE-1999-0019,0,0,acdcaacf15c2e70b19d8b852d642c54c72eb5a0ab4c515191f9c36763168ce6b,2008-09-09T12:33:32.460000 CVE-1999-0020,0,0,e25596084efd5d8daec7e761cdec745254d557e48519c1e7dad0c6b1abbd0d7e,2023-11-07T01:54:53.530000 CVE-1999-0021,0,0,653c238e42c5cdb47c5c89d523a8a527e70fab9bfb953e6c17d27bf1bc18ac56,2008-09-09T12:33:34.930000 -CVE-1999-0022,0,0,e7cfd1e8f4de7beb61b0fccc451f51e96439df926c34ed68da018a6f148db031,2024-08-01T20:35:03.600000 +CVE-1999-0022,0,1,acba7dbc4ca77e5064998e165b44b59e05f7acac18fb4f78ab1f31e39e84f453,2024-10-29T14:35:02.103000 CVE-1999-0023,0,0,771dbbfe88e214bbf5d2fd04114226719669a7e791cd919f78536f582e8fe6c5,2022-08-17T07:15:08.357000 CVE-1999-0024,0,0,a53bc7b34627be8f46db79df7c0696c41786542e03f20c10b1eb23b1a427183b,2022-08-17T07:15:08.443000 CVE-1999-0025,0,0,6c6407f328012c5416b209d35e346a687d97406b934eb8c868f128082df5341c,2018-05-03T01:29:00.957000 @@ -34,7 +34,7 @@ CVE-1999-0032,0,0,57dd00fc1961e4d4c387499ac05792a9fe192ac191f5589da8f7faf9c7ccac CVE-1999-0033,0,0,4ddb04e149c4d937e15944351127ab035e870177ccb3ef8aec59d00db8cc3ba5,2022-08-17T07:15:08.797000 CVE-1999-0034,0,0,43bb5bdf16feb1716fd4c515e99849db419fb22188c6e9f91b6c40a76e52d2fa,2022-08-17T07:15:08.867000 CVE-1999-0035,0,0,2b77a0699cc5e5ebdeb4870fddbdffd7df51c593a91f98e3b0f2c9ae32fb185f,2022-08-17T07:15:08.930000 -CVE-1999-0036,0,0,540dc95d7f883d3820afffca88e7f789f702102237b5bb4ca3cb0c1f50f38459,2024-08-01T20:35:05.300000 +CVE-1999-0036,0,1,190bf2cf7f9595165e59cf4049b53593f6003ff2c2fe321938028cb0e40973a9,2024-10-29T14:35:02.970000 CVE-1999-0037,0,0,d38bd6b9e0375b7fa44485e0d1d6c73541ae8bce5f8d9e8d5d51c4af1812b56d,2022-08-17T07:15:08.993000 CVE-1999-0038,0,0,0e695c6ea4468dc7260d5239b78b551040c17942d36f3c7876221e3099aafb7e,2024-09-12T15:35:31.693000 CVE-1999-0039,0,0,663ca0cbe1947ed25ded76a3fcb97f2a9ac70d43241bfe92c0b4661e5f666022,2018-05-03T01:29:01.223000 @@ -6826,7 +6826,7 @@ CVE-2003-0059,0,0,9b467128aa7d52b1c0228e54a512232ea06b5094b0ca4328a1b19c18c086bb CVE-2003-0060,0,0,2b161e5e23ecaff15a71eedebc54308999fda54f3b03eb3f15e239e527ef079a,2020-01-21T15:44:53.820000 CVE-2003-0061,0,0,fb48c810402a59f1e816cce84765259427dd905ebafca590217d2c1d1a0a8ba6,2008-09-05T20:33:21.787000 CVE-2003-0062,0,0,220e4ca7fe7a82c24abb8933393b0872bef9fb76c3a861b86d6b6b6d3b45fd2c,2016-10-18T02:28:57.360000 -CVE-2003-0063,0,0,08e8c1fb6e1a3ba6d45ede25c5a8a7fe5c4cbb47435d606b1c1c0fd9e8f62207,2024-08-22T15:35:00.600000 +CVE-2003-0063,0,1,6155149aa0600b9aa13db3a3278e2a0325fb90b89e90b81784a9f348419dde2f,2024-10-29T14:35:03.790000 CVE-2003-0064,0,0,0f3d2197cadb1ae2a90294bd1e0ce23bd609779c42335a9bf1f6318b5e844d84,2018-10-30T16:26:22.763000 CVE-2003-0065,0,0,32c52cb2ff50eee0bd89462e579d28cc1a8537aa17f9ad12358b4b4edb43ab1e,2016-10-18T02:29:01.440000 CVE-2003-0066,0,0,77fac5544f85a414f7d717e1977ab442b656c9b7041d46aa7231df36ff38a87e,2016-10-18T02:29:02.690000 @@ -102532,7 +102532,7 @@ CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353 CVE-2017-20192,0,0,191924c7b50d8cb8c53e91be3aa258ea86148b635680fd267b3908bb01e9fafd,2024-10-16T16:38:14.557000 CVE-2017-20193,0,0,1fbd71996d7e51a684a159c06d87592d1f1888a5e02c08198ec6c5ae8d4a948d,2024-10-16T16:38:14.557000 CVE-2017-20194,0,0,af65a809463bbe940000342907722ea6f70775d21158d089d1d123168ec6f423,2024-10-16T16:38:14.557000 -CVE-2017-20195,1,1,cc083fd1794480822727fe96692da72df814301856ff0d7cf895fe09c9fcc039,2024-10-29T12:15:02.917000 +CVE-2017-20195,0,1,0347c3e96eed90daff75208ff8f9b7246859178d6ced2549c1b28fadca74e6e3,2024-10-29T14:34:04.427000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -109619,7 +109619,7 @@ CVE-2017-9851,0,0,e02e8c801409ba6765d56373051e9f9a3b894e2ccbf4aa7e193c6818378807 CVE-2017-9852,0,0,80fa02f5017c6bf3edb4c7d8c1f3e74166fa89bb54f0a4a0dcbb291120b47d85,2024-08-05T18:15:29.483000 CVE-2017-9853,0,0,e79eada926aeaa228599bb64aeeb862527abc0b12604128035bee283b299bd33,2024-08-05T18:15:29.643000 CVE-2017-9854,0,0,b84d5c95f554fb901239ca2972f0543d1a8ae0b16c7a70fdcb3e6515c0e82431,2024-08-05T18:15:29.747000 -CVE-2017-9855,0,0,f7fc71428ef91d73e665e29afbcd7ea74324573e17e12de045403c7193d1bd67,2024-08-05T18:15:29.867000 +CVE-2017-9855,0,1,e2f6b5707fb7cc998fd006ebc1ff64913937502c3e6e1f5c03ea611150901ba1,2024-10-29T14:35:04.070000 CVE-2017-9856,0,0,37014e02420a56be70d03d31ab7cf32c594982d8a8c30df560e5066fd7a17fcd,2024-08-05T18:15:29.980000 CVE-2017-9857,0,0,8149c484fd1a817ae45baf46c3c2e18a6f601384c85797ac2059ab776092572b,2024-08-05T18:15:30.107000 CVE-2017-9858,0,0,2d5f7890f0bf73e6ed55acf462cc2a41b33d6b9f4eeba4d941a5667a401b7dcd,2024-08-05T18:15:30.227000 @@ -115036,7 +115036,7 @@ CVE-2018-14331,0,0,1733e7b3c78eb173f6e76f921a4b1f5947023f3b6403afccde2b928f50210 CVE-2018-14332,0,0,bb15d876c7c697bea436f2865b795a9464bdc96c3e27a980a0cfbfc5eaefa1ff,2019-07-21T12:15:13.647000 CVE-2018-14333,0,0,fca5b144141c8927646c58c7bf28b597b8cc11ea66f929f8037c82fecde2aef0,2018-09-17T19:51:15.093000 CVE-2018-14334,0,0,2ed445cefbd8dc02dae3c6c9bb32557a08ace5b6278ac6d3207390bbfcf2221e,2018-09-17T17:02:03.977000 -CVE-2018-14335,0,0,e547c603aa34ba8fed0765bee7bb47733af38344a6ceade93746d75d43d277f8,2024-08-01T13:41:39.203000 +CVE-2018-14335,0,1,de44289e2d3528f0390ab00cf9249f523b04454cd0e47033c30f3454fef35b9d,2024-10-29T14:35:05.543000 CVE-2018-14336,0,0,537b076def27ceed63df540357c12c791443f0b9f11d7b54320de106daf70d90,2018-09-18T12:14:00.220000 CVE-2018-14337,0,0,275d721464bb61f28b281bbc31f5f1039135b556716ccbc6030085efcabb1a71,2022-05-12T20:12:40.610000 CVE-2018-14338,0,0,094ebee330e8d8e57b8626935c8559ca2b75ef5f03880febde375b1a53fb3eae,2018-09-17T14:25:43.537000 @@ -149071,7 +149071,7 @@ CVE-2020-14314,0,0,c9d55ee466e5fdf8ca58d9c7ea273e92cd3f1efbd22109f970a409b1d9da2 CVE-2020-14315,0,0,f3d65e0a1ded81a63ac1f1cbd72dfdbbad05024ab0cff25ce7c4bda3a5dede02,2022-01-01T18:38:25.567000 CVE-2020-14316,0,0,529c9c13c0397adb748959e6f5ec8b56fe1783bbd192fe1e9f2c93e2250262fb,2021-07-21T11:39:23.747000 CVE-2020-14317,0,0,6d8541761ed97455bbb23f0b205debc440371c13284b5200d5b1c6b4d02b33a8,2021-06-10T19:34:49.500000 -CVE-2020-14318,0,0,c04c201e8d2aec53f91e89b0f5d6357f4ee790e376413118559a7523c6f28c4b,2024-07-03T01:36:17.507000 +CVE-2020-14318,0,1,bb52ee730ffc1231f5594a76a672c8e541e9155f369fc8d31a4b58df1ddec1df,2024-10-29T14:35:06.523000 CVE-2020-14319,0,0,d3c49ba93b3db74d67caa58f6588b0a2c37a3f0a1a0d5004ffe5353ca53f87fc,2020-08-12T14:16:48.007000 CVE-2020-1432,0,0,f7c208e3178a12ccca64865be98ff1737c62a1788239359f1a1afbb2317b1fa4,2021-07-21T11:39:23.747000 CVE-2020-14320,0,0,c47f2259a2f1d5558b07b9b2dc326d2a8cd583de7fc3e895baba68cbd74583b5,2022-08-17T15:17:47.090000 @@ -153434,7 +153434,7 @@ CVE-2020-2289,0,0,237e78a6af3d7036130767680f57c0a3a020db1aac49245aeee56fa84f1760 CVE-2020-2290,0,0,76a22d2b9301b18a97edcdcf9ae08f28c0d2e63d9cf064f038f3bf935b951564,2023-11-02T21:48:06.380000 CVE-2020-22907,0,0,14182f172528e66c19ff3e146c03cd1dcc6aba53a36508ba701493addbbc4ca9,2021-07-15T19:35:40.677000 CVE-2020-2291,0,0,831f057ba1b974d72da3756b366963589d96107752aa176ea582cb1e649bcaf9,2023-10-25T18:16:41.680000 -CVE-2020-22916,0,0,40eaa26165e171ff1e376b066904444fcc6ad07f91fc109f90351bdaecda7e65,2024-08-04T15:15:49.027000 +CVE-2020-22916,0,1,01b2214767052416eb90155f3bc47f5dafa8310d0707d4ce46106bc189040f39,2024-10-29T14:35:06.790000 CVE-2020-2292,0,0,820a1e836e8b2a00fa64cad273c996c9369fc62f43e740918d1d311a42b24e26,2023-11-02T21:48:09.623000 CVE-2020-2293,0,0,b807566236b4117c5b2834ebaaf01007b6526caee28548561327fb17e0e0b05c,2023-10-25T18:16:41.803000 CVE-2020-22937,0,0,09d1bc2d2eb8fe3be5eec72f950895d5eb910c1f01d2bf0a3e12d4ca21ef65a5,2022-10-26T19:04:32.750000 @@ -163403,7 +163403,7 @@ CVE-2020-8544,0,0,3a888ba051453fbac405eb0f09a5bf042104a1e1e50ba8dab847dbc7c3e3f5 CVE-2020-8545,0,0,609c5da111e2fc56181689c848cb7edb7ee1d1399459623f134a6346ad47eaa4,2020-02-06T17:31:09.207000 CVE-2020-8547,0,0,89c8e44a1b538656d52e171c8f31755da98710fb1407d2ceae7cca78896a7866,2021-07-21T11:39:23.747000 CVE-2020-8548,0,0,dd4f220188dad09b7393e47669a721a5f4180f3ed71deea10ef8fbe1d386c87c,2020-02-06T15:48:56.747000 -CVE-2020-8549,0,0,e6eea7e66da4a93c9c394704861ed09bbbfa16b1b3c84203d0910be59af16da9,2022-04-08T10:32:50.943000 +CVE-2020-8549,0,1,d2a3ee625dce8cdd095896233486477c7bc4a0d84e55a398fbbbd001ac2218b2,2024-10-29T14:02:29.840000 CVE-2020-8551,0,0,4d3eba4ea6483cdfcc54964882463ca07bac4e41ebd81e8f513a3484bcdcfece,2023-11-07T03:26:37.053000 CVE-2020-8552,0,0,c5cc4507a0344c19d76d89e91081b61d6ad713ed607e954d77572e90ab21532e,2023-11-07T03:26:37.147000 CVE-2020-8553,0,0,431014ec274230fabc63983eacf74f4d7bba2e727f06ebaccfd12693a918dbcd,2020-08-04T19:58:43.923000 @@ -179830,7 +179830,7 @@ CVE-2021-37379,0,0,660b760096832af33961911d2e731d0b3261b18bf8a347316566574899f78 CVE-2021-3738,0,0,3229d21a2eb86b533022aa4f9c03af5757d6539e525c3f9e249d641572b52ec7,2023-09-17T09:15:09.923000 CVE-2021-37381,0,0,36e2309ba57bcf2bcc20e949d5a071968af133f14de6abf89cbee645b90a97c7,2021-08-13T18:42:59.763000 CVE-2021-37384,0,0,f2844aafad4d02136d8e2525e7ff6772cff4e1f2006c1b87ee431deb96d5aa0d,2024-08-01T13:42:16.360000 -CVE-2021-37386,0,0,a5209aa4598c00111794e1f76b8fa3b7cdd4f9d185132ee00c3a483312ef4893,2023-08-22T22:15:08.200000 +CVE-2021-37386,0,1,9b54581cd28afa2d00010b79f87ec816957edb13d013d1f7fb5733c3a3c49a39,2024-10-29T14:35:07.070000 CVE-2021-37388,0,0,25d4d35859a9e89f020cbd148383f838a4632bb2dc268d112a6b3789166e4144,2021-08-13T18:00:58.260000 CVE-2021-37389,0,0,b931c76f236e74f85f1bc82b87aea3e5d7a9564f5b8d1de5964d41447d325847,2021-08-17T15:34:02.817000 CVE-2021-3739,0,0,1a29798c067e67ae19aa21358a195e1184b2adaf9d99c9a8d92ef90fa92dd822,2023-11-09T14:44:33.733000 @@ -182550,7 +182550,7 @@ CVE-2021-40797,0,0,83ecf144755a078fb0137640e23751e8fdeb611b3d941f8f1cfd6d9bd9d7a CVE-2021-4080,0,0,d4d1ec072b93ca5483690d4a56f768d54774e114ec073ae9346077dd1bfd3c1b,2022-01-18T19:57:58.883000 CVE-2021-40809,0,0,f94e284cff36abdbc2c67c180c3c67c73bbdac5fa4593983c6a0e49d59c4a92a,2021-12-02T02:15:07.473000 CVE-2021-4081,0,0,90824a26fe3f02407f226276e613d6dd19d3f88f47724d1f4fdf53f2c4b9edb8,2021-12-10T23:06:50.363000 -CVE-2021-40812,0,0,ac1426a47ff3dd612dc0d13990d6d8ed44672ec3c0ddca3ad545a8eda4a239e1,2024-04-07T01:17:53.437000 +CVE-2021-40812,0,1,3ddecafe06043d0105cf53348b1d7a2dbad342724d6baec15648b5cb1ef88f1a,2024-10-29T14:35:07.913000 CVE-2021-40813,0,0,8197c29251f18732892acf1be66140720a7ec379bc6dbd6bbb36684689527962,2022-01-22T02:46:23.477000 CVE-2021-40814,0,0,612a646cf942a49855b53b29f0459f7f8f03abb06ff7859a858a3d092b4397a2,2021-09-15T14:39:40.313000 CVE-2021-40818,0,0,6a72137ffdf80c9c6842993df83558d006db1efc99b56b58f1cbd20fcd5a6c4d,2021-09-15T14:59:36.733000 @@ -183929,7 +183929,7 @@ CVE-2021-42687,0,0,51aff8bb8be2dfed23e5e2283ce8a960a865bbf78379ca2f376af01110d43 CVE-2021-42688,0,0,646457e21c7114292df4109589a24f0f288dd18fb24ec94d267d31ede6bdd204,2021-12-09T14:05:17.687000 CVE-2021-4269,0,0,08b719a96cba7dec3a11b26321c09d6eb626c38187e3cc307ce1a1023588c7b5,2023-11-07T03:40:29.450000 CVE-2021-42692,0,0,83b2956d3775f5dec583c92f53fdd8bc4c1fa855e8b7ccb98fca5842039fedea,2022-06-03T02:56:05.980000 -CVE-2021-42694,0,0,e2efaf2c8806ef59a6351f092507fd6669a2343ee2ea5f5dd0c98d3a31aaa403,2024-08-04T04:16:06.790000 +CVE-2021-42694,0,1,adf4b334d1de2270325b32329a21782f24cc834ca2a0c2991fc9fd443fd0e806,2024-10-29T14:35:08.773000 CVE-2021-42697,0,0,05f0c4f5dd4d421cf8e92c234de33ee1f0c98041acd57668964d6a55f79c825a,2022-06-13T15:41:16.767000 CVE-2021-42698,0,0,6e5c540194b901c9f12a1bd85f98d4b2a1097d11a022c232bbc9598df8a0e75d,2021-11-09T13:56:23.843000 CVE-2021-42699,0,0,f7c15d007953981fdcfe0e5042345932e64c3a607431e6511ffbeadf41010118,2021-11-09T14:35:52.460000 @@ -186841,12 +186841,12 @@ CVE-2021-46916,0,0,fdb459c12fd239c2e83f9c4d4aefabbcf808ed1a5f88bfee6b46458f77ef6 CVE-2021-46917,0,0,aff6030a1bff1cbcdfce5542931948e59338e91df96ed70e576a89da079c3c58,2024-04-10T14:43:21.067000 CVE-2021-46918,0,0,b804a6899d07a427e771a5f08ec631466d6d2dee399776fd2a12082a5e90e7f0,2024-04-10T14:47:16.307000 CVE-2021-46919,0,0,0cde8c43296fcd13ad033026b1ddbd4df8832a139f34b8e1b28c2677c09a2bce,2024-04-10T14:46:43.057000 -CVE-2021-46920,0,0,1a70c6379761d74c05f11e6039b8ed8687c4956f0096969868d56bbad586128e,2024-04-10T14:52:39.323000 +CVE-2021-46920,0,1,6b2c741068e1cb2da8db8e261467184d030fdcb4fe67eb82cc23fbb349d0f728,2024-10-29T14:35:10.437000 CVE-2021-46921,0,0,f76eb13759623cb0c69517bc9ca9be27b62de7989b6e7890df13dd34a12cb58f,2024-04-10T13:39:36.027000 CVE-2021-46922,0,0,0ef9dc08de3c017c31bcbe65eb1d6f2a13f3cef07b1101305f6a81f63fc70c44,2024-04-10T15:31:51.440000 CVE-2021-46923,0,0,7441fcb2b7b199ba732b4449dcb26eebf9f117ba4edafd02335ac76d5d494de1,2024-04-10T15:25:34.540000 CVE-2021-46924,0,0,7809d1e21be7ef51181cbcf8ca7773288d7c4758e65da465f7f4db286193c767,2024-04-10T15:23:33.673000 -CVE-2021-46925,0,0,14d924d7962da469f09127dd9c9a24d4d8bbb872124e8b62283aff7a26c38fb6,2024-04-10T15:22:29.233000 +CVE-2021-46925,0,1,311fd749d4b0db8495763b88e3fb10e4f65f9c97e567a8f000490d1786586e91,2024-10-29T14:35:10.930000 CVE-2021-46926,0,0,01644ae7acf4d3f47959a5f052fd0c86681dd26bf119b2b3a88f04e6fded8274,2024-04-10T16:26:55.390000 CVE-2021-46927,0,0,f1ab7fe02832c444785b0186ed8b045f076e799b4c625ec0ee1a40e80b0b557f,2024-04-10T16:25:32.067000 CVE-2021-46928,0,0,2e946335924400d0c882fa7cfc859b689dc887e45829f01c93967ea4b3bc8631,2024-04-10T16:29:19.867000 @@ -199342,7 +199342,7 @@ CVE-2022-31447,0,0,0e5ab019dd73f8dcdaae08c8255dba869dabe446e1481b353116985983b62 CVE-2022-3145,0,0,d21cbde81bf5231b6fc94cab977bc88d6bdce7bbbee0913fa47d0f07ea1cb7be,2023-01-30T16:30:45.250000 CVE-2022-31454,0,0,7b3bd591a8827aeff64f69219e825cc31ddba92a0152f6341ff16a366f7dd8ae,2024-08-03T08:15:17.517000 CVE-2022-31455,0,0,3cce69cbfeb6b887dab0c4c485c901171ee6a35dd013d430d1262dce568ac8aa,2023-11-07T03:47:37.770000 -CVE-2022-31456,0,0,1f2c1bf7111360f9a663f29e86e0bca05b0e79241cc34ab5502056b5ef82eeb0,2023-11-07T03:47:37.840000 +CVE-2022-31456,0,1,165af628194d0d12e625cc1bfcd87aab46eaeacefcf1d6de170ce36d9a171435,2024-10-29T14:35:12.093000 CVE-2022-31457,0,0,23731effc053c3caac791445d3c6d2f512fedf81864f9e6109fe79e03829f998,2023-11-07T03:47:37.910000 CVE-2022-31458,0,0,6309737435a4e437f77d27a264d59769b805bd0380f3c95e48ca3963d7ffdb38,2023-11-07T03:47:37.973000 CVE-2022-31459,0,0,5403dd4049a94c0b3f2af5b604ed0efd236682d733de44cf28bb0728e25e543d,2023-08-08T14:22:24.967000 @@ -208004,7 +208004,7 @@ CVE-2022-42445,0,0,e295339bba1f3487f2025ef56dc96f11beb0a1486e3cdf407bd3b450306dd CVE-2022-42446,0,0,c60a97003a7f84c5f64fd596f87eab38f4c8f947f640f4977d97bb6854cb1f7d,2023-11-07T03:53:19.593000 CVE-2022-42447,0,0,0c5fa8c1d300f2b622eb4e0bf02de8273e45049e45b90fdf1b77dffdbc17b887,2023-11-07T03:53:19.810000 CVE-2022-4245,0,0,2f8a836729a2b28af01fd381acbb262fa1c36c272f02aeece53c3f8b33d50d4d,2024-10-10T20:02:34.187000 -CVE-2022-42451,0,0,78a6921f84537121f07974459490058285256afbe4a71f2e3fe4d8f2c19d5ff8,2023-10-23T15:02:36.410000 +CVE-2022-42451,0,1,23d16c813d9a957dd3752fc62ae51f051d73137ab1963af2b48468b5a11b22a8,2024-10-29T14:35:12.397000 CVE-2022-42452,0,0,b66ad06c8e49a9d8c43cd7b8918f7497d8729a8e0f307d4a7cab0bda4a8dc2bc,2023-11-07T03:53:20.100000 CVE-2022-42453,0,0,8eb505e13c81a58ec1537abc098389b013e90e9754080b524d417f996725afb1,2023-11-07T03:53:20.307000 CVE-2022-42454,0,0,0ba3607d2c3832ffb5be71397ed848ba69a013507b70cb879c273e5e1e07e274,2023-11-07T03:53:20.500000 @@ -209370,7 +209370,7 @@ CVE-2022-44343,0,0,6d05f423371083efa9401ae4c199c365b6edc02598e6045acabd60888bd3f CVE-2022-44345,0,0,eb153b34db34fb58b5e04627ec85ce9c1752a7f2e5b2b48f824a72fc54da2c2e,2022-12-03T14:27:12.420000 CVE-2022-44347,0,0,cb96dc5cda79d88b6b1dd9bd3ef3fb3c7e521e86c0d9b3793f79a3e9b36804ab,2022-12-03T14:27:01.077000 CVE-2022-44348,0,0,b3edb8f526e4510ca80333cefdde5f0fe598497e53fdac05b7fc4e9d58a9120b,2022-12-03T14:26:33.983000 -CVE-2022-44349,0,0,97e092a3d30450772a2c7d346000ee4adcf69495b251adbf41c6acab0831875f,2023-09-06T20:58:14.480000 +CVE-2022-44349,0,1,42da5a73bb0eb32326d589a91057ad58cbb17d0f7af89fd452e039b22b8d1904,2024-10-29T14:35:12.720000 CVE-2022-4435,0,0,7dfde5d833f2ef69acae39af25992d4d30ce7c6fbf5011e5b52990a483591e41,2023-05-15T15:02:39.973000 CVE-2022-44351,0,0,47136da05a3c6e2cc2c40e27c43031f776cbfd38f1571ef559095bf55a48f871,2022-12-10T03:06:14.997000 CVE-2022-44354,0,0,53f5714991bc9662aa84127de793c763ba9f0ae3db371a8f7c6ad1f2d38306f9,2022-12-01T20:01:46.563000 @@ -210989,9 +210989,9 @@ CVE-2022-46719,0,0,c556d1c8e4cec6f1708a76e4f56e1770d03a9008f0fd1910f774141108142 CVE-2022-4672,0,0,9c2e59790280420d462ec305448b87221671610a4df920be27309373361e4116,2023-11-07T03:58:33.343000 CVE-2022-46720,0,0,a4866f6c76c74ef985b56ff02afeafaffb2d3f6684cd4df17a3bd7d8b53f6392,2023-11-07T03:55:51.277000 CVE-2022-46721,0,0,6fb30f1b6aaf820d1fbe3446f21ed89a2a3705b52c844ead8b8f365a222ec152,2024-01-17T17:40:40.553000 -CVE-2022-46722,0,0,839f19e817c53792b9b85bded4a9e2792bd8c311711897a9a105f2e6e0196b2d,2023-08-19T00:43:34.500000 +CVE-2022-46722,0,1,78a633e86d2602f43acb274357af30e6c746eb5bbb1604ea6a427ce909daf4b9,2024-10-29T14:35:12.967000 CVE-2022-46723,0,0,38844899b509786377c261723a475f9aafc391778c130669ceb1b0ebedb2e89d,2023-03-08T19:05:39.457000 -CVE-2022-46724,0,0,561d5eea32151b7fba22f6edea34b213400b432ddc6debb6cd17a60297db52de,2023-08-19T00:43:43.330000 +CVE-2022-46724,0,1,fdf855f78b259101b387943b6c29bdc9300cbe737b2b321411fdbd59b6e5188e,2024-10-29T14:35:13.290000 CVE-2022-46725,0,0,b4d7d537ba6e53186436d1efdbfe91863964382d98743ade38d8fe7414496a57,2023-12-27T22:04:02.383000 CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000 CVE-2022-46728,0,0,3a822acf6167275765f764ac260bc9302405662dfcb2879d04efd07d46f8ff04,2023-11-07T03:55:51.883000 @@ -211147,7 +211147,7 @@ CVE-2022-46897,0,0,fe57547f97f17bf88594b7dfabf1162a67ec8bfa3eab2856b5d894212f819 CVE-2022-46898,0,0,e07d70879aece1d8caec802b6c251399a533127727413ffd55878678f32b005c,2023-08-01T01:21:54.823000 CVE-2022-46899,0,0,47cf48c2a9fa34274d86379a7c591cdc4ec1c2991370cbbb10d8f9edd90ebab4,2023-08-01T01:28:42.690000 CVE-2022-4690,0,0,09b82453a76ab8f1047bf7981c70909e40ea72752c4f747c5c0a5b8ae673a1dc,2022-12-30T16:25:52.877000 -CVE-2022-46900,0,0,3dbd2bfe53885ddf905aa989af7255816cb62d216f52916e4972b2a0b9b65c47,2023-08-08T13:15:09.817000 +CVE-2022-46900,0,1,1ada8cb944acaa94afe201553723c2ea4dd7e6ff1d8d7c1b032917ea8df1332b,2024-10-29T14:35:14.353000 CVE-2022-46901,0,0,0a812e631ccd4c832094fff6bd6ba8e21eb75afdbec4ee4392ca48e1e4a21b09,2023-08-01T01:32:04.767000 CVE-2022-46902,0,0,2fc6b9468dc70dd641b245b6de684673cb74b49c5125529aed1ac6adb5bc7614,2023-08-04T18:19:48.140000 CVE-2022-46903,0,0,cc109058a85ca135a9ea89d0065559940fa523aae863c9fdc92ebaab79710fc8,2022-12-15T13:50:12.330000 @@ -228608,7 +228608,7 @@ CVE-2023-3781,0,0,de223095b5640bb80ec6a860227a648539e83fbab26d9846367892357c5900 CVE-2023-37810,0,0,0a875c94ff411e8048d52a2836b483c297b1d96f9dd1665554f4e1c2688af156,2023-11-07T04:17:07.757000 CVE-2023-37811,0,0,6b91d97ab0606f2517f2c9379dfa3d23ccf09cd6269504f98278ec72bb3d5c8c,2023-11-07T04:17:07.790000 CVE-2023-3782,0,0,2695b83fd02c6f700b03c27b710c853c5a14e90e0e0062d57122bca01fb76baf,2023-08-02T18:31:47.947000 -CVE-2023-37822,0,0,da3e7c2d2fe355c0f98cf3e2c9eefd41d1823de5ca3c19742f0c5a87cdce1af8,2024-10-04T14:15:05.017000 +CVE-2023-37822,0,1,5a026609b10936ca6911c7bb43cac19859e9a4def984486197e63a6831b4a639,2024-10-29T14:47:05.997000 CVE-2023-37824,0,0,67a1a0cd59a7f9d8d253762869647c68969ae7b19d7a8cc945ab595d6122a4fa,2023-10-28T03:47:39.197000 CVE-2023-37826,0,0,d47577469ae104e7a65a3d5dc49db2bb73b8c88342393d1572c2e0caa1fbdd79,2023-09-07T13:04:10.693000 CVE-2023-37827,0,0,3da8fd77a63742c2db490aa6c50c9a119b2ed1fc587338155f117da39a85ff4d,2023-09-07T13:03:44.377000 @@ -238872,7 +238872,7 @@ CVE-2023-5212,0,0,94e5a058f86f6f689bfef0546fe23d85ba591a1deb0dc7588c41b48b5d6c87 CVE-2023-52120,0,0,4bace2af2e223cec3c7888320256eb31815e8a469d878fbe3ff1e7799cf8d2e1,2024-01-11T15:26:21.677000 CVE-2023-52121,0,0,15294fc74bdfd982bb18c557d754174b12d5809cb7061b37cb18e84a54581137,2024-01-11T15:46:03.370000 CVE-2023-52122,0,0,7bbb7ecebb21474234525f39e223db8c2261a25820af8cee6ed962fd04d978db,2024-01-11T15:48:19.517000 -CVE-2023-52123,0,0,3903653f91bb0f16cec100b4fe9cfd886016707f7de01f45e1f7241836695d0b,2024-01-11T14:28:17.513000 +CVE-2023-52123,0,1,74a2006d7e725a209ffa9dc395ab80ca627b6f34d4dd4d3d1683c244335adffd,2024-10-29T14:02:29.840000 CVE-2023-52124,0,0,fe264bb544748f7f11646b10d551faccad50dfd1bacb9916f27c21fe4a20ac5c,2024-01-10T03:59:25.760000 CVE-2023-52125,0,0,cdb3a747001ae389e30c132b6c5c61d65c3198193fee7b568bad01851ad38375,2024-01-10T03:59:11.387000 CVE-2023-52126,0,0,644e944c7bb50f79114ccda1fcbd8cda54a531501230aa06f79554f3afbccd87,2024-01-10T03:58:24.213000 @@ -242092,7 +242092,7 @@ CVE-2024-0721,0,0,b3e54b524ecb49bb26ed0d759ebc14b4a80dd8725f3a792ac563e113a0d73f CVE-2024-0722,0,0,e3fd857d56c3e7a1ce18df94c2aad06d8e5ba0ba6f59fdbc875af0baef84e5b3,2024-05-17T02:34:53.843000 CVE-2024-0723,0,0,62b3b8158ed5f431f7c823843250dde65bc6b046016f1d806e5bf4a77c554601,2024-05-17T02:34:54.417000 CVE-2024-0725,0,0,9f34bbeb9ca65e262b0f114d97475b4588551a2e0d6e1b478b0fe96d6457c471,2024-05-17T02:34:54.540000 -CVE-2024-0726,0,0,614c484a417a79563637bf6c4e4842b2936b34d19e28c25bc06b3ee24570d0f3,2024-05-17T02:34:54.650000 +CVE-2024-0726,0,1,8bf1a183063177f04b5f795cca93e3f33ff9f6b9f38df417fcedbb76cb67252b,2024-10-29T13:15:26.867000 CVE-2024-0727,0,0,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000 CVE-2024-0728,0,0,8e86daecc5b7cf2cd88ed5152fb6a2af57ca1a3f0df02f0db63414ebf20cd037,2024-05-17T02:34:54.780000 CVE-2024-0729,0,0,35aad4ab490381a796d82e9abc9a3e9bab04093ac6b38aa110e0a6401a78c4c6,2024-05-17T02:34:54.887000 @@ -242346,11 +242346,11 @@ CVE-2024-0997,0,0,40cbe7d07647cf304a8bc3bc11787b58a8f50582e3e8b65316a7ae7fa59c2b CVE-2024-0998,0,0,f7933578d5dbeb3f77563ebf1f5420d4cf36180b38c1c7cf760eedcdac974d39,2024-05-17T02:35:08.490000 CVE-2024-0999,0,0,84034800a287889c8e66f3ba01c1d930a06538aadfe1b375cfd8893390aed6f7,2024-05-17T02:35:08.593000 CVE-2024-1000,0,0,60c836cbd4d96144c97b06caa16452d33dc82172b5cc2c653a7406010f53b5df,2024-05-17T02:35:08.790000 -CVE-2024-10000,0,0,9d41033daded10c9344b2708935d9c01f83bf7d1b76230f31aaed8366f6d5ae8,2024-10-29T06:15:13.333000 +CVE-2024-10000,0,1,2dc410e1583cc50e0eec03ed76e09a77a8842fe67c7d9b7ac5bcf33a5d12b517,2024-10-29T14:34:04.427000 CVE-2024-10002,0,0,b8ac1697c0b5dbe076b29d09227535990b771bd408babdf1ec6b4eb8a74fb84f,2024-10-25T21:20:39.167000 CVE-2024-10003,0,0,ef2c3c73bdb9c4390d998f61684e3cffa9d7cb4391873d2339bfd0892ebc38b9,2024-10-25T21:19:19.743000 CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 -CVE-2024-10008,0,0,ed94f4a1173c49a1c9a37d77f16fbcd1f7776dfd1b71f44245041f9833284d0e,2024-10-29T06:15:13.743000 +CVE-2024-10008,0,1,93a7056d3eedb0f45bdd1f80f18e9d31f27172cc24baaadb6be41dc083092214,2024-10-29T14:34:04.427000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10011,0,0,b82cad7a266ac941493a6589c7af0eff273fe2e36d28fba66b1420614eed8185,2024-10-25T12:56:07.750000 CVE-2024-10014,0,0,1395463dc1e29fd6db71d83f72260a8cd3462c205364f301260cc7f7b129af31,2024-10-18T12:52:33.507000 @@ -242368,8 +242368,8 @@ CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 -CVE-2024-10048,0,0,61efd76afe896dd1ea92d4e6478387603ddca02147575fe88026af129f3f7606,2024-10-29T09:15:06.403000 -CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000 +CVE-2024-10048,0,1,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000 +CVE-2024-10049,0,1,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 CVE-2024-10050,0,0,d8b5aaf0fed099523fa2ba7c0c86d11fc479440388170ed27b77f7313b983d74,2024-10-25T12:56:07.750000 CVE-2024-10055,0,0,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000 @@ -242448,10 +242448,10 @@ CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef CVE-2024-10176,0,0,142987a8f419783b163ba6354525e6bb8e3054620537017112986773c0d037e4,2024-10-25T12:56:07.750000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-10180,0,0,eeda8a52eb376af37ac54d80ec17aa95c78c556dda331af160350bff0915b632,2024-10-25T12:56:07.750000 -CVE-2024-10181,1,1,80d5ab0c5781918f13095aec3db48554ae2148963f38666a0f0ba7a7e2214ef6,2024-10-29T12:15:03.433000 +CVE-2024-10181,0,1,e508d85fb29127dc9615d55a59c4f686aa113b77b39ab8d7dcfaa4fd4cd2c82b,2024-10-29T14:34:04.427000 CVE-2024-10183,0,0,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000 -CVE-2024-10184,1,1,f661e44d8b5ad57993e342aaa8cd8df0cbee4d4f88316e5241e24009dd0f9a82,2024-10-29T11:15:02.930000 -CVE-2024-10185,1,1,5e9cf7201b197a171d6a1c7c846a3c53beb0904244c0e6f9b6b3c7d8b372c664,2024-10-29T11:15:03.167000 +CVE-2024-10184,0,1,82e323cdb696d7fc911e7053501b005fcd00bb282537fcf739cadb894187d0e9,2024-10-29T14:34:04.427000 +CVE-2024-10185,0,1,ca6dfd9088b0219f97894c0990b4ec594d404f7f2fe7b73023fa5dc239e3eb40,2024-10-29T14:34:04.427000 CVE-2024-10189,0,0,c7e7e9c9433451acc4ead77e2398a65c092c06680c0a336db7286291fd8ac494,2024-10-23T15:12:34.673000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000 @@ -242468,20 +242468,21 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430 CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000 CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 -CVE-2024-10214,0,0,bf8d9504da49aad1f2267895d67a3c228956252de0a918296d6b3259e131e28a,2024-10-28T15:15:04.020000 +CVE-2024-10214,0,1,387761b00ca263850d15f9fc0085dd195781994f66bd9edc33fb8fef62fe7001,2024-10-29T14:34:50.257000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 -CVE-2024-10227,0,0,9dd5ff9f27a5512165d6adb25d0621487746ad0ed3e3a93728430c8367086857,2024-10-29T10:15:03.183000 +CVE-2024-10226,1,1,5b578efa4cb98c9f5b6f02eac4f65de90209e937f40993cf9dca20324ab58f1b,2024-10-29T14:34:04.427000 +CVE-2024-10227,0,1,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000 CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 CVE-2024-10230,0,0,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000 CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 -CVE-2024-10233,1,1,29772f20d7a8c4afa58de08025508eb1c5c9cc35a73cfe9b47319c29170c2214,2024-10-29T11:15:03.377000 +CVE-2024-10233,0,1,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000 CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 -CVE-2024-10241,0,0,e2369fc7a8891bf45ac1bc0e68f0f984a031c6dc23b75ac069869e988f47fac2,2024-10-29T08:15:11.990000 +CVE-2024-10241,0,1,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 -CVE-2024-10266,1,1,759a1fb69db2660f0ba07ba8f5c3b2571986061d735ca32f90b043f369522cd3,2024-10-29T11:15:03.590000 +CVE-2024-10266,0,1,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000 CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 @@ -242510,7 +242511,7 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 -CVE-2024-10312,0,0,995f8ed5adadb6a3ab1186d57f67f773567aa417428854566f301bef2e79d2ec,2024-10-29T08:15:12.330000 +CVE-2024-10312,0,1,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 CVE-2024-10327,0,0,5a1546502e73211d148718e818d15cec9bc5841df26bde254740ef77c9d65b28,2024-10-25T12:56:07.750000 @@ -242535,7 +242536,7 @@ CVE-2024-10354,0,0,d5bf96c00ae597f7009c34e3844c5889f0c0763a1e1b97eab0af94f26675c CVE-2024-10355,0,0,7a858a56547ed44307c9a540d3394b900b64454d40ccf6ae564bf35aa8fa4990,2024-10-25T12:56:07.750000 CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000 -CVE-2024-10360,1,1,2eaafceb939de965b46fce3d276a9f0cb563a545a6b19b405cc2927597595b05,2024-10-29T11:15:03.797000 +CVE-2024-10360,0,1,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 CVE-2024-10368,0,0,bd751cf8f0908c7885868477a03f4653af3e113fc89fdbd03353e34dff9f8f68,2024-10-25T12:56:07.750000 CVE-2024-10369,0,0,7ae7d6c6e004766971ac0d79eb28bd21cccdeb76fc8a447fe3f3b470463f1503,2024-10-25T12:56:07.750000 CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000 @@ -242574,9 +242575,9 @@ CVE-2024-1042,0,0,87dc787933fa568693623eb2222edd1702eaf068420e0f5081ad1d377d2eb6 CVE-2024-10420,0,0,846d3922cfb082a18bf1a2aef53465928b43c3a0a5607fdf099784de849f1855,2024-10-29T00:21:35.717000 CVE-2024-10421,0,0,7bff10bb36996b4d62f9e25003b28c9405671f71764ca7defaceef2e7ade94fd,2024-10-29T00:19:35.110000 CVE-2024-10422,0,0,8238f03495deed1cfc2bc6657a30d42a132cd1a657f5c4eb6a7808938f211181,2024-10-29T00:16:35.510000 -CVE-2024-10423,0,0,c9d630978b3ebe3e51f0777cb7788483437ca43e2dde3907540c0b24c1f999df,2024-10-29T00:08:57.757000 -CVE-2024-10424,0,0,e15715713e7eee9cc736b4f6649a9f11a9afa9388af0ca338a860cf0a4a211d7,2024-10-29T00:45:01.377000 -CVE-2024-10425,0,0,389ba36c7d276b790d5444f30c4a53e97e7b5db701d6aa6d13711123b0882ad7,2024-10-29T00:57:33.760000 +CVE-2024-10423,0,1,7da6b57d8702a9ff0d8846d62f06cb0163e846663417286c202356caeba5127a,2024-10-29T13:11:44.690000 +CVE-2024-10424,0,1,0082f2c9329da5c28dc61d90822e77e972ce57e5080d3ba52361d4d460b4446e,2024-10-29T13:11:42.527000 +CVE-2024-10425,0,1,8adfa31fd985d4bc27743db745ec868540b0820dcf6294ef53f1f23cb0898627,2024-10-29T13:14:31.863000 CVE-2024-10426,0,0,28b0546203467c7939d52a82523c488ba35fb615e4616239613197f9a3fa4d63,2024-10-28T13:58:09.230000 CVE-2024-10427,0,0,9b2f066d18b440b54fefaad47103e26dcc47db3306972f0530c451a917b87acd,2024-10-28T13:58:09.230000 CVE-2024-10428,0,0,da4ce94fc5734b784cd3dc14f57a304ad2272c949dac6a2208ebece092333393,2024-10-28T13:58:09.230000 @@ -242588,24 +242589,36 @@ CVE-2024-10432,0,0,0feeda3c5cdfbe1e06aa23ee0373b3f8448fc444aaeb6ffe58ff80bb8da9a CVE-2024-10433,0,0,1e21095aa44ed844c5521070f3a998ae62e31fd3b0fa5ff270c189969069c652,2024-10-28T13:58:09.230000 CVE-2024-10434,0,0,f9a031ee95bd658c2fe9253d4ed2ae867e5902a8cd9d172e239b9cea0516e525,2024-10-28T13:58:09.230000 CVE-2024-10435,0,0,8912a60b7c15872def4963355302dc88d9e35ad474f000f7a82d872c1d7ba62f,2024-10-28T13:58:09.230000 -CVE-2024-10436,0,0,91854c8c02b6510db5765076dfeb958e4a6faa7590576583299ba4122b8017aa,2024-10-29T10:15:03.900000 -CVE-2024-10437,0,0,8d3c59b3cb4fc3750fb89fc2f6fd068bada96e2a9bfdf0da5b0c1c2d25d0db66,2024-10-29T10:15:04.140000 +CVE-2024-10436,0,1,a1797d9cd5fbed49a304a21cb6a3c6dedd7a712c79dd7d33ba3878a13f49582f,2024-10-29T14:34:04.427000 +CVE-2024-10437,0,1,d3bc9d2bb8e4c51579dc229bca1603ee4a47fb6c58b52787ed4dbb875d8f0331,2024-10-29T14:34:04.427000 CVE-2024-10438,0,0,0b5aaabb7f01c5e8089681a78cf679c538d73fc8ba2b4c24425fb07aa84697f2,2024-10-28T13:58:09.230000 CVE-2024-10439,0,0,fd93bfe9b0f0ecf9fc9440fc27dbb51446dec5878669ccf6864d3c193f7cade2,2024-10-28T13:58:09.230000 CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000 CVE-2024-10440,0,0,e0ec7dc189707988f606322a12ddcae2694f26b72c203d1a3e88fa2bb5134f0a,2024-10-28T13:58:09.230000 CVE-2024-10446,0,0,9a110001279aec61be0a01c28d9ac0a67361a3753f5f02059a709117bcd9c6a3,2024-10-28T13:58:09.230000 CVE-2024-10447,0,0,3d23036486de2cfd5c946a364af9798880f8285c7930da486574aaa8ca05b3f8,2024-10-28T13:58:09.230000 -CVE-2024-10448,0,0,2fed28898d2f25fde9ec2e73a3c4e17242824ab31ee6de73354c04eff8eac0fb,2024-10-28T14:15:04.143000 -CVE-2024-10449,0,0,be8c7ae804882232f807f47915ff07405b814afd0508181f28ead0410d06d364,2024-10-28T15:15:04.303000 -CVE-2024-10450,0,0,8fe5c87968af27eb6ee4df0105ddbe8d493287c4ebabfd415e47762a35515823,2024-10-28T15:15:04.560000 -CVE-2024-10455,0,0,9360d82243c35b0b104f5c5c02eb5a8f8950b22dc548665bf650e13c6902c3ab,2024-10-28T14:15:04.423000 +CVE-2024-10448,0,1,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b3705903e,2024-10-29T14:34:50.257000 +CVE-2024-10449,0,1,37c2bcaf33d85978782c73468306745d1914d0da52c07cf95c1e143ce9f51251,2024-10-29T14:34:50.257000 +CVE-2024-10450,0,1,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 +CVE-2024-10455,0,1,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 +CVE-2024-10458,1,1,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000 +CVE-2024-10459,1,1,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 -CVE-2024-10469,0,0,c5d7cbf85ed88c15156d876faf2ce99a49decc37ad589f4b985cf696d0a951e2,2024-10-28T16:15:03.667000 +CVE-2024-10460,1,1,b3dcc9daf7d6e1ca6a6660329788291f6c0dafaa9a6365aab9b6d0c1d3013608,2024-10-29T14:34:04.427000 +CVE-2024-10461,1,1,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000 +CVE-2024-10462,1,1,a6663c5927e85c0816750e9892f4d162113f2ae4b1471f0ab1ea841cd11d3b16,2024-10-29T14:34:04.427000 +CVE-2024-10463,1,1,ca2ccdfc7347f2b24f8c14d4cc993f27e84d642d3d52109568321c28c93cf394,2024-10-29T14:34:04.427000 +CVE-2024-10464,1,1,4abb59b7e2d328d8b9fccac915bd35791fe7d6a637843d39e1de71582cddb68e,2024-10-29T14:34:04.427000 +CVE-2024-10465,1,1,42e5258b4a08c5a48f5113e849eb96273f88b2539256da8e6e6e12a19a3fc6f5,2024-10-29T14:34:04.427000 +CVE-2024-10466,1,1,cbf25e33b587f350d79ceb15b4bc3d8f4e1014b27ff2a03d8d496cef08e40ace,2024-10-29T14:34:04.427000 +CVE-2024-10467,1,1,d65a732454df7eff558a09640bc909c686417401c80632fe163c8128932b813e,2024-10-29T14:34:04.427000 +CVE-2024-10468,1,1,becae250ce6b9adbf1949f6206905d525cd4f79c435372006703cecc1b957ebe,2024-10-29T14:34:04.427000 +CVE-2024-10469,0,1,ce754100df9ffde1a5a074de2751b11dd6f964ca496b3df4282e24ff877dc047,2024-10-29T14:34:50.257000 CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000 -CVE-2024-10477,0,0,29b668038e3cb8c2b5ff431f60b143469ee67c3032e14bbb174430a36fec6b06,2024-10-29T01:15:02.843000 -CVE-2024-10478,0,0,a99a89fe0003dbecc2978a52c97a15e9f26d20d5a3d813ed1f1096fd75c70ab2,2024-10-29T01:15:03.160000 -CVE-2024-10479,0,0,5c27499ac5daae8cedde4e7d99cb7ec634e2316241e26e657d770291c61c582e,2024-10-29T02:15:06.433000 +CVE-2024-10474,1,1,37703d08df776f2812fd2ada14ad66d475779a685531687aea7bcbacb1785dcb,2024-10-29T14:35:17.140000 +CVE-2024-10477,0,1,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b307,2024-10-29T14:34:04.427000 +CVE-2024-10478,0,1,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 +CVE-2024-10479,0,1,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 @@ -245184,8 +245197,8 @@ CVE-2024-22060,0,0,7f79d2875f5a614fca219746c1bbf5a9acd1ca84384af60f4f2ea354a4c82 CVE-2024-22061,0,0,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11ac3,2024-07-09T18:19:14.047000 CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000 -CVE-2024-22065,0,0,bc74d593c14da062c23ea99d3ab37d51b30442109e580b6b57851f6a8b488dbb,2024-10-29T02:15:06.933000 -CVE-2024-22066,0,0,7b2b43244924e6951679aab28535881ff8e897b3fdcc6f984edb0fee987e2af5,2024-10-29T09:15:06.800000 +CVE-2024-22065,0,1,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000 +CVE-2024-22066,0,1,1ce1bc950a8db5e9cfb36d17e428405c7705fb0cd1e4f9d554437e156e9c5225,2024-10-29T14:34:04.427000 CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 CVE-2024-22074,0,0,597eb5b51f6f6f2c4d569289cef4a67d7a503bfba7b03a39a3d413dc000d2aae,2024-10-16T15:39:58.847000 @@ -249360,7 +249373,7 @@ CVE-2024-27844,0,0,f47c820a9af800de343432c38bc9e2d59f37cb68e7684b8e09f702eb76aca CVE-2024-27845,0,0,0d564bfe9e561fcf31182cd0bbc6cacf5e39792be0769beb62d2dc37b802ea42,2024-07-03T16:24:57.930000 CVE-2024-27847,0,0,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 CVE-2024-27848,0,0,ee1f57d57993dc2355133c7db4fe16e1b04f171eb2d17aa6e9b6d31c1607026c,2024-07-03T16:16:03.303000 -CVE-2024-27849,0,0,ba15dc5143922b3321c1ef7e307ba4fa7d381bf182342ecc04e5d2eb991a7244,2024-10-28T21:15:04.093000 +CVE-2024-27849,0,1,d06e2ced14c2d6572239df5b42f897095fe518712e55a9defeb063cbc8a74fee,2024-10-29T14:34:50.257000 CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794c8,2024-05-14T16:13:02.773000 CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000 CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000 @@ -250912,7 +250925,7 @@ CVE-2024-30102,0,0,319135154fd92fe7d8106fde2ca3c4802e21706ca62151c235c5521e43673 CVE-2024-30103,0,0,cbcd73720f86b02c166360f547f14e75567d871ea6a9bb35fd8a94c030f28d7b,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,0d6554d17808fae404c18fd87f0cb343eeacec3983f90ccf7acd89f92adcb133,2024-06-20T17:27:01.447000 CVE-2024-30105,0,0,5c287591f93c13e98077376ded79fc92f7e3c347ae72d3d5f10ca6d6cbe0e5e4,2024-10-08T17:15:32.123000 -CVE-2024-30106,0,0,f25da1222eb367e82cc3de9933bf4dc71ebdd82cd982ac6573f83cd30af0cc34,2024-10-28T22:15:02.583000 +CVE-2024-30106,0,1,8ab2ac7d3ad4bf5d3e8d0dff0555f704b19a1ca4388e028a4f9eb8ca3b3fa3cd,2024-10-29T14:34:04.427000 CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907fcf,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000 @@ -252107,7 +252120,7 @@ CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc5 CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000 CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000 CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000 -CVE-2024-31682,0,0,80a6fa070deb0370560504b4fbd6eefe7a627d5dbcf4ad67176d2e92301ec450,2024-08-01T13:51:05.133000 +CVE-2024-31682,0,1,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 @@ -254142,7 +254155,7 @@ CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957 CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000 CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 CVE-2024-34535,0,0,83aae08bc421f9eef8621f242b24214806a581d0b260711ffa707015c3215f8f,2024-10-04T13:50:43.727000 -CVE-2024-34537,0,0,389838456def56684080f5d3a14be55ad28316b0fe0feffb00b34650c67f7440,2024-10-28T17:35:05.300000 +CVE-2024-34537,0,1,6a5bd37c8eda18d75698c309ae9100146ca82732c3ce161d9af9cbd057bb9624,2024-10-29T14:34:50.257000 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000 @@ -257439,7 +257452,7 @@ CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3 CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f7435b,2024-08-09T19:35:09.360000 CVE-2024-39202,0,0,348a7ae5d8dd5240a11e31748e08097038b5b43463791ad3f8bbf301dcb39ab4,2024-08-01T13:55:45.870000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 -CVE-2024-39205,0,0,9042b129977804218881d13aa02f12e97ae7480e3f705111c2cbe48efbd669f2,2024-10-28T20:15:05.517000 +CVE-2024-39205,0,1,f4e69fa131329462127e5fdc9af158ac6672a688ccaef54ed7ede7955ce9502c,2024-10-29T14:34:50.257000 CVE-2024-39206,0,0,ff238c7a799bd8156023ed396579b78ee6764c0b74ea4e700d568262004d102c,2024-07-08T14:18:50.487000 CVE-2024-39207,0,0,49494954d802f1c665c4a01f3343dfa603146f5c61e074b2d6ca53d1106856d7,2024-08-23T16:35:05.620000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 @@ -257897,7 +257910,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 -CVE-2024-3980,0,0,af7d02bc503a7625123fe3e6728981b9674a4164c60a7ca3f7e7e1561da1eb07,2024-08-30T16:15:09.517000 +CVE-2024-3980,0,1,ca3511d7901d042fa00bfa9c0d0aa676b250ea6c77161bee8a48883714e5741d,2024-10-29T14:15:06.670000 CVE-2024-39806,0,0,707dfc0ddef50ef77e39ddae9dd446416de56337e997263c3f5b5e8fa232a33d,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 @@ -258334,7 +258347,7 @@ CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9a CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,0,b319a5c14fed8044a509ef81f6095df68ab536135d2c2fae907e2b500cf3aeca,2024-10-28T21:15:04.670000 +CVE-2024-40792,0,1,a4c457b66231f97ca463d7d02b628d2b46a4a30858400c9b7714b3c6ea34d1d2,2024-10-29T14:34:50.257000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 @@ -258394,10 +258407,10 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39 CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000 -CVE-2024-40851,0,0,9f9dd99aa0752fff7947df9a35e7b1b3875729399a3d17639f3f07a75292f807,2024-10-28T21:15:04.740000 +CVE-2024-40851,0,1,25e5ec0f74dfefb8e795767adb9b7cbd92969119bc9336f0829dfa6a107177c8,2024-10-29T14:34:50.257000 CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000 -CVE-2024-40853,0,0,1be9c9b6d8843fcebf406d6be823829a0da6c73100dcd6f7f3d5a3daadaf93ba,2024-10-28T21:15:04.810000 -CVE-2024-40855,0,0,51be9fba66f27eb8264939c2a69b13376257e377061b201cbaae273ef4198aa1,2024-10-28T21:15:04.870000 +CVE-2024-40853,0,1,1edd93b2cd04ef970830591d2fe9edf915eff310e2a5aa02f2d62ec6f87bce5e,2024-10-29T14:34:50.257000 +CVE-2024-40855,0,1,98eabe05e31ce8cc5e2afa7999e4c42a9d8250babdab092c0d84feb33fa2f26d,2024-10-29T14:34:50.257000 CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000 CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000 @@ -258408,7 +258421,7 @@ CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe8 CVE-2024-40863,0,0,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000 CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000 CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000 -CVE-2024-40867,0,0,f27b39d1946b768a85c2aa6f1cf89b971d07ee7136f06622226fa221ce4f2907,2024-10-28T21:15:04.937000 +CVE-2024-40867,0,1,611f5e093ce725c56f21401987cb4ebb55c10ccc4802784536e85daa483d258d,2024-10-29T14:34:50.257000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 @@ -258676,6 +258689,8 @@ CVE-2024-41143,0,0,e8899d473fa3a8ea11660d6f2ba88aff617e29347ef6b002447e4155241e1 CVE-2024-41144,0,0,a99ced5ff39791199789f8b7404cf70d5ada3bff5c6dc65a7803cc1121e905e5,2024-09-04T17:25:48.123000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-41150,0,0,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000 +CVE-2024-41153,1,1,9bc9accd9b726d5fba594979c6c735fc93239f267ae9c2deed394ca446093523,2024-10-29T14:34:04.427000 +CVE-2024-41156,1,1,ca86062aae39225a6c7806ef2ef661a811a46a081d50c06c4bddce682b10ff55,2024-10-29T14:34:04.427000 CVE-2024-41157,0,0,7a282611d45c2fbb6f2dc936e4617dedd23e7f4d2ca4cbf354d2844aba4fb55d,2024-09-04T16:30:40.737000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41160,0,0,4405f1fa554ba7d9df44bc4bbb96ea93e068b229b76d85cd7934b300d79543d0,2024-09-09T12:21:53.383000 @@ -259165,7 +259180,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 -CVE-2024-42011,0,0,b3f011f3027a1599863dfd131441b2e1d8e1c0316d746ea5e5106951975c432a,2024-10-28T21:15:05.043000 +CVE-2024-42011,0,1,6c3467251e164c596233c97e56a2ece8699104c8d56c773b7e497bb18011c226,2024-10-29T14:34:50.257000 CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655da88,2024-10-04T13:51:25.567000 CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 @@ -259177,7 +259192,7 @@ CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc81 CVE-2024-42024,0,0,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000 CVE-2024-42025,0,0,8c1d228ed90571100df9823974eb0ba9e627f86789cc232c3042885df4b8d2fe,2024-09-28T18:35:02.277000 CVE-2024-42027,0,0,9b88726482b48ccc583b18a00f310466c06f5dc176ed5d6222ca3def4192088b,2024-10-07T19:37:18.967000 -CVE-2024-42028,0,0,8144dc1c10c41b8af5640e762203351c23a04afec0da72be7b8ab1f06d064a11,2024-10-28T19:35:25.640000 +CVE-2024-42028,0,1,98a8f00881cc1445f43a3028f98fad5697aaf777c46354f753a7fd56ae5c8e41,2024-10-29T14:34:50.257000 CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000 CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000 CVE-2024-42030,0,0,59fa56f47f76e92b6c6c6a3fdcb37d68b092a6ac90822c136b288bb49e8250df,2024-08-20T16:55:16.100000 @@ -259795,7 +259810,7 @@ CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4 CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198ad98,2024-09-06T17:35:15.190000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 -CVE-2024-42930,0,0,644796a914f498900f1a70a7fd6df83e83bc0743f4bf5e01cf66015741e54271,2024-10-28T20:15:05.643000 +CVE-2024-42930,0,1,b548e9676bae466ea67c6eb53ec6451cac89781b577c7007794d9a6e80930823,2024-10-29T14:34:50.257000 CVE-2024-42934,0,0,5b485bf0fdf98b0bf0cffd2e2fdf9041db2ed703f1341f5eedd90fef284d1734,2024-10-10T12:51:56.987000 CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 @@ -260634,11 +260649,11 @@ CVE-2024-44116,0,0,f539024555f2c30aff387b07786f96ec82aa197562db4318d2a4d0edb7b50 CVE-2024-44117,0,0,e1e7d2c07b8cb4271ea5948f1fafb7d04df2168a6fe40662a14c8cff93dd2ef2,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 -CVE-2024-44122,0,0,88a7e4835b0b2452c9a5602d0e34d8b4c4c872966e0b8a9ab9a60ebc3ba57568,2024-10-28T21:15:05.123000 -CVE-2024-44123,0,0,88c651340765f296d99593ff764ccf8ed85dbce99e2170f6f3e55522acd50fab,2024-10-28T21:15:05.190000 +CVE-2024-44122,0,1,1340f3ecd616551294893c5095ac9698cf86e08271dc9bf65a4c6024a5af8f09,2024-10-29T14:34:50.257000 +CVE-2024-44123,0,1,e1755eb06b144b6cfbd6699d6335d3e8b6cdb9c2aa5401ff7c6a1ed48732203a,2024-10-29T14:34:50.257000 CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000 -CVE-2024-44126,0,0,7709a4b08bf0ae48124dc6a6f2014a80059d4cc91e27cb1cd54c9557b2f8596f,2024-10-28T21:15:05.263000 +CVE-2024-44126,0,1,90938a085a57c8cfb05cb5bb5b13e40f51df0d29110ab06b74c77b3df02fc0e9,2024-10-29T14:34:50.257000 CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000 CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000 CVE-2024-44129,0,0,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000 @@ -260649,11 +260664,11 @@ CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000 -CVE-2024-44137,0,0,01a6e27457e8f1125a31554699301b222dca6a50334030826c6318d1db3bee58,2024-10-28T21:15:05.330000 +CVE-2024-44137,0,1,79d8c21f444be873db08890a2861623fa980ff76aca5b482418334247708e8fe,2024-10-29T14:34:50.257000 CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,57715e2d990f9d527737048c7f2d3ad8cfd6106560321ec000dbd72a512ea712,2024-10-25T12:56:07.750000 -CVE-2024-44144,0,0,3290529f343e3eb2569d1c51aab63ee265fecfb09279d215ba2cdea713a78986,2024-10-28T21:15:05.397000 -CVE-2024-44145,0,0,a04a66b1ed710943991ad2f5b2c87a42e88ae0476676ce5edd28586f7caa17ae,2024-10-28T22:15:02.820000 +CVE-2024-44144,0,1,c716c024cea4546575d5c46874888b6e9317a1b578a46335bd5629680a0b269c,2024-10-29T14:34:50.257000 +CVE-2024-44145,0,1,61196886e731f714891067a20c53eefb6667f07cb96b5fcd610eb0fa4c068181,2024-10-29T14:34:04.427000 CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000 CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000 CVE-2024-44148,0,0,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000 @@ -260662,11 +260677,11 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218 CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000 -CVE-2024-44155,0,0,7faeb1469438eef38c5f4e60042041cb348c38fb6fe1695ad24903281f32b4d2,2024-10-28T21:15:05.460000 -CVE-2024-44156,0,0,34419c4ca5955fde2123e10a0005f1c3bd8ada06673fbd108b94fff35f41b5d0,2024-10-28T21:15:05.543000 +CVE-2024-44155,0,1,666f08a4095b9d1c3f09991e8f388be769c689973d6ac2d0e961fcf952e9a9b6,2024-10-29T14:34:50.257000 +CVE-2024-44156,0,1,9f35e2868655885b1503d4332ff3a4cdc9357da07044a4d25396a3baa5f3decb,2024-10-29T14:34:50.257000 CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 -CVE-2024-44159,0,0,8b0bac3c35fff6fb1502786239145d9b77d35b8ccd6c189fcf1e396f196c0f38,2024-10-28T21:15:05.603000 +CVE-2024-44159,0,1,961c4250cb7c3a2d662931ad9064a8a8cfcd8fa14ac4e1e987158bf2e3a0a46d,2024-10-29T14:34:50.257000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 @@ -260680,8 +260695,8 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 -CVE-2024-44174,0,0,ef851df429ba081c726d7942282e2492bcc82f3ec4c27bbcfbfa729d5f799508,2024-10-28T21:15:05.667000 -CVE-2024-44175,0,0,a2a322ef3bc96588a3293aa89b9348d5b1e95970942ab0ae8eb5119e9aaa304d,2024-10-28T21:15:05.737000 +CVE-2024-44174,0,1,0223165b1cbe06673786506076d3de8e8eb0dad3d24b6ddf78b08de38f2de840,2024-10-29T14:34:50.257000 +CVE-2024-44175,0,1,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000 @@ -260700,80 +260715,80 @@ CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c281 CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000 CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000 -CVE-2024-44194,0,0,fd20fb70030c82c7800c6512dca589cfb3e2d5a39a2d7122fcb33a14a2c997c1,2024-10-28T21:15:05.800000 -CVE-2024-44196,0,0,bbe40a226c84f45be2155319506230a193850320c31ac77e69313780c153c2da,2024-10-28T21:15:05.860000 -CVE-2024-44197,0,0,6e07f2c2ea51feb22083b52e176594814da3403a73c597db9c60de6b4d047471,2024-10-28T21:15:05.917000 +CVE-2024-44194,0,1,a903dcdde1fd9d3163ec05258db0160ebd2ed91097df8b113a89edcdc22938c4,2024-10-29T14:34:50.257000 +CVE-2024-44196,0,1,b08bc757892408337b10d6ec5d606c09363a1579be4fa3f75b1eb90bab9bb059,2024-10-29T14:34:50.257000 +CVE-2024-44197,0,1,e38e0235fcf85579dbe16d1dc7df7b31f0e5ecba2c502c313f48d42f4d4e4171,2024-10-29T14:34:50.257000 CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000 CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000 CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000 -CVE-2024-44203,0,0,647dbae1512f4dc5dab0cafb3bf5dd1a8068e54e7a2a5781fe903df3810c5b76,2024-10-28T21:15:05.977000 +CVE-2024-44203,0,1,fe3ae1b04117351d872ca462cd193c59f091d3699ff66923561d7699fb5cc5d4,2024-10-29T14:34:50.257000 CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000 CVE-2024-44205,0,0,59fd42a513f8b9b05510dc4d5cd2410ebf696fddc2b7f785062aa10ccb8441c9,2024-10-25T12:56:07.750000 CVE-2024-44206,0,0,6d32fe777ad4ad629602e838e02c2bf263ced12e49e4f955b73bb10ec754db34,2024-10-25T12:56:07.750000 CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000 -CVE-2024-44208,0,0,262620e022b83a9cc27b1b45cd0399ef3117f6b7f641cf49d910643fcfa4957a,2024-10-28T21:15:06.043000 -CVE-2024-44213,0,0,d4d08afaa8c91034f2128d9604325c3d156d88a074874ac870b9d7ab8bb72456,2024-10-28T21:15:06.110000 -CVE-2024-44215,0,0,5017672713c1ca2876bf708f13bedeb5320fd882755793ae51ab14976850ca9d,2024-10-28T21:15:06.167000 -CVE-2024-44216,0,0,5f8cc0dce737c2d7e1c57b0430c5669e805a35316bb93299f43a05b20ff13cdf,2024-10-28T22:15:02.893000 -CVE-2024-44217,0,0,44191014cac84a8f02b3388f9bb1b7b4d74f6298455c4a4cae15f0c54d172650,2024-10-28T22:15:02.960000 -CVE-2024-44218,0,0,0fd70f140ac57726c30af6ff682059cee17cf2a5cfa48d5d66235490728f4e78,2024-10-28T21:15:06.237000 +CVE-2024-44208,0,1,d9c90ab83e9966704661dc1dbbaf16880493e16688d4cb3e4d97fb1b40b33aaf,2024-10-29T14:34:50.257000 +CVE-2024-44213,0,1,8f3af05cc28637515ddd7c72b05e054e2da62bf3199c29442c79bb3fd6a47a3a,2024-10-29T14:34:50.257000 +CVE-2024-44215,0,1,857f244c4b6f0129b65da808880593dd1da0efe0b6a97e93140557ee3b01e4f9,2024-10-29T14:34:50.257000 +CVE-2024-44216,0,1,8a22d717307edd2963aefe79220e9b12f1b5e7d0db9f246878930d2be4e96b9d,2024-10-29T14:34:04.427000 +CVE-2024-44217,0,1,8b60f51ef8644c438039e06b8992ee66edeebbbd14221559db35349bd3ce234e,2024-10-29T14:34:04.427000 +CVE-2024-44218,0,1,5e78ad3891c577ae40b5b1c743613204fd22830c4fb22669ad5665bd144df815,2024-10-29T14:34:50.257000 CVE-2024-4422,0,0,19c238465441950f6a856008185dbc8a7b4e94407f1040ce4816040c86860490,2024-05-30T13:15:41.297000 -CVE-2024-44222,0,0,1d13ed266485bb3ded7c48d1c7c7af7cd02d1ee1f1a4d5a7e6f400355c5901ee,2024-10-28T21:15:06.297000 -CVE-2024-44228,0,0,23f2283b4209307eb8512a94518141cb5c7bb85750a3a33408bd3422e31a158c,2024-10-28T21:15:06.357000 -CVE-2024-44229,0,0,540cd6b9f9b8eddaa3f7e355a65df0827a697e8f268e210628278172594a1800,2024-10-28T21:15:06.417000 +CVE-2024-44222,0,1,430e43230c18cb76b0c6a5776e43d6984589993d5e4e16522b5e6f96310d424e,2024-10-29T14:34:50.257000 +CVE-2024-44228,0,1,b4ec0c286c90b7d110826c3e3050b88cf72adf886ea6358e084ef440fad91f6c,2024-10-29T14:34:50.257000 +CVE-2024-44229,0,1,0d821d59fa68c4f6699d76b52e3fa7165222d86e16164a61bb15f4854a8f65fe,2024-10-29T14:34:50.257000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 -CVE-2024-44235,0,0,0e48e156e798cab04923652ba8b1537c90f1a72a657af240cadd4801a8cab625,2024-10-28T21:15:06.470000 -CVE-2024-44236,0,0,cda05128247bbc0915cd9e036c72f94003ec0a68e97c60c93080ba2f50885bc0,2024-10-28T21:15:06.520000 -CVE-2024-44237,0,0,f55d666e9fd09b6406993de29da4a324a83c09cfd18b757e4997f73714b5ed5f,2024-10-28T22:15:03.037000 -CVE-2024-44239,0,0,9f10f2da9c0690b8580256c1becc29b713edc3c6eac1437cc4ba10ba479e69a5,2024-10-28T21:15:06.580000 +CVE-2024-44235,0,1,286733f8c5a68de9c8fb971876ae84b3c9daf32f559dc19006287da0e5f6f126,2024-10-29T14:34:50.257000 +CVE-2024-44236,0,1,63dc023055d62715d02d7757545e9c305c5de9f2e48481980e7aa98b7bee53e9,2024-10-29T14:34:50.257000 +CVE-2024-44237,0,1,67841c059fe7a0535a392295730ef15e50508d709ee3c5904a837cd50e2c0c32,2024-10-29T14:34:04.427000 +CVE-2024-44239,0,1,6572c4bd50e97c915779c9681dec90ff254e0ffa6df2363add5efde003d61b9f,2024-10-29T14:34:50.257000 CVE-2024-4424,0,0,f0ec85c26b242f03f1dda01796c703344a9d3cb93681b5b37fa83e955b9558c1,2024-05-14T16:11:39.510000 -CVE-2024-44240,0,0,b1a0383b3b2e71029e05c10c8c89bf4c1ea5801b95d24140c623f2d910603511,2024-10-28T22:15:03.107000 -CVE-2024-44244,0,0,db5f026cf6dd0f867878e6047c22f8087f0e93a2c03c03293c456691d920c5d4,2024-10-28T21:15:06.637000 -CVE-2024-44247,0,0,b1809bb13ac7fd57babcad627192cfbb7325b7ec2bdec2747f88f99042722e23,2024-10-28T21:15:06.697000 +CVE-2024-44240,0,1,185e7fe99a086851f3813e2fc4dba328997e038ef58b8ffee754df543f88d5e3,2024-10-29T14:34:04.427000 +CVE-2024-44244,0,1,30aeed51fbbfd226df0eec4456cf731bd27b2cd7c71970d76a2ba0b7d174b801,2024-10-29T14:34:04.427000 +CVE-2024-44247,0,1,d7b92efdaa300dd98e4987c2d8849c05e732d8243dade9113cd309b9e95e3b2f,2024-10-29T14:34:04.427000 CVE-2024-4425,0,0,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000 -CVE-2024-44251,0,0,b4c4732500a93cd31b53cfd3ad7f280632b973b51c452fb6956d9698e1d19668,2024-10-28T21:15:06.757000 -CVE-2024-44252,0,0,27a1607ec70bb63feeb1e3230e53626cb3ba2743a51cfba8319bdd457ad2047a,2024-10-28T21:15:06.813000 -CVE-2024-44253,0,0,d771f959e2b5d55dbee42a10515c190a32f092c576e1a936b15107458414d279,2024-10-28T21:15:06.870000 -CVE-2024-44254,0,0,dc95eefb8596cce72711f28c9f00c6f9216af38ecde7fd1a2a0b4183ba010513,2024-10-28T21:15:06.933000 -CVE-2024-44255,0,0,8b3aafdbaa77edc850edb010e7424c4954467c7568c56381b04a86c09f02e978,2024-10-28T21:15:07.003000 -CVE-2024-44256,0,0,afd933d2032ae98222a1c3a3e5f726e0b86f44bd16c9e75d59df99ebde72d981,2024-10-28T22:15:03.177000 -CVE-2024-44257,0,0,edb4f61061d938810a009f14cf6ba2efda8c702d1ebb59e8487d8f4a8941032b,2024-10-28T22:15:03.243000 -CVE-2024-44258,0,0,4549d69f17a04c1efa4c2d2a27ef3f0d9eabb65ae49a607bebb2f8d5bce9779e,2024-10-28T21:15:07.083000 -CVE-2024-44259,0,0,8667edbeca3c2257e00eb8f51923efa0448daab25fb0445ebd7ef0f1e2e2f435,2024-10-28T21:15:07.160000 +CVE-2024-44251,0,1,406183b990c31e8b289d3648e898b17ee3f61e9384718d2bc8b02eb22ceb576d,2024-10-29T14:34:04.427000 +CVE-2024-44252,0,1,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772ccd,2024-10-29T14:34:04.427000 +CVE-2024-44253,0,1,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000 +CVE-2024-44254,0,1,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000 +CVE-2024-44255,0,1,c293b56d90061943fca03b3c22094ae16c5cc4b9fe38c830f913fdf59fc5c0ed,2024-10-29T14:34:04.427000 +CVE-2024-44256,0,1,98d942d6a9d59f1af584e5bd1bc5f9388bafd2b33f312fa8187b69e94e48ace6,2024-10-29T14:34:04.427000 +CVE-2024-44257,0,1,6bba3e0f67307ea0c3e8120f777b72620e4f81e0e2ecd0184d7952182961a617,2024-10-29T14:34:04.427000 +CVE-2024-44258,0,1,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000 +CVE-2024-44259,0,1,b33d61ba14321cd629b5384b5755a71fd96b24fb8d98530def81d7b250119a8e,2024-10-29T14:34:04.427000 CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000 -CVE-2024-44260,0,0,d6d4914f77ddaefd066d999b4310f4c22fce73ceca1c5b5538981cf428cb9391,2024-10-28T22:15:03.313000 -CVE-2024-44261,0,0,e58a06a7fdf3b33d4af87361cc8e611b43aca532f22372699ee63d4a021347e2,2024-10-28T21:15:07.220000 -CVE-2024-44262,0,0,64ee5f4ce8f3513422f37d3a85d530caecdc3a1a05cca0ae3fd1d2d6b4d1dca8,2024-10-28T21:15:07.277000 -CVE-2024-44263,0,0,78a630ad9b6166e66b50368d6b71ba1fada9ec99f52207046f5c82b96f7a9133,2024-10-28T21:15:07.333000 -CVE-2024-44264,0,0,2a25511efc510dab7a2d1ef5e79a3fb62e4ab1e389e5afd215c3a8ecc532a72c,2024-10-28T21:15:07.393000 -CVE-2024-44265,0,0,9e3b3d58a5fd37cf457ae0f54f66f4720c037601c75eaedb90f6ac87483b4ddf,2024-10-28T21:15:07.457000 -CVE-2024-44267,0,0,e902104875e9786a618595e5f7cc49cecc342a6162a3af778d46571754061585,2024-10-28T21:15:07.513000 -CVE-2024-44269,0,0,239c06f897e30bfe989ba376c37663010163bce0aef9388aceb60048ba477ba0,2024-10-28T21:15:07.577000 +CVE-2024-44260,0,1,52cd827ed188e2ba87c94f3763c13e0c3db6d730465a38e348b9fbbbcf519ef7,2024-10-29T14:34:04.427000 +CVE-2024-44261,0,1,22fd5a823bbc562d733fa25b554334b6c66a67b7c9a20626885d5951caa0d590,2024-10-29T14:34:04.427000 +CVE-2024-44262,0,1,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d3169e6,2024-10-29T14:34:04.427000 +CVE-2024-44263,0,1,136e35ae5da9571910fb8139bfedb30afe70554d37ea2b002ad552501aa73d5b,2024-10-29T14:34:04.427000 +CVE-2024-44264,0,1,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000 +CVE-2024-44265,0,1,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000 +CVE-2024-44267,0,1,f5c2dfd9358b1edbc0f2868c6f458bbbeb2bb0f961b2dba9781285f6322034e4,2024-10-29T14:34:04.427000 +CVE-2024-44269,0,1,1c9a87340d5e4e82f40555347c8caadf6fa5b6f66b0f5a9614db97e3a7ef4b37,2024-10-29T14:34:04.427000 CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000 -CVE-2024-44270,0,0,f2e731d10217a0335be1a244d8b0ff99d3f77bcc40b603a1065a7f86c63cbedd,2024-10-28T21:15:07.667000 -CVE-2024-44273,0,0,7a395dd259d03f9217294ab79dcd8e81d4bd8d05c8523757076c5f060d18678d,2024-10-28T21:15:07.737000 -CVE-2024-44274,0,0,b6b69e1050aed79f843b007a8c74de02f0d90677ec6ac892aa3bca66f9de3e74,2024-10-28T21:15:07.807000 -CVE-2024-44275,0,0,75b91852a59175c6394a3c4cab3451f065a9a66e4e4abb73754bb1cd03e89b4d,2024-10-28T21:15:07.877000 -CVE-2024-44277,0,0,8e513e885e542f6b9352a99e2d4b16263f8770d20ad816fb31f306d284152983,2024-10-28T21:15:07.950000 -CVE-2024-44278,0,0,ca20011b1c4f5b96085b930276a4b61856ff700d751047e03dcac9d5543fe182,2024-10-28T21:15:08.027000 -CVE-2024-44279,0,0,091ff2164aad108c8e675669292e5636f2583acbc2c3a8fd90a3620605d14668,2024-10-28T21:15:08.110000 +CVE-2024-44270,0,1,fa1da7541e315914d13db03404f7944f7fff55d48c82c634d2d8fa5d00e47e2f,2024-10-29T14:34:04.427000 +CVE-2024-44273,0,1,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000 +CVE-2024-44274,0,1,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000 +CVE-2024-44275,0,1,77f960a6c909a3fb64168321393f7fb91df2928e5a403ea1281205d85c48e809,2024-10-29T14:34:04.427000 +CVE-2024-44277,0,1,fe261596084ebbb2024c9ef906f0ef31586c9b779d9ed86fafd7c7620d98c2d1,2024-10-29T14:34:04.427000 +CVE-2024-44278,0,1,45d301e85733876f61356281523db1b97bd7d9239c67f80b5edc2a6444ad1fc3,2024-10-29T14:34:04.427000 +CVE-2024-44279,0,1,3d3d2782cf38cfbab9143a09adbd7eeae67209432aad5b737f58221076c4a8cf,2024-10-29T14:34:04.427000 CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000 -CVE-2024-44280,0,0,8e6545adf7e8535053e4a8ac959a559a836d80023a7ee07aa45565f93a5921c0,2024-10-28T21:15:08.180000 -CVE-2024-44281,0,0,b9ed5c3b8a44175467b35e25f2fd4dc44da8ec25b20cc203726877b881a6abde,2024-10-28T21:15:08.263000 -CVE-2024-44282,0,0,0f98f092a05ef6637e91f23322515ebd7a504af3d6e65c15c14d9b9536e242e9,2024-10-28T21:15:08.340000 -CVE-2024-44283,0,0,02010ca287bef331f42706d74a610022ea0ca7059dbcf7f6568ad7dc83050eac,2024-10-28T22:15:03.380000 -CVE-2024-44284,0,0,434cd2e34bef764caabb38b96a9b272f4c28d14dcd19db999f416e233e799fba,2024-10-28T21:15:08.450000 -CVE-2024-44285,0,0,53fdb3caea11f2f74e357329dc442c9e367a1684570bda25adf507cc1f875b66,2024-10-28T21:15:08.520000 -CVE-2024-44287,0,0,a8ec41c566ba871b8d84ee6596ce6c51ff6d8308311d0b45b167177588f7f0e0,2024-10-28T21:15:08.600000 -CVE-2024-44289,0,0,92be9427f53fd0ce59f08d29496e4cd81159458f596a6882e50bca670df04202,2024-10-28T21:15:08.680000 +CVE-2024-44280,0,1,21de8a35b7363cadebf78d71c9679cbfa65e9991e7a3abe607be7008a71fbb5f,2024-10-29T14:34:04.427000 +CVE-2024-44281,0,1,836ebb72fd4fec7a9d20e240194eb06c62bd346b60d324b256da0dcc1d64341f,2024-10-29T14:34:04.427000 +CVE-2024-44282,0,1,2ce9add6bca6a5fb5f9e2a9927b9d377072eb7ea4d31e698829cc2ba8842de38,2024-10-29T14:34:04.427000 +CVE-2024-44283,0,1,a423cd05f62df911ca6ddacbb8c38c7df53f15d86abee9d91d2471a48967b603,2024-10-29T14:34:04.427000 +CVE-2024-44284,0,1,c76de62ca97b26366f3caef3b2ac2c50f1359a184662302dbdc75806232b62e6,2024-10-29T14:34:04.427000 +CVE-2024-44285,0,1,b656a197156ce3f639f54c5926d64ea036ead860c09dc50b8dcfb70113581d04,2024-10-29T14:34:04.427000 +CVE-2024-44287,0,1,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000 +CVE-2024-44289,0,1,17ea3e31cbf229ba697914c0bb3a6428c768ba70e730ea12af09c5d0c2b9e013,2024-10-29T14:34:04.427000 CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000 -CVE-2024-44294,0,0,21236e27b5fb06655864599f15a5fc562ed7d1da7418a9c80c6c18cb9dbe37da,2024-10-28T21:15:08.757000 -CVE-2024-44295,0,0,ef67f0d3cd7f6f6d110f83e907c6b65425b8ccff3f86ae9ef12fe3d7366f6e81,2024-10-28T22:15:03.453000 -CVE-2024-44296,0,0,d2c78b1c2e322857b8ed2a2091ac0eedfd75d1a7b8336ff9ad50808f843f9b18,2024-10-28T21:15:08.830000 -CVE-2024-44297,0,0,2a4377f42367786ed42e848831ef22fa56ba5343b66f8302f5e68e4d7fab81a1,2024-10-28T21:15:08.910000 +CVE-2024-44294,0,1,fa812b7e03fe790d73b0aac952d1f53f6ad4492b6a56aeea2457ae94b001b0b6,2024-10-29T14:34:04.427000 +CVE-2024-44295,0,1,e21fb01feb4b35c66953337c3e4ea909631ed01420e1b8c957b47fb33e8b6e42,2024-10-29T14:34:04.427000 +CVE-2024-44296,0,1,8eae18df893df94f7a0550282d74d94b11ab475bc0e7df7b22fda27831ec706c,2024-10-29T14:34:04.427000 +CVE-2024-44297,0,1,5340f0bfd5196685137d920973c09b0e792fd4738c99aad86b1c7ddfacfd18ec,2024-10-29T14:34:04.427000 CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000 -CVE-2024-44301,0,0,d3dd3bbbf33981770152dfd65d2548ffe6e323c32eb61973f92d1c2087134475,2024-10-28T21:15:08.977000 -CVE-2024-44302,0,0,901902f8943d64f684b2f30992a156a30d6bc00680038af6718b82b7ffbf0959,2024-10-28T21:15:09.040000 +CVE-2024-44301,0,1,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000 +CVE-2024-44302,0,1,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 @@ -261407,7 +261422,7 @@ CVE-2024-45473,0,0,865aa159e69490a974a9134607670a0c10ee3f357ea596017add2302228a8 CVE-2024-45474,0,0,0077a4784ce6e6c47b98449e48d902bd7a576357740b2f012aa0621077fe9ec1,2024-10-15T17:31:54.730000 CVE-2024-45475,0,0,ceca83f140e5142ec9e788bac45b6a2b3e6a9f421935b40e9d1d34e5a20ee9c9,2024-10-15T17:31:52.313000 CVE-2024-45476,0,0,caca7fe790f916474a7ca41537f465a0ddfe22def297e5b30824f70c2c729b14,2024-10-15T17:31:50.310000 -CVE-2024-45477,0,0,0badf5abf211711daf88cefe29994804e54bc305fc1bddfcce61c8e9d36cf9c7,2024-10-29T09:15:07.053000 +CVE-2024-45477,0,1,aa55128afa07e2ec27cbce9484fb81a6e1f19ece5efbf84e973d00438f6220ed,2024-10-29T14:34:04.427000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000 @@ -261477,7 +261492,7 @@ CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000 -CVE-2024-45656,0,0,da0197da09a37546ed7fd3ad8b43f5a84580287fd1dfd0c4609c6217d4610e0f,2024-10-29T01:15:03.823000 +CVE-2024-45656,0,1,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 @@ -261550,7 +261565,7 @@ CVE-2024-45799,0,0,57236f37d51cb52dc4abff4e8ae9968f58089f5668de4fddcdb24ddcded04 CVE-2024-4580,0,0,f99138bfd0684bd0d747f9e33cce7b8336876269ba637f66c2865bb254a7b704,2024-05-16T13:03:05.353000 CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53849,2024-09-20T12:31:20.110000 CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000 -CVE-2024-45802,0,0,5c73c4a5fca153922e1b3ae76e2f55b6518a9c4fbbe2abf5384954104bf13e1a,2024-10-28T15:15:04.857000 +CVE-2024-45802,0,1,c052cc984d83b3c466685649bceabfc2d5154b3dcc0e3066983d946a070e58ab,2024-10-29T14:34:50.257000 CVE-2024-45803,0,0,a103e4b6ec153497af7929b1abcca6c81c3d6f7a709474f445551e656cc860a0,2024-10-07T17:05:16.440000 CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000 CVE-2024-45806,0,0,1ea4fb4c712bb48146dcc90039539097532217007de9e1bf4affe475258a028d,2024-10-15T16:03:44.943000 @@ -262086,7 +262101,7 @@ CVE-2024-46869,0,0,9ed81572871432f968131373b48d9116fc414e30c1ec7495d6906513924c2 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 CVE-2024-46870,0,0,652ca601a7652d849ccf9f3fa227a6384ea9072535f4139d45e923bcd7c9f15f,2024-10-23T14:26:28.690000 CVE-2024-46871,0,0,4bbafc222a5b983e7eee48edc0ec35209cfa7a3a04fb16a3dfef1b1e5b5df95d,2024-10-23T16:10:48.077000 -CVE-2024-46872,0,0,19ffd510b104c6a9e498bf77efab87c69f93e0c679681271d0410da11c69c7ef,2024-10-29T09:15:07.350000 +CVE-2024-46872,0,1,b3c1445c6544e844aa85eceda3b1dbb6578b4c4e7e3957479208ade9105061c7,2024-10-29T14:34:04.427000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 @@ -262405,7 +262420,7 @@ CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 CVE-2024-4740,0,0,439bcc64d74362dfc2e1f6f7e2fb88748e7e0a568332807fb055a46f95bae835,2024-10-18T15:13:42.123000 -CVE-2024-47401,0,0,e1c0d85dc72396cf5dbee22c0e9da82e3e0965938af80b189f701291a120f9ea,2024-10-29T09:15:07.753000 +CVE-2024-47401,0,1,8a5e86c64c6250f94cf1f6a4606f4c5ff007b348a25f8869f6f018d7119e028e,2024-10-29T14:34:04.427000 CVE-2024-47406,0,0,e1bbc16ab2610d9234ce1d6efcd9c6b88f75df26ec8f2e71694220745ef52ef1,2024-10-25T12:56:07.750000 CVE-2024-47410,0,0,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000 CVE-2024-47411,0,0,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000 @@ -262527,6 +262542,7 @@ CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986a CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 +CVE-2024-47640,1,1,95bb8b8fb9369a390ee388c1d4883a0589cc554d5729ec74ea199151c8e3b5c0,2024-10-29T14:34:04.427000 CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f553,2024-10-04T13:51:25.567000 CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000 CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000 @@ -262700,7 +262716,7 @@ CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298 CVE-2024-47824,0,0,60e3e0b82e04fc3016ce5ff7f0485ad8429207cb4be5065515079214bfa51129,2024-10-16T16:38:43.170000 CVE-2024-47825,0,0,e319259d9b937a2cf2775125b51ccc3a135e4cd0dcfdc35845c8f95f676fc6af,2024-10-23T15:13:25.583000 CVE-2024-47826,0,0,e0e92319bd7ff9f0b6142ef26fd12487604c5bd0a7b38d2c0ea52634274a8fe7,2024-10-15T12:57:46.880000 -CVE-2024-47827,0,0,80413833773371d31061cad90c160f2d8a8e0c8f9082216f542562cf3d54042f,2024-10-28T16:15:03.990000 +CVE-2024-47827,0,1,7438babf7e62dcbf2f668453032f34317303c2ca726f8edc25487ba673dcf5fb,2024-10-29T14:34:50.257000 CVE-2024-47828,0,0,a6b81ff1073f19581e05e8c790863d706cba88272fb227df996495bf444dca26,2024-10-17T13:55:23.577000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-47830,0,0,457ed410238dd49134235c9291fcb215f555d7bf33b38d5e70e7cf82b4377f0f,2024-10-15T12:58:51.050000 @@ -262824,7 +262840,7 @@ CVE-2024-48074,0,0,9f8e87819b4cbd70b424fc1b1beb1686903edc8cbc94afedd20cf2ce6d292 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 -CVE-2024-48107,0,0,6db03b179d3b8510c2ca61e9cf34c646309b78b94d2cb28cfc67064a2a94c2e5,2024-10-28T21:15:09.453000 +CVE-2024-48107,0,1,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41aed3a,2024-10-29T14:34:04.427000 CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000 CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50de7,2024-10-17T18:35:09.890000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 @@ -262844,15 +262860,15 @@ CVE-2024-48153,0,0,ed2a32bb2c14f00255ae97ac8d2c6b7371ced6a3b47f478082697408eb2ec CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000 CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 -CVE-2024-48177,0,0,855fb9a8e3c217ba255f660bbca1273822ce4a15caa7994ade62569ed64e85dd,2024-10-28T21:15:09.523000 -CVE-2024-48178,0,0,57289517ee12252efc51f8246ab79584788db1d36dbedd66f107952dea85d4ea,2024-10-28T20:15:05.843000 +CVE-2024-48177,0,1,5acd39b3771ea9ccd3637329c33f61cdb08ead2a4464b21a81ec1b448fad5613,2024-10-29T14:34:04.427000 +CVE-2024-48178,0,1,a5ac25bbc8787ba3cc9ebf81d8786aee148069ca8f15c68fbc88514fb8317fb1,2024-10-29T14:34:50.257000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f40ed,2024-10-18T12:53:04.627000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 -CVE-2024-48191,0,0,6848bbfaf0f071771e5ef5631bb15d34bb6c894147d151eccf635afbb921131a,2024-10-28T16:35:09.317000 +CVE-2024-48191,0,1,9ba7fcbb9576126d52a944517bc9b5d6157dc8b3575acddab54b0bd9380c7365,2024-10-29T14:34:50.257000 CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000 -CVE-2024-48195,0,0,bd9995f48cf77024d1065f2feb29f2a16619202beb6c1ada5b86ca8e7871a381,2024-10-28T20:15:05.903000 -CVE-2024-48196,0,0,97bf5da385571911b4c29fe52d1879fea1f1f632d53da9338df67073d943077e,2024-10-28T20:15:05.960000 +CVE-2024-48195,0,1,3054a51a5210b07d7faf145209b3abc8afc3e28d4e10bf6f8fe8cb40d2a3b462,2024-10-29T14:34:50.257000 +CVE-2024-48196,0,1,d2cd7ad27e7af883e5b6f39983b5e91f258998d179c5a9da881899be449dd56d,2024-10-29T14:34:50.257000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 @@ -262894,11 +262910,11 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48291,0,0,e796f9c4f975be6d0af1f33192fa3fbc79f61e9134ab77a94fdaf148a18830a9,2024-10-28T16:35:10.100000 +CVE-2024-48291,0,1,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48343,0,0,bbc85276f1233bf8cda5fb28da7b9d61383e810674b2a1c30f2b4d48eae2eb1d,2024-10-28T13:58:09.230000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 -CVE-2024-48356,0,0,db98db9bf4b6a913cc79d93a64eabd0a98ad1a5d37c2461a61ee3f70ec7fcded,2024-10-28T21:15:09.627000 -CVE-2024-48357,0,0,c00af3f0a96b6ae810cfeb6dc286b4defd65f5e40f257df136fc4ef671987a9d,2024-10-28T20:15:06.050000 +CVE-2024-48356,0,1,eb83e1244399418d09f0af15f0e28266d6d5b9219ba01c88a810a4fca8aabef3,2024-10-29T14:34:04.427000 +CVE-2024-48357,0,1,6b9632f69af5b85b728c9706bae3831119448965b03733f601b0a0d518bb13b0,2024-10-29T14:34:50.257000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 @@ -262926,11 +262942,11 @@ CVE-2024-48450,0,0,f5aa5cc58edfc45011da40939fe7187d94727340304abe3913585d89b4a40 CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000 CVE-2024-48459,0,0,65ca4f10924c21cc174ad9ec301c89dd215bdae747929dfbd469f345081a8a5f,2024-10-28T13:58:09.230000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 -CVE-2024-48465,0,0,2a055661df50e2a8125df6e81423defb280f2f6c1272557fb50ec76625a48768,2024-10-28T20:15:06.120000 +CVE-2024-48465,0,1,b7bc8b7cfc9842a5d866167a988ef7343bad75516e5493e6477a6a79f57bd11b,2024-10-29T14:34:50.257000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000 -CVE-2024-48509,0,0,c6a322b44f1b5c48c99b4ab0a24ca78577b459bf4c9409e8862d334d073306ba,2024-10-23T15:12:34.673000 +CVE-2024-48509,0,1,284c4916946b05559ac72d79c6f8c0c88af2de3a287de63c88a681a518cf7360,2024-10-29T13:38:16.893000 CVE-2024-4851,0,0,444f4e959fbd50fab42bb9cd6f5b1019a6d50ea56a5371bcf4f4fa6566e3e360,2024-10-17T18:45:13.093000 CVE-2024-48514,0,0,772c22a7c82f7a2ba09c35b523755c3d2e15343c5a23d7fb25f81b1d3b219920,2024-10-25T12:56:07.750000 CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 @@ -262954,7 +262970,7 @@ CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b94 CVE-2024-48580,0,0,cecfbaeb166c1997f85eff468048926c1d6a76c932cf18638f27e79db1bfe914,2024-10-28T13:58:09.230000 CVE-2024-48581,0,0,fd7c149e40f4a27b5093e18e40ce454de675d636c2c72ee484afba9e2e6f192b,2024-10-28T13:58:09.230000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 -CVE-2024-48594,0,0,b5c3ec053204863a908a6f345fedefb4166b83b58687f8ea3cf57786f149eb64,2024-10-28T21:15:09.690000 +CVE-2024-48594,0,1,d746a9ab267fb3d6366b49f5e1e810ae4be71ae5de5276f3f9d9297a22ea4ee6,2024-10-29T14:34:04.427000 CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 CVE-2024-48605,0,0,c6fe6d7786e01bf3c07bbcc6dab9ca443b7f4a840bac8f1d3880bbfc76bd164d,2024-10-23T15:12:34.673000 @@ -262996,7 +263012,7 @@ CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba4 CVE-2024-48712,0,0,26c5ef0ec7563b7eb021e1452100a4e706852158c36c374f8078b72afb6523b7,2024-10-16T17:35:04.483000 CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35eca,2024-10-16T17:35:05.450000 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 -CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000 +CVE-2024-4872,0,1,8b2c6820c717681d25c56a744060fc3e2d72667acf04ef8505ca37b89fed7638,2024-10-29T14:15:07.950000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,5291e828b5f933381ba044fe83ffa30a9574aa3244ef7e9ed3868e54f2102d06,2024-10-28T13:58:09.230000 @@ -263041,8 +263057,8 @@ CVE-2024-48821,0,0,bacabe03ec9f89b5265709188c25b3f847a116b26433e5bc3285ba68cbdbd CVE-2024-48822,0,0,33e7e72a841539b756d8e81e286546360560772d3a59e9e42ee72ea342d844c8,2024-10-15T15:35:21.887000 CVE-2024-48823,0,0,1aba983e62a885979e02cb791116a00e379a5949592156d79fd5ef8d26455419,2024-10-15T15:35:22.140000 CVE-2024-48824,0,0,d6d0f4584129fd346e0e9fbe3994976e485ae1972b08f2a06e763bdf12528646,2024-10-15T15:35:22.403000 -CVE-2024-48825,0,0,ff457515c3c1b0bcfb241f3bd65dd4f6f2a88153f7adc58b98bef7e58ba0180b,2024-10-28T20:15:06.173000 -CVE-2024-48826,0,0,0b42d8d4cdcafe0e16449864ff5a724f28810be80a9b8d8573e4409093ddda1b,2024-10-28T20:15:06.237000 +CVE-2024-48825,0,1,d9524f2e37516b65dfb5220c80baafb64a063d442a9eaa76f6a5e2668c5806a8,2024-10-29T14:34:50.257000 +CVE-2024-48826,0,1,73e23842f367eecdabbf52a8da74f665aeb85747a4dc90c6a1cb3c394c038e89,2024-10-29T14:34:50.257000 CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000 CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000 CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000 @@ -263331,40 +263347,51 @@ CVE-2024-49629,0,0,60f0852b23beb1819b5458d406150de82aa310255dbbddedffa202b89c290 CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000 CVE-2024-49630,0,0,34d75746c00996da3a49f93eed6bc8a4f3be9da6c45cb9f15692d41526269ce7,2024-10-23T20:44:41.857000 CVE-2024-49631,0,0,5230732de6a35313190c213cb431a622620f306560265c0ab55df925f02e4a2a,2024-10-24T14:12:59.600000 +CVE-2024-49632,1,1,b6aa910a6238793d01d711b67c611605efa05142f4f99d683b1ce55d6a3eae5d,2024-10-29T14:34:04.427000 +CVE-2024-49634,1,1,de32cef9ec4be91fae2af05a390224a872c2af3d4660f72a891aa49fb4d4c85b,2024-10-29T14:34:04.427000 +CVE-2024-49635,1,1,956efdcd813edd8b0c50992e432c2791dae865785bdc2e31ed9219302f43b26d,2024-10-29T14:34:04.427000 +CVE-2024-49636,1,1,3c5cd3322412893431ab599636ad02b1e97a1da1ded89c93d6a7bb6f1d29b087,2024-10-29T14:34:04.427000 +CVE-2024-49637,1,1,2dc745c056a34cece786d276c398bf69e1907ff02375dd8fb09ffac8208e14dd,2024-10-29T14:34:04.427000 +CVE-2024-49638,1,1,d01827d0ee488b9070f09ced5eb1c69a68c899bea097d695348d27feae15ba2f,2024-10-29T14:34:04.427000 +CVE-2024-49639,1,1,1eeafd0406a64062b1bfa5d7382f0a0e30de4a38ffa7fec244a4d5f8a12a5359,2024-10-29T14:34:04.427000 CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000 -CVE-2024-49642,0,0,3ffef628adac93f49c34ba75793817b59f2ab63c1b2885bad0fdb58949c6e3c3,2024-10-29T09:15:08.017000 -CVE-2024-49646,1,1,af844ec1944b1821d473580064d30eaf8940b862662ae4f872f2a9f0c0b230bf,2024-10-29T12:15:03.690000 -CVE-2024-49647,1,1,ea25c547dc2468a108bee128c661c55ec7bdb5e9c355415e24bad51dd22b766d,2024-10-29T12:15:03.930000 -CVE-2024-49648,1,1,aa69d230a9717af00ad1aa1a72aa9de8a1123c9a0f31b2a51a815bfbc2507591,2024-10-29T12:15:04.153000 +CVE-2024-49640,1,1,15b8429bfc6b07e3359aecb2089ebf7e02496d8842e0b2634f6ac0caf135c572,2024-10-29T14:34:04.427000 +CVE-2024-49641,1,1,b281893547c51d112e722ba7b5f0cb5a0d41921321f08527e7e9885a3f846a0c,2024-10-29T14:34:04.427000 +CVE-2024-49642,0,1,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000 +CVE-2024-49643,1,1,fe1ed03525bdcff2f5736c096712681532b386cf4e119c9eaa196cfab5e8ff58,2024-10-29T14:34:04.427000 +CVE-2024-49645,1,1,fbc7fb365d72db2b32d09d4bc36811ca2875e91a7b163c8ae6bcdfeef6df51d2,2024-10-29T14:34:04.427000 +CVE-2024-49646,0,1,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000 +CVE-2024-49647,0,1,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000 +CVE-2024-49648,0,1,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000 CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000 -CVE-2024-49650,1,1,b332480455a24da0c851654ff15b26d0428a38722af708cb035100126e244013,2024-10-29T12:15:04.380000 -CVE-2024-49651,1,1,0425c129eb776ecdc0177271775f13cdfa12a8459fd7300dd44189ec86d4a924,2024-10-29T12:15:04.597000 +CVE-2024-49650,0,1,113f1d8fcd4a91401a9e7eb21542e0be268f44720e90bf593259606093fc1561,2024-10-29T14:34:04.427000 +CVE-2024-49651,0,1,455f9ac4f1f89505213df17cf8002ad2571eeeed41c794b6710f9e41a424d959,2024-10-29T14:34:04.427000 CVE-2024-49652,0,0,58dff88968ac6ebf50ac5ee5e6f0dbbe476efcb65a1763b3700d032abe2d574d,2024-10-25T12:56:36.827000 CVE-2024-49653,0,0,44403c7923c745007b13c40f85dd660179917ab02fffac37cb7e731d1660569b,2024-10-25T12:56:36.827000 -CVE-2024-49654,1,1,66a8f4c1d5a104a47aaf7201e03745f07e98ac248a2e34dea5bffbc1d854deea,2024-10-29T12:15:04.827000 -CVE-2024-49656,1,1,f5858f042a80bcc6072dfb87186ec135e084b58f9e72ddd54b6a3332df33da77,2024-10-29T12:15:05.073000 +CVE-2024-49654,0,1,9849e2b6d31fd9ad5cb0449adb4166585aded22c5c60fa2d1b21911f39b8a982,2024-10-29T14:34:04.427000 +CVE-2024-49656,0,1,1fa1eca3083d359ca2d8725d6a0df5d8707a8628cb91da8ff04085832f88d4ec,2024-10-29T14:34:04.427000 CVE-2024-49657,0,0,e92a5c0df7de7f82cf60825f720ce06f676c04466a67c860a119e8449aacc814,2024-10-25T12:56:36.827000 CVE-2024-49658,0,0,75da9a8594fc78f2625eb2a430c46e94efcf375c07d5d68f964ab85a724848b9,2024-10-25T12:56:36.827000 -CVE-2024-49659,1,1,f2d999480b11997f9f449d77d41eb3c0f4d499caba38d7cbae7220936885db08,2024-10-29T12:15:05.330000 +CVE-2024-49659,0,1,61d0f3ade1082f6b5c5c149e94c5cc078bc8df99d3c8d246e3a532e6e6aa1da5,2024-10-29T14:34:04.427000 CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000 -CVE-2024-49660,1,1,a5d462ac148fef4d9c344187383844393980c0436239b71c826f51b8bce2896e,2024-10-29T12:15:05.570000 -CVE-2024-49661,1,1,a06e4b1ca5ec6f76541f20bcd42dcaa06cb7c8863c75dc2cc84e5d1d3d5bfa3d,2024-10-29T12:15:05.793000 -CVE-2024-49662,1,1,749617178f4f1fb7dce4d1ed789d5c0e3962b35b24d358e036f1d14ec59ed5ff,2024-10-29T12:15:06.037000 -CVE-2024-49663,1,1,675d2dc2e28d7b485f58e377303cf57abdf7c017845ab51efb3ca4ebe4b5aba1,2024-10-29T12:15:06.290000 -CVE-2024-49664,1,1,522b5a01a49f8c6effc82a614abf29e376edabc46c2aab5ceb40ef427bc1b5cf,2024-10-29T12:15:06.517000 -CVE-2024-49665,1,1,5fe3b202f9a6b9736e882bab65ed38acd1b9c120ab1743af8a923690c6f4faa2,2024-10-29T12:15:06.753000 -CVE-2024-49667,1,1,648e1efc4ba53ede1a152d10aeef63ecac5fb02ba4e3831cb7550e8f8c8b62e9,2024-10-29T12:15:06.980000 +CVE-2024-49660,0,1,13eaea752ec6b314e4adcc3925b4bec480df888903b69d3a8defe724ba520efd,2024-10-29T14:34:04.427000 +CVE-2024-49661,0,1,c3ba564e616ab55f5f484632961663cf23b466bbd214761a9ce094a232fbf911,2024-10-29T14:34:04.427000 +CVE-2024-49662,0,1,d23628a207918d1abea406e4e59c9543e026ea8a8163d8aada9f4b91806ef451,2024-10-29T14:34:04.427000 +CVE-2024-49663,0,1,a059d4db73c3a6f109e52ff1e9963a12ea16e39d8d51c67d387c3bc37a1f722c,2024-10-29T14:34:04.427000 +CVE-2024-49664,0,1,a585980fa0c468bd227b32a9cfc1c229640a922e8ed2cd0a6bad8db82143c23c,2024-10-29T14:34:04.427000 +CVE-2024-49665,0,1,1fba7c5aced38c8654760398599efed942aafcafe37f175867e63ef31d7a1f73,2024-10-29T14:34:04.427000 +CVE-2024-49667,0,1,d0d2893a08bbe05370c0efbe07623867cc21abc78bc1959078d39fb472d7ab87,2024-10-29T14:34:04.427000 CVE-2024-49668,0,0,9e642c910e64115d4a4e8e29c9e810812ac3764efb5993cdb3bf654939e09f4c,2024-10-25T12:56:36.827000 CVE-2024-49669,0,0,5ad5e91f97554ca3daa6c0ce2501004e522438a31e6641aa150e6fd0e7f90c0f,2024-10-25T12:56:36.827000 CVE-2024-4967,0,0,8025a234fc289bdab04f9acbdc2478b7155048b60320bc8b6b7a0758b314e3b9,2024-06-04T19:20:55.777000 -CVE-2024-49670,1,1,26a9e5b4d37b84298fe87a86d200c77b103d5410f42681a5768c25dddbf840e6,2024-10-29T11:15:04.017000 +CVE-2024-49670,0,1,c61a4837644d7cf5e15a855fcac7e221e729733e4300d91657fbdc9de179cc5b,2024-10-29T14:34:04.427000 CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b12d,2024-10-25T12:56:36.827000 -CVE-2024-49672,1,1,f40244693e52fefc3dca5ff046b982d2a59a26a78b775cb714524bfa0ccc2f74,2024-10-29T11:15:04.223000 -CVE-2024-49673,1,1,acf8fcf7fcf8560d3330a650dbbd8884727e3a0a04e3087d25461fbc7937a19a,2024-10-29T11:15:04.410000 +CVE-2024-49672,0,1,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000 +CVE-2024-49673,0,1,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000 CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000 CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000 -CVE-2024-49678,1,1,59fc64ac857593ebd5cd1dfb703be9e9df59089c1a6ae1c133aaefc6235954a6,2024-10-29T11:15:04.607000 -CVE-2024-49679,1,1,47df477cee3771de73b6025187107e95246fabe3fbd8f71730555447c935f11f,2024-10-29T11:15:04.813000 +CVE-2024-49678,0,1,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 +CVE-2024-49679,0,1,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000 CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000 CVE-2024-49681,0,0,3b093dfd5a970f736ccea994447fae465682222fe1b4c870be33e2b5aeaae4d6,2024-10-25T12:56:07.750000 CVE-2024-49682,0,0,4e47b24b4ccb89d6b9391034a4d9fd92d4e065ca66c40176951d133f1432962c,2024-10-25T12:56:07.750000 @@ -263373,7 +263400,7 @@ CVE-2024-49684,0,0,e9a627af5ddca9b4822ee6da7152da731788ee6f4ca218c2e1132330b65bb CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000 CVE-2024-49690,0,0,f8519a1e374a57a825b896cd1faf37ef6f9748445cc3d9105d4f22d925afe4f1,2024-10-25T12:56:36.827000 CVE-2024-49691,0,0,8a34c0fdaee81aff7458f4efa7a33cb09c53971e5ca42eec6727b794ae5c88cf,2024-10-25T12:56:07.750000 -CVE-2024-49692,1,1,62e17efbf881566a33f780e774f1f118d26cb828e7660f44d6d09ae9868b5120,2024-10-29T11:15:05.017000 +CVE-2024-49692,0,1,a88655a398fcd3b1f3a7f0105e563a26deb8bf364bc3853b349284c831b8cc5c,2024-10-29T14:34:04.427000 CVE-2024-49693,0,0,a6bc6e01718813c6856835300eb59007ffc63a5d82fdf60f6cd2f3594806ee66,2024-10-25T12:56:07.750000 CVE-2024-49695,0,0,8a5b9aeadf7d14e4b9f3b28f3c39052ed1af2bd2ed904e93755acbf54f7db166,2024-10-25T12:56:07.750000 CVE-2024-49696,0,0,a1b9111a692b97228f861a7c3aa5f8357700339f49226938288f062844c6a3b1,2024-10-25T12:56:07.750000 @@ -263389,17 +263416,17 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207 CVE-2024-49750,0,0,a7e8b2a926889afed7f90910ab6e5ec3cbfd5fe1c3a7f940d8c01d024ee8d1a6,2024-10-25T12:56:07.750000 CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000 CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000 -CVE-2024-49755,0,0,9fb9b498bf29a08e9b5ee89cc9e2c48c3de7f9db530679f623d85c90fcb439b1,2024-10-28T20:15:06.297000 +CVE-2024-49755,0,1,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000 CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000 CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 CVE-2024-49760,0,0,73350c3c15eb518e634dec8ba3e2da01f8968eca1d80c5872e6dfc5d4ab4dd78,2024-10-25T12:56:07.750000 -CVE-2024-49761,0,0,894992ea70d27d1352849f9642edf9f16e34ad92c7b4127c14e71e1be1a0f9fe,2024-10-28T15:15:05.157000 +CVE-2024-49761,0,1,91dbe3ae22d59346162697cdf21d954a80519158ed01f8f13e3e3e00f37e4bfb,2024-10-29T14:34:50.257000 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,ef1423fe811e432f28d0c3f95d411793ec90858ffbf4947a2737bd5fe1b70dce,2024-10-28T13:58:09.230000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 -CVE-2024-49771,0,0,b1ad05541d64d4871559d2d473acb8ba1699a878055ef7557ca0cb84291b301b,2024-10-28T17:15:04.540000 +CVE-2024-49771,0,1,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -263619,7 +263646,7 @@ CVE-2024-50048,0,0,d005bc43ac7dffe85bb1b4c62a0be79335a5f23ef87660a48780d7c73272a CVE-2024-50049,0,0,8a3f3791bfb77ef3d490e872a72df28d44a50dd01f038b8f63798b04c8c73740,2024-10-23T21:45:43.657000 CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506ca,2024-10-15T12:58:51.050000 CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000 -CVE-2024-50052,0,0,cc9e42e8c40f13a6faed8c98ac669a7dfc1b4fd3f9f3006824eda6b916686481,2024-10-29T08:15:12.553000 +CVE-2024-50052,0,1,bf2b7a67576b83d69e87d14ac4239bf8784a5a388f0a9d54bedc6a322c97af62,2024-10-29T14:34:04.427000 CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000 CVE-2024-50056,0,0,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000 CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000 @@ -263634,28 +263661,28 @@ CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 CVE-2024-50067,0,0,811aadeb33d4d613d0b6c5e5e29ec88fffd6b7633646dfc1ca37d9fe494feb7f,2024-10-28T13:58:09.230000 -CVE-2024-50068,0,0,a66ed75429ea773ce1a2d0e30ac5d3ed12b87b14aaeb9b9b80f87c4f6238e64a,2024-10-29T01:15:04.107000 -CVE-2024-50069,0,0,29d70363189f591a804cd0fc4469ef8ab967294da906ef11fb79bb57f14e9393,2024-10-29T01:15:04.180000 -CVE-2024-50070,0,0,d7cdcd0337e62a27fddbb9b33db8833b173a06407392a9ac38ecf47c27d2e94c,2024-10-29T01:15:04.257000 -CVE-2024-50071,0,0,4d8429457387962cc7747ef9714a2799b699ec4569bcb05e935b65d17858cc96,2024-10-29T01:15:04.327000 -CVE-2024-50072,0,0,0c70c2f33508a76024bc5f009732c757a7fc29add08ff25b3fb045d6e31ca0af,2024-10-29T01:15:04.393000 -CVE-2024-50073,0,0,88f15686262f4610f6ef14a8b1c81f380cf14ec425a8818b9493d8d383cd1e20,2024-10-29T01:15:04.463000 -CVE-2024-50074,0,0,58fed3c38f3f609ae9ee302acb173b10d9631b8ea3c2476bf66cb045d85695ec,2024-10-29T01:15:04.540000 -CVE-2024-50075,0,0,e2fae5136936d7c140ab3555860fffa4f165ca5f6b4da8916e6b03c2145f83c3,2024-10-29T01:15:04.613000 -CVE-2024-50076,0,0,3d0cccbbcee062153be31e8fecfaee68f18b9b1c7f401c08a572f86e0fb8da59,2024-10-29T01:15:04.697000 -CVE-2024-50077,0,0,b4f099f1e6bc84962d29dae27cf03ca581258d37464045eb33789f6224f43f2e,2024-10-29T01:15:04.773000 -CVE-2024-50078,0,0,ed468a5b004dec751f001b9d6842d07fe6f335117ec1e557dfe1016a1f4244c5,2024-10-29T01:15:04.853000 -CVE-2024-50079,0,0,f4a286bca5a4e042e2a5c9a29e0be5bb67ce0b3fe5bddb69c2d0fccdb7ab3f53,2024-10-29T01:15:04.927000 +CVE-2024-50068,0,1,fa1ea3e6f599930bfb2d31adb8599332b75a045a05a427c5acbfef84f36f4dea,2024-10-29T14:34:04.427000 +CVE-2024-50069,0,1,e0d06dfcabcc31158b42dd1756b72698f3ce1bc24c6ee15265e842e9564c6424,2024-10-29T14:34:04.427000 +CVE-2024-50070,0,1,18255d00f69620f2a638568afe228ad3578ea04a84acf63eb1e68ce68ed74c13,2024-10-29T14:34:04.427000 +CVE-2024-50071,0,1,62707d07bb4d39afcfce746e848fc0ec2081f01347fce6c0d69c478aa69fbee9,2024-10-29T14:34:04.427000 +CVE-2024-50072,0,1,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000 +CVE-2024-50073,0,1,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000 +CVE-2024-50074,0,1,88a57db36e785df4cc21dcc18102af1a36a44aab602ea5f2f857fa91d7cda796,2024-10-29T14:34:04.427000 +CVE-2024-50075,0,1,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299fc49,2024-10-29T14:34:04.427000 +CVE-2024-50076,0,1,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000 +CVE-2024-50077,0,1,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000 +CVE-2024-50078,0,1,edfd843daaab21e8f3881bc9f52685650308d1e7e15f322d52dbb99d6ddc0e3a,2024-10-29T14:34:04.427000 +CVE-2024-50079,0,1,86e00e39a4c6f4df698328fa6af74ef3f8403f4eb5813cad15aa3ecbc54c0116,2024-10-29T14:34:04.427000 CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 -CVE-2024-50080,0,0,8d0acece351da6b2dbb99b4307694361a62210a37dd85e792bd647006ced0a91,2024-10-29T01:15:05 -CVE-2024-50081,0,0,5fc6b4680a8db22e62c3c7ec8af5e04173cc13eb59c23296551b256f3afe3b2a,2024-10-29T01:15:05.073000 -CVE-2024-50082,0,0,b66a1d0e1cdbc9a44edd56ed7adb15ac314c9a301c4fffcbeb83aee01e3271c0,2024-10-29T01:15:05.147000 -CVE-2024-50083,0,0,9cbce30865aa577ab9c08a2883b1412de73b766e676b337632acbdac348d96d3,2024-10-29T01:15:05.240000 -CVE-2024-50084,0,0,7dd555996c7577702ed564ab929d46f5f606cb4f4989a00bfeba85e6b32572db,2024-10-29T01:15:05.327000 -CVE-2024-50085,0,0,23bed17629e4e597c594a563dc487baee603530fcb4b72c397e83798c06d078d,2024-10-29T01:15:05.400000 -CVE-2024-50086,0,0,fc8a7d826bac17358384ad4efde7d11570df48ec1ff779a304b6213a531af85e,2024-10-29T01:15:05.487000 -CVE-2024-50087,0,0,5babc960e58c422d294d941fb0a11237f5d8ba9fe2b7a9579fe2152564856541,2024-10-29T01:15:05.560000 -CVE-2024-50088,0,0,445d43ba1bab6438fc841196744c511ef5892f61857627a59a3e01a2424828a4,2024-10-29T01:15:05.640000 +CVE-2024-50080,0,1,b30143addf096230090c103659efad2d89f35cfe5d0ae20511cc4ad130fbd073,2024-10-29T14:34:04.427000 +CVE-2024-50081,0,1,4a716ec09fe3b7525e6ca3fc44a39dfce5c1bec47408b7be31dc943bdcd98f01,2024-10-29T14:34:04.427000 +CVE-2024-50082,0,1,1aac9135fc440cb927bdd34817c9b125ae2db53fb07a95ac91cd63b20c0c1e06,2024-10-29T14:34:04.427000 +CVE-2024-50083,0,1,fd94a2eeda3538db1b988576d10356ed0f22eab342d054a435bf2bf1d428df1d,2024-10-29T14:34:04.427000 +CVE-2024-50084,0,1,5f8d3ba9bf6b3a2c27d8d69fafe6a5b945efebb0f6460f9530015e1ca78492d4,2024-10-29T14:34:04.427000 +CVE-2024-50085,0,1,3735911e6825e9aab8ccfa4703fb042b171a4743ccb03ab792a9cd72a82626ef,2024-10-29T14:34:04.427000 +CVE-2024-50086,0,1,63b570173a2655baa4c5831419c68504e7a2b436a5f1c37f1fbfd53425078a18,2024-10-29T14:34:04.427000 +CVE-2024-50087,0,1,31fd566e6a56828680e68693f4de8add14bb4e5f1dc842a2e094074736caae30,2024-10-29T14:34:04.427000 +CVE-2024-50088,0,1,828e69b5de052dd08d7caf34940c2f4feb712b819955838e907f99359e0b0c88,2024-10-29T14:34:04.427000 CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 CVE-2024-5011,0,0,4026c0ac2cac7aea5c94096b029296404a58ceafdfae2ce6d40eb650db37ee86,2024-09-06T22:41:46.253000 @@ -263688,88 +263715,88 @@ CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 -CVE-2024-50407,1,1,07c8bc56ac517b7c357dcd5ce79694c8bb4ad33a49020b0bcd18bc954d33a174,2024-10-29T11:15:05.237000 +CVE-2024-50407,0,1,f9688f4b448fa6261be66d0317a572bd7a88062577e578fa12fbb434c00a6869,2024-10-29T14:34:04.427000 CVE-2024-50408,0,0,edb7f0f85bfafef7e8ac88d62c131156e57f2deeb9c9f1cedcf4188104733a55,2024-10-28T13:58:09.230000 -CVE-2024-50409,1,1,e04ccfac9e8f667943b35c8d72fb37758dc09625a5f3e2554f5c29d57183cd33,2024-10-29T11:15:05.460000 +CVE-2024-50409,0,1,d7ec10c5e1543bca47bfdf414d287c32f5601d40bab44b017b5b1321eddc073f,2024-10-29T14:34:04.427000 CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000 -CVE-2024-50410,1,1,3a2ed0fc6eeebda5dab05a02ffbfd3b374d517a8705901e4a2a6396084cd8765,2024-10-29T11:15:05.657000 -CVE-2024-50411,0,0,f89b2811af3a0f53c9dc147ad6e221a9a80bd578a8cdf748720f2ca2b78009ff,2024-10-29T09:15:08.333000 -CVE-2024-50412,0,0,51f5063d8501b95bfd8c108ba8e784f5455944b0192bacc9276a6d1fb263ed87,2024-10-29T09:15:08.610000 -CVE-2024-50413,0,0,a363d54258c6254e79d41957bd16d7c019c2abf6664159f31e810bac4c433ecd,2024-10-29T09:15:08.847000 -CVE-2024-50414,0,0,86ffd73b542ff0d53c571743d78441e0fff6d6e39d31bef0afd0dfe213fbdccd,2024-10-29T09:15:09.230000 -CVE-2024-50415,0,0,4447a9261e7feb59c6ab009b066568b520405840e3ce66663e851d5e2b311bc3,2024-10-29T09:15:09.530000 +CVE-2024-50410,0,1,b0e5f19d3e850e75bae53f582d220aeb13e9ae300eafba739d117cde04cd904e,2024-10-29T14:34:04.427000 +CVE-2024-50411,0,1,2125caa96e2fd794a28994bdb07b4bb7596f8c4a6de822aea393e9e8d4d53bc7,2024-10-29T14:34:04.427000 +CVE-2024-50412,0,1,631b195ca92c8239dedf128815fcbb14f2f3794e78d494b800069471ed0f1296,2024-10-29T14:34:04.427000 +CVE-2024-50413,0,1,7bd7e93e9534d8f928af3202deae1fbb2549aee1ab43b478d04f1c666ef4a515,2024-10-29T14:34:04.427000 +CVE-2024-50414,0,1,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6e78,2024-10-29T14:34:04.427000 +CVE-2024-50415,0,1,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 CVE-2024-50416,0,0,39357adb67741247bbe7502eb5cb836076efd8caa2fa9868b5fc46acd300fc80,2024-10-28T13:58:09.230000 -CVE-2024-50418,0,0,d2adbea97a73e74fef76e70082c8f7ef2e7ab3329d810fb96607d1fd74945e4a,2024-10-29T09:15:09.777000 +CVE-2024-50418,0,1,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000 -CVE-2024-50420,0,0,ef5a540d3ccf9eced2f6710b886a6679ab01cd6e7daf9884b08b512ef458c7b0,2024-10-29T09:15:10.150000 -CVE-2024-50426,0,0,4a3b1dca167476eb194e4090320406ab538e35106d5740e29d7d6a016a0d6c5f,2024-10-29T09:15:10.383000 -CVE-2024-50427,0,0,318ec22cad211d818698cc81bcc64402f762c5d1aae62e7600ef1d82f334ac36,2024-10-29T09:15:10.710000 -CVE-2024-50429,0,0,ff843e822016e23940b0f924d9206349befaafe5a2c38c6b8774c9396cd695e4,2024-10-28T19:15:13.957000 +CVE-2024-50420,0,1,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 +CVE-2024-50426,0,1,8c5b315a447e6f468e14c6e3c0f3b3dad8b0380a565a9ff8ab2bba148da55efc,2024-10-29T14:34:04.427000 +CVE-2024-50427,0,1,c947d7dd64ae860e517413b4b81860fbb1384b9bd6793051f54c5fcec86b216e,2024-10-29T14:34:04.427000 +CVE-2024-50429,0,1,5b7b3cf65b98ce6ba120d1c668accfcc3a79e322ba032a3171f1e988fa226234,2024-10-29T14:34:50.257000 CVE-2024-5043,0,0,e8af684a96b52a20f139d3c6a27bd63fd7606ea9b2bbde97322bc475920cc410,2024-06-04T19:20:57.007000 -CVE-2024-50431,0,0,a3e6f2aee1dbb616b106ee96e137b2117f86dc7b397f68ad663abbc1deb882a7,2024-10-28T19:15:14.170000 -CVE-2024-50432,0,0,d645d2b7afede8d80b5ca364547747b4d73ce2419716a7e00eff70b82f0efc15,2024-10-28T19:15:14.363000 -CVE-2024-50433,0,0,cc5f19c2226f4d1ad792d6550a375d898000a15fa97a7984299ab1e6dafc4294,2024-10-28T19:15:14.560000 -CVE-2024-50434,0,0,85e38fa2821b2363a514c4be53ced0651ed300f2378e126e7e4f6bda6813914c,2024-10-28T20:15:06.577000 -CVE-2024-50435,0,0,b68d83482e9f7e8c2d2bf2a2538221f384e7eb2f514f91ba98e0714e056868a7,2024-10-28T20:15:06.810000 -CVE-2024-50436,0,0,c325209084a83a3ca475c2348be9ef714add8bada60c1376fc80d226cb758db5,2024-10-28T20:15:07.030000 -CVE-2024-50437,0,0,3d9fa1eacd77011121d5f1e126fbb7273101c7db5841548701878fe266f29347,2024-10-28T19:15:14.750000 -CVE-2024-50438,0,0,8b1d0b7ce54063ebb61f6fbae3cb68a94ed9e1ce0e1f15135ccd8f1586896531,2024-10-28T18:15:05.100000 -CVE-2024-50439,0,0,ca89cff22ee527ca48b9e53f4499f6316285b0d0d7878e576130a8da1cbd404e,2024-10-28T18:15:05.323000 +CVE-2024-50431,0,1,23389882ec4121935e05df0356e494c78e8d1268608baa8c1c5a53c8f4335929,2024-10-29T14:34:50.257000 +CVE-2024-50432,0,1,01c52483051ea5e3551ef1e9d2ae7523a10d55ee4fb140a2bb1b5d65d19caa5f,2024-10-29T14:34:50.257000 +CVE-2024-50433,0,1,150a829edae4ce546dd094153a60d69be53d2b79916e9e5a92824bb3fba02bcf,2024-10-29T14:34:50.257000 +CVE-2024-50434,0,1,6d6643fe04e2f4efd721ed8db7bc20e6e04df9218ab37703e5f70b805526a35f,2024-10-29T14:34:50.257000 +CVE-2024-50435,0,1,de671c00539421a873b997241a69dbfe856aaed1f4c333dbd6b66b7248094073,2024-10-29T14:34:50.257000 +CVE-2024-50436,0,1,71d582c994ed708a75d4e540ed6d8f819c5501cc71e8d1c51fae2be130e1d064,2024-10-29T14:34:50.257000 +CVE-2024-50437,0,1,40b87a35f71e1bff2e4bd49aee1e264d6fcf504625bcd539243812317d4ead71,2024-10-29T14:34:50.257000 +CVE-2024-50438,0,1,44dbdfc258cf2359804b81f783a589bf99b655d3de606eb84fa45f0f23ea086b,2024-10-29T14:34:50.257000 +CVE-2024-50439,0,1,a4ab7802095fd3f3ddba5a98cd5ff96e477c6dc16130bc7735e2720027fd6b30,2024-10-29T14:34:50.257000 CVE-2024-5044,0,0,a4e177741479e530ad4105167bd81efc2f0690ac50664dc5a5f1c197ba9e227b,2024-06-04T19:20:57.117000 -CVE-2024-50440,0,0,b603a3b89c26bfa0d17ded835bfb4ea4d44dc2416536f59b72fed4fca257330c,2024-10-28T18:15:05.567000 -CVE-2024-50441,0,0,5a804ea8427bba0ec5ef0ead6b39c7e74de5d74e7713cacc55d6c723a1557682,2024-10-28T18:15:05.790000 +CVE-2024-50440,0,1,d16b0a66995b7152dbf6636c54994a2845eea5e628000309614e635be4aaed58,2024-10-29T14:34:50.257000 +CVE-2024-50441,0,1,fa3535407c4df4f136174ab7a3bfffe4262ed285d5efdc948f074837395d4dbe,2024-10-29T14:34:50.257000 CVE-2024-50442,0,0,2afcd1aa801f318495da42f93e0ab314cdb9f85940b643c33313699a69f402eb,2024-10-28T13:58:09.230000 -CVE-2024-50443,0,0,d82dadf6e664c85b9cb05081d07cc35cb8537c095947d0d07aa50dd6c27b61ae,2024-10-28T14:35:12.707000 -CVE-2024-50445,0,0,45d505216699dd215461c0cd90e7044ada684c98961cc00ad8f9f6a90353a4c0,2024-10-28T18:15:06 -CVE-2024-50446,0,0,adfdd1c5b868a81d998fabd16dd943c1771b244d6e9c8cc09c63947d084b84a3,2024-10-28T18:15:06.203000 -CVE-2024-50447,0,0,5bbe6a9dda102e093a2249fc5cc2aafb452c9bae46375d1bb103bf6b50c94700,2024-10-28T18:15:06.473000 -CVE-2024-50448,0,0,7cf7ef4b5bc5a5032d2e9f2d6db02b9f047510ae6876a652bc521c11ef65828f,2024-10-28T18:15:06.707000 -CVE-2024-50449,0,0,54a27a64cea002300b930ec409497620f741950ed327c1e8fe2883aee84b1841,2024-10-28T18:15:06.907000 +CVE-2024-50443,0,1,180e825e47af6aa7fd93ef1820ce36fbe1349a43a10b0578a9c8d2057b8d6ac7,2024-10-29T14:34:50.257000 +CVE-2024-50445,0,1,93d89254abe8d40bb096b13dda2339158b8c0b9fc53ca7e36a35764b3a308f3e,2024-10-29T14:34:50.257000 +CVE-2024-50446,0,1,93fc12db73b1a11c3d258d0474f684d854db3cd3ac5ae3a6af4f2ed00f2ab977,2024-10-29T14:34:50.257000 +CVE-2024-50447,0,1,fe40e9143b13f8e1f69a66378622848e38fb6faae543e2bbf63f254032c9548a,2024-10-29T14:34:50.257000 +CVE-2024-50448,0,1,cc688c2531021780281369f6ec6cb194413205dbce8f2efb8d8db3f406e21f55,2024-10-29T14:34:50.257000 +CVE-2024-50449,0,1,3429d02802ce52441f57341c160ef52c98eb06b4e6bb46b5301d5d27cda8788f,2024-10-29T14:34:50.257000 CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38befe,2024-06-20T20:15:20.153000 CVE-2024-50450,0,0,04cbd025de2c722126b65e4ff86c189c6aa33d1d4fb651a146a617e6bdee158a,2024-10-28T13:58:09.230000 -CVE-2024-50451,0,0,d4d58fe9802e502538be508edaaa1574a61af817c4ee8d60747f3c1be552a2f5,2024-10-28T18:15:07.123000 -CVE-2024-50453,0,0,a79d97182b055edbfb1245ae57c60425f9e604644f5c6d15eabee06757244f31,2024-10-28T20:15:07.463000 -CVE-2024-50457,0,0,f0b98a5361764121c83376e7cc8fb5a48d24ec9c797a8e0f625a82630d209da3,2024-10-28T20:15:07.713000 -CVE-2024-50458,0,0,832821b0546c3668788985d04898fed34f1af9b6d0687acd1b7638c02cf7e89b,2024-10-28T18:15:07.327000 +CVE-2024-50451,0,1,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000 +CVE-2024-50453,0,1,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 +CVE-2024-50457,0,1,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 +CVE-2024-50458,0,1,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 CVE-2024-5046,0,0,61eff6fbe16c762ff136f32fbf7c7454761f98bd61a41d7bf57a3431cdb819c7,2024-06-04T19:20:57.247000 -CVE-2024-50460,0,0,13e05f4758ea0e29ff847c8d844f05aa70e6f1e34942b347933337b2eaf2ad5a,2024-10-28T18:15:07.537000 -CVE-2024-50461,0,0,18b06b3686ef382fdf9c05b291ebd595624db7aec0f065550d970c1a8590acdb,2024-10-28T18:15:07.737000 -CVE-2024-50462,0,0,f66ea65d31608e103f46251bc2b485b9cf74c76f1b8022d699335a1dce3484fd,2024-10-28T18:15:07.953000 +CVE-2024-50460,0,1,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 +CVE-2024-50461,0,1,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 +CVE-2024-50462,0,1,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954a9c,2024-10-29T14:34:50.257000 CVE-2024-50463,0,0,52af3747c1c12656e614229d802eac49aeb3053d00b51467f4096bd66f6f251e,2024-10-28T13:58:09.230000 -CVE-2024-50464,0,0,3b027af57e45d73f781ce9a53a0b82ae0f7c2144e3deb39f41d6ea2ba8287517,2024-10-28T18:15:08.163000 +CVE-2024-50464,0,1,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 CVE-2024-50465,0,0,00483e074c079de056773fdab6eb221b7f1834669791e4a86b920536bcd400c0,2024-10-28T13:58:09.230000 -CVE-2024-50467,0,0,5176f06cb05396210dca47dbbf4c7ae299f4500bab5e333e8f3ba5fa1625e827,2024-10-28T18:15:08.370000 -CVE-2024-50468,0,0,d32ecc2771af3efab59427f024e809414b4f75d000566deb8d4ed4f036dd32b5,2024-10-28T18:15:08.570000 -CVE-2024-50469,0,0,593fbbdb61e5ac6060f4cce74b361828a65c8217c7cacd50c5a826a59539af84,2024-10-28T18:15:08.770000 +CVE-2024-50467,0,1,4552ef78134a17bc23e57cbfd601f4e3eea4839d3e1dfc8a1846ef7af61ace53,2024-10-29T14:34:50.257000 +CVE-2024-50468,0,1,dcb5fc7c0ad36e7911e6c02d0d96134d3b094fc419a37a9b5d1969d6d7f9c083,2024-10-29T14:34:50.257000 +CVE-2024-50469,0,1,abcf4835413ee0cc04940d284cf5f3c90b0ebd44c44430c8cbae403d769d726a,2024-10-29T14:34:50.257000 CVE-2024-5047,0,0,e6e20cd833e11113812d3bb3ced9f49583bfb3bc949749c30a550d4892cec52a,2024-06-20T20:15:20.333000 CVE-2024-50470,0,0,5685398d77bb3f31bce3d88bb8c36f240b8c7ab9a21b6213181df8a6331e7011,2024-10-28T13:58:09.230000 CVE-2024-50471,0,0,406365b17b52e654e612cf21ddf745c489dfe09eaf29c3be1d5776cb8f893d37,2024-10-28T13:58:09.230000 CVE-2024-50472,0,0,e16f1dbafc2e4404bab26f152aa15712653fbf049d57c18bb5a66aec9b12d63d,2024-10-28T13:58:09.230000 -CVE-2024-50473,0,0,e87e91042d58beb6a265f20c3439fad852e01b68e8d7776a0f677f1c079f76db,2024-10-29T09:15:10.977000 -CVE-2024-50475,0,0,80350df638063a8d8b8bd9c5f9159e01185573195a688c252040e23b321d5fd1,2024-10-29T09:15:11.203000 -CVE-2024-50476,0,0,3af0f718c3846e5a5bc3cb105b5babe8c5e109e349baf8841707303cd3f62889,2024-10-29T09:15:11.533000 +CVE-2024-50473,0,1,b8199066d4d70afabe47990a677527c466f525d32bde81f9c86c2253d3676d86,2024-10-29T14:34:04.427000 +CVE-2024-50475,0,1,36f0716dcab36685f56e76af410832e5c6a209caa40371aa54bc3fa36e47c3b4,2024-10-29T14:34:04.427000 +CVE-2024-50476,0,1,03d0282cf6fe1ea02e5a0236d992f96a633bb2360c708089005fbef43f31b2f1,2024-10-29T14:34:04.427000 CVE-2024-50477,0,0,882b8c48a4ffe76f4b297a1251f439a05793b7127c19801e26bc55c870b615f9,2024-10-28T13:58:09.230000 CVE-2024-50478,0,0,1e570d69b0d1cd5285899bfea517d9a94df7267e4da40c94d674c6e166eb27e4,2024-10-28T13:58:09.230000 CVE-2024-50479,0,0,e9f5da762cccd3d6b96aaa1a931d48759479a75251159238dd8b5a49149bddce,2024-10-28T13:58:09.230000 CVE-2024-5048,0,0,1988e01de8a973c004f1ed34b391d1facc45cbb912e138052c0f7d6310398087,2024-06-04T19:20:57.353000 -CVE-2024-50480,0,0,992f2ff0c171ecea2ff9f67bf6b60f88666d190bd54d3dc35b910a7f80eac17f,2024-10-29T08:15:12.767000 -CVE-2024-50481,0,0,51eb0fb154e67f6410beb5026df0f38404cb652268a7698d628517a415fe8972,2024-10-29T09:15:11.787000 -CVE-2024-50482,0,0,e4795b0fe77e91dbe09ccec2ceadfdcac061de1807f9932f31082227cb0a085e,2024-10-29T08:15:13.010000 +CVE-2024-50480,0,1,9c6e44b2ad8cf235f8be06fa94bbc4d18226aff4b3790f429ce6a0c7315d34ce,2024-10-29T14:34:04.427000 +CVE-2024-50481,0,1,5405cf2423a54dd83747cd2bd6fe4fee0c2c27112bd62081838b851d73fdc674,2024-10-29T14:34:04.427000 +CVE-2024-50482,0,1,4c46db4544a2adb3c3153011ed323f9f2e4e58f44e74fcdad316d5a91a78a6b5,2024-10-29T14:34:04.427000 CVE-2024-50483,0,0,dc34782ca3b1404a071528e59ae2af91e68795a468368cf730f902ebe6c7f1c8,2024-10-28T13:58:09.230000 -CVE-2024-50484,0,0,84b763bbe51b7a78d11e3a5b01776cea6a2a955c4d8f59c2b2a180ae1fa19bcd,2024-10-29T08:15:13.237000 -CVE-2024-50485,0,0,79228c1098d0b46f2dee4878638fa265ee18313f5887b73f346cac7862690d9e,2024-10-29T09:15:12.137000 +CVE-2024-50484,0,1,fb5831468b35cba53c55a495474b64b7a8b6ec35859af8dabef2b71806e20ffa,2024-10-29T14:34:04.427000 +CVE-2024-50485,0,1,9ed12dd296d38fb6cbdb7c8752c66128ce6bd15ef5deace517d3530a40748c87,2024-10-29T14:34:04.427000 CVE-2024-50486,0,0,40a88ff3c96226c53c633948f63e119c168c02f84967d8db7e2c9f680375c917,2024-10-28T13:58:09.230000 CVE-2024-50487,0,0,0c4a1a3926921a2bcae14c8f09af31d6eb548ac4221df28e381f9c80ff644140,2024-10-28T13:58:09.230000 CVE-2024-50488,0,0,40d73b73129fb31724f8cd6a2898439824447d424f82ee41cc22f4a5e1f15204,2024-10-28T13:58:09.230000 CVE-2024-50489,0,0,39cf546ab4f49bcf53bc1df298c27ba2dc398fce12e81fa0caf07e0bcec9f312,2024-10-28T13:58:09.230000 CVE-2024-5049,0,0,5a3f3841afc31b2308320d9a79229ff3b2e78886b62ff0b6a021008032b5bd1d,2024-05-17T18:35:35.070000 -CVE-2024-50490,0,0,c6b0e5f529996f3615b52ad92b426eb08be5c04440c41f7e46ddf399fcf011f7,2024-10-29T09:15:12.497000 +CVE-2024-50490,0,1,df5308d43aea0811e64f7f34c1741602a9a3be24440d41ba19ac9b091f537e4b,2024-10-29T14:34:04.427000 CVE-2024-50491,0,0,d45e80298b2cd498e088c8e8fd696359aaf1f4ee17096c915de4f90118bf6c0d,2024-10-28T13:58:09.230000 CVE-2024-50492,0,0,0384fa23daa22133a07ff5e59a6b63c0a184d9a706db63fa7a2352fae491a288,2024-10-28T13:58:09.230000 -CVE-2024-50493,0,0,f29c8a6ee13a7c9a1ecd1e90b5873aab3b71aca6fb4ebfd63c2fdcdc3372afdd,2024-10-29T08:15:13.457000 -CVE-2024-50494,0,0,e41b7f377ea6a4948b9f282651775f1295320829a6ebca381eb8d9a359134fba,2024-10-29T08:15:13.690000 -CVE-2024-50495,0,0,1c3077524aec604239694dd6bd01f94a66fd4381b14890fbc2e52f15c951a88c,2024-10-28T21:15:09.800000 -CVE-2024-50496,0,0,a1b2849ec2fdfc1fac9329fac62bd4f0cf0067a53ad2ca767fe376e892cfa785,2024-10-28T21:15:10.057000 +CVE-2024-50493,0,1,1b86e41beced3d67b90f334d27db11237a706dc3447bbfcf4216e988a60b9a9c,2024-10-29T14:34:04.427000 +CVE-2024-50494,0,1,9569aa1d34f7229fbd2091c58d08802086f733f20697c3538e6874d12444dba9,2024-10-29T14:34:04.427000 +CVE-2024-50495,0,1,dbb01d9e1ce3a0d2a398c602b6c55fb03dd093568dcc101086f2d71c70104b40,2024-10-29T14:34:04.427000 +CVE-2024-50496,0,1,8759135a902bd5e1d547f7a30947e1e84eb491a378f48e131323791258ffeb16,2024-10-29T14:34:04.427000 CVE-2024-50497,0,0,235457ebd93f01c24a3c8c9023bb2f110341f8129e7743d0ff22d3f8a38b91aa,2024-10-28T13:58:09.230000 CVE-2024-50498,0,0,912d320d5bc70abc44f5433160c1e04f0fceafbecfd579c4c0bff65ce91ca00d,2024-10-28T13:58:09.230000 CVE-2024-5050,0,0,619081545361528557d824107c37f32918188d04adf33ba524a4859e2e6341a3,2024-06-04T19:20:57.457000 @@ -263779,7 +263806,7 @@ CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a7 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 CVE-2024-5053,0,0,85ba036ea0ce8a641df5f4bb0e9116ce37b7603e5543e179441180f635dd17ca,2024-10-04T16:02:22.037000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 -CVE-2024-50550,0,0,4da144a40b5ddd74272ad24cf11dff4ee70015091926aa9a6ae94132e26dc52f,2024-10-29T10:15:04.663000 +CVE-2024-50550,0,1,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 CVE-2024-5057,0,0,6ac23c507e757b24b72de98245da87576f9a2b62e0f8d57278541740a6070ccf,2024-09-20T19:31:39.437000 CVE-2024-50573,0,0,62b7a59f6b72947509f942a7a6ce94757dabc683ee1247a240dd34e5fae47c4a,2024-10-28T13:58:09.230000 @@ -263848,6 +263875,8 @@ CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 +CVE-2024-51075,1,1,552654645a7aa81d5ed2831dafeaafc72eb231e0261d5c643a1680368a0d4e42,2024-10-29T14:34:04.427000 +CVE-2024-51076,1,1,f29f14a6d6263f0ea29fba266cf4eb680f3fd81509f85036f71e3215970a786a,2024-10-29T14:34:04.427000 CVE-2024-5108,0,0,b8eaa0c49e3b7a0772fb8d227eefbcd229b705e71c1ea537a10c0b9ca289502f,2024-06-04T19:20:59.700000 CVE-2024-5109,0,0,ceb18a5d96497e9a6ac7740a19ad17f4e12924c64b1533f15150f5dd2571e331,2024-06-04T19:20:59.803000 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 @@ -263859,6 +263888,8 @@ CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3d CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 +CVE-2024-51180,1,1,ec97a9e97d18a7900cf99e5896474449d0db8231f779e8fc5a292a25cc3455cc,2024-10-29T14:34:04.427000 +CVE-2024-51181,1,1,c1316549e099a4a2c3e3cd425574fa5ef167c2c9a4fa1f57146fbe739c1e1d23,2024-10-29T14:34:04.427000 CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000 CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 @@ -263887,10 +263918,10 @@ CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe73 CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 -CVE-2024-51506,0,0,903f4bd45922c9a2460a10a420825bc4c54f139b43d971a5998e5436d05908b7,2024-10-28T23:15:02.667000 -CVE-2024-51507,0,0,c655f2657e2670d6d27c2539f6ebef91c7d148dd70b82c440327e572e751c57a,2024-10-28T23:15:02.753000 -CVE-2024-51508,0,0,25a6cabfb9ec53c8d7ecac1b75379c4f24752cab42aff0eec7bd9d88ba89db59,2024-10-28T23:15:02.837000 -CVE-2024-51509,0,0,d9efc7d0c1ee4f04becb0719ea865aad6102568f010d97ed0da40e23356c8057,2024-10-28T23:15:02.907000 +CVE-2024-51506,0,1,c88e78bfaf14f8d0bca992fe3403170d31c1a380aad632270c875e55067a55f0,2024-10-29T14:34:04.427000 +CVE-2024-51507,0,1,7fe2110c0e3dea0d2c93789d83d24e5f3a0499c9a799c4c9d2c88a63c0ea584d,2024-10-29T14:34:04.427000 +CVE-2024-51508,0,1,3dd011dfae2ceaccb8259eabd1aca7b9fece5a037f8ba43555f2e4288d978d02,2024-10-29T14:34:04.427000 +CVE-2024-51509,0,1,19f103a17824310cb94f455901fbb6e58a26940599face0db6183ee10f94fe7c,2024-10-29T14:34:04.427000 CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000 CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 @@ -264244,7 +264275,7 @@ CVE-2024-5527,0,0,331ae87f67986356dc980ea3627872b6fdf17356300466b2fa99a93693833d CVE-2024-5529,0,0,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000 CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,6e18bd4c00ec4db4743368aa05b5d810d40ae0d6bb9ac604deef69554fbe362e,2024-06-11T13:54:12.057000 -CVE-2024-5532,0,0,f5dd8d9ccfcf56303e84da431b61354e2a08e3377b9bba17eac5d079e7d6b361,2024-10-28T19:15:15.010000 +CVE-2024-5532,0,1,c4735ce0b226069f7c0d7656ffef3707587f07540d25cf387b14889e6a88ef53,2024-10-29T14:34:50.257000 CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000 CVE-2024-5535,0,0,a4c9a52c5762644097b9202aaddafb08e0f65ed76c571265ed2ff38052925bcd,2024-07-12T14:15:16.790000 CVE-2024-5536,0,0,73dcec0849972f2d05562926289a190dfff8aecd0c504065927b960620a16fb3,2024-06-11T17:28:37.343000 @@ -264493,6 +264524,7 @@ CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000 CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000 CVE-2024-5822,0,0,baf10ed90614f0ff900c6a4bdea84fcaae14f3f7ead2ea1122c706f066c79b96,2024-06-27T19:25:12.067000 +CVE-2024-5823,1,1,ec47d53329a1ee03be3ba89e6fe485f37225b2548233a1bbea771572cc692f66,2024-10-29T14:34:04.427000 CVE-2024-5824,0,0,a626487511d1e6b65da2c7fdc7f30939ba46505ead241212d2b122818200e9ab,2024-06-27T19:25:12.067000 CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000 CVE-2024-5826,0,0,ab74f2650ad7ec867beb938c7b9b39007cedba2567b06756b5e245e8edb717b0,2024-06-27T19:25:12.067000 @@ -264626,6 +264658,7 @@ CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da758158 CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000 CVE-2024-5981,0,0,ef1af743cedf4b6b2a243e8210155140211219a91ac8483d52ff9c2f041ab697,2024-08-16T20:29:35.287000 +CVE-2024-5982,1,1,78ec85d4df3ef45b07a13b2648b7689e9ed03986d3be24189eaad8006d2fd855,2024-10-29T14:35:20.400000 CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018a7,2024-07-24T02:39:24.200000 CVE-2024-5984,0,0,02adfef3fce737b6a79614009e0e348625eec114041041ad04a7ccaf8be7e88b,2024-10-09T18:37:10.747000 CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000 @@ -264858,7 +264891,7 @@ CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654d CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000 CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 -CVE-2024-6245,0,0,57f8e7bd9a0146c3dc584396664e531adb18d9a0e6f1abcdc02f7d79275aa3d8,2024-10-28T17:15:04.780000 +CVE-2024-6245,0,1,8b8bfbb38c7d17d7193b203c71c8c11e065591251b6ce73925be5ef71125bb66,2024-10-29T14:34:50.257000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 CVE-2024-6251,0,0,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000 CVE-2024-6252,0,0,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000 @@ -265150,6 +265183,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070 CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 +CVE-2024-6581,1,1,9055383cfe6fbc4db3cd9a46d79cd3f07357c51de5fc104a3766cd43c81a7a49,2024-10-29T14:34:04.427000 CVE-2024-6582,0,0,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000 CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000 CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000 @@ -265227,6 +265261,8 @@ CVE-2024-6669,0,0,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36e CVE-2024-6670,0,0,0385af7065d3a7949a98d24fadefdba9efb8f4526cb416df9a2b29c5ec309f96,2024-09-17T01:00:01.320000 CVE-2024-6671,0,0,0f334db29395e8161e019908d1c259201b627ca1c9d0cfd40be71a12cb877045,2024-09-04T15:53:07.733000 CVE-2024-6672,0,0,f03acb9d245a8919bddd732053bec54770cb0a4b96386add16d0f2ae9269f678,2024-09-04T14:23:58.403000 +CVE-2024-6673,1,1,ad9a4f04bf798b606ffdd21df5d11e5b238ea5c1f759b81ecab3e4b3e07b9b7c,2024-10-29T14:34:04.427000 +CVE-2024-6674,1,1,95172d2f34e9d18da2b06836b0b9bc7d9517793385eef1d5aa7da5d332fa957d,2024-10-29T14:34:04.427000 CVE-2024-6675,0,0,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000 CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000 @@ -265371,6 +265407,7 @@ CVE-2024-6862,0,0,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 CVE-2024-6867,0,0,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000 +CVE-2024-6868,1,1,d5104475e31e0fb90cc1d3df44800cd264971d04228c9c8702fdfaa233a7a0b4,2024-10-29T14:34:04.427000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 CVE-2024-6870,0,0,b8787438d65804a2db5bbc8c04084c34ae58bc1819956a7afefdca8ed2b91985,2024-09-27T00:52:03.737000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 @@ -265500,6 +265537,7 @@ CVE-2024-7006,0,0,d510a15f87dd1c79e35f8009bc9e9e19d5574ea60c240c6e393b2fbd477adf CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000 CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 +CVE-2024-7010,1,1,e8197466fb2c1bac0f4d4a1323b7c9da17e9a3898507a8699fc4886432b9e8aa,2024-10-29T14:34:04.427000 CVE-2024-7011,0,0,fafa14a9632dbca7dce2bf31a9559a65baefeba7773bf0dacaafeb6e3837c6c8,2024-09-30T12:46:20.237000 CVE-2024-7012,0,0,7505e34b161e28dbe95eb89541c44fc261402b7bb3b4a766cd0492f45404fdcf,2024-09-19T06:15:03.777000 CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 @@ -265519,6 +265557,7 @@ CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca450 CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 CVE-2024-7038,0,0,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000 CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 +CVE-2024-7042,1,1,c2b56d96db71d7f0eeea4cc3b752ac5c45d47525d7b3c34a951eebddd72552c7,2024-10-29T14:34:04.427000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 CVE-2024-7049,0,0,0a245acb222c9415b34bdd2b50731367d88750a93745ace19c048218b6b8c0be,2024-10-17T14:22:44.653000 @@ -265861,6 +265900,10 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56 CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000 CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000 CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000 +CVE-2024-7472,1,1,1915bf4a426a37e46e592b133c645563f3fd303e31151501720f3e9bed750db8,2024-10-29T14:34:04.427000 +CVE-2024-7473,1,1,9d07607226699ccf0acd9f494035f0dc8e05b8c8f6ea397eba5f7678020a2147,2024-10-29T14:34:04.427000 +CVE-2024-7474,1,1,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000 +CVE-2024-7475,1,1,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000 CVE-2024-7477,0,0,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000 CVE-2024-7479,0,0,a6b359841d759122cd71cb2a661ca0e606e049ff6b266c86e006d82fc6844772,2024-09-26T13:32:02.803000 CVE-2024-7480,0,0,3513e9b1b40322abc4857852444e6547d08e759bdd020204145d34efe837e109,2024-09-11T15:03:37.293000 @@ -266104,12 +266147,14 @@ CVE-2024-7763,0,0,5d291ab0f3abe69aaa5cb8b4e2fe2341213a548e109030bc89fadbabcbfad5 CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000 CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000 CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000 +CVE-2024-7774,1,1,3070a44c277e1333f0d2427da259897acbab258510f6f047fc960459be5c30e9,2024-10-29T14:34:04.427000 CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000 CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000 CVE-2024-7778,0,0,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000 CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000 CVE-2024-7781,0,0,195406e4d26756061eec11348aa250b24d79fc541f740fe89b1afbbb454c19eb,2024-10-02T16:21:03.113000 CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000 +CVE-2024-7783,1,1,daa273ed833d4bd306655d31b756f6dc53d7a862dd88feb2d4839be026c12aa6,2024-10-29T14:34:04.427000 CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000 @@ -266126,6 +266171,7 @@ CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 CVE-2024-7801,0,0,bed682b6222cb0c9f77cc5a0751ff36b1d3476d22f8b98362a2b5472dbe7cc5b,2024-10-17T15:19:27.053000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 +CVE-2024-7807,1,1,0e2a44959ae3bb0b2cc26db4ea86f0388763df06b2c8c2674bf1a9f0faa7707b,2024-10-29T14:35:21.773000 CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 @@ -266257,6 +266303,7 @@ CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 CVE-2024-7960,0,0,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000 CVE-2024-7961,0,0,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000 +CVE-2024-7962,1,1,582658592d187b202de2d11d01b70d2fae80e8abf3cb2975e04203cb3deaa696,2024-10-29T14:34:04.427000 CVE-2024-7963,0,0,5d9d56257af0c8a46d80addfe5060ee179dc9f0bcbd8087ed3e38a0505c107e7,2024-10-10T12:51:56.987000 CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000 CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000 @@ -266376,6 +266423,7 @@ CVE-2024-8139,0,0,30a28567f99fee6c1c6f825267497f95b5b28ab0436eee99757c8433aaff2e CVE-2024-8140,0,0,5905102d90fa9e01c1c294a1e12efca1eb0a1890a608c263dfef788228e71855,2024-08-26T19:09:52.653000 CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf176,2024-08-26T19:09:16.763000 CVE-2024-8142,0,0,d4b24d12d326b40d1c063c9a3edca906c8e404b0436fcc16715466b79bbf260c,2024-08-26T19:08:38.493000 +CVE-2024-8143,1,1,102604b462c1d031990c2db79f517efbf3988c959905abd72423d86ae965bbcc,2024-10-29T14:34:04.427000 CVE-2024-8144,0,0,8c217cf77629850f2a31ec00f7904f772883a591a54b72411e3d3cd24bcf1f00,2024-09-18T18:24:46.730000 CVE-2024-8145,0,0,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000 CVE-2024-8146,0,0,a2a80ffef156fb85ffee90216beed89480bdca821cd7147cd0b42bd2951a2961,2024-09-24T17:00:38.933000 @@ -266494,6 +266542,7 @@ CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6 CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 CVE-2024-8305,0,0,d66b035463acddb1c93013687fce349938f4d85da7d81154c45e44366bbf218f,2024-10-21T17:09:45.417000 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 +CVE-2024-8309,1,1,5dff4fef0d4324a90e57d60a54c6b9e704405bbfae6e5c7c96b7582afd9d776d,2024-10-29T14:34:04.427000 CVE-2024-8310,0,0,7c8549a7a64d3579b34aa56e199885805550ab7f5a2102b636629253bc8a75c3,2024-09-30T12:45:57.823000 CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000 CVE-2024-8312,0,0,0efa58c9a3b7df8f2c5bdfd09c1052f11675ef50d9e2c1eaba18c214a796103b,2024-10-25T12:56:07.750000 @@ -266798,7 +266847,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453 CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000 CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 -CVE-2024-8740,0,0,f7778ec769f511ccc331ef10142b860015a2fe93cc7020e13cb136fb1ba3886c,2024-10-18T12:52:33.507000 +CVE-2024-8740,0,1,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000 CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 CVE-2024-8743,0,0,65920323e1d664fd8f354bc76b73276103c2d19a537eecec01fa5cc8c5638d58,2024-10-07T17:48:28.117000 @@ -266832,7 +266881,7 @@ CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c94343 CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000 CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000 CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000 -CVE-2024-8790,0,0,75c77ab7b7403fd7bc8b87bf01e6b7a24e964ae255d6cf6681e3722ae0749f28,2024-10-18T12:52:33.507000 +CVE-2024-8790,0,1,c35e20798e104d347809d26eec2137cb82ecdc52b92a3f74d2215cdbc40f5b61,2024-10-29T14:44:59.497000 CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000 CVE-2024-8793,0,0,959b266c850b42df4ff44733c3776bf7c1d0fcf64b78d7cab419106b5de40dbb,2024-10-07T16:04:08.490000 CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000 @@ -266891,7 +266940,7 @@ CVE-2024-8912,0,0,a4286937675e049e61563468e21e8ee394eb8618a71f95672d8446231a80ed CVE-2024-8913,0,0,fca416d77c5623788a9db07f1a3764802595b9fed9406445b458bbb4d1cd4d8c,2024-10-15T12:58:51.050000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da01,2024-10-15T12:57:46.880000 -CVE-2024-8916,0,0,af6ed530ea37558b92dd71a0c6ed90d9e25c16596df31f0cb608f1fa2e8f4764,2024-10-18T12:52:33.507000 +CVE-2024-8916,0,1,6ce934fcc9c0de731f667a3ddfb098320397ac17d3f336b1e58c762df8bae46f,2024-10-29T14:37:42.877000 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8918,0,0,adf87d72fe8bb71bb4e84db31b9473b9ff815dc1f43bef94a15bce0226f2d2fa,2024-10-17T18:25:46.967000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 @@ -267154,7 +267203,7 @@ CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f559 CVE-2024-9347,0,0,131d08ad666b2357ecd19b3118dbe82da22a41e64a4f3a4f02af3909537af845,2024-10-18T12:53:04.627000 CVE-2024-9348,0,0,5306ee8a501834848c65c39ccde679f8538adcf6268b8dd12eab61572d72a494,2024-10-16T16:38:14.557000 CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 -CVE-2024-9350,0,0,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84f6,2024-10-18T12:52:33.507000 +CVE-2024-9350,0,1,aa8e581f7289e7bd37e76e94e3964b82de5f4fbd95aa75417bef570e71a86c63,2024-10-29T13:44:03.897000 CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 @@ -267170,7 +267219,7 @@ CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7 CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000 CVE-2024-9374,0,0,71b6734f379ef9a804fdc66eda125efbaf96377b76395ed89ad6eee48b26d41e,2024-10-25T12:56:07.750000 CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000 -CVE-2024-9376,0,1,fc03cb36b95a3a8a2bb2921925f57da597719b87de54484eafa701238555323c,2024-10-29T10:15:04.880000 +CVE-2024-9376,0,1,472bd386b6be1b9de442acc8b3b717a859ed7aa97aa97328870deb21c6524bb9,2024-10-29T14:34:04.427000 CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5eaf,2024-10-15T14:18:12.483000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 @@ -267206,7 +267255,7 @@ CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae3 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000 -CVE-2024-9438,0,0,fb51402232881a86a59b83941f0702e4be70e5a09c62e2d86f7f429874155679,2024-10-29T09:15:12.753000 +CVE-2024-9438,0,1,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000 CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836c0,2024-10-16T16:38:14.557000 @@ -267239,6 +267288,7 @@ CVE-2024-9486,0,0,1369350ab2629110ffa188dbd15b41ead2245f88a49115aa36147be3bd87c7 CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000 CVE-2024-9488,0,0,3154f25401247f46098357ebd2d84fe95bb2164e861af1c275743e022d6c3976,2024-10-25T12:56:07.750000 CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000 +CVE-2024-9505,1,1,9f563819d874cda28d933cc3759112519ce910489eea1287ec5cc51a40bde8da,2024-10-29T14:34:04.427000 CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000 CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 @@ -267305,7 +267355,7 @@ CVE-2024-9589,0,0,12420b2f38d2c93f0b54cb162fd986b1e3bc035cb82aa25afa709b3dca7293 CVE-2024-9590,0,0,f04908a66c8eee122a17cc23cd10db8f2eac72ab6acc6c9d623f58ed2f5d06ed,2024-10-23T15:12:34.673000 CVE-2024-9591,0,0,18f850846f634f78ac97108e7dec46e1c5c5e29d9be70684269dc0702592824d,2024-10-23T15:12:34.673000 CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000 -CVE-2024-9593,0,0,cce5b3ee491d6630c052fcb33edfbddbd5dba3d44ec1ac1a1bc92ad9d40ee350,2024-10-21T17:10:22.857000 +CVE-2024-9593,0,1,02cbbab3c962db41b4f7d8f2fd2455e47a515515a926a898431a74600b7b719f,2024-10-29T13:40:23.983000 CVE-2024-9594,0,0,76152af657dea527c4e562a1c5799c4834f4bf18cf4ca885159373bfd78ad4ca,2024-10-16T16:38:14.557000 CVE-2024-9595,0,0,6e91591cc8fc6f8664de9cf116e0c3ff35185abd26eee85b7100e07838bd2f63,2024-10-15T12:57:46.880000 CVE-2024-9596,0,0,b127f83f2b318ff048db80701b5c7105ea78e0681a89ee2fdf37846a5fa10d86,2024-10-16T17:00:19.787000 @@ -267324,7 +267374,7 @@ CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de6 CVE-2024-9626,0,0,e174d8fa002534e0ae5c7abc483c6616428df822a2503b0b0dc31fa5eea5bcb8,2024-10-28T13:58:09.230000 CVE-2024-9627,0,0,2b255751ca76c819864c389a91dcfc3f65321be83e43cc5abce958b149b5f5f2,2024-10-25T21:19:48.757000 CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000 -CVE-2024-9629,0,0,da9aa556881ddce32570aa1d010837971f24a42a64c4c996072e0d73d29d5fed,2024-10-28T18:15:09.040000 +CVE-2024-9629,0,1,31c72e7d62d8dbf8ba1681676a61a2f04680ade1749c367b775242f4864b6d17,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9637,0,0,bfd23401e1c5bf70ae99ee491fd04ce8ab223b8247ed87e78ca84ed9446a1b72,2024-10-28T13:58:09.230000 @@ -267394,7 +267444,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 -CVE-2024-9825,0,0,b4b0378a03b51325975ab3f8d7b7d29967d15ad0e39c9eacfee3d1e1e933389d,2024-10-28T19:15:15.170000 +CVE-2024-9825,0,1,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000