From 8f68afb969e5fda93c112573b77530250d9dc81c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 11 Jul 2024 14:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-07-11T14:00:19.780454+00:00 --- CVE-2016/CVE-2016-150xx/CVE-2016-15039.json | 8 +- CVE-2023/CVE-2023-211xx/CVE-2023-21113.json | 8 +- CVE-2023/CVE-2023-211xx/CVE-2023-21114.json | 8 +- CVE-2023/CVE-2023-324xx/CVE-2023-32467.json | 8 +- CVE-2023/CVE-2023-324xx/CVE-2023-32472.json | 8 +- CVE-2023/CVE-2023-338xx/CVE-2023-33859.json | 8 +- CVE-2023/CVE-2023-338xx/CVE-2023-33860.json | 8 +- CVE-2023/CVE-2023-350xx/CVE-2023-35006.json | 8 +- CVE-2023/CVE-2023-508xx/CVE-2023-50805.json | 8 +- CVE-2023/CVE-2023-508xx/CVE-2023-50806.json | 8 +- CVE-2023/CVE-2023-508xx/CVE-2023-50807.json | 8 +- CVE-2023/CVE-2023-68xx/CVE-2023-6813.json | 8 +- CVE-2023/CVE-2023-70xx/CVE-2023-7061.json | 8 +- CVE-2023/CVE-2023-70xx/CVE-2023-7062.json | 8 +- CVE-2024/CVE-2024-06xx/CVE-2024-0619.json | 8 +- CVE-2024/CVE-2024-18xx/CVE-2024-1845.json | 8 +- CVE-2024/CVE-2024-204xx/CVE-2024-20456.json | 8 +- CVE-2024/CVE-2024-207xx/CVE-2024-20781.json | 8 +- CVE-2024/CVE-2024-207xx/CVE-2024-20782.json | 8 +- CVE-2024/CVE-2024-207xx/CVE-2024-20783.json | 8 +- CVE-2024/CVE-2024-207xx/CVE-2024-20785.json | 8 +- CVE-2024/CVE-2024-214xx/CVE-2024-21417.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21521.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21522.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21523.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21524.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21525.json | 8 +- CVE-2024/CVE-2024-215xx/CVE-2024-21526.json | 8 +- CVE-2024/CVE-2024-218xx/CVE-2024-21832.json | 8 +- CVE-2024/CVE-2024-219xx/CVE-2024-21993.json | 8 +- CVE-2024/CVE-2024-220xx/CVE-2024-22018.json | 8 +- CVE-2024/CVE-2024-222xx/CVE-2024-22280.json | 8 +- CVE-2024/CVE-2024-223xx/CVE-2024-22377.json | 8 +- CVE-2024/CVE-2024-223xx/CVE-2024-22387.json | 8 +- CVE-2024/CVE-2024-224xx/CVE-2024-22477.json | 8 +- CVE-2024/CVE-2024-231xx/CVE-2024-23194.json | 8 +- CVE-2024/CVE-2024-233xx/CVE-2024-23317.json | 8 +- CVE-2024/CVE-2024-234xx/CVE-2024-23485.json | 8 +- CVE-2024/CVE-2024-236xx/CVE-2024-23695.json | 8 +- CVE-2024/CVE-2024-236xx/CVE-2024-23696.json | 8 +- CVE-2024/CVE-2024-236xx/CVE-2024-23697.json | 8 +- CVE-2024/CVE-2024-236xx/CVE-2024-23698.json | 8 +- CVE-2024/CVE-2024-237xx/CVE-2024-23711.json | 8 +- CVE-2024/CVE-2024-250xx/CVE-2024-25023.json | 8 +- CVE-2024/CVE-2024-250xx/CVE-2024-25076.json | 8 +- CVE-2024/CVE-2024-250xx/CVE-2024-25077.json | 8 +- CVE-2024/CVE-2024-26xx/CVE-2024-2602.json | 8 +- CVE-2024/CVE-2024-270xx/CVE-2024-27090.json | 8 +- CVE-2024/CVE-2024-270xx/CVE-2024-27095.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27361.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27363.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27385.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27386.json | 8 +- CVE-2024/CVE-2024-280xx/CVE-2024-28068.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28827.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28828.json | 8 +- CVE-2024/CVE-2024-28xx/CVE-2024-2880.json | 8 +- CVE-2024/CVE-2024-291xx/CVE-2024-29153.json | 8 +- CVE-2024/CVE-2024-297xx/CVE-2024-29784.json | 56 ++- CVE-2024/CVE-2024-313xx/CVE-2024-31310.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31311.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31312.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31313.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31314.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31315.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31316.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31317.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31318.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31319.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31320.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31322.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31323.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31324.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31325.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31326.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31327.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31331.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31332.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31334.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31335.json | 8 +- CVE-2024/CVE-2024-313xx/CVE-2024-31339.json | 8 +- CVE-2024/CVE-2024-324xx/CVE-2024-32469.json | 8 +- CVE-2024/CVE-2024-326xx/CVE-2024-32670.json | 8 +- CVE-2024/CVE-2024-327xx/CVE-2024-32759.json | 10 +- CVE-2024/CVE-2024-328xx/CVE-2024-32895.json | 64 ++- CVE-2024/CVE-2024-33xx/CVE-2024-3325.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34123.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34139.json | 8 +- CVE-2024/CVE-2024-341xx/CVE-2024-34140.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34720.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34721.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34722.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34723.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34724.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34725.json | 8 +- CVE-2024/CVE-2024-347xx/CVE-2024-34726.json | 8 +- CVE-2024/CVE-2024-351xx/CVE-2024-35154.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36450.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36451.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36452.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36453.json | 8 +- CVE-2024/CVE-2024-366xx/CVE-2024-36676.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37110.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37113.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37115.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37147.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37148.json | 8 +- CVE-2024/CVE-2024-371xx/CVE-2024-37149.json | 8 +- CVE-2024/CVE-2024-372xx/CVE-2024-37205.json | 8 +- CVE-2024/CVE-2024-372xx/CVE-2024-37270.json | 8 +- CVE-2024/CVE-2024-373xx/CVE-2024-37310.json | 8 +- CVE-2024/CVE-2024-374xx/CVE-2024-37498.json | 8 +- CVE-2024/CVE-2024-375xx/CVE-2024-37504.json | 8 +- CVE-2024/CVE-2024-375xx/CVE-2024-37539.json | 57 ++- CVE-2024/CVE-2024-375xx/CVE-2024-37541.json | 47 +- CVE-2024/CVE-2024-377xx/CVE-2024-37770.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37829.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37830.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37865.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37870.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37871.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37872.json | 8 +- CVE-2024/CVE-2024-378xx/CVE-2024-37873.json | 8 +- CVE-2024/CVE-2024-37xx/CVE-2024-3798.json | 4 +- CVE-2024/CVE-2024-37xx/CVE-2024-3799.json | 4 +- CVE-2024/CVE-2024-383xx/CVE-2024-38301.json | 8 +- CVE-2024/CVE-2024-383xx/CVE-2024-38353.json | 8 +- CVE-2024/CVE-2024-383xx/CVE-2024-38354.json | 8 +- CVE-2024/CVE-2024-384xx/CVE-2024-38433.json | 4 +- CVE-2024/CVE-2024-385xx/CVE-2024-38517.json | 8 +- CVE-2024/CVE-2024-388xx/CVE-2024-38875.json | 8 +- CVE-2024/CVE-2024-389xx/CVE-2024-38959.json | 8 +- CVE-2024/CVE-2024-389xx/CVE-2024-38963.json | 8 +- CVE-2024/CVE-2024-390xx/CVE-2024-39031.json | 8 +- CVE-2024/CVE-2024-390xx/CVE-2024-39063.json | 8 +- CVE-2024/CVE-2024-390xx/CVE-2024-39069.json | 8 +- CVE-2024/CVE-2024-390xx/CVE-2024-39071.json | 8 +- CVE-2024/CVE-2024-390xx/CVE-2024-39072.json | 8 +- CVE-2024/CVE-2024-391xx/CVE-2024-39181.json | 8 +- CVE-2024/CVE-2024-393xx/CVE-2024-39329.json | 8 +- CVE-2024/CVE-2024-393xx/CVE-2024-39330.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39488.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39489.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39490.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39491.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39492.json | 8 +- CVE-2024/CVE-2024-394xx/CVE-2024-39493.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39511.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39512.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39513.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39514.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39517.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39518.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39554.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39555.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39556.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39557.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39558.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39559.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39560.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39561.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39562.json | 8 +- CVE-2024/CVE-2024-395xx/CVE-2024-39565.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39614.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39684.json | 8 +- CVE-2024/CVE-2024-396xx/CVE-2024-39693.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39880.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39881.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39882.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39883.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39886.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39897.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39899.json | 8 +- CVE-2024/CVE-2024-399xx/CVE-2024-39900.json | 8 +- CVE-2024/CVE-2024-399xx/CVE-2024-39901.json | 8 +- CVE-2024/CVE-2024-399xx/CVE-2024-39927.json | 8 +- CVE-2024/CVE-2024-400xx/CVE-2024-40034.json | 8 +- CVE-2024/CVE-2024-400xx/CVE-2024-40035.json | 8 +- CVE-2024/CVE-2024-400xx/CVE-2024-40036.json | 8 +- CVE-2024/CVE-2024-400xx/CVE-2024-40037.json | 8 +- CVE-2024/CVE-2024-400xx/CVE-2024-40038.json | 8 +- CVE-2024/CVE-2024-400xx/CVE-2024-40039.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40328.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40329.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40331.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40332.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40333.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40334.json | 8 +- CVE-2024/CVE-2024-403xx/CVE-2024-40336.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40412.json | 8 +- CVE-2024/CVE-2024-404xx/CVE-2024-40417.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40618.json | 8 +- CVE-2024/CVE-2024-407xx/CVE-2024-40750.json | 8 +- CVE-2024/CVE-2024-46xx/CVE-2024-4655.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4866.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4879.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5178.json | 8 +- CVE-2024/CVE-2024-52xx/CVE-2024-5217.json | 8 +- CVE-2024/CVE-2024-52xx/CVE-2024-5257.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5444.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5470.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5491.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5492.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5664.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5677.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5679.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5680.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5681.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5792.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5910.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5911.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5912.json | 8 +- CVE-2024/CVE-2024-59xx/CVE-2024-5913.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6025.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6026.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6035.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6036.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6037.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6138.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6148.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6149.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6150.json | 8 +- CVE-2024/CVE-2024-61xx/CVE-2024-6151.json | 8 +- CVE-2024/CVE-2024-62xx/CVE-2024-6210.json | 8 +- CVE-2024/CVE-2024-62xx/CVE-2024-6235.json | 8 +- CVE-2024/CVE-2024-62xx/CVE-2024-6236.json | 8 +- CVE-2024/CVE-2024-62xx/CVE-2024-6256.json | 8 +- CVE-2024/CVE-2024-62xx/CVE-2024-6286.json | 8 +- CVE-2024/CVE-2024-63xx/CVE-2024-6385.json | 8 +- CVE-2024/CVE-2024-63xx/CVE-2024-6397.json | 8 +- CVE-2024/CVE-2024-64xx/CVE-2024-6407.json | 4 +- CVE-2024/CVE-2024-64xx/CVE-2024-6410.json | 8 +- CVE-2024/CVE-2024-64xx/CVE-2024-6411.json | 8 +- CVE-2024/CVE-2024-64xx/CVE-2024-6421.json | 8 +- CVE-2024/CVE-2024-64xx/CVE-2024-6422.json | 8 +- CVE-2024/CVE-2024-64xx/CVE-2024-6433.json | 8 +- CVE-2024/CVE-2024-64xx/CVE-2024-6447.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6501.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6528.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6550.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6554.json | 8 +- CVE-2024/CVE-2024-65xx/CVE-2024-6556.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6624.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6644.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6645.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6646.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6647.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6649.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6650.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6652.json | 8 +- CVE-2024/CVE-2024-66xx/CVE-2024-6653.json | 18 +- CVE-2024/CVE-2024-66xx/CVE-2024-6666.json | 4 +- CVE-2024/CVE-2024-66xx/CVE-2024-6676.json | 8 +- README.md | 37 +- _state.csv | 510 ++++++++++---------- 255 files changed, 1975 insertions(+), 780 deletions(-) diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15039.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15039.json index 5e997a890f4..75dc80926e3 100644 --- a/CVE-2016/CVE-2016-150xx/CVE-2016-15039.json +++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15039.json @@ -2,13 +2,17 @@ "id": "CVE-2016-15039", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-11T03:15:02.270", - "lastModified": "2024-07-11T03:15:02.270", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in mhuertos phpLDAPadmin up to 665dbc2690ebeb5392d38f1fece0a654225a0b38. Affected by this vulnerability is the function makeHttpRequest of the file htdocs/js/ajax_functions.js. The manipulation leads to http request smuggling. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named dd6e9583a2eb2ca085583765e8a63df5904cb036. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-270523." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en mhuertos phpLDAPadmin hasta 665dbc2690ebeb5392d38f1fece0a654225a0b38 y clasificada como cr\u00edtica. La funci\u00f3n makeHttpRequest del archivo htdocs/js/ajax_functions.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al contrabando de solicitudes http. El ataque se puede lanzar de forma remota. Este producto no utiliza versiones. Esta es la raz\u00f3n por la que la informaci\u00f3n sobre las versiones afectadas y no afectadas no est\u00e1 disponible. El parche se llama dd6e9583a2eb2ca085583765e8a63df5904cb036. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-270523." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json index 8615d115fbf..93b1776ef1f 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json @@ -2,13 +2,17 @@ "id": "CVE-2023-21113", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:10.717", - "lastModified": "2024-07-09T21:15:10.717", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples ubicaciones, existe una posible omisi\u00f3n de permiso debido a un agente confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json index ed08d9a8af3..d92b5d923e4 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json @@ -2,13 +2,17 @@ "id": "CVE-2023-21114", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:10.803", - "lastModified": "2024-07-09T21:15:10.803", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples ubicaciones, existe una posible omisi\u00f3n de permiso debido a un agente confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32467.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32467.json index c2fd0eb1d78..0e2599743a8 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32467.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32467.json @@ -2,13 +2,17 @@ "id": "CVE-2023-32467", "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-10T03:15:01.870", - "lastModified": "2024-07-10T03:15:01.870", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some UEFI code, leading to arbitrary code execution or escalation of privilege." + }, + { + "lang": "es", + "value": "El BIOS de Dell Edge Gateway, versiones 3200 y 5200, contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un usuario malicioso local autenticado con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de alg\u00fan c\u00f3digo UEFI, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario o una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32472.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32472.json index e944d09c1fb..02bcd1686ea 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32472.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32472.json @@ -2,13 +2,17 @@ "id": "CVE-2023-32472", "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-10T03:15:02.193", - "lastModified": "2024-07-10T03:15:02.193", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some code in System Management Mode, leading to arbitrary code execution or escalation of privilege." + }, + { + "lang": "es", + "value": "El BIOS de Dell Edge Gateway, versiones 3200 y 5200, contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un usuario malintencionado local autenticado con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de parte del c\u00f3digo en el modo de administraci\u00f3n del sistema, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario o una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33859.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33859.json index e253967937e..a75fad15432 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33859.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33859.json @@ -2,13 +2,17 @@ "id": "CVE-2023-33859", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-10T16:15:02.823", - "lastModified": "2024-07-10T16:15:02.823", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security QRadar EDR 3.12 could disclose sensitive information due to an observable login response discrepancy. IBM X-Force ID: 257697." + }, + { + "lang": "es", + "value": "IBM Security QRadar EDR 3.12 podr\u00eda revelar informaci\u00f3n confidencial debido a una discrepancia observable en la respuesta de inicio de sesi\u00f3n. ID de IBM X-Force: 257697." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33860.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33860.json index f0df4abfad2..ff63920c48e 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33860.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33860.json @@ -2,13 +2,17 @@ "id": "CVE-2023-33860", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-10T16:15:03.060", - "lastModified": "2024-07-10T16:15:03.060", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security QRadar EDR 3.12 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 257702." + }, + { + "lang": "es", + "value": "IBM Security QRadar EDR 3.12 no establece el atributo seguro en tokens de autorizaci\u00f3n o cookies de sesi\u00f3n. Los atacantes pueden obtener los valores de las cookies enviando un enlace http:// a un usuario o colocando este enlace en un sitio al que accede el usuario. La cookie se enviar\u00e1 al enlace inseguro y el atacante podr\u00e1 obtener el valor de la cookie espiando el tr\u00e1fico. ID de IBM X-Force: 257702." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35006.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35006.json index 55fd4488019..42f97ffc353 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35006.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35006.json @@ -2,13 +2,17 @@ "id": "CVE-2023-35006", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-10T16:15:03.300", - "lastModified": "2024-07-10T16:15:03.300", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Security QRadar EDR 3.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 297165." + }, + { + "lang": "es", + "value": "IBM Security QRadar EDR 3.12 es vulnerable a la inyecci\u00f3n de HTML. Un atacante remoto podr\u00eda inyectar c\u00f3digo HTML malicioso que, una vez visto, se ejecutar\u00eda en el navegador web de la v\u00edctima dentro del contexto de seguridad del sitio de alojamiento. ID de IBM X-Force: 297165." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json index 675b1bbef09..f3a12dc9c4f 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50805.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50805", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:10.590", - "lastModified": "2024-07-09T19:15:10.590", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil, procesador port\u00e1til y m\u00f3dems de Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 que permite una escritura fuera de los l\u00edmites en el mont\u00f3n en 2G (sin autenticaci\u00f3n)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json index f368a68f89e..1558399b1ae 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50806", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:10.820", - "lastModified": "2024-07-09T19:15:10.820", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850 Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows out-of-bounds access to a heap buffer in the SIM Proactive Command." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil, procesador port\u00e1til y m\u00f3dems de Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850 Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 Exynos 1330, Exynos 9110 , Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 que permite el acceso fuera de los l\u00edmites a un bufer de mont\u00f3n en el comando proactivo SIM." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json index 2bb2280399d..2f6e3357789 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50807.json @@ -2,13 +2,17 @@ "id": "CVE-2023-50807", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:11.020", - "lastModified": "2024-07-09T19:15:11.020", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samsung Wearable Processor and Modems with versions Exynos 9110, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en los procesadores y m\u00f3dems port\u00e1tiles Samsung con versiones Exynos 9110, Exynos Modem 5123, Exynos Modem 5300 que permite una escritura fuera de los l\u00edmites en el mont\u00f3n en 2G (sin autenticaci\u00f3n)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6813.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6813.json index f0e0db3399c..63818965d82 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6813.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6813.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6813", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T08:15:10.760", - "lastModified": "2024-07-10T08:15:10.760", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Login by Auth0 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018wle\u2019 parameter in all versions up to, and including, 4.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Login by Auth0 para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'wle' en todas las versiones hasta la 4.6.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7061.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7061.json index 4fff8a2e7c2..1d5f7bc46c5 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7061.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7061.json @@ -2,13 +2,17 @@ "id": "CVE-2023-7061", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T02:15:02.740", - "lastModified": "2024-07-10T02:15:02.740", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers with contributor access or above to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento Advanced File Manager Shortcodes para WordPress es vulnerable a la carga de archivos arbitrarios en todas las versiones hasta la 2.5.3 incluida. Esto hace posible que atacantes autenticados con acceso de colaborador o superior carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7062.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7062.json index bd93155114c..c6237433fe4 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7062.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7062.json @@ -2,13 +2,17 @@ "id": "CVE-2023-7062", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T02:15:02.960", - "lastModified": "2024-07-10T02:15:02.960", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced File Manager Shortcodes plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4. This makes it possible for attackers with contributor access or higher to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Advanced File Manager Shortcodes para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 2.4 incluida. Esto hace posible que los atacantes con acceso de colaborador o superior lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0619.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0619.json index 92e005f6799..3ed434f4671 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0619.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0619.json @@ -2,13 +2,17 @@ "id": "CVE-2024-0619", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T04:15:03.247", - "lastModified": "2024-07-11T04:15:03.247", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Payflex Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the payment_callback() function in all versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to update the status of orders, which can potentially lead to revenue loss." + }, + { + "lang": "es", + "value": "El complemento Payflex Payment Gateway para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n Payment_callback() en todas las versiones hasta la 2.5.0 incluida. Esto hace posible que atacantes no autenticados actualicen el estado de los pedidos, lo que potencialmente puede provocar una p\u00e9rdida de ingresos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json index 87ef4b565b3..b8b0cba0ff4 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1845.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1845", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.613", - "lastModified": "2024-07-11T06:15:02.613", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The VikRentCar Car Rental Management System WordPress plugin before 1.3.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + }, + { + "lang": "es", + "value": " El complemento VikRentCar Car Rental Management System de WordPress anterior a 1.3.2 no tiene controles CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios registrados realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json index 31765a5cc90..1d50142248c 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20456.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20456", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-07-10T16:15:03.703", - "lastModified": "2024-07-10T16:15:03.703", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Cisco Secure Boot functionality and load unverified software on an affected device. To exploit this successfully, the attacker must have root-system privileges on the affected device.\r\n\r This vulnerability is due to an error in the software build process. An attacker could exploit this vulnerability by manipulating the system’s configuration options to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass of the requirement to run Cisco signed images or alter the security properties of the running system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el proceso de arranque del software Cisco IOS XR podr\u00eda permitir que un atacante local autenticado con altos privilegios omita la funcionalidad de arranque seguro de Cisco y cargue software no verificado en un dispositivo afectado. Para aprovechar esto con \u00e9xito, el atacante debe tener privilegios de system root en el dispositivo afectado. Esta vulnerabilidad se debe a un error en el proceso de compilaci\u00f3n del software. Un atacante podr\u00eda aprovechar esta vulnerabilidad manipulando las opciones de configuraci\u00f3n del sistema para omitir algunas de las comprobaciones de integridad que se realizan durante el proceso de arranque. Un exploit exitoso podr\u00eda permitir al atacante controlar la configuraci\u00f3n de arranque, lo que podr\u00eda permitirle eludir el requisito de ejecutar im\u00e1genes firmadas de Cisco o alterar las propiedades de seguridad del sistema en ejecuci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20781.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20781.json index 1e44a8f4a78..0a0849512d4 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20781.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20781.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20781", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T20:15:09.290", - "lastModified": "2024-07-09T20:15:09.290", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20782.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20782.json index 31a7a879e64..cfb0cb68aaa 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20782.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20782.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20782", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T20:15:09.510", - "lastModified": "2024-07-09T20:15:09.510", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20783.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20783.json index 63b40c3c8b2..77dfd7cb8cf 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20783.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20783.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20783", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T20:15:09.727", - "lastModified": "2024-07-09T20:15:09.727", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20785.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20785.json index 47f2c86d055..6dd8921012c 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20785.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20785.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20785", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T20:15:09.943", - "lastModified": "2024-07-09T20:15:09.943", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones ID19.3, ID18.5.2 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21417.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21417.json index df6fb474903..77402b977f1 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21417.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21417.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21417", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-10T00:15:03.027", - "lastModified": "2024-07-10T00:15:03.027", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Text Services Framework Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Windows Text Services Framework" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21521.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21521.json index 2b36939a5c7..83bda491629 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21521.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21521.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21521", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:10.653", - "lastModified": "2024-07-10T05:15:10.653", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package @discordjs/opus are vulnerable to Denial of Service (DoS) due to providing an input object with a property toString to several different functions. Exploiting this vulnerability could lead to a system crash." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete @discordjs/opus son vulnerables a la Denegaci\u00f3n de Servicio (DoS) debido a que proporcionan un objeto de entrada con una propiedad toString para varias funciones diferentes. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda provocar una ca\u00edda del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21522.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21522.json index dea87de458f..b5dfba17c60 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21522.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21522.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21522", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:10.953", - "lastModified": "2024-07-10T05:15:10.953", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package audify are vulnerable to Improper Validation of Array Index when frameSize is provided to the new OpusDecoder().decode or new OpusDecoder().decodeFloat functions it is not checked for negative values. This can lead to a process crash." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete audify son vulnerables a una validaci\u00f3n inadecuada del \u00edndice de matriz cuando se proporciona frameSize a las nuevas funciones OpusDecoder().decode o OpusDecoder().decodeFloat y no se verifican los valores negativos. Esto puede provocar un fallo del proceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json index 1df455d36ae..7efb7ba6441 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21523.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21523", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.153", - "lastModified": "2024-07-10T05:15:11.153", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package images are vulnerable to Denial of Service (DoS) due to providing unexpected input types to several different functions. This makes it possible to reach an assert macro, leading to a process crash.\r\r**Note:**\rBy providing some specific integer values (like 0) to the size function, it is possible to obtain a Segmentation fault error, leading to the process crash." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete images son vulnerables a la denegaci\u00f3n de servicio (DoS) debido a que proporcionan tipo is de entradanesperados para varias funciones diferentes. Esto hace posible alcanzar una macro de afirmaci\u00f3n, lo que provoca un fallo del proceso. **Nota:** Al proporcionar algunos valores enteros espec\u00edficos (como 0) a la funci\u00f3n de tama\u00f1o, es posible obtener un error de fallo de segmentaci\u00f3n, lo que provoca el fallo del proceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json index b08e0cf6cb8..7f3f7a50e2f 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21524.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21524", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.340", - "lastModified": "2024-07-10T05:15:11.340", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package node-stringbuilder are vulnerable to Out-of-bounds Read due to incorrect memory length calculation, by calling ToBuffer, ToString, or CharAt on a StringBuilder object with a non-empty string value input. It's possible to return previously allocated memory, for example, by providing negative indexes, leading to an Information Disclosure." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete node-stringbuilder son vulnerables a lecturas fuera de los l\u00edmites debido a un c\u00e1lculo incorrecto de la longitud de la memoria, al llamar a ToBuffer, ToString o CharAt en un objeto StringBuilder con una entrada de valor de cadena no vac\u00eda. Es posible devolver memoria previamente asignada, por ejemplo, proporcionando \u00edndices negativos, lo que lleva a una divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21525.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21525.json index 4a6b0d79303..22dd90d806c 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21525.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21525.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21525", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.530", - "lastModified": "2024-07-10T05:15:11.530", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete node-twain son vulnerables a una verificaci\u00f3n inadecuada o al manejo de condiciones excepcionales debido a la longitud de los datos de origen que no se verifican. La creaci\u00f3n de un nuevo twain.TwainSDK con una propiedad productName o productFamily, manufacturer, version.info de longitud >= 34 caracteres conduce a una vulnerabilidad de desbordamiento del b\u00fafer." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json index 1f5368b6fe6..4437692134e 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21526.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21526", "sourceIdentifier": "report@snyk.io", "published": "2024-07-10T05:15:11.733", - "lastModified": "2024-07-10T05:15:11.733", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package speaker are vulnerable to Denial of Service (DoS) when providing unexpected input types to the channels property of the Speaker object makes it possible to reach an assert macro. Exploiting this vulnerability can lead to a process crash." + }, + { + "lang": "es", + "value": "Todas las versiones del paquete Speaker son vulnerables a la denegaci\u00f3n de servicio (DoS) cuando se proporcionan tipos de entrada inesperados a la propiedad de canales del objeto Speaker hace posible alcanzar una macro de afirmaci\u00f3n. La explotaci\u00f3n de esta vulnerabilidad puede provocar un fallo del proceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21832.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21832.json index 13d53da5b49..b0901462600 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21832.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21832.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21832", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-07-09T23:15:10.397", - "lastModified": "2024-07-09T23:15:10.397", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential JSON injection attack vector exists in PingFederate REST API data stores using the POST method and a JSON request body." + }, + { + "lang": "es", + "value": "Existe un posible vector de ataque de inyecci\u00f3n JSON en los almacenes de datos de la API REST de PingFederate utilizando el m\u00e9todo POST y un cuerpo de solicitud JSON." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21993.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21993.json index 77bf77e564a..9afb49b5d2c 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21993.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21993.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21993", "sourceIdentifier": "security-alert@netapp.com", "published": "2024-07-09T22:15:01.990", - "lastModified": "2024-07-09T22:15:01.990", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SnapCenter versions prior to 5.0p1 are susceptible to a vulnerability\n which could allow an authenticated attacker to discover plaintext \ncredentials." + }, + { + "lang": "es", + "value": "Las versiones de SnapCenter anteriores a la 5.0p1 son susceptibles a una vulnerabilidad que podr\u00eda permitir a un atacante autenticado descubrir credenciales en texto plano." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json index 53aa686c466..b1020ace4ca 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22018.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22018", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-10T02:15:03.160", - "lastModified": "2024-07-10T02:15:03.160", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.\nThis flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.\nThis vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Node.js que afecta a los usuarios del modelo de permisos experimental cuando se utiliza el indicador --allow-fs-read. Este fallo surge de un modelo de permisos inadecuado que no logra restringir las estad\u00edsticas de archivos a trav\u00e9s de la API fs.lstat. Como resultado, los actores malintencionados pueden recuperar estad\u00edsticas de archivos a los que no tienen acceso de lectura expl\u00edcito. Esta vulnerabilidad afecta a todos los usuarios que utilizan el modelo de permiso experimental en Node.js 20 y Node.js 21. Tenga en cuenta que en el momento en que se emiti\u00f3 este CVE, el modelo de permiso es una caracter\u00edstica experimental de Node.js." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22280.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22280.json index d8d81209c9c..e1bf77edf55 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22280.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22280.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22280", "sourceIdentifier": "security@vmware.com", "published": "2024-07-11T05:15:10.123", - "lastModified": "2024-07-11T05:15:10.123", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Aria Automation does not apply correct input validation which allows for SQL-injection in the product.\u00a0An authenticated malicious user could enter specially crafted SQL queries and perform unauthorised read/write operations in the database." + }, + { + "lang": "es", + "value": "VMware Aria Automation no aplica la validaci\u00f3n de entrada correcta que permite la inyecci\u00f3n de SQL en el producto. Un usuario malintencionado autenticado podr\u00eda ingresar consultas SQL especialmente manipuladas y realizar operaciones de lectura/escritura no autorizadas en la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22377.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22377.json index f656d087482..99ad8a218fb 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22377.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22377.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22377", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-07-09T23:15:10.620", - "lastModified": "2024-07-09T23:15:10.620", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The deploy directory in PingFederate runtime nodes is reachable to unauthorized users." + }, + { + "lang": "es", + "value": "El directorio de implementaci\u00f3n en los nodos de tiempo de ejecuci\u00f3n de PingFederate es accesible para usuarios no autorizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22387.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22387.json index b959d627aa5..37d9c9ef762 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22387.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22387.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22387", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-07-11T03:15:02.660", - "lastModified": "2024-07-11T03:15:02.660", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.\n\n\n\nThis issue affects:\u00a0Gallagher Controller 6000 and 7000 \n\n9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior." + }, + { + "lang": "es", + "value": "El control externo de datos de estado cr\u00edtico (CWE-642) en la interfaz web de diagn\u00f3stico del Controlador 6000 y del Controlador 7000 permite a un usuario autenticado modificar las conexiones de E/S del dispositivo, lo que genera un comportamiento inesperado que, en algunas circunstancias, podr\u00eda comprometer los controles de seguridad f\u00edsica del sitio. Gallagher recomienda que la p\u00e1gina web de diagn\u00f3stico no est\u00e9 habilitada (la opci\u00f3n predeterminada est\u00e1 desactivada) a menos que as\u00ed lo indique el soporte t\u00e9cnico de Gallagher. Esta interfaz est\u00e1 destinada \u00fanicamente a fines de diagn\u00f3stico. Este problema afecta a: Gallagher Controller 6000 y 7000 9.10 antes de vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 antes de vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 antes de vCR8. 90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todos Versiones de 8.60 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22477.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22477.json index 78d2e140a60..cb122bf14e7 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22477.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22477.json @@ -2,13 +2,17 @@ "id": "CVE-2024-22477", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-07-09T23:15:10.827", - "lastModified": "2024-07-09T23:15:10.827", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting vulnerability exists in the admin console OIDC Policy Management Editor. The impact is contained to admin console users only." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting en la consola de administraci\u00f3n de OIDC Policy Management Editor. El impacto est\u00e1 limitado a los usuarios de la consola de administraci\u00f3n \u00fanicamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23194.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23194.json index 5dd9e822c93..0ae68a48a89 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23194.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23194.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23194", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-07-11T03:15:02.903", - "lastModified": "2024-07-11T03:15:02.903", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper output Neutralization for Logs (CWE-117) in the Command Centre API\u00a0Diagnostics Endpoint could allow an attacker limited ability to modify Command Centre log files. \n\nThis issue affects:\u00a0Gallagher Command Centre v9.10 prior to vEL9.10.1268 (MR1)." + }, + { + "lang": "es", + "value": "Una neutralizaci\u00f3n de salida incorrecta para registros (CWE-117) en el endpoint de diagn\u00f3stico de la API del Command Center podr\u00eda permitir que un atacante tenga una capacidad limitada para modificar los archivos de registro del Command Center. Este problema afecta a: Gallagher Command Center v9.10 anterior a vEL9.10.1268 (MR1)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23317.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23317.json index 99eda5c4953..f070088728a 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23317.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23317.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23317", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-07-11T03:15:03.130", - "lastModified": "2024-07-11T03:15:03.130", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "External Control of File Name or Path (CWE-73) in the Controller 6000 and Controller 7000 allows an attacker with local access to the Controller to perform arbitrary code execution. \n\nThis issue affects:\u00a09.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior." + }, + { + "lang": "es", + "value": "El control externo del nombre o ruta del archivo (CWE-73) en el Controlador 6000 y el Controlador 7000 permite a un atacante con acceso local al Controlador realizar la ejecuci\u00f3n de c\u00f3digo arbitrario. Este problema afecta a: 9.10 anterior a vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 anterior a vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 anterior a vCR8.90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todas las versiones de 8.60 y anteriores ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23485.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23485.json index 54942a257d9..a3c7a47e0e0 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23485.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23485.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23485", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-07-11T03:15:03.327", - "lastModified": "2024-07-11T03:15:03.327", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation (CWE-1304) in the Controller 6000 and 7000 can lead to secured door locks connected via Aperio Communication Hubs to momentarily allow free access.\u00a0\n\nThis issue affects:\u00a0Gallagher Controller 6000 and 7000\u00a09.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), \u00a08.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior." + }, + { + "lang": "es", + "value": "La integridad preservada inadecuadamente del estado de configuraci\u00f3n del hardware durante una operaci\u00f3n de ahorro/restauraci\u00f3n de energ\u00eda (CWE-1304) en el controlador 6000 y 7000 puede provocar que puertas cerradas seguras conectadas a trav\u00e9s de concentradores de comunicaci\u00f3n Aperio permitan moment\u00e1neamente el libre acceso. Este problema afecta a: Gallagher Controller 6000 y 7000 9.10 antes de vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 antes de vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 antes de vCR8. 90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todos Versiones de 8.60 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json index fef4b08738b..9c34683fe7d 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23695", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:11.857", - "lastModified": "2024-07-09T21:15:11.857", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In CacheOpPMRExec of cache_km.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En CacheOpPMRExec de cache_km.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json index 93bae69d270..536a3190f0d 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23696", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:11.973", - "lastModified": "2024-07-09T21:15:11.973", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In RGXCreateZSBufferKM of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En RGXCreateZSBufferKM de rgxta3d.c existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un uso after free. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json index 1aa281432ed..d6da9f9ec62 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23697", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.047", - "lastModified": "2024-07-09T21:15:12.047", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In RGXCreateHWRTData_aux of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En RGXCreateHWRTData_aux de rgxta3d.c existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un uso after free. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json index be84c7f5eb2..9528c4dd55b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23698", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.113", - "lastModified": "2024-07-09T21:15:12.113", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In RGXFWChangeOSidPriority of rgxfwutils.c, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En RGXFWChangeOSidPriority de rgxfwutils.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una verificaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json index 96608791313..fb147cc68c4 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23711", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.227", - "lastModified": "2024-07-09T21:15:12.227", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemXIntUnreserveRange of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemXIntUnreserveRange de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json index d8bfe0d9d13..c86a13bad97 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25023", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-10T01:15:09.633", - "lastModified": "2024-07-10T01:15:09.633", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.22.0 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 281429." + }, + { + "lang": "es", + "value": "IBM Cloud Pak for Security 1.10.0.0 a 1.10.11.0 e IBM QRadar Suite Software 1.10.12.0 a 1.10.22.0 almacenan informaci\u00f3n potencialmente confidencial en archivos de registro que un usuario local podr\u00eda leer. ID de IBM X-Force: 281429." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json index 80a245cc12e..f80686e4b91 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25076", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T20:15:02.933", - "lastModified": "2024-07-10T20:15:02.933", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The bootrom function responsible for validating the Flash Product Header directly uses a user-controllable size value (Length of Flash Config Section) to control a read from the QSPI device into a fixed sized buffer, resulting in a buffer overflow and execution of arbitrary code." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos Renesas SmartBond DA14691, DA14695, DA14697 y DA14699. La funci\u00f3n bootrom responsable de validar el encabezado del producto Flash utiliza directamente un valor de tama\u00f1o controlable por el usuario (Longitud de la secci\u00f3n de configuraci\u00f3n de Flash) para controlar una lectura desde el dispositivo QSPI en un b\u00fafer de tama\u00f1o fijo, lo que resulta en un desbordamiento del b\u00fafer y la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25077.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25077.json index 01de5f87823..171ebf96e56 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25077.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25077.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25077", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T20:15:03.023", - "lastModified": "2024-07-10T20:15:03.023", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The Nonce used for on-the-fly decryption of flash images is stored in an unsigned header, allowing its value to be modified without invalidating the signature used for secureboot image verification. Because the encryption engine for on-the-fly decryption uses AES in CTR mode without authentication, an attacker-modified Nonce can result in execution of arbitrary code." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos Renesas SmartBond DA14691, DA14695, DA14697 y DA14699. El Nonce utilizado para el descifrado sobre la marcha de im\u00e1genes flash se almacena en un encabezado sin firmar, lo que permite modificar su valor sin invalidar la firma utilizada para la verificaci\u00f3n de im\u00e1genes de arranque seguro. Debido a que el motor de cifrado para el descifrado sobre la marcha utiliza AES en modo CTR sin autenticaci\u00f3n, un Nonce modificado por un atacante puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json index 4ffc011da58..9dbf0662739 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2602.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2602", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T09:15:03.030", - "lastModified": "2024-07-11T09:15:03.030", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path\nTraversal') vulnerability exists that could result in remote code execution when an authenticated\nuser executes a saved project file that has been tampered by a malicious actor." + }, + { + "lang": "es", + "value": "CWE-22: Existe una vulnerabilidad de limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"Path Traversal\") que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo cuando un usuario autenticado ejecuta un archivo de proyecto guardado que ha sido manipulado por un actor malintencionado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27090.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27090.json index 667940a7b86..b7de03857f1 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27090.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27090.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27090", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T19:15:10.133", - "lastModified": "2024-07-10T19:15:10.133", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embbeded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. This vulnerability is fixed in 0.27.6." + }, + { + "lang": "es", + "value": "Decidim es un framework de democracia participativa, escrito en Ruby on Rails, desarrollado originalmente para el sitio web de participaci\u00f3n en l\u00ednea y fuera de l\u00ednea del gobierno de la ciudad de Barcelona. Si un atacante puede inferir el slug o la URL de un recurso privado o no publicado, y este recurso puede estar incrustado (como un proceso participativo, una asamblea, una propuesta, un resultado, etc.), entonces se podr\u00eda acceder a algunos datos de este recurso. . Esta vulnerabilidad se solucion\u00f3 en 0.27.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27095.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27095.json index b23c11f437a..4eaf9521f9b 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27095.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27095.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27095", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T19:15:10.407", - "lastModified": "2024-07-10T19:15:10.407", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Decidim is a participatory democracy framework. The admin panel is subject to potential XSS attach in case the attacker manages to modify some records being uploaded to the server. This vulnerability is fixed in 0.27.6 and 0.28.1." + }, + { + "lang": "es", + "value": "Decidim es un framework de democracia participativa. El panel de administraci\u00f3n est\u00e1 sujeto a un posible adjunto XSS en caso de que el atacante logre modificar algunos registros que se cargan en el servidor. Esta vulnerabilidad se solucion\u00f3 en 0.27.6 y 0.28.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27361.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27361.json index 7aa04b1f40c..7b0b3936b7e 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27361.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27361.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27361", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:10.167", - "lastModified": "2024-07-09T20:15:10.167", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samsung Mobile Processor Exynos 980, Exynos 990, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, and Exynos 2400 that involves a time-of-check to time-of-use (TOCTOU) race condition, which can lead to a Denial of Service." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 980, Exynos 990, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 y Exynos 2400 que involucra condici\u00f3n de ejecuci\u00f3n time-of-check to time-of-use (TOCTOU) , que puede conducir a una Denegaci\u00f3n de Servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27363.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27363.json index 6e2295f22f9..5f23a1a9c8a 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27363.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27363.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27363", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:10.403", - "lastModified": "2024-07-09T20:15:10.403", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samsung Mobile Processor Exynos 850, Exynos 9610, Exynos 980, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, and Exynos W930 where it does not properly check a pointer address, which can lead to a Information disclosure." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil Samsung Exynos 850, Exynos 9610, Exynos 980, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920 y Exynos W930 donde no verifica correctamente una direcci\u00f3n de puntero, lo que puede provocar una divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json index 49db374dca9..2e36d9d27f7 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27385.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27385", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:12.287", - "lastModified": "2024-07-09T21:15:12.287", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the slsi_handle_nan_rx_event_log_ind function in Samsung Mobile Processor Exynos 1380 and Exynos 1480 related to no input validation check on tag_len for rx coming from userspace, which can lead to heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en la funci\u00f3n slsi_handle_nan_rx_event_log_ind en Samsung Mobile Processor Exynos 1380 y Exynos 1480 relacionada con la falta de verificaci\u00f3n de validaci\u00f3n de entrada en tag_len para rx provenientes del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json index 2e0b1e511b3..e5c16588ba4 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27386.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27386", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:12.483", - "lastModified": "2024-07-09T21:15:12.483", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the slsi_handle_nan_rx_event_log_ind function in Samsung Mobile Processor Exynos 1380 and Exynos 1480 related to no input validation check on tag_len for tx coming from userspace, which can lead to heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en la funci\u00f3n slsi_handle_nan_rx_event_log_ind en Samsung Mobile Processor Exynos 1380 y Exynos 1480 relacionada con la falta de verificaci\u00f3n de validaci\u00f3n de entrada en tag_len para tx provenientes del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28068.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28068.json index 07716e43b2c..57ff1183371 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28068.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28068.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28068", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:10.603", - "lastModified": "2024-07-09T20:15:10.603", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in SS in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves a NULL pointer dereference which can cause abnormal termination of a mobile phone via a manipulated packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en SS en Procesador M\u00f3vil, Procesador Wearable y M\u00f3dems Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330 , Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123 y Exynos Modem 5300 que implica una desreferencia de puntero NULL que puede causar una terminaci\u00f3n anormal de un tel\u00e9fono m\u00f3vil a trav\u00e9s de un paquete manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28827.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28827.json index 11c74914ee4..b96309b694d 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28827.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28827.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28827", "sourceIdentifier": "security@checkmk.com", "published": "2024-07-10T13:15:10.017", - "lastModified": "2024-07-10T13:15:10.017", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) allows a local attacker to gain SYSTEM privileges." + }, + { + "lang": "es", + "value": "Permisos incorrectos en el directorio de datos del agente de Windows Checkmk en Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45 y <= 2.0.0p39 (EOL) permiten a un atacante local obtener privilegios de SYSTEM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28828.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28828.json index 8e5c5819a66..be716c50ce3 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28828.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28828.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28828", "sourceIdentifier": "security@checkmk.com", "published": "2024-07-10T13:15:10.297", - "lastModified": "2024-07-10T13:15:10.297", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site request forgery in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) could lead to 1-click compromize of the site." + }, + { + "lang": "es", + "value": "Cross-Site Request Forgery en Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45 y <= 2.0.0p39 (EOL) podr\u00eda provocar que el sitio se comprometa con 1 clic." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2880.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2880.json index 3bfe5f65228..741e822c1d1 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2880.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-2880", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-11T07:15:02.840", - "lastModified": "2024-07-11T07:15:02.840", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 in which a user with `admin_group_member` custom role permission could ban group members." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 16.5 anterior a 16.11.6, desde 17.0 anterior a 17.0.4 y desde 17.1 anterior a 17.1.2 en el que un usuario con permiso de rol personalizado `admin_group_member` podr\u00eda banear a los miembros del grupo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json index 09acf378fa9..24a01fe2bed 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29153.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29153", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:10.827", - "lastModified": "2024-07-09T20:15:10.827", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves incorrect authorization of LTE NAS messages and leads to downgrading to lower network generations and repeated DDOS." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad en el procesador m\u00f3vil, procesador port\u00e1til y m\u00f3dems de Samsung con versiones Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123 y Exynos Modem 5300 que implica una autorizaci\u00f3n incorrecta de mensajes LTE NAS y conduce a una degradaci\u00f3n a generaciones de red m\u00e1s bajas y DDOS repetidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json index 49a262e2e12..40705c5a518 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29784", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.110", - "lastModified": "2024-07-03T01:52:34.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T13:53:03.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json index c794616c387..cd31a4d2106 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31310", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.773", - "lastModified": "2024-07-09T21:15:12.773", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In newServiceInfoLocked of AutofillManagerServiceImpl.java, there is a possible way to hide an enabled Autofill service app in the Autofill service settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En newServiceInfoLocked de AutofillManagerServiceImpl.java, existe una manera posible de ocultar una aplicaci\u00f3n de servicio de Autocompletar habilitada en la configuraci\u00f3n del servicio de Autocompletar debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json index c17c0e8d595..b02114701ca 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31311.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31311", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.840", - "lastModified": "2024-07-09T21:15:12.840", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In increment_annotation_count of stats_event.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En increment_annotation_count de stats_event.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json index 578fca07b05..4545ed2b3cd 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31312", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.900", - "lastModified": "2024-07-09T21:15:12.900", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible information leak due to a missing permission check. This could lead to local information disclosure exposing played media with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, existe una posible fuga de informaci\u00f3n debido a la falta de una verificaci\u00f3n de permiso. Esto podr\u00eda llevar a la divulgaci\u00f3n de informaci\u00f3n local exponiendo los medios reproducidos sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json index e36c2a70cc2..da400ac7017 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31313.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31313", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.960", - "lastModified": "2024-07-09T21:15:12.960", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In availableToWriteBytes of MessageQueueBase.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En availableToWriteBytes de MessageQueueBase.h, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31314.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31314.json index 1fc6990a5f0..fd48e2025c2 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31314.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31314.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31314", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.020", - "lastModified": "2024-07-09T21:15:13.020", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple functions of ShortcutService.java, there is a possible persistent DOS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples funciones de ShortcutService.java, existe una posible DOS persistente debido al agotamiento de recursos. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json index 5c431d6683f..b918f534d6e 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31315.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31315", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.080", - "lastModified": "2024-07-09T21:15:13.080", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple functions of ManagedServices.java, there is a possible way to hide an app with notification access in the Device & app notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples funciones de ManagedServices.java, existe una forma posible de ocultar una aplicaci\u00f3n con acceso a notificaciones en la configuraci\u00f3n de notificaciones de dispositivos y aplicaciones debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json index a3d2ac31a2e..8dd071b11de 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31316.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31316", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.140", - "lastModified": "2024-07-09T21:15:13.140", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In onResult of AccountManagerService.java, there is a possible way to perform an arbitrary background activity launch due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En onResult de AccountManagerService.java, existe una forma posible de realizar un inicio de actividad en segundo plano arbitrario debido a una falta de coincidencia de paquetes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json index bd5fd547c3c..7395a172e2e 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31317.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31317", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.197", - "lastModified": "2024-07-09T21:15:13.197", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples funciones de ZygoteProcess.java, existe una manera posible de lograr la ejecuci\u00f3n de c\u00f3digo como cualquier aplicaci\u00f3n a trav\u00e9s de WRITE_SECURE_SETTINGS debido a una deserializaci\u00f3n insegura. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json index eb8d27b5145..5fe75008466 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31318.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31318", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.260", - "lastModified": "2024-07-09T21:15:13.260", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In CompanionDeviceManagerService.java, there is a possible way to pair a companion device without user acceptance due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En CompanionDeviceManagerService.java, existe una forma posible de emparejar un dispositivo complementario sin la aceptaci\u00f3n del usuario debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31319.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31319.json index 14078cf5aa6..78091ea5764 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31319.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31319.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31319", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.313", - "lastModified": "2024-07-09T21:15:13.313", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In updateNotificationChannelFromPrivilegedListener of NotificationManagerService.java, there is a possible cross-user data leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En updateNotificationChannelFromPrivilegedListener de NotificationManagerService.java, existe una posible fuga de datos entre usuarios debido a un diputado confundido. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31320.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31320.json index 4e833887068..2a4350a80d0 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31320.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31320.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31320", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.373", - "lastModified": "2024-07-09T21:15:13.373", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En setSkipPrompt de AssociationRequest.java, existe una forma posible de establecer una asociaci\u00f3n de dispositivo complementario sin ninguna confirmaci\u00f3n debido a CDM. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json index 4a712b89716..7cdf5b4dbb5 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31322.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31322", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.433", - "lastModified": "2024-07-09T21:15:13.433", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In updateServicesLocked of AccessibilityManagerService.java, there is a possible way for an app to be hidden from the Setting while retaining Accessibility Service due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En updateServicesLocked de AccessibilityManagerService.java, existe una forma posible de ocultar una aplicaci\u00f3n de la Configuraci\u00f3n mientras se conserva el Servicio de Accesibilidad debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31323.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31323.json index f4694d9ed77..4766472ed70 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31323.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31323.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31323", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.490", - "lastModified": "2024-07-09T21:15:13.490", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In onCreate of multiple files, there is a possible way to trick the user into granting health permissions due to tapjacking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En onCreate de m\u00faltiples archivos, existe una manera posible de enga\u00f1ar al usuario para que otorgue permisos de salud debido al tapjacking. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json index 53946812d41..d41af56ffaa 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31324.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31324", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.563", - "lastModified": "2024-07-09T21:15:13.563", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In hide of WindowState.java, there is a possible way to bypass tapjacking/overlay protection by launching the activity in portrait mode first and then rotating it to landscape mode. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En hide de WindowState.java, existe una forma posible de omitir la protecci\u00f3n contra secuestro/superposici\u00f3n iniciando la actividad en modo vertical primero y luego rot\u00e1ndola al modo horizontal. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json index ddfa4dca012..13fe0cecadb 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31325.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31325", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.677", - "lastModified": "2024-07-09T21:15:13.677", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible way to reveal images across users data due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, existe una forma posible de revelar im\u00e1genes entre los datos de los usuarios debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31326.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31326.json index 51323a62198..8110e456688 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31326.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31326.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31326", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.757", - "lastModified": "2024-07-09T21:15:13.757", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible way in which policy migration code will never be executed due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, existe una forma posible en la que el c\u00f3digo de migraci\u00f3n de pol\u00edticas nunca se ejecutar\u00e1 debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json index 1b0a5721755..36d39b9b1b2 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31327.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31327", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.820", - "lastModified": "2024-07-09T21:15:13.820", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple functions of MessageQueueBase.h, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples funciones de MessageQueueBase.h, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json index 789558e0b07..fdc833b15ba 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31331", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.883", - "lastModified": "2024-07-09T21:15:13.883", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In setMimeGroup of PackageManagerService.java, there is a possible way to hide the service from Settings due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En setMimeGroup de PackageManagerService.java, existe una forma posible de ocultar el servicio de la Configuraci\u00f3n debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios con privilegios de ejecuci\u00f3n del usuario necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json index 4bd829ac92c..1a62f3dd72e 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31332.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31332", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.947", - "lastModified": "2024-07-09T21:15:13.947", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible way to bypass a restriction on adding new Wi-Fi connections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, existe una manera posible de evitar una restricci\u00f3n para agregar nuevas conexiones Wi-Fi debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json index 14f456560ab..5d71170271a 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31334", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.010", - "lastModified": "2024-07-09T21:15:14.010", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemIntFreeDefBackingPage of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemIntFreeDefBackingPage de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json index 58faa89e3f5..80922f47c4e 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31335.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31335", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.070", - "lastModified": "2024-07-09T21:15:14.070", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemIntChangeSparse2 of devicemem_server.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemIntChangeSparse2 de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json index d7836ba9f9a..37faa4cc0f9 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31339.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31339", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.137", - "lastModified": "2024-07-09T21:15:14.137", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple functions of StatsService.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En m\u00faltiples funciones de StatsService.cpp, existe una posible corrupci\u00f3n de la memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32469.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32469.json index b89b09420d1..245800ccc8f 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32469.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32469.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32469", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T19:15:10.667", - "lastModified": "2024-07-10T19:15:10.667", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Decidim is a participatory democracy framework. The pagination feature used in searches and filters is subject to potential XSS attack through a malformed URL using the GET parameter `per_page`. This vulnerability is fixed in 0.27.6 and 0.28.1.\n" + }, + { + "lang": "es", + "value": "Decidim es un framework de democracia participativa. La funci\u00f3n de paginaci\u00f3n utilizada en b\u00fasquedas y filtros est\u00e1 sujeta a posibles ataques XSS a trav\u00e9s de una URL con formato incorrecto utilizando el par\u00e1metro GET `per_page`. Esta vulnerabilidad se solucion\u00f3 en 0.27.6 y 0.28.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32670.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32670.json index df15868f345..03a7853499c 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32670.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32670.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32670", "sourceIdentifier": "PSIRT@samsung.com", "published": "2024-07-10T01:15:09.893", - "lastModified": "2024-07-10T01:15:09.893", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor in Samsung Galaxy SmartTag2 prior to 0.20.04 allows attackes to potentially identify the tag's location by scanning the BLE adversting." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Samsung Galaxy SmartTag2 anterior a 0.20.04 permite a los ataques identificar potencialmente la ubicaci\u00f3n de la etiqueta al escanear la publicidad BLE." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json index e8e05263523..c5c92fec242 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32759.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32759", "sourceIdentifier": "productsecurity@jci.com", "published": "2024-07-10T18:15:03.220", - "lastModified": "2024-07-10T18:15:03.220", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Under certain circumstances the Software House C\u25cfCURE 9000 installer will utilize weak credentials." + "value": "Under certain circumstances the Software House C?CURE 9000 installer will utilize weak credentials." + }, + { + "lang": "es", + "value": "En determinadas circunstancias, el instalador de Software House C?CURE 9000 utilizar\u00e1 credenciales d\u00e9biles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32895.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32895.json index 520f8b30d7a..0406d51ebbc 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32895.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32895.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32895", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:53.997", - "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-11T13:58:33.960", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,11 +15,66 @@ "value": "En BCMFASTPATH de dhd_msgbuf.c, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3325.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3325.json index c06c230a94a..024a536434b 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3325.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3325.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3325", "sourceIdentifier": "security@tibco.com", "published": "2024-07-10T17:15:11.783", - "lastModified": "2024-07-10T17:15:11.783", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Jaspersoft JasperReport Servers.This issue affects JasperReport Servers: from 8.0.4 through 9.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Jaspersoft JasperReport Servers. Este problema afecta a JasperReport Servers: desde 8.0.4 hasta 9.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json index 0deb0ccd7e2..c52d025787a 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34123", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T19:15:11.493", - "lastModified": "2024-07-09T19:15:11.493", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Premiere Pro versions 23.6.5, 24.4.1 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur when the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction, attack complexity is high." + }, + { + "lang": "es", + "value": "Las versiones 23.6.5, 24.4.1 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de ruta de b\u00fasqueda no confiable que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante podr\u00eda aprovechar esta vulnerabilidad insertando un archivo malicioso en la ruta de b\u00fasqueda, que la aplicaci\u00f3n podr\u00eda ejecutar en lugar del archivo leg\u00edtimo. Esto podr\u00eda ocurrir cuando la aplicaci\u00f3n utiliza una ruta de b\u00fasqueda para localizar ejecutables o bibliotecas. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario y la complejidad del ataque es alta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34139.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34139.json index 89360a2a207..a6038efdc6b 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34139.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34139.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34139", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T20:15:11.147", - "lastModified": "2024-07-09T20:15:11.147", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bridge versions 14.0.4, 13.0.7, 14.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones de Bridge 14.0.4, 13.0.7, 14.1 y anteriores se ven afectadas por una vulnerabilidad de desbordamiento de enteros o Wraparound que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34140.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34140.json index acdcfebf12b..c8e4023a5e8 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34140.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34140.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34140", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T20:15:11.360", - "lastModified": "2024-07-09T20:15:11.360", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bridge versions 14.0.4, 13.0.7, 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones de Bridge 14.0.4, 13.0.7, 14.1 y anteriores se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para evitar mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34720.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34720.json index 7b108f0410b..6ef44c25769 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34720.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34720.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34720", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.213", - "lastModified": "2024-07-09T21:15:14.213", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly of com_android_internal_os_ZygoteCommandBuffer.cpp, there is a possible method to perform arbitrary code execution in any app zygote processes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly de com_android_internal_os_ZygoteCommandBuffer.cpp, existe un m\u00e9todo posible para realizar la ejecuci\u00f3n de c\u00f3digo arbitrario en cualquier proceso de cigoto de aplicaci\u00f3n debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34721.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34721.json index 87360409dfa..c953be5019e 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34721.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34721.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34721", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.277", - "lastModified": "2024-07-09T21:15:14.277", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ensureFileColumns of MediaProvider.java, there is a possible disclosure of files owned by another user due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En sureFileColumns de MediaProvider.java, existe una posible divulgaci\u00f3n de archivos propiedad de otro usuario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34722.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34722.json index a11f6337ddd..dc93678eeca 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34722.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34722.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34722", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.343", - "lastModified": "2024-07-09T21:15:14.343", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En smp_proc_rand de smp_act.cc, existe una posible omisi\u00f3n de autenticaci\u00f3n durante el emparejamiento BLE heredado debido a una implementaci\u00f3n incorrecta de un protocolo. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json index 8e2ce002847..5016ba652ba 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34723.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34723", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.407", - "lastModified": "2024-07-09T21:15:14.407", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In onTransact of ParcelableListBinder.java , there is a possible way to steal mAllowlistToken to launch an app from background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En onTransact de ParcelableListBinder.java, existe una forma posible de robar mAllowlistToken para iniciar una aplicaci\u00f3n en segundo plano debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json index 7aefa1b79ea..177ea253caf 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34724", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.487", - "lastModified": "2024-07-09T21:15:14.487", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In _UnrefAndMaybeDestroy of pmr.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En _UnrefAndMaybeDestroy de pmr.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json index 630adc68ebb..9eaacada5e2 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34725.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34725", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.593", - "lastModified": "2024-07-09T21:15:14.593", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemIntUnexportCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemIntUnexportCtx de devicemem_server.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json index 2188782dac7..d8f013ec47c 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34726.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34726", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.680", - "lastModified": "2024-07-09T21:15:14.680", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PVRSRV_MMap of pvr_bridge_k.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En PVRSRV_MMap de pvr_bridge_k.c, existe una posible ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35154.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35154.json index 91aec19c67e..3349c30d8fa 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35154.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35154.json @@ -2,13 +2,17 @@ "id": "CVE-2024-35154", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-09T22:15:02.227", - "lastModified": "2024-07-09T22:15:02.227", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM WebSphere Application Server 8.5 and 9.0 could allow a remote authenticated attacker, who has authorized access to the administrative console, to execute arbitrary code. Using specially crafted input, the attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 292641." + }, + { + "lang": "es", + "value": "IBM WebSphere Application Server 8.5 y 9.0 podr\u00eda permitir que un atacante remoto autenticado, que haya autorizado acceso a la consola administrativa, ejecute c\u00f3digo arbitrario. Utilizando entradas especialmente manipuladas, el atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el sistema. ID de IBM X-Force: 292641." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36450.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36450.json index 88244d51fe6..701fa7ef600 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36450.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36450.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36450", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:02.893", - "lastModified": "2024-07-10T07:15:02.893", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting en sysinfo.cgi de versiones de Webmin anteriores a la 1.910. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto. Como resultado, se puede obtener una ID de sesi\u00f3n, se puede modificar una p\u00e1gina web o se puede detener un servidor." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json index 0a4002eba33..830d339ab2c 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36451.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36451", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.040", - "lastModified": "2024-07-10T07:15:03.040", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of insufficient permissions or privileges vulnerability exists in ajaxterm module of Webmin prior to 2.003. If this vulnerability is exploited, a console session may be hijacked by an unauthorized user. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de manejo incorrecto de permisos o privilegios insuficientes en el m\u00f3dulo ajaxterm de Webmin anterior a 2.003. Si se aprovecha esta vulnerabilidad, un usuario no autorizado puede secuestrar una sesi\u00f3n de consola. Como resultado, se pueden hacer referencias a datos dentro de un sistema, se puede alterar una p\u00e1gina web o se puede detener permanentemente un servidor." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36452.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36452.json index 1eb7037579a..59b984e3a5b 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36452.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36452.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36452", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.103", - "lastModified": "2024-07-10T07:15:03.103", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in ajaxterm module of Webmin versions prior to 2.003. If this vulnerability is exploited, unintended operations may be performed when a user views a malicious page while logged in. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-site request forgery en el m\u00f3dulo ajaxterm de las versiones de Webmin anteriores a la 2.003. Si se explota esta vulnerabilidad, se pueden realizar operaciones no deseadas cuando un usuario ve una p\u00e1gina maliciosa mientras est\u00e1 conectado. Como resultado, se pueden hacer referencia a datos dentro de un sistema, se puede alterar una p\u00e1gina web o se puede detener permanentemente un servidor." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json index 883ab6adb9e..16f124fb95e 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36453.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36453", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.177", - "lastModified": "2024-07-10T07:15:03.177", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting en session_login.cgi de las versiones de Webmin anteriores a la 1.970 y de las versiones de Usermin anteriores a la 1.820. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto. Como resultado, una p\u00e1gina web puede verse alterada o se puede divulgar informaci\u00f3n confidencial, como una credencial." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json index 9b8e7fb2498..6ff3e28c561 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36676.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36676", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T22:15:02.467", - "lastModified": "2024-07-09T22:15:02.467", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in BookStack before v24.05.1 allows attackers to confirm existing system users and perform targeted notification email DoS via public facing forms." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en BookStack anterior a v24.05.1 permite a los atacantes confirmar los usuarios existentes del sistema y realizar notificaciones de DoS por correo electr\u00f3nico dirigidas a trav\u00e9s de formularios p\u00fablicos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37110.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37110.json index 3728a8144f6..dfb42c82a0b 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37110.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37110.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37110", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:03.373", - "lastModified": "2024-07-10T18:15:03.373", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en el software de membres\u00eda WishList Member X. Este problema afecta a WishList Member X: desde n/a antes del 3.26.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37113.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37113.json index 8646971633f..302e940bfa8 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37113.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37113.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37113", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:03.630", - "lastModified": "2024-07-10T18:15:03.630", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a before 3.26.7." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en el software de membres\u00eda WishList Member X. Este problema afecta a WishList Member X: desde n/a antes del 3.26.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37115.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37115.json index 20ae012a405..f70e7745a39 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37115.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37115.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37115", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:03.857", - "lastModified": "2024-07-10T18:15:03.857", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Automattic Newspack Blocks.This issue affects Newspack Blocks: from n/a through 3.0.8." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en Automattic Newspack Blocks. Este problema afecta a Newspack Blocks: desde n/a hasta 3.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37147.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37147.json index 8fca044c680..a9979229f69 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37147.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37147.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37147", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T19:15:10.930", - "lastModified": "2024-07-10T19:15:10.930", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16." + }, + { + "lang": "es", + "value": "GLPI es un paquete de software de gesti\u00f3n de TI y activos de c\u00f3digo abierto que proporciona funciones de ITIL Service Desk, seguimiento de licencias y auditor\u00eda de software. Un usuario autenticado puede adjuntar un documento a cualquier elemento, incluso si no tiene acceso de escritura sobre \u00e9l. Actualice a 10.0.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37148.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37148.json index bab9d0aa176..a8662632077 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37148.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37148.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37148", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:03.280", - "lastModified": "2024-07-10T20:15:03.280", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in some AJAX scripts to alter another user account data and take control of it. Upgrade to 10.0.16." + }, + { + "lang": "es", + "value": "GLPI es un paquete de software de gesti\u00f3n de TI y activos de c\u00f3digo abierto que proporciona funciones de ITIL Service Desk, seguimiento de licencias y auditor\u00eda de software. Un usuario autenticado puede aprovechar una vulnerabilidad de inyecci\u00f3n SQL en algunos scripts AJAX para alterar los datos de la cuenta de otro usuario y tomar el control de ellos. Actualice a 10.0.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json index 47c3b478d8f..fd5ef1bbc86 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37149.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37149", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:03.543", - "lastModified": "2024-07-10T20:15:03.543", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated technician user can upload a malicious PHP script and hijack the plugin loader to execute this malicious script. Upgrade to 10.0.16." + }, + { + "lang": "es", + "value": "GLPI es un paquete de software de gesti\u00f3n de TI y activos de c\u00f3digo abierto que proporciona funciones de ITIL Service Desk, seguimiento de licencias y auditor\u00eda de software. Un usuario t\u00e9cnico autenticado puede cargar un script PHP malicioso y secuestrar el cargador de complementos para ejecutar este script malicioso. Actualice a 10.0.16." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37205.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37205.json index 80d7ba489cd..d994602b4de 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37205.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37205.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37205", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:04.080", - "lastModified": "2024-07-10T18:15:04.080", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in SERVIT Software Solutions.This issue affects affiliate-toolkit: from n/a through 3.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en SERVIT Software Solutions. Este problema afecta al kit de herramientas de afiliados: desde n/a hasta 3.4.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37270.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37270.json index 811fb9bef11..56093a27a28 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37270.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37270.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37270", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:04.300", - "lastModified": "2024-07-10T18:15:04.300", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information into Log File vulnerability in TrustedLogin TrustedLogin Vendor.This issue affects TrustedLogin Vendor: from n/a before 1.1.1." + }, + { + "lang": "es", + "value": "Inserci\u00f3n de informaci\u00f3n confidencial en la vulnerabilidad del archivo de registro en TrustedLogin TrustedLogin Vendor. Este problema afecta a TrustedLogin Vendor: desde n/a antes de 1.1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37310.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37310.json index 18d653c3129..b6b8015f7f5 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37310.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37310.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37310", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:03.790", - "lastModified": "2024-07-10T20:15:03.790", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EVerest is an EV charging software stack. An integer overflow in the \"v2g_incoming_v2gtp\" function in the v2g_server.cpp implementation can allow a remote attacker to overflow the process' heap. This vulnerability is fixed in 2024.3.1 and 2024.6.0." + }, + { + "lang": "es", + "value": "EVerest es una pila de software de carga de veh\u00edculos el\u00e9ctricos. Un desbordamiento de enteros en la funci\u00f3n \"v2g_incoming_v2gtp\" en la implementaci\u00f3n v2g_server.cpp puede permitir que un atacante remoto desborde el mont\u00f3n del proceso. Esta vulnerabilidad se solucion\u00f3 en 2024.3.1 y 2024.6.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37498.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37498.json index 880426f46c2..bfd3e1d0535 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37498.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37498.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37498", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:04.523", - "lastModified": "2024-07-10T18:15:04.523", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pauple Table & Contact Form 7 Database \u2013 Tablesome.This issue affects Table & Contact Form 7 Database \u2013 Tablesome: from n/a through 1.0.33." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en la base de datos Pauple Table & Contact Form 7 \u2013 Tablesome. Este problema afecta la base de datos Table & Contact Form 7 \u2013 Tablesome: desde n/a hasta 1.0.33." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37504.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37504.json index a4d99062933..24123977ea2 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37504.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37504.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37504", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-10T18:15:04.750", - "lastModified": "2024-07-10T18:15:04.750", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ninja Team FileBird Document Library.This issue affects FileBird Document Library: from n/a through 2.0.6." + }, + { + "lang": "es", + "value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en la librer\u00eda de documentos FileBird de Ninja Team. Este problema afecta a la librer\u00eda de documentos FileBird: desde n/a hasta 2.0.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json index b9fd70c451f..b31cd6aff6c 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37539", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T13:15:10.190", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T13:10:43.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-todo/wordpress-wp-to-do-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json index b84fdacba96..0d2b3ed7589 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37541", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T13:15:10.437", - "lastModified": "2024-07-08T15:49:22.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-11T13:13:15.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:staxwp:stax:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.4.1", + "matchCriteriaId": "9DADE640-0BD7-4653-9F6D-F8EA94623C1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stax-addons-for-elementor/wordpress-elementor-addons-widgets-and-enhancements-stax-plugin-1-4-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json index 008955f1f43..a92e8d0925b 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37770.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37770", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T18:15:04.983", - "lastModified": "2024-07-10T18:15:04.983", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "14Finger v1.1 was discovered to contain a remote command execution (RCE) vulnerability in the fingerprint function. This vulnerability allows attackers to execute arbitrary commands via a crafted payload." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que 14Finger v1.1 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) en la funci\u00f3n de huellas dactilares. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios mediante un payload manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json index 8935dc04fb8..fe85c75d67f 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37829.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37829", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:14.770", - "lastModified": "2024-07-09T21:15:14.770", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Outline <= v0.76.1 allows attackers to execute a session hijacking attack via user interaction with a crafted magic sign-in link." + }, + { + "lang": "es", + "value": "Un problema en Outline <= v0.76.1 permite a los atacantes ejecutar un ataque de secuestro de sesi\u00f3n mediante la interacci\u00f3n del usuario con un magic sign-in link manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json index 5433c35c5b9..1b880098fca 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37830.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37830", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.683", - "lastModified": "2024-07-09T20:15:11.683", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Outline <= v0.76.1 allows attackers to redirect a victim user to a malicious site via intercepting and changing the state cookie." + }, + { + "lang": "es", + "value": "Un problema en Outline <= v0.76.1 permite a los atacantes redirigir a un usuario v\u00edctima a un sitio malicioso interceptando y cambiando la cookie de estado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37865.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37865.json index 3c510be312f..1b34951d392 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37865.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37865.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37865", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:14.860", - "lastModified": "2024-07-09T21:15:14.860", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in S3Browser v.11.4.5 and v.10.9.9 and fixed in v.11.5.7 allows a remote attacker to obtain sensitive information via the S3 compatible storage component." + }, + { + "lang": "es", + "value": "Un problema en S3Browser v.11.4.5 y v.10.9.9 y solucionado en v.11.5.7 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente de almacenamiento compatible con S3." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json index 7e84f72af4c..6580be79b87 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37870.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37870", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:11.910", - "lastModified": "2024-07-09T19:15:11.910", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in processscore.php in Learning Management System Project In PHP With Source Code 1.0 allows attackers to execute arbitrary SQL commands via the id parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Processscore.php en el proyecto Learning Management System en PHP con c\u00f3digo fuente 1.0 permite a atacantes ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json index 6befddeb298..5df147aab37 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37871.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37871", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.767", - "lastModified": "2024-07-09T20:15:11.767", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in login.php in Itsourcecode Online Discussion Forum Project in PHP with Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the email parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en login.php en Itsourcecode Online Discussion Forum Project en PHP con C\u00f3digo Fuente 1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro email." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37872.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37872.json index 373bdbec60e..3b2d83a9546 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37872.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37872.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37872", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.850", - "lastModified": "2024-07-09T20:15:11.850", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in process.php in Itsourcecode Billing System in PHP 1.0 allows remote attackers to execute arbitrary SQL commands via the username parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Process.php en Itsourcecode Billing System en PHP 1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro username." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json index 234c538365a..a91035cc70c 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37873.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37873", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:11.923", - "lastModified": "2024-07-09T20:15:11.923", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in view_payslip.php in Itsourcecode Payroll Management System Project In PHP With Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en view_payslip.php en el proyecto Itsourcecode Payroll Management System en PHP con c\u00f3digo fuente 1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro id." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3798.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3798.json index 511b01d500f..3a36ac90f1b 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3798.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3798", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-10T12:15:09.873", - "lastModified": "2024-07-10T12:15:09.873", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3799.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3799.json index c5fe3995afb..91a07a3414a 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3799.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3799.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3799", "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-10T12:15:10.180", - "lastModified": "2024-07-10T12:15:10.180", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38301.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38301.json index bcf4e021932..a0918dfa63a 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38301.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38301.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38301", "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-10T03:15:02.447", - "lastModified": "2024-07-10T03:15:02.447", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Alienware Command Center, version 5.7.3.0 and prior, contains an improper access control vulnerability. A low privileged attacker could potentially exploit this vulnerability, leading to denial of service on the local system and information disclosure." + }, + { + "lang": "es", + "value": "Dell Alienware Command Center, versi\u00f3n 5.7.3.0 y anteriores, contiene una vulnerabilidad de control de acceso inadecuado. Un atacante con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una denegaci\u00f3n de servicio en el sistema local y la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38353.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38353.json index c856de9b2c7..07c53ac09cb 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38353.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38353.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38353", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:04.053", - "lastModified": "2024-07-10T20:15:04.053", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.\n" + }, + { + "lang": "es", + "value": "CodiMD permite notas de markdown colaborativas en tiempo real en todas las plataformas. A CodiMD anterior a 2.5.4 le falta una vulnerabilidad de autenticaci\u00f3n y control de acceso que permite a un atacante no autenticado obtener acceso no autorizado a los datos de im\u00e1genes cargados en CodiMD. CodiMD no requiere una autenticaci\u00f3n v\u00e1lida para acceder a las im\u00e1genes cargadas o para cargar nuevos datos de im\u00e1genes. Un atacante que pueda determinar la URL de una imagen cargada puede obtener acceso no autorizado a los datos de la imagen cargada. Debido a la generaci\u00f3n insegura de nombres de archivos aleatorios en la librer\u00eda Formidable subyacente, un atacante puede determinar los nombres de archivos de im\u00e1genes cargadas previamente y aumenta la probabilidad de que este problema sea explotado. Esta vulnerabilidad se solucion\u00f3 en 2.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38354.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38354.json index 1fdaccbf80a..714d53f7705 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38354.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38354.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38354", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:04.293", - "lastModified": "2024-07-10T20:15:04.293", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CodiMD allows realtime collaborative markdown notes on all platforms. The notebook feature of Hackmd.io permits the rendering of iframe `HTML` tags with an improperly sanitized `name` attribute. This vulnerability enables attackers to perform cross-site scripting (XSS) attacks via DOM clobbering. This vulnerability is fixed in 2.5.4." + }, + { + "lang": "es", + "value": "CodiMD permite notas de markdown colaborativas en tiempo real en todas las plataformas. La funci\u00f3n de cuaderno de Hackmd.io permite la representaci\u00f3n de etiquetas \"HTML\" de iframe con un atributo \"name\" incorrectamente sanitizado. Esta vulnerabilidad permite a los atacantes realizar ataques de cross-site scripting (XSS) mediante destrucci\u00f3n de DOM. Esta vulnerabilidad se solucion\u00f3 en 2.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json index 019e159179e..ce0fd122a12 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38433", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-07-11T08:15:10.623", - "lastModified": "2024-07-11T08:15:10.623", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json index 19065ce8574..1cce05fc077 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38517.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38517", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T19:15:12.470", - "lastModified": "2024-07-09T19:15:12.470", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege." + }, + { + "lang": "es", + "value": "Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento insuficiente de enteros en la funci\u00f3n `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la v\u00edctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38875.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38875.json index 773d969d008..1fbc4805fd9 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38875.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38875.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38875", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T05:15:12.020", - "lastModified": "2024-07-10T05:15:12.020", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 4.2 anterior a 4.2.14 y 5.0 anterior a 5.0.7. urlize y urlizetrunc estuvieron sujetos a un posible ataque de denegaci\u00f3n de servicio a trav\u00e9s de ciertas entradas con una gran cantidad de corchetes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json index fc4f08ec79f..1a88171e887 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38959.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38959", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.040", - "lastModified": "2024-07-09T21:15:15.040", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Creativeitem Academy LMS Learning Management System v.6.8.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via the string parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting en Creativeitem Academy LMS Learning Management System v.6.8.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de cadena." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json index 69dfc4d8b48..fed5996682e 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38963.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38963", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T22:15:02.560", - "lastModified": "2024-07-09T22:15:02.560", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nopcommerce 4.70.1 is vulnerable to Cross Site Scripting (XSS) via the combined \"AddProductReview.Title\" and \"AddProductReview.ReviewText\" parameter(s) (Reviews) when creating a new review." + }, + { + "lang": "es", + "value": "Nopcommerce 4.70.1 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de los par\u00e1metros combinados \"AddProductReview.Title\" y \"AddProductReview.ReviewText\" (Reviews) al crear una nueva rese\u00f1a." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json index 5b2b4fdef10..910ea246e52 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39031", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.147", - "lastModified": "2024-07-09T21:15:15.147", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Silverpeas Core <= 6.3.5, inside of mes agendas a user can create a new event and add it to his calendar. The user can also add other users to the event from the same domain, including administrator. A normal user can create an event with XSS payload inside \u201cTitre\u201d and \u201cDescription\u201d parameters and add the administrator or any user to the event. When the other user (victim) visits his own profile (even without clicking on the event) the payload will be executed on the victim side." + }, + { + "lang": "es", + "value": "En Silverpeas Core <= 6.3.5, dentro de las agendas, un usuario puede crear un nuevo evento y agregarlo a su calendario. El usuario tambi\u00e9n puede agregar al evento otros usuarios del mismo dominio, incluido el administrador. Un usuario normal puede crear un evento con payload XSS dentro de los par\u00e1metros \"T\u00edtulo\" y \"Descripci\u00f3n\" y agregar el administrador o cualquier usuario al evento. Cuando el otro usuario (v\u00edctima) visita su propio perfil (incluso sin hacer clic en el evento), el payload se ejecutar\u00e1 en el lado de la v\u00edctima." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json index a0dde6166d6..0a0af0f9faf 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39063.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39063", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:12.080", - "lastModified": "2024-07-09T20:15:12.080", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lime Survey <= 6.5.12 is vulnerable to Cross Site Request Forgery (CSRF). The YII_CSRF_TOKEN is only checked when passed in the body of POST requests, but the same check isn't performed in the equivalent GET requests." + }, + { + "lang": "es", + "value": "Lime Survey <= 6.5.12 es vulnerable a Cross Site Request Forgery (CSRF). YII_CSRF_TOKEN solo se verifica cuando se pasa en el cuerpo de las solicitudes POST, pero no se realiza la misma verificaci\u00f3n en las solicitudes GET equivalentes." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json index 17e24deafad..c2ac0a424e6 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39069.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39069", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T22:15:02.653", - "lastModified": "2024-07-09T22:15:02.653", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in ifood Order Manager v3.35.5 'Gestor de Peddios.exe' allows attackers to execute arbitrary code via a DLL hijacking attack." + }, + { + "lang": "es", + "value": "Un problema en ifood Order Manager v3.35.5 'Gestor de Peddios.exe' permite a atacantes ejecutar c\u00f3digo arbitrario mediante un ataque de secuestro de DLL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json index 2c6a8018db3..59a49f1dfc7 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39071.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39071", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.237", - "lastModified": "2024-07-09T21:15:15.237", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fujian Kelixun <=7.6.6.4391 is vulnerable to SQL Injection in send_event.php." + }, + { + "lang": "es", + "value": "Fujian Kelixun <=7.6.6.4391 es vulnerable a la inyecci\u00f3n SQL en send_event.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json index 12e10713bab..ac1fe09f156 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39072.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39072", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.317", - "lastModified": "2024-07-09T21:15:15.317", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMTT Hotel Broadband Operation System (HiBOS) v3.0.3.151204 is vulnerable to SQL injection via manager/conference/calendar_remind.php." + }, + { + "lang": "es", + "value": "AMTT Hotel Broadband Operation System (HiBOS) v3.0.3.151204 es vulnerable a la inyecci\u00f3n de SQL a trav\u00e9s de manager/conference/calendar_remind.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39181.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39181.json index 8eb38edfea6..ff9129838ea 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39181.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39181.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39181", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.403", - "lastModified": "2024-07-09T21:15:15.403", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 was discovered to contain a buffer overflow via the ApCliSsid parameter in thegenerate_conf_router() function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n generar_conf_router(). Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json index f3246dd5343..355cf8436e5 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39329.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39329", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T05:15:12.097", - "lastModified": "2024-07-10T05:15:12.097", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.7 y 4.2 anterior a 4.2.14. El m\u00e9todo django.contrib.auth.backends.ModelBackend.authenticate() permite a atacantes remotos enumerar usuarios mediante un ataque de sincronizaci\u00f3n que involucra solicitudes de inicio de sesi\u00f3n para usuarios con una contrase\u00f1a inutilizable." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39330.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39330.json index 55800c54c85..136b7e303b0 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39330.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39330.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39330", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T05:15:12.167", - "lastModified": "2024-07-10T05:15:12.167", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.)" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.7 y 4.2 anterior a 4.2.14. Las clases derivadas de la clase base django.core.files.storage.Storage, cuando anulan generate_filename() sin replicar las validaciones de ruta de archivo de la clase principal, potencialmente permiten directory traversal a trav\u00e9s de ciertas entradas durante una llamada save(). (Las subclases de almacenamiento integrado no se ven afectadas)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39488.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39488.json index 3966c931402..d6478dcd858 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39488.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39488.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39488", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-10T08:15:11.003", - "lastModified": "2024-07-10T08:15:11.003", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY\n\nWhen CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes\nto bug_table entries, and as a result the last entry in a bug table will\nbe ignored, potentially leading to an unexpected panic(). All prior\nentries in the table will be handled correctly.\n\nThe arm64 ABI requires that struct fields of up to 8 bytes are\nnaturally-aligned, with padding added within a struct such that struct\nare suitably aligned within arrays.\n\nWhen CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:\n\n\tstruct bug_entry {\n\t\tsigned int bug_addr_disp;\t// 4 bytes\n\t\tsigned int file_disp;\t// 4 bytes\n\t\tunsigned short line;\t\t// 2 bytes\n\t\tunsigned short flags;\t\t// 2 bytes\n\t}\n\n... with 12 bytes total, requiring 4-byte alignment.\n\nWhen CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:\n\n\tstruct bug_entry {\n\t\tsigned int bug_addr_disp;\t// 4 bytes\n\t\tunsigned short flags;\t\t// 2 bytes\n\t\t< implicit padding >\t\t// 2 bytes\n\t}\n\n... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing\npadding, requiring 4-byte alginment.\n\nWhen we create a bug_entry in assembly, we align the start of the entry\nto 4 bytes, which implicitly handles padding for any prior entries.\nHowever, we do not align the end of the entry, and so when\nCONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding\nbytes.\n\nFor the main kernel image this is not a problem as find_bug() doesn't\ndepend on the trailing padding bytes when searching for entries:\n\n\tfor (bug = __start___bug_table; bug < __stop___bug_table; ++bug)\n\t\tif (bugaddr == bug_addr(bug))\n\t\t\treturn bug;\n\nHowever for modules, module_bug_finalize() depends on the trailing\nbytes when calculating the number of entries:\n\n\tmod->num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);\n\n... and as the last bug_entry lacks the necessary padding bytes, this entry\nwill not be counted, e.g. in the case of a single entry:\n\n\tsechdrs[i].sh_size == 6\n\tsizeof(struct bug_entry) == 8;\n\n\tsechdrs[i].sh_size / sizeof(struct bug_entry) == 0;\n\nConsequently module_find_bug() will miss the last bug_entry when it does:\n\n\tfor (i = 0; i < mod->num_bugs; ++i, ++bug)\n\t\tif (bugaddr == bug_addr(bug))\n\t\t\tgoto out;\n\n... which can lead to a kenrel panic due to an unhandled bug.\n\nThis can be demonstrated with the following module:\n\n\tstatic int __init buginit(void)\n\t{\n\t\tWARN(1, \"hello\\n\");\n\t\treturn 0;\n\t}\n\n\tstatic void __exit bugexit(void)\n\t{\n\t}\n\n\tmodule_init(buginit);\n\tmodule_exit(bugexit);\n\tMODULE_LICENSE(\"GPL\");\n\n... which will trigger a kernel panic when loaded:\n\n\t------------[ cut here ]------------\n\thello\n\tUnexpected kernel BRK exception at EL1\n\tInternal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP\n\tModules linked in: hello(O+)\n\tCPU: 0 PID: 50 Comm: insmod Tainted: G O 6.9.1 #8\n\tHardware name: linux,dummy-virt (DT)\n\tpstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n\tpc : buginit+0x18/0x1000 [hello]\n\tlr : buginit+0x18/0x1000 [hello]\n\tsp : ffff800080533ae0\n\tx29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000\n\tx26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58\n\tx23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0\n\tx20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006\n\tx17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720\n\tx14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312\n\tx11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8\n\tx8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000\n\tx5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000\n\tx2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0\n\tCall trace:\n\t buginit+0x18/0x1000 [hello]\n\t do_one_initcall+0x80/0x1c8\n\t do_init_module+0x60/0x218\n\t load_module+0x1ba4/0x1d70\n\t __do_sys_init_module+0x198/0x1d0\n\t __arm64_sys_init_module+0x1c/0x28\n\t invoke_syscall+0x48/0x114\n\t el0_svc\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: arm64: asm-bug: agregue .align 2 al final de __BUG_ENTRY Cuando CONFIG_DEBUG_BUGVERBOSE=n, no agregamos los bytes de relleno necesarios a las entradas de bug_table y, como resultado, la \u00faltima entrada en una tabla de errores se ignorar\u00e1, lo que podr\u00eda provocar un p\u00e1nico inesperado(). Todas las entradas anteriores en la tabla se manejar\u00e1n correctamente. La ABI arm64 requiere que los campos de estructura de hasta 8 bytes est\u00e9n alineados de forma natural, con relleno agregado dentro de una estructura de modo que la estructura est\u00e9 adecuadamente alineada dentro de las matrices. Cuando CONFIG_DEBUG_BUGVERPOSE=y, el dise\u00f1o de una entrada de error es: struct bug_entry { firmado int bug_addr_disp; // 4 bytes firmados int file_disp; // L\u00ednea corta sin firmar de 4 bytes; // 2 bytes de banderas cortas sin firmar; // 2 bytes } ... con 12 bytes en total, que requieren una alineaci\u00f3n de 4 bytes. Cuando CONFIG_DEBUG_BUGVERBOSE=n, el dise\u00f1o de una entrada de error es: struct bug_entry { firmado int bug_addr_disp; // 4 bytes de banderas cortas sin firmar; // 2 bytes < relleno impl\u00edcito > // 2 bytes } ... con 8 bytes en total, con 6 bytes de datos y 2 bytes de relleno final, que requieren un alineamiento de 4 bytes. Cuando creamos un bug_entry en el ensamblado, alineamos el inicio de la entrada a 4 bytes, lo que impl\u00edcitamente maneja el relleno de cualquier entrada anterior. Sin embargo, no alineamos el final de la entrada, por lo que cuando CONFIG_DEBUG_BUGVERBOSE=n, la entrada final carece de los bytes de relleno finales. Para la imagen principal del kernel, esto no es un problema ya que find_bug() no depende de los bytes de relleno finales cuando se buscan entradas: for (bug = __start___bug_table; bug < __stop___bug_table; ++bug) if (bugaddr == bug_addr(bug )) error de devoluci\u00f3n; Sin embargo, para los m\u00f3dulos, module_bug_finalize() depende de los bytes finales al calcular el n\u00famero de entradas: mod->num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry); ... y como la \u00faltima entrada_error carece de los bytes de relleno necesarios, esta entrada no se contar\u00e1, p.e. en el caso de una sola entrada: sechdrs[i].sh_size == 6 sizeof(struct bug_entry) == 8; sechdrs[i].sh_size / sizeof(struct bug_entry) == 0; En consecuencia, module_find_bug() perder\u00e1 la \u00faltima entrada de error cuando lo haga: for (i = 0; i < mod->num_bugs; ++i, ++bug) if (bugaddr == bug_addr(bug)) goto out; ... lo que puede provocar p\u00e1nico en el kenrel debido a un error no controlado. Esto se puede demostrar con el siguiente m\u00f3dulo: static int __init buginit(void) { WARN(1, \"hello\\n\"); devolver 0; } vac\u00edo est\u00e1tico __exit bugexit(void) { } module_init(buginit); module_exit(salida de error); MODULE_LICENSE(\"GPL\"); ... lo que provocar\u00e1 un p\u00e1nico en el kernel cuando se cargue: ------------[ cortar aqu\u00ed ]------------ hola Excepci\u00f3n inesperada de BRK en el kernel en EL1 Error interno: Controlador BRK: 00000000f2000800 [#1] PREEMPT M\u00f3dulos SMP vinculados en: hello(O+) CPU: 0 PID: 50 Comm: insmod Tainted: G O 6.9.1 #8 Nombre de hardware: linux,dummy-virt (DT) pstate: 60400005 ( nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39489.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39489.json index 696f683a9e7..eb903217332 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39489.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39489.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39489", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-10T08:15:11.110", - "lastModified": "2024-07-10T08:15:11.110", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix memleak in seg6_hmac_init_algo\n\nseg6_hmac_init_algo returns without cleaning up the previous allocations\nif one fails, so it's going to leak all that memory and the crypto tfms.\n\nUpdate seg6_hmac_exit to only free the memory when allocated, so we can\nreuse the code directly." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipv6: sr: corrige memleak en seg6_hmac_init_algo seg6_hmac_init_algo regresa sin limpiar las asignaciones anteriores si una falla, por lo que perder\u00e1 toda esa memoria y los tfms criptogr\u00e1ficos. Actualice seg6_hmac_exit para liberar solo la memoria cuando est\u00e9 asignada, de modo que podamos reutilizar el c\u00f3digo directamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39490.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39490.json index 8f3316b85e3..1305b9d7257 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39490.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39490.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39490", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-10T08:15:11.203", - "lastModified": "2024-07-10T08:15:11.203", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix missing sk_buff release in seg6_input_core\n\nThe seg6_input() function is responsible for adding the SRH into a\npacket, delegating the operation to the seg6_input_core(). This function\nuses the skb_cow_head() to ensure that there is sufficient headroom in\nthe sk_buff for accommodating the link-layer header.\nIn the event that the skb_cow_header() function fails, the\nseg6_input_core() catches the error but it does not release the sk_buff,\nwhich will result in a memory leak.\n\nThis issue was introduced in commit af3b5158b89d (\"ipv6: sr: fix BUG due\nto headroom too small after SRH push\") and persists even after commit\n7a3f5b0de364 (\"netfilter: add netfilter hooks to SRv6 data plane\"),\nwhere the entire seg6_input() code was refactored to deal with netfilter\nhooks.\n\nThe proposed patch addresses the identified memory leak by requiring the\nseg6_input_core() function to release the sk_buff in the event that\nskb_cow_head() fails." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ipv6: sr: corrige la versi\u00f3n faltante de sk_buff en seg6_input_core La funci\u00f3n seg6_input() es responsable de agregar el SRH a un paquete, delegando la operaci\u00f3n al seg6_input_core(). Esta funci\u00f3n utiliza skb_cow_head() para garantizar que haya suficiente espacio libre en sk_buff para acomodar el encabezado de la capa de enlace. En caso de que la funci\u00f3n skb_cow_header() falle, seg6_input_core() detecta el error pero no libera sk_buff, lo que provocar\u00e1 una p\u00e9rdida de memoria. Este problema se introdujo en la confirmaci\u00f3n af3b5158b89d (\"ipv6: sr: corrige el ERROR debido a un espacio libre demasiado peque\u00f1o despu\u00e9s de la inserci\u00f3n de SRH\") y persiste incluso despu\u00e9s de la confirmaci\u00f3n 7a3f5b0de364 (\"netfilter: agregue enlaces de netfilter al plano de datos SRv6\"), donde todo el seg6_input( ) el c\u00f3digo fue refactorizado para lidiar con los ganchos de netfilter. El parche propuesto aborda la p\u00e9rdida de memoria identificada al requerir que la funci\u00f3n seg6_input_core() libere sk_buff en caso de que skb_cow_head() falle." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39491.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39491.json index 66ff011b654..7f728fcb0f2 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39491.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39491.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39491", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-10T08:15:11.287", - "lastModified": "2024-07-10T08:15:11.287", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l56: Fix lifetime of cs_dsp instance\n\nThe cs_dsp instance is initialized in the driver probe() so it\nshould be freed in the driver remove(). Also fix a missing call\nto cs_dsp_remove() in the error path of cs35l56_hda_common_probe().\n\nThe call to cs_dsp_remove() was being done in the component unbind\ncallback cs35l56_hda_unbind(). This meant that if the driver was\nunbound and then re-bound it would be using an uninitialized cs_dsp\ninstance.\n\nIt is best to initialize the cs_dsp instance in probe() so that it\ncan return an error if it fails. The component binding API doesn't\nhave any error handling so there's no way to handle a failure if\ncs_dsp was initialized in the bind." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: hda: cs35l56: Correcci\u00f3n de duraci\u00f3n de la instancia cs_dsp La instancia cs_dsp se inicializa en el controlador probe() por lo que debe liberarse en el controlador remove(). Tambi\u00e9n corrija una llamada faltante a cs_dsp_remove() en la ruta de error de cs35l56_hda_common_probe(). La llamada a cs_dsp_remove() se realizaba en la devoluci\u00f3n de llamada de desvinculaci\u00f3n del componente cs35l56_hda_unbind(). Esto significaba que si el controlador no estaba vinculado y luego se volv\u00eda a vincular, estar\u00eda utilizando una instancia cs_dsp no inicializada. Es mejor inicializar la instancia cs_dsp en probe() para que pueda devolver un error si falla. La API de enlace de componentes no tiene ning\u00fan control de errores, por lo que no hay forma de controlar un error si cs_dsp se inicializ\u00f3 en el enlace." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39492.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39492.json index 106edd72ea5..ad535a2e470 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39492.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39492.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39492", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-10T08:15:11.360", - "lastModified": "2024-07-10T08:15:11.360", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: mtk-cmdq: Fix pm_runtime_get_sync() warning in mbox shutdown\n\nThe return value of pm_runtime_get_sync() in cmdq_mbox_shutdown()\nwill return 1 when pm runtime state is active, and we don't want to\nget the warning message in this case.\n\nSo we change the return value < 0 for WARN_ON()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: mtk-cmdq: corrige la advertencia pm_runtime_get_sync() en el apagado de mbox. El valor de retorno de pm_runtime_get_sync() en cmdq_mbox_shutdown() devolver\u00e1 1 cuando el estado de tiempo de ejecuci\u00f3n pm est\u00e9 activo, y no queremos recibir el mensaje de advertencia en este caso. Entonces cambiamos el valor de retorno <0 para WARN_ON()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39493.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39493.json index 501ee0735e0..868212521a8 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39493.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39493.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39493", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-10T08:15:11.427", - "lastModified": "2024-07-10T08:15:11.427", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call. Furthermore it's still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: qat: corrige la p\u00e9rdida de memoria ADF_DEV_RESET_SYNC. El uso de complete_done para determinar si la persona que llama se ha ido solo funciona despu\u00e9s de una llamada completa. Adem\u00e1s, a\u00fan es posible que la persona que llama a\u00fan no haya llamado a wait_for_completion, lo que genera otra posible UAF. Solucione este problema haciendo que la persona que llama use cancel_work_sync y luego liberando la memoria de forma segura." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json index bf577cabefe..57c1ad7f20e 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39511.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39511", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:10.127", - "lastModified": "2024-07-10T23:15:10.127", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Input Validation vulnerability in the 802.1X Authentication (dot1x) Daemon of Juniper Networks Junos OS allows a local, low-privileged attacker with access to the CLI to cause a Denial of Service (DoS).\n\nOn running a specific operational dot1x command, the dot1x daemon crashes. An attacker can cause a sustained DoS condition by running this command repeatedly.\n\nWhen the crash occurs, the authentication status of any 802.1x clients is cleared, and any authorized dot1x port becomes unauthorized. The client cannot re-authenticate until the dot1x daemon restarts.\n\nThis issue affects Junos OS:\n * All versions before 20.4R3-S10;\n * 21.2 versions before 21.2R3-S7;\n * 21.4 versions before 21.4R3-S6;\n * 22.1 versions before 22.1R3-S5;\n * 22.2 versions before 22.2R3-S3;\n * 22.3 versions before 22.3R3-S2;\n * 22.4 versions before 22.4R3-S1;\n * 23.2 versions before 23.2R2." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en el demonio de autenticaci\u00f3n 802.1X (dot1x) de Juniper Networks Junos OS permite que un atacante local con pocos privilegios y acceso a la CLI provoque una denegaci\u00f3n de servicio (DoS). Al ejecutar un comando operativo dot1x espec\u00edfico, el demonio dot1x falla. Un atacante puede provocar una condici\u00f3n DoS sostenida ejecutando este comando repetidamente. Cuando se produce el fallo, el estado de autenticaci\u00f3n de cualquier cliente 802.1x se borra y cualquier puerto dot1x autorizado queda no autorizado. El cliente no puede volver a autenticarse hasta que se reinicie el demonio dot1x. Este problema afecta a Junos OS: * Todas las versiones anteriores a 20.4R3-S10; * Versiones 21.2 anteriores a 21.2R3-S7; * Versiones 21.4 anteriores a 21.4R3-S6; * Versiones 22.1 anteriores a 22.1R3-S5; * Versiones 22.2 anteriores a 22.2R3-S3; * Versiones 22.3 anteriores a 22.3R3-S2; * Versiones 22.4 anteriores a 22.4R3-S1; * Versiones 23.2 anteriores a 23.2R2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json index 7a7d2cd62ba..2539cf97fbc 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39512.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39512", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:10.393", - "lastModified": "2024-07-10T23:15:10.393", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account.\n\nWhen the console cable is disconnected, the logged in user is not logged out.\u00a0This allows a malicious attacker with physical access to the console to resume a previous session and possibly gain administrative privileges.\n\nThis issue affects Junos OS Evolved: \n * from 23.2R2-EVO before 23.2R2-S1-EVO,\u00a0\n * from 23.4R1-EVO before 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de control de acceso f\u00edsico inadecuado en el control del puerto de consola de Juniper Networks Junos OS Evolved permite que un atacante con acceso f\u00edsico al dispositivo obtenga acceso a una cuenta de usuario. Cuando se desconecta el cable de la consola, el usuario que inici\u00f3 sesi\u00f3n no cierra la sesi\u00f3n. Esto permite que un atacante malintencionado con acceso f\u00edsico a la consola reanude una sesi\u00f3n anterior y posiblemente obtenga privilegios administrativos. Este problema afecta a Junos OS Evolved: * desde 23.2R2-EVO antes de 23.2R2-S1-EVO, * desde 23.4R1-EVO antes de 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json index 47907797975..db8d5b0bc0e 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39513.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39513", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:10.640", - "lastModified": "2024-07-10T23:15:10.640", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS).\n\nWhen a specific \"clear\" command is run, the\u00a0Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) crashes and restarts.\n\nThe crash\u00a0impacts all traffic going through the FPCs, causing a DoS. Running the command repeatedly leads to a sustained DoS condition.\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions before 20.4R3-S9-EVO,\u00a0\n * from 21.2-EVO before 21.2R3-S7-EVO,\u00a0\n * from 21.3-EVO before 21.3R3-S5-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S6-EVO,\u00a0\n * from 22.1-EVO before 22.1R3-S4-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S3-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S3-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-EVO,\n * from 23.2-EVO before 23.2R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en el Packet Forwarding Engine (PFE) de Juniper Networks Junos OS Evolved permite que un atacante local con pocos privilegios provoque una denegaci\u00f3n de servicio (DoS). Cuando se ejecuta un comando \"clear\" espec\u00edfico, el administrador del kit de herramientas de reenv\u00edo avanzado (evo-aftmand-bt o evo-aftmand-zx) falla y se reinicia. El bloqueo afecta a todo el tr\u00e1fico que pasa por los FPC y provoca un DoS. La ejecuci\u00f3n repetida del comando conduce a una condici\u00f3n DoS sostenida. Este problema afecta a Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S9-EVO, * desde 21.2-EVO anteriores a 21.2R3-S7-EVO, * desde 21.3-EVO anteriores a 21.3R3-S5-EVO, * desde 21.4-EVO anteriores 21.4R3-S6-EVO, * de 22.1-EVO antes de 22.1R3-S4-EVO, * de 22.2-EVO antes de 22.2R3-S3-EVO, * de 22.3-EVO antes de 22.3R3-S3-EVO, * de 22.4- EVO anterior a 22.4R3-EVO, * desde 23.2-EVO anterior a 23.2R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json index 0e7201e7664..2fbd5b943cc 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39514.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39514", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:10.877", - "lastModified": "2024-07-10T23:15:10.877", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nAn attacker can send specific traffic to the device, which causes the rpd to crash and restart. Continued receipt of this traffic will result in a sustained DoS condition.\n\nThis issue only affects devices with an EVPN-VPWS instance with IGMP-snooping enabled.\n\nThis issue affects Junos OS: \n * All versions before 20.4R3-S10,\u00a0\n * from 21.4 before 21.4R3-S6,\u00a0\n * from 22.1 before 22.1R3-S5,\u00a0\n * from 22.2 before 22.2R3-S3,\u00a0\n * from 22.3 before 22.3R3-S2,\u00a0\n * from 22.4 before 22.4R3,\u00a0\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved: \n * All versions before 20.4R3-S10-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S6-EVO,\u00a0\n * from 22.1-EVO before 22.1R3-S5-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S3-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S2-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de verificaci\u00f3n o manejo inadecuado de condiciones excepcionales en el demonio de protocolo de enrutamiento (rpd) de Juniper Networks Junos y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). Un atacante puede enviar tr\u00e1fico espec\u00edfico al dispositivo, lo que provoca que el rpd falle y se reinicie. La recepci\u00f3n continua de este tr\u00e1fico dar\u00e1 como resultado una condici\u00f3n DoS sostenida. Este problema solo afecta a los dispositivos con una instancia EVPN-VPWS con IGMP-snooping habilitado. Este problema afecta a Junos OS: * Todas las versiones anteriores a 20.4R3-S10, * desde 21.4 anterior a 21.4R3-S6, * desde 22.1 anterior a 22.1R3-S5, * desde 22.2 anterior a 22.2R3-S3, * desde 22.3 anterior a 22.3R3-S2 , * de 22.4 antes de 22.4R3, * de 23.2 antes de 23.2R2; Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S10-EVO, * desde 21.4-EVO antes de 21.4R3-S6-EVO, * desde 22.1-EVO antes de 22.1R3-S5-EVO, * desde 22.2-EVO antes de 22.2R3- S3-EVO, * desde 22.3-EVO antes de 22.3R3-S2-EVO, * desde 22.4-EVO antes de 22.4R3-EVO, * desde 23.2-EVO antes de 23.2R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json index dd02dcba3d7..804d76be089 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39517.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39517", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:11.127", - "lastModified": "2024-07-10T23:15:11.127", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the\u00a0Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).\n\nIn an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services.\n\nThis issue affects both IPv4 and IPv6 implementations.\nThis issue affects\nJunos OS:\nAll versions earlier than\u00a021.4R3-S7;\n22.1\u00a0versions earlier than 22.1R3-S5;\n22.2 versions earlier than\u00a022.2R3-S3;\n22.3 versions earlier than\u00a022.3R3-S3;\n22.4 versions earlier than\u00a022.4R3-S2;\n23.2 versions earlier than\u00a023.2R2;\n23.4 versions earlier than\u00a023.4R1-S1.\n\nJunos OS Evolved:\nAll versions earlier than\u00a021.4R3-S7-EVO;\n22.1-EVO versions earlier than\u00a022.1R3-S5-EVO;\n22.2-EVO versions earlier than\u00a022.2R3-S3-EVO;\n22.3-EVO versions earlier than 22.3R3-S3-EVO;\n22.4-EVO versions earlier than\u00a022.4R3-S2-EVO;\n23.2-EVO versions earlier than\u00a023.2R2-EVO;\n23.4-EVO versions earlier than\u00a023.4R1-S1-EVO, 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de comprobaci\u00f3n inadecuada de las condiciones inusuales o excepcionales en el daemon de aprendizaje de direcciones de capa 2 (l2ald) en Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). En un escenario EVPN/VXLAN, cuando el dispositivo procesa una gran cantidad de paquetes espec\u00edficos de Capa 2, puede provocar que el daemon de protocolo de enrutamiento (rpd) utilice todos los recursos de la CPU, lo que provoca que el dispositivo se cuelgue. Es necesario reiniciar manualmente el rpd para restaurar los servicios. Este problema afecta tanto a las implementaciones de IPv4 como a las de IPv6. Este problema afecta a Junos OS: todas las versiones anteriores a 21.4R3-S7; Versiones 22.1 anteriores a 22.1R3-S5; Versiones 22.2 anteriores a 22.2R3-S3; Versiones 22.3 anteriores a 22.3R3-S3; Versiones 22.4 anteriores a 22.4R3-S2; Versiones 23.2 anteriores a 23.2R2; Versiones 23.4 anteriores a 23.4R1-S1. Junos OS Evolved: todas las versiones anteriores a 21.4R3-S7-EVO; Versiones 22.1-EVO anteriores a 22.1R3-S5-EVO; Versiones 22.2-EVO anteriores a 22.2R3-S3-EVO; Versiones 22.3-EVO anteriores a 22.3R3-S3-EVO; Versiones 22.4-EVO anteriores a 22.4R3-S2-EVO; Versiones 23.2-EVO anteriores a 23.2R2-EVO; Versiones 23.4-EVO anteriores a 23.4R1-S1-EVO, 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json index d8b31b48282..a9f14238393 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39518", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:11.363", - "lastModified": "2024-07-10T23:15:11.363", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Heap-based Buffer Overflow vulnerability in the telemetry sensor process (sensord) of Juniper Networks Junos OS on MX240, MX480, MX960 platforms using MPC10E causes a steady increase in memory utilization, ultimately leading to a Denial of Service (DoS).\n\nWhen the device is subscribed to a specific subscription on Junos Telemetry Interface, a slow memory leak occurs and eventually all resources are consumed and the device becomes unresponsive. A manual reboot of the Line Card will be required to restore the device to its normal functioning.\u00a0\n\nThis issue is only seen when telemetry subscription is active.\n\nThe Heap memory utilization can be monitored using the following command:\n\u00a0 > show system processes extensive\n\nThe following command can be used to monitor the memory utilization of the specific sensor\n\u00a0 > show system info | match sensord\n PID NAME MEMORY PEAK MEMORY %CPU THREAD-COUNT CORE-AFFINITY UPTIME\n\n 1986 sensord 877.57MB 877.57MB 2 4 0,2-15 7-21:41:32\n\n\nThis issue affects Junos OS:\u00a0\n\n\n\n * from 21.2R3-S5 before 21.2R3-S7,\u00a0\n * from 21.4R3-S4 before 21.4R3-S6,\u00a0\n * from 22.2R3 before 22.2R3-S4,\u00a0\n * from 22.3R2 before 22.3R3-S2,\u00a0\n * from 22.4R1 before 22.4R3,\u00a0\n * from 23.2R1 before 23.2R2." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en el proceso del sensor de telemetr\u00eda (sensord) de Juniper Networks Junos OS en plataformas MX240, MX480, MX960 que utilizan MPC10E provoca un aumento constante en la utilizaci\u00f3n de la memoria, lo que en \u00faltima instancia conduce a una denegaci\u00f3n de servicio (DoS). Cuando el dispositivo est\u00e1 suscrito a una suscripci\u00f3n espec\u00edfica en Junos Telemetry Interface, se produce una p\u00e9rdida lenta de memoria y, finalmente, se consumen todos los recursos y el dispositivo deja de responder. Ser\u00e1 necesario reiniciar manualmente la tarjeta de l\u00ednea para restaurar el dispositivo a su funcionamiento normal. Este problema solo se ve cuando la suscripci\u00f3n de telemetr\u00eda est\u00e1 activa. La utilizaci\u00f3n de la memoria del mont\u00f3n se puede monitorear usando el siguiente comando: > show system processes extensive El siguiente comando se puede usar para monitorear la utilizaci\u00f3n de la memoria del sensor espec\u00edfico > show system info | match sensord NOMBRE PID MEMORIA PICO DE MEMORIA %CPU N\u00daMERO DE HILOS CORE-AFFINITY UPTIME 1986 sensord 877.57MB 877.57MB 2 4 0,2-15 7-21:41:32 Este problema afecta a Junos OS: * de 21.2R3-S5 antes de 21.2 R3-S7, * de 21.4R3-S4 antes de 21.4R3-S6, * de 22.2R3 antes de 22.2R3-S4, * de 22.3R2 antes de 22.3R3-S2, * de 22.4R1 antes de 22.4R3, * de 23.2R1 antes de 23.2 R2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json index 37d238b5f6e..d2ad232255d 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39554.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39554", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:11.607", - "lastModified": "2024-07-11T00:15:01.990", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the \n\nRouting Protocol Daemon (rpd)\n\n of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash and restart, resulting in a Denial of Service (DoS). Since this is a timing issue (race condition), the successful exploitation of this vulnerability is outside the attacker's control.\u00a0 However, continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition.\n\nOn all Junos OS and Junos OS Evolved platforms with BGP multipath enabled, a specific multipath calculation removes the original next hop from the multipath lead routes nexthop-set. When this change happens, multipath relies on certain internal timing to record the update.\u00a0 Under certain circumstance and with specific timing, this could result in an rpd crash.\n\nThis issue only affects systems with BGP multipath enabled.\n\n\nThis issue affects:\n\nJunos OS: \n\n\n * All versions of 21.1\n * from 21.2 before 21.2R3-S7, \n * from 21.4 before 21.4R3-S6, \n * from 22.1 before 22.1R3-S5, \n * from 22.2 before 22.2R3-S3, \n * from 22.3 before 22.3R3-S2, \n * from 22.4 before 22.4R3, \n * from 23.2 before 23.2R2.\n\n\n\n\nJunos OS Evolved: \n\n\n * All versions of 21.1-EVO,\n * All versions of 21.2-EVO,\n * from 21.4-EVO before 21.4R3-S6-EVO, \n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO.\n\n\n\nVersions of Junos OS before 21.1R1 are unaffected by this vulnerability.\nVersions of Junos OS Evolved before 21.1R1-EVO are unaffected by this vulnerability." + }, + { + "lang": "es", + "value": "Una ejecuci\u00f3n concurrente que utiliza un recurso compartido con una vulnerabilidad de sincronizaci\u00f3n inadecuada ('condici\u00f3n de ejecuci\u00f3n'), el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Juniper Networks Junos OS Evolved, permite a un atacante basado en red no autenticado inyectar actualizaciones de enrutamiento incrementales cuando BGP multipath est\u00e1 habilitado, lo que provoca que rpd se bloquee y se reinicie, lo que resulta en una denegaci\u00f3n de servicio (DoS). Dado que se trata de una cuesti\u00f3n de tiempo (condici\u00f3n de ejecuci\u00f3n), la explotaci\u00f3n exitosa de esta vulnerabilidad est\u00e1 fuera del control del atacante. Sin embargo, la recepci\u00f3n y el procesamiento continuo de este paquete pueden crear una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). En todas las plataformas Junos OS y Junos OS Evolved con rutas m\u00faltiples BGP habilitadas, un c\u00e1lculo de rutas m\u00faltiples espec\u00edfico elimina el siguiente salto original de las rutas principales de rutas m\u00faltiples nexthop-set. Cuando ocurre este cambio, la ruta m\u00faltiple depende de cierta sincronizaci\u00f3n interna para registrar la actualizaci\u00f3n. Bajo ciertas circunstancias y con un momento espec\u00edfico, esto podr\u00eda resultar en una falla del RPD. Este problema solo afecta a los sistemas con rutas m\u00faltiples BGP habilitadas. Este problema afecta a: Junos OS: * Todas las versiones de 21.1 * desde 21.2 anterior a 21.2R3-S7, * desde 21.4 anterior a 21.4R3-S6, * desde 22.1 anterior a 22.1R3-S5, * desde 22.2 anterior a 22.2R3-S3, * desde 22.3 antes de 22.3R3-S2, * de 22.4 antes de 22.4R3, * de 23.2 antes de 23.2R2. Junos OS Evolved: * Todas las versiones de 21.1-EVO, * Todas las versiones de 21.2-EVO, * desde 21.4-EVO antes de 21.4R3-S6-EVO, * desde 22.1-EVO antes de 22.1R3-S5-EVO, * desde 22.2- EVO antes de 22.2R3-S3-EVO, * desde 22.3-EVO antes de 22.3R3-S2-EVO, * desde 22.4-EVO antes de 22.4R3-EVO, * desde 23.2-EVO antes de 23.2R2-EVO. Las versiones de Junos OS anteriores a 21.1R1 no se ven afectadas por esta vulnerabilidad. Las versiones de Junos OS evolucionadas anteriores a 21.1R1-EVO no se ven afectadas por esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json index 945f5f2f4f0..4e680401e98 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39555.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39555", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:11.863", - "lastModified": "2024-07-10T23:15:11.863", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued receipt and processing of these malformed BGP update messages will create a sustained Denial of Service (DoS) condition.\n\nUpon receipt of a BGP update message over an established BGP session containing a specifically malformed tunnel encapsulation attribute, when segment routing is enabled, internal processing of the malformed attributes within the update results in improper parsing of remaining attributes, leading to session reset:\n\nBGP SEND Notification code 3 (Update Message Error) subcode 1 (invalid attribute list)\n\nOnly systems with segment routing enabled are vulnerable to this issue.\n\nThis issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations, and requires a remote attacker to have at least one established BGP session.\n\nThis issue affects:\n\nJunos OS: \n\n\n * All versions before 21.4R3-S8, \n * from 22.2 before 22.2R3-S4, \n * from 22.3 before 22.3R3-S3, \n * from 22.4 before 22.4R3-S3, \n * from 23.2 before 23.2R2-S1, \n * from 23.4 before 23.4R1-S2, 23.4R2.\n\n\nJunos OS Evolved:\u00a0\n\n * All versions before 21.4R3-S8-EVO, \n * from 22.2-EVO before 22.2R3-S4-EVO, \n * from 22.3-EVO before 22.3R3-S3-EVO, \n * from 22.4-EVO before 22.4R3-S3-EVO, \n * from 23.2-EVO before 23.2R2-S1-EVO, \n * from 23.4-EVO before 23.4R1-S2-EVO, 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el daemon de protocolo de enrutamiento (RPD) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante env\u00ede un mensaje espec\u00edfico de actualizaci\u00f3n de BGP con formato incorrecto para provocar que la sesi\u00f3n se reinicie, lo que resulta en una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de estos mensajes de actualizaci\u00f3n de BGP con formato incorrecto crear\u00e1n una condici\u00f3n sostenida de denegaci\u00f3n de servicio (DoS). Al recibir un mensaje de actualizaci\u00f3n de BGP a trav\u00e9s de una sesi\u00f3n BGP establecida que contiene un atributo de encapsulaci\u00f3n de t\u00fanel espec\u00edficamente mal formado, cuando el enrutamiento de segmento est\u00e1 habilitado, el procesamiento interno de los atributos mal formados dentro de la actualizaci\u00f3n da como resultado un an\u00e1lisis inadecuado de los atributos restantes, lo que lleva al restablecimiento de la sesi\u00f3n: BGP SEND C\u00f3digo de notificaci\u00f3n 3 (Error de mensaje de actualizaci\u00f3n) subc\u00f3digo 1 (lista de atributos no v\u00e1lidos) Solo los sistemas con enrutamiento de segmentos habilitado son vulnerables a este problema. Este problema afecta a eBGP e iBGP, tanto en implementaciones IPv4 como IPv6, y requiere que un atacante remoto tenga al menos una sesi\u00f3n BGP establecida. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-8, * desde 22.2 anterior a 22.2R3-S4, * desde 22.3 anterior a 22.3R3-S3, * desde 22.4 anterior a 22.4R3-S3, * desde 23.2 anterior a 23.2R2- S1, * de 23.4 antes de 23.4R1-S2, 23.4R2. Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * desde 22.2-EVO antes de 22.2R3-S4-EVO, * desde 22.3-EVO antes de 22.3R3-S3-EVO, * desde 22.4-EVO antes de 22.4R3- S3-EVO, *de 23.2-EVO antes de 23.2R2-S1-EVO, *de 23.4-EVO antes de 23.4R1-S2-EVO, 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39556.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39556.json index eff5fece8fe..0ae13ffa41a 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39556.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39556", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:12.133", - "lastModified": "2024-07-10T23:15:12.133", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution.\n\nBy exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limited to the local user's command interpreter, or potentially trigger a stack-based buffer overflow.\n\n\nThis issue affects:\n\n\u00a0Junos OS: \n\n\n * All versions before 21.4R3-S7, \n * from 22.1 before 22.1R3-S6, \n * from 22.2 before 22.2R3-S4, \n * from 22.3 before 22.3R3-S3, \n * from 22.4 before 22.4R3-S2, \n * from 23.2 before 23.2R2, \n * from 23.4 before 23.4R1-S1, 23.4R2;\u00a0\n\n\n\n\nJunos OS Evolved: \n\n\n * All versions before 21.4R3-S7-EVO, \n * from 22.1-EVO before 22.1R3-S6-EVO, \n * from 22.2-EVO before 22.2R3-S4-EVO, \n * from 22.3-EVO before 22.3R3-S3-EVO, \n * from 22.4-EVO before 22.4R3-S2-EVO, \n * from 23.2-EVO before 23.2R2-EVO, \n * from 23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer basado en pila en Juniper Networks Junos OS y Juniper Networks Junos OS Evolved puede permitir que un atacante local con pocos privilegios y acceso a la CLI tenga la capacidad de cargar un archivo de certificado malicioso, lo que lleva a una denegaci\u00f3n de servicio (DoS) limitada. ) o ejecuci\u00f3n de c\u00f3digo privilegiado. Al explotar el comando 'set security certificates' con un archivo de certificado manipulado, un atacante malintencionado con acceso a la CLI podr\u00eda provocar un fallo del daemon de administraci\u00f3n de comandos (mgd), limitado al int\u00e9rprete de comandos del usuario local, o potencialmente desencadenar un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-S7, * desde 22.1 anterior a 22.1R3-S6, * desde 22.2 anterior a 22.2R3-S4, * desde 22.3 anterior a 22.3R3-S3, * desde 22.4 anterior a 22.4R3- S2, * de 23.2 antes de 23.2R2, * de 23.4 antes de 23.4R1-S1, 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S7-EVO, * desde 22.1-EVO antes de 22.1R3-S6-EVO, * desde 22.2-EVO antes de 22.2R3-S4-EVO, * desde 22.3-EVO antes de 22.3R3- S3-EVO, * desde 22.4-EVO antes de 22.4R3-S2-EVO, * desde 23.2-EVO antes de 23.2R2-EVO, * desde 23.4-EVO antes de 23.4R1-S1-EVO, 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json index 0f935fc0b59..a4f99697a2f 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39557.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39557", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:12.370", - "lastModified": "2024-07-10T23:15:12.370", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Uncontrolled Resource Consumption vulnerability in the \n\nLayer 2 Address Learning Daemon (l2ald)\n\n of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS).\n\nCertain MAC table updates cause a small amount of memory to leak.\u00a0 Once memory utilization reaches its limit, the issue will result in a system crash and restart.\n\nTo identify the issue, execute the CLI command:\n \nuser@device> show platform application-info allocations app l2ald-agent\nEVL Object Allocation Statistics:\n \n Node \u00a0 Application \u00a0 \u00a0 Context Name \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Live \u00a0 Allocs \u00a0 Fails \u00a0 \u00a0 Guids\n re0 \u00a0 l2ald-agent \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 net::juniper::rtnh::L2Rtinfo \u00a0 \u00a0 \u00a0 1069096 1069302 \u00a0 0 \u00a0 \u00a0 \u00a0 \u00a0 1069302\n re0 \u00a0 l2ald-agent \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 net::juniper::rtnh::NHOpaqueTlv \u00a0 \u00a0 114 \u00a0 \u00a0 195 \u00a0 \u00a0 \u00a0 0 \u00a0 \u00a0 \u00a0 \u00a0 195\n\n\n\nThis issue affects Junos OS Evolved: \n\n\n * All versions before 21.4R3-S8-EVO,\n\n * from 22.2-EVO before 22.2R3-S4-EVO, \n * from 22.3-EVO\u00a0before 22.3R3-S3-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de consumo de recursos no controlado en el daemon de aprendizaje de direcciones de capa 2 (l2ald) de Juniper Networks Junos OS Evolved permite que un atacante adyacente no autenticado provoque una p\u00e9rdida de memoria, lo que eventualmente agota toda la memoria del sistema, lo que provoca un fallo del sistema y denegaci\u00f3n de servicio (DoS). ). Ciertas actualizaciones de la tabla MAC provocan la p\u00e9rdida de una peque\u00f1a cantidad de memoria. Una vez que la utilizaci\u00f3n de la memoria alcance su l\u00edmite, el problema provocar\u00e1 un bloqueo del sistema y un reinicio. Para identificar el problema, ejecute el comando CLI: usuario@dispositivo> show platform application-info asignaciones app l2ald-agent EVL Estad\u00edsticas de asignaci\u00f3n de objetos: Nodo Aplicaci\u00f3n Contexto Nombre Live Allocs falla Gu\u00edas re0 l2ald-agent net::juniper::rtnh:: L2Rtinfo 1069096 1069302 0 1069302 re0 l2ald-agent net::juniper::rtnh::NHOpaqueTlv 114 195 0 195 Este problema afecta a Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * desde 22.2-EVO anteriores a 22.2R3- S4-EVO, * desde 22.3-EVO antes de 22.3R3-S3-EVO, * desde 22.4-EVO antes de 22.4R3-EVO, * desde 23.2-EVO antes de 23.2R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json index e2ccafdd25f..deae05a8e94 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39558", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:12.617", - "lastModified": "2024-07-10T23:15:12.617", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS), when PIM is configured with Multicast-only Fast Reroute (MoFRR). Continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition.\n\nThis issue is observed on Junos and Junos Evolved platforms where PIM is configured along with MoFRR. MoFRR tries to select the active path, but due to an internal timing issue, rpd is unable to select the forwarding next-hop towards the source, resulting in an rpd crash.\n\nThis issue affects:\n\nJunos OS: \n\n\n * All versions before 20.4R3-S10, \n * from 21.2 before 21.2R3-S7, \n * from 21.4 before 21.4R3-S6, \n * from 22.1 before 22.1R3-S5, \n * from 22.2 before 22.2R3-S3, \n * from 22.3 before 22.3R3, \n * from 22.4 before 22.4R2;\u00a0\n\n\n\n\nJunos OS Evolved: \n\n\n * All versions before 20.4R3-S10 -EVO,\n * from 21.2-EVO before 21.2R3-S7 -EVO,\n * from 21.4-EVO before 21.4R3-S6 -EVO,\n * from 22.1-EVO before 22.1R3-S5 -EVO,\n * from 22.2-EVO before 22.2R3-S3-EVO,\n * from 22.3-EVO before 22.3R3-EVO,\n * from 22.4-EVO before 22.4R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de valor de retorno no verificado en el daemon de protocolo de enrutamiento (rpd) en Juniper Networks Junos OS y Juniper Networks Junos OS Evolved permite que un atacante l\u00f3gicamente adyacente y no autenticado env\u00ede un paquete PIM espec\u00edfico para provocar que rpd se bloquee y se reinicie, lo que resulta en una denegaci\u00f3n de servicio. (DoS), cuando PIM est\u00e1 configurado con Fast Reroute de solo multidifusi\u00f3n (MoFRR). La recepci\u00f3n y procesamiento continuo de este paquete puede crear una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema se observa en las plataformas Junos y Junos Evolved donde PIM est\u00e1 configurado junto con MoFRR. MoFRR intenta seleccionar la ruta activa, pero debido a un problema de sincronizaci\u00f3n interna, rpd no puede seleccionar el siguiente salto de reenv\u00edo hacia la fuente, lo que provoca un fallo de rpd. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 20.4R3-S10, * desde 21.2 anterior a 21.2R3-S7, * desde 21.4 anterior a 21.4R3-S6, * desde 22.1 anterior a 22.1R3-S5, * desde 22.2 anterior a 22.2R3- S3, * de 22.3 antes de 22.3R3, * de 22.4 antes de 22.4R2; Junos OS Evolved: *Todas las versiones anteriores a 20.4R3-S10 -EVO, *desde 21.2-EVO anteriores a 21.2R3-S7 -EVO, *desde 21.4-EVO anteriores a 21.4R3-S6 -EVO, *desde 22.1-EVO anteriores a 22.1R3- S5 -EVO, * desde 22.2-EVO antes de 22.2R3-S3-EVO, * desde 22.3-EVO antes de 22.3R3-EVO, * desde 22.4-EVO antes de 22.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json index 14017ba25e2..891635b0352 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39559.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39559", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:12.863", - "lastModified": "2024-07-10T23:15:12.863", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication enabled, destined to an accessible port on the device, resulting in a Denial of Service (DoS).\u00a0 The receipt of this packet must occur within a specific timing window outside the attacker's control (i.e., race condition).\n\nContinued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue only affects\u00a0dual RE systems with Nonstop Active Routing (NSR) enabled.\nExploitation can only occur over TCP sessions with MD5 authentication enabled (e.g., BGP with MD5 authentication).\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S8-EVO, \n * from 21.4-EVO before 21.4R3-S6-EVO, \n * from 22.1-EVO before 22.1R3-S4-EVO, \n * from 22.2-EVO before 22.2R3-S4-EVO, \n * from 22.3-EVO before 22.3R3-S3-EVO, \n * from 22.4-EVO before 22.4R2-S2-EVO, 22.4R3-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de verificaci\u00f3n inadecuada de condiciones inusuales o excepcionales en el procesamiento de paquetes de Juniper Networks Junos OS Evolved puede permitir que un atacante no autenticado basado en red bloquee el dispositivo (vmcore) enviando un paquete TCP espec\u00edfico a trav\u00e9s de una sesi\u00f3n TCP establecida con la autenticaci\u00f3n MD5 habilitada, destinada a un puerto accesible en el dispositivo, lo que resulta en una Denegaci\u00f3n de Servicio (DoS). La recepci\u00f3n de este paquete debe ocurrir dentro de una ventana de tiempo espec\u00edfica fuera del control del atacante (es decir, condici\u00f3n de ejecuci\u00f3n). La recepci\u00f3n y procesamiento continuo de este paquete crear\u00e1 una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema solo afecta a los sistemas RE duales con el enrutamiento activo ininterrumpido (NSR) habilitado. La explotaci\u00f3n s\u00f3lo puede ocurrir a trav\u00e9s de sesiones TCP con autenticaci\u00f3n MD5 habilitada (por ejemplo, BGP con autenticaci\u00f3n MD5). Este problema afecta a Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * desde 21.4-EVO anteriores a 21.4R3-S6-EVO, * desde 22.1-EVO anteriores a 22.1R3-S4-EVO, * desde 22.2-EVO anteriores 22.2R3-S4-EVO, * de 22.3-EVO antes de 22.3R3-S3-EVO, * de 22.4-EVO antes de 22.4R2-S2-EVO, 22.4R3-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json index 57d75197847..0e3bbee20c6 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39560.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39560", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.140", - "lastModified": "2024-07-10T23:15:13.140", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:\n\nuser@router> show system statistics kernel memory\nMemory \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Size (kB) Percentage When\n\u00a0 Active \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 753092 \u00a0 \u00a0 18.4% Now\n\u00a0 Inactive \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 574300 \u00a0 \u00a0 14.0% Now\n\u00a0 Wired\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 443236 \u00a0 \u00a0 10.8% Now\n\u00a0 Cached\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1911204 \u00a0 \u00a0 46.6% Now\n\u00a0 Buf \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 32768\u00a0 \u00a0 \u00a0 0.8% Now\n\u00a0 Free \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 385072\u00a0 \u00a0 \u00a0 9.4% Now\nKernel Memory\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Now\n\u00a0 Data \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 312908\u00a0 \u00a0 \u00a0 7.6% Now\n\u00a0 Text \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2560\u00a0 \u00a0 \u00a0 0.1% Now\n...\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el daemon del protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un vecino RSVP descendente l\u00f3gicamente adyacente provoque el agotamiento de la memoria del kernel, lo que provoca un fallo del kernel, lo que resulta en una denegaci\u00f3n de servicio ( DoS). La p\u00e9rdida de memoria del kernel y su eventual fallo se ver\u00e1n cuando el vecino RSVP descendente tenga un error persistente que no se corregir\u00e1. La memoria del kernel del sistema se puede monitorear mediante el uso del comando 'mostrar la memoria del kernel de estad\u00edsticas del sistema' como se muestra a continuaci\u00f3n: usuario@router> mostrar la memoria del kernel de estad\u00edsticas del sistema Tama\u00f1o de la memoria (kB) Porcentaje cuando est\u00e1 activo 753092 18,4 % ahora inactivo 574300 14,0 % ahora cableado 443236 10,8% Ahora en cach\u00e9 1911204 46,6% Ahora Buf 32768 0,8% Ahora gratis 385072 9,4% Ahora Memoria del kernel Ahora Datos 312908 7,6% Ahora Texto 2560 0,1% Ahora... Este problema afecta a: Junos OS: * Todas las versiones anteriores a 20.4R3-S9 , * desde 21.4 antes de 21.4R3-S5, * desde 22.1 antes de 22.1R3-S5, * desde 22.2 antes de 22.2R3-S3, * desde 22.3 antes de 22.3R3-S2, * desde 22.4 antes de 22.4R3, * desde 23.2 antes de 23.2R2 ; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S5-EVO, * desde 22.1-EVO antes de 22.1R3-S5-EVO, * desde 22.2-EVO antes de 22.2R3-S3-EVO, * desde 22.3-EVO antes de 22.3R3- S2-EVO, * de 22.4-EVO antes de 22.4R3-EVO, * de 23.2-EVO antes de 23.2R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json index 1656c4e04c6..94fcb739034 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39561", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.383", - "lastModified": "2024-07-10T23:15:13.383", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on \n\nSRX4600 and SRX5000 Series\n\n allows an attacker to send TCP packets with \n\nSYN/FIN or SYN/RST\n\n flags, bypassing the expected blocking of these packets.\n\nA TCP packet with SYN/FIN or SYN/RST should be dropped in flowd. However, when no-syn-check and Express Path\u00a0are enabled, these TCP packets are unexpectedly transferred to the downstream network.\n\nThis issue affects Junos OS on SRX4600 and SRX5000 Series: \n\n\n * All versions before 21.2R3-S8, \n * from 21.4 before 21.4R3-S7, \n * from 22.1 before 22.1R3-S6, \n * from 22.2 before 22.2R3-S4, \n * from 22.3 before 22.3R3-S3, \n * from 22.4 before 22.4R3-S2, \n * from 23.2 before 23.2R2, \n * from 23.4 before 23.4R1-S1, 23.4R2." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de verificaci\u00f3n inadecuada de condiciones inusuales o excepcionales en el demonio de flujo (flowd) de Juniper Networks Junos OS en las series SRX4600 y SRX5000 permite a un atacante enviar paquetes TCP con indicadores SYN/FIN o SYN/RST, evitando el bloqueo esperado de estos paquetes. . Un paquete TCP con SYN/FIN o SYN/RST debe descartarse en flowd. Sin embargo, cuando no-syn-check y Express Path est\u00e1n habilitados, estos paquetes TCP se transfieren inesperadamente a la red descendente. Este problema afecta a Junos OS en las series SRX4600 y SRX5000: * Todas las versiones anteriores a 21.2R3-S8, * desde 21.4 antes de 21.4R3-S7, * desde 22.1 antes de 22.1R3-S6, * desde 22.2 antes de 22.2R3-S4, * desde 22.3 antes de 22.3R3-S3, * desde 22.4 antes de 22.4R3-S2, * desde 23.2 antes de 23.2R2, * desde 23.4 antes de 23.4R1-S1, 23.4R2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json index 241574d02cf..a8cb9796289 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39562.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39562", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.670", - "lastModified": "2024-07-10T23:15:13.670", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitimate users. Continued receipt of these connections will create a sustained Denial of Service (DoS) condition.\n\nThe issue is triggered when a high rate of concurrent SSH requests are received and terminated in a specific way, causing xinetd to crash, and leaving defunct sshd processes. Successful exploitation of this vulnerability blocks both SSH access as well as services which rely upon SSH, such as SFTP, and\u00a0Netconf over SSH.\n\nOnce the system is in this state, legitimate users will be unable to SSH to the device until service is manually restored.\u00a0 See WORKAROUND section below.\n\nAdministrators can monitor an increase in defunct sshd processes by utilizing the CLI command:\n\n\u00a0 > show system processes | match sshd\n\u00a0 root \u00a0 25219 30901 0 Jul16 ? \u00a0 \u00a0 \u00a0 00:00:00 [sshd] \n\nThis issue affects Juniper Networks Junos OS Evolved:\n * All versions prior to 21.4R3-S7-EVO\n * 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S2-EVO;\n * 22.4-EVO versions prior to 22.4R3-EVO;\n * 23.2-EVO versions prior to 23.2R2-EVO.\n\n\n\nThis issue does not affect Juniper Networks Junos OS Evolved 22.1-EVO nor 22.2-EVO." + }, + { + "lang": "es", + "value": "Una versi\u00f3n faltante de recurso despu\u00e9s de una vulnerabilidad de duraci\u00f3n efectiva El proceso xinetd, responsable de generar instancias de demonio SSH (sshd), de Juniper Networks Junos OS Evolved permite que un atacante basado en red no autenticado provoque una denegaci\u00f3n de servicio (DoS) al bloquear el acceso SSH para usuarios leg\u00edtimos. La recepci\u00f3n continua de estas conexiones crear\u00e1 una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). El problema se desencadena cuando se recibe y finaliza de una manera espec\u00edfica una alta tasa de solicitudes SSH simult\u00e1neas, lo que provoca que xinetd falle y deje procesos sshd inactivos. La explotaci\u00f3n exitosa de esta vulnerabilidad bloquea tanto el acceso SSH como los servicios que dependen de SSH, como SFTP y Netconf sobre SSH. Una vez que el sistema est\u00e9 en este estado, los usuarios leg\u00edtimos no podr\u00e1n conectarse mediante SSH al dispositivo hasta que el servicio se restablezca manualmente. Consulte la secci\u00f3n WORKAROUND a continuaci\u00f3n. Los administradores pueden monitorear un aumento en los procesos sshd inactivos utilizando el comando CLI: > mostrar procesos del sistema | coincide con sshd root 25219 30901 0 16 de julio? 00:00:00 [sshd] Este problema afecta a Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S7-EVO * Versiones 22.3-EVO anteriores a 22.3R2-S2-EVO, 22.3R3-S2- EVO; * Versiones 22.4-EVO anteriores a 22.4R3-EVO; * Versiones 23.2-EVO anteriores a 23.2R2-EVO. Este problema no afecta a Juniper Networks Junos OS Evolved 22.1-EVO ni 22.2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39565.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39565.json index a53c0050d9e..4ba87c9299e 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39565.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39565.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39565", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.940", - "lastModified": "2024-07-10T23:15:13.940", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to\u00a0execute\u00a0remote commands on the target device.\u00a0\n\nWhile an administrator is logged into a J-Web session or has previously logged in and subsequently logged out of their J-Web session, the attacker can arbitrarily execute commands on the target device with the other user's credentials. In the worst case, the attacker will have full control over the device.\nThis issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S8,\u00a0\n * from 21.4 before 21.4R3-S7,\n * from 22.2 before 22.2R3-S4,\n * from 22.3 before 22.3R3-S3,\n * from 22.4 before 22.4R3-S2,\n * from 23.2 before 23.2R2,\n * from 23.4 before 23.4R1-S1, 23.4R2." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de neutralizaci\u00f3n inadecuada de datos dentro de expresiones XPath ('inyecci\u00f3n XPath') en J-Web incluido con Juniper Networks Junos OS permite que un atacante basado en red no autenticado ejecute comandos remotos en el dispositivo objetivo. Mientras un administrador inicia sesi\u00f3n en una sesi\u00f3n de J-Web o ha iniciado sesi\u00f3n previamente y posteriormente ha cerrado sesi\u00f3n en su sesi\u00f3n de J-Web, el atacante puede ejecutar comandos arbitrariamente en el dispositivo de destino con las credenciales del otro usuario. En el peor de los casos, el atacante tendr\u00e1 control total sobre el dispositivo. Este problema afecta a Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * desde 21.4 anterior a 21.4R3-S7, * desde 22.2 anterior a 22.2R3-S4, * desde 22.3 anterior a 22.3R3-S3, * desde 22.4 anterior a 22.4R3-S2 , * de 23.2 antes de 23.2R2, * de 23.4 antes de 23.4R1-S1, 23.4R2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json index 8475ebd654e..6006b518d3b 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39614.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39614", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T05:15:12.237", - "lastModified": "2024-07-10T05:15:12.237", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.7 y 4.2 anterior a 4.2.14. get_supported_language_variant() estaba sujeto a un posible ataque de denegaci\u00f3n de servicio cuando se usaba con cadenas muy largas que conten\u00edan caracteres espec\u00edficos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json index 9b312cf290f..84dc6a97cc6 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39684.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39684", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T19:15:12.700", - "lastModified": "2024-07-09T19:15:12.700", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege." + }, + { + "lang": "es", + "value": "Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento de enteros en la funci\u00f3n `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la v\u00edctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevaci\u00f3n de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39693.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39693.json index e423672ee13..0eeaf340f3b 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39693.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39693.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39693", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-10T20:15:04.543", - "lastModified": "2024-07-10T20:15:04.543", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later." + }, + { + "lang": "es", + "value": "Next.js es un framework de React. Se identific\u00f3 una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en Next.js. La explotaci\u00f3n del error puede provocar una falla que afecte la disponibilidad del servidor. su vulnerabilidad se resolvi\u00f3 en Next.js 13.5 y versiones posteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json index 46a1a28c8df..66b51cab408 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39880", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:02.740", - "lastModified": "2024-07-10T00:15:05.893", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila de longitud fija. Si un objetivo visita una p\u00e1gina maliciosa o abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json index 6c6f2458c0b..a140fcf3257 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39881.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39881", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:02.893", - "lastModified": "2024-07-09T22:15:02.893", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a memory corruption condition. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una condici\u00f3n de corrupci\u00f3n de la memoria. Si un objetivo visita una p\u00e1gina maliciosa o abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json index a2808d8ab16..5ee775ca573 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39882.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39882", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:03.013", - "lastModified": "2024-07-09T22:15:03.013", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Si un objetivo visita una p\u00e1gina maliciosa o abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json index 5338439b5c0..3eb490a44a1 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39883.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39883", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-09T22:15:03.133", - "lastModified": "2024-07-09T22:15:03.133", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Delta Electronics CNCSoft-G2 carece de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en mont\u00f3n de longitud fija. Si un objetivo visita una p\u00e1gina maliciosa o abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json index 9991545cd3e..165de499054 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39886.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39886", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.247", - "lastModified": "2024-07-10T07:15:03.247", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TONE store App version 3.4.2 and earlier contains an issue with unprotected primary channel. Since TONE store App communicates with TONE store website in cleartext, a man-in-the-middle attack may allow an attacker to obtain and/or alter communications of the affected App." + }, + { + "lang": "es", + "value": "La versi\u00f3n 3.4.2 y anteriores de la aplicaci\u00f3n TONE store contiene un problema con el canal principal desprotegido. Dado que la aplicaci\u00f3n TONE store se comunica con el sitio web de TONE store en texto plano, un ataque man-in-the-middle puede permitir a un atacante obtener y/o alterar las comunicaciones de la aplicaci\u00f3n afectada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json index e8d7cd14201..2ec5417ee37 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39897.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39897", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T19:15:12.953", - "lastModified": "2024-07-09T19:15:12.953", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "zot is an OCI image registry. Prior to 2.1.0, the cache driver `GetBlob()` allows read access to any blob without access control check. If a Zot `accessControl` policy allows users read access to some repositories but restricts read access to other repositories and `dedupe` is enabled (it is enabled by default), then an attacker who knows the name of an image and the digest of a blob (that they do not have read access to), they may maliciously read it via a second repository they do have read access to. \n This attack is possible because [`ImageStore.CheckBlob()` calls `checkCacheBlob()`](https://github.com/project-zot/zot/blob/v2.1.0-rc2/pkg/storage/imagestore/imagestore.go#L1158-L1159) to find the blob a global cache by searching for the digest. If it is found, it is copied to the user requested repository with `copyBlob()`. The attack may be mitigated by configuring \"dedupe\": false in the \"storage\" settings. The vulnerability is fixed in 2.1.0." + }, + { + "lang": "es", + "value": "zot es un registro de im\u00e1genes OCI. Antes de 2.1.0, el controlador de cach\u00e9 `GetBlob()` permite acceso de lectura a cualquier blob sin verificaci\u00f3n de control de acceso. Si una pol\u00edtica `accessControl` de Zot permite a los usuarios acceso de lectura a algunos repositorios pero restringe el acceso de lectura a otros repositorios y `dedupe` est\u00e1 habilitado (est\u00e1 habilitado de forma predeterminada), entonces un atacante que conoce el nombre de una imagen y el resumen de una blob (al que no tienen acceso de lectura), pueden leerlo maliciosamente a trav\u00e9s de un segundo repositorio al que s\u00ed tienen acceso de lectura. Este ataque es posible porque [`ImageStore.CheckBlob()` llama a `checkCacheBlob()`](https://github.com/project-zot/zot/blob/v2.1.0-rc2/pkg/storage/imagestore/imagestore .go#L1158-L1159) para encontrar el blob como cach\u00e9 global buscando el resumen. Si se encuentra, se copia al repositorio solicitado por el usuario con `copyBlob()`. El ataque se puede mitigar configurando \"dedupe\": false en la configuraci\u00f3n de \"storage\". La vulnerabilidad se solucion\u00f3 en 2.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json index b6be07688db..93db8f1e25d 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39899.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39899", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T19:15:13.160", - "lastModified": "2024-07-09T19:15:13.160", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrivateBin is an online pastebin where the server has zero knowledge of pasted data. In v1.5, PrivateBin introduced the YOURLS server-side proxy. The idea was to allow using the YOURLs URL shortener without running the YOURLs instance without authentication and/or exposing the authentication token to the public, allowing anyone to shorten any URL. With the proxy mechanism, anyone can shorten any URL pointing to the configured PrivateBin instance. The vulnerability allowed other URLs to be shortened, as long as they contain the PrivateBin instance, defeating the limit imposed by the proxy. This vulnerability is fixed in 1.7.4." + }, + { + "lang": "es", + "value": "PrivateBin es un pastbin en l\u00ednea donde el servidor no tiene conocimiento de los datos pegados. En v1.5, PrivateBin introdujo el proxy del lado del servidor YOURLS. La idea era permitir el uso del acortador de URL de YOURLs sin ejecutar la instancia de YOURLs sin autenticaci\u00f3n y/o exponer el token de autenticaci\u00f3n al p\u00fablico, permitiendo a cualquiera acortar cualquier URL. Con el mecanismo de proxy, cualquiera puede acortar cualquier URL que apunte a la instancia de PrivateBin configurada. La vulnerabilidad permiti\u00f3 acortar otras URL, siempre que contengan la instancia PrivateBin, anulando el l\u00edmite impuesto por el proxy. Esta vulnerabilidad se solucion\u00f3 en 1.7.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39900.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39900.json index 54a01b5061c..24390b449f6 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39900.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39900.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39900", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T22:15:03.243", - "lastModified": "2024-07-09T22:15:03.243", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenSearch Dashboards Reports allows \u2018Report Owner\u2019 export and share reports from OpenSearch Dashboards. An issue in the OpenSearch reporting plugin allows unintended access to private tenant resources like notebooks. The system did not properly check if the user was the resource author when accessing resources in a private tenant, leading to potential data being revealed. The patches are included in OpenSearch 2.14." + }, + { + "lang": "es", + "value": "Los informes de OpenSearch Dashboards permiten que el \"Report Owner\" exporte y comparta informes desde OpenSearch Dashboards. Un problema en el complemento de informes OpenSearch permite el acceso no deseado a recursos privados de inquilinos, como cuadernos. El sistema no verific\u00f3 adecuadamente si el usuario era el autor del recurso al acceder a recursos en un inquilino privado, lo que llev\u00f3 a que se revelaran posibles datos. Los parches est\u00e1n incluidos en OpenSearch 2.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39901.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39901.json index 78f85285eae..8e300691337 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39901.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39901.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39901", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-09T22:15:03.450", - "lastModified": "2024-07-09T22:15:03.450", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenSearch Observability is collection of plugins and applications that visualize data-driven events. An issue in the OpenSearch observability plugins allows unintended access to private tenant resources like notebooks. The system did not properly check if the user was the resource author when accessing resources in a private tenant, leading to potential data being revealed. The patches are included in OpenSearch 2.14." + }, + { + "lang": "es", + "value": "OpenSearch Observability es una colecci\u00f3n de complementos y aplicaciones que visualizan eventos basados en datos. Un problema en los complementos de OpenSearch observability permite el acceso no deseado a recursos privados de inquilinos, como cuadernos. El sistema no verific\u00f3 adecuadamente si el usuario era el autor del recurso al acceder a recursos en un inquilino privado, lo que llev\u00f3 a que se revelaran posibles datos. Los parches est\u00e1n incluidos en OpenSearch 2.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json index 7effa83ff31..5777d61ad1f 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39927.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39927", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-10T07:15:03.317", - "lastModified": "2024-07-10T07:15:03.317", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write vulnerability exists in Ricoh MFPs and printers. If a remote attacker sends a specially crafted request to the affected products, the products may be able to cause a denial-of-service (DoS) condition and/or user's data may be destroyed." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escritura fuera de los l\u00edmites en las impresoras y equipos multifunci\u00f3n Ricoh. Si un atacante remoto env\u00eda una solicitud especialmente manipulada a los productos afectados, los productos pueden causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) y/o los datos del usuario pueden ser destruidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json index 2efb34731f1..eb3a70eb7d9 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40034.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40034", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.373", - "lastModified": "2024-07-09T19:15:13.373", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userLevel_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userLevel_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json index 4bb884e1a0c..58a821c0c03 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40035.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40035", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.450", - "lastModified": "2024-07-09T19:15:13.450", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userLevel_deal.php?mudi=add." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userLevel_deal.php?mudi=add." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json index b5d1648c76a..a09d05db09a 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40036.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40036", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.527", - "lastModified": "2024-07-09T19:15:13.527", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userGroup_deal.php?mudi=add&nohrefStr=close" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userGroup_deal.php?mudi=add&nohrefStr=close" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json index 098806cf73f..fdc739adee6 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40037.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40037", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.600", - "lastModified": "2024-07-09T19:15:13.600", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userScore_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userScore_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json index 3ae62a60168..81a0b7c6840 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40038.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40038", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.677", - "lastModified": "2024-07-09T19:15:13.677", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userScore_deal.php?mudi=rev" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userScore_deal.php?mudi=rev" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json index ce2b1c589c2..79deb650df1 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40039.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40039", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:13.750", - "lastModified": "2024-07-09T19:15:13.750", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/userGroup_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/userGroup_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json index 2a507ffcd4d..487845e13c6 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40328.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40328", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.497", - "lastModified": "2024-07-10T13:15:10.497", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/memberOnline_deal.php?mudi=del&dataType=&dataID=6" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/memberOnline_deal.php?mudi=del&dataType=&dataID=6" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40329.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40329.json index 3f37489c47b..d7197d4db2d 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40329.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40329.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40329", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.593", - "lastModified": "2024-07-10T13:15:10.593", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/softBak_deal.php?mudi=backup" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/softBak_deal.php?mudi=backup" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40331.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40331.json index 8db5114e79a..7dcfb35f59d 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40331.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40331.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40331", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T14:15:12.457", - "lastModified": "2024-07-10T14:15:12.457", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/dbBakMySQL_deal.php?mudi=backup" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/dbBakMySQL_deal.php?mudi=backup" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json index 555cda180b2..2b1fef685d9 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40332.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40332", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T14:15:12.540", - "lastModified": "2024-07-10T14:15:12.540", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/moneyRecord_deal.php?mudi=delRecord" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/moneyRecord_deal.php?mudi=delRecord" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json index bf0f89765b7..786afcb4a16 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40333.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40333", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.680", - "lastModified": "2024-07-10T13:15:10.680", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/softBak_deal.php?mudi=del&dataID=2" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/softBak_deal.php?mudi=del&dataID=2" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json index 80f97fbfdcf..32ace497317 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40334.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40334", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T13:15:10.760", - "lastModified": "2024-07-10T13:15:10.760", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/serverFile_deal.php?mudi=upFileDel&dataID=3" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/serverFile_deal.php?mudi=upFileDel&dataID=3" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json index f4b7d4544e4..6b70daaaa05 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40336.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40336", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T14:15:12.620", - "lastModified": "2024-07-10T14:15:12.620", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 is vulnerable to Cross Site Scripting (XSS) within the 'Image Advertising Management.'" + }, + { + "lang": "es", + "value": "idccms v1.35 es vulnerable a Cross Site Scripting (XSS) dentro de la 'Image Advertising Management'." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json index f8004de9033..f8e77fe1c05 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40412.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40412", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T16:15:04.290", - "lastModified": "2024-07-10T16:15:04.290", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AX12 v1.0 v22.03.01.46 contains a stack overflow in the deviceList parameter of the sub_42E410 function." + }, + { + "lang": "es", + "value": "Tenda AX12 v1.0 v22.03.01.46 contiene un desbordamiento de pila en el par\u00e1metro deviceList de la funci\u00f3n sub_42E410." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json index bcf8e499e49..033d31aaa6d 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40417.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40417", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-10T16:15:04.373", - "lastModified": "2024-07-10T16:15:04.373", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tenda AX1806 1.0.0.1. Affected by this issue is the function formSetRebootTimer of the file /goform/SetIpMacBind. The manipulation of the argument list leads to stack-based buffer overflow." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tenda AX1806 1.0.0.1. La funci\u00f3n formSetRebootTimer del archivo /goform/SetIpMacBind es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la lista de argumentos provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40618.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40618.json index 8ed989177c8..f0348e47ce0 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40618.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40618.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40618", "sourceIdentifier": "cve@navercorp.com", "published": "2024-07-11T02:15:01.680", - "lastModified": "2024-07-11T02:15:01.680", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Whale browser before 3.26.244.21 allows an attacker to execute malicious JavaScript due to improper sanitization when processing a built-in extension." + }, + { + "lang": "es", + "value": "El navegador Whale anterior a 3.26.244.21 permite a un atacante ejecutar JavaScript malicioso debido a una sanitizaci\u00f3n incorrecta al procesar una extensi\u00f3n incorporada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json index 7f01f96026c..b5724a6315a 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40750", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:12.357", - "lastModified": "2024-07-09T20:15:12.357", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Linksys Velop Pro 6E 1.0.8 MX6200_1.0.8.215731 and 7 1.0.10.215314 devices send cleartext Wi-Fi passwords over the public Internet during app-based installation." + }, + { + "lang": "es", + "value": "Los dispositivos Linksys Velop Pro 6E 1.0.8 MX6200_1.0.8.215731 y 7 1.0.10.215314 env\u00edan contrase\u00f1as de Wi-Fi en texto plano a trav\u00e9s de Internet p\u00fablico durante la instalaci\u00f3n basada en aplicaciones." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json index 34e646fd021..7e6980d7d35 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4655.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4655", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.750", - "lastModified": "2024-07-11T06:15:02.750", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultimate Blocks WordPress plugin before 3.1.9 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": " El complemento Ultimate Blocks de WordPress anterior a 3.1.9 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross Site Scripting almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4866.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4866.json index b5b4f91d1b6..76e83e71e5a 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4866.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4866.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4866", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T02:15:03.347", - "lastModified": "2024-07-10T02:15:03.347", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UltraAddons \u2013 Elementor Addons (Header Footer Builder, Custom Font, Custom CSS,Woo Widget, Menu Builder, Anywhere Elementor Shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento UltraAddons \u2013 Elementor Addons (Header Footer Builder, Custom Font, Custom CSS, Woo Widget, Menu Builder, Anywhere Elementor Shortcode) para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de m\u00faltiples widgets en todas las versiones hasta la 1.1 incluida. .6 debido a una sanitizaci\u00f3n de la entrada y escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json index 6673aebe340..bcd133db5ee 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4879.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4879", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-07-10T17:15:12.117", - "lastModified": "2024-07-10T18:15:05.070", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible." + }, + { + "lang": "es", + "value": "ServiceNow ha abordado una vulnerabilidad de validaci\u00f3n de entrada que se identific\u00f3 en las versiones de la plataforma Now de Vancouver y Washington DC. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado ejecute c\u00f3digo de forma remota dentro del contexto de Now Platform. ServiceNow aplic\u00f3 una actualizaci\u00f3n a las instancias alojadas y ServiceNow lanz\u00f3 la actualizaci\u00f3n a nuestros socios y clientes autohospedados. A continuaci\u00f3n se enumeran los parches y correcciones urgentes que abordan la vulnerabilidad. Si a\u00fan no lo ha hecho, le recomendamos aplicar los parches de seguridad relevantes para su instancia lo antes posible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5178.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5178.json index c81f42f0eb4..84cad271cf1 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5178.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5178.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5178", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-07-10T17:15:12.240", - "lastModified": "2024-07-10T17:15:12.240", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server.\u00a0The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible." + }, + { + "lang": "es", + "value": "ServiceNow ha abordado una vulnerabilidad de lectura de archivos confidenciales que se identific\u00f3 en las versiones de las plataformas Now de Washington DC, Vancouver y Utah. Esta vulnerabilidad podr\u00eda permitir que un usuario administrativo obtenga acceso no autorizado a archivos confidenciales en el servidor de aplicaciones web. La vulnerabilidad se aborda en los parches y correcciones urgentes enumerados, que se lanzaron durante el ciclo de parches de junio de 2024. Si a\u00fan no lo ha hecho, le recomendamos aplicar los parches de seguridad relevantes para su instancia lo antes posible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json index 2589478de80..f9d3a4b33f6 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5217", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-07-10T17:15:12.373", - "lastModified": "2024-07-10T17:15:12.373", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible." + }, + { + "lang": "es", + "value": "ServiceNow ha abordado una vulnerabilidad de validaci\u00f3n de entrada que se identific\u00f3 en las versiones de Washington DC, Vancouver y versiones anteriores de Now Platform. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado ejecute c\u00f3digo de forma remota dentro del contexto de Now Platform. La vulnerabilidad se aborda en los parches y correcciones urgentes que se enumeran a continuaci\u00f3n, que se lanzaron durante el ciclo de parches de junio de 2024. Si a\u00fan no lo ha hecho, le recomendamos aplicar los parches de seguridad relevantes para su instancia lo antes posible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5257.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5257.json index 3c8b1a36771..540f3cf2767 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5257.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5257.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5257", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-11T07:15:04.257", - "lastModified": "2024-07-11T07:15:04.257", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Developer user with `admin_compliance_framework` custom role may have been able to modify the URL for a group namespace." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 17.0 anterior a la 17.0.4 y desde la 17.1 anterior a la 17.1.2, donde un usuario desarrollador con el rol personalizado `admin_compliance_framework` pudo haber podido modificar la URL de un espacio de nombres de grupo. ." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json index ff9770e02da..9c3278b6aa0 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5444.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5444", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.830", - "lastModified": "2024-07-11T06:15:02.830", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bible Text WordPress plugin through 0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": "El complemento Bible Text para WordPress hasta la versi\u00f3n 0.2 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross Site Scripting almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5470.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5470.json index a71dfd045a0..20b8c957417 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5470.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5470.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5470", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-11T07:15:04.833", - "lastModified": "2024-07-11T07:15:04.833", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Guest user with `admin_push_rules` permission may have been able to create project-level deploy tokens." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 17.0 anterior a 17.0.4 y desde 17.1 anterior a 17.1.2 donde un usuario invitado con permiso `admin_push_rules` puede haber podido crear tokens de implementaci\u00f3n a nivel de proyecto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5491.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5491.json index c6d39fbaa13..5672970f096 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5491.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5491.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5491", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T19:15:11.190", - "lastModified": "2024-07-10T19:15:11.190", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service in NetScaler ADC and NetScaler Gateway in NetScaler" + }, + { + "lang": "es", + "value": "Denegaci\u00f3n de servicio en NetScaler ADC y NetScaler Gateway en NetScaler" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json index 2e8c94ba45c..a78d7b340bd 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5492.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5492", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T19:15:11.293", - "lastModified": "2024-07-10T19:15:11.293", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability allows a remote unauthenticated attacker to redirect users to arbitrary websites\u00a0in NetScaler ADC and NetScaler Gateway" + }, + { + "lang": "es", + "value": "La vulnerabilidad de redireccionamiento abierto permite a un atacante remoto no autenticado redirigir a los usuarios a sitios web arbitrarios en NetScaler ADC y NetScaler Gateway." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5664.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5664.json index 31d20014e9d..e1d57e4a028 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5664.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5664.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5664", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T08:15:11.507", - "lastModified": "2024-07-10T08:15:11.507", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MP3 Audio Player \u2013 Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' attribute within the plugin's sonaar_audioplayer shortcode in all versions up to, and including, 5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento MP3 Audio Player \u2013 Music Player, Podcast Player & Radio by Sonaar para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del atributo 'id' dentro del c\u00f3digo corto sonaar_audioplayer del complemento en todas las versiones hasta la 5.5 incluida debido a una sanitizaci\u00f3n de entrada y escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5677.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5677.json index ce972826e56..4c08d2f25d3 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5677.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5677.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5677", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T02:15:03.570", - "lastModified": "2024-07-10T02:15:03.570", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Featured Image Generator plugin for WordPress is vulnerable to unauthorized image upload due to a missing capability check on the fig_save_after_generate_image function in all versions up to, and including, 1.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary images to a post-related gallery." + }, + { + "lang": "es", + "value": "El complemento Featured Image Generator para WordPress es vulnerable a la carga de im\u00e1genes no autorizada debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n fig_save_after_generate_image en todas las versiones hasta la 1.3.1 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen im\u00e1genes arbitrarias en una galer\u00eda relacionada con publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json index 56ef5d9fe27..4a86b4694a6 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5679.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5679", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T09:15:03.523", - "lastModified": "2024-07-11T09:15:03.523", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service, or\nkernel memory leak when a malicious actor with local user access crafts a script/program using\nan IOCTL call in the Foxboro.sys driver." + }, + { + "lang": "es", + "value": "CWE-787: Existe una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda causar denegaci\u00f3n de servicio local o p\u00e9rdida de memoria del kernel cuando un actor malintencionado con acceso de usuario local crea un script/programa usando una llamada IOCTL en el controlador Foxboro.sys." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json index da9e8ff1a9f..c168d58f3e1 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5680.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5680", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T09:15:03.923", - "lastModified": "2024-07-11T09:15:03.923", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-129: Improper Validation of Array Index vulnerability exists that could cause local denial-of-service when a malicious actor with local user access crafts a script/program using an IOCTL\ncall in the Foxboro.sys driver." + }, + { + "lang": "es", + "value": "CWE-129: Existe una vulnerabilidad de validaci\u00f3n inadecuada del \u00edndice de matriz que podr\u00eda causar denegaci\u00f3n de servicio local cuando un actor malicioso con acceso de usuario local crea un script/programa usando una llamada IOCTL en el controlador Foxboro.sys." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json index 91c128b1803..4d49d9d6ae4 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5681.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5681", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T09:15:04.360", - "lastModified": "2024-07-11T09:15:04.360", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-20: Improper Input Validation vulnerability exists that could cause local denial-of-service,\nprivilege escalation, and potentially kernel execution when a malicious actor with local user\naccess crafts a script/program using an IOCTL call in the Foxboro.sys driver." + }, + { + "lang": "es", + "value": "CWE-20: Existe una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda causar denegaci\u00f3n de servicio local, escalada de privilegios y potencialmente ejecuci\u00f3n del kernel cuando un actor malicioso con acceso de usuario local crea un script/programa usando una llamada IOCTL en el controlador Foxboro.sys." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5792.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5792.json index 387a9894535..b0fd93668f0 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5792.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5792.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5792", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T02:15:03.800", - "lastModified": "2024-07-10T02:15:03.800", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Houzez CRM plugin for WordPress is vulnerable to time-based SQL Injection via the notes \u2018belong_to\u2019 parameter in all versions up to, and including, 1.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level (seller) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Houzez CRM para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro notas 'belong_to' en todas las versiones hasta la 1.4.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en el existente. Consulta SQL. Esto hace posible que los atacantes autenticados, con acceso de nivel personalizado (vendedor) y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json index 4b09ad70f90..8586fd0d49a 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5910", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.390", - "lastModified": "2024-07-10T19:15:11.390", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.\n\nNote: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue." + }, + { + "lang": "es", + "value": "La falta de autenticaci\u00f3n para una funci\u00f3n cr\u00edtica en Palo Alto Networks Expedition puede provocar que los atacantes con acceso a la red de Expedition tomen el control de la cuenta de administrador de Expedition. Nota: Expedition es una herramienta que ayuda en la migraci\u00f3n, el ajuste y el enriquecimiento de la configuraci\u00f3n. Los secretos de configuraci\u00f3n, las credenciales y otros datos importados a Expedition est\u00e1n en riesgo debido a este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5911.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5911.json index c7d9e4f3dcf..7381c638c51 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5911.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5911.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5911", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.547", - "lastModified": "2024-07-10T19:15:11.547", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitraria en el software Panorama de Palo Alto Networks permite que un administrador de lectura y escritura autenticado con acceso a la interfaz web interrumpa los procesos del sistema y bloquee Panorama. Los ataques repetidos eventualmente hacen que Panorama entre en modo de mantenimiento, lo que requiere intervenci\u00f3n manual para volver a ponerlo en l\u00ednea." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5912.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5912.json index e439297e0fd..0d192611baf 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5912.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5912.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5912", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.697", - "lastModified": "2024-07-10T19:15:11.697", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper file signature check in Palo Alto Networks Cortex XDR agent may allow an attacker to bypass the Cortex XDR agent's executable blocking capabilities and run untrusted executables on the device. This issue can be leveraged to execute untrusted software without being detected or blocked." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n incorrecta de la firma del archivo en el agente Cortex XDR de Palo Alto Networks puede permitir a un atacante omitir las capacidades de bloqueo de ejecutables del agente Cortex XDR y ejecutar ejecutables que no son de confianza en el dispositivo. Este problema se puede aprovechar para ejecutar software que no es de confianza sin ser detectado ni bloqueado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json index 54380337a4b..f2810e50b28 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5913", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.837", - "lastModified": "2024-07-10T19:15:11.837", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en el software PAN-OS de Palo Alto Networks permite a un atacante manipular el sistema de archivos f\u00edsico para elevar los privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6025.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6025.json index bf5b57a7331..2fc72b65ea7 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6025.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6025", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.913", - "lastModified": "2024-07-11T06:15:02.913", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Quiz and Survey Master (QSM) WordPress plugin before 9.0.5 does not sanitise and escape some of its Quiz settings, which could allow contributors and higher to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": " El complemento Quiz and Survey Master (QSM) de WordPress anterior a 9.0.5 no sanitiza ni escapa a algunas de sus configuraciones de Quiz, lo que podr\u00eda permitir a los contribuyentes y superiores realizar ataques de Cross Site Scripting almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json index 577affde577..243abdc4e57 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6026.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6026", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:02.987", - "lastModified": "2024-07-11T06:15:02.987", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Slider by 10Web WordPress plugin before 1.2.56 does not sanitise and escape some of its Slide options, which could allow authenticated users with access to the Sliders (by default Administrator, however this can be changed via the Slider by 10Web WordPress plugin before 1.2.56's options) and the ability to add images (Editor+) to perform Stored Cross-Site Scripting attacks" + }, + { + "lang": "es", + "value": " El complemento Slider by 10Web para WordPress anterior a 1.2.56 no sanitiza ni escapa a algunas de sus opciones de diapositivas, lo que podr\u00eda permitir a los usuarios autenticados acceder a los Sliders (de forma predeterminada, Administrador, sin embargo, esto se puede cambiar a trav\u00e9s del complemento Slider by 10Web WordPress anterior a 1.2 .56) y la capacidad de agregar im\u00e1genes (Editor+) para realizar ataques de Cross Site Scripting almacenado" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json index 9ae4cf24c4d..209fd39ece7 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6035", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-11T11:15:09.920", - "lastModified": "2024-07-11T11:15:09.920", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410. This vulnerability allows an attacker to inject malicious JavaScript code into the chat history file. When a victim uploads this file, the malicious script is executed in the victim's browser. This can lead to user data theft, session hijacking, malware distribution, and phishing attacks." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Scripting almacenado (XSS) en gaizhenbiao/chuanhuchatgpt versi\u00f3n 20240410. Esta vulnerabilidad permite a un atacante inyectar c\u00f3digo JavaScript malicioso en el archivo del historial de chat. Cuando una v\u00edctima carga este archivo, el script malicioso se ejecuta en el navegador de la v\u00edctima. Esto puede provocar el robo de datos de los usuarios, el secuestro de sesiones, la distribuci\u00f3n de malware y ataques de phishing." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6036.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6036.json index a08efd43515..dfaa49d3fbb 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6036.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6036.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6036", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-10T23:15:14.227", - "lastModified": "2024-07-10T23:15:14.227", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to restart the server at will by sending a specific request to the `/queue/join?` endpoint with `\"fn_index\":66`. This unrestricted server restart capability can severely disrupt service availability, cause data loss or corruption, and potentially compromise system integrity." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en gaizhenbiao/chuanhuchatgpt versi\u00f3n 20240410 permite a cualquier usuario reiniciar el servidor a voluntad enviando una solicitud espec\u00edfica al endpoint `/queue/join?` con `\"fn_index\":66`. Esta capacidad de reinicio del servidor sin restricciones puede alterar gravemente la disponibilidad del servicio, provocar p\u00e9rdida o corrupci\u00f3n de datos y potencialmente comprometer la integridad del sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6037.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6037.json index b11f9861086..b4fa6c61ad7 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6037.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6037.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6037", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-10T23:15:14.493", - "lastModified": "2024-07-10T23:15:14.493", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows an attacker to create arbitrary folders at any location on the server, including the root directory (C: dir). This can lead to uncontrolled resource consumption, resulting in resource exhaustion, denial of service (DoS), server unavailability, and potential data loss or corruption." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en gaizhenbiao/chuanhuchatgpt versi\u00f3n 20240410 permite a un atacante crear carpetas arbitrarias en cualquier ubicaci\u00f3n del servidor, incluido el directorio ra\u00edz (C: dir). Esto puede conducir a un consumo incontrolado de recursos, lo que resulta en agotamiento de recursos, denegaci\u00f3n de servicio (DoS), indisponibilidad del servidor y posible p\u00e9rdida o corrupci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json index 0a75dfd22c4..4634a1cf873 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6138.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6138", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-11T06:15:03.083", - "lastModified": "2024-07-11T06:15:03.083", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Secure Copy Content Protection and Content Locking WordPress plugin before 4.0.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Secure Copy Content Protection and Content Locking de Wordpress anterior a 4.0.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json index 6b93db32439..ffa8931194b 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6148", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:10.730", - "lastModified": "2024-07-10T21:15:10.730", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bypass of GACS Policy Configuration settings in Citrix Workspace app for HTML5" + }, + { + "lang": "es", + "value": "Omitir los ajustes de configuraci\u00f3n de pol\u00edticas GACS en la aplicaci\u00f3n Citrix Workspace para HTML5" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6149.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6149.json index 42b59b3961c..e502c3bcec7 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6149.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6149.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6149", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:10.830", - "lastModified": "2024-07-10T21:15:10.830", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Redirection of users to a vulnerable URL in\u00a0Citrix Workspace app for HTML5" + }, + { + "lang": "es", + "value": "Redirecci\u00f3n de usuarios a una URL vulnerable en la aplicaci\u00f3n Citrix Workspace para HTML5" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json index 2b456f25e2b..429022ad4e7 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6150", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:10.920", - "lastModified": "2024-07-10T21:15:10.920", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A non-admin user can cause short-term disruption in Target VM availability\u00a0in\u00a0Citrix Provisioning" + }, + { + "lang": "es", + "value": "Un usuario que no sea administrador puede provocar una interrupci\u00f3n a corto plazo en la disponibilidad de la m\u00e1quina virtual de destino en Citrix Provisioning" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6151.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6151.json index 224770243fb..653f732b0a9 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6151.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6151.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6151", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:11.013", - "lastModified": "2024-07-10T21:15:11.013", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS" + }, + { + "lang": "es", + "value": "La escalada de privilegios locales permite a un usuario con pocos privilegios obtener privilegios de SYSTEM en Virtual Delivery Agent para Windows utilizado por Citrix Virtual Apps and Desktops y Citrix DaaS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6210.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6210.json index 8b395c80277..acd72a77d41 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6210.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6210.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6210", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T03:15:03.550", - "lastModified": "2024-07-11T03:15:03.550", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Duplicator plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 1.5.9. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use." + }, + { + "lang": "es", + "value": "El complemento Duplicator para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.5.9 incluida. Esto hace posible que los atacantes no autenticados obtengan la ruta completa a las instancias, que pueden utilizar en combinaci\u00f3n con otras vulnerabilidades o para simplificar el trabajo de reconocimiento. Por s\u00ed sola, esta informaci\u00f3n tiene una utilidad muy limitada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json index 7773c9ad288..ddda139cad4 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6235.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6235", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T19:15:11.973", - "lastModified": "2024-07-10T19:15:11.973", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure\u00a0in\u00a0NetScaler Console" + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial en NetScaler Console" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6236.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6236.json index 062fe9fb007..36453f62083 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6236.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6236.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6236", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:11.120", - "lastModified": "2024-07-10T21:15:11.120", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service in\u00a0NetScaler Console (formerly NetScaler ADM), NetScaler Agent, and NetScaler SDX" + }, + { + "lang": "es", + "value": "Denegaci\u00f3n de servicio en NetScaler Console (anteriormente NetScaler ADM), NetScaler Agent y NetScaler SDX" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6256.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6256.json index 9b9d6180ff9..ea7b9947468 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6256.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6256.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6256", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T07:15:05.430", - "lastModified": "2024-07-11T07:15:05.430", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Feeds for YouTube (YouTube video, channel, and gallery plugin) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'youtube-feed' shortcode in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Feeds for YouTube (YouTube video, channel, and gallery plugin) para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'youtube-feed' del complemento en todas las versiones hasta la 2.2.1 incluida debido a una sanitizaci\u00f3n de entrada y escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json index 8964203acf1..c8a9931c322 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6286.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6286", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:11.210", - "lastModified": "2024-07-10T21:15:11.210", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in\u00a0Citrix Workspace app for Windows" + }, + { + "lang": "es", + "value": "La escalada de privilegios locales permite a un usuario con pocos privilegios obtener privilegios de SYSTEM en la aplicaci\u00f3n Citrix Workspace para Windows" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6385.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6385.json index 4e65490cc27..f5c42f40ddb 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6385.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6385.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6385", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-11T07:15:06.123", - "lastModified": "2024-07-11T07:15:06.123", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 15.8 anterior a la 16.11.6, desde la 17.0 anterior a la 17.0.4 y desde la 17.1 anterior a la 17.1.2, lo que permite a un atacante activar una pipeline como otro usuario en determinadas circunstancias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6397.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6397.json index b44637011d2..6d14da33820 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6397.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6397.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6397", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T04:15:05.997", - "lastModified": "2024-07-11T04:15:05.997", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The InstaWP Connect \u2013 1-click WP Staging & Migration plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 0.1.0.44. This is due to insufficient verification of the API key. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username, and to perform a variety of other administrative tasks. NOTE: This vulnerability was partially fixed in 0.1.0.44, but was still exploitable via Cross-Site Request Forgery." + }, + { + "lang": "es", + "value": "El complemento InstaWP Connect \u2013 1-click WP Staging & Migration para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 0.1.0.44 incluida. Esto se debe a una verificaci\u00f3n insuficiente de la clave API. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al nombre de usuario, y realicen una variedad de otras tareas administrativas. NOTA: Esta vulnerabilidad se solucion\u00f3 parcialmente en 0.1.0.44, pero a\u00fan era explotable mediante Cross-Site Request Forgery." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6407.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6407.json index bc3492dc733..abfbb1f44fb 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6407.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6407.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6407", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T10:15:02.277", - "lastModified": "2024-07-11T10:15:02.277", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json index edc5db367da..1e32d6be3a4 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6410.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6410", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T05:15:12.313", - "lastModified": "2024-07-10T05:15:12.313", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.8.9 via the 'pm_upload_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the profile picture of any user." + }, + { + "lang": "es", + "value": "El complemento ProfileGrid \u2013 User Profiles, Groups and Communities para WordPress para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta la 5.8.9 incluida a trav\u00e9s de la funci\u00f3n 'pm_upload_image' debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, cambien la imagen de perfil de cualquier usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json index c3595335002..8577c6aac6e 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6411.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6411", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T05:15:12.497", - "lastModified": "2024-07-10T05:15:12.497", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.8.9. This is due to a lack of validation on user-supplied data in the 'pm_upload_image' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their user capabilities to Administrator." + }, + { + "lang": "es", + "value": "El complemento ProfileGrid \u2013 User Profiles, Groups and Communities para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 5.8.9 incluida. Esto se debe a una falta de validaci\u00f3n de los datos proporcionados por el usuario en la acci\u00f3n AJAX 'pm_upload_image'. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen sus capacidades de usuario a Administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json index f5187b97d42..7de0083e666 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6421.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6421", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-10T08:15:11.720", - "lastModified": "2024-07-10T08:15:11.720", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker can read out sensitive device information through a incorrectly configured FTP service." + }, + { + "lang": "es", + "value": "Un atacante remoto no autenticado puede leer informaci\u00f3n confidencial del dispositivo a trav\u00e9s de un servicio FTP configurado incorrectamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json index e6d2757e54d..62151aa555d 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6422.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6422", "sourceIdentifier": "info@cert.vde.com", "published": "2024-07-10T08:15:11.970", - "lastModified": "2024-07-10T08:15:11.970", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data." + }, + { + "lang": "es", + "value": "Un atacante remoto no autenticado puede manipular el dispositivo a trav\u00e9s de Telnet, detener procesos, leer, eliminar y cambiar datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json index 1f12641ba1e..7209a4fde72 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6433.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6433", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-10T01:15:10.370", - "lastModified": "2024-07-10T01:15:10.370", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Relative Path Traversal in GitHub repository stitionai/devika prior to -." + }, + { + "lang": "es", + "value": "Path Traversal relativo en el repositorio de GitHub stitionai/devika antes de -." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6447.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6447.json index 5f4c869e7d9..9a3c70d10f9 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6447.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6447.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6447", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T00:15:02.113", - "lastModified": "2024-07-11T00:15:02.113", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FULL \u2013 Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard" + }, + { + "lang": "es", + "value": "El complemento FULL \u2013 Cliente para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro license plan en todas las versiones hasta la 3.1.12 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes, as\u00ed como a la falta de autorizaci\u00f3n y comprobaciones de capacidad en el funciones relacionadas. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios que se ejecutar\u00e1n cada vez que un usuario administrativo acceda al panel de administraci\u00f3n de wp." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json index d620cbfa313..b8e8957e262 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6501", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-09T20:15:12.470", - "lastModified": "2024-07-09T20:15:12.470", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:06:13.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in NetworkManager. When a system running NetworkManager with DEBUG logs enabled and an interface eth1 configured with LLDP enabled, a malicious user could inject a malformed LLDP packet. NetworkManager would crash, leading to a denial of service." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un fallo en NetworkManager. Cuando un sistema ejecuta NetworkManager con registros DEBUG habilitados y una interfaz eth1 configurada con LLDP habilitado, un usuario malintencionado podr\u00eda inyectar un paquete LLDP con formato incorrecto. NetworkManager fallar\u00eda, provocando una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json index e6db396e66d..09c8ae8f0f9 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6528.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6528", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-07-11T09:15:04.867", - "lastModified": "2024-07-11T09:15:04.867", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site\nScripting') vulnerability exists that could cause a vulnerability leading to a cross-site scripting\ncondition where attackers can have a victim\u2019s browser run arbitrary JavaScript when they visit a\npage containing the injected payload." + }, + { + "lang": "es", + "value": "CWE-79: Existe una vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\"Cross-site Scripting\") que podr\u00eda causar una vulnerabilidad que conduzca a una condici\u00f3n de cross-site scripting donde los atacantes pueden hacer que el navegador de la v\u00edctima ejecute JavaScript arbitrario cuando visitan una p\u00e1gina que contiene el payload inyectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6550.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6550.json index 8aaa4d7857b..ec0d3ff66a4 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6550.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6550.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6550", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T04:15:04.290", - "lastModified": "2024-07-10T04:15:04.290", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gravity Forms: Multiple Form Instances plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.1.1. This is due to the plugin leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento Gravity Forms: Multiple Form Instances para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 1.1.1 incluida. Esto se debe a que el complemento deja archivos de prueba con display_errors activado. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6554.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6554.json index fe49566b5d7..e0b34c5758c 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6554.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6554.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6554", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T04:15:06.387", - "lastModified": "2024-07-11T04:15:06.387", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Branda \u2013 White Label WordPress, Custom Login Page Customizer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.18. This is due the plugin utilizing composer without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento Branda \u2013 White Label WordPress, Custom Login Page Customizer para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 3.4.18 incluida. Esto se debe al complemento que utiliza Composer sin impedir el acceso directo a los archivos. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6556.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6556.json index 7fb79cb0a2a..46eb578bcd6 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6556.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6556", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-10T09:15:02.747", - "lastModified": "2024-07-10T09:15:02.747", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.10.8. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 3.10.8 incluida. Esto se debe al complemento que utiliza mobiledetect sin impedir el acceso directo a los archivos. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6624.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6624.json index 773a7d88627..5f54c9cc87e 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6624.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6624.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6624", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T07:15:06.697", - "lastModified": "2024-07-11T07:15:06.697", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed." + }, + { + "lang": "es", + "value": " El complemento JSON API User para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 3.9.3 incluida. Esto se debe a controles inadecuados en los metacampos de usuario personalizados. Esto hace posible que atacantes no autenticados se registren como administradores en el sitio. El complemento requiere que tambi\u00e9n est\u00e9 instalado el complemento JSON API." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6644.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6644.json index 39a83ec7e0a..f8d09459989 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6644.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6644.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6644", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T17:15:12.980", - "lastModified": "2024-07-10T17:15:12.980", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in zmops ArgusDBM up to 0.1.0. It has been classified as critical. Affected is the function getDefaultClassLoader of the file CalculateAlarm.java of the component AviatorScript Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-271050 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en zmops ArgusDBM hasta 0.1.0. Ha sido clasificada como cr\u00edtica. La funci\u00f3n getDefaultClassLoader del archivo CalculateAlarm.java del componente AviatorScript Handler es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a la deserializaci\u00f3n. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-271050 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6645.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6645.json index 17e2f559fda..9f46b2673b5 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6645.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6645.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6645", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T17:15:13.320", - "lastModified": "2024-07-10T17:15:13.320", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in WuKongOpenSource Wukong_nocode up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file ExpressionUtil.java of the component AviatorScript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-271051." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en WuKongOpenSource Wukong_nocode hasta 20230807 y ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo ExpressionUtil.java del componente AviatorScript Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la deserializaci\u00f3n. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Este producto no utiliza versiones. Esta es la raz\u00f3n por la que la informaci\u00f3n sobre las versiones afectadas y no afectadas no est\u00e1 disponible. El identificador asociado de esta vulnerabilidad es VDB-271051." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6646.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6646.json index dfbb6bc098e..41c32951f09 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6646.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6646.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6646", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T18:15:05.480", - "lastModified": "2024-07-10T18:15:05.480", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Netgear WN604 up to 20240710. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /downloadFile.php of the component Web Interface. The manipulation of the argument file with the input config leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Netgear WN604 hasta 20240710. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /downloadFile.php del componente Web Interface es afectada por esta vulnerabilidad. La manipulaci\u00f3n del archivo de argumentos con la configuraci\u00f3n de entrada conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-271052. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6647.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6647.json index 23684792919..f0d13c563c1 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6647.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6647", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T18:15:05.763", - "lastModified": "2024-07-10T21:15:11.350", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in Croogo up to 4.0.7. This affects an unknown part of the file admin/settings/settings/prefix/Theme of the component Setting Handler. The manipulation of the argument Content-Type leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271053 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Croogo hasta 4.0.7. Una parte desconocida del archivo admin/settings/settings/prefix/Theme del componente Configuration Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento Content-Type conduce a una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-271053. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6649.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6649.json index 01fe614e129..54bb36a9891 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6649.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6649.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6649", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T19:15:12.070", - "lastModified": "2024-07-10T19:15:12.070", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this vulnerability is the function save_users of the file Users.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271057 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0 y se clasific\u00f3 como problem\u00e1tica. La funci\u00f3n save_users del archivo Users.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la Cross-Site Request Forgery. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-271057." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6650.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6650.json index 8ff0031bf68..a981abd5904 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6650.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6650.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6650", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T23:15:14.930", - "lastModified": "2024-07-10T23:15:14.930", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this issue is the function save_designation of the file /classes/Master.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271058 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0 y se clasific\u00f3 como problem\u00e1tica. La funci\u00f3n save_designation del archivo /classes/Master.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross Site Scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-271058 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json index 137a2931245..ae01e204716 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6652", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T23:15:15.250", - "lastModified": "2024-07-10T23:15:15.250", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file manage_member.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271059." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Gym Management System 1.0. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo enable_member.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-271059." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json index 6f1ef2e9c4a..e75855a01aa 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6653", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-11T00:15:02.313", - "lastModified": "2024-07-11T00:15:02.313", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:15:10.147", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Task List 1.0. It has been declared as critical. This vulnerability affects unknown code of the file loginForm.php of the component Login. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271060." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en los proyectos de c\u00f3digo Simple Task List 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo loginForm.php del componente Login. La manipulaci\u00f3n del argumento username conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-271060." } ], "metrics": { @@ -62,19 +66,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.4 } ], diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json index 87004082717..f04684f6105 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6666", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-11T07:15:07.233", - "lastModified": "2024-07-11T07:15:07.233", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6676.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6676.json index 5ee5c550e3f..68162936547 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6676.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6676.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6676", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-11T03:15:03.787", - "lastModified": "2024-07-11T03:15:03.787", - "vulnStatus": "Received", + "lastModified": "2024-07-11T13:05:54.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in witmy my-springsecurity-plus up to 2024-07-03 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/user. The manipulation of the argument params.dataScope leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-271111." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en witmy my-springsecurity-plus hasta el 2024-07-03 y se ha clasificado como cr\u00edtica. Una funcionalidad desconocida del archivo /api/user es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento params.dataScope conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Este producto no utiliza versiones. Esta es la raz\u00f3n por la que la informaci\u00f3n sobre las versiones afectadas y no afectadas no est\u00e1 disponible. El identificador asociado de esta vulnerabilidad es VDB-271111." } ], "metrics": { diff --git a/README.md b/README.md index c4fc63416f0..1b7904dc019 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-11T12:00:19.301393+00:00 +2024-07-11T14:00:19.780454+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-11T11:15:09.920000+00:00 +2024-07-11T13:58:33.960000+00:00 ``` ### Last Data Feed Release @@ -38,18 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `0` -- [CVE-2024-6035](CVE-2024/CVE-2024-60xx/CVE-2024-6035.json) (`2024-07-11T11:15:09.920`) -- [CVE-2024-6407](CVE-2024/CVE-2024-64xx/CVE-2024-6407.json) (`2024-07-11T10:15:02.277`) -- [CVE-2024-6643](CVE-2024/CVE-2024-66xx/CVE-2024-6643.json) (`2024-07-11T10:15:02.650`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `253` -- [CVE-2024-23111](CVE-2024/CVE-2024-231xx/CVE-2024-23111.json) (`2024-07-11T10:15:01.830`) +- [CVE-2024-6385](CVE-2024/CVE-2024-63xx/CVE-2024-6385.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6397](CVE-2024/CVE-2024-63xx/CVE-2024-6397.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6407](CVE-2024/CVE-2024-64xx/CVE-2024-6407.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6410](CVE-2024/CVE-2024-64xx/CVE-2024-6410.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6411](CVE-2024/CVE-2024-64xx/CVE-2024-6411.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6421](CVE-2024/CVE-2024-64xx/CVE-2024-6421.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6422](CVE-2024/CVE-2024-64xx/CVE-2024-6422.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6433](CVE-2024/CVE-2024-64xx/CVE-2024-6433.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6447](CVE-2024/CVE-2024-64xx/CVE-2024-6447.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6501](CVE-2024/CVE-2024-65xx/CVE-2024-6501.json) (`2024-07-11T13:06:13.187`) +- [CVE-2024-6528](CVE-2024/CVE-2024-65xx/CVE-2024-6528.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6550](CVE-2024/CVE-2024-65xx/CVE-2024-6550.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6554](CVE-2024/CVE-2024-65xx/CVE-2024-6554.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6556](CVE-2024/CVE-2024-65xx/CVE-2024-6556.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6624](CVE-2024/CVE-2024-66xx/CVE-2024-6624.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6644](CVE-2024/CVE-2024-66xx/CVE-2024-6644.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6645](CVE-2024/CVE-2024-66xx/CVE-2024-6645.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6646](CVE-2024/CVE-2024-66xx/CVE-2024-6646.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6647](CVE-2024/CVE-2024-66xx/CVE-2024-6647.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6649](CVE-2024/CVE-2024-66xx/CVE-2024-6649.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6650](CVE-2024/CVE-2024-66xx/CVE-2024-6650.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6652](CVE-2024/CVE-2024-66xx/CVE-2024-6652.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6653](CVE-2024/CVE-2024-66xx/CVE-2024-6653.json) (`2024-07-11T13:15:10.147`) +- [CVE-2024-6666](CVE-2024/CVE-2024-66xx/CVE-2024-6666.json) (`2024-07-11T13:05:54.930`) +- [CVE-2024-6676](CVE-2024/CVE-2024-66xx/CVE-2024-6676.json) (`2024-07-11T13:05:54.930`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b3bcdc6504b..816b10952d3 100644 --- a/_state.csv +++ b/_state.csv @@ -84902,7 +84902,7 @@ CVE-2016-15035,0,0,5f6755d7b8954f99c8a59408f8f16acc9729e5934625607c92e47840a2d0d CVE-2016-15036,0,0,07076d7b6b10f11ba8defba36693bfe2d329aebd04146af9943b1b990af8b465,2024-05-17T01:08:11.543000 CVE-2016-15037,0,0,e0996f3d56e274837426785f5955d0b2f7859ba2600e75ebae6c454114cc0a21,2024-05-17T01:08:11.653000 CVE-2016-15038,0,0,2c93ba0fce36fab919c92b8d09cb4236abbe9a996dbd0e62367874b5ee0f8d0b,2024-05-17T01:08:11.777000 -CVE-2016-15039,0,0,9604cf9c3941b34b36c99fe95e25c2dda5e41eed40c9990b4f05e29740965d89,2024-07-11T03:15:02.270000 +CVE-2016-15039,0,1,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000 CVE-2016-1504,0,0,e4a5917b190636ab893bfc336d7dce867e27774f351fdae2d20038ff8cc1cac6,2017-09-10T01:29:11.687000 CVE-2016-1505,0,0,603189ae235a59230e4b76c2a9840be41f6129fa2273d823a3008d11b5c9719c,2016-11-28T19:59:55.070000 CVE-2016-1513,0,0,d5c8130dd11ed8123fd26cdd3a19657509909f00f1eaa4a6cfd6e8ec49e54760,2017-09-01T01:29:04.507000 @@ -215077,8 +215077,8 @@ CVE-2023-2111,0,0,d12d5f611db0242bd01d273fc25ed4662a5b74f898d00cba13175efbdabffa CVE-2023-21110,0,0,448ddc060967179af5f5445c64778306c0c9a48146f8ea2fee78ebb2928a75ff,2023-05-24T00:17:35.097000 CVE-2023-21111,0,0,d60f776dfb5277938c8722afaebc3eb264ed711fa330444195ba603c0daaff4f,2023-05-24T00:17:46.907000 CVE-2023-21112,0,0,ee13324abf0bee556eff0ebb74c1e3be9486125c43aac96832142a9bcc1f3d24,2023-05-24T00:17:58.943000 -CVE-2023-21113,0,0,a96e1f44527e5e5263c03600a2a74315cda6fa67ab11b3006a19bff41fefabfa,2024-07-09T21:15:10.717000 -CVE-2023-21114,0,0,5283f68e3bc8df01424866d2da044312256c0ec7332f95468d07f7f2e4c5b920,2024-07-09T21:15:10.803000 +CVE-2023-21113,0,1,e33a8e1bd748d106b05f0015e5d19fc248022d081f864d70b8b9d72d234394df,2024-07-11T13:06:13.187000 +CVE-2023-21114,0,1,3e2df9d97c140daf83c88d8dfcfaa1f66ada4aa6ce27284c95d2768b9e9d76dc,2024-07-11T13:06:13.187000 CVE-2023-21115,0,0,5f0194f44da9d9dffdb3c52699125e67e44517f46e47e4143ed7d72707ea546d,2023-06-22T20:53:57.617000 CVE-2023-21116,0,0,5bb72a77f614dd0419d663f693bea7386f42d3fd276c840566406d377360d6b2,2023-05-24T00:19:34.900000 CVE-2023-21117,0,0,75076827c928422e1c5aaeadd94174d05b64dbe6000f0904a8c2f73aa31b477b,2023-05-24T00:19:55.867000 @@ -224142,12 +224142,12 @@ CVE-2023-32462,0,0,eab2cc777f5f85ff8761fc5ee995015987757ab93fcac3a65c326245e954e CVE-2023-32463,0,0,9750a40673a889b305f0c4be828913a0f978fe411a5f873158462587e5fdf8bb,2023-07-05T18:33:55.533000 CVE-2023-32464,0,0,5fe2a9e1b1f81ef3f88c0262e22a6a1c5106aec3f427b2176f1d8e930059f067,2023-07-05T18:31:27.907000 CVE-2023-32465,0,0,e56dba3ebf14206bdb73c754f1f8af12f0ace8b2e1fe4dc4b333a99274e40b9d,2023-06-27T18:39:23.987000 -CVE-2023-32467,0,0,a25680ad6ae08e71f4262c16d4713695855e33ba80f5496ab28ac1e892b3a9d2,2024-07-10T03:15:01.870000 +CVE-2023-32467,0,1,92dc670a37cbc195f9aee3f2f699c2fc979d516f1a92fbab736ae2a84445b2ab,2024-07-11T13:05:54.930000 CVE-2023-32468,0,0,95553f3bae45678b28547c1e48060456ffe7d76cdf483b9ffbc527fabbd48ded,2023-08-03T18:23:50.197000 CVE-2023-32469,0,0,c64f718d771da097b11fa482f724641a50f58bd141ecdac8ef1bd9ca3a93bed7,2023-11-29T19:49:42.947000 CVE-2023-3247,0,0,944c7a9512d0302f40ba18a4d82c1511a534aceb1c4dea9f4a52b787f5bc6104,2023-08-01T16:38:09.033000 CVE-2023-32470,0,0,cf1fb93bb33344b250fa425962be9282d4e9421bfa05744d38e6fb334ebf28ff,2023-09-13T14:37:24.530000 -CVE-2023-32472,0,0,1af3190485164be3937ff840a09b019159a70d23594e067f9a9500e022fb2c0a,2024-07-10T03:15:02.193000 +CVE-2023-32472,0,1,17c2725f723be369591982ed957fd026847faf3ab703e66da6749f40fa5279fc,2024-07-11T13:05:54.930000 CVE-2023-32474,0,0,14a7699c96745d2416031df6a87cf303ba86dd81dec884626035282f55099052,2024-02-12T21:37:18.687000 CVE-2023-32475,0,0,8c9b75a20cacd369537034b8fdc6625a4373f1930eb22b83c7d55f78ffd4aa79,2024-06-07T14:56:05.647000 CVE-2023-32476,0,0,f67bfea26297a4cf8c38d5da9786d71b4b8bf1feb4789219a97bb09d5d395732,2023-07-31T17:05:59.917000 @@ -225232,9 +225232,9 @@ CVE-2023-33851,0,0,8db788edf6a5198f3e8e5896114b0940f7896f676a9d0dab45d0b9995fc2f CVE-2023-33852,0,0,9cade17d8693f1f4f6baf9b9d4a1a8123b0b3429328184d9655006f7fa78cf0e,2023-08-29T04:43:06.033000 CVE-2023-33855,0,0,17ac4bf5200859893273c798dc7f507d8e5d9d64163eb854ccb4f56258ca20de,2024-03-26T17:09:53.043000 CVE-2023-33857,0,0,009b629a678d495b5ca76bd9ed766e57d21f04b1fd5cac55c82232f187a28b80,2023-07-26T20:04:15.373000 -CVE-2023-33859,0,0,d9b8f2d78ddd2c2f63c9fa1203562f99fb0036bcf9c1dade9778cc4e934aca6f,2024-07-10T16:15:02.823000 +CVE-2023-33859,0,1,c7cc13c3bc19312b4eaa2b099e45cecd963259cc049d6c464b855eccb359a400,2024-07-11T13:05:54.930000 CVE-2023-3386,0,0,872a3b5c10573eee32389d7c2bf09336080231a152241c899e232932e7ac2ac3,2023-08-11T16:11:22.257000 -CVE-2023-33860,0,0,d84116e95cbecdc9b253da12cfd06a4e747e75d29410fcabaf9a88cd782a3005,2024-07-10T16:15:03.060000 +CVE-2023-33860,0,1,c93725535a9bcd2c5b529956a43c8b730be8a858d9dd2aa0f8db3c7bbd5fe8e2,2024-07-11T13:05:54.930000 CVE-2023-33863,0,0,bcc6ceec655946e02a491efce99a4793246bd9fa7abf6fe4628bce4c635fc35b,2023-11-25T11:15:17.060000 CVE-2023-33864,0,0,9481dfccd6fe8fdcdd0fcd5f02ea2fabd7fad2be5bcb7372ae3096a97b3c6781,2023-11-25T11:15:17.167000 CVE-2023-33865,0,0,aba50454b3ae1b2e832808aadc91ca844709ba77db2f1cee74f3d27e5665bb50,2023-11-25T11:15:17.330000 @@ -226062,7 +226062,7 @@ CVE-2023-35002,0,0,fe12ccb8bd97235210aebea5be03bce6254267bf1013ba6d79abbce08247e CVE-2023-35003,0,0,4135b9bdc89a20c0a5b2dafe212a17a0f9cd213c7f1250dbab5a1bb73e6f93a8,2024-02-14T15:01:51.137000 CVE-2023-35004,0,0,d259e19e9f7a9fba09237442776813d3786c9bc18124ea7c0d957372aafcd7f6,2024-04-09T21:15:08.400000 CVE-2023-35005,0,0,def0a84bcddaa69534d8f10559173ed218f141a47d49dd319c3a3169cd9b94a4,2023-06-27T09:02:07.793000 -CVE-2023-35006,0,0,29a9295ec1f5379d89f66171c76d026eda121d1ff9bd98d650a887a449b8c984,2024-07-10T16:15:03.300000 +CVE-2023-35006,0,1,843f81e8cb059793ea8530c64cb22aa7c97430cb87594f70ab3476ec1d0a2b10,2024-07-11T13:05:54.930000 CVE-2023-35009,0,0,4109f92cb7f04882600b2a8c379d296f7fcfab4968ecdf01419b719c21d0bdb6,2024-06-21T19:15:27.300000 CVE-2023-3501,0,0,c9247f16d40d69a821ba4e49f3680c600256e23f0493f65695c4e557d0faf63d,2023-11-07T04:18:51.230000 CVE-2023-35011,0,0,dc06ad65c66503868c60f22446a7b38facc47e1cc19d43996ae8e169ec4d9e0c,2024-06-21T19:15:27.467000 @@ -237314,9 +237314,9 @@ CVE-2023-5079,0,0,08ac6672159acf69cea4333ef87da7c32cafd59333c06b74d19b42baa7321c CVE-2023-5080,0,0,6a142fa9fe4d669768c0073981351de1258996b6b98c92dd7c3370c182d5051a,2024-01-26T16:02:33.997000 CVE-2023-50803,0,0,e0245185683406393930132a94b475da6a0b1d1d07df0fd68bc97ce9d56e1e90,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,75c8b32f1c902851b302714bc7a121b33ef1436156799cadcb21e4914ed2667f,2024-06-27T16:42:15.310000 -CVE-2023-50805,0,0,8dd1e941d7c9b6e36e47da2a058defa3610df8951ef7209ed86dba5473bd1d9c,2024-07-09T19:15:10.590000 -CVE-2023-50806,0,0,08fb31c86e3ce25a5f1615e2e170472a324467b6095229878da6949af57b0306,2024-07-09T19:15:10.820000 -CVE-2023-50807,0,0,8f679fff5f64af798b971e3d74d674608065311a8027b0cd5200b56b2b714cbe,2024-07-09T19:15:11.020000 +CVE-2023-50805,0,1,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 +CVE-2023-50806,0,1,3547c11b59f1afe32844b435d6c53cf2a17d1394d992f9af5af7f027196a3108,2024-07-11T13:06:13.187000 +CVE-2023-50807,0,1,670af15057c6d47869199992423ff86549ddb3071bc2a69df366817727a5452c,2024-07-11T13:06:13.187000 CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6db7e,2024-02-13T18:23:02.393000 CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000 CVE-2023-50811,0,0,e4d21463d439be20b918caa6cf8d80372ece22f0ede7a7aef6305c4c982019a5,2024-04-29T19:52:21.503000 @@ -240294,7 +240294,7 @@ CVE-2023-6809,0,0,da849ebc66bf4be9594f5a16c6489da06b73ea4d1114ad0ea42cbcbd1d5557 CVE-2023-6810,0,0,3101b378ed04a5c8247ef1debed918ebc9eb8103dd1b234528b91dafd5921a75,2024-05-07T13:39:32.710000 CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a92,2024-04-11T12:47:44.137000 CVE-2023-6812,0,0,1361f65d99954b70532606b17569527f5effc0868c2105952fcff6b7c6c97e71,2024-05-14T19:18:31.490000 -CVE-2023-6813,0,0,35e6e83ae306cde57ed354c43ffc3830381e1b47b76395d07f3d192a286cc390,2024-07-10T08:15:10.760000 +CVE-2023-6813,0,1,b99fbb5ab6b0c24f4fda5f925d7009e5ae7879f495bb6a62d91540b30046e899,2024-07-11T13:05:54.930000 CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000 CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000 CVE-2023-6816,0,0,cca41eda4debf1a60ab4b1843bc845963914c04ca252d62c2bb38527b5d55418,2024-05-22T17:16:09.970000 @@ -240518,8 +240518,8 @@ CVE-2023-7057,0,0,1200510e25362858ed532b009a0e292074be393ad4f360e521173379910b5f CVE-2023-7058,0,0,cacc9df667e8c882e0e32cb89b832ec7a6fbda5ca7d49b21326dc9e382fd62d2,2024-05-17T02:34:07.313000 CVE-2023-7059,0,0,428e8509ea25f5421df9211fc4410eb4e2d51218db48152cdb8a8b9d12a78f60,2024-05-17T02:34:07.417000 CVE-2023-7060,0,0,870c4c6f56986f33349af68dd953c9d20d9666a23a3fcc4c635253c7bfdfd579,2024-03-17T22:38:29.433000 -CVE-2023-7061,0,0,0074b8acec75e6ed52df552e0f650d32e542842bbb8ec44d3bdf4349cb116483,2024-07-10T02:15:02.740000 -CVE-2023-7062,0,0,9bf8e86f5d80c973b0f51f3d6940b8f42028882ecee455266abc92588cd34a85,2024-07-10T02:15:02.960000 +CVE-2023-7061,0,1,0c485bb68b8ed35baf8a5dbf129c882dfa3853800295cb5cfc6582a753dca55e,2024-07-11T13:05:54.930000 +CVE-2023-7062,0,1,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c3d,2024-07-11T13:05:54.930000 CVE-2023-7063,0,0,b4ea8b21168c95c8af14241fc9e5a2534b49b7e49280bde929827672bda636ed,2024-01-30T23:02:10.287000 CVE-2023-7064,0,0,7f4540fc1350736b00563486d137005eb84965394302489d22eb2baa20f29e6c,2024-05-02T18:00:37.360000 CVE-2023-7065,0,0,5ddd00584391a648b0a10896ab6d0c67d902e56666c7f70420106fb328c88b9f,2024-05-06T12:44:56.377000 @@ -241206,7 +241206,7 @@ CVE-2024-0615,0,0,10e9b95e3b14afa334aa502fa51e6d881bb541bea334f73849a9a72d161170 CVE-2024-0616,0,0,0addefee1aa97db5b2ed2cb50e129966308587e5be304e347c0e51313f5e0d1c,2024-02-29T13:49:29.390000 CVE-2024-0617,0,0,2b29c9dcb902adb6d7fa2a7239592f59172aa71b48eb580467357783ec488280,2024-02-02T05:07:58.277000 CVE-2024-0618,0,0,d2f3e36418148fff4d6561d37ee90895c751d19c805420890718b517a62e3679,2024-02-01T04:15:46.393000 -CVE-2024-0619,0,0,928dca9c107c344c06ea039e7bf4ba4b2fda5bead1e913a1dc7213b3548dac84,2024-07-11T04:15:03.247000 +CVE-2024-0619,0,1,8b583f82d82d3a290e686ef05e05eba1f1a5eb74d442bb753f06735dcb259b9a,2024-07-11T13:05:54.930000 CVE-2024-0620,0,0,82d1aec1f4e92e94a4b790d50d4fef13f8f0f51914933146bb5433950dc11be5,2024-02-29T13:49:29.390000 CVE-2024-0621,0,0,7c096da1f0b55d356c7cddd509bb1318b902c746a7d193746f1ae47268e11400,2024-02-29T13:49:29.390000 CVE-2024-0622,0,0,e186536dcc4d5eb54c215571bac19acf437efbeb21d4ea8cb00afffb19198b17,2024-02-20T16:15:08.007000 @@ -242325,7 +242325,7 @@ CVE-2024-1841,0,0,39b2aee15bd218c5f0ab2f7c5cc3fd949f7c8705e3573f0315e5f3107f7c80 CVE-2024-1842,0,0,0e20681dfde5286f0a06faaec929b1d3b2d16095090d24a3b41be5a6d299e939,2024-05-02T18:00:37.360000 CVE-2024-1843,0,0,381f1dba7504e2dd4844c9284f47a0574c276b6a0dafd5dcab8a395be3a46549,2024-03-13T18:15:58.530000 CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b5116,2024-03-20T13:00:16.367000 -CVE-2024-1845,0,0,65a665498588e4fcbf29db2f750e852102f0a98dbb8c9f38599c7757f1366aab,2024-07-11T06:15:02.613000 +CVE-2024-1845,0,1,86ddd66d130a34445efe74ac9719a4ec429eec387ae4090fddf5a7a5cf159ae3,2024-07-11T13:05:54.930000 CVE-2024-1846,0,0,ef5b5743243fde26f19bda8d3441988876e0bebaf27eaa4fdca21b8d69d3b82c,2024-04-15T13:15:31.997000 CVE-2024-1847,0,0,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000 CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000 @@ -242683,7 +242683,7 @@ CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889 CVE-2024-2043,0,0,460bc52876e8486363c6c006eee49a91636701c262b01e4f4016a237e9fb24ba,2024-05-02T18:00:37.360000 CVE-2024-2044,0,0,3d73c6b2cc04bd01f48c15467e360d6d6689d47e2b89d6d93430f2c98bfeca1a,2024-03-23T03:15:12.063000 CVE-2024-2045,0,0,72838b74e2668b744754639ee1018477ba3696de5929605fbc709ccd12df2c15,2024-03-01T14:04:26.010000 -CVE-2024-20456,0,0,2ad11495904948556cd49d4c6812087327f813906fc6087bcbf334fbad357714,2024-07-10T16:15:03.703000 +CVE-2024-20456,0,1,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-2047,0,0,f6af9a907c75b30af19c751de94b50a261c712e37b1ab2431a6d631b3cdcbf81,2024-04-01T01:12:59.077000 CVE-2024-2048,0,0,05426595deab542816a9148a3f314c11d3c8ee92e0bc66aaa695588f4419f428,2024-06-10T17:16:25.067000 CVE-2024-2049,0,0,45a8a24699fa22957aeb55c579059bc5f371d9047c6689f63550502f48fd731a,2024-03-12T16:02:33.900000 @@ -242829,11 +242829,11 @@ CVE-2024-20778,0,0,e976407642c5bb35b6116530469966aa2101f0b51f16cbc18fee45e534c89 CVE-2024-20779,0,0,6fd5665d768cb852ea47732221a85e067d0080ad0de1ca2d2241cb625c59d9ad,2024-04-10T13:23:38.787000 CVE-2024-2078,0,0,1f3625edc40ce981dfa798326c49d364352417c97edbdeb08f2797c1a0a609b2,2024-03-01T14:04:04.827000 CVE-2024-20780,0,0,ec1b341950c30681e570ac487b080ed639019cf375cf8a334e95e6a235124aee,2024-04-10T13:23:38.787000 -CVE-2024-20781,0,0,0818cef213762ad3961da5f09a494e9deee984da772a845450a9b55634fd109c,2024-07-09T20:15:09.290000 -CVE-2024-20782,0,0,f71839756168312343df4794aa215597c925b624577515ad3f409b1e8fa66beb,2024-07-09T20:15:09.510000 -CVE-2024-20783,0,0,d7165f7500c3eb8ed4586071b75159d566d8d50ad5717636399067f5738a3b23,2024-07-09T20:15:09.727000 +CVE-2024-20781,0,1,c9381d7a8e128d589956bae43d6c08e975bb0ceefd2abe2f5b027bd7c4ddda5b,2024-07-11T13:06:13.187000 +CVE-2024-20782,0,1,6352ae3607d0778a124cc19bd8f3907469984d87f1bf4ddafc8da07bec674e35,2024-07-11T13:06:13.187000 +CVE-2024-20783,0,1,e3c41da7cac451d23d3d69c35b57756c6d529567e5b01e9dff346a1f0aa2eabb,2024-07-11T13:06:13.187000 CVE-2024-20784,0,0,1a11c22dc3d5493786ff44d6b5bf7f743e8a25aa9204c11602f758d61ef5a078,2024-06-14T19:30:15.503000 -CVE-2024-20785,0,0,0e89b36bc7d67821cfb026b11a571b17da415724fe0ef315058c30e4e6c19332,2024-07-09T20:15:09.943000 +CVE-2024-20785,0,1,72382244c2b06df64a4bd267e62eecf7964d1ef3608fa1568e1322b65776363b,2024-07-11T13:06:13.187000 CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000 CVE-2024-20791,0,0,6ae32de89b08b66010819c96a63cf49f80a9e718d1409ae2a6de7b882e299c4b,2024-05-16T13:03:05.353000 CVE-2024-20792,0,0,a8a71e807ddcdd15b2aca7fa7925ba09db515fd84458ec98a3300e57fc319478,2024-05-16T13:03:05.353000 @@ -243327,7 +243327,7 @@ CVE-2024-21412,0,0,15fcbc84e561d705d3329fe36d52ac6f3132d8a4e1421d2eae50dca16c535 CVE-2024-21413,0,0,947151b0ad9489675859c46209ccae83bb837b04e5bbe77ba7b528af79662a39,2024-05-29T00:15:34.720000 CVE-2024-21414,0,0,e662fe180a11a9ec80fb61225a526100cc15d391e196615a4ebbe28715d59a0d,2024-07-09T18:18:38.713000 CVE-2024-21415,0,0,2c1b45a293d43cea991427b75edccc4f765ea544651132f15fdd7ff3af783122,2024-07-09T18:18:38.713000 -CVE-2024-21417,0,0,d291cc463cdf4cfe75406a24da0560a35864117ad4610d4e416277a2a78507ea,2024-07-10T00:15:03.027000 +CVE-2024-21417,0,1,b49ef9a4a1641236078c066f567251303fbb25636e983b46ec501a6c4a0c9cb3,2024-07-11T13:05:54.930000 CVE-2024-21418,0,0,6fbe65289f7d87b34991c17b12db87eb2d8f0ad5b10086c98e42aa516bf11cfa,2024-05-29T00:15:34.853000 CVE-2024-21419,0,0,029987aebbeea99b8cf3ad95df60d5cac83c3ab05805c0fcb8848b83a1e3ed9f,2024-04-11T20:15:30.777000 CVE-2024-2142,0,0,775c587e23838eccc1f05d84b61c4d1b983fbea738158d2b5672ec0ee3392f88,2024-04-01T01:12:59.077000 @@ -243430,12 +243430,12 @@ CVE-2024-21518,0,0,01d6f2ab49352480cf19019c7c7e4b7fa996341e6363bf5c2aff55de9f9b4 CVE-2024-21519,0,0,bf9643fa21c9312ad7f9de95a92dae918c8943fd492bc976b0551db532a526a1,2024-06-27T13:15:55.027000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de015,2024-07-04T15:15:10.210000 -CVE-2024-21521,0,0,85556ed30bb818f4b10947d4d7f66ecbff56f255cb320d19cd92e8f1f7f387bb,2024-07-10T05:15:10.653000 -CVE-2024-21522,0,0,69c60879aa412e2427f87b8772987f4e48d03aa689dacc3a482a7f3fba250832,2024-07-10T05:15:10.953000 -CVE-2024-21523,0,0,baae3f762cdf62be03db6acb8325ef3a756ce462acdefc879818b2214b862424,2024-07-10T05:15:11.153000 -CVE-2024-21524,0,0,8b9dcb1ba661c755e4d34aa2915ea6eaaf4d42672f752dc43a6364a3218cce36,2024-07-10T05:15:11.340000 -CVE-2024-21525,0,0,b60a22db1c944147a04cdb1737d3e1bd999506a39bb235a8e6dbd63a06e225f1,2024-07-10T05:15:11.530000 -CVE-2024-21526,0,0,a1e06bba329804d521f1721bf5b3949b76e7319fffd9870383a8e7e8eef3a496,2024-07-10T05:15:11.733000 +CVE-2024-21521,0,1,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000 +CVE-2024-21522,0,1,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000 +CVE-2024-21523,0,1,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b829f,2024-07-11T13:05:54.930000 +CVE-2024-21524,0,1,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000 +CVE-2024-21525,0,1,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 +CVE-2024-21526,0,1,b5b349f1c409b3918b1d786c4e9a50aaa51ca5024ddd9e0451d91d7949f4823e,2024-07-11T13:05:54.930000 CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae6543935d,2024-05-17T02:38:05.063000 @@ -243625,7 +243625,7 @@ CVE-2024-21827,0,0,812c74c9ba8d71849167f2a6716a320f7245bf6b8b90ac7020ded0508bcc1 CVE-2024-21828,0,0,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000 CVE-2024-2183,0,0,d2fc5903dd12fc59dfdda0bd9c528b50368a6c295b02593ecad0115a711b3755,2024-04-10T13:23:38.787000 CVE-2024-21831,0,0,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 -CVE-2024-21832,0,0,3ccaf50268338179c07121be1423bb994c411f1c802dfcd11156eeee2c565a8a,2024-07-09T23:15:10.397000 +CVE-2024-21832,0,1,b93e97c977c1ff9d86228ddc2f96fb82351ac437a6a7246217b6f2ee1634b627,2024-07-11T13:05:54.930000 CVE-2024-21833,0,0,ceb241ba49765ec41e1f5c93de46c788d7e9b7c1ad1c8402dac89dd59fbd6da9,2024-07-03T23:15:02.253000 CVE-2024-21834,0,0,adfdacc4c0ad7fb798fc6feea300b691936e258291634c57f962c7e425f92b08,2024-04-02T12:50:42.233000 CVE-2024-21835,0,0,fb0916fa42539929733a385b3b3838d919de0dc39f62f3f217cea291341fe53a,2024-06-07T17:48:28.307000 @@ -243705,7 +243705,7 @@ CVE-2024-21988,0,0,6d98a65c82c7e5efbca9ec9e46767cf60b6e116825eaf3026bae79fbf289f CVE-2024-21989,0,0,ff0faa596af54ed5ae8099ba628458de998e57d9e93fbba155c9de7f27b73b08,2024-04-18T13:04:28.900000 CVE-2024-2199,0,0,31e85cc8f708ae33d11caf88fb8f95bb65ee9b7c3962b91a3deeeb287e629ff4,2024-07-02T23:15:10.617000 CVE-2024-21990,0,0,0b4ba6f896ec2fdb9c7522d6449f5c0166971932fa2ba6c5f18beb5ae9a5b96a,2024-04-18T13:04:28.900000 -CVE-2024-21993,0,0,fb22ff726a417271c0100b072bf14d498172fbbdc3c277ed2862c5562dead123,2024-07-09T22:15:01.990000 +CVE-2024-21993,0,1,bec1cb1a899f83d01555cece7d7239988767e734e499b33253776f6b7390f928,2024-07-11T13:05:54.930000 CVE-2024-2200,0,0,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000 CVE-2024-22002,0,0,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000 @@ -243721,7 +243721,7 @@ CVE-2024-22014,0,0,79bf9edaea087eb4739d179f2ed69981a390cf89f67c6fe45526acb6cb488 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,72bb3341c866069974fe863b6c9e848e25809f5f0697d51cda8a3c348c9671f4,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,eda129adeae4ecfa4b275b7bc6bb5638800d036cf47c85fe2baa6a803f743c01,2024-06-10T17:16:18.773000 -CVE-2024-22018,0,0,7160afa175c77f9c19e5c6946a971e12ada40c9ea8f00afb7e60f24cd5583c73,2024-07-10T02:15:03.160000 +CVE-2024-22018,0,1,758e098553841aa4e95907daba98817e80b75855924331359240d59251bae8de,2024-07-11T13:05:54.930000 CVE-2024-22019,0,0,49190872720c4c119c607cdd3cd1206179dcd2b84c9cd0a4595a1040743a11fe,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000 CVE-2024-22020,0,0,56e2cf9f05f5e347798c1cc85e525de5d4d601bc1bbfb2ffd2b6893095268df9,2024-07-09T18:19:14.047000 @@ -243943,7 +243943,7 @@ CVE-2024-22276,0,0,84ef821328733e6d2023f2ca9295825f754ca59ef6a3ea10fbc3d2996560b CVE-2024-22277,0,0,df1070c2ee97a5142cf7d246346e6f4b881b400ac527c2ddf38c129b4d9a4ead,2024-07-05T12:55:51.367000 CVE-2024-22279,0,0,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000 CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000 -CVE-2024-22280,0,0,5a0812bb8d837b7f0eb6dcab564f7ea2fd3ea1cb0769c5ef94a84d14f9be6990,2024-07-11T05:15:10.123000 +CVE-2024-22280,0,1,1f2d2cef600b06f4df8e32e8c31549d4dd3cfb8c940eba142dae42796a085875,2024-07-11T13:05:54.930000 CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000 CVE-2024-22283,0,0,f9f0bb31955cdc5efe0fe68bd93a1968461b937d4826bd6ada9de29ff0f15691,2024-02-01T04:13:41.033000 CVE-2024-22284,0,0,6bdde6ee668a94e34697b63e60243d3bba5e1198be225d5e35c53bee953243fe,2024-01-30T17:43:02.180000 @@ -244023,7 +244023,7 @@ CVE-2024-22370,0,0,13df6251176042b21f4cc7eccb2248918a53b76e3179e3ca6bd1e1e82fbd0 CVE-2024-22371,0,0,4bde0f360e03417565b1053dc8e4d6f3c0a609d9b4bebdd79ac08f66edab383f,2024-02-26T16:32:25.577000 CVE-2024-22372,0,0,b1b41923d4d5e3a62f9aafb5eb6f291d0486263d2806b04c051fd8c8c54bfad1,2024-01-30T22:17:49.987000 CVE-2024-22373,0,0,335e31983512bb047b0b0675b05e42b4dcf880eb56ab5a7f58f3d5a0599ff4db,2024-05-05T03:15:06.740000 -CVE-2024-22377,0,0,5d263cddbcc652aa7301534661273bd617b90a2d5f5702d976739800e17d57b6,2024-07-09T23:15:10.620000 +CVE-2024-22377,0,1,b693b4fc319745a0043eeca746a2e33454d1287a4cd84b198ef91e6fc51b0780,2024-07-11T13:05:54.930000 CVE-2024-22379,0,0,e7e4dc7efc34442a801dda04ff6376e66c93de9b5fc822840ad69aed866a77f9,2024-05-17T18:36:05.263000 CVE-2024-2238,0,0,afd0d461b63ffbf0cdec79f63894ae69a7d59a0b22846a34ff25432e2a9728b9,2024-03-13T18:15:58.530000 CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea1b7,2024-01-30T22:14:24.967000 @@ -244032,7 +244032,7 @@ CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a376 CVE-2024-22384,0,0,22d927b3eda23e776929f3eee7e12761fd0a5866a79fd2edf20febc4242f7c70,2024-05-17T18:36:05.263000 CVE-2024-22385,0,0,83fe63d5df6ef3c9cc40e2c081e8f947a095c2af1ce72eddf83967c3653b9c45,2024-06-25T12:24:17.873000 CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe22d,2024-02-10T04:05:26.383000 -CVE-2024-22387,0,0,bf21f80cb80b4c0091372cafb487fe2a01fe7cd239110f85e412b3e8d7b72752,2024-07-11T03:15:02.660000 +CVE-2024-22387,0,1,1a95a570ac3588db4a5548100f806e18e2b84fae1da8d1437c4ebbe7d29dcac3,2024-07-11T13:05:54.930000 CVE-2024-22388,0,0,c4d155a1650cf8d6f3af35aa33a3624b01d880288d632870cec483f12be1e88c,2024-02-14T20:59:09.660000 CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000 CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000 @@ -244107,7 +244107,7 @@ CVE-2024-22472,0,0,4ab7182b892f9b0334d117f1f559304c9baa050ae6c095fdd3688919803d9 CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000 CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000 CVE-2024-22476,0,0,60113de5203fd0482e93e1b4831aae6a8481d7af395b44816e328a4839c1a542,2024-05-17T18:36:05.263000 -CVE-2024-22477,0,0,e48880ed8fe90e1763b01428145262a29620a10b0143cd38493d03ccd68c10bf,2024-07-09T23:15:10.827000 +CVE-2024-22477,0,1,241f0861df618e15c75cd88b1d2903619d3fa8ef2657b7ce8dd89b03011e7932,2024-07-11T13:05:54.930000 CVE-2024-2248,0,0,374ae133749e87c1bfc3e3b06f3536538020f4728090035fd4ef183cc4a5c8dd,2024-05-15T16:40:19.330000 CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000 CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000 @@ -244354,7 +244354,7 @@ CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000 CVE-2024-23110,0,0,40db7ea63c02569a478cfc98b25fdb6760380e0a27b39916117e071a6b408f79,2024-06-13T18:36:45.417000 -CVE-2024-23111,0,1,2cfa2f8b8afa1bf20c1c806dd7eb96994092a053e5cbd3c5b4428a3b821c9455,2024-07-11T10:15:01.830000 +CVE-2024-23111,0,0,2cfa2f8b8afa1bf20c1c806dd7eb96994092a053e5cbd3c5b4428a3b821c9455,2024-07-11T10:15:01.830000 CVE-2024-23112,0,0,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000 CVE-2024-23113,0,0,29903cf0008dd4023f7698dfe9b07a61d8c5e19cfdea1fb0ce14ef659e7383ed,2024-02-22T15:33:00.970000 CVE-2024-23114,0,0,184fa653e4551a8698139895eb4d05d830e4b2d2a73606f2e94ea8d7330a5675,2024-02-20T19:50:53.960000 @@ -244430,7 +244430,7 @@ CVE-2024-23190,0,0,add17161c7c8505b6ba715b4898e70540bf15ecced41ee84c2b2e0388a683 CVE-2024-23191,0,0,459948535d54516570f8d837aea6f84683ce700a59124af1293fdc8518256e81,2024-04-11T11:15:48.497000 CVE-2024-23192,0,0,ddfbef4409196a7a3eeb03bbc2422d0e54ca57b797a5b47e231d14cc76bbe3c5,2024-04-11T11:15:48.570000 CVE-2024-23193,0,0,9ed5265a66f9c70d7ccff4abeefe790c7cf0947a268e6262d972b6cd9f8a8bce,2024-05-07T01:15:06.497000 -CVE-2024-23194,0,0,88cab5f7387bdcc0a330bccdccea9c479a430a477483182a883d92979bb37a33,2024-07-11T03:15:02.903000 +CVE-2024-23194,0,1,089c2460385496ae22f7a90553a23720c6ebf4be452b1a50dfaeb1dc5b6ea1ab,2024-07-11T13:05:54.930000 CVE-2024-23196,0,0,916695e8de6ad88a7eb739e09a11651ad9458fb3044e054e85a4e9fe2ce054c9,2024-02-10T04:06:14.577000 CVE-2024-23201,0,0,0f8fb4c7d86a834d8d9bd84c59d7ac097591ba1ab57e91c147b21ce025d3951c,2024-03-13T23:15:45.840000 CVE-2024-23203,0,0,a7d3b9c842d401a26cd60b5363d9fd931ec7b6ace08dfe359efc5de9e4d5324f,2024-03-13T22:15:09.117000 @@ -244549,7 +244549,7 @@ CVE-2024-23313,0,0,13245e21fab07d527abf4d414da9107709ee7261ac0f2eced3f2c2d5a62b3 CVE-2024-23314,0,0,dd6112b5494f5f3b553193d89c0ec5a0dd61b4aa5a1d51fde0a6bbf84929e386,2024-02-14T18:04:45.380000 CVE-2024-23315,0,0,489df2a8d3fe3bcb88b79c0636401c3a2725b9dd3103a02a30360cc9ee690d08,2024-06-10T18:15:26.180000 CVE-2024-23316,0,0,3812af16e295e83e786aa1aab37645db678f576659c563c821a5d9097cdb6f6f,2024-06-03T14:46:24.250000 -CVE-2024-23317,0,0,5be1f0fab5aa129c04d6293d11e81a3bd9e0d4c3d78ff4aa215975f76a3b29f1,2024-07-11T03:15:03.130000 +CVE-2024-23317,0,1,b3d4db9a6c4ba1ce642dcb721062f8e13232707c61d4a2c28ce4845f9c04f28e,2024-07-11T13:05:54.930000 CVE-2024-23319,0,0,6250a98d8fb4de9dc7adf992ef419352b4c640948bb204f9b6b1a6a1e471f523,2024-02-15T18:44:04.737000 CVE-2024-2332,0,0,bad3de665e7a6fe09fc285529837f450dd66b631476d3cb654444ad8c9c674ae,2024-05-17T02:38:10.740000 CVE-2024-23320,0,0,ee2624eedcd0c08c0309a46e353f298bafcc0ebbc7e5a02fe31e837cfcf5accf,2024-02-23T19:31:25.817000 @@ -244629,7 +244629,7 @@ CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c CVE-2024-2348,0,0,1b2471f8551c69b217b1850b52d1bf1e7f9aea8e8dfc43b59c7bf2992281c35f,2024-04-10T13:23:38.787000 CVE-2024-23480,0,0,746423a9c0519d4cd61a53767c7c801bf960cd35765efe9e634ac2b6a706568b,2024-05-01T19:50:25.633000 CVE-2024-23482,0,0,9bbfaddb28c8d4f40fa7310b24a63cdb6abbe6ffffa800b3d9da686c071e8fa5,2024-03-26T17:09:53.043000 -CVE-2024-23485,0,0,34144001b47478af22c792174230259bd0548200a4d268d25037269340d803d1,2024-07-11T03:15:03.327000 +CVE-2024-23485,0,1,38bd12cd670dc8914ed1a69d5f3e4cdb68de743b90161b77f3a9b23901dd7300,2024-07-11T13:05:54.930000 CVE-2024-23486,0,0,19778667fd58f188ebd5dce67e80ee87824728dd11d9e77fe76b5575568144f6,2024-07-08T14:17:34.250000 CVE-2024-23487,0,0,a175e3c04cbc36aafa8849dd45382b7985448c7b7394b27b709a0973fe2c1d2f,2024-05-17T18:36:05.263000 CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000 @@ -244800,10 +244800,10 @@ CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000 CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 CVE-2024-23692,0,0,69dc5620f25e89b82c3c217a9f13f591bf678b6676983ea09fe8288d200080b3,2024-07-10T14:05:27.370000 -CVE-2024-23695,0,0,4eaabb2395ba99eb39e30f71dd08bf9c07408170c4741111452d23fa2bb55c63,2024-07-09T21:15:11.857000 -CVE-2024-23696,0,0,60af9be3f6d1853dcbc6f19d7792dc99ed8040a6c1bdf05d869c317765a84a75,2024-07-09T21:15:11.973000 -CVE-2024-23697,0,0,a5df9e583a6ffcd777995b2e1f8c0ea12fbdba42fc53c5e85517101e453dc50c,2024-07-09T21:15:12.047000 -CVE-2024-23698,0,0,d15e9038b26ae0730ca6beb22ed6e2a5e8413e2898cbef5bbb36d3464a4bea99,2024-07-09T21:15:12.113000 +CVE-2024-23695,0,1,97b1bbf9668e4f1ff263ecc5095fb2ce50165cd2bc27914c0badab59b62b53eb,2024-07-11T13:06:13.187000 +CVE-2024-23696,0,1,189ee607710420766ee01561621adc5b7bb56059b2d08cc9a92c0d5f1f7c4d8e,2024-07-11T13:06:13.187000 +CVE-2024-23697,0,1,27a6083f785e35c6545c4b591de518748b769ef19139ee47602db369d8b522b9,2024-07-11T13:06:13.187000 +CVE-2024-23698,0,1,40d89ec45289d1881bb4b87dba8c0bb9402bcb28d0514ce7732acc7634aad369,2024-07-11T13:06:13.187000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 CVE-2024-23704,0,0,3ab2415bdb26ba29dae3109785e9f4b7ad9e6e4e471a3ed83e21564f6ce311e3,2024-07-03T01:47:59.750000 CVE-2024-23705,0,0,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768400,2024-07-03T01:48:00.597000 @@ -244813,7 +244813,7 @@ CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68 CVE-2024-23709,0,0,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000 CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 -CVE-2024-23711,0,0,ab617df6ec73098e3b61c45cc560c3de0e26ffd0f320fe71373502c2818b4c53,2024-07-09T21:15:12.227000 +CVE-2024-23711,0,1,01567fc11d5a2c4a8179e5900ea51dd5fd1cd144af5b23377ad86f419aaf2c21,2024-07-11T13:06:13.187000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000 @@ -245599,7 +245599,7 @@ CVE-2024-2501,0,0,b5cf131f2289d74297b2dbc19cfb603ec735e9b1cc811c1a98b1a3682a5e2b CVE-2024-25015,0,0,9e3fb0e1b7fcacd31ed03c6bf1d8c74e8df0ea773f9522b8badc41515a1603bd,2024-05-01T19:50:25.633000 CVE-2024-25016,0,0,7e9eb7e6fcca7e9c1cce27612a823457d13842f65d70f0e121b2ced7865b5e82,2024-03-04T13:58:23.447000 CVE-2024-25021,0,0,268da4d399cf08337d73768c3fd4fa53ef33e5f2d74019133c16ace4407a10a2,2024-02-22T19:07:27.197000 -CVE-2024-25023,0,0,803744ad737c09ced57b0eaee45efae74d1a6250ec501a9d4c200b6f5fb318cf,2024-07-10T01:15:09.633000 +CVE-2024-25023,0,1,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 CVE-2024-25026,0,0,344f711c12452613ac496513cc20b35ee5a15e42d46963ece9afb539eac0ee4f,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,506fa0f038304c2bb065c6aafbb038363984a8c8037945872a1b74013246a31c,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,d48a17c1d5ef1bfa6fbe7d5b73144f127d39825001bfd50aa27289e6a7875699,2024-04-08T18:48:40.217000 @@ -245622,8 +245622,8 @@ CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525 CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000 CVE-2024-2507,0,0,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000 CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000 -CVE-2024-25076,0,0,d66bc17d91809cc2f78f3102ffe32b214bc987b6cd580c79f6170144ca43d7b5,2024-07-10T20:15:02.933000 -CVE-2024-25077,0,0,1f8486cd645938c03e21e9baea1f7aad5d57b438c9e14c7dfeed86cd8586c3f4,2024-07-10T20:15:03.023000 +CVE-2024-25076,0,1,bef783be33037b5a37302d3b1fb068517df513278c0918ed83b3657759d016dc,2024-07-11T13:05:54.930000 +CVE-2024-25077,0,1,7eac67ae98b31640cc323f8f90a86c0baf27eb357da01b5c4f82ab8eafeeba64,2024-07-11T13:05:54.930000 CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c62f,2024-04-01T12:49:00.877000 @@ -246230,7 +246230,7 @@ CVE-2024-26015,0,0,91bd66afc3c2abf869a3d76bed02c232c2c3a3c155933975bf6c3d38e6149 CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 -CVE-2024-2602,0,0,38e8e4760ade88d60bb952633e9d049dd1e2be6399b53e6e5a4df913912eca5c,2024-07-11T09:15:03.030000 +CVE-2024-2602,0,1,2f9e8e954b78cbb2d431070e9456ec4cc1494d059bf8de639af2c69ac5367c3b,2024-07-11T13:05:54.930000 CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000 CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50e1e,2024-05-29T13:02:09.280000 CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000 @@ -247162,12 +247162,12 @@ CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d506 CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000 CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000 CVE-2024-2709,0,0,f4d31bf466dd83e1847d553cf0a3bb09712a5fa83628223c69b729872cb64e17,2024-05-17T02:38:26.403000 -CVE-2024-27090,0,0,e9308c4cd905f026b0e1d34882d09b2f5322895e44ce7b9a4cf2affac5f0bf07,2024-07-10T19:15:10.133000 +CVE-2024-27090,0,1,1286ab2c8b413930f751745c9454c21dff1b90d18e81696da752385d37043463,2024-07-11T13:05:54.930000 CVE-2024-27091,0,0,58ecd8a96ef6f650b7d3c6ff6b05851611594128b34909d27a436679cef1102c,2024-03-27T15:49:51.300000 CVE-2024-27092,0,0,d29804f8da91855d6bf2c97046f8c4ca58e3a02ea6326a3e526f30254e2615ec,2024-02-29T13:49:29.390000 CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000 CVE-2024-27094,0,0,3eb9d388805681273fe676dee514eb17768b55ae9e888103a362a03c5b963467,2024-03-21T12:58:51.093000 -CVE-2024-27095,0,0,ce96d6468f8756e20699aa04eb140e103a4ae0edd0949864fc1065d298a3b029,2024-07-10T19:15:10.407000 +CVE-2024-27095,0,1,89fc6d111b3761dcb87d31e97987341669065c381c2406887f635016420bca04,2024-07-11T13:05:54.930000 CVE-2024-27096,0,0,894f84a8f35148cbaeda9b34b2b2f12d5ff563f2928b15a6110bff9a018bb47b,2024-03-18T19:40:00.173000 CVE-2024-27097,0,0,119cd9ece0e90261671b57d6900026bac78dfbf4d2981ae69a65322120d02a50,2024-03-14T12:52:16.723000 CVE-2024-27098,0,0,c30df5c26e61dcf06585d0b82c2ff5020648cb39dac27e46934cf3772eacbcc0,2024-03-18T19:40:00.173000 @@ -247403,9 +247403,9 @@ CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000 CVE-2024-2736,0,0,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000 CVE-2024-27360,0,0,ef90b211e38e26de7cd6ad266f9667b57752920efeb0c78d69800f0173df48ef,2024-07-09T18:18:38.713000 -CVE-2024-27361,0,0,8916aed123b3b44ffd5a7084d1dae6df180abd8ef8b9beed0725af889bd5a15c,2024-07-09T20:15:10.167000 +CVE-2024-27361,0,1,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000 CVE-2024-27362,0,0,f6cf094287aa89a818448bb40454e447472a3a4a0dff2e33d58ba4042270372a,2024-07-09T18:18:38.713000 -CVE-2024-27363,0,0,9e2fd5303a6e782bfe4e7f64c73debc8098c268876ff4514365b71a5dd9f3671,2024-07-09T20:15:10.403000 +CVE-2024-27363,0,1,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6439,2024-06-27T16:42:33.073000 CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000 CVE-2024-27372,0,0,65a4e6083a0e4ea46660ce2ac40164e0a6aada29e2b404abc66d633a42676525,2024-06-27T16:41:21.603000 @@ -247420,8 +247420,8 @@ CVE-2024-2738,0,0,6819e123d1b9c89828d0cda96e445b3a2cfd159134a3eaf302a0f1f8d1cb62 CVE-2024-27380,0,0,fe99e5b0b6a32955bbb2a97d0c59955e408cb595f242be59059137109c57d1b8,2024-06-27T15:52:55.140000 CVE-2024-27381,0,0,dfb48a4eb36601401d92ca4620e42f680a10dcbb1fedb7a9b2d55aeb35bb13fe,2024-06-27T15:54:29.327000 CVE-2024-27382,0,0,4b4614f80e2cd4338001a4dcf7a438515a0711d28f6a394f90940bf9d7dba162,2024-06-27T15:54:47.727000 -CVE-2024-27385,0,0,e6a195a46a0c469248464f9d4b6182e721fbe7bbc6756e6744762060b3d2c6bd,2024-07-09T21:15:12.287000 -CVE-2024-27386,0,0,539b02dc3d3781301a5c29fcf081fdfa1bdccb39768d1290c8e84f1eee74954c,2024-07-09T21:15:12.483000 +CVE-2024-27385,0,1,a8ff5721869809d86378a35ea14de52f50181997e74bd473ef6acf6bde877c72,2024-07-11T13:06:13.187000 +CVE-2024-27386,0,1,fc4cea0bb829ddabe38318e96ec4ebb778a06573a5710fa4d1426ba9bcb2a344,2024-07-11T13:06:13.187000 CVE-2024-27388,0,0,d19acc876d6bed76abe4867a16c703c3b3105cc5fd5265605b3dfe06a10deeb7,2024-06-27T13:15:57.940000 CVE-2024-27389,0,0,84e8f98d7373f585e11251f165e8a3d401d2ea257f6532e4408157e8a9f0a9ee,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,01f4358b131d63aa6c4b85d098b6d7ce2028f8434e497e05210c81006774d4d9,2024-04-15T13:15:31.997000 @@ -247860,7 +247860,7 @@ CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0 CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000 CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000 CVE-2024-28067,0,0,0af34335bd5c50d512b8c109c02a349e9b931cbcda3258c91f6a4aa62f373bc1,2024-07-09T18:18:38.713000 -CVE-2024-28068,0,0,a8ec4e0175a4605e791ba613d324ba69fed603b3a4de06ed78afb1adc111f2d1,2024-07-09T20:15:10.603000 +CVE-2024-28068,0,1,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-2807,0,0,ceddd5b2cd81d31fee5f18b8bacde7f821c00daf332201952118e19cfa7a07c3,2024-05-17T02:38:31.100000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 @@ -248246,7 +248246,7 @@ CVE-2024-28794,0,0,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596 CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 CVE-2024-28797,0,0,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000 CVE-2024-28798,0,0,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000 -CVE-2024-2880,0,0,17a6bfe5fca6888fb379d8c277ac31d5925e385b05e8f536a8485474006839a6,2024-07-11T07:15:02.840000 +CVE-2024-2880,0,1,da9f66136a4e405c98fa118628e6d055e361fbc270d38a907c168d05ca657568,2024-07-11T13:05:54.930000 CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000 @@ -248256,8 +248256,8 @@ CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000 -CVE-2024-28827,0,0,bd84c3d65e7e06819ce33537e715eee8cc781b7c7834c576438889ec232ca682,2024-07-10T13:15:10.017000 -CVE-2024-28828,0,0,01c19526c0a96ef301605522a118ffb87c31fca4eeb40c41c1a63013ce07f09b,2024-07-10T13:15:10.297000 +CVE-2024-28827,0,1,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 +CVE-2024-28828,0,1,effd5c4bcdab1da8b5602b97379b2b3d0f31c4be4db7768189ae6b7bd7dec824,2024-07-11T13:05:54.930000 CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,0345769512c8d0617caa5313f559fdb9de7066aaa2f880b3d0fe2b7aa28290e3,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000 @@ -248525,7 +248525,7 @@ CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000 CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 CVE-2024-29152,0,0,c92904cfed16837c6741a6aae634cd863038c196f5243ffb888a5a789d858f82,2024-06-25T20:15:11.353000 -CVE-2024-29153,0,0,f9f358e728f7e9898244994d294245866a3fa5c87651e5b6963f2f911bb82c8a,2024-07-09T20:15:10.827000 +CVE-2024-29153,0,1,2b568d7bc3c06e07520098a6844fb0b38fdbf697da68e6c3ee5f5ae754eb75c5,2024-07-11T13:06:13.187000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000 @@ -248806,7 +248806,7 @@ CVE-2024-29780,0,0,dbb5b28e79357605c44be97580280388890d8927ed9d86b1dba54bfaf3205 CVE-2024-29781,0,0,b6224f330ff358aa94180da085366f464fc49ccb8c9a11cf2901ca1712188182,2024-06-17T12:43:31.090000 CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000 CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000 -CVE-2024-29784,0,0,75a476725b58b69912c5c88a5976ab0700b0278b01f75a2c842fe2d934ccc8aa,2024-07-03T01:52:34.030000 +CVE-2024-29784,0,1,ba30017bc144f71b7965325aaa3311ae3dfeac682cda889e9f2a82b841d1ef8a,2024-07-11T13:53:03.173000 CVE-2024-29785,0,0,6acf4d5e192a210ba9b844d54adbd79774477e59fb13750c29056bd3f9129dd1,2024-06-17T12:43:31.090000 CVE-2024-29786,0,0,6ea1aba11793e88e3539f0a1fa716e9f6f197bd5c9e2809ecb83b2a20665ce3b,2024-07-03T01:52:35.427000 CVE-2024-29787,0,0,8b3227822d531960b3be4bdc2e1a147750039f680413f3ae3fe72ae67cdc3673,2024-07-03T01:52:36.683000 @@ -249985,29 +249985,29 @@ CVE-2024-31307,0,0,3f5cc937ab88653c521e8123aa958a6b4450c9885bb5904e6f6e49e54659f CVE-2024-31308,0,0,5e2ae5593f1ea9760ae6e8cbc575821053a6196641c6e6bb427e79b97acb4828,2024-04-08T18:48:40.217000 CVE-2024-31309,0,0,fffcb118c29828b67d952cb185f5d9b9c1e5391db0b01186447338db555819d8,2024-05-01T18:15:23.233000 CVE-2024-3131,0,0,c743c524a4c8650f09bc83876c03caf128d010267bf94a845848caa55c9a8038,2024-05-17T02:39:44.143000 -CVE-2024-31310,0,0,8fdf25560eaccdfbbcb2c66d1045c060858d43f45526073decccac7120f65e8f,2024-07-09T21:15:12.773000 -CVE-2024-31311,0,0,c318bf99ac2cdd20bba3e091522095bfc1ba2950d7d0004fd273e19ee302c2a4,2024-07-09T21:15:12.840000 -CVE-2024-31312,0,0,8c54d14ddf0fcc17c7c0f9fa0301ca04ab9111192e88b5bff034ea83760d06c1,2024-07-09T21:15:12.900000 -CVE-2024-31313,0,0,75becead805d792b9ff7ca1a4ad5fc6f150ce5f20313ff62b318e749773c515e,2024-07-09T21:15:12.960000 -CVE-2024-31314,0,0,8a2f5ae62af0a27c9da925df2e8ca1954d97ecbb19da33d9ae7a73cc776d14a0,2024-07-09T21:15:13.020000 -CVE-2024-31315,0,0,d5943b15f7f479d70d074f7d1ecaffcd470e8759f2e28cec273e7ddcd8a48769,2024-07-09T21:15:13.080000 -CVE-2024-31316,0,0,4bf861cef619c19b785df19bb7cd612fd920ff578e664c01f82a040af18f362b,2024-07-09T21:15:13.140000 -CVE-2024-31317,0,0,4ffb338316c544186a6142d478de8765756196614a21e68ba7d10c6e79a15457,2024-07-09T21:15:13.197000 -CVE-2024-31318,0,0,246cebd4b4f65cbed1d1a696c6fbaddb08c68ccf11d06a128d1c284b40d8f3f3,2024-07-09T21:15:13.260000 -CVE-2024-31319,0,0,aece7278af2f93870e62f434cf682789968d9fc57dbff1cbfb1f4a67cd735cb3,2024-07-09T21:15:13.313000 -CVE-2024-31320,0,0,8f4eae7d5398a136d53bf2d8d909861d6d4a42076bfe02833cb0cb9f66ec03dc,2024-07-09T21:15:13.373000 -CVE-2024-31322,0,0,68430f93f8076294e41503fb671087c34ebfc7530af0f231417074d6229ac109,2024-07-09T21:15:13.433000 -CVE-2024-31323,0,0,5863020ea44014347e8f9e0f42c23ec2fce7175837c40ed8b8a86096b97ca834,2024-07-09T21:15:13.490000 -CVE-2024-31324,0,0,3a4f5c192d507ad9c28330dae7e750d26227d615f5c108b6108285e72aac0666,2024-07-09T21:15:13.563000 -CVE-2024-31325,0,0,3c126606eb80d85502e5a6fbbda85d6a6b1a8267e9f81396e266b1114bbd4b82,2024-07-09T21:15:13.677000 -CVE-2024-31326,0,0,3541061c97d58ff90de396997b7f4d4ccbe089f5929a9c7b91258f746aab3081,2024-07-09T21:15:13.757000 -CVE-2024-31327,0,0,075050a24fe00e27c500f7389c03ff9b97dc750ab9657ed2b2506ca60b2fb16d,2024-07-09T21:15:13.820000 +CVE-2024-31310,0,1,39c8b5f3047a90424057280556e039d7fcd0c87d4c13a730727031fa30d92c6d,2024-07-11T13:06:13.187000 +CVE-2024-31311,0,1,5f5c16b93dc89d74c1c64519405dcb798d8a6175c6d09a8e665f5b15504d78d4,2024-07-11T13:06:13.187000 +CVE-2024-31312,0,1,3e59aee3cfa2f94cb0ef2f4dd0a4353f30db5e3e79096083a0ada05027297595,2024-07-11T13:06:13.187000 +CVE-2024-31313,0,1,0fa1a93bf76d2578fececf6790601468789f9798bc4a9d3c04594cde67bd0b37,2024-07-11T13:06:13.187000 +CVE-2024-31314,0,1,f79a503fa2b5e6b0ca89cfce664066f03d71aa556965c71aeebf162d04cdcf57,2024-07-11T13:06:13.187000 +CVE-2024-31315,0,1,93691d4127345d06d4f975e9e696cf2d6d422b0f3fbe14b702e05390d628f282,2024-07-11T13:06:13.187000 +CVE-2024-31316,0,1,6b5f24e340d0cf309e98a56a6c4cbd381d4b4352a616197304eee36afb985ef0,2024-07-11T13:06:13.187000 +CVE-2024-31317,0,1,1cfe22ebd5bd5bf9bb790911e838de1cf78ed04ae58571ce5fba442b6396099f,2024-07-11T13:06:13.187000 +CVE-2024-31318,0,1,0d84f6fe565a6fef6c3462da1416e29e0311757f0491192516023b784222f940,2024-07-11T13:05:54.930000 +CVE-2024-31319,0,1,d82c7bc64b10488b9b1926aa61d01961ce06d41701085112500f540f682b462a,2024-07-11T13:05:54.930000 +CVE-2024-31320,0,1,fd0c569760394346ae816f996a976a14ed1c320bd30c9cc5b55f0ef9b67b63e1,2024-07-11T13:05:54.930000 +CVE-2024-31322,0,1,7a13bd68f6b1c7fe6ae74de10d3305bba51ee91b81b8b3b9eebd03083a5a7664,2024-07-11T13:05:54.930000 +CVE-2024-31323,0,1,a544d9a9ff2aa21c5fbb6fe91279f4ddfa1669db09487516ebfbf1d931a1974e,2024-07-11T13:05:54.930000 +CVE-2024-31324,0,1,c0f75bbf1e949b6b889f120fbeb42dc1e871fce1afcf711f41b5f0c928b7185e,2024-07-11T13:05:54.930000 +CVE-2024-31325,0,1,80e33a4833f6237bc4765f36ccc9a7e3eece55e1504b9aeb71a9c9792949a23e,2024-07-11T13:05:54.930000 +CVE-2024-31326,0,1,284eae06442124a693f10717424ff9de135112a9a37355db24d271d9f53a0149,2024-07-11T13:05:54.930000 +CVE-2024-31327,0,1,2ef29ffe86a08f0831b7bb2a92b31fa5fe1af5b9b162e1788d4651897aea14f8,2024-07-11T13:05:54.930000 CVE-2024-3133,0,0,a7a7a4865524243743a9c88c08b8282b249ad835f6a96871747e7128048107a2,2024-06-07T19:15:24.213000 -CVE-2024-31331,0,0,d3bb28a087fa3a56b70f255bd11cb63fc72b80666e5a44e369052ff3f76c5a53,2024-07-09T21:15:13.883000 -CVE-2024-31332,0,0,4f6fd3b13c26d5fc18d5d860a43345d66a5e0faec407a08fd25ccf0c5581a180,2024-07-09T21:15:13.947000 -CVE-2024-31334,0,0,77fb96606d5b21e1e64677a54bfe877961196819bd5c2729154893b101f1281f,2024-07-09T21:15:14.010000 -CVE-2024-31335,0,0,51d54d6c07d5d88c6beffd4593e042ba2ef2f30a5944a27df26a1db612672454,2024-07-09T21:15:14.070000 -CVE-2024-31339,0,0,643cff8a83a47d1ea02fbc5d1258fc8cc73b867b6b6a0f0cf56e6a70c0d19796,2024-07-09T21:15:14.137000 +CVE-2024-31331,0,1,ee3681b08cae6852ac0e24740bae3fb33eb861eb45c84d3034c14aed4d2a99ec,2024-07-11T13:05:54.930000 +CVE-2024-31332,0,1,52868f771e8f9f8046bb3d19550431cb1d1b23ac51101c56896baa0529d69cfc,2024-07-11T13:05:54.930000 +CVE-2024-31334,0,1,505d0a7195cf32a0d8005338af1bbe2f3acc69e5506b65c5e2e2ce726225f7ff,2024-07-11T13:05:54.930000 +CVE-2024-31335,0,1,7b94e1c7e2fff90cd056259c618020e41ea9dda128606e5b08242f9be882f42e,2024-07-11T13:05:54.930000 +CVE-2024-31339,0,1,d842eecc2743a2fe995de325a1733d346b74325c181dda07d57e292f38e3be81,2024-07-11T13:05:54.930000 CVE-2024-3134,0,0,e04064345e517c38325e3c54708d3b5c2565ae5cbcc3f4d3393427e4c611d4fe,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 CVE-2024-31341,0,0,d4166215cbddfa0324e008e571dea19e89ceb3a6d8e359be3d6c61b47b5bedf9,2024-05-17T18:36:05.263000 @@ -250685,7 +250685,7 @@ CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb CVE-2024-32465,0,0,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000 CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000 CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000 -CVE-2024-32469,0,0,bcdfb0c818ad2ae6b3a6d6e13881f240c89e3a29a724398fdd68c2b01210d441,2024-07-10T19:15:10.667000 +CVE-2024-32469,0,1,a9e5def06e4db8472decc90b984fed9339b3fda0e27ed47a28dbd2f3e4aaa483,2024-07-11T13:05:54.930000 CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000 CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000 CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000 @@ -250875,7 +250875,7 @@ CVE-2024-32663,0,0,5314dda8d87e66deb792118e9f1226c91443ff732a3d0787c2a306f63625c CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66145,2024-05-07T20:07:58.737000 CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 -CVE-2024-32670,0,0,d9f5ea3fc613b0f52d78ad4a0c1e24a9cb5e8c753fb6ba0a7dd18aed1ad5f7e6,2024-07-10T01:15:09.893000 +CVE-2024-32670,0,1,11e459444671f45b9f26d0cdaea8328e4da91a68f683a4e2c21fd5a0bc52f597,2024-07-11T13:05:54.930000 CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000 CVE-2024-32673,0,0,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000 CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 @@ -250961,7 +250961,7 @@ CVE-2024-32754,0,0,607be943cbec19ebc26898f36a5e33ae0135cc060ad9e54e1f721e2b27b87 CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000 -CVE-2024-32759,0,0,97d4502fb7a975cedf0589f3d4ed5f8399c616cfac3ccc48e027ca6adcb337c3,2024-07-10T18:15:03.220000 +CVE-2024-32759,0,1,7c7315c67eca6ca87b6219c7219d6592c894d679ee2457c385dac7a3c3446a5c,2024-07-11T13:05:54.930000 CVE-2024-3276,0,0,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1fe,2024-07-08T14:19:01.997000 CVE-2024-32760,0,0,67074d2cb149a548f5ca201a895261189c469e9d7c384fe074a8d7f159cb359a,2024-06-10T18:15:34.203000 CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000 @@ -251076,7 +251076,7 @@ CVE-2024-32891,0,0,8a0f5363d9fa6b1b1d084c97d802fb52ab823370d67e6fcfdd19d9b8bf57c CVE-2024-32892,0,0,d09cf621a5198640d1590bf812307f6494b4f7236754c48113551ae4952a9d05,2024-06-17T12:43:31.090000 CVE-2024-32893,0,0,0c1878ef4b8a7d4b4acf328abd68508f07e7b92789dcfcb4c893201f835ef8ad,2024-07-03T01:57:13.633000 CVE-2024-32894,0,0,1fee7d149001a152aa78b170399fbb77214c62b2843c8bc991616757309d5d12,2024-06-17T12:43:31.090000 -CVE-2024-32895,0,0,b4ce8cb14651a8c1d5b038c6fb5f1773e85a16a57281c02d55aadc2187df8505,2024-06-17T12:43:31.090000 +CVE-2024-32895,0,1,3b5e93f479d0a309808bc7ab37e73f0b736af7b90a097c9affa7582da06b56cb,2024-07-11T13:58:33.960000 CVE-2024-32896,0,0,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000 CVE-2024-32897,0,0,4fc5f5a460c93bb0780e03b36b9c9aaf78b9c8c9778a57de9d64a615622f29cc,2024-06-17T12:43:31.090000 CVE-2024-32898,0,0,dbe7241acfd745ff54bd5f0779b9ba062f0846b5eaffdbdf1772f5da50654c30,2024-06-17T12:43:31.090000 @@ -251240,7 +251240,7 @@ CVE-2024-33227,0,0,dba47dc6901331cd8b2c437b00c864f39f98ab616998125012a5d6f0fc649 CVE-2024-33228,0,0,f3448597a287250f65febdc50573b1814b9e5e5281e20e4e28a9c439a03cbb22,2024-05-22T18:59:20.240000 CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000 CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000 -CVE-2024-3325,0,0,756360fa34a0197a13f31bcf51284ad2ba892172a6226050afa0ed589d99caa2,2024-07-10T17:15:11.783000 +CVE-2024-3325,0,1,193bc1753a3fc6fd93e30259616a7293fd0fe95b6e6f92a0eca662fdfb52453b,2024-07-11T13:05:54.930000 CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000 CVE-2024-33253,0,0,9724c511857718d0a8259b3f2abfa4544637a582271dda703908f0d9d40ec502,2024-06-17T12:43:31.090000 CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000 @@ -251780,13 +251780,13 @@ CVE-2024-34119,0,0,2b28f435955ad18fc8fcb42f0ece270dcf2db721e55508a9a5713cf979769 CVE-2024-3412,0,0,eba0eb1a658dd1d7813104d95660e0a431a5e786fc8e6854f237ea1b5879eab4,2024-05-29T13:02:09.280000 CVE-2024-34120,0,0,5d7df179ca1b4156f6cc057947fff0d548e9af4c6b85c2f9635b6b268004f3b7,2024-06-14T20:02:45.567000 CVE-2024-34122,0,0,4f9228b802a53076ae2e05a9634541c34d86113269eb50413207e641d1aa51eb,2024-07-02T17:44:45.700000 -CVE-2024-34123,0,0,5431804bb3b81fdd893e84b08a9163353bfc50042610bef00f3a49bf02a45843,2024-07-09T19:15:11.493000 +CVE-2024-34123,0,1,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 CVE-2024-34129,0,0,d3dc43049d80f783794d9399825be80ea683040539452e8a7be93120bda8c4de,2024-06-13T18:35:19.777000 CVE-2024-3413,0,0,8bf7e231eaef8a1fb270998ee982f12463c5a7d17ff17eb8735dbc8fc584bd57,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,89584332f9dd3125064424fac4aabed722eb075df05ba25c9a02617aa8a6856c,2024-06-13T18:35:19.777000 -CVE-2024-34139,0,0,9b406f5803c632db0759d8ad9f7d720fb75f266fa6e9e701208675ad33a697d4,2024-07-09T20:15:11.147000 +CVE-2024-34139,0,1,31d5c4a8a58cc938349a57ec1f1fa8db5c0718d4f925f1121432b335f8c9c667,2024-07-11T13:06:13.187000 CVE-2024-3414,0,0,69231815197d8c759df4a79a39950c8d4f6258471ea32f1c29be1a7038b6ec47,2024-05-17T02:39:54.160000 -CVE-2024-34140,0,0,fa2bfa877e32db4284778846a8d6fd17543a8adf8b5e6fc6d6a45f78fb14ea88,2024-07-09T20:15:11.360000 +CVE-2024-34140,0,1,d42a485cda9b4c14ee3827526c2ca3f4dbd317f45889049c0298065354f30d82,2024-07-11T13:06:13.187000 CVE-2024-34141,0,0,0328c765f70a818d854683e04e980b09961525d5dd8879ace860d192776bc00d,2024-06-25T12:24:17.873000 CVE-2024-34142,0,0,c526b1831039e375b135e55cb58a71752c1b1dd1103a82d9d4050eb194a5f7f7,2024-06-25T12:24:17.873000 CVE-2024-34144,0,0,8414704b34c6aee2b8d5e2cc339eba978cf28a03283509f435e5b0757f4efdfc,2024-07-03T01:59:25.760000 @@ -252138,13 +252138,13 @@ CVE-2024-34715,0,0,caff2451aacd33d9c1785db66ba7b81c7f2c3b630c6b9d2ce069d8a61cc25 CVE-2024-34716,0,0,86dd1938143b344fc361262a3b1c662de4efbcaa04e6b10cb049ee8700b9a271,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,2b916dc6a1e09850236d38da24f3e36a503c2d4e64c7e637d4f378867f8ef155,2024-05-14T19:17:55.627000 CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 -CVE-2024-34720,0,0,9cf12b764b349c987157eb7a2e037aa197c59a36fd256f39a4e2798c99f5008f,2024-07-09T21:15:14.213000 -CVE-2024-34721,0,0,4f2da85689e5f1b82d614ae4e39dd336ab385d30f8d645ee14335af6c7b777d3,2024-07-09T21:15:14.277000 -CVE-2024-34722,0,0,c251bdb3988290dc36aa513b6ce2269d6df4b3d462c582b9a5b01d1f0f9e9700,2024-07-09T21:15:14.343000 -CVE-2024-34723,0,0,34fa4c0b683b758a14e8db2b3c9fb26191c05149072b480516e68d4ca94677e7,2024-07-09T21:15:14.407000 -CVE-2024-34724,0,0,a30b322d396f793b95d457332e9587e327aaff63f961c1c223e4cbc6c79fcaae,2024-07-09T21:15:14.487000 -CVE-2024-34725,0,0,152a6332fd1a351d1a02f9785a0d2ef08e508e90bad42434c8c32dafc6cdcad1,2024-07-09T21:15:14.593000 -CVE-2024-34726,0,0,f5a5232b65d0edc45e5e3663e63b62917577d7911a328e145fdd60760b71280a,2024-07-09T21:15:14.680000 +CVE-2024-34720,0,1,ad9e8e18334149cc86a5b7493717ca793d637ad8533bb7504c9258989530a492,2024-07-11T13:05:54.930000 +CVE-2024-34721,0,1,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000 +CVE-2024-34722,0,1,c260ecb3dbfb3ee293b3ce1efe4ba187888cf5868c63b0406fd7450095747907,2024-07-11T13:05:54.930000 +CVE-2024-34723,0,1,f4857b782f202665c6d21686d6676e2a94629913a685bc714558d5ffdb0a6c3e,2024-07-11T13:05:54.930000 +CVE-2024-34724,0,1,4da53c90a9b873ce90ea05a00658380d5b584241eb1232fc8a30445b4f3d9630,2024-07-11T13:05:54.930000 +CVE-2024-34725,0,1,98e9d37a940b2073d776990c8ea0e21b460d0fca7f102ef542f0502f179475c7,2024-07-11T13:05:54.930000 +CVE-2024-34726,0,1,490ca003d093fff54f3005804c29431a8b57ce31132aa4a7f4b6f3507b79aa85,2024-07-11T13:05:54.930000 CVE-2024-3473,0,0,ecf07ac84ad9a3f593fb990c7a6940d333eabefd6a4358103eba0f21665023d1,2024-05-02T18:00:37.360000 CVE-2024-3474,0,0,92034c6e8e03ef9947dcf9fd02cc16997c4bf0b4b196a87ecd9d32a4fbd7f10b,2024-05-02T13:27:25.103000 CVE-2024-34749,0,0,fe5f41bd42e695276d38161b9a2d636fec6ebfca2120aa0bc8cb065f0e443352,2024-06-04T19:20:02.877000 @@ -252334,7 +252334,7 @@ CVE-2024-35140,0,0,45c3bb60ea04b1120d4f838be7226beea8411238e0d1eeb8dfdc4424ca0b5 CVE-2024-35142,0,0,2e771ea16b161d7fa34214dfdb10478412ee26ce44f8ad533bb2991294386c64,2024-05-31T19:14:47.793000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 CVE-2024-35153,0,0,86727db419cb843920e5cd4c7a87cf5b7fde13fc70ca82a13eb4d069ddb821d5,2024-06-27T19:25:12.067000 -CVE-2024-35154,0,0,7436cf30e24e772e589b9a810460ca4936ef7840ac4cf53470db709a3d748bbe,2024-07-09T22:15:02.227000 +CVE-2024-35154,0,1,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 CVE-2024-35155,0,0,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000 CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000 @@ -253289,10 +253289,10 @@ CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8 CVE-2024-3643,0,0,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d3b,2024-05-16T13:03:05.353000 CVE-2024-3644,0,0,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 -CVE-2024-36450,0,0,ea1236f7b5970f4dfffbf3131c2b81689a3c3e0a16e1c39da011c68b844c67e2,2024-07-10T07:15:02.893000 -CVE-2024-36451,0,0,3136df486a657ff87b4fd86607abf4dc838632d3519b091388d1599234550ab5,2024-07-10T07:15:03.040000 -CVE-2024-36452,0,0,7550f8b11a9c9103a2bf10e7dfc87b4d6aa9599c64ed3f3d2418e8d98bd6a4d1,2024-07-10T07:15:03.103000 -CVE-2024-36453,0,0,d340fb019cb2123311b824ba06de47c9a664efe85812ca5b2754e78c59e411bf,2024-07-10T07:15:03.177000 +CVE-2024-36450,0,1,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000 +CVE-2024-36451,0,1,82df1f139b889f620bdbbc36200ece748111b300f87c92ef073574309e68e5bc,2024-07-11T13:05:54.930000 +CVE-2024-36452,0,1,de0ddf9ec46c34a45ea45b28170f7953241f05d2c2c229b8d849dbb88c728f2a,2024-07-11T13:05:54.930000 +CVE-2024-36453,0,1,70605f8bfd250a2fc52d22eef74e04fa9d7bd01676146b6b8e44458c23a927ff,2024-07-11T13:05:54.930000 CVE-2024-36454,0,0,119ecbd34abcc47a263eca5a7b8a20f07f9103015a4c85c0f4c832e1c8eae2d9,2024-06-13T18:36:09.013000 CVE-2024-36459,0,0,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 @@ -253374,7 +253374,7 @@ CVE-2024-36670,0,0,98051372c03c4f8daf963a6b52983fb8a9582924dc9f1a3de21e1b0831613 CVE-2024-36673,0,0,c3fdb493385fd7349af8a7f0f647aa65a0c25320dc90b659d1425197d89ce5bd,2024-06-11T18:27:20.950000 CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000 CVE-2024-36675,0,0,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000 -CVE-2024-36676,0,0,af04cf1a5a8a61213a859c2e59130dc0a46ad5103f15f4237d0478af65138a28,2024-07-09T22:15:02.467000 +CVE-2024-36676,0,1,a5d327aee08516df56e93de37a5203192b293f35b0cda1a8900cc2e634ae4ff4,2024-07-11T13:05:54.930000 CVE-2024-36677,0,0,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000 CVE-2024-36678,0,0,c0825943f1d5219c9624193357755cc06a7e20f8bcb4f135a8b3456b8cac03b6,2024-07-03T02:03:29.450000 CVE-2024-36679,0,0,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0c1d,2024-07-03T02:03:30.273000 @@ -253636,11 +253636,11 @@ CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4 CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000 CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 -CVE-2024-37110,0,0,dcb0920072ee7af0db2b1b8e454d5ac82c1e0bb236300f87b06899035f213c18,2024-07-10T18:15:03.373000 +CVE-2024-37110,0,1,22f8d158d06eab5c827b62e4e01a4e15ed273058bbfba1db2001625565816b18,2024-07-11T13:05:54.930000 CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000 CVE-2024-37112,0,0,906b6afd1221b533b38819c616c93e995b341fa67c658fbfc350c9fd924bc330,2024-07-09T18:19:14.047000 -CVE-2024-37113,0,0,4438f53914302ea623d53825c9b6e0bac2830b84758d3b3ce85db2327783bad6,2024-07-10T18:15:03.630000 -CVE-2024-37115,0,0,88d3997f11f7cdf28d0ea92358e1e6b1b162beb0431d5203b0ebd5eccd8ab445,2024-07-10T18:15:03.857000 +CVE-2024-37113,0,1,37d3d4abcaab1ee13f503423a0fed9458bee73e3912cbad0e423bdb46e50b8dc,2024-07-11T13:05:54.930000 +CVE-2024-37115,0,1,c4756c61d3182bc7983d562b038bd1b97c9dd3293a1a84c5b8fb1495fbe9c68f,2024-07-11T13:05:54.930000 CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 @@ -253657,9 +253657,9 @@ CVE-2024-37140,0,0,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34 CVE-2024-37141,0,0,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000 CVE-2024-37145,0,0,5c583bad753181323e403ceb6f4418c69209cee6463fe8ada19cf90c7991fb5f,2024-07-02T12:09:16.907000 CVE-2024-37146,0,0,d5817f16e70393732c114867d4a0a6a7a44408de06d35e1f4b6b81d6827c298f,2024-07-02T12:09:16.907000 -CVE-2024-37147,0,0,7a31258544a4e88adf524ac1293ead93cd96672924da2d1697b8fab4e9cdc221,2024-07-10T19:15:10.930000 -CVE-2024-37148,0,0,d34a4e96289a16ca2babafd1684df282e85bccbb8fc2fc0400b81e026d541ad3,2024-07-10T20:15:03.280000 -CVE-2024-37149,0,0,b981686ad01124fa84f3021eb2d86d5c07e4a35cbc3f848d00608f80820f520b,2024-07-10T20:15:03.543000 +CVE-2024-37147,0,1,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000 +CVE-2024-37148,0,1,80bea212d724fd8426f29ccd28ad47ac03ff4315e23f67a8b6a1a81a53973b06,2024-07-11T13:05:54.930000 +CVE-2024-37149,0,1,62da2a22ca18555c3b147f38a3030ae567e778beceec162cc580c895135a35f0,2024-07-11T13:05:54.930000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000 CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000 @@ -253696,7 +253696,7 @@ CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0 CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000 CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000 CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000 -CVE-2024-37205,0,0,404473518d59c1aebcc74cbe03dceebbf60d2fa650daad38f292961b7ee82936,2024-07-10T18:15:04.080000 +CVE-2024-37205,0,1,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000 CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000 CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000 CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000 @@ -253723,7 +253723,7 @@ CVE-2024-37260,0,0,71ae32d07f60a869d4092274a4024739c347edcdf7f6c400a5ce16269ff56 CVE-2024-37266,0,0,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000 CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000 CVE-2024-3727,0,0,8e07517a9dca0048f3a5546e14ea5eaec2b195c195e356a5ec35a7e996ce9012,2024-07-03T17:15:04.780000 -CVE-2024-37270,0,0,d083d76167baf46ffa6cd6f14dc6f156433a1a41b5e6e1adba14abb79cdfeaa9,2024-07-10T18:15:04.300000 +CVE-2024-37270,0,1,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d24b,2024-06-13T18:35:19.777000 CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000 @@ -253747,7 +253747,7 @@ CVE-2024-37307,0,0,307a9077f465a844bb3929ae05a1dcebcb701d8b2ae344b6539171566dfcc CVE-2024-37308,0,0,789ac1ee79bf50a380c8842b793e1f03cbcea96755a8db8c09ad817d1922f353,2024-06-13T18:35:19.777000 CVE-2024-37309,0,0,665df876b2164bd39f49af0dbd8eb55d8bda11b715021fb1a958468109ece0ed,2024-06-13T18:35:19.777000 CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000 -CVE-2024-37310,0,0,b89dce05a6fcfa197b0f3591505fabefb6ccff051d6496173d06bbcf5f585311,2024-07-10T20:15:03.790000 +CVE-2024-37310,0,1,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601463,2024-07-11T13:05:54.930000 CVE-2024-37312,0,0,ba4f355e4f74a8bde30dcfd48ce758e7796e43079453cb77192f0999aacce83a,2024-06-17T12:42:04.623000 CVE-2024-37313,0,0,bad34f14f8fcac47115250f6ec4bbac8493c061a0b49da4b4fbe2645f7a82474,2024-06-17T12:42:04.623000 CVE-2024-37314,0,0,bbb529e96a1bf18f91583a0e4981cbc0e945b7a77e11c3672e59d0ae8b6a6421,2024-06-17T12:42:04.623000 @@ -253839,21 +253839,21 @@ CVE-2024-37486,0,0,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5b CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000 CVE-2024-37494,0,0,b88e83b573725f4d6071fa3bac5e334c7dc8623314e237fe1108a022bee0ee27,2024-07-09T18:19:14.047000 CVE-2024-37497,0,0,f3a028679a67965f61b937156a53d1c18994178b3cd3c35e2a4dd898dd2a4aa7,2024-07-09T18:19:14.047000 -CVE-2024-37498,0,0,cfd42f3e3dbbef4b55354ec588acbf91cd0af1d57791f8a118c4c23764c54cb6,2024-07-10T18:15:04.523000 +CVE-2024-37498,0,1,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000 CVE-2024-37499,0,0,f79cc5cf94609c9d5258a38082f5705921e4f313d9316f7fd282a1335ce3d3df,2024-07-09T18:19:14.047000 CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 CVE-2024-37501,0,0,b78cf79ca308008e9008944af9630d58467f84a62f039c6a1e72ef46a8059faa,2024-07-09T18:19:14.047000 CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 -CVE-2024-37504,0,0,b9660b7a3e07087d7633248bb969baccc1f65fed64d808935be7bfad1ba2aca9,2024-07-10T18:15:04.750000 +CVE-2024-37504,0,1,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 CVE-2024-37513,0,0,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-37520,0,0,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000 CVE-2024-37528,0,0,dcc35f546d6b7f143e08b2e796afc57ba01587f3b3341db2d2f1e11d1d9405d8,2024-07-08T15:49:22.437000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 -CVE-2024-37539,0,0,f635a2aa2c7e712aeb60fa0cbc24a843473d50653030a9c821e2bfe549e6f338,2024-07-08T15:49:22.437000 +CVE-2024-37539,0,1,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000 CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000 -CVE-2024-37541,0,0,798e03349b267a2f8082a0ec152ec1b0f94afac4c92ce77a1c90ad41248cba88,2024-07-08T15:49:22.437000 +CVE-2024-37541,0,1,1f46bbe98bcc26e8385382a14ef7dedf6c0e9f6a09394a6b26798763f5000b58,2024-07-11T13:13:15.977000 CVE-2024-37542,0,0,6d89e302c059e61e6dee79263ba1d9b292db94b7349a74f25580291f658a0ce4,2024-07-08T15:49:22.437000 CVE-2024-37546,0,0,95bca18091533d24779b9d9541af789d17a54cddb8f47507626120eab0314784,2024-07-08T15:49:22.437000 CVE-2024-37547,0,0,da07cdaafbcdf5f6f48dcc010bdacf6feb2c6627ede1b87455a66a3564df588f,2024-07-08T15:49:22.437000 @@ -253940,7 +253940,7 @@ CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc34243b0,2024-07-08T16:41:23.650000 CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f325,2024-07-08T16:37:28.323000 CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000 -CVE-2024-37770,0,0,ae1146338933a26ae6578998f9481f574d3c6949e604fe6e68446c277bba031d,2024-07-10T18:15:04.983000 +CVE-2024-37770,0,1,90a7e8f972f371a966f4dcaf34dcbf47b46d3c00663fe1bb1b1b3eb0e8cde6e9,2024-07-11T13:05:54.930000 CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000 CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000 CVE-2024-37791,0,0,aac0a75365a73d05a49838e7a7b1ba90a794339affdf6e30eec1aa9fd749c48e,2024-06-20T12:44:01.637000 @@ -253959,9 +253959,9 @@ CVE-2024-37820,0,0,0a0996a8947e2895e99ed868e2f9dddf9b73eaadf620faf0715e497fd47a9 CVE-2024-37821,0,0,dad227ff1e39e1e08a617033ca30de21cc87f5062f829537e300bad0e33ab0a8,2024-07-03T02:04:48.313000 CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000 CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000 -CVE-2024-37829,0,0,9bc5f44aa7717dc571ff84981d6bcef1c01c05129547fb2905021be0ce484260,2024-07-09T21:15:14.770000 +CVE-2024-37829,0,1,9b73d14757acd9b5a1d4d8ac21b274f9fa0e367223e25c502d550fcd9f8a8ca1,2024-07-11T13:05:54.930000 CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000 -CVE-2024-37830,0,0,d417575bf2317fddfbecceef3d893973de5ee189d1b87ad65a2f248008915cba,2024-07-09T20:15:11.683000 +CVE-2024-37830,0,1,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122afec,2024-07-11T13:06:13.187000 CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000 CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 @@ -253971,12 +253971,12 @@ CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000 -CVE-2024-37865,0,0,ba2655c2205a79de4631429c8220b01349775ec0059c4ab8b125b3e8d466838d,2024-07-09T21:15:14.860000 +CVE-2024-37865,0,1,afa406c73653f017546305f09b19c359bf5691bd7386c950c60dfcea42c3cf59,2024-07-11T13:05:54.930000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 -CVE-2024-37870,0,0,1260972ae63463f85ac855807b14402bc3d0b26113ff282510157f01902a4b8a,2024-07-09T19:15:11.910000 -CVE-2024-37871,0,0,c0278b3bbd9994e281f1c8006603a6888abb4d6ffa26b634ef765454037757c7,2024-07-09T20:15:11.767000 -CVE-2024-37872,0,0,23b4540f591514940b17fa613e46ff7510cb4e447288686ae1d8a17c3afffe8e,2024-07-09T20:15:11.850000 -CVE-2024-37873,0,0,798252b7b3c5bb9b1568655795d430f290d3f136923fd49ab48ed8b169f2fa55,2024-07-09T20:15:11.923000 +CVE-2024-37870,0,1,0021ada25c2ba8466304ad46788adea08218f84efb7f6d0bba03ba76aad30b01,2024-07-11T13:06:13.187000 +CVE-2024-37871,0,1,aa9890ff0ae413f80f04a048dace30a03437abb067b5b547db98731fdbf9d876,2024-07-11T13:06:13.187000 +CVE-2024-37872,0,1,d08275c05be50432c03c5ad56489a099130fb68799f56932f00af7082219c5d4,2024-07-11T13:06:13.187000 +CVE-2024-37873,0,1,aa8b3b2aad2e3927f58b95e8f826c6c2da0db8ab8e6880847c0cc4eecf275fb0,2024-07-11T13:06:13.187000 CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000 CVE-2024-37878,0,0,6ab5285f65d3836bfce4373eeb59284bc38e780244a86b2dd9df8f43f28d93d7,2024-06-13T18:36:09.010000 CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000 @@ -254023,14 +254023,14 @@ CVE-2024-37974,0,0,dfc3c75b51e50ce6f8088d248adddcc721c138400e8f3a51211a6df941233 CVE-2024-37975,0,0,0379e1fb3fee56719b10aafc84bc4d77924a9c2c055fdec77fc3f1884abda39c,2024-07-09T18:18:38.713000 CVE-2024-37977,0,0,f47f8b621b5dcee65340c6657ec712f617d2fe8bf8a4c602f2b0c3cb9fa66926,2024-07-09T18:18:38.713000 CVE-2024-37978,0,0,868ba15e50cdf25648e409e7f700f1f6ec06c7e1296005e0f1e13b9c664af6c0,2024-07-09T18:18:38.713000 -CVE-2024-3798,0,0,78d3a8d1d86ec7842ceee1b4ebfc2acc9e0a34c7b5c125ceff730d41c04c3fbc,2024-07-10T12:15:09.873000 +CVE-2024-3798,0,1,bb3c730aae494e2730a92b5d383c6df62ac07389833b14c4e15164a45fb4d7c2,2024-07-11T13:05:54.930000 CVE-2024-37981,0,0,d0a194094cce4ea4fa26be36ad567f878363b7ab0e3a73c3ce3496dd636c3768,2024-07-09T18:18:38.713000 CVE-2024-37984,0,0,661e877897f48deeba7f2b8906f18e3db9d8306f818f3e6d9ab1bfc048bacb9f,2024-07-09T18:18:38.713000 CVE-2024-37986,0,0,35347a55f6fe6bfb5b12edd95fe64ac3bf27f2eb6b52d7f793c6f43d6581664d,2024-07-09T18:18:38.713000 CVE-2024-37987,0,0,aa23196855f0aafc038d24a288ca20b3e67802fe46a356448fbefff51b5cdd24,2024-07-09T18:18:38.713000 CVE-2024-37988,0,0,2249a5a94ff62fbd1049e849814709b898dd042c53980bc1ebb966a779e1b45f,2024-07-09T18:18:38.713000 CVE-2024-37989,0,0,dcd9251350b8312f967ccfaf6bed908ce52042da267c0e5378c80314fb15c24a,2024-07-09T18:18:38.713000 -CVE-2024-3799,0,0,1eb9368b01468fefa1305325c306db1b4f00b170ef9894cbb10db19a0adfe7dd,2024-07-10T12:15:10.180000 +CVE-2024-3799,0,1,3a96a27c53ed7e1d7cf2579e3ed9f69ec7ff0985324452d5e5c94bdef3f87f3a,2024-07-11T13:05:54.930000 CVE-2024-37996,0,0,cba58d6ac90829d8d67ffd07f834ee70e887bc5c716a09a919d4b05a760695de,2024-07-09T18:19:14.047000 CVE-2024-37997,0,0,459dadeefbbac0d82b1c0c2a892387565fe96e62452959c2d684100f700aa64e,2024-07-09T18:19:14.047000 CVE-2024-37999,0,0,2d39b716db03797e18d7479260305690f3ed6e27f89fd5f1e73a83d3c2ff359b,2024-07-08T15:49:22.437000 @@ -254154,7 +254154,7 @@ CVE-2024-3829,0,0,3665a2ef01b9d2a532a67b6bd535e92cc829779e81e658e1b77983bbc06d00 CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000 CVE-2024-38294,0,0,5ead4befff2b61ceb0efdd186e7234e4e666514924ffa35ab4e04f3aea639e9b,2024-06-13T18:36:09.010000 CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f708b,2024-06-13T18:36:09.010000 -CVE-2024-38301,0,0,cd46f9204127556564df6993be61c235f2f5c082adfc2a8128a715915d4de63b,2024-07-10T03:15:02.447000 +CVE-2024-38301,0,1,f2a37402ef8b0d31ff3ea0e1d564c9225d55bf4ff53ba3d88dbb3b4cbe725ed6,2024-07-11T13:05:54.930000 CVE-2024-38306,0,0,e0aec5c158deb0f01179376e98c8bad40403be7c0bb21d50ea0989f9fb4a8b33,2024-06-25T18:50:42.040000 CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000 CVE-2024-38312,0,0,a025bc282a0932c71cb95ccc5342a2a383a8f77cb388790ae2ac3d82d89cfc0a,2024-06-17T12:43:31.090000 @@ -254173,8 +254173,8 @@ CVE-2024-38347,0,0,5765bd81529938cb4f4fd2014b4f526c5c45b5ac2280b7f219f3c1913944d CVE-2024-38348,0,0,d76ac40595953765ae6aa7072c9f7b614003a66a456cd40d15acbc09f7e58829,2024-07-11T02:50:33.110000 CVE-2024-38351,0,0,fc316049b1243ceecf4f16bb932622b3d32a9ec242887e0258f3f20fe77446f1,2024-06-20T12:44:01.637000 CVE-2024-38352,0,0,13a6e81e4d4d40a0591843c161ee638c75aac348990bf4d2603a4c2fb8cf2a30,2024-06-19T18:15:11.507000 -CVE-2024-38353,0,0,eb08852e451b97fe5122a1a9fd19cf3f0fa69e538523a9e0cadf1b54c38e5960,2024-07-10T20:15:04.053000 -CVE-2024-38354,0,0,1a991e4e7ebf191a695b1f99de82173b0105016b21d5ba679577ef4299e69da5,2024-07-10T20:15:04.293000 +CVE-2024-38353,0,1,c7fbc5157bea63c7f1f1bd15e83eaa811940abad1a21b06d85ae750a0936fa30,2024-07-11T13:05:54.930000 +CVE-2024-38354,0,1,a398cde25eca89dc6b1d83fb1dcdb59eac37ee93c0b7d44a7093b8c323e0d1ff,2024-07-11T13:05:54.930000 CVE-2024-38355,0,0,548f855fd76fea3ae91cbde1441c70071a7c7d1a3d657b48a4999a1a744b1672,2024-06-20T12:43:25.663000 CVE-2024-38356,0,0,4d5684a2a5b21833c79b0d8355427fc3daf538540dd8f7d1cfa341630e75ced1,2024-06-20T12:43:25.663000 CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405801,2024-06-20T12:43:25.663000 @@ -254210,7 +254210,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,3714727f8bfcc9e282c2717dad223df765a696413b267002faf1df27a5ac73ea,2024-06-17T12:42:04.623000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 -CVE-2024-38433,0,0,bb19380620c0f898c2545b519cc23ac43657f7a890dd5a2342f5e7e57129f75b,2024-07-11T08:15:10.623000 +CVE-2024-38433,0,1,ad87a013a62a702cd441ee6f303036185b91e7bf26e9c9464c23bdbbec5fda5f,2024-07-11T13:05:54.930000 CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000 CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000 CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000 @@ -254255,7 +254255,7 @@ CVE-2024-38513,0,0,1368ed636d2ce5b196281db8def21fabd9a411fc039fddaf211605e85a645 CVE-2024-38514,0,0,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000 CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000 CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 -CVE-2024-38517,0,0,60c7aa320f24276b388c6f5349462f070945f3ce92a3ebfd5f7acaf6b80ec83f,2024-07-09T19:15:12.470000 +CVE-2024-38517,0,1,1ee5531e39fd840e5f62a1d43dd9dd60da5a03d5606175c657fbdbc7b47451e6,2024-07-11T13:06:13.187000 CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000 CVE-2024-38519,0,0,3b366d37f50f101cb2bfcdc78fd05441af2a546f95a42ed60fc08615be04c6b0,2024-07-04T00:15:01.980000 CVE-2024-3852,0,0,23d67cc6cd9eaaffcbcd8c6df21d1387cf7355b2b4540b1c97d43e33361312ed,2024-07-03T02:06:44.987000 @@ -254414,7 +254414,7 @@ CVE-2024-38867,0,0,0af4e9111bae51f100e999bc3575e9e0f2f1178105282f6eb0eb905ae57e1 CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000 CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 CVE-2024-38874,0,0,84b324545c03e3af351829556c1e9c9a1e19bfbe37e66a75476dbe17e7f3fa44,2024-06-21T11:22:01.687000 -CVE-2024-38875,0,0,2cb8269f0339971166db3b9b424363f763323c96ac9ce77f34d52da10031429e,2024-07-10T05:15:12.020000 +CVE-2024-38875,0,1,4d06e52d66bb088dd3308d190e26b07e3fc88a2feccdd57bcaf91bfbd4544ec0,2024-07-11T13:05:54.930000 CVE-2024-3888,0,0,edb7c29072abf78278f8742356d5aae8212665d8818b230c40ee3cc957ee71c6,2024-06-04T16:57:41.053000 CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000 CVE-2024-38892,0,0,7f56674c04e74351dd21325ea04280a43fbeb1fd2a47bbef7c9364d4479e55d9,2024-07-03T02:05:22.090000 @@ -254435,8 +254435,8 @@ CVE-2024-38950,0,0,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c999 CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000 CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000 -CVE-2024-38959,0,0,1699711eec77d06a890c2382bb04fba5747c39e8450e44f15512bfd9fcfcc7da,2024-07-09T21:15:15.040000 -CVE-2024-38963,0,0,8b0c85a17cd8d9027d81981fdd8575e5d63c8ffc2eb7eaf14f6dbe60cbda4143,2024-07-09T22:15:02.560000 +CVE-2024-38959,0,1,35d58c096e8c181ef68bad7fe16bdc3a566065930291ece358634b3804188291,2024-07-11T13:05:54.930000 +CVE-2024-38963,0,1,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 CVE-2024-38970,0,0,91e8208e5384541de7bb386d755fd4eb6bf4f61a3ae0e0940aabeee93bae88f6,2024-07-09T18:18:38.713000 CVE-2024-38971,0,0,dbcb37d6e160e35ce881158758f6ae2e24bc77c4d53fd897245319338a4ba293,2024-07-09T18:18:38.713000 @@ -254471,15 +254471,15 @@ CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662 CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 CVE-2024-39028,0,0,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 -CVE-2024-39031,0,0,e5f22a4174a1015819bfe7cb10cad74b0d40c292048cc4160ddac55b4b1ccf68,2024-07-09T21:15:15.147000 +CVE-2024-39031,0,1,87594f9a7543935ed567cc144c4b357bcfeca07ea5de64b557316e2820044b7c,2024-07-11T13:05:54.930000 CVE-2024-3904,0,0,e776b30b1479be2ac2ba614a0e013b808dadbdf28dffb2a6f17cc6a76062926f,2024-07-05T12:55:51.367000 CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000 -CVE-2024-39063,0,0,1d20b161ec36556731d65c8d63217c1296331f1f687722c3750489cc99a7af2a,2024-07-09T20:15:12.080000 -CVE-2024-39069,0,0,5da5e0cf6a52d82c372eb7f7dab9e4feb7ff4a48eea0eb58a3d53e9c22f28841,2024-07-09T22:15:02.653000 +CVE-2024-39063,0,1,c1e0ac7f9481d76fe7fdb16a6eaacaab5e66b9b0a0a18edcff2fd308e8920150,2024-07-11T13:06:13.187000 +CVE-2024-39069,0,1,1b9a692823854c9e7b388ef3d138bfa20ebe2a96df75dd2813f998599aa58897,2024-07-11T13:05:54.930000 CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000 -CVE-2024-39071,0,0,8a1cdf3a65180f501e392bbd41bec701df0acdbfa6cc470fe114782328509a08,2024-07-09T21:15:15.237000 -CVE-2024-39072,0,0,ce76736e796fcad5183927d305e8116b49d272015103555a97fc0912eb4a1eae,2024-07-09T21:15:15.317000 +CVE-2024-39071,0,1,7c74af8ef579039c6deede59d85921c55f61ca2b6c6f5baa6420b9d85543b66f,2024-07-11T13:05:54.930000 +CVE-2024-39072,0,1,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000 CVE-2024-3908,0,0,85d7a8c4b6c04a1bc64d61b9b16434d97a56cd08e916479d8cc7f65ce540b05b,2024-06-04T19:20:26.660000 CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354ef,2024-06-04T19:20:26.763000 CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000 @@ -254509,7 +254509,7 @@ CVE-2024-39171,0,0,f9e3b60744fcd49938a54605a8d8cfd6802b6b8c90ab9d021ae399691b2b9 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 -CVE-2024-39181,0,0,e77a69a2fa906ea1851e3130a2ffb2641e69e960a2a3a96e87f4c05e7a1ea053,2024-07-09T21:15:15.403000 +CVE-2024-39181,0,1,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 CVE-2024-39202,0,0,46931c5bd077676b75e1b50a276f5344591efd9210d3fc017968681e45dcdf25,2024-07-08T16:35:46.377000 @@ -254566,9 +254566,9 @@ CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346 CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 -CVE-2024-39329,0,0,79b69918b77713579f2aa4d373f43dd0c878fa0fd29df97bcb0e66853ef7f7c9,2024-07-10T05:15:12.097000 +CVE-2024-39329,0,1,451f08ba6b4804b6c8190e5947c817855528118fe7efe36876c6f0445f70bb69,2024-07-11T13:05:54.930000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 -CVE-2024-39330,0,0,7a464a9ed1755ccb7a034f00ad59af1e30d1a1d58e0885cbe18887c18fafac4a,2024-07-10T05:15:12.167000 +CVE-2024-39330,0,1,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000 @@ -254631,33 +254631,33 @@ CVE-2024-39484,0,0,a445c76503df3c2b08ea3e5bff9e0551e6280c35730c3d8354635c9d4c9c0 CVE-2024-39485,0,0,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000 CVE-2024-39486,0,0,77cff8922a497e9f5f3a2c54a76728f0d6b7e7d5f3ffc0649161a58f4b404b51,2024-07-08T15:49:22.437000 CVE-2024-39487,0,0,a753ee835b7e39ba050c96e915c7182f4ab084e4115de59996f349f1dcc33193,2024-07-09T18:19:14.047000 -CVE-2024-39488,0,0,5528072f79027aec596d55ae054a3c32e53d1c5f9a9349fde5e1ffd130a4a2d0,2024-07-10T08:15:11.003000 -CVE-2024-39489,0,0,fac48583d60e545805163545e2f78ff6020483e55541f3ad6505407d5c0db51d,2024-07-10T08:15:11.110000 -CVE-2024-39490,0,0,a138bbf39d3622fed998081d841300f303ecee2f2a9a14db866018dc5e2ec056,2024-07-10T08:15:11.203000 -CVE-2024-39491,0,0,d2975a109e73a4d679d1de3277f449b0b59355c75959a87b79fec0fa339af23b,2024-07-10T08:15:11.287000 -CVE-2024-39492,0,0,936737ac4a5aa51c6dd2775e7e8ab10104463739019f0e5149175b556e6d42ae,2024-07-10T08:15:11.360000 -CVE-2024-39493,0,0,95ca26deac88a48a13f8b40620d0ff25df1c825b903366bd7b44a58ddff0741b,2024-07-10T08:15:11.427000 +CVE-2024-39488,0,1,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000 +CVE-2024-39489,0,1,b6de719e47b1b3ed46dc78de5550750533ba478cd05afb0e344e7e71729d5564,2024-07-11T13:05:54.930000 +CVE-2024-39490,0,1,a8cddc58398343c24172558bf85f4c7a72ad4cfe7677faf71fbe027877601e3a,2024-07-11T13:05:54.930000 +CVE-2024-39491,0,1,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000 +CVE-2024-39492,0,1,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000 +CVE-2024-39493,0,1,edb61e2bdcc22b19fdda7456b1765ba09bdac53634d9f36b25d7f9ffc79b9375,2024-07-11T13:05:54.930000 CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000 -CVE-2024-39511,0,0,7b05ce65731563c79294bee284ea4e6fa7d2301386141c03e1bff49ed7b8e0e8,2024-07-10T23:15:10.127000 -CVE-2024-39512,0,0,d7ca02e8f1592f1f31469ff4cd629b2fee1360dbe4e597a26bb73ed38f025794,2024-07-10T23:15:10.393000 -CVE-2024-39513,0,0,d8dc2351a0d98e5d4a578083ced931c7795fc8f4e60ad60f6ccc63d8ea7de867,2024-07-10T23:15:10.640000 -CVE-2024-39514,0,0,47631a8fe330006491f00cde3fb12f18c01c9baec830839535ae8ae7f97eaa93,2024-07-10T23:15:10.877000 -CVE-2024-39517,0,0,3c46ada663d8ffbdb4b88b4cfe0983c3e028f059ce81b2046e63dd2f8a33eef7,2024-07-10T23:15:11.127000 -CVE-2024-39518,0,0,eaa635a80528e7483e3e9921835314962ff00c79b39e854d1340c3887ad34e76,2024-07-10T23:15:11.363000 +CVE-2024-39511,0,1,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000 +CVE-2024-39512,0,1,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000 +CVE-2024-39513,0,1,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000 +CVE-2024-39514,0,1,6867df5f52f908f491ae646c1df8207b42c79f3d12187b6cec6f6552286fc92f,2024-07-11T13:05:54.930000 +CVE-2024-39517,0,1,ed12fbdd5935917e9b7f1e56184a21b312ea157822adf531c0ee87bdb0d202c2,2024-07-11T13:05:54.930000 +CVE-2024-39518,0,1,7f7ecf1dc91f43c4d2cd601e79a0cb63e34c06bbd9c6fdf0d6bfc073379626de,2024-07-11T13:05:54.930000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f43,2024-05-14T16:11:39.510000 CVE-2024-3955,0,0,1980afc805b9b5d168ea6a08c34d1a9d581fd505fecdd9c097016e585c054b35,2024-07-03T02:06:56.087000 -CVE-2024-39554,0,0,a896a71603d37ee05ce02ddcfcb6fd749048c8ad447822593b7a83b509192a64,2024-07-11T00:15:01.990000 -CVE-2024-39555,0,0,305803290d325fbcf3904271dce4385739256bb1824a023c6217ab8fbc632707,2024-07-10T23:15:11.863000 -CVE-2024-39556,0,0,03c8f7c9137bec821e13e27aa521c7a86a0f92820ddbfc1911cc0b6f362d4839,2024-07-10T23:15:12.133000 -CVE-2024-39557,0,0,8b6aefdeffc4849a2ec6d1dcca3a3eb4cba066b045df25dbe36ee6b0b93937c8,2024-07-10T23:15:12.370000 -CVE-2024-39558,0,0,2919edc34f42d8e103bdaf3d303d1679bf706fc60e9f5307313b09387b615fed,2024-07-10T23:15:12.617000 -CVE-2024-39559,0,0,ad430b23b18533cda3ddcfb241b9e2b35159b8281b37e4672c8f81f2b4ba7ea6,2024-07-10T23:15:12.863000 +CVE-2024-39554,0,1,607b6e2d09565242cea8dabcf216d7050a2b93324b4645878cad8b169c28c359,2024-07-11T13:05:54.930000 +CVE-2024-39555,0,1,2f4320b551c6e22d863307bba36cd5d725d7060ed4b026ce642dd6f86bb7e040,2024-07-11T13:05:54.930000 +CVE-2024-39556,0,1,647fdc524ccc7990194a12b5e61500593bd5f260b420aa3369c383e0ab67df27,2024-07-11T13:05:54.930000 +CVE-2024-39557,0,1,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863959,2024-07-11T13:05:54.930000 +CVE-2024-39558,0,1,2c8234bb1e56f02b1dd69b6d7d1c452c66a728f5c6ba35ca2896bb6d30eada6e,2024-07-11T13:05:54.930000 +CVE-2024-39559,0,1,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 -CVE-2024-39560,0,0,bff3d5ca0d1eeb898e1cde0c803b22bee5a652c60b70765c8a025e16b03b372b,2024-07-10T23:15:13.140000 -CVE-2024-39561,0,0,f04824838d32be9decc2affabee320bbb1df44f48491aa0e7ea7bd5df6540d63,2024-07-10T23:15:13.383000 -CVE-2024-39562,0,0,58e90e30c0db46bbb2aca8592ee3ce66358ecdc6223d7a942f023502538b998d,2024-07-10T23:15:13.670000 -CVE-2024-39565,0,0,7a40433b02cc0a7925d467cb898396367286e89939dabbf756204a268c184845,2024-07-10T23:15:13.940000 +CVE-2024-39560,0,1,60f24b3402f82ce62c23f2b509a2c041517e26bdb7d49fcda0ce914e25587466,2024-07-11T13:05:54.930000 +CVE-2024-39561,0,1,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000 +CVE-2024-39562,0,1,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000 +CVE-2024-39565,0,1,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000 CVE-2024-39567,0,0,7b194844163bcf526e5adc38cee5e584dfd615ab7311f788e296e35db5f76246,2024-07-09T18:19:14.047000 CVE-2024-39568,0,0,155da4fcd07a352c9fe4061336a48a1bfe3bd89ed7e98a66130b41e632263aa3,2024-07-09T18:19:14.047000 CVE-2024-39569,0,0,52889f68709bb42505429361fd8cbaa37b3cfa3fede130db2e5e3c1d1167ce5b,2024-07-09T18:19:14.047000 @@ -254676,7 +254676,7 @@ CVE-2024-39598,0,0,f83a7bf0b757c59666d0d48d25e10023a227b3391b984159eed2e11a978c8 CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000 CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 -CVE-2024-39614,0,0,90309f6015036efa3bc888f2a0dd1559cb6f97ad638deb146394ad9cf08459af,2024-07-10T05:15:12.237000 +CVE-2024-39614,0,1,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000 @@ -254686,12 +254686,12 @@ CVE-2024-39675,0,0,d0af7a5b3ca0ecdc840f81a24c22054a519a9c3aba3eafc6b5ad75a5c5c09 CVE-2024-39677,0,0,964d42b7e6f6658ef106b3a61b4dac74f8cf60cf8f733007f303b8eb8080b02d,2024-07-08T15:49:22.437000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 -CVE-2024-39684,0,0,67d683a5e58391528d46f26ad709b2e7a4d4eee2702aaec4f946ba29d9ab38ae,2024-07-09T19:15:12.700000 +CVE-2024-39684,0,1,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000 CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 -CVE-2024-39693,0,0,2bedde3e8044c66cb2a446cc4094e8e76f63af8ced7065586d84c6768c76810b,2024-07-10T20:15:04.543000 +CVE-2024-39693,0,1,3aed4b78b258f1f000b7104a802f9a4117c3d840404e28cf8e3ca8b4234aedba,2024-07-11T13:05:54.930000 CVE-2024-39695,0,0,fbaaa4e185fc8d8718a1bd681584149a106333fea090ef242205e9fceffe21eb,2024-07-09T14:47:19.767000 CVE-2024-39696,0,0,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000 CVE-2024-39697,0,0,9186fda2eab5f78df936964a06e0cbab87d706d772078d108f219ea7a02555a3,2024-07-09T18:19:14.047000 @@ -254738,27 +254738,27 @@ CVE-2024-39876,0,0,169343b5c12b9a1b2d2efbf07cd5193a2e3d213649798f2964b07aa764af7 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 -CVE-2024-39880,0,0,72625d5fb68856dfbd8824514309f4868100f2a1d501bfd1063f24cdc85b927a,2024-07-10T00:15:05.893000 -CVE-2024-39881,0,0,734513e1501cebcc0b72850eeaf6e0bc214e2c47aa69f9960687fba8aa685bab,2024-07-09T22:15:02.893000 -CVE-2024-39882,0,0,de74431e089ea50d9da8480de9f2d8563918e552efcd6f778b16f5d9b2937c6a,2024-07-09T22:15:03.013000 -CVE-2024-39883,0,0,f36e36507d993b385a0e1d9e126d2aed8a05ae37b677fab5d0df65c7316e4203,2024-07-09T22:15:03.133000 +CVE-2024-39880,0,1,36b0f01990c70662f6a76f5465d867d453cd73de89d829ef36b42a6741e6a854,2024-07-11T13:05:54.930000 +CVE-2024-39881,0,1,adf0b4fcb696b07b94720317071702eedcd1fdaba37c9e2a964066676ba014b9,2024-07-11T13:05:54.930000 +CVE-2024-39882,0,1,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bceaf,2024-07-11T13:05:54.930000 +CVE-2024-39883,0,1,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000 CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000 -CVE-2024-39886,0,0,a8ebbd552e2557e3b745298dbe6cc7303e3378e0473bc13e7712dfa68942ae03,2024-07-10T07:15:03.247000 +CVE-2024-39886,0,1,a2e387a2acfa229c74c2586e0ca497807b1ac870990e1fc7124f8fb418d96c3b,2024-07-11T13:05:54.930000 CVE-2024-39888,0,0,f7637ae0feee5d9d70653d284f2ffea6d3641a46c662eba72b67bcab442feb69,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 CVE-2024-39894,0,0,374900c11a12dc50ea15b6655eaae44b2fde3969c29fbbba5a961315eede48a8,2024-07-08T14:18:56.393000 CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000 -CVE-2024-39897,0,0,3295114120fedec0da2dbf0f3628b54559386248670bc6529eaa114f1aa466a0,2024-07-09T19:15:12.953000 -CVE-2024-39899,0,0,3b77fda908c49740a604eedb684641106ba71aeea057d890da04aa08decfed0d,2024-07-09T19:15:13.160000 +CVE-2024-39897,0,1,38f11367ba3345f659ee85a48448fecd8dec6f5b40a44a93fa8c3972047a7c01,2024-07-11T13:06:13.187000 +CVE-2024-39899,0,1,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df94c,2024-07-11T13:06:13.187000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 -CVE-2024-39900,0,0,5a7391b10ba66b88d3b0d96d9802aed430ae20b25a08ff4f8aff64a6ff53f256,2024-07-09T22:15:03.243000 -CVE-2024-39901,0,0,c52004d7010f12153b157c9d2835723dc79ee8ac7d5742198f350aec78b1b24d,2024-07-09T22:15:03.450000 +CVE-2024-39900,0,1,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000 +CVE-2024-39901,0,1,1d3e3b80615ba41835c485f10254821d67a955b0119b59f5c90d08afdfefd99d,2024-07-11T13:05:54.930000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 -CVE-2024-39927,0,0,e79f294dfea2ee535551bc3b55d35cb8ea6554ac331aeb3da0347edbd4b02f2a,2024-07-10T07:15:03.317000 +CVE-2024-39927,0,1,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000 CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-39930,0,0,17eb00e73f46631dbd6316a3ab19a74b1e7ba74e9179cfe94efb0d39751660c6,2024-07-05T12:55:51.367000 @@ -254777,12 +254777,12 @@ CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816f CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 -CVE-2024-40034,0,0,78d67fc0878192af719c7978a795f0266a63371348a0e7aa396d5fbf983c3a0b,2024-07-09T19:15:13.373000 -CVE-2024-40035,0,0,5fb709caafcde4b2b3185833d7ac50796df9191ba799bb1686dcd3c3a59c2bdb,2024-07-09T19:15:13.450000 -CVE-2024-40036,0,0,1d7848d98a623b5fda82afcbe214cbf4638c9fe5467c8d29b6f89634dd847e97,2024-07-09T19:15:13.527000 -CVE-2024-40037,0,0,3406ef6a008949c84f0b76b332bb30a3f08cd367a95cd4df08dd94fb7002b104,2024-07-09T19:15:13.600000 -CVE-2024-40038,0,0,65942ea3a59e4d92bef1453379b13d928fba789b5d2d1955e067b434559b806c,2024-07-09T19:15:13.677000 -CVE-2024-40039,0,0,47ab2d66e84898ffd29a9f7f08d83489b4de93592b04bcd622ef6d42390723c7,2024-07-09T19:15:13.750000 +CVE-2024-40034,0,1,4cf8988f789e771f9437deec1701e32aa0f490e66c431d68611599e17f7a3fda,2024-07-11T13:06:13.187000 +CVE-2024-40035,0,1,132a4be04465293ff4a980beb5e05717ee193abbcec3723f2f5efc0d66102554,2024-07-11T13:06:13.187000 +CVE-2024-40036,0,1,43743d13cbc1664edc8e42ac01bfa8ea60d7948686927fc6316bd722e6e77712,2024-07-11T13:06:13.187000 +CVE-2024-40037,0,1,5b8f3102a79caae73d78a17fd7828e0eef05bb7293789c0b49fe9eb0d327e242,2024-07-11T13:06:13.187000 +CVE-2024-40038,0,1,2e746b3880a55c0b28aa2e00208cacc10d29ef1e708fe36e08ceeb39c802d4ac,2024-07-11T13:06:13.187000 +CVE-2024-40039,0,1,5fe22166e82da251f322629ecfd29e5ec1ca0efd0c75b10b572505aa3450e595,2024-07-11T13:06:13.187000 CVE-2024-4005,0,0,db2b7e4cfe0f4bbe30f1cbadd95b4d8d4dea02eb8785d8f487b316678c44068d,2024-06-17T12:42:04.623000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 CVE-2024-4007,0,0,f23e193a2ac303efeb52b231cdfb7f68a21ff7ce4ccf120b52f049303bd3ddaa,2024-07-01T16:37:39.040000 @@ -254804,14 +254804,14 @@ CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f10 CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec4372,2024-07-05T16:15:05.520000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4032,0,0,52c6b9eccf7e021076c0ce344d44b2f19b27dbd5716fada0f5ba921e591652d5,2024-06-20T12:44:22.977000 -CVE-2024-40328,0,0,d529214afe13a3c1290c4557e8ccaf660e3fd92b09b55553ecb0c0ff67dc7e29,2024-07-10T13:15:10.497000 -CVE-2024-40329,0,0,e178ded44c9bc6d9584ca38dbd2159e36610a6b3dffebaf88166c21c249098bd,2024-07-10T13:15:10.593000 +CVE-2024-40328,0,1,7cd595aa5b39bb59d05641e21b3a254ae9a9ef8b54295cf4bb9a74afc0714ea3,2024-07-11T13:05:54.930000 +CVE-2024-40329,0,1,41a26c01ffafb441378d739e427645a780e000487130d0d08f992cdf38346dd3,2024-07-11T13:05:54.930000 CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000 -CVE-2024-40331,0,0,1609079d7bd308b4f84ddca3cbea5a4772600bea0c8187544f143f23c4cf6a34,2024-07-10T14:15:12.457000 -CVE-2024-40332,0,0,7d364ff2c71e95dbcbc4ea22bd7815a5e93d7670f6769cf239c4dd3653042e50,2024-07-10T14:15:12.540000 -CVE-2024-40333,0,0,dd4ba2fe700b383c9194940884e003ed2c3966a893aa8a0e42f9a999352ce465,2024-07-10T13:15:10.680000 -CVE-2024-40334,0,0,5a139ad150256622513cf576b3799d7b05a8fe93aa2a60775326648711b05d83,2024-07-10T13:15:10.760000 -CVE-2024-40336,0,0,9a749ba52c82ddc820fe076fe17aa90471477e3b857928e8c3c4b205c49eeac6,2024-07-10T14:15:12.620000 +CVE-2024-40331,0,1,bfb06d8fdc6b8050e721142c9677bd6207d960362f2abfc1c2513136b9a0c674,2024-07-11T13:05:54.930000 +CVE-2024-40332,0,1,2e3f95a9a025aa6ffb4896b255ee7c825d63bc3b4c97904f258ca3134e6768a8,2024-07-11T13:05:54.930000 +CVE-2024-40333,0,1,9ee32bf3c137039954d15c4d0aa756da5b4ab29cf1081c7675c565582e34bf51,2024-07-11T13:05:54.930000 +CVE-2024-40334,0,1,0f6416c66a2f7a24655624e914eca89a0566237a51d1e09767a4a1fc38d9e48f,2024-07-11T13:05:54.930000 +CVE-2024-40336,0,1,6756e62ac73e88613b0a9940ec3cddb24928fafbdc56431357029b4f7971fba0,2024-07-11T13:05:54.930000 CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000 CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000 CVE-2024-4036,0,0,a384819513ae72390ab82c2a7b5ea2fdbb1087d8a7f4dfd460e817b5f8f6a48f,2024-05-02T18:00:37.360000 @@ -254820,8 +254820,8 @@ CVE-2024-4038,0,0,bcee2fa5b2489836af4ab9c65caafd6eced0b2bbd0ce06913efc5e02957c74 CVE-2024-4039,0,0,cfdce9a10bb12a92a3dc5b97194d2925027fafc434caeab17aac25e26b57811c,2024-05-14T16:11:39.510000 CVE-2024-4040,0,0,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000 CVE-2024-4041,0,0,eb91b240ef125b96ca72e19c4e4b4f0865365edd07fdbe934106504507637e12,2024-05-14T16:11:39.510000 -CVE-2024-40412,0,0,d6027eac725a31820a092253dbaef8c25511c7ebe2f7c8799eaed47275118e56,2024-07-10T16:15:04.290000 -CVE-2024-40417,0,0,f0a4f33aa355235240f771e803a7b1fe4ba7a865fede32286bbd32f721dc5359,2024-07-10T16:15:04.373000 +CVE-2024-40412,0,1,91f079dffe6bd9c9a907ca91cc30b4b1a6afa7dd99f6de13d3e9b4e2bfd4438d,2024-07-11T13:05:54.930000 +CVE-2024-40417,0,1,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 CVE-2024-4042,0,0,0e138f60785a8eea473d0d945af61b2ea42931feecdaf6ebd49f8dd479a2b25a,2024-06-07T14:56:05.647000 CVE-2024-4043,0,0,6af9720af6118fb183f8125f22f9123aff9cbd64639b4a3b02a251bb0a5a463e,2024-05-24T01:15:30.977000 CVE-2024-4044,0,0,24332ace72d4390c16ec3b8977440043e797db2d7d42445b64fa06b462f42633,2024-05-14T16:11:39.510000 @@ -254845,7 +254845,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000 CVE-2024-4061,0,0,731822e6f24cd811e7f06812f39ade81c9a66c6b1046f4d45903066a1f181f99,2024-05-21T12:37:59.687000 CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 -CVE-2024-40618,0,0,dee18d7f503dd740f50c66a452f86566310b7b581c71c2f27ebd005be84bf650,2024-07-11T02:15:01.680000 +CVE-2024-40618,0,1,dfde754a0de766ec9f89111f0ca6917fdc9cd1f25c1bacf5501f340e4ad22258,2024-07-11T13:05:54.930000 CVE-2024-4062,0,0,7fcbe6e50148b9b5e05d3025a893191a4aca3bb309243ec182c3df8f6e2a0587,2024-06-04T19:20:29.007000 CVE-2024-4063,0,0,10c24a204d439c4cd3340a486d9bc67fc982c548c71c2d3a385738d7e6499dc1,2024-06-04T19:20:29.120000 CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a17,2024-05-17T02:40:14.223000 @@ -254877,7 +254877,7 @@ CVE-2024-40740,0,0,ee2ab6b2d7e1edae21ac57ec7c719455baac814ba7f21c1ea74f0831ad78d CVE-2024-40741,0,0,ddd0ff9476ed1ff47a6c6ea90383139e3fceeb76685fa77b077d9f9786ebe979,2024-07-11T02:54:30.653000 CVE-2024-40742,0,0,6a3bedaa848e5df96fdcf8c837c015f053f6eb9a57ab6613e692a76a4dfad1cb,2024-07-11T02:54:19.547000 CVE-2024-4075,0,0,61cfb92eb2dc2fb6e0ff8370e47bd10bfd7f8ca1c4517b0742f92f6865b710f5,2024-05-17T02:40:15.170000 -CVE-2024-40750,0,0,f8266e014cc3ac656ad6d049fe09df90666738b7d18014f81d88c3e5ca036e47,2024-07-09T20:15:12.357000 +CVE-2024-40750,0,1,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000 CVE-2024-4078,0,0,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000 CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997fc,2024-05-14T16:11:39.510000 @@ -255367,7 +255367,7 @@ CVE-2024-4651,0,0,7a1073040800fe83444723cdc7dc81dd54cd1cc8604732f5c58643190867c3 CVE-2024-4652,0,0,5a9d123e7dc162b2780d21e171c5f7bd67b56d13b67e6af24f7924f686cdd9ec,2024-06-04T19:20:44.873000 CVE-2024-4653,0,0,695819124007e1fa87749621ef4d62ddcb026ccafa0c20f99f5ec61618107b32,2024-06-04T19:20:44.990000 CVE-2024-4654,0,0,eca077048d127add67f133585649496d1af539c8d39e41b186d99947e2c0e50e,2024-06-04T19:20:45.100000 -CVE-2024-4655,0,0,7c22b4975dcb72ee29c4354ed269f18f346339341d5519ac7b971db8a2facbd4,2024-07-11T06:15:02.750000 +CVE-2024-4655,0,1,8c2124989ee3cd890b4c00ec8d95a0d9b4b49e43f090dc065aa9a10ff43dbfa3,2024-07-11T13:05:54.930000 CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d332548405180,2024-05-15T16:40:19.330000 CVE-2024-4661,0,0,e86145aa3dfc1a1e846a3970af65d72463f2a51aba17ea6b9d5a34de37b2fc53,2024-06-10T02:52:08.267000 CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000 @@ -255542,7 +255542,7 @@ CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152 CVE-2024-4862,0,0,edcbe7924a96735f669863aa954e0b80b2f2f909fa86acc0b68d2b031ff4d4fc,2024-07-09T18:19:14.047000 CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000 -CVE-2024-4866,0,0,378386d0fa7f3a9ebde1a3f1d733d8c53a0ca74a601e6817edac1acd37e8aeff,2024-07-10T02:15:03.347000 +CVE-2024-4866,0,1,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,af51c1eee226c4cbb50e264de1c7a9cc126d126278458819152cafca85d017ce,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000 @@ -255551,7 +255551,7 @@ CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462 CVE-2024-4874,0,0,e489f4227689f3d8a28a1c171b72c6312c838f037435967f317d135bb1153eae,2024-06-24T19:41:12.293000 CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000 -CVE-2024-4879,0,0,de981101384ec0eb69d645ad034e5f914591ac78ae883e02998458bac9a93a06,2024-07-10T18:15:05.070000 +CVE-2024-4879,0,1,8c50d254612a54826fe682a82d21f0b2b4445e00a7b92ddeb58ff80ea8fd6f94,2024-07-11T13:05:54.930000 CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 CVE-2024-4883,0,0,4968eaa5ac5e1ee17a980c68456ded7b931eebe67d4a414b20bc214305c03a05,2024-06-26T12:44:29.693000 @@ -255788,7 +255788,7 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812 CVE-2024-5173,0,0,1d07a8c869bc825cf73f46bac935aee62b58e8e6badef703c708e935b6259cfb,2024-06-26T12:44:29.693000 CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 -CVE-2024-5178,0,0,5c64df59824c44f2fc6617eaaca9d7c2aff1cbe31f98dd22e5fee7473ad42e6c,2024-07-10T17:15:12.240000 +CVE-2024-5178,0,1,848f230b17b9b68b88d15ee9c3e105cf264e6a27521f878cebaf54aa0058cba6,2024-07-11T13:05:54.930000 CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000 CVE-2024-5181,0,0,1490518c3f763a5bc28caf27f315947d0d04f2023e03f107a32a0e693b85b149,2024-06-26T12:44:29.693000 CVE-2024-5182,0,0,05eb067250c704bd4c420313ce1da2aeb70843fd4dce4dbb10fdc9fbc9defbb8,2024-06-20T12:43:25.663000 @@ -255820,7 +255820,7 @@ CVE-2024-5213,0,0,5a68006f91028e70fb3202f4e898c6483c20faed2d33be845b22e07c07dc81 CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000 CVE-2024-5215,0,0,f42221106c0d0e877d05b8e2e26cf7673e58a6d4a9fc7867210cc0dc29795334,2024-06-26T12:44:29.693000 CVE-2024-5216,0,0,f74916bcde595c5203a7e0644e281dc01f68ce529e1f3e14cc74a2e3eb525ca3,2024-06-25T12:24:17.873000 -CVE-2024-5217,0,0,10f6419407660ca45abb5e57ac45294dfb5bd875a71b7e70b7fe02a845d0223a,2024-07-10T17:15:12.373000 +CVE-2024-5217,0,1,a3220db8b5d820ce86a337822efd787589de45cbc58a37f6871f986ce72ad63e,2024-07-11T13:05:54.930000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 @@ -255852,7 +255852,7 @@ CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c7 CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000 CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de6328191e,2024-06-07T14:56:05.647000 CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000 -CVE-2024-5257,0,0,f184a802f391b16bcb38e650e37ea03f95116520e3ec1051aeb9e53f39cbbce0,2024-07-11T07:15:04.257000 +CVE-2024-5257,0,1,d76a55929787a659b765daf65115193bb507164089a71d3d6dd8a4ae03e3f106,2024-07-11T13:05:54.930000 CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000 CVE-2024-5259,0,0,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 @@ -256005,7 +256005,7 @@ CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2 CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 CVE-2024-5441,0,0,a7bb50aeb84e17ae0f6968b8ffc04aee2cb8a84b24c26594cbc0250db6319333,2024-07-09T18:19:14.047000 CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000 -CVE-2024-5444,0,0,d3f63c772b302041890933ebf637b6c3e30604947c104a9329885c757ae2ab68,2024-07-11T06:15:02.830000 +CVE-2024-5444,0,1,e0b9b65e689c0742c5dc95f0a56d12e8c1a79b1d7cbeb9381ec169917f5ba16b,2024-07-11T13:05:54.930000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 @@ -256023,7 +256023,7 @@ CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339b CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000 -CVE-2024-5470,0,0,8510346b5fe53365cd1305101c4d92af57bc0cb15622a6b25d6e261bfd9b16c6,2024-07-11T07:15:04.833000 +CVE-2024-5470,0,1,cd6bb597082116607199989bf09a83f1021c14ba1b3a6e58a1ea8473d53137df,2024-07-11T13:05:54.930000 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 @@ -256036,8 +256036,8 @@ CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6e CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 CVE-2024-5488,0,0,36664283baf396592c4e35eea335f5722cbf42bf1f5665184ae35a27e595d9e7,2024-07-09T18:19:14.047000 CVE-2024-5489,0,0,9bb79263edce390c6997c8d9f9fe7d295077e49147dbdcc1c480d08892e3d2f5,2024-06-11T18:15:01.617000 -CVE-2024-5491,0,0,2f05114998827e32300a42e2de57c3624b9c94cbc1f8d85b510f1bf5917cd6aa,2024-07-10T19:15:11.190000 -CVE-2024-5492,0,0,98ca61dd6b125f67106f528e9fd90c0c57a573cef0a8f3da1e62444944450907,2024-07-10T19:15:11.293000 +CVE-2024-5491,0,1,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 +CVE-2024-5492,0,1,ef9d60420cc278300dad8633c6d5a4d9cec47839ae67a5efd349eac4679c005a,2024-07-11T13:05:54.930000 CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 CVE-2024-5494,0,0,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc903d,2024-07-03T02:08:59.420000 CVE-2024-5495,0,0,0a1c44916768f321aa0f99dcbbf7835c3f375f68104a303716ad9e841a86c5f0,2024-06-10T17:16:34.740000 @@ -256147,7 +256147,7 @@ CVE-2024-5659,0,0,dbb598e16e86b9c719d485b541188ff6e8ea72d57c8ec148ee2290d2bb1f42 CVE-2024-5661,0,0,64c610f4ac197974e4a9f4370e828aefe9bbaabb0bf444795d194a1356128a89,2024-07-02T14:43:40.460000 CVE-2024-5662,0,0,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec26,2024-06-28T10:27:00.920000 CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000 -CVE-2024-5664,0,0,06615a3a1b1ddca8cbcc97e7c80b71572a07e55905da8641263f5e1cbe246170,2024-07-10T08:15:11.507000 +CVE-2024-5664,0,1,3daba34112ffc15ab14e7e66b41cb4d94002be0e467de37777afa664cf939f2a,2024-07-11T13:05:54.930000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 CVE-2024-5669,0,0,ddd7772a6277d903bcf1d89da44667af6e9a3df4fd3440e71ca75c5d1aad7a37,2024-07-09T18:19:14.047000 @@ -256157,10 +256157,10 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 CVE-2024-5676,0,0,7110ec4f1d7a030c3f52d0d64b45a1f2c788bd0c12290f7487a0ece147b33240,2024-06-24T05:15:09.600000 -CVE-2024-5677,0,0,048a9d3e6f244fe163aa7534ab2dad91831ede34eb1e44dfdf068946bc641680,2024-07-10T02:15:03.570000 -CVE-2024-5679,0,0,6b8e5c2a8649a4bf5f9b28b23b36e532b02eeb8b5f9ad1a61ed718dfa53d7fe3,2024-07-11T09:15:03.523000 -CVE-2024-5680,0,0,62b934ae3fb2beb15b3130324450d9ef12e29fe8a397f66fd06c63c85ec3e0e5,2024-07-11T09:15:03.923000 -CVE-2024-5681,0,0,1d87695789e8cea7f7b3e20a847e1a5786be6b5214dfc5bdcc396d2784b592ef,2024-07-11T09:15:04.360000 +CVE-2024-5677,0,1,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000 +CVE-2024-5679,0,1,1b9c56cba527d158192215e0e30fd1c10c228f839f81c2546d99ba6401c926c5,2024-07-11T13:05:54.930000 +CVE-2024-5680,0,1,3ebe734c1513dc7f890bbd2e7aa8b63fd3b360493fbd000759fe3ddff9cc4ed7,2024-07-11T13:05:54.930000 +CVE-2024-5681,0,1,d9e9cc4fa7a92c79eb41f6e51c1ec5add3d22dec102138950a140d8fa1549bc3,2024-07-11T13:05:54.930000 CVE-2024-5683,0,0,416fdce68077ec4a3eabb7881f93e8b3f956fda57e2d7ec858b12f0a2abb9f15,2024-06-24T12:57:36.513000 CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000 @@ -256235,7 +256235,7 @@ CVE-2024-5787,0,0,7676e1b0ab184e8654efc91f56a8d84cd9d6d539bf642c0a4ff7f743a62b9d CVE-2024-5788,0,0,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000 CVE-2024-5790,0,0,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000 CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000 -CVE-2024-5792,0,0,624cc5e2f7682dfb4bb134d73d43d570a9d7ecc67bdfbaae2a67a5a4123e2d5a,2024-07-10T02:15:03.800000 +CVE-2024-5792,0,1,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd3a,2024-07-11T13:05:54.930000 CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000 CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000 @@ -256306,10 +256306,10 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000 CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000 CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000 -CVE-2024-5910,0,0,1acb753d2e88901e967b804222845e43c9699c302f4b4582706fcd2c6a29195b,2024-07-10T19:15:11.390000 -CVE-2024-5911,0,0,8a6e879c2208cd5de10f9c1cb9641e87ae8a4b2966dcce9db9ad381842c936c9,2024-07-10T19:15:11.547000 -CVE-2024-5912,0,0,c966f93537b840ffc1873604fdfb6b553e2d6aed4c1b4e36047db4d4f60803c2,2024-07-10T19:15:11.697000 -CVE-2024-5913,0,0,d05ebf205747ef3a72c3254aa3b64a5d9d644844ef8cb323b5d23e9fb1f34aeb,2024-07-10T19:15:11.837000 +CVE-2024-5910,0,1,90cc21d0847234b3526638233dffb575bd78298c2136f3076c84a2e819ba4a1f,2024-07-11T13:05:54.930000 +CVE-2024-5911,0,1,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000 +CVE-2024-5912,0,1,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000 +CVE-2024-5913,0,1,e09fa300f42c3066d0a6d6e758e3f3cfea839eecb0d836963ee331dd9715d64e,2024-07-11T13:05:54.930000 CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000 @@ -256368,13 +256368,13 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32 CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000 CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000 CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000 -CVE-2024-6025,0,0,3cb4fdfae5b0aa1d267caa2e5bddcf600f375514eb7204901b48fefb734a78ff,2024-07-11T06:15:02.913000 -CVE-2024-6026,0,0,90fca20fa5bac3e58c918bd2a413ee2ae1ff5f560bb9a73637fcd29b45021c5a,2024-07-11T06:15:02.987000 +CVE-2024-6025,0,1,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000 +CVE-2024-6026,0,1,0d6a5216426616ee83cf6c92950c870af6e75ec5b4de2c9f55776dd001c586c2,2024-07-11T13:05:54.930000 CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a53cebc0801a7944b049693d6e4ba090f6ff8943c9a085ad6c29614624cd6988,2024-06-25T12:24:17.873000 -CVE-2024-6035,1,1,ebc7f8d12c5c13ec84c914cd4468ee0d84eafb74f926dd4132ff683d5e79f00e,2024-07-11T11:15:09.920000 -CVE-2024-6036,0,0,9c40c5bcd05d9b6168425666513e1b805aecf8096340a0971d6e55598f8c851b,2024-07-10T23:15:14.227000 -CVE-2024-6037,0,0,06d4d8b656bd7649ce96f1e8400293777fe64cfb344d03821531ca32c2859265,2024-07-10T23:15:14.493000 +CVE-2024-6035,0,1,e543f789bc9a4f00266b9e998e7231d01391f3bf16f7fb9d950923c693c3bd18,2024-07-11T13:05:54.930000 +CVE-2024-6036,0,1,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 +CVE-2024-6037,0,1,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4dff4db125482f9ecedc7a5fd577549dfaebc98ad18a8caa631a9c29113f6e8d,2024-06-27T19:25:12.067000 CVE-2024-6039,0,0,266923799676f8be01eee28d4a84714045ee9a927bc992eaf897cc5b748105d7,2024-06-17T14:15:12.620000 CVE-2024-6041,0,0,a295768a83c71f46593370532a5a859cd3d130f4e3527299fc42bdf02397e4d4,2024-06-17T14:15:12.733000 @@ -256436,7 +256436,7 @@ CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000 -CVE-2024-6138,0,0,d5ee41fe3da4fa8e774a2e1dec8a0b8fc868fdcc94e3d869edd9f1ec7055ea85,2024-07-11T06:15:03.083000 +CVE-2024-6138,0,1,3ba38243649706f868fb4573a050e3d9b42f4641597c22445d000edc1dfa515f,2024-07-11T13:05:54.930000 CVE-2024-6139,0,0,5267393f199f3e6d04675c179e30c182dfe9af96089cf21d4ca0eef7a0895473,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,23f480e47c156f1dad9ad13e0d7590969d38d5491fbe00b3021017412ace7767,2024-06-20T12:44:01.637000 CVE-2024-6143,0,0,8ecb1606cf08b70c452136729986c382308670f8f5aa74c9caba844228d971e4,2024-06-20T12:44:01.637000 @@ -256444,10 +256444,10 @@ CVE-2024-6144,0,0,282f248ec161eadd8599a33b6d11a75bd4ed1ccd1aa15e9b959a4a72d41d30 CVE-2024-6145,0,0,74f99a0157ef2eb5160bc64159bab3cd3614efb0f0cae9420b13288ce6d516ff,2024-06-20T12:44:01.637000 CVE-2024-6146,0,0,835232b778d7e80b1c73cad2f19f1275692bff270d5e664fd4c7fc64973110ef,2024-06-20T12:44:01.637000 CVE-2024-6147,0,0,4a4919271ad23db4250af2d646dfd99f64704c8a0c63e163a55ff156915fc472,2024-06-21T11:22:01.687000 -CVE-2024-6148,0,0,dcd83a245e39fa43db402f0637ad356b0d0e0667882f01d90e6c3c6107206e98,2024-07-10T21:15:10.730000 -CVE-2024-6149,0,0,a9578230ee145225e434c626fca85a259f303801ec1a7121abf0ec884010a742,2024-07-10T21:15:10.830000 -CVE-2024-6150,0,0,6ad8b9667f4da237273307618c00aa9adad0e60508a636fb2e1e33190d440247,2024-07-10T21:15:10.920000 -CVE-2024-6151,0,0,135328139a2a1eaf24b04738d199c3901e649153e54ef8d081a281ad2900fd4d,2024-07-10T21:15:11.013000 +CVE-2024-6148,0,1,863118c6188e2df31bad7fa26020ca6c91ddeb37e3c120067679f498fce017ca,2024-07-11T13:05:54.930000 +CVE-2024-6149,0,1,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 +CVE-2024-6150,0,1,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 +CVE-2024-6151,0,1,cde1d0f1d46af13ac335bf583d915a9a43a7bc6bfa372676b03728b1f5308a4e,2024-07-11T13:05:54.930000 CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837d5,2024-06-21T11:22:01.687000 CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000 CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000 @@ -256484,7 +256484,7 @@ CVE-2024-6195,0,0,880630f7e59fe96c68db9446cad414c3056228167cb15e9eb7f8a5b897e968 CVE-2024-6196,0,0,8d29dbc22f191f0a2e6f5022705b8c2127b1c89230e4a1900a70835df0ab8ad4,2024-06-21T17:15:11.350000 CVE-2024-6206,0,0,a239648c07eb93ed8775dc2c6fd68864bae94b397314d858106207781c570047,2024-06-26T12:44:29.693000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 -CVE-2024-6210,0,0,72464d377e6378636c5beea1bd25256937eedf4cccfcfaeaf46234764d20371f,2024-07-11T03:15:03.550000 +CVE-2024-6210,0,1,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 CVE-2024-6212,0,0,c1e9ad93b654311e54f23eb8816b7040c4009f7be4b90d449446bdaf277f7228,2024-06-21T15:15:16.313000 CVE-2024-6213,0,0,875f788502e9039ff5cde644917f38d937eec3d1fa9cda735bda62057b13f974,2024-06-21T11:22:01.687000 CVE-2024-6214,0,0,f04922fee1928885a13a6b9135dd29d8f0bc0dcf3373a5ce58e6bf8d17734328,2024-06-21T15:15:16.430000 @@ -256496,8 +256496,8 @@ CVE-2024-6222,0,0,7d8ad82668d6d98e0f167e915dde6d9fa8875b44590f66f2e873d05e89e247 CVE-2024-6225,0,0,05da1495d7d116987721ea4d8dad783669e833db8afd42c6e9b9d7b36358250e,2024-06-24T19:21:28.450000 CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000 CVE-2024-6229,0,0,8c75c4089f9bb2b690871cceb6de9502d8662dbaa4dc8109053b9a0e9bdfb643,2024-07-08T15:49:22.437000 -CVE-2024-6235,0,0,e3c37bb4fde984e1ccadb66beb9f2d57535be87aa4e3d6539029d59968be2e76,2024-07-10T19:15:11.973000 -CVE-2024-6236,0,0,959a1f53fbd24ac8bbba6562ae5b94299031a022f324a67305fde8f021d5c507,2024-07-10T21:15:11.120000 +CVE-2024-6235,0,1,0b1e1e0d470471463f89ba25d7bc9348152a709eae56f2ffafa950ec7e27e12e,2024-07-11T13:05:54.930000 +CVE-2024-6236,0,1,294d07111f47e2594afccb77d041edde3630ac9799928242bfa797180655c347,2024-07-11T13:05:54.930000 CVE-2024-6237,0,0,8eb889363f8a87d3bb3f430f1da56ccf68ff66b11eeffce13455da0850e4107b,2024-07-09T18:18:38.713000 CVE-2024-6238,0,0,01bce4fcd5bf21099e3fa29fb7e34bf0d2a461d152d0ae3d9b913c1fb46d1451,2024-06-25T18:50:42.040000 CVE-2024-6239,0,0,4d98a21d53ef2e5917897cadc254a12ee654ff1e3575a82a15151981272f61b5,2024-06-24T19:06:27.537000 @@ -256507,7 +256507,7 @@ CVE-2024-6250,0,0,d65ae5fe4d151231819cfece0198aae82e2009a318154594bfd2da65c5baac CVE-2024-6251,0,0,76d6a56e1b2f86f9d8f71f51691147da73df155a07e8f8a63cfd8ad441487e4d,2024-06-24T12:57:36.513000 CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debccf,2024-06-26T19:15:14.383000 CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 -CVE-2024-6256,0,0,bbaa06c1b28f4fccfd39612ae1acc78f3c70149ef436bb25f2e91d150b691037,2024-07-11T07:15:05.430000 +CVE-2024-6256,0,1,342c600e43ac64ce30bda39b68adb1a30c31fbb308c868960dc5d8c4fa7f7c83,2024-07-11T13:05:54.930000 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000 @@ -256528,7 +256528,7 @@ CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c577 CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 CVE-2024-6284,0,0,73ccbe59cd13df171bbc79ab6b910254c728a7cb44133bad73b07b9d4dc26d5e,2024-07-05T12:55:51.367000 CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000 -CVE-2024-6286,0,0,465273d6f75a4d4193bc59c5929b52288f5d34220942ae74fab2f5d29f1b2acf,2024-07-10T21:15:11.210000 +CVE-2024-6286,0,1,f070489585ed2b009d7c844619c8f89f0869dbfc5b75014af9fcf3f396b20370,2024-07-11T13:05:54.930000 CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000 CVE-2024-6288,0,0,759e3147da1b3805ee22c246688b7816f816dcaacd990c0e2025b974262129c2,2024-06-28T10:27:00.920000 CVE-2024-6290,0,0,f38106d9e1179e3770e59e6eaa72c9e7b486c800903b3806d0d60fbc8ab354e0,2024-07-03T02:09:49.960000 @@ -256582,38 +256582,38 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 -CVE-2024-6385,0,0,9d1fc2ae101a45caef95b756b0870f3949aab2c962ee2724ef0d0237bc0aa4f2,2024-07-11T07:15:06.123000 +CVE-2024-6385,0,1,5cd1b1d2bb2619e597fdfbc12061290bedb1abf1843381c16b40d3e31cd024b8,2024-07-11T13:05:54.930000 CVE-2024-6387,0,0,5d65fd70c1d8c6b7a5aed89dcca753d45414c4dce967dc5a869d91f9a08e890f,2024-07-11T04:15:05.403000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000 -CVE-2024-6397,0,0,c1bcf3dcc1da461e1d7b73adee6422c06371280e34da2dac2de698eeede70d88,2024-07-11T04:15:05.997000 +CVE-2024-6397,0,1,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 -CVE-2024-6407,1,1,bf4ab2b2885f3b7988f9b47bc4d1e16162d56c67c149d336f08d077e7a88bf6f,2024-07-11T10:15:02.277000 +CVE-2024-6407,0,1,ec5dc8c03230b8fa5cd2a16eef82cbc157d078945319bc360474d77e784aeadf,2024-07-11T13:05:54.930000 CVE-2024-6409,0,0,9bc68adee8126d980e539ed0340617319811b9c1ec91d5c6d49c8bedd8ee2b95,2024-07-10T20:15:04.853000 -CVE-2024-6410,0,0,4a23711af9b75fd5d9c836acb666fb2c064959ce225737e22ec0f19711868ab5,2024-07-10T05:15:12.313000 -CVE-2024-6411,0,0,c411733ced490230d62545353c4c7ed0b98f77df3ab30f2e11b0169200346139,2024-07-10T05:15:12.497000 +CVE-2024-6410,0,1,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 +CVE-2024-6411,0,1,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000 CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000 CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 -CVE-2024-6421,0,0,db7bd9971338615d215f1e7b8e7fa087aaa5719e2acb0c0a97901e85c2169ff5,2024-07-10T08:15:11.720000 -CVE-2024-6422,0,0,191366e016b6dbb4ac4d53079d948b79aacc8ec4f54058704bb848c7c583085e,2024-07-10T08:15:11.970000 +CVE-2024-6421,0,1,2fe6e0b05086ec8fe1614a33f3714b1b7412a68316b06964410d48a53c099378,2024-07-11T13:05:54.930000 +CVE-2024-6422,0,1,55d1b4b5125b3e6420c56faceebe4743e983319ac647dfed74960e28bff876d9,2024-07-11T13:05:54.930000 CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000 CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000 CVE-2024-6426,0,0,f8400a1dd26a0192767404ca5f7752c12cf287ce03e2990002fc305f7bc08efa,2024-07-05T17:10:26.683000 CVE-2024-6427,0,0,4e3c2a8d1e984293b7a508d6724a6a3f7998f367f7900ab80f87cf0d36ad12b5,2024-07-05T17:10:44.997000 CVE-2024-6428,0,0,8095b4dcd35f897b4650661c439e7e332797ada1bd3807e53dae0badb2379a85,2024-07-05T17:08:11.060000 -CVE-2024-6433,0,0,66ccbc952184872a503191e30599c50ee930adc43e10bafd510698d45ee82898,2024-07-10T01:15:10.370000 +CVE-2024-6433,0,1,d602ab3dc41aef42850f40bee564814e8e233db523dba7834f636c439b366593,2024-07-11T13:05:54.930000 CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000 CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000 -CVE-2024-6447,0,0,6fc451ee17cd970df275e95e4baee0e179ec2e2771213fb28f1cfe9bee440c86,2024-07-11T00:15:02.113000 +CVE-2024-6447,0,1,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000 @@ -256623,7 +256623,7 @@ CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d5 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 -CVE-2024-6501,0,0,00716719e9f9745c68bb199c61daecf7eedef750e8f90f81058c770dd9c0861d,2024-07-09T20:15:12.470000 +CVE-2024-6501,0,1,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 @@ -256634,11 +256634,11 @@ CVE-2024-6524,0,0,a7a803cd0c4b163adf24a214658dd36dbf3d93b3905b2171e3d08048b915cb CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b927,2024-07-08T15:30:11.133000 CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 CVE-2024-6527,0,0,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000 -CVE-2024-6528,0,0,eb3917ab4af2a4d64c6c126ac428a6693e543eb861d6e7dd91f2961dfda45f60,2024-07-11T09:15:04.867000 +CVE-2024-6528,0,1,eadd6f4f4be8f81226626302b00f66ebfbebf71ded08e8d23278bcc971f84701,2024-07-11T13:05:54.930000 CVE-2024-6539,0,0,af7a9107d7b462a59e1314d81ee0ea249c00edb3c899ac73079834fee3e5a982,2024-07-08T15:49:22.437000 -CVE-2024-6550,0,0,5d1ac2302fccc411850552add6961beebffbcf8502b1c5101339eaaf0570c4d7,2024-07-10T04:15:04.290000 -CVE-2024-6554,0,0,da04ed49e1032c5eeb38aec508c64e0eb4fcf081b7573a33fd1beb1760a9131f,2024-07-11T04:15:06.387000 -CVE-2024-6556,0,0,f6995563a669d24a1da43c211041cfd8dccd356df79a3a4ff9fed43fe7bef50f,2024-07-10T09:15:02.747000 +CVE-2024-6550,0,1,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 +CVE-2024-6554,0,1,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000 +CVE-2024-6556,0,1,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 @@ -256659,19 +256659,19 @@ CVE-2024-6612,0,0,8ea660f335d1e8552a64db073fe7466306fd1f2e5cc9fbb77910ed6aa806d5 CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c0a,2024-07-09T18:18:38.713000 CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000 CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000 -CVE-2024-6624,0,0,510e53e90f3f7c6bba8084aafc0f2d567850c84f7ef8b1f74bad787bb3e04592,2024-07-11T07:15:06.697000 +CVE-2024-6624,0,1,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000 -CVE-2024-6643,1,1,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000 -CVE-2024-6644,0,0,4ac0927b6bee710b6d7aa47a319df161deab572b53510067cbeff9a5913bdd4c,2024-07-10T17:15:12.980000 -CVE-2024-6645,0,0,8ee317125a412d226c217d8aa7e29bf02176cbf9e3265855272fdc48170e0bd4,2024-07-10T17:15:13.320000 -CVE-2024-6646,0,0,01c30e39566e822aad5b619eab7c1cda5be4c04760003ec04ead5d5505b412a8,2024-07-10T18:15:05.480000 -CVE-2024-6647,0,0,d85de7e2a89b23bef0d7c402bdb84b5d7bcecaf5214acb2011ddba0aeacad46c,2024-07-10T21:15:11.350000 -CVE-2024-6649,0,0,ba27e99c640a915a148c2cc576aa13e58beea119b44959dc391310f141dd2bdb,2024-07-10T19:15:12.070000 -CVE-2024-6650,0,0,bcdf1da4f730173ec0ef176b961ebc45fd74db5710c1b540fd5342347455e8ad,2024-07-10T23:15:14.930000 -CVE-2024-6652,0,0,bb195bcf49fd2fd72b66d8f572cddf80628a2817e7552a8b1e09e5044328f1ca,2024-07-10T23:15:15.250000 -CVE-2024-6653,0,0,7705d8b07a5385d3e6216c0be5a58a100c471b6ce2659cc97a5d58ac8c43ef88,2024-07-11T00:15:02.313000 +CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000 +CVE-2024-6644,0,1,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168f9,2024-07-11T13:05:54.930000 +CVE-2024-6645,0,1,7709f10426c0d613ccf6f32b2adb3ff90e0557b8221acd969c94e4ad9a6fd54e,2024-07-11T13:05:54.930000 +CVE-2024-6646,0,1,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1a0,2024-07-11T13:05:54.930000 +CVE-2024-6647,0,1,6bf36707a5c1ef49215873d67fa852b25a9ef5c7d0d257d226656ba7dd32fcc4,2024-07-11T13:05:54.930000 +CVE-2024-6649,0,1,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000 +CVE-2024-6650,0,1,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000 +CVE-2024-6652,0,1,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000 +CVE-2024-6653,0,1,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 -CVE-2024-6666,0,0,5640f874a4a123b5e84bcf8b9571deb9dc23e2d175e1f970315a0fe386bca6a0,2024-07-11T07:15:07.233000 -CVE-2024-6676,0,0,e0e595eb4b676327f8f19a66094c02e3519fd63fe68c5d0fb376bddbcdc89b0e,2024-07-11T03:15:03.787000 +CVE-2024-6666,0,1,6ba5e83c4c8007c7f2945dcbaee49cd53299747e7c829220281020263e99c21e,2024-07-11T13:05:54.930000 +CVE-2024-6676,0,1,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000