diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25154.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25154.json index 6fd4fe9f48e..3af11bf128c 100644 --- a/CVE-2019/CVE-2019-251xx/CVE-2019-25154.json +++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:10.407", "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25214.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25214.json index e78eb57ed54..0e2fec21ae9 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25214.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25214.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "El complemento ShopWP para WordPress es vulnerable a la omisi\u00f3n de autorizaci\u00f3n debido a una verificaci\u00f3n de capacidad faltante en varias rutas de API REST en versiones hasta la 2.0.4 incluida. Esto hace posible que atacantes no autenticados llamen a los puntos finales y realicen acciones no autorizadas, como actualizar la configuraci\u00f3n del complemento e inyectar scripts maliciosos." + "value": "El complemento ShopWP para WordPress es vulnerable a la omisi\u00f3n de autorizaci\u00f3n debido a una verificaci\u00f3n de capacidad faltante en varias rutas de API REST en versiones hasta la 2.0.4 incluida. Esto hace posible que atacantes no autenticados llamen a los endpoints y realicen acciones no autorizadas, como actualizar la configuraci\u00f3n del complemento e inyectar scripts maliciosos." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json b/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json index 5ca0ff383bc..8d6238305df 100644 --- a/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json +++ b/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WooCommerce Smart Coupons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the woocommerce_coupon_admin_init function in versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to send themselves gift certificates of any value, which could be redeemed for products sold on the victim\u2019s storefront." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Smart Coupons para WordPress es vulnerable a la omisi\u00f3n de autorizaci\u00f3n debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n woocommerce_coupon_admin_init en versiones hasta la 4.6.0 incluida. Esto permite que atacantes no autenticados se env\u00eden a s\u00ed mismos certificados de regalo de cualquier valor, que podr\u00edan canjearse por productos vendidos en la tienda de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json index d4168cbad57..55d82632a0c 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:50.060", "lastModified": "2024-06-18T19:15:55.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json index 743cd91c633..a8a6a5f2068 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:52.577", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json index a19bccda82e..c772293196b 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:52.677", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json index 1a9e3703ef2..4b055baa8d5 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insecure handling of ssh keys used to bootstrap clients allows local attackers to potentially gain access to the keys" + }, + { + "lang": "es", + "value": "El manejo inseguro de las claves ssh utilizadas para iniciar clientes permite que los atacantes locales obtengan acceso potencial a las claves." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json index 57fc751f579..79881d40b1e 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges." + }, + { + "lang": "es", + "value": "El script %post de mlocate permite al usuario RUN_UPDATEDB_AS hacer que archivos arbitrarios sean legibles para todo el mundo abusando de operaciones de archivos inseguras que se ejecutan con privilegios de root." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json index 0b1ecd791ae..ced53f17312 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin." + }, + { + "lang": "es", + "value": "Cuando RKE aprovisiona un cl\u00faster, almacena el estado del cl\u00faster en un mapa de configuraci\u00f3n llamado `full-cluster-state` dentro del espacio de nombres `kube-system` del propio cl\u00faster. La informaci\u00f3n disponible all\u00ed permite que los usuarios que no son administradores escalen a administradores." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json index 382f1ecee58..cc7304ec03c 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified in which unauthenticated cross-site \nscripting (XSS) in the API Server's public API endpoint can be \nexploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser" + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la que se pueden explotar cross-site scripting (XSS) no autenticadas en el endpoint de la API p\u00fablica del servidor API, lo que permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json index ea6c769aae1..2c8edd08305 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified in which unauthenticated cross-site \nscripting (XSS) in Norman's public API endpoint can be exploited. This \ncan lead to an attacker exploiting the vulnerability to trigger \nJavaScript code and execute commands remotely." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la que se pueden explotar cross-site scripting (XSS) no autenticadas en el endpoint de la API p\u00fablica de Norman. Esto puede llevar a que un atacante aproveche la vulnerabilidad para activar c\u00f3digo JavaScript y ejecutar comandos de forma remota." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json index d72bededa94..e908bb229a0 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified when granting a create or * global role for a resource type of \"namespaces\"; no matter the API group, the subject will receive *\n permissions for core namespaces. This can lead to someone being capable\n of accessing, creating, updating, or deleting a namespace in the \nproject." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad al otorgar un rol de creaci\u00f3n o * global para un tipo de recurso de \"espacios de nombres\"; sin importar el grupo de API, el sujeto recibir\u00e1 * permisos para espacios de nombres principales. Esto puede llevar a que alguien pueda acceder, crear, actualizar o eliminar un espacio de nombres en el proyecto." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json index 11c3f734ad6..7f0f65cb175 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified whereby privilege escalation checks are not properly enforced for RoleTemplateobjects when external=true, which in specific scenarios can lead to privilege escalation." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad por la cual las comprobaciones de escalada de privilegios no se aplican correctamente para los objetos RoleTemplate cuando external=true, lo que en escenarios espec\u00edficos puede provocar una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json index 340bf214156..b7bcb181052 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T23:15:08.327", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-423xx/CVE-2023-42374.json b/CVE-2023/CVE-2023-423xx/CVE-2023-42374.json index cbaaedb34eb..a7cfb29742c 100644 --- a/CVE-2023/CVE-2023-423xx/CVE-2023-42374.json +++ b/CVE-2023/CVE-2023-423xx/CVE-2023-42374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T01:15:07.913", "lastModified": "2024-08-01T18:35:04.073", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44296.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44296.json index 0133ded8569..8ada5669dfb 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44296.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44296.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2023-11-16T08:15:31.300", "lastModified": "2023-11-20T18:58:50.467", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json index 5b5ebc98d2e..e2f47452953 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4408.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:45.253", "lastModified": "2024-04-26T09:15:08.727", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json index da0937f0152..ce60282a21e 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.143", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52431.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52431.json index 91042cda733..d1ce59fed99 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52431.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52431.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T05:15:08.797", "lastModified": "2024-08-01T18:35:05.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json index 17d1e7b2a19..6f79bc3f91c 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5517.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:45.510", "lastModified": "2024-08-22T14:35:04.137", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5679.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5679.json index 6895024aa09..6e39c5bfdf4 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5679.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5679.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:45.677", "lastModified": "2024-04-26T09:15:08.843", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5680.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5680.json index 88d4fd9d4ff..9b2d1c1a57c 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5680.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5680.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:45.850", "lastModified": "2024-05-03T13:15:21.093", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json index 990e92c756e..c2e0277c908 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.387", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json index 3def251a582..59ce96b2695 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.500", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json index 2a2d20a6867..3fafc4c299f 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.627", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json index 43ed1c22974..66d74825e34 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.737", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json index eee0c7c1b7f..8c972afd3d1 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@grafana.com", "published": "2024-02-13T22:15:45.430", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json index 1d9966b5c09..faca689e95b 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6516.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-officer@isc.org", "published": "2024-02-13T14:15:46.030", "lastModified": "2024-07-03T01:44:22.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json index 9ec9620b9e6..fca9bb7d77d 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json @@ -3,7 +3,7 @@ "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2024-02-13T07:15:46.843", "lastModified": "2024-02-14T04:15:08.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json index 54f9a101426..b25fda2a058 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T12:15:07.663", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. The manipulation of the argument text leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Pharmacy Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. La manipulaci\u00f3n del texto del argumento conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json index c31764f9d75..c2265efc017 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T12:15:08.163", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Pharmacy Management System 1.0. This affects an unknown part of the file /php/manage_supplier.php?action=search. The manipulation of the argument text leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Pharmacy Management System 1.0. Afecta a una parte desconocida del archivo /php/manage_supplier.php?action=search. La manipulaci\u00f3n del texto del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json index eeb8aa4ae13..755db3602e1 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T13:15:13.350", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. This vulnerability affects unknown code of the file /php/add_new_medicine.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Pharmacy Management System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /php/add_new_medicine.php. La manipulaci\u00f3n del argumento name/packing/generic_name/suppliers_name conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json index 2a33a1cb1d6..d1d9b9b69bc 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-16T13:15:13.650", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Pharmacy Management System 1.0. This issue affects some unknown processing of the file /php/manage_medicine_stock.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Pharmacy Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /php/manage_medicine_stock.php. La manipulaci\u00f3n del argumento name/packing/generic_name/suppliers_name conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json index 06c8c97ffa9..bc78e4e6618 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-10-17T19:15:21.337", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json new file mode 100644 index 00000000000..b74aef2e706 --- /dev/null +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10159.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10159", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-20T00:15:02.137", + "lastModified": "2024-10-20T00:15:02.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in PHPGurukul Boat Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/profile.php of the component My Profile Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_profile_sqli.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280945", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280945", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.425434", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json new file mode 100644 index 00000000000..70c77505646 --- /dev/null +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10160.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10160", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-20T00:15:02.550", + "lastModified": "2024-10-20T00:15:02.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is some unknown functionality of the file /admin/bwdates-report-details.php of the component BW Dates Report Page. The manipulation of the argument fdate/tdate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"fdate\" to be affected. But it must be assumed \"tdate\" is affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_bwdates_report_details_sqli.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280946", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280946", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.425437", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json new file mode 100644 index 00000000000..cc373c037af --- /dev/null +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10161.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10161", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-20T01:15:01.940", + "lastModified": "2024-10-20T01:15:01.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_change_image_file_upload_rce.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280947", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280947", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.425440", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json new file mode 100644 index 00000000000..93a02e4683d --- /dev/null +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10162.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10162", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-20T01:15:02.213", + "lastModified": "2024-10-20T01:15:02.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_edit_subadmin_sqli.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280948", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280948", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.425449", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json index 2efa16d1fcb..2ddfeef0979 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-14T00:15:46.783", "lastModified": "2024-02-22T01:15:07.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json index 248eb9b78af..59e16cbcfbb 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:13.957", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json index f80efb63b65..2b99e1b21b9 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.193", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json index b992611c96f..8d55eff8cb7 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.423", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json index 8ae6851117b..2f93ed5e3cf 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.657", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json index 72d2a4e08be..2ea4133f2c4 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.880", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json index 27623c42011..f9072388332 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.127", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json index 68ba9b33a63..c7432e65943 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.357", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json index e5bd6e70146..468ae6bdafe 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.670", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json index 0d047414528..e2331d5d08d 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:05.770", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json index 3755abd1e36..338c03b7058 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21208.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:09.437", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json index 12c7cb74816..7d36b1493f8 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:10.050", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json index a29d250201e..80ab8a5e593 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21233.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:12.293", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json index 78876dcb788..dc0a2818318 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21242.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:13.730", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json index 0ae5edc6594..d1cada48275 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:14.880", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json index 2a53dace86b..6b94612ba86 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:15.063", "lastModified": "2024-10-17T14:35:19.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json index 5222725b201..72466d9c7cd 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21251.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:15.257", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json index 7b0467d302d..15ea240811f 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.220", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json index 23b1d21ef33..47bb5f03773 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.410", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json index 4930aff442e..828f5faeeba 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.960", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json index 8dca3f2e48b..6accc054290 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.157", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json index 7430cb7cc0d..a9ffee7002b 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.533", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json index e410eeb6a39..8c3bc637291 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21265.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.713", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json index 0d8e0a1f293..53c9391be08 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21266.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.910", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json index a2375dcbef6..2239d1b0108 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21267.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.090", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json index f7480a2eb11..21040a8fa69 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21268.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.267", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json index 555cc0db4a4..5dd96466233 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21269.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.437", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json index ef8c46ed6ed..155afc8b06f 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21270.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.610", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json index 65156e86ead..181609cc17d 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.787", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json index 15cb425fb4f..43b0696f04b 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.963", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json index 2429a397d6a..6188b33f4fd 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21275.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.520", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json index 8e43a8e7f50..395c64cf06f 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21276.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.693", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json index 44c59670d44..89af56c046a 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21277.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.873", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json index 17e57cf221b..6a3291e46a7 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.070", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json index 50104abf7b8..d0e565f14ce 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.257", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json index e8348483a9e..46fe4f543c6 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.453", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json index c401c1c2556..b0c2f00e65b 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.647", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json index e5557925bb7..d34de7f3838 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21282.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:20.830", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json index 3b837b4a735..7e35637bf72 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21283.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:21.033", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json index c17c3829164..95bdaf4d954 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21286.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:21.633", "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json index 64d180b373e..7d6d24fb502 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insecure permissions in the packaging of tomcat allow local users that win a race during package installation to escalate to root" + }, + { + "lang": "es", + "value": "Los permisos inseguros en el empaquetado de Tomcat permiten que los usuarios locales que ganan una carrera durante la instalaci\u00f3n del paquete escalen a la ra\u00edz" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json index 71b12fa361f..ead56d41baf 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified within Rancher that can be exploited\n in narrow circumstances through a man-in-the-middle (MITM) attack. An \nattacker would need to have control of an expired domain or execute a \nDNS spoofing/hijacking attack against the domain to exploit this \nvulnerability. The targeted domain is the one used as the Rancher URL." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Rancher que puede explotarse en circunstancias espec\u00edficas mediante un ataque de intermediario (MITM). Un atacante tendr\u00eda que tener el control de un dominio vencido o ejecutar un ataque de suplantaci\u00f3n de DNS o secuestro contra el dominio para explotar esta vulnerabilidad. El dominio objetivo es el que se utiliza como URL de Rancher." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json index 56848bf235d..f6877e6e1d3 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been identified in which an RKE1 cluster keeps \nconstantly reconciling when secrets encryption configuration is enabled.\n When reconciling, the Kube API secret values are written in plaintext \non the AppliedSpec. Cluster owners, Cluster members, and Project members\n (for projects within the cluster), all have RBAC permissions to view \nthe cluster object from the apiserver." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la que un cl\u00faster RKE1 se reconcilia constantemente cuando se habilita la configuraci\u00f3n de cifrado de secretos. Al realizar la conciliaci\u00f3n, los valores secretos de la API de Kube se escriben en texto plano en AppliedSpec. Los propietarios del cl\u00faster, los miembros del cl\u00faster y los miembros del proyecto (para los proyectos dentro del cl\u00faster) tienen permisos RBAC para ver el objeto del cl\u00faster desde el servidor de API." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json index cd8e65e669f..f77e4afe08e 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The OBS service obs-service-download_url was vulnerable to a command injection vulnerability. The attacker could provide a configuration to the service that allowed to execute command in later steps" + }, + { + "lang": "es", + "value": "El servicio OBS obs-service-download_url era vulnerable a una vulnerabilidad de inyecci\u00f3n de comandos. El atacante podr\u00eda proporcionar una configuraci\u00f3n al servicio que permitiera ejecutar comandos en pasos posteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json index 3c5f623bc4b..0ac26c4c1f9 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Attackers could put the special files in .osc into the actual package sources (e.g. _apiurl). This allows the attacker to change the configuration of osc for the victim" + }, + { + "lang": "es", + "value": "Los atacantes podr\u00edan colocar los archivos especiales en .osc en las fuentes del paquete real (por ejemplo, _apiurl). Esto permite al atacante cambiar la configuraci\u00f3n de osc para la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22042.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22042.json index dba22d6a98d..30721785595 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22042.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22042.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-02-13T09:15:47.157", "lastModified": "2024-02-13T14:01:07.747", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23816.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23816.json index 92aca4038eb..cf8cc50b3e0 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23816.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23816.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-02-13T09:15:50.343", "lastModified": "2024-02-13T14:01:00.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json index 40d6e3e2ce9..906a383972a 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-14T03:15:15.153", "lastModified": "2024-02-14T13:59:35.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25718.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25718.json index 41eae31f27b..95cd3db0f4e 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25718.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25718.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-02-11T05:15:08.463", "lastModified": "2024-08-01T20:35:25.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29155.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29155.json index b610db5a07b..98bb3d41b86 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29155.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29155.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is \nreceived, the device becomes incapable of completing the pairing \nprocess. A third party can inject a second PairReqNoInputNoOutput request \njust after a real one, causing the pair request to be blocked." + }, + { + "lang": "es", + "value": "En los dispositivos Microchip RN4870, cuando se recibe m\u00e1s de una solicitud PairReqNoInputNoOutput consecutiva, el dispositivo no puede completar el proceso de emparejamiento. Un tercero puede inyectar una segunda solicitud PairReqNoInputNoOutput justo despu\u00e9s de una real, lo que hace que la solicitud de emparejamiento se bloquee." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json index ae2075e828c..70dcbf4e1c3 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39515.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de validaci\u00f3n incorrecta de la coherencia dentro de la entrada en el demonio de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edficamente malformado para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. En algunos casos, rpd no se reinicia y requiere un reinicio manual a trav\u00e9s del comando CLI 'restart route'. Este problema solo afecta a los sistemas con opciones de rastreo BGP habilitadas y requiere que ya se haya establecido una sesi\u00f3n BGP. Los sistemas sin opciones de rastreo BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-S8, * 22.2 anteriores a 22.2R3-S5, * 22.3 anteriores a 22.3R3-S4, * 22.4 anteriores a 22.4R3-S3, * 23.2 anteriores a 23.2R2-S2, * 23.4 anteriores a 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * 22.2-EVO anteriores a 22.2R3-S5-EVO, * 22.3-EVO anteriores a 22.3R3-S4-EVO, * 22.4-EVO anteriores a 22.4R3-S3-EVO, * 23.2-EVO anteriores a 23.2R2-S2-EVO, * 23.4-EVO anteriores a 23.4R2-EVO." + "value": "Una vulnerabilidad de validaci\u00f3n incorrecta de la coherencia dentro de la entrada en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edficamente malformado para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. En algunos casos, rpd no se reinicia y requiere un reinicio manual a trav\u00e9s del comando CLI 'restart route'. Este problema solo afecta a los sistemas con opciones de rastreo BGP habilitadas y requiere que ya se haya establecido una sesi\u00f3n BGP. Los sistemas sin opciones de rastreo BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.4R3-S8, * 22.2 anteriores a 22.2R3-S5, * 22.3 anteriores a 22.3R3-S4, * 22.4 anteriores a 22.4R3-S3, * 23.2 anteriores a 23.2R2-S2, * 23.4 anteriores a 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.4R3-S8-EVO, * 22.2-EVO anteriores a 22.2R3-S5-EVO, * 22.3-EVO anteriores a 22.3R3-S4-EVO, * 22.4-EVO anteriores a 22.4R3-S3-EVO, * 23.2-EVO anteriores a 23.2R2-S2-EVO, * 23.4-EVO anteriores a 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json index 932777a45ca..0c72bf3f3b8 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39525.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el demonio de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edfico para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo afecta a los sistemas con opciones de rastreo de BGP habilitadas y requiere que ya se haya establecido una sesi\u00f3n de BGP. Los sistemas sin opciones de rastreo de BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * desde 21.4 hasta 21.4R3-S8, * desde 22.2 hasta 22.2R3-S4, * desde 22.3 hasta 22.3R3-S4, * desde 22.4 hasta 22.4R3-S3, * desde 23.2 hasta 23.2R2-S1, * desde 23.4 hasta 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * desde 21.4-EVO hasta 21.4R3-S8-EVO, * desde 22.2-EVO hasta 22.2R3-S4-EVO, * desde 22.3-EVO hasta 22.3R3-S4-EVO, * desde 22.4-EVO hasta 22.4R3-S3-EVO, * desde 23.2-EVO hasta 23.2R2-S1-EVO, * desde 23.4-EVO hasta 23.4R2-EVO." + "value": "Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red env\u00ede un paquete BGP espec\u00edfico para provocar que rpd se bloquee y se reinicie, lo que da como resultado una denegaci\u00f3n de servicio (DoS). La recepci\u00f3n y el procesamiento continuos de este paquete crear\u00e1n una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sostenida. Este problema solo afecta a los sistemas con opciones de rastreo de BGP habilitadas y requiere que ya se haya establecido una sesi\u00f3n de BGP. Los sistemas sin opciones de rastreo de BGP habilitadas no se ven afectados por este problema. Este problema afecta a iBGP y eBGP, y tanto IPv4 como IPv6 se ven afectados por esta vulnerabilidad. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * desde 21.4 hasta 21.4R3-S8, * desde 22.2 hasta 22.2R3-S4, * desde 22.3 hasta 22.3R3-S4, * desde 22.4 hasta 22.4R3-S3, * desde 23.2 hasta 23.2R2-S1, * desde 23.4 hasta 23.4R2; Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * desde 21.4-EVO hasta 21.4R3-S8-EVO, * desde 22.2-EVO hasta 22.2R3-S4-EVO, * desde 22.3-EVO hasta 22.3R3-S4-EVO, * desde 22.4-EVO hasta 22.4R3-S3-EVO, * desde 23.2-EVO hasta 23.2R2-S1-EVO, * desde 23.4-EVO hasta 23.4R2-EVO." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json index ffb22174881..ff6e3771554 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.370", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json index 569f3d6dff4..f949816c983 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.493", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json index f23967a7bcc..f34b156a062 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:02.240", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json index 634be9804db..9176b4a410b 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42380.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:02.653", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json index 6d055285f43..1c24378fc22 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.617", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json index 09fe252e850..0d496309e18 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.283", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json index 481dc3a2dcf..08d5dedd78d 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43468.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:09.537", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json index 6f59a64d2d9..8b7938d7f7b 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43483.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.367", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json index 8b5cf796a2b..32220b58f57 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.633", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json index ae161f80ab2..4dd37ab1345 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.840", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json index 69cbd08ec0c..7f3c7a9abe1 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43488.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:11.030", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json index 042c4293fba..f7bc7d0b137 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43504.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:12.240", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json index 4e25b05324c..c2000d64571 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44115.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:03.293", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json index a99b8d57157..d99612fe047 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:03.490", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json index 18e7b8a9063..47dc1d66389 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44117.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T05:15:11.050", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json index 33a823a3900..bdc04904746 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-16T17:15:16.487", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json index 277370ea9e7..ada091d5daf 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-16T17:15:16.750", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json index e8e044aaa21..b170a29e0ec 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45285.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T05:15:12.590", "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json index e0e0bd4ccf2..3f8f4730bf0 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45746.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T17:15:19.727", "lastModified": "2024-10-11T21:36:34.350", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json index 7b3fa6a9b6d..43c308e7956 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:26.660", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json index 9a522b2a9be..165564c54ae 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:26.923", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json index d1a2ca89717..a6405e6f8c2 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + }, + { + "lang": "es", + "value": "La funci\u00f3n de monitorizaci\u00f3n de BIG-IP puede permitir que un atacante eluda las restricciones de control de acceso, independientemente de la configuraci\u00f3n de bloqueo de puertos. Nota: Las versiones de software que han alcanzado el fin del soporte t\u00e9cnico (EoTS) no se eval\u00faan." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json index 2abca207afc..280d60039b7 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-18T06:15:04.813", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json index bdc3181c096..b43f45d2bdd 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.740", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json index fcfd1bbfb32..2afba902fb7 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.873", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json index 0034bf4f9c3..3a1af60933a 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IQ Configuration utility that allows an attacker with the Administrator role to run JavaScript in the context of the currently logged-in user.\n\n\u00a0\n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en una p\u00e1gina no revelada de la utilidad de configuraci\u00f3n de BIG-IQ que permite a un atacante con el rol de administrador ejecutar JavaScript en el contexto del usuario que ha iniciado sesi\u00f3n en ese momento. Nota: Las versiones de software que han alcanzado el fin del soporte t\u00e9cnico (EoTS) no se eval\u00faan." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json index d027f469756..411cebbb59e 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:27.407", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json index 3aea0ef94d5..b8800207033 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:27.670", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json index f97884ce6c1..41a9c595ca9 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The CSSIgniter Team MaxSlider allows Path Traversal.This issue affects MaxSlider: from n/a through 1.2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en The CSSIgniter Team MaxSlider permite Path Traversal. Este problema afecta a MaxSlider: desde n/a hasta 1.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json index 6c11ce8111c..e72ddcc7e4e 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T20:15:06.083", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json index 70a74c0632a..8ac625e3e56 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Relative Path Traversal vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Path Traversal.This issue affects LiteSpeed Cache: from n/a through 6.4.1." + }, + { + "lang": "es", + "value": ":Vulnerabilidad de Path Traversal relativo en LiteSpeed Technologies LiteSpeed Cache permite Path Traversal. Este problema afecta a LiteSpeed Cache: desde n/a hasta 6.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json index bf02833ea1b..deb0d0b787f 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sajid Javed Top Bar \u2013 PopUps \u2013 by WPOptin allows PHP Local File Inclusion.This issue affects Top Bar \u2013 PopUps \u2013 by WPOptin: from n/a through 2.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Sajid Javed Top Bar \u2013 PopUps \u2013 de WPOptin permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a Top Bar \u2013 PopUps \u2013 de WPOptin: desde n/a hasta 2.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json index 5951ad3761b..97953064dd7 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in THATplugin Iconize.This issue affects Iconize: from n/a through 1.2.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en THATplugin Iconize. Este problema afecta a Iconize: desde n/a hasta 1.2.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json index ca396eb0b4f..0f55ae4a5a0 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47669.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.590", "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json index 1381e499bee..4574bef1a04 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-18T06:15:05.230", "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json index 72318367143..c7e64ecda2d 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Grayson Robbins Disc Golf Manager allows Object Injection.This issue affects Disc Golf Manager: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Grayson Robbins Disc Golf Manager permite la inyecci\u00f3n de objetos. Este problema afecta a Disc Golf Manager: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json index 84a3558ec57..718c01befd8 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in xaraartech External featured image from bing allows Upload a Web Shell to a Web Server.This issue affects External featured image from bing: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "La carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en xaraartech External featured image from bing permite cargar un Web Shell a un servidor web. Este problema afecta a la imagen externa destacada de Bing: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json index 94704b35bc4..73b51a2492e 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Boyan Raichev IP Loc8 permite la inyecci\u00f3n de objetos. Este problema afecta a IP Loc8: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json index e6bb44c697a..c65986ab553 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hung Trang Si SB Random Posts Widget allows PHP Local File Inclusion.This issue affects SB Random Posts Widget: from n/a through 1.0." + }, + { + "lang": "es", + "value": ":Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Hung Trang Si SB Random Posts Widget permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a SB Random Posts Widget: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json index 2869aad2aac..e1d3d1af508 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Gabriele Valenti Telecash Ricaricaweb allows Object Injection.This issue affects Telecash Ricaricaweb: from n/a through 2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Gabriele Valenti Telecash Ricaricaweb permite la inyecci\u00f3n de objetos. Este problema afecta a Telecash Ricaricaweb: desde n/a hasta 2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json index d4348d426b6..18d9ca896b9 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Fliperrr Team Creates 3D Flipbook, PDF Flipbook allows Upload a Web Shell to a Web Server.This issue affects Creates 3D Flipbook, PDF Flipbook: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en el equipo Fliperrr Creates 3D Flipbook, PDF Flipbook permite cargar un Web Shell a un servidor web. Este problema afecta a Creates 3D Flipbook, PDF Flipbook: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json index a3ec00074ac..fbeae98d7b5 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Takayuki Imanishi ACF Images Search And Insert allows Upload a Web Shell to a Web Server.This issue affects ACF Images Search And Insert: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Takayuki Imanishi ACF Images Search And Insert permite cargar un shell web a un servidor web. Este problema afecta a ACF Images Search And Insert: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json index 50f75e8dca4..e623b0c48b9 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Contact Form by Supsystic allows Command Injection.This issue affects Contact Form by Supsystic: from n/a through 1.7.28." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un motor de plantillas en Supsystic Contact Form de Supsystic permite la inyecci\u00f3n de comandos. Este problema afecta a Contact Form de Supsystic: desde n/a hasta 1.7.28." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json index f217e170c39..1d0aebd9fae 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T15:15:14.033", "lastModified": "2024-10-15T19:35:38.413", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json index 7203ac39f66..a462cfc0b9a 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /trms/listed- teachers.php in PHPGurukul Teachers Record Management System v2.1, which allows remote attackers to execute arbitrary code via \"searchinput\" POST request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de cross-site scripting (XSS) reflejado en /trms/listed-teachers.php en PHPGurukul Teachers Record Management System v2.1, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST \"searchinput\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json index 1dea9428eb6..77228204749 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Joshua Clayton Feed Comments Number allows Upload a Web Shell to a Web Server.This issue affects Feed Comments Number: from n/a through 0.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Joshua Clayton Feed Comments Number permite cargar un shell web a un servidor web. Este problema afecta al n\u00famero de comentarios de feed: desde n/a hasta 0.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json index 73ca4ab1285..b1aac2dc23a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Al Imran Akash Recently allows Object Injection.This issue affects Recently: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Imran Akash Recently permite la inyecci\u00f3n de objetos. Este problema afecta recientemente a: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json index b0fc5c9bce9..7c760716b5c 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in TAKETIN TAKETIN To WP Membership allows Object Injection.This issue affects TAKETIN To WP Membership: from n/a through 2.8.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en TAKETIN TAKETIN To WP Membership permite la inyecci\u00f3n de objetos. Este problema afecta a TAKETIN To WP Membership: desde n/a hasta 2.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json index da4b27797e4..df50244ef5b 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Innovaweb Sp. Z o.O. Free Stock Photos Foter allows Object Injection.This issue affects Free Stock Photos Foter: from n/a through 1.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en Innovaweb Sp. Z oO Free Stock Photos Foter permite la inyecci\u00f3n de objetos. Este problema afecta a Free Stock Photos Foter: desde n/a hasta 1.5.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json index dcac638bd23..6879a994673 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Shafiq Digital Lottery allows Upload a Web Shell to a Web Server.This issue affects Digital Lottery: from n/a through 3.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en Shafiq Digital Lottery permite cargar un shell web a un servidor web. Este problema afecta a Digital Lottery: desde n/a hasta 3.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json index 8c55d4ce720..14fe20342db 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ahime Ahime Image Printer.This issue affects Ahime Image Printer: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Ahime Ahime Image Printer. Este problema afecta a Ahime Image Printer: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json index dfe39aba44c..cfcb53f7e63 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Authentication Bypass Using an Alternate Path or Channel vulnerability in sooskriszta, webforza BuddyPress Better Registration allows : Authentication Bypass.This issue affects BuddyPress Better Registration: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en sooskriszta, webforza BuddyPress Better Registration permite: Omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a BuddyPress Better Registration: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json index f87bfa5d2d9..6517c3f52fe 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Maantheme Maan Addons For Elementor allows Local Code Inclusion.This issue affects Maan Addons For Elementor: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": ":La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Maantheme Maan Addons For Elementor permite la inclusi\u00f3n de c\u00f3digo local. Este problema afecta a Maan Addons For Elementor: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json index 9812c77fe77..9db61c30cf5 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Teplitsa of social technologies Leyka.This issue affects Leyka: from n/a through 3.31.6." + }, + { + "lang": "es", + "value": ":Vulnerabilidad de exposici\u00f3n de informaci\u00f3n sensible del sistema a una esfera de control no autorizada en Teplitsa of social technologies Leyka. Este problema afecta a Leyka: desde n/a hasta 3.31.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json index 0585cda325e..f6bcabef450 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Relative Path Traversal vulnerability in James Park Analyse Uploads allows Relative Path Traversal.This issue affects Analyse Uploads: from n/a through 0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Path Traversal relativo en James Park Analyse Uploads permite Path Traversal relativo. Este problema afecta a Analyse Uploads: desde n/a hasta 0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json index 0fd92cf3f65..29fd21291ef 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Sunjianle allows Code Injection.This issue affects ajax-extend: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo ('Inyecci\u00f3n de c\u00f3digo') en Sunjianle permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a ajax-extend: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json index c5f1b79c3a9..c429cb2c988 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Denis Azz Anonim Posting allows Upload a Web Shell to a Web Server.This issue affects Azz Anonim Posting: from n/a through 0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Denis Azz Anonim Posting permite cargar un shell web a un servidor web. Este problema afecta a Azz Anonim Posting: desde n/a hasta 0.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json index ff1500b4870..4919d6d7fc6 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Path Traversal: '.../...//' vulnerability in Limb WordPress Gallery Plugin \u2013 Limb Image Gallery.This issue affects WordPress Gallery Plugin \u2013 Limb Image Gallery: from n/a through 1.5.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad Path Traversal: '.../...//' en el complemento Limb WordPress Gallery Plugin \u2013 Limb Image Gallery. Este problema afecta al complemento WordPress Gallery Plugin \u2013 Limb Image Gallery: desde n/a hasta 1.5.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json index e8d5489e0a5..f6f7e0ad962 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Limb WordPress Gallery Plugin \u2013 Limb Image Gallery allows Code Injection.This issue affects WordPress Gallery Plugin \u2013 Limb Image Gallery: from n/a through 1.5.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en el complemento Limb WordPress Gallery: Limb Image Gallery permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta al complemento Limb WordPress Gallery: desde n/a hasta 1.5.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49265.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49265.json index 9647368bd2e..f8d39326d17 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49265.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49265.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Partnerships at Booking.Com Booking.Com Banner Creator allows Stored XSS.This issue affects Booking.Com Banner Creator: from n/a through 1.4.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Partnerships at Booking.Com Booking.Com Banner Creator permite XSS almacenado. Este problema afecta a Booking.Com Banner Creator: desde n/a hasta 1.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json index b261eda718c..031b2767cbe 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Thimo Grauerholz WP-Spreadplugin allows Stored XSS.This issue affects WP-Spreadplugin: from n/a through 4.8.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Thimo Grauerholz WP-Spreadplugin permite XSS almacenado. Este problema afecta a WP-Spreadplugin: desde n/a hasta 4.8.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json index 51816e2b6fe..96d8e68c9a1 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in nayon46 Unlimited Addon For Elementor allows Stored XSS.This issue affects Unlimited Addon For Elementor: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en nayon46 Unlimited Addon For Elementor permite XSS almacenado. Este problema afecta a Unlimited Addon For Elementor: desde n/a hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json index f7b5ea4a8f6..3b8e0652506 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in sunburntkamel disconnected allows Reflected XSS.This issue affects disconnected: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en sunburntkamel disconnected permite XSS reflejado. Este problema afecta a desconectado: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json index a819559b46d..88c63345023 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HashThemes Smart Blocks allows Stored XSS.This issue affects Smart Blocks: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HashThemes Smart Blocks permite XSS almacenado. Este problema afecta a Smart Blocks: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json index 97099a5e2af..5bcf0b6b8aa 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json @@ -9,6 +9,10 @@ { "lang": "en", "value": ": Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows : Command Injection.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.121." + }, + { + "lang": "es", + "value": ": Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un motor de plantillas en Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) permite: Inyecci\u00f3n de comandos. Este problema afecta a Unlimited Elements For Elementor (Free Widgets, Addons, Templates): desde n/a hasta 1.5.121." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json index ebae8cf3bb8..6a561202639 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6207.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-10-14T21:15:12.460", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json index 4b653f0072a..6b4307c11c3 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session." + }, + { + "lang": "es", + "value": "Una vulnerabilidad cross-site scripting (XSS) reflejado que afecta a ENOVIA Collaborative Industry Innovator desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2024x permite a un atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en la sesi\u00f3n del navegador del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json index 47e0c1f228c..e497ddf06c0 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6726.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@puppet.com", "published": "2024-07-29T18:15:12.433", "lastModified": "2024-07-30T13:33:30.653", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json index c43346e5f9b..e7db8c14f18 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6727.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@puppet.com", "published": "2024-07-29T18:15:12.697", "lastModified": "2024-07-30T13:33:30.653", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json index fe25c496058..98fe760df4f 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-16T22:15:03.133", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json index 1b7570be766..890282b38bb 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-16T22:15:03.353", "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json index 2d0464a8f64..1de6532c05c 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An authorization bypass through user-controlled key vulnerability affecting 3DSwym in 3DSwymer on Release 3DEXPERIENCE R2024x allows an authenticated attacker to access some unauthorized data." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una clave controlada por el usuario que afecta a 3DSwym en 3DSwymer en la versi\u00f3n 3DEXPERIENCE R2024x permite que un atacante autenticado acceda a algunos datos no autorizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json index 0550fbfc44d..8f6d8bd1de8 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8059.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:06.430", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json index 1671ebcd9c1..81250cea8e2 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8278.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:06.703", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json index 1dc73609003..de111c5a874 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8279.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:06.973", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json index 69b536415f1..92f80cb8a17 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8280.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:07.270", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json index 45a0292aafb..0031194194b 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8281.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-09-13T18:15:07.603", "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json index 2e115735fb8..cb23d45f519 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-09-11T17:15:14.587", "lastModified": "2024-10-17T15:25:45.397", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json index 36f80497a8f..5c727329549 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Docker Desktop before v4.34.3 allows RCE via unsanitized GitHub source link in Build view." + }, + { + "lang": "es", + "value": "Docker Desktop anterior a v4.34.3 permite RCE a trav\u00e9s de un enlace de origen de GitHub no desinfectado en la vista de compilaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json index a8830526fc8..8a948f23d6b 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9792.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T15:15:15.710", "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json index f80b41a4354..67a566a3861 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9837.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-10-15T08:15:02.910", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json index 5085e69f0b4..3c7f3f3f54e 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.1.14. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token." + }, + { + "lang": "es", + "value": "El complemento Nextend Social Login Pro para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en todas las versiones hasta la 3.1.14 incluida. Esto se debe a que la verificaci\u00f3n del usuario que devuelve el token de inicio de sesi\u00f3n social es insuficiente. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electr\u00f3nico y el usuario no tiene una cuenta ya existente para el servicio que devuelve el token." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9972.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9972.json index 9695529866d..6674de7e609 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9972.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9972.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-10-15T07:15:02.750", "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json index ef2c85dc0d8..e3a70785755 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T13:15:11.790", "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index b38f68dc757..2d48e5a1d85 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-19T23:55:16.800387+00:00 +2024-10-20T02:00:17.718936+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-19T23:15:04.570000+00:00 +2024-10-20T01:15:02.213000+00:00 ``` ### Last Data Feed Release @@ -27,28 +27,54 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-10-19T00:00:08.660902+00:00 +2024-10-20T00:00:08.670537+00:00 ``` ### Total Number of included CVEs ```plain -266170 +266174 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `4` -- [CVE-2024-10157](CVE-2024/CVE-2024-101xx/CVE-2024-10157.json) (`2024-10-19T23:15:04.033`) -- [CVE-2024-10158](CVE-2024/CVE-2024-101xx/CVE-2024-10158.json) (`2024-10-19T23:15:04.297`) +- [CVE-2024-10159](CVE-2024/CVE-2024-101xx/CVE-2024-10159.json) (`2024-10-20T00:15:02.137`) +- [CVE-2024-10160](CVE-2024/CVE-2024-101xx/CVE-2024-10160.json) (`2024-10-20T00:15:02.550`) +- [CVE-2024-10161](CVE-2024/CVE-2024-101xx/CVE-2024-10161.json) (`2024-10-20T01:15:01.940`) +- [CVE-2024-10162](CVE-2024/CVE-2024-101xx/CVE-2024-10162.json) (`2024-10-20T01:15:02.213`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `170` -- [CVE-2024-29916](CVE-2024/CVE-2024-299xx/CVE-2024-29916.json) (`2024-10-19T23:15:04.570`) +- [CVE-2024-49265](CVE-2024/CVE-2024-492xx/CVE-2024-49265.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-49266](CVE-2024/CVE-2024-492xx/CVE-2024-49266.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-49267](CVE-2024/CVE-2024-492xx/CVE-2024-49267.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-49268](CVE-2024/CVE-2024-492xx/CVE-2024-49268.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-49270](CVE-2024/CVE-2024-492xx/CVE-2024-49270.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-49271](CVE-2024/CVE-2024-492xx/CVE-2024-49271.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-6207](CVE-2024/CVE-2024-62xx/CVE-2024-6207.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-6380](CVE-2024/CVE-2024-63xx/CVE-2024-6380.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-6726](CVE-2024/CVE-2024-67xx/CVE-2024-6726.json) (`2024-07-30T13:33:30.653`) +- [CVE-2024-6727](CVE-2024/CVE-2024-67xx/CVE-2024-6727.json) (`2024-07-30T13:33:30.653`) +- [CVE-2024-7993](CVE-2024/CVE-2024-79xx/CVE-2024-7993.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-7994](CVE-2024/CVE-2024-79xx/CVE-2024-7994.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-8040](CVE-2024/CVE-2024-80xx/CVE-2024-8040.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-8059](CVE-2024/CVE-2024-80xx/CVE-2024-8059.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8278](CVE-2024/CVE-2024-82xx/CVE-2024-8278.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8279](CVE-2024/CVE-2024-82xx/CVE-2024-8279.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8280](CVE-2024/CVE-2024-82xx/CVE-2024-8280.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8281](CVE-2024/CVE-2024-82xx/CVE-2024-8281.json) (`2024-09-14T11:47:14.677`) +- [CVE-2024-8691](CVE-2024/CVE-2024-86xx/CVE-2024-8691.json) (`2024-10-17T15:25:45.397`) +- [CVE-2024-9348](CVE-2024/CVE-2024-93xx/CVE-2024-9348.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-9792](CVE-2024/CVE-2024-97xx/CVE-2024-9792.json) (`2024-10-15T12:58:51.050`) +- [CVE-2024-9837](CVE-2024/CVE-2024-98xx/CVE-2024-9837.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-9893](CVE-2024/CVE-2024-98xx/CVE-2024-9893.json) (`2024-10-16T16:38:14.557`) +- [CVE-2024-9972](CVE-2024/CVE-2024-99xx/CVE-2024-9972.json) (`2024-10-15T12:57:46.880`) +- [CVE-2024-9986](CVE-2024/CVE-2024-99xx/CVE-2024-9986.json) (`2024-10-16T16:38:43.170`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b23f60da60a..eedc342d513 100644 --- a/_state.csv +++ b/_state.csv @@ -138386,7 +138386,7 @@ CVE-2019-25149,0,0,02c1258bc1bd3972bf0128b31a4d325f5728feca4e2b9192efd0f5eec8136 CVE-2019-25150,0,0,f9c7e54b0a7f8ba5b7233ff941d616a90b39234519b4346d8eb4dd796fd23563,2023-11-07T03:09:22.247000 CVE-2019-25151,0,0,49c260ee0d773070ead33bf6bb6bec708922854a3cd5103e7a460e1d7da6991d,2023-11-07T03:09:22.350000 CVE-2019-25152,0,0,fe5a843d51f9080892aeacfcb3f1b7de95b804b6e56991419e1363b8cbced396,2023-11-07T03:09:22.440000 -CVE-2019-25154,0,0,faf1ec86eca37cdc7f9d2b8f62566ab19d24d829dfe15ef8f511ae1da9980f28,2024-07-17T13:34:20.520000 +CVE-2019-25154,0,1,ef28f3eebd3b042316efc8c9f2c5bddf978e38e570e4d830fad2010209ad7b1c,2024-07-17T13:34:20.520000 CVE-2019-25155,0,0,0ff1cb9cbb31879acf1ab3e9e7cc3ce8de0ba649d30695569825d0cc2763ccd4,2023-11-14T18:49:01.977000 CVE-2019-25156,0,0,da3182ebff111a4d7515de84621f6ad4713c55ee5ecc4ed670a4bb2d4bab1e8c,2024-05-17T01:36:43.510000 CVE-2019-25157,0,0,0be7a033b7ecc07d402c3f7d60b74ac2b13b8a98f1369c9397e460c26933a207,2024-05-17T01:36:43.627000 @@ -138405,7 +138405,7 @@ CVE-2019-25210,0,0,266aa4bd7522d806fa5da076db229c2449a919075778b85ff023cb6f7676c CVE-2019-25211,0,0,469c1561e074b807caf6701e40210358657a37dbe70bde81f85c8d68a4456e96,2024-08-01T13:41:57.540000 CVE-2019-25212,0,0,2a7e2cc8de54fa224ded29f3182e12267199b33c4461fd66ffca600627e7e093,2024-09-26T13:36:48.280000 CVE-2019-25213,0,0,4c39da3714b8e12c2f219916ee30c392a205d27e9a07728154327b686f4a314a,2024-10-16T16:38:14.557000 -CVE-2019-25214,0,0,209759ddc9f3dec6ad9bb1ee77aa8e686cf7710724268dd2a32dc328422e2dee,2024-10-16T16:38:14.557000 +CVE-2019-25214,0,1,f39238d5ed48577540f531994d29659bb57358e55406eaf7ee66d83805ed736b,2024-10-16T16:38:14.557000 CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd404,2024-10-16T16:38:14.557000 CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 @@ -159345,7 +159345,7 @@ CVE-2020-36838,0,0,41c1cba14b22cb3adef2bade27cea69bb5a81abc91f1efbdbaa26860a5f3a CVE-2020-36839,0,0,a8262c74a68ae935467512e3e0c563f6dba64f8010c28c256631785d53497930,2024-10-16T16:38:14.557000 CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000 CVE-2020-36840,0,0,4e3b6f0faf165bb1f7f38ce30c91c1f1bd20be29874166e54b0c01436532648b,2024-10-16T16:38:14.557000 -CVE-2020-36841,0,0,fe44098096fa4f6cb85c266b3765a0cfdcd460899c9c2ae9c716cd5153efdc26,2024-10-16T16:38:14.557000 +CVE-2020-36841,0,1,6bc777eaaff3e1f66b94f243e1112d713169bdef7aad0e54b03b741e63bad793,2024-10-16T16:38:14.557000 CVE-2020-36842,0,0,e2dad7b3ddbdddf163b8dad9e39353a5801f6770cfddba20c676cd1edc1bcedf,2024-10-16T16:38:14.557000 CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000 CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000 @@ -186711,7 +186711,7 @@ CVE-2021-46753,0,0,389185adc5adbd69df72eaf6b406809e56d98b55bc10a477c0fbb10a2e142 CVE-2021-46754,0,0,347d3742155ff893e431cbaaa93ef670c98fdc740698bf1d146cd30bc01fa70d,2024-02-13T20:15:49.790000 CVE-2021-46755,0,0,14ae1c45bb31a22184154204ff29a858abec287be4bec6f75b2ff97b5cb548a1,2023-05-22T15:43:04.903000 CVE-2021-46756,0,0,56194e6572d3aee2628136e76ca9ce4c25efb67cd70d80ef22f05407a46dfb27,2023-05-22T15:42:26.507000 -CVE-2021-46757,0,0,60672cc3cc3457bd824651fe193fbcaf18b823a6f0c8a31409f3fb4c65d82069,2024-06-18T19:15:55.513000 +CVE-2021-46757,0,1,94034f0789d269517ff359888bb9d613106d735eab1baa7b8563d9d2a7f3eb18,2024-06-18T19:15:55.513000 CVE-2021-46758,0,0,7646b62de078dd667078f18100e47b5ee3c3a5a2703d3c31ff23194a73747b99,2023-12-28T17:38:00.967000 CVE-2021-46759,0,0,3cbac9b0769ec12b0b69a756dc800079358bf3be8863d18b9e42a092534a7dfb,2023-05-22T15:42:00.327000 CVE-2021-46760,0,0,01798c0ac17f03ac224a45dfa08d0a7ec83d4905561c6c42fcf69ec08d7b840a,2023-05-22T15:40:00.550000 @@ -214891,12 +214891,12 @@ CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55 CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000 CVE-2023-20575,0,0,2e65bf0d5b77958c50a50d7734bf1302e45afedfe49795c175183e4bccf178d7,2023-07-19T18:32:04.807000 CVE-2023-20578,0,0,e2aae81ed2b9fe5469de595a7d4e7bc7f74e6a04f637c722d6521fd97e68f844,2024-10-02T17:35:44.117000 -CVE-2023-20579,0,0,b4a70474e393f8888455713a6b442ef3e5379ac960e74bb0629b9958558f0077,2024-02-14T13:59:35.580000 +CVE-2023-20579,0,1,dcf405f2a5a2de94c6ea0a63f9b4f2754a0a646b9ec1b79a57ffd889911c26e9,2024-02-14T13:59:35.580000 CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000 CVE-2023-20583,0,0,a212d56af862f7656348d6c69619b40cd14646d40284557522dffd91a69163f7,2023-08-04T17:31:53.953000 CVE-2023-20584,0,0,a785f4a4e728d4a6b6314ef3ee1a966eed6325ab70de2cbb8128e7288ef76ad4,2024-08-14T02:07:05.410000 CVE-2023-20586,0,0,2b96deb58718f7ac98b46d641c8379026fc9ad8a3de3893d34c8029b4aea3a20,2023-08-21T17:25:49.017000 -CVE-2023-20587,0,0,72840db018c5fea3a5e9db6438f23b4a0e2250649184440959ee7a2a0b60406a,2024-02-14T13:59:35.580000 +CVE-2023-20587,0,1,c7e8a306a08c3f6bc7202d0f9f4e88c770d777dd56054bc216dc739a5fd556c5,2024-02-14T13:59:35.580000 CVE-2023-20588,0,0,55d15a9af5a3f88e1385827d8231778b88a2978c761e134221ea75e0aaf71c2a,2024-06-10T18:15:19.940000 CVE-2023-20589,0,0,8f5169c7803605972ea983b305f7f4a772b29887c902f9b718a3f97d8c8a1ab3,2023-08-22T18:34:00.837000 CVE-2023-2059,0,0,0677a9a340cebf1ede4fa5405d77be76b826f28940ff2b5e0fd7dfe518b5d2d4,2024-05-17T02:22:37.890000 @@ -224294,14 +224294,14 @@ CVE-2023-32184,0,0,123bec51d72ff65d7213bf06e3d98dc3786350eb64238bdb1de857862a0ef CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b8885e0,2023-09-22T02:00:06.313000 CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000 CVE-2023-32188,0,0,6342fff4b4390ac18a6726657d68439603d1b5561b3fa56098696efce5331028,2024-10-16T16:38:14.557000 -CVE-2023-32189,0,0,00f3d929f4aee8c344ef4440c4b803489e96d30ec5cdf6a2f26e52388a13aca5,2024-10-16T16:38:14.557000 +CVE-2023-32189,0,1,b09241c01956a023687415df7aca2a79444d9b14f4d1d13b891e78345b36706b,2024-10-16T16:38:14.557000 CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000 -CVE-2023-32190,0,0,b7ee81155521e3f1097edf0a224d80503b0b4799d86f4e0f3e8c5124b6bc1035,2024-10-16T16:38:14.557000 -CVE-2023-32191,0,0,27bfa295f6672723277c2dbfe80e80643c532ad77da7aba094bcd1cc6c40cf78,2024-10-16T16:38:14.557000 -CVE-2023-32192,0,0,414d7db28d395030da017c50bc7315241ab66acafd1dc4dfc002f3cafd74a55f,2024-10-16T16:38:14.557000 -CVE-2023-32193,0,0,e23ac2980ca058921153bee0c2c6434bcf81fd2b17b96b944dcee57e566ae793,2024-10-16T16:38:14.557000 -CVE-2023-32194,0,0,4f29efda708a5288545bd17d981b9f30640a65efa9dc8c94a818a5eab41dfb7c,2024-10-16T16:38:14.557000 -CVE-2023-32196,0,0,48ee0c05063eb103eddde5db28075a5f795c0ffb71556800976b04f40a73f8b6,2024-10-16T16:38:14.557000 +CVE-2023-32190,0,1,3201abe2ab70cc4232c73963cb10958ad3bfa000270484c6b78c46c057ec420a,2024-10-16T16:38:14.557000 +CVE-2023-32191,0,1,6cd92c37512c4b0d3b5275c10885feeeaffd72677bde01a19fe2611d880ed9ec,2024-10-16T16:38:14.557000 +CVE-2023-32192,0,1,65e4a82e60cd07109f455013593fa2517a95a20d06553ef4079e8c0ba517a2e9,2024-10-16T16:38:14.557000 +CVE-2023-32193,0,1,6af17cd45953ef7ee4ebe4cdc3cdff43bbd22a82ade2dde3369c2587849d1327,2024-10-16T16:38:14.557000 +CVE-2023-32194,0,1,a327b1286f47afa3dc4258d6d6e84130e955d484176c3d6409d18e721f5896da,2024-10-16T16:38:14.557000 +CVE-2023-32196,0,1,b7c1d483d45cc84188a8be5ce08b1606b2798582fda0ffa5333b5c4b3e42dd60,2024-10-16T16:38:14.557000 CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f910122,2023-06-27T12:44:47.967000 CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000 CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000 @@ -229512,7 +229512,7 @@ CVE-2023-38955,0,0,63df79de95a7f767ae6c552fb72a83c8d27dbe345709dbf28da7594408238 CVE-2023-38956,0,0,8b5acdedffa237807149370b588431544e43928059cfd0e43b78be3e3e90098a,2023-08-07T20:31:50.570000 CVE-2023-38958,0,0,1bd8ff159c889b971231a70f32c881fe52d6fee82a669559bf480f216ef6e2d8,2023-08-08T14:51:10.603000 CVE-2023-3896,0,0,ecf6ec50833c424a9f4f7d6290fb2b0bb114529dcc96bb3860a9f4f2e2d15537,2023-08-31T19:15:11.223000 -CVE-2023-38960,0,0,8e7782801c69ad0db60900250331606722dc0b35a986e2a961645aa09c6b9c20,2024-02-14T13:59:35.580000 +CVE-2023-38960,0,1,7678ed5ee4b428823adfbd7e828890379ecfa973b8e08491d413a0aa99d756ec,2024-02-14T13:59:35.580000 CVE-2023-38961,0,0,9be574ed7afa5e17ea5dee6013540111f34bc32be853041d0dbe01b66ca3de88,2023-08-24T21:06:17.447000 CVE-2023-38964,0,0,074a29d1b4b534ddaa79d12d5c4cac64b3e9be14868bfefd4571471dc5fe19b0,2023-10-30T19:45:12.257000 CVE-2023-38965,0,0,b66398cdb2dbe26905c454a859d795e74aa58a4ffb14b7e4c93c47c97e257736,2023-11-13T14:46:29.883000 @@ -232091,7 +232091,7 @@ CVE-2023-42365,0,0,b406aedf5cff3690cb0cdced542258b1116fc3739fd082c9556fafea525dc CVE-2023-42366,0,0,96aa4788059f0643e44792bf7c219cbf02f22946e327a1c617c1427bb3d00c10,2023-11-30T05:08:23.197000 CVE-2023-4237,0,0,6cf38aec3bd975284a4d86b8e8e2c267e312c6daf36ee9d95139bc404b921d75,2023-12-01T12:15:07.670000 CVE-2023-42371,0,0,0e281a41b11b08a02a0cd51a620dbf419b44c135c1cb4fbf938f26407644aeea,2023-09-21T17:26:09.130000 -CVE-2023-42374,0,0,575acec2545513939bb8e8b5b795072bcf88fab218e3421b9c44ef644b1e44e7,2024-08-01T18:35:04.073000 +CVE-2023-42374,0,1,aca719c6150367dec09fd11f6c9b807012468e35c3abed94ca0623eb6077f3b5,2024-08-01T18:35:04.073000 CVE-2023-4238,0,0,509443a1351feb89b6b94e830e94202e715b86b22544bf06f7ffb748465e25f5,2023-11-07T04:22:21.423000 CVE-2023-42387,0,0,ac5e3cab9e1acad87196ba54b8837904055e4058b1be2bd923c1212b5a265fd6,2024-09-25T18:35:03.937000 CVE-2023-4239,0,0,4c7e293324e9ceca8eac54be9b764efefa575bfaceb6af4ac238174d794121e1,2023-11-07T04:22:21.503000 @@ -233264,7 +233264,7 @@ CVE-2023-4407,0,0,5856f12cc35e0b2c6edb626e272e45337f86d7aa7030389df5e9e25594e18f CVE-2023-44075,0,0,3309f000078c7a4ad17714a7a33b669b501aff8fa3e8adf386c81c2f1724ad4f,2023-10-06T22:31:17.653000 CVE-2023-44077,0,0,6f50e2242814ff72fb76c982ade027d0514d77c4a158a8d553f7d4098c3fe2bc,2024-02-08T01:15:26.870000 CVE-2023-44078,0,0,f4721573d756898bfdf4e1579d72f102203d15ffb88367799bfb08cc3e577a80,2023-11-07T04:21:33.440000 -CVE-2023-4408,0,0,07fa18358eece25a8bce4ecc03c050efefa8f89e66850fffd619512507d44265,2024-04-26T09:15:08.727000 +CVE-2023-4408,0,1,0a0d637138bf1d0819dc7be81e1e8a7ff32f664a2ad58bf2a4b82bb253e59ca4,2024-04-26T09:15:08.727000 CVE-2023-44080,0,0,007f9f92128228decf3cb5fcc39618da71ce85d1b258ac586882744d4be869c1,2024-09-25T01:36:42.567000 CVE-2023-44081,0,0,7109043a6e954daa8b1d0a9d907c2dc61207a6bab6c2673b8fd1c0cc406c2e50,2023-10-12T00:42:21.237000 CVE-2023-44082,0,0,ace05d77849fdf184bf8ddbcddfef213b9bb3032a1139cbfd124d56c02c502d6,2023-10-12T00:42:40.427000 @@ -233470,7 +233470,7 @@ CVE-2023-44292,0,0,fa7690f31e7bbf47a93c195b0408bba9927dd6b51a875c9cb8f2eeca78f44 CVE-2023-44293,0,0,da9919c8d9e7138f30a5709093d8a424a3eb54b5bda542b8dfe4302c31bef7eb,2024-10-17T14:40:15.220000 CVE-2023-44294,0,0,a573868dcb71ca5861915270aa78d3c826088c737740d86ea192206f27b00728,2024-10-17T14:40:17.827000 CVE-2023-44295,0,0,729d17b1485fe34797768efdcf6acbc35b81093d938868935c18f42a24a7fa19,2023-12-11T15:33:19.813000 -CVE-2023-44296,0,0,6538936b5d36d1e591c857c1ef6ab045b895da1bedc3af0e4488aa2aed6bf682,2023-11-20T18:58:50.467000 +CVE-2023-44296,0,1,3b912a7fd18c2ce32efa9e89b6c3487b563795283bb77ede2e1b5ae78cd6a2f2,2023-11-20T18:58:50.467000 CVE-2023-44297,0,0,ba0cba6ea5b64f6f43b9c420dca98377f46249558984a25f47175dc1df1feddc,2023-12-12T00:55:40.877000 CVE-2023-44298,0,0,1d6007e151b2ce8fa1be9ad9735ed2d98f370e1145bb868954989073f8da8eb7,2023-12-12T00:54:23.227000 CVE-2023-4430,0,0,1164233ccb157ed6ec78f173fc223659695acc498ac88d55be97a3e7fab22189,2024-01-31T17:15:16.270000 @@ -237118,7 +237118,7 @@ CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000 CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000 CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000 -CVE-2023-49567,0,0,80c711bb0ddf66bcd6467d67a0fd760e9e362f9e0c6a9ca4ad03be72f4756d58,2024-10-18T12:52:33.507000 +CVE-2023-49567,0,1,ff5ffedfcb0ff47ec9991291d86d1977abfb466c3e4224ac1c244bb7fa00587b,2024-10-18T12:52:33.507000 CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000 CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000 CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000 @@ -238999,7 +238999,7 @@ CVE-2023-52428,0,0,0a04486874aac3629974d1ca44929c76c47902d8c17eb2cde1efd5de3b490 CVE-2023-52429,0,0,bb71f6867b546918a32b40939aad4a54664a6e064966565e92e979c5b5823dd4,2024-06-27T12:15:13.797000 CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700c3,2023-11-08T18:40:41.847000 CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 -CVE-2023-52431,0,0,199f10747613e848b4be76ff988b9f76b50282c6e59f2e5da91f811ef18a5901,2024-08-01T18:35:05.050000 +CVE-2023-52431,0,1,66ecb5d0d036ac42092513cb05b38d83d511ab77eadc17266adb6bb7737e255d,2024-08-01T18:35:05.050000 CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000 CVE-2023-52434,0,0,b72f32c1cbec248d35f9c41a46397d6f83aca29d211f6de56a2e5906d4279d8e,2024-06-25T22:15:14.567000 @@ -239747,7 +239747,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000 CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000 CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000 -CVE-2023-5517,0,0,092f5a23d77e754c9b42cabd4ac07b9f18ffe376c4c7e384c57bdabfb0330954,2024-08-22T14:35:04.137000 +CVE-2023-5517,0,1,58f9d47f598e8aff55e725cff020d5ab7e1fd6c722b71ab9dcf29a162e7fc013,2024-08-22T14:35:04.137000 CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000 CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000 CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000 @@ -239895,8 +239895,8 @@ CVE-2023-5675,0,0,26d656fccd5c8593a8d4a9ed8d70f37dec8e8fe19baf58f5aece6460feff10 CVE-2023-5676,0,0,a627ea7bf88ea5b6dccb528b94589245e9f9ba331b8e03892a33208a41506408,2023-11-22T22:39:25.137000 CVE-2023-5677,0,0,08b2893d4601209dee22cd4c45290e5831a26efa6eeca1fc36aea8ab189442dc,2024-02-13T00:38:00.893000 CVE-2023-5678,0,0,20fd1e9f5bec6f0da539cc18e171e3a9021c1db788460fc8978c0d9abde4744d,2024-10-14T15:15:12.603000 -CVE-2023-5679,0,0,4960f652ee6c5b1a46e7d7d2a06407e27c0c64465787d874631b65221eda9309,2024-04-26T09:15:08.843000 -CVE-2023-5680,0,0,8cff3e083f7c7bd084b842f852f743395da779c5a8fed0ab54ee3dfa1f5214a1,2024-05-03T13:15:21.093000 +CVE-2023-5679,0,1,b098ae97f90d88803304b7720c6cd1d11f7e923412f6e6a218db4eea6de81a79,2024-04-26T09:15:08.843000 +CVE-2023-5680,0,1,195e17585f36c75f184839231e67e352aafb422731859c9465c3d8052ea3930d,2024-05-03T13:15:21.093000 CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c059522,2024-05-17T02:33:13.287000 CVE-2023-5682,0,0,6c4d8f1b67779094e044998a8632d6e355d570ee581670705952e7860caa17b4,2024-05-17T02:33:13.400000 CVE-2023-5683,0,0,eb0b32b0ce9a3963660a0f0ab5d192ab16a842927262b341b5da09de23b03195,2024-05-17T02:33:13.503000 @@ -240250,10 +240250,10 @@ CVE-2023-6051,0,0,65166b01dd71515312d91f9d8071d445b248393f92fbfdc73dd7007d9755f5 CVE-2023-6052,0,0,aade2b22db5b4363b4735382f3bc2b9b7b67324ff9b0a0e43ebe15be0d76ef4d,2024-05-17T02:33:29.807000 CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e99,2024-05-17T02:33:29.920000 CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000 -CVE-2023-6055,0,0,31cf33fa523ad15a28c2abf90f3b7dc8ef18d6e5beb39bfcd37821bb4aff152a,2024-10-18T12:52:33.507000 -CVE-2023-6056,0,0,8bc631d542bf2b03e6ac351e30ccc534c312c3fec467c3b2e5fcbca497171b5c,2024-10-18T12:52:33.507000 -CVE-2023-6057,0,0,7e183426046fe1aa2ce379bfa097fa1b6018148d53cb867a22a9138b87d49258,2024-10-18T12:52:33.507000 -CVE-2023-6058,0,0,22ff0643ad58384e8c6f327d1d232b870a925b9cfe86420b0e534bacd91e9e37,2024-10-18T12:52:33.507000 +CVE-2023-6055,0,1,503fb1072d5a69bee0e88b6ae09189645d07260e6713968dc7d0b8a2bcedf0e4,2024-10-18T12:52:33.507000 +CVE-2023-6056,0,1,35d839e4b514b3336d1caecfe0eacb81ca28eb93db0edbbeacdf9c775d9824ca,2024-10-18T12:52:33.507000 +CVE-2023-6057,0,1,3ae0977368b9664a96989c7cb4ae8c7f4ad0edba65abf4e5198647d44bdd52a1,2024-10-18T12:52:33.507000 +CVE-2023-6058,0,1,73b7896699c2b4c96224866a8234ed7b0269d34c30da7bf20eae7df4be9ae139,2024-10-18T12:52:33.507000 CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000 CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000 CVE-2023-6063,0,0,6829cec6327e2b0ca6394f26a21b2458a09f31b0b2f6c2afeecc6087b47b68d1,2023-12-08T14:39:22.200000 @@ -240343,7 +240343,7 @@ CVE-2023-6148,0,0,1b57c1d9a49ccecd4677e923685643bc45630f2eac85bc58cc77ca82dc8b1f CVE-2023-6149,0,0,5a1ccefc7e309805723c1e710b75a15b5addf28ca2d264aaa061adf8ceb5e0bc,2024-01-12T19:55:38.860000 CVE-2023-6150,0,0,333a48e8e003d17ac75b47746fb8e51fb121d7e3d52273876c372ea0168fdd9f,2024-09-26T12:15:03.463000 CVE-2023-6151,0,0,01fc60e1cbc6e1e96e0b7b952e7832d74d8ca7156467c2597d36d908dcaeb1a2,2024-09-26T12:15:03.583000 -CVE-2023-6152,0,0,0d2825ec69cb4b721a6f1646fd77933be6585a1e1d45fd8c34332975f0217d22,2024-02-14T13:59:35.580000 +CVE-2023-6152,0,1,fc3604dfad0d326c222d88511f6f1fc00413fb3e2a7fb63063ba7ab7d24288cf,2024-02-14T13:59:35.580000 CVE-2023-6153,0,0,64c8750e1add6b283c202acc9f7c145138f085f17b9a40e6d77edbf949e4648d,2024-03-27T15:49:51.300000 CVE-2023-6154,0,0,ea79ef7106538fbc68e1e41b2608f4b1a33d1c9bd0e166ed2658519f1ceeb79f,2024-04-01T12:49:00.877000 CVE-2023-6155,0,0,8999e28dacf358c98e2deb0d543f61d7454111fd1c5e35599649cebc3b861eb6,2024-09-12T13:35:21.663000 @@ -240656,7 +240656,7 @@ CVE-2023-6511,0,0,183c64dba37acae8d59b989d41d4a32cb9c0c3fb858a3b1a8b42833fb523a8 CVE-2023-6512,0,0,6654f84f78820ce8a149637ce351fbcfe46f7c6f2143da54a8f3ab029273d6c7,2024-02-15T20:51:30.973000 CVE-2023-6514,0,0,eab0046dd0f115514570e8378dacbbd3e5a1ae238ec74f2e6eabf7f82ca51414,2023-12-12T21:20:07.693000 CVE-2023-6515,0,0,b1cac8cc9fea3fd0b40a6a2117ed3c8e0cef2dc5a15dff7c764d5ffc4d5c1dd5,2024-03-21T02:50:38.423000 -CVE-2023-6516,0,0,2c423d948b9c47297e64a9f334bc2af5ff13514943adfe950fcd08cce2172881,2024-07-03T01:44:22.620000 +CVE-2023-6516,0,1,985253c885c61f60bc6fd457a9a9929b099960cd34ee513f4fe06318c86d10ae,2024-07-03T01:44:22.620000 CVE-2023-6517,0,0,10761768e9e673f04ab5124418749b1098394ee0385db9da11f06cac3ddb6dd2,2024-03-21T02:50:38.540000 CVE-2023-6518,0,0,33a876e02fc1e726795df0795586b3b4b951954439384c3fb9f45b3a1a7e2b12,2024-03-21T02:50:38.627000 CVE-2023-6519,0,0,af1ed468f597fad0020cd7b616b532dc6dbacd5ac58c68e2f307c345defd34b3,2024-03-21T02:50:38.713000 @@ -240906,7 +240906,7 @@ CVE-2023-6811,0,0,e9fac16ceb7f7fd95390cbcd175bb7522a37a2d8046a64b64e82c96439cade CVE-2023-6812,0,0,22c3e8d47c61711b37b65463cec1e334fec5979727b65b277a2e5fafd5f5766d,2024-05-14T19:18:31.490000 CVE-2023-6813,0,0,b99fbb5ab6b0c24f4fda5f925d7009e5ae7879f495bb6a62d91540b30046e899,2024-07-11T13:05:54.930000 CVE-2023-6814,0,0,f2dfd991f3eb478537c48f5d3ac3087d9f7a580ef58638c7d38447968c2e4007,2024-04-16T03:15:06.230000 -CVE-2023-6815,0,0,c9628ac421880e315b97a06c351a60f3525f481ceae5d652af8fc0152141d9cd,2024-02-14T04:15:08.497000 +CVE-2023-6815,0,1,07e4df780181537315587e628dd994147acd04e69a3525e99858e04dd7f88c26,2024-02-14T04:15:08.497000 CVE-2023-6816,0,0,c3a19bc55b4b85fddd22fe1085c1d2a08de0931d91570a7c34012695db8c4bb7,2024-09-16T16:15:11.937000 CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000 CVE-2023-6821,0,0,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000 @@ -242229,10 +242229,10 @@ CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9 CVE-2024-10014,0,0,1395463dc1e29fd6db71d83f72260a8cd3462c205364f301260cc7f7b129af31,2024-10-18T12:52:33.507000 CVE-2024-10018,0,0,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 -CVE-2024-10021,0,0,a6b17344f3b8ed69b69af1e4c8072f0ea15408a02fd5537c80b963512d6978ea,2024-10-16T16:38:14.557000 -CVE-2024-10022,0,0,0168cd514401d1be0e849bc27c7e2e366e37ce97ce04620f3f8d342cf2b43281,2024-10-16T16:38:14.557000 -CVE-2024-10023,0,0,db54ebd532d797f8c44fbc00efc10b60040113385b1a36843228c76d3987b972,2024-10-16T16:38:14.557000 -CVE-2024-10024,0,0,011fb00487d29d1b355fb7ab9e71d1875a267d231fe8021bcbf0d20089aa0bde,2024-10-16T16:38:14.557000 +CVE-2024-10021,0,1,b64cba7877ea721922fd9553750d3658ce15b0fbcf55c5ea4ae87d247d1eced1,2024-10-16T16:38:14.557000 +CVE-2024-10022,0,1,179103672e0aeed9e6408e50e4dad1de0d3bd3faa254d71bb9fac2b671d4300d,2024-10-16T16:38:14.557000 +CVE-2024-10023,0,1,cb42ebdfea51270072be77300916c7b0a6d8c5a09a15ab30370e563d437de89f,2024-10-16T16:38:14.557000 +CVE-2024-10024,0,1,eb6ac65d06bcb1b2ade71a00cb57bf7aa44a3f398307144a0422688c594b9a2d,2024-10-16T16:38:14.557000 CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524766,2024-10-18T12:53:04.627000 @@ -242256,7 +242256,7 @@ CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067 CVE-2024-10080,0,0,7dee1bdb0654db1839e6846f51c6c9699dc09bcdb5e7141706a72d57a008f278,2024-10-18T12:52:33.507000 CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000 CVE-2024-10093,0,0,655dbc008c9c21b76c775eaa92108777c983716e956bf10f0085a4f9c49fc737,2024-10-18T12:52:33.507000 -CVE-2024-10099,0,0,185a137bd5523acc338e25e5a408e0f2a47c7d04067b4fee0130a9bea860bb8f,2024-10-18T12:52:33.507000 +CVE-2024-10099,0,1,b3a11ebc9f9c6c715099c9fa0f4896335c8086b813d9eb8c78b7713f9817c86f,2024-10-18T12:52:33.507000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-10100,0,0,551af785b2583dfc00dd65a689907bc427d5051278643ae24a3a0c57fb4f9ff3,2024-10-18T12:52:33.507000 CVE-2024-10101,0,0,1d42831444f093da17057d1135157fc2c61373ed2c6e3aa4b33071a4d1f4b2d6,2024-10-18T12:52:33.507000 @@ -242290,9 +242290,13 @@ CVE-2024-10153,0,0,53cdd7b1faf79b7014d10984cde91af8d0727db65823fae8333e484880aed CVE-2024-10154,0,0,7e7c002f56d275740fe09f07861e1d8c7c84d5a302d17ebda9002d1cc89af9eb,2024-10-19T19:15:04.090000 CVE-2024-10155,0,0,c28c867d84c77c1d8b44365b1692537e6e29ecf12a6d0137ca0f337b9f9af334,2024-10-19T21:15:12.220000 CVE-2024-10156,0,0,83e755790254c7c2e4d1027ae8f6334dc4933aa9f16f90c5f13d6ecf7d7b4b70,2024-10-19T21:15:12.490000 -CVE-2024-10157,1,1,362181b9f0e1b671cc8a04c08fd9c6c09a7b044f8ead6aff71510ce4b4573ab5,2024-10-19T23:15:04.033000 -CVE-2024-10158,1,1,61c36b183ad8ba7da42118e60d74e086d9b8bd47e56458ac3940d73d0c513457,2024-10-19T23:15:04.297000 +CVE-2024-10157,0,0,362181b9f0e1b671cc8a04c08fd9c6c09a7b044f8ead6aff71510ce4b4573ab5,2024-10-19T23:15:04.033000 +CVE-2024-10158,0,0,61c36b183ad8ba7da42118e60d74e086d9b8bd47e56458ac3940d73d0c513457,2024-10-19T23:15:04.297000 +CVE-2024-10159,1,1,7e62b5742591a6154426c1fb53ce579061b0e46edac2dba2787045b93d21d6d2,2024-10-20T00:15:02.137000 CVE-2024-1016,0,0,71cf76ab1a6b276906d8ecf764cf0be1d15a9c7c60543569d9e172588701616f,2024-05-17T02:35:10.520000 +CVE-2024-10160,1,1,9b97d8231da276c4c228af1c891ea28fedc3f99702b0d36c447c819bbdfcf234,2024-10-20T00:15:02.550000 +CVE-2024-10161,1,1,6ead8e2c530909e03f3bc00a362c465cb073f5e641b6e06f9353e22c61003e44,2024-10-20T01:15:01.940000 +CVE-2024-10162,1,1,b564add0ec6e615199c70067b83707201004319f151e23bf467f025f869e5afa,2024-10-20T01:15:02.213000 CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 @@ -242741,7 +242745,7 @@ CVE-2024-1481,0,0,8ec746082eb3e01e56f31a1580ff8886182032e2bea5ae281bbcc575b73ba7 CVE-2024-1482,0,0,1d7777acb8f6767c0326a8b8463062ed94367cf76b55dfd2e7eca1de7665d146,2024-02-15T06:23:39.303000 CVE-2024-1483,0,0,977a71600513b30bb0eb6deb926ece36832c06dcc47ba3ddd3e7f35b0c5387d0,2024-04-16T13:24:07.103000 CVE-2024-1484,0,0,e884df7f8647f3afd501319772981132c9825cc30f5b6cc87c1e6bf272a5d8ae,2024-03-13T18:15:58.530000 -CVE-2024-1485,0,0,efbc3418a6aaec6a7824a943e7dd0f6b5247b6f4b0033b2421bbe9deaf9e93b3,2024-02-22T01:15:07.980000 +CVE-2024-1485,0,1,17c18a5bef032479b224456f9118284119e69658a2a7e6b21bbc38674fdb7e22,2024-02-22T01:15:07.980000 CVE-2024-1486,0,0,e701e39a238b49f5d8616e373531defaca6422ab904fbcdd1daeb8b8b0de1062,2024-05-14T19:18:31.490000 CVE-2024-1487,0,0,c8eb46fc04eb1a30f1923f7e4ec53edf581984da21f0a62ca04b0c9b869a73cc,2024-03-12T12:40:13.500000 CVE-2024-1488,0,0,882c78fbd7b0e9fe7403aeecbc9ce3b63d8e8855dfc05e684b04e2f8c2e6badf,2024-05-08T08:15:37.870000 @@ -243478,8 +243482,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 -CVE-2024-20420,0,0,808fb1a1636da5f128b3d2c1b67dca3ed991967043e939ee2434e6373787d74e,2024-10-18T12:53:04.627000 -CVE-2024-20421,0,0,75347908f34ca039e78aed9293f8b2d588dcf44e681cfb6cc3ab6aa41c98057e,2024-10-18T12:53:04.627000 +CVE-2024-20420,0,1,15999996b0ae7d7c20fa5618e7c39180945ae5ec284d9ff65379d7758d808cbf,2024-10-18T12:53:04.627000 +CVE-2024-20421,0,1,aebc346e8d223b2a92de579f5e301f997bbd63d2963e092f52511786b8a1dbc2,2024-10-18T12:53:04.627000 CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 @@ -243506,12 +243510,12 @@ CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53b CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000 CVE-2024-20455,0,0,582e47a347a8706fc3b45fb517686d3b16168e4f0adf4813dc071f3e17470c8f,2024-09-26T13:32:02.803000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 -CVE-2024-20458,0,0,b618dbe74ef342b6fdef57c9f243c321a185a45ba074908883a596a8489717f6,2024-10-18T12:53:04.627000 -CVE-2024-20459,0,0,575e8ddd96681a0dd32da56fcee58eb213cc4650dcfea2e56eb58d7a247f4dc8,2024-10-18T12:53:04.627000 -CVE-2024-20460,0,0,c5260a376147cf9fcdc79a42e7972a313bd4f558663b5a24322bd62548b06946,2024-10-18T12:53:04.627000 -CVE-2024-20461,0,0,2bc3320778f8c7fbde2cbc635624380365a2cf7ce739874f0e0bf05275db58a9,2024-10-18T12:53:04.627000 -CVE-2024-20462,0,0,9b33827e8e4b313e4e6933518796ed246da290b26064695b2aaad485699a3af5,2024-10-18T12:53:04.627000 -CVE-2024-20463,0,0,7923ae064daca024865d69bf59e86e07377aeda36be579f2bc9e3eb19b920ba4,2024-10-18T12:53:04.627000 +CVE-2024-20458,0,1,f4e424a91674f93250f5044f4f95f1a9b2abde7e2f7085db5e80531f79545701,2024-10-18T12:53:04.627000 +CVE-2024-20459,0,1,b3dbe0e2131980acd99e42dd7d3db2fec6db299d66f8e403fa33d50ddbdf5726,2024-10-18T12:53:04.627000 +CVE-2024-20460,0,1,1eaee4faefa3994076e2ba58bc83a5e7d236f2a094e1b7b7be00cb29805d4bd2,2024-10-18T12:53:04.627000 +CVE-2024-20461,0,1,25c5b419ca9fa9bba41bbde9dd3359450055a6d544c2de47a6316d4dfbb8f8fa,2024-10-18T12:53:04.627000 +CVE-2024-20462,0,1,352f9115eee6280b7763d0aba471834528310f478f87fdd374870b12c81c387a,2024-10-18T12:53:04.627000 +CVE-2024-20463,0,1,9f88660386fb168278f2988370d355737a91b9c700dd7d37593f1188a7b0f978,2024-10-18T12:53:04.627000 CVE-2024-20464,0,0,885e4b5fbbba0f9d8b2f4ff463c0a3d55ff5aae6f976428aa05f22d0fa4e2121,2024-09-26T13:32:02.803000 CVE-2024-20465,0,0,e6053a052da134a2b60854b5aefb33da7ab8ec9453353220c196e9e5fe323c38,2024-09-26T13:32:02.803000 CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000 @@ -244116,7 +244120,7 @@ CVE-2024-21169,0,0,75cfaa7dbb3017d69d1c32e7c9a3a07923f1edef87ef625d3961fd8622ff3 CVE-2024-2117,0,0,79d7dda411024d417201240caa69efdac6b41c6c0da01c1949cb476b1159e785,2024-04-10T13:23:38.787000 CVE-2024-21170,0,0,af70aab138e0b6f00f1af224e9aedbd73a234a8cfd2b7ba1d7eec319bf92e458,2024-10-17T17:11:10.947000 CVE-2024-21171,0,0,2fd05d07a23e14dbd131721fe68544117ce9a854c5a28a6e860a4826c9defab4,2024-09-12T20:42:17.600000 -CVE-2024-21172,0,0,76859c9679165d5a6aa381dee9265475415fc70902820e966f4ee2e0172bf9c1,2024-10-16T16:38:43.170000 +CVE-2024-21172,0,1,cb0507b50b3037a8db36d10352b1d6694cf00943ed618a92c696e5d4157515cd,2024-10-16T16:38:43.170000 CVE-2024-21173,0,0,0a12cbbd305217530b1df35b14cfdef98657ded6769d894b09583b79eff2a588,2024-10-17T16:39:26.610000 CVE-2024-21174,0,0,ba6844261aa04c1ce6ded1964dc44516b30559a14a2b47a862fad5fb6e961d86,2024-07-17T13:34:20.520000 CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000 @@ -244152,11 +244156,11 @@ CVE-2024-21204,0,0,ae3974e6e819eb72c15fda38a94ec00e7ce8c7ae66ff8d4329ce8bc23c1a6 CVE-2024-21205,0,0,06c1ad328c7908bb2d5426b85e1fe09ef6e93b5dc063148369f98528b7c21882,2024-10-18T14:50:37.103000 CVE-2024-21206,0,0,12044bca635d46dc06bba67023cc66e6ec5c6a8ca2061f8529322ff296b183ae,2024-10-16T16:38:43.170000 CVE-2024-21207,0,0,441e7ee527d2b149c57c3cf29122fa50593225a02ed0e8e1aa929ce2ccb3cd06,2024-10-16T20:45:17.507000 -CVE-2024-21208,0,0,67bc4a246b410a4637b4d04517d4df5890fa5369a9ab7ac3a1b1f9f2bd37ca66,2024-10-16T16:38:43.170000 +CVE-2024-21208,0,1,f63e348aa9e4b4a01e2378e637d9f3e9df426aed90a375ab27c5e2ac8ade0cbc,2024-10-16T16:38:43.170000 CVE-2024-21209,0,0,09a10e210e54f395a42456e8f1afac7dc21db5e4c2e5e9d4c0f4a12f07e14076,2024-10-16T20:44:58.323000 CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000 CVE-2024-21210,0,0,a4cdc2dd66c61fd543ca03dfb8ec0a55173e93be90bac59938a3a7fbec016519,2024-10-16T16:38:43.170000 -CVE-2024-21211,0,0,0fc12f59af0c7ed49deb3ad65e42d5e4770a5c08baa8ee780185cfbce72a319a,2024-10-16T16:38:43.170000 +CVE-2024-21211,0,1,f465ab0e42833415909a4c1859e12f1e87e9a700b0019d86a8fe8746801653dd,2024-10-16T16:38:43.170000 CVE-2024-21212,0,0,19f687ae812c0e698f3f0e8daad4c738a294b64f047163a3f6c2379dc26312f5,2024-10-16T20:44:19.233000 CVE-2024-21213,0,0,42d1671ecea98024063bd01928cc7c2037a7c665f9b2aa465a872189431111e7,2024-10-16T20:43:51.853000 CVE-2024-21214,0,0,e575dd8aa54a53a935c3658f84cd238ad5d3c176b9a1942a7f0e09138fd872d9,2024-10-18T18:16:16.987000 @@ -244170,7 +244174,7 @@ CVE-2024-2123,0,0,0719ae4bee332af79c93b8620c3a1fe6da02de27a90f1595704940d001e25d CVE-2024-21230,0,0,c4e17944ebc3bfcbdf78b6336940e6a6054992926ab544142906aebeac23eae0,2024-10-16T20:42:35.450000 CVE-2024-21231,0,0,36b78c7f1d40d41b87ee14c511c304eaf9286e1b39ae47f4ae34fcf1169219e8,2024-10-16T20:42:13.877000 CVE-2024-21232,0,0,d3c11f941e85cc6d35f85f7ba5765b381a26d5c1e4add84f192886aaa77d4741,2024-10-16T20:41:35.300000 -CVE-2024-21233,0,0,2e1f835c6d1aeb12b526b73852696d4c05a55a397cf3b3c751d6dd9e9ca62929,2024-10-16T16:38:43.170000 +CVE-2024-21233,0,1,c9783dd57fb83771b881b9eacb5204e315de62042e4503d88ca492207b5313dc,2024-10-16T16:38:43.170000 CVE-2024-21234,0,0,b3b8ed4e786067e578b55ed1ad884f7dcaf26511a099c1b0304d1e83b0941272,2024-10-18T19:05:00.380000 CVE-2024-21235,0,0,e8b8c6826fe22ed257db7bc493fd1c19c482c81b703061b649ee81dc38c96926,2024-10-18T18:30:26.097000 CVE-2024-21236,0,0,f3064ccc3b1d0405a68efbf4a4a2fc151335deb597e7bbeb33d75084dfe01195,2024-10-16T20:41:14.010000 @@ -244179,53 +244183,53 @@ CVE-2024-21238,0,0,04b43b7dfcf632c90dd367c6beee91e01080526504fa7fe217224e883f00b CVE-2024-21239,0,0,526fc8375712e973ff0d45003cae230ec5f44402442ae70a546b37d628f02100,2024-10-16T20:36:59.973000 CVE-2024-2124,0,0,49dc310dcf10d520f5d59cd2423bf19b84e2577ed2ccf7fa71616fe601b6b6e0,2024-03-20T13:00:16.367000 CVE-2024-21241,0,0,653a64e8940346f0241e59fbad90640ce2853b3ef07ef0bd409dac1e90cb0ec1,2024-10-16T20:36:10.917000 -CVE-2024-21242,0,0,7bb4c55d9279da0a657529b25e9dcce21fd2bafbdd73da59c4162dbe512dab79,2024-10-16T16:38:43.170000 +CVE-2024-21242,0,1,4c73a750a7f36ff82501f6298ac5738a0ddbb4311643eef000b37616474c37f2,2024-10-16T16:38:43.170000 CVE-2024-21243,0,0,0fc41f40153463683032ac1bfc5c5f45a9ef74d8033ddc59d83f59345dd7fc5e,2024-10-16T20:35:41.957000 CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b605c6,2024-10-16T20:35:00.173000 CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000 CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000 CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000 -CVE-2024-21249,0,0,fb960aca811c792a1c35a893ddd2779c68ee519fad06b7f2c31a2b52454d37ac,2024-10-16T16:38:43.170000 +CVE-2024-21249,0,1,8c8448494e88fa3a51a4461e9a5ac6bad487d7f244a14567a92f93a8fd3bd8b2,2024-10-16T16:38:43.170000 CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000 -CVE-2024-21250,0,0,fe2f7c9e4b27b479a1dd666558328d91647a6acff5cab12ac18f92c2e04313d6,2024-10-17T14:35:19.303000 -CVE-2024-21251,0,0,3b63328efd5a0e94e02c1315a38ffabce5613c5e88d0ee0c0e47d239d7783c29,2024-10-16T16:38:43.170000 +CVE-2024-21250,0,1,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000 +CVE-2024-21251,0,1,f66808e065800029f8b77e79c9ec32d86742ea636463bb21ac290a0b61534b26,2024-10-16T16:38:43.170000 CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000 CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000 CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000 CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000 -CVE-2024-21257,0,0,f3199dc6631305f44fd7e631faf6d9945bb7f99d086ee948972a081e0e0fce7e,2024-10-16T16:38:43.170000 -CVE-2024-21258,0,0,382395383305acab25cb831a777e460b8f4c1725a3c5858153df343d0cfc98a5,2024-10-16T16:38:43.170000 +CVE-2024-21257,0,1,4eb5b2386255bfe67a12d4f16c9687502d7809166e4f1a2b618c5f01aeaa9628,2024-10-16T16:38:43.170000 +CVE-2024-21258,0,1,d66d60d8ebe1253680938995404bc802bc4b9dba35146ae97db380f0d8c97381,2024-10-16T16:38:43.170000 CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000 CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000 CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000 -CVE-2024-21261,0,0,ef04719ab523b707736235f8af27c26242ed681223f93665015bfbce39a2bfa6,2024-10-16T16:38:43.170000 -CVE-2024-21262,0,0,71afa26abdb16d6522b0e4a937038ceda8478361a7b849ffef1e4f8fd1f9d14c,2024-10-16T16:38:43.170000 +CVE-2024-21261,0,1,264e20afc2c31861a3dfe0c50868999e6336c9bde09d592ac30112d480df1de2,2024-10-16T16:38:43.170000 +CVE-2024-21262,0,1,e19c4ff7421a278fdceec6eb223f5a1ccda273af6c221fea77dc4182cf357f44,2024-10-16T16:38:43.170000 CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000 -CVE-2024-21264,0,0,42f5e1e118a1b26c2aa43188eaabacea9666989ae3ddecba827f8cf1f21b678b,2024-10-16T16:38:43.170000 -CVE-2024-21265,0,0,038d38367c0c298e1252fb816890b457896ae1dc6ec7aeb20096bae968b9f44c,2024-10-16T16:38:14.557000 -CVE-2024-21266,0,0,d4dd1386267582424fc53aa64daaa02804ee51911e93ec655e4019a603998748,2024-10-16T16:38:14.557000 -CVE-2024-21267,0,0,5dae51b81597d167ae3293406e4d73f0a4f8792a06a4ea18866aeb182c9f5e16,2024-10-16T16:38:14.557000 -CVE-2024-21268,0,0,e434079dd926b71961559dca7ce9ef977bfbfc534da62a8dc64d7db96bd313a0,2024-10-16T16:38:14.557000 -CVE-2024-21269,0,0,3cf7f962681837b7396189594ea27a291d6e007160bfb6c9527cc5bddd5737ff,2024-10-16T16:38:14.557000 +CVE-2024-21264,0,1,43edc8b0674a64ea84e7381a14394594bbb3f638fa4e4e95e2e0a620c8f8163d,2024-10-16T16:38:43.170000 +CVE-2024-21265,0,1,6ec2381145510e33cb3e553846c003d530e6e5528f4f897a45c565e963c8514e,2024-10-16T16:38:14.557000 +CVE-2024-21266,0,1,d2b2b9dda9b239557825dd794f86c5379486f29416663e6a044d8443f59b50f0,2024-10-16T16:38:14.557000 +CVE-2024-21267,0,1,1a8a179dba0a87e3a96d895e422c1e9e58f27b4fee0e3d10796857eb659c6689,2024-10-16T16:38:14.557000 +CVE-2024-21268,0,1,184b44e343163f38bf82f85852240e77e817857a1deb55b84904daef4bce7b53,2024-10-16T16:38:14.557000 +CVE-2024-21269,0,1,8ac48345222699caeca3340f8d9b1776d6fb3c3a67709e0efad740dd9c32dd84,2024-10-16T16:38:14.557000 CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73db,2024-03-08T14:02:57.420000 -CVE-2024-21270,0,0,918e37a645fb9a3e6a455cca458b1e89299b5c7b5b927b6dc045657f9922672c,2024-10-16T16:38:14.557000 -CVE-2024-21271,0,0,1bb611e3f983a646706e6853e25bf44fd7e2aa9ea178c0f4bc3aa763c94f5efa,2024-10-16T16:38:14.557000 -CVE-2024-21272,0,0,3ef0ecf4368203e7ecb59c17fa66beb459ec227f6c4da7570550172b4ee373f8,2024-10-16T16:38:14.557000 +CVE-2024-21270,0,1,c035566d47f512aac57da764b50e781e0866caaca2cb3b74085d6418e1e7043c,2024-10-16T16:38:14.557000 +CVE-2024-21271,0,1,4e0e8aff2c04dca6c3031ef1635dc8d2fd6187a091e0ce305276d05913f69495,2024-10-16T16:38:14.557000 +CVE-2024-21272,0,1,b1bba3bd561fed845f5697e78a01e3d097ac96d0e986ce7c0428031a9bfa25f4,2024-10-16T16:38:14.557000 CVE-2024-21273,0,0,ed7e5def9d03e01a957f39d2f68dd8ee0f06806bdce0a2f3b8054840f4b49927,2024-10-18T15:02:45.267000 CVE-2024-21274,0,0,289f485fff477f3f1498b04fff96f3faef68a497affa5a5e137da23e9d116f59,2024-10-18T19:05:51.583000 -CVE-2024-21275,0,0,ede44475253cd1f66e7efced0d59c8f31cbfa0482f50c631f41d6e5399f33149,2024-10-16T16:38:14.557000 -CVE-2024-21276,0,0,5cf98fe626972dbe0d42864f872cefa6390269b99d0ac01e9955eac7d0b75191,2024-10-16T16:38:14.557000 -CVE-2024-21277,0,0,8d83a7dd8c638bb40a10032890daca7d5d805fdf9dcdefbb374b79e0b8e1772b,2024-10-16T16:38:14.557000 -CVE-2024-21278,0,0,6581892b9eb21bf3d63db19739f6565dc17f9ea6f71dd8617ee139509b5a1808,2024-10-16T16:38:14.557000 -CVE-2024-21279,0,0,bdb93310d9d5ccdceaf92a1d7c487631c336074603e5e16bef8653bc5c69d0d6,2024-10-16T16:38:14.557000 +CVE-2024-21275,0,1,ff30974f12910859b0b0c97a4bf2ed1c57d0df95e60f3b76be051f309649647a,2024-10-16T16:38:14.557000 +CVE-2024-21276,0,1,88d1013768cd71bd50481a7f9f9a7d712b0c325c8d7c52c3ec4f2c43d050e298,2024-10-16T16:38:14.557000 +CVE-2024-21277,0,1,830dd2d7d7e14641e53154d60d94cda7bd0acc28101b04a7038c064c53fcaf0f,2024-10-16T16:38:14.557000 +CVE-2024-21278,0,1,fb5dc01e8f2a214bbabb748bfa4fafcfc6b7ab1659b95a09c2dbe590f3b946c1,2024-10-16T16:38:14.557000 +CVE-2024-21279,0,1,11ab356e8a2ffeec084a4b6869044b54c98feb0b1ccaefb36399b1f0082a72bc,2024-10-16T16:38:14.557000 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 -CVE-2024-21280,0,0,86b4a34e39d5bb1aff1170632c6b22038082f649ee544872ebd0ddf865d7f522,2024-10-16T16:38:14.557000 -CVE-2024-21281,0,0,320e900c251e599bbae3c216e71ac3176cb9be995ea6adfafdd7f018c5554fce,2024-10-16T16:38:14.557000 -CVE-2024-21282,0,0,f6586d0df468a1c1410f381b0f758a50d6e468f1ffc61ad4d9db464b6f0268be,2024-10-16T16:38:14.557000 -CVE-2024-21283,0,0,4122de1e1f25ba922d32f43a4eae5fdf138104bbcd461621679bea2e84d7e261,2024-10-16T16:38:14.557000 +CVE-2024-21280,0,1,5156962358b991c2fcc9b491a164c9075e14fea3ef262c0f3a5e6c231d17be56,2024-10-16T16:38:14.557000 +CVE-2024-21281,0,1,fe654a0043295e853a0435434a40fb37f40af76db1c541ea163ce31caf5a2662,2024-10-16T16:38:14.557000 +CVE-2024-21282,0,1,b5fc9e7b277822785b6b2eecaa3af296e14f31d1210b4465c7c41d349ffd3f1f,2024-10-16T16:38:14.557000 +CVE-2024-21283,0,1,5b9131a58fd240835bffeb334ba4c0f4fd3efcccbcbbc66c489f69e6132ff021,2024-10-16T16:38:14.557000 CVE-2024-21284,0,0,b26beb8928847ddda7596ad1b5456aaf9e461763a25565fb76df745f1499af72,2024-10-18T16:45:58.217000 CVE-2024-21285,0,0,94befa20d99f1e44a7a6e1443028684d2864251495f642087aa70fa909cebf20,2024-10-18T16:46:27.283000 -CVE-2024-21286,0,0,d6097aea275178291fdb95347242226b98740ad128b427c79486e10bd92b4d4e,2024-10-16T16:38:14.557000 +CVE-2024-21286,0,1,fa8caad2cbdeb465e9a7c9d2c279d3a95ff5551a1c3918c0e458dea9b0ff9821,2024-10-16T16:38:14.557000 CVE-2024-2129,0,0,5f52407743c1f969b3fa77917deda7339874ee16ffe5a9c10d3a77b843fb1d95,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 CVE-2024-21302,0,0,7f391d893a5dfcd3f80503750e1f19b379a4e74727dc288c2f0c00e1775f3cc9,2024-09-18T00:15:03.243000 @@ -244819,17 +244823,17 @@ CVE-2024-22025,0,0,c37311b2ce56df69ab782611ab699ce47988501146abd650aa709c2136307 CVE-2024-22026,0,0,4dc42eff10a0d63d4e6e79a7c42e9e031c3e8b304b1fa21458db78beb14efdf7,2024-05-23T15:17:25.833000 CVE-2024-22027,0,0,3d0c96b5121d14ad5b07896a4ad450229eb856557bf96a12fbaf8cb06d56efe7,2024-01-18T20:02:46.993000 CVE-2024-22028,0,0,7e34c9a53475d80dd7b3a13cb26dcaeaa9e734352ade695587a986ff6e9dab0d,2024-01-22T20:22:47.847000 -CVE-2024-22029,0,0,e6f9b9c587a273e84c59450a717290ee14655d79ae392ac7d9bc6e8f26460189,2024-10-16T16:38:14.557000 +CVE-2024-22029,0,1,0bcb039f58eb9f12c07b11d3517bf111026a5b2f37e513a1afd59bbb586fef6a,2024-10-16T16:38:14.557000 CVE-2024-2203,0,0,cca61da8371c28bd3605593db7eee591bd978cef090651cb80384fffb6a3ec59,2024-03-27T12:29:30.307000 -CVE-2024-22030,0,0,e89cfa40a50618eac03411935b75ff5b200f2392671139522325104f07644af1,2024-10-16T16:38:14.557000 -CVE-2024-22032,0,0,587068c1cd3274de0862604e953b1aef419e954615e1bfbb02853c27bde09bff,2024-10-16T16:38:14.557000 -CVE-2024-22033,0,0,2ab3a532586e014fd236c30f10e624bd641e3eeb5707aad52bb6fe5fbb1486b3,2024-10-16T16:38:14.557000 -CVE-2024-22034,0,0,1e501ae585ddbfcc0fcd644acff127b8a6ea0f5f36bf69ce1126bbc1a69a3e1d,2024-10-16T16:38:14.557000 +CVE-2024-22030,0,1,7649f8df839cdf611109a205f6f81a40cc0f118aa33ecdb05d4f85150a39b6b9,2024-10-16T16:38:14.557000 +CVE-2024-22032,0,1,c2c6c9c7bc0fdf424ca78b54ebc4b1d682818afecac9558e9d76eeb541db4116,2024-10-16T16:38:14.557000 +CVE-2024-22033,0,1,ccffa39a68e112f5d6eb2aa83c5f1e50b909492c7c03a2f678b9b33e92bbe7fe,2024-10-16T16:38:14.557000 +CVE-2024-22034,0,1,1c2a42316189c87a4e7bc64615504136bd763c7b560b1d86d2fae22840d49e83,2024-10-16T16:38:14.557000 CVE-2024-22039,0,0,93b46f47ed43224423d7dcdd7cb5da88aa6d4c08cceaffd1397a4ad32f5be3ce,2024-05-14T16:16:04.450000 CVE-2024-2204,0,0,a1b09b74c91818340209a8ddf823ec1cf800d4476587d084b8cf03d19b7025dd,2024-03-15T12:53:06.423000 CVE-2024-22040,0,0,be358f199493e83f56d872322bfd43fdac4427b513b4fe755395a46f51c51b1d,2024-05-14T16:16:05.417000 CVE-2024-22041,0,0,b5443db0c86e6457cab6a387b03922b3d7f0b5665f00c0fc059d18dd37af355a,2024-05-14T16:16:06.063000 -CVE-2024-22042,0,0,51e530b3f65717bb1e8010af0bda85338ccdaa265e736b5da43fcef129570895,2024-02-13T14:01:07.747000 +CVE-2024-22042,0,1,56708acc4405160a037b17dbc856349a9c2dca93a188a8c2ae2fb59c1beb1304,2024-02-13T14:01:07.747000 CVE-2024-22043,0,0,9e476139d6d724b0e5de7cce022f763d77f88747a669d7f1dbe27dfd871a9603,2024-10-10T15:44:13.010000 CVE-2024-22044,0,0,eebeb23ba8a6b13727ce5f42031738195bd52d4a50bd5c3f51bde42fc8fdd786,2024-03-12T12:40:13.500000 CVE-2024-22045,0,0,0934b761764d7359e221a8250519572915febccdf4c0aa0b54ead29e97778d40,2024-03-25T16:24:56.037000 @@ -246080,7 +246084,7 @@ CVE-2024-23810,0,0,f3288c682550e3fb3148c92074a31702445e9f4b88e7518102ca774b545b4 CVE-2024-23811,0,0,52b66f99243bbc59e1df4ad9adca6cfa8dcbb2d96fc32adf98100bacfdc9783d,2024-10-04T16:46:51.987000 CVE-2024-23812,0,0,cab8eedebb1145d3286eded12c37bdce968ba2103d6aac6f55fc24eff8bf6332,2024-10-04T16:47:57.760000 CVE-2024-23813,0,0,06a80a5adb022caf88da42b7e6394738676109382d66d07ba8c09e0d037f4be3,2024-10-04T16:50:07.187000 -CVE-2024-23816,0,0,1e367dc12be0363a9385ef93978ff1e2bbe181353c2630775729c5d357dbdb6b,2024-02-13T14:01:00.987000 +CVE-2024-23816,0,1,3483172fc7a10d435bbaff5827ad28ca8f267e0c611452bd9b070e06fa24e234,2024-02-13T14:01:00.987000 CVE-2024-23817,0,0,96e205ef8a9860a22f54cb6aee35e0102c76224a5163ce6cffec0289aedec80b,2024-05-09T15:23:24.053000 CVE-2024-23818,0,0,3d34e6f0efd2746d11eff13d2092b25266ba64d4a02a51d8cfb0b8c5a15c39a4,2024-03-21T12:58:51.093000 CVE-2024-23819,0,0,b5e8da9935c62cda3de53bececefdcc03b58136e907f1b9bb8eb0a5e187c0c76,2024-03-21T12:58:51.093000 @@ -246899,7 +246903,7 @@ CVE-2024-25121,0,0,633ca1f5f8fdbb9d8ab9fd4780ede0f55f205713bfaf916f50a19319dc6bb CVE-2024-25122,0,0,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000 CVE-2024-25123,0,0,d91338db3ed95b8913dc378067e1f32dfba4b3ec82603f1ac01d187651acb75a,2024-02-16T13:38:00.047000 CVE-2024-25124,0,0,d570849c8f0f5f2638ea1dc3ea0947e3bcb6425f6af78c4802a7a9fc8debac63,2024-02-22T19:07:27.197000 -CVE-2024-25125,0,0,e8d3e2301ada9acbf67deee26992ba22f050532192238294c0e8c4b124dd2615,2024-02-14T13:59:35.580000 +CVE-2024-25125,0,1,72a5acd0687c32211b7e2c0a7082cefb738b75531ea50a5a67218ea8a2c1aca7,2024-02-14T13:59:35.580000 CVE-2024-25126,0,0,23f016e55610abad81e6d9deecb5884c2df823f3793b1f3952a19c4d73965c85,2024-06-10T18:15:27.553000 CVE-2024-25128,0,0,ac426d191aad5ee1c28f9b0e0170a37080e5d4fc6590878754b348866bd26a76,2024-02-29T13:49:29.390000 CVE-2024-25129,0,0,7486ea0d16eb332f11a4090e258b52d95003d6f81511545e6100dd617a69be87,2024-02-23T02:42:54.547000 @@ -247284,7 +247288,7 @@ CVE-2024-25712,0,0,cd76bf59fa3b149c026f0736470198c42042811b7fa0e2166e37d9fe09aff CVE-2024-25713,0,0,3d79b0984c1664e4ac69ee01cb3f8d7ad091cc5b18ae7eaaba60f08548db4afd,2024-08-28T21:35:04.973000 CVE-2024-25714,0,0,2873351a6af80135ad77a9bcc3e4dfb72663502923a58c50c79611835741c222,2024-10-18T14:08:58.867000 CVE-2024-25715,0,0,c088d4b977142e9dcb9ad21b32e4f9aa61385e1d7ddbd4c017103ce015b7a37f,2024-02-16T21:35:54.270000 -CVE-2024-25718,0,0,36013110a47522378a7f909cc9712cbde51ab694884ada3d0c70dc8ae34e1797,2024-08-01T20:35:25.977000 +CVE-2024-25718,0,1,ae3e7adaed565c4b7011dbf928b218006e1c872144ce7016bbce633e7ca027f0,2024-08-01T20:35:25.977000 CVE-2024-2572,0,0,5b74e34492d90066cf583f89ae3fdf47d4796ec58fbab0c453f87f07a2a5fb4a,2024-05-17T02:38:20.357000 CVE-2024-25722,0,0,92d3b9468bc91e349275846c28f9045c86a0984b3586a9d2c81948ecb8ae65e5,2024-09-05T13:32:17.380000 CVE-2024-25723,0,0,8c3612f460be05084d2da9e8693ad88b2c515e61b1e81491f670f8acc6d04fab,2024-08-01T13:47:49.970000 @@ -249939,7 +249943,7 @@ CVE-2024-29151,0,0,41273283144e72ced9aa4305d0684c62c423c9d1765bb649f90e55578f8c6 CVE-2024-29152,0,0,6494eb520227446d6d245c5a4d673a99692904bc67e1a2221cdb6494798efeb7,2024-06-25T20:15:11.353000 CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000 CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c77b,2024-03-18T12:38:25.490000 -CVE-2024-29155,0,0,9b1d73b2afb651aa95014b249a82949177beb3a83123ace7867783dee516c48f,2024-10-16T16:38:14.557000 +CVE-2024-29155,0,1,5a1f0305c082e1ba217a84aa02321093737f75982b20b6afca6467b5a0b8c5d2,2024-10-16T16:38:14.557000 CVE-2024-29156,0,0,595d020a34dc3c63329ef492697be54cca90adb54515cbfada40f26153450f3f,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,3110ca8118b2c924b316fb8b417f719cf20fff49178f5804090215ed711693f7,2024-08-16T16:35:08.877000 CVE-2024-29158,0,0,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000 @@ -250369,7 +250373,7 @@ CVE-2024-29912,0,0,8255d69d683b15fc856a2b65ef013e0362d2b26659b4185662d67b76eeff7 CVE-2024-29913,0,0,4669e8fec0574648393865da62de1ec59d860963f78835c3a01b862884fe939c,2024-03-27T12:29:30.307000 CVE-2024-29914,0,0,761da9ee53c6e9104c3c3dac6ec7a739478a1cbb3f91a6d7826a0bf5071bab80,2024-03-27T12:29:30.307000 CVE-2024-29915,0,0,475f87e7488146043ca2d188cdc5b5b2013580bda45323ff659d8d108649df74,2024-03-27T12:29:30.307000 -CVE-2024-29916,0,1,39eae7796634c263b8a467e5a9bd0290dbc1bf2ceef3772422b3e9d38a62ece4,2024-10-19T23:15:04.570000 +CVE-2024-29916,0,0,39eae7796634c263b8a467e5a9bd0290dbc1bf2ceef3772422b3e9d38a62ece4,2024-10-19T23:15:04.570000 CVE-2024-29917,0,0,75b5897515c45dfd5e047adfd3f4b8ce42d1cfa2d3900cb860b106e2d29f4812,2024-03-27T12:29:30.307000 CVE-2024-29918,0,0,8050299d2127b3a4d6070b312676603098d0b5e8a595dcb25c810c2470f7beaf,2024-03-27T12:29:30.307000 CVE-2024-29919,0,0,a897252a6458a0fb4a2c0e30f9df01e639355464cf161263081ef8fd9344caba,2024-03-27T12:29:30.307000 @@ -257306,7 +257310,7 @@ CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0 CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000 CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000 CVE-2024-39514,0,0,6867df5f52f908f491ae646c1df8207b42c79f3d12187b6cec6f6552286fc92f,2024-07-11T13:05:54.930000 -CVE-2024-39515,0,0,d1d8d5bdcf47661ac97ec3570a667be52f64c608cc281627625cf0d0d1aa5e4b,2024-10-10T12:51:56.987000 +CVE-2024-39515,0,1,e9c98a35dba3d52de55c659681fba19c5a3e5ca2bf3da6af2369a67308cb62a2,2024-10-10T12:51:56.987000 CVE-2024-39516,0,0,2b1218089419d05a613c2d9d735bb0ef3fd535990b8784c0ef4337599b015ac8,2024-10-16T22:15:02.943000 CVE-2024-39517,0,0,ed12fbdd5935917e9b7f1e56184a21b312ea157822adf531c0ee87bdb0d202c2,2024-07-11T13:05:54.930000 CVE-2024-39518,0,0,7f7ecf1dc91f43c4d2cd601e79a0cb63e34c06bbd9c6fdf0d6bfc073379626de,2024-07-11T13:05:54.930000 @@ -257317,7 +257321,7 @@ CVE-2024-39521,0,0,e07db97b7d1a4f6ea0d1bc3a01783d19907e227d9bfbe59b2554fd9c613cd CVE-2024-39522,0,0,b66709e6535a7cdadc12e252ab229dc8e8aef04f48261d0268655457d17fa70a,2024-09-23T13:40:17.377000 CVE-2024-39523,0,0,a3811f47c02311cb1b3e9c779434ecc435f3ef774dbaecf23095150720747474,2024-09-23T13:41:41.567000 CVE-2024-39524,0,0,f81747ca72ff72ed34e537ded9b51c09a5f97f91401f1ade11ec10102c46443b,2024-09-23T13:42:49.947000 -CVE-2024-39525,0,0,d775dd232fca82d89a27908f99c7ab9fcee2b3e4a09a48f8a86e162a59a4cd74,2024-10-10T12:51:56.987000 +CVE-2024-39525,0,1,6d7b9f8d0990faf25eabfe36282167514a71b1b190c2a84c894c6900289c02fd,2024-10-10T12:51:56.987000 CVE-2024-39526,0,0,7372e2c605d63d2bf1a674b1e3e2cb465e899c578e34e33e6c63b9abf375c0fc,2024-10-15T12:58:51.050000 CVE-2024-39527,0,0,d86aaecd0b469edddccd80ab953d92e0a44ff9bf0251150ad0c05ee6eb311502,2024-10-15T12:58:51.050000 CVE-2024-39528,0,0,e38a4ee98e70571927c02a6972041282f229d4485e62ff8801fae59946fb79e3,2024-09-23T14:01:41.367000 @@ -258632,7 +258636,7 @@ CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000 -CVE-2024-4184,0,0,33d23b9a605bc029b53a1f05dc68dc89733f6d581d44acd5821f1f7c67a18e54,2024-10-18T12:53:04.627000 +CVE-2024-4184,0,1,a99d7cdb05f2e5a9758044fcb5e7701d1346f64949375ca085faf977d3bc37ba,2024-10-18T12:53:04.627000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000 CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000 @@ -258680,7 +258684,7 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 CVE-2024-41888,0,0,551a193b56683c8a955974406454da46e806e6e58f5cbc2dcb8dc5dd231b91d3,2024-08-29T12:55:09.210000 CVE-2024-41889,0,0,c2f8146a4c074f06a28a6e2235a6e3d92ccee3a8823a7bd377c0c9b959c16c5c,2024-08-30T17:53:40.897000 -CVE-2024-4189,0,0,f3503e7c0468c888937257bde69063381303169eecce5486a82e4333fd127629,2024-10-18T12:53:04.627000 +CVE-2024-4189,0,1,18e38ad504ad30c17a1f27dd4ba1750b975a028781af0e473803c8b75385fcb7,2024-10-18T12:53:04.627000 CVE-2024-41890,0,0,a90af16c8c7558e5227ebbc511a4c71519b3a4532e07b0a451c0d8da1663fee0,2024-08-29T12:56:47.413000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 CVE-2024-41902,0,0,43ae61ebce9a8b7d3996bceeab15083df998500c68f80ca3ea2bc52db86bbada,2024-10-10T12:56:30.817000 @@ -258859,7 +258863,7 @@ CVE-2024-42106,0,0,d1be86d3a499fcbbd48fa48666a765f712be1dd5a6b971ade33744c711a65 CVE-2024-42107,0,0,6491957e69d9efbbc6993b086ea49c99500b6fccef3248643b058f90720776c1,2024-07-30T13:32:45.943000 CVE-2024-42108,0,0,07a55e64558b7f3e959e84e219b350a11c328136e4e4f1bc5343262d1bc114f5,2024-08-21T20:52:35.470000 CVE-2024-42109,0,0,7426022d2af0b7bcb0572ef1095f4b2b07e4bd980abf97c7236bd4ffbdf0f678,2024-08-27T13:44:00.143000 -CVE-2024-4211,0,0,24a198bd094bf9e44150fb890205a61c1bb5be436ddf7e69472ba8de67c579ee,2024-10-18T12:53:04.627000 +CVE-2024-4211,0,1,97eff23e3f499ef8da6f7e4387f7b650f119a37f1d573bea23ebc2e11144f313,2024-10-18T12:53:04.627000 CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d076657e7,2024-07-30T13:32:45.943000 CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000 CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000 @@ -259080,7 +259084,7 @@ CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0 CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 -CVE-2024-42371,0,0,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000 +CVE-2024-42371,0,1,690b804c480d5cc3628aea98aecc9c85059a86da335e85ba28cb0b52a05b1474,2024-09-10T12:09:50.377000 CVE-2024-42373,0,0,0a911f8c7b65a5ac6f64a8e43f34010f8e931ac83329dff9f7884c56f10ce33a,2024-09-12T13:26:37.753000 CVE-2024-42374,0,0,f269e9c4776cdc5b8dc54432285004e2049939b4c19e5a365ffb07a0c87786a3,2024-09-16T16:25:54.430000 CVE-2024-42375,0,0,f88914f78c046f57acc08161978ed742ad9df5262df6fb06ce5cd75ac24c71ad,2024-09-12T13:46:39.527000 @@ -259089,7 +259093,7 @@ CVE-2024-42377,0,0,9face528ce5b147140c71d88d734a9d4c3870323279e5a3837b9bee3a938b CVE-2024-42378,0,0,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000 CVE-2024-42379,0,0,3df4e462d3527273fa2a98871af6d02d089a425040231b6521435b06449dcc55,2024-08-30T20:15:07.623000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 -CVE-2024-42380,0,0,5abd276ef303a0a04718583183567bd8e789e2a4185f71fabf777d854e3f8a5a,2024-09-10T12:09:50.377000 +CVE-2024-42380,0,1,d411311e0f8faeba8e1e2c014780bbffd7dd4ccddf85bd3299ae54305bf6f4ef,2024-09-10T12:09:50.377000 CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000 CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000 CVE-2024-42393,0,0,dccd6d06051b1376b790b00ce1bb00ad00ff605de076bb7cd98815c096883960,2024-08-12T18:22:45.023000 @@ -259722,7 +259726,7 @@ CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f CVE-2024-43453,0,0,c941563eee0035394ae37700c8a3b91a1f220c8f4da80c0f896f8a39e45a51a8,2024-10-10T12:56:30.817000 CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000 CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000 -CVE-2024-43456,0,0,52cfe87e7df07e6312c61a71b69b91767d6e02250ae06c5c56bdd8b94d313ce7,2024-10-10T12:56:30.817000 +CVE-2024-43456,0,1,e2cc7c4090302ac9e63219e78a5808d0af452e7b7d8cbdc32b3824627a6842e1,2024-10-10T12:56:30.817000 CVE-2024-43457,0,0,2d39da1954a904290cdb655f8413466318bc2fb9e79e95d1239baead98599e5b,2024-09-17T16:25:03.037000 CVE-2024-43458,0,0,d510a08722ad4b01e3bd416a3ff1688485cee9b82fed026222465a1f7268669b,2024-09-17T16:24:06.837000 CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000 @@ -259733,7 +259737,7 @@ CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7 CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000 CVE-2024-43466,0,0,b946ecd1f88611673cbb3be558d8f8e03be741959edeb8309467094a9d78f0b9,2024-09-13T14:44:16.013000 CVE-2024-43467,0,0,06c9c5b2eced8d091ee4cd0089976d978adbc50aa9ed4a3fe075bf3facc90f85,2024-09-17T16:06:44.170000 -CVE-2024-43468,0,0,296aeb867a6dce413819e9e6eab14b15d98d7d33591c90223495f52c30560722,2024-10-10T12:56:30.817000 +CVE-2024-43468,0,1,860662e0ec5738d977b6b5b40485fd533aa5f310df9379be52abde8b90843616,2024-10-10T12:56:30.817000 CVE-2024-43469,0,0,e36b9f8f055a7485db37cb8b3b3c3e478802be4653464a62886fa61cd048c55e,2024-09-17T16:05:54.650000 CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000 CVE-2024-43470,0,0,fe528548c21195498b66ceb7663311572a15469603d70a62099c3f6f55f69948,2024-09-17T17:35:02.157000 @@ -259747,11 +259751,11 @@ CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69 CVE-2024-43480,0,0,082909a3b58d266f11205389eef04cec75ad90be250bb009c9909fcf6c15f589,2024-10-17T21:14:20.777000 CVE-2024-43481,0,0,fa0a86aff51fa534acc1bf04e9514a8b9ae5e4b98d0edc7dae95695ec2e5df10,2024-10-16T21:34:19.840000 CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000 -CVE-2024-43483,0,0,a203f8e312e9e65d989c16262e1ab330707839bf3219ea38ec79e790d77dfd81,2024-10-10T12:56:30.817000 -CVE-2024-43484,0,0,dc5ab4eccb00bd13e6aff096efe58f743e9ff10113c77bca3a6931c756d701ee,2024-10-10T12:56:30.817000 -CVE-2024-43485,0,0,0ee1d54dd3356f7a60eb276dc3857b2eecbbf2e7dc19e187ce147a3c899cbcd4,2024-10-10T12:56:30.817000 +CVE-2024-43483,0,1,1d7db9c5e69dcdca637dfe316d79600af52269047705da1f16bf4044dcdc7aad,2024-10-10T12:56:30.817000 +CVE-2024-43484,0,1,05b3769755aefb3d20c2bb57cfc82a5ceb5d643ad8398f399763e63011e3167f,2024-10-10T12:56:30.817000 +CVE-2024-43485,0,1,29444328f72abd94db2e2d7fb1ffd23577a03c304effb01c158d7c0fc0ea4e2a,2024-10-10T12:56:30.817000 CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000 -CVE-2024-43488,0,0,63512f10e091aa99654a79798f793d1e5206e4391a750986c0f054ff87bb5912,2024-10-10T12:56:30.817000 +CVE-2024-43488,0,1,77f6f6423bdd8555de92dc96aa2c0828d81550946d3c9fa13293b1d31c3b2806,2024-10-10T12:56:30.817000 CVE-2024-43489,0,0,9f3663a5117643ca66490ff50d07401aac7a21947903cd82d777468b0669d10d,2024-09-23T17:33:25.633000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 CVE-2024-43491,0,0,d198019651bd96853897866c0609cb57460e36f90bdbdfaf53a9951b0099ab32,2024-09-26T01:00:01.267000 @@ -259764,7 +259768,7 @@ CVE-2024-43500,0,0,78bdbde8586a4aeadf73d960935866ca71ecb415ed1914c17c331c1e31d9d CVE-2024-43501,0,0,3dab9521c0cc7c6361671a7526673e1c684c3d41e5a05cbd155304b95f78c3a9,2024-10-17T21:06:07.377000 CVE-2024-43502,0,0,a97c3292db824bc02479152a24f624a8cb599b16a484bd7d3fb33b2df58be75e,2024-10-17T20:58:37.107000 CVE-2024-43503,0,0,e91430a1a892e4dd630a8e4e880ef8553de96ce6afb7d015e24a27e9b76eb12f,2024-10-17T20:19:17.793000 -CVE-2024-43504,0,0,0486daaa5f1c7f39f1581058aeec52a262c75145c123a16feba1f1dc69520843,2024-10-10T12:56:30.817000 +CVE-2024-43504,0,1,ceb0125b1b0b97c4e6df05f16658ceb4c5d22dd6834de849222c2c30128b3a9c,2024-10-10T12:56:30.817000 CVE-2024-43505,0,0,eaf2d519e99ba8b127c6f0f1c26b3a86c9026401d2e104751b90d31de1306225,2024-10-17T18:16:50.360000 CVE-2024-43506,0,0,7abef514a183832e9d9245fa295e5ffdc4fc43590e41a40ef0f8a1798deb96ae,2024-10-17T20:19:06.707000 CVE-2024-43508,0,0,7f0c7bbb0a631f3161a1c90ecea6dcc2fbe1f8b2af920e1298d39f4bdb13b3e9,2024-10-17T20:18:55.517000 @@ -260212,9 +260216,9 @@ CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea CVE-2024-44112,0,0,0b8bf5761fae1061c83dd7332f5b3027481f791877934ad1d55322c5110d025b,2024-09-16T14:19:24.917000 CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000 CVE-2024-44114,0,0,e71ec68d461cf2cf2e20a4b8b8ef302465dd6c421d7e2af13fcf9594cce3daf1,2024-09-16T14:09:10.170000 -CVE-2024-44115,0,0,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000 -CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000 -CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000 +CVE-2024-44115,0,1,d84fae05a6712dddd87cc316adac1dfa053d6e65bd4621d5f3163024d845e7e4,2024-09-10T12:09:50.377000 +CVE-2024-44116,0,1,f539024555f2c30aff387b07786f96ec82aa197562db4318d2a4d0edb7b5099e,2024-09-10T12:09:50.377000 +CVE-2024-44117,0,1,e1e7d2c07b8cb4271ea5948f1fafb7d04df2168a6fe40662a14c8cff93dd2ef2,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 @@ -260615,8 +260619,8 @@ CVE-2024-45060,0,0,83a57138238cb06a814cf1f01df1fffbe4a9e82af20e4c1164e77ac214e2d CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 CVE-2024-45066,0,0,a454e9ceebd31b55929c2c0a2d42869872cfc6fb29fa46b222f3049d82b952e2,2024-10-01T16:18:10.680000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 -CVE-2024-45071,0,0,9a6dffd34b42f2030e358f6dd7ad9f1d94d4f005e3072722a3cb42e347224645,2024-10-18T12:53:04.627000 -CVE-2024-45072,0,0,7943b785a2da7e5438439da737bde75b75b32fd8ba8a4ba9eaba4055755b341c,2024-10-18T12:53:04.627000 +CVE-2024-45071,0,1,355d81a286ddacf71570f64464f10f9619d3a172a5caa5f85f897fc410f779f4,2024-10-18T12:53:04.627000 +CVE-2024-45072,0,1,1a7a9031c5d4a02a438d8ed55b4c60cd0a0e85ca284597bf79c988e1c3eb181e,2024-10-18T12:53:04.627000 CVE-2024-45073,0,0,e6a4e9e5d55d10a2984ecf959bd3646673680e37d22c364c1249e301fdb07f55,2024-10-04T13:51:25.567000 CVE-2024-45074,0,0,410d152e2b1ce535bb792f747dab438d63c99a6f6d04953bcc95f60bfd46ac78,2024-09-06T16:45:32.767000 CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef578,2024-09-06T16:45:12.980000 @@ -260773,7 +260777,7 @@ CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91 CVE-2024-45282,0,0,b4d5f6cb555bc9da0672beb58aff1d2b216f5435ade907efa8bebd45466e7d96,2024-10-10T12:57:21.987000 CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000 CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000 -CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000 +CVE-2024-45285,0,1,b2db186183a77f57502b548a09c0878cfe427bf8d75e893164614e4df391cff9,2024-09-10T12:09:50.377000 CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 @@ -261010,7 +261014,7 @@ CVE-2024-45740,0,0,8b02d100709243adc748f8c84eb726ce6016bbe097fb330a6746d5f395d8d CVE-2024-45741,0,0,5fb66fbe9131727c07c0f287ec2e0ff4ce8fce9ab201d92c3cc4c526db45ceaa,2024-10-17T13:12:54.180000 CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000 CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000 -CVE-2024-45746,0,0,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000 +CVE-2024-45746,0,1,7abeeb28473d4d90b0f40fa029a9f40cc62f9f19130bf135cc7a0a985dde62f8,2024-10-11T21:36:34.350000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 @@ -261035,8 +261039,8 @@ CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac17822 CVE-2024-45790,0,0,339d5c59c4b08184225ef02e77057a5607db1e407fbacc8325ce6de4811d4a59,2024-09-18T18:38:04.393000 CVE-2024-45792,0,0,5abb7de999f910eaa61796ecbea33f574a65653e2aa062ee4c5c2e229e356bd5,2024-10-04T13:51:25.567000 CVE-2024-45793,0,0,9df195d476b9f18fe89dd15d9de75cbf87671a956c83113b39ce1c0cbc87094f,2024-09-26T13:32:55.343000 -CVE-2024-45795,0,0,277cb478be920cf4f8c0f9ff7efe876bbe4db3988f1d35642c134b9ecd7e3f4d,2024-10-18T12:53:04.627000 -CVE-2024-45796,0,0,e89641bda5fbfe60afedf446c3403f37050dd92b2fe8e122c9341b437f687815,2024-10-18T12:53:04.627000 +CVE-2024-45795,0,1,c1bd33c69370bfc3174f65c1154b983118d899549e1ce3dee889f29c5f67a686,2024-10-18T12:53:04.627000 +CVE-2024-45796,0,1,ade6c3857a009b28e5574c001ca5fa1fafea418efa113c8315c3d8f74829efbb,2024-10-18T12:53:04.627000 CVE-2024-45797,0,0,049f9559c334598f19954ea514f0547d1d0f8c6b3863a15a6b9d40d7227d9224,2024-10-18T12:53:04.627000 CVE-2024-45798,0,0,36d6c14bd6da02b6f563e24f34a8e0ae70f5e9226b87bf40201ee0b5fcb96dec,2024-09-20T12:30:51.220000 CVE-2024-45799,0,0,57236f37d51cb52dc4abff4e8ae9968f58089f5668de4fddcdb24ddcded04f03,2024-09-20T12:31:20.110000 @@ -261069,7 +261073,7 @@ CVE-2024-45836,0,0,5a0939e240a8e3b241f5dc3c6e0f8a5a968ea3fe595864ad2efc4f2e304ed CVE-2024-45838,0,0,dfe4f9a1d2e726c4de1a4a47b1b23afb3202e549abc3544a5217222f7244203e,2024-10-17T17:15:12.220000 CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000 CVE-2024-45843,0,0,d277f4e7f1b7f77ab48f44241b10d59e0715a005bfff8db99caa28f9596ebe66,2024-09-26T18:42:26.697000 -CVE-2024-45844,0,0,8756c968ff8f0bb6a86257c829babb1d50e6e9cc867a1087f28649f0c072cbd5,2024-10-16T16:38:14.557000 +CVE-2024-45844,0,1,3334bd3b9b2392aa2d0f5ee03ade6a34548c7982b5d5e379e9e9a74a74118d02,2024-10-16T16:38:14.557000 CVE-2024-45845,0,0,b549a9e321160df47bcb67d5d4737d4567fe304513c57d25b052b060dcd0ae25,2024-09-12T20:15:05.273000 CVE-2024-45846,0,0,782f0b5f63081997ef94c1cb8ba21c320f06f7c0fb7ff9d780e670296be45516,2024-09-16T17:30:06.747000 CVE-2024-45847,0,0,9f95d0a04a61f9456f0fb197ef2c92a68bfb8a1719c90da8845bc4b8201dc12e,2024-09-16T17:31:04.850000 @@ -261571,12 +261575,12 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 -CVE-2024-46897,0,0,2a6c3f95cfcb0b32e82de00bef67f1ceb1746bdd0d3211c89edff06da9d72b65,2024-10-18T12:52:33.507000 +CVE-2024-46897,0,1,bef47ab853ef7bc7dc5f5b92f2da0105b1d3bf070bcdb49e6d84896c515fe0cd,2024-10-18T12:52:33.507000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 -CVE-2024-4690,0,0,8eb966e7da158512dac8730a855a36292973d8f996e8b4083d5812fd6f544439,2024-10-18T12:53:04.627000 +CVE-2024-4690,0,1,7f24c140857f6a310e16ff2f6fd3053c5b1a11c3fc0e796c7c28a72a379d3c28,2024-10-18T12:53:04.627000 CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000 CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000 -CVE-2024-4692,0,0,8eff7521b178b42a5db567195937d3c2fd3aaa1433f28da61b2714437c8f6b91,2024-10-18T12:53:04.627000 +CVE-2024-4692,0,1,b7b9a74e93f72916c98746ffb2327ed4f4b5e3bc24154a272818fa6657f1a490,2024-10-18T12:53:04.627000 CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000 CVE-2024-46934,0,0,39cd5d62e62d306b30cc42f4b07a71f98f69814db0958da38caca7a2aa0c372d,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,666c6a587a73311e054ad4d061f64579544880375cf82da7a9fb41d79c96b125,2024-09-26T17:39:33.123000 @@ -261682,7 +261686,7 @@ CVE-2024-47130,0,0,9e52b34ecc84aeecf5485cad45360e89ca586e91e062db722158986b68611 CVE-2024-47134,0,0,c469be51a68158c099c563ecb132d768058c9b0b7de566d173182963980dd322,2024-10-16T13:50:32.607000 CVE-2024-47135,0,0,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 CVE-2024-47136,0,0,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 -CVE-2024-47139,0,0,b7bb30ffbceae5e996b6f4d3c3d75cd4102d24f6c8a1eec4d11e88e1f2eb2ddf,2024-10-16T16:38:14.557000 +CVE-2024-47139,0,1,0f452582d50349cfcaf670d7aa9a268535f2e93bfbde13d87a7977ed414d8f97,2024-10-16T16:38:14.557000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 @@ -261713,8 +261717,8 @@ CVE-2024-47182,0,0,e5cdb75305d71a5fc3653b4e9f8414538656f5f17a6a2cce9e83d34199d18 CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276da67,2024-10-07T17:48:28.117000 CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000 CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 -CVE-2024-47187,0,0,e63561da77cd10fd8afade527df9fc9e05b27322e00e12bc3fe44e00592b51bb,2024-10-18T12:53:04.627000 -CVE-2024-47188,0,0,50a8d5f2a8bf42ebf2938618f00d6ca5b8da00d037eab9a7a01da2b464854dcd,2024-10-18T12:53:04.627000 +CVE-2024-47187,0,1,d8854507a527fb8c4265133fb81ace80865ddf113c07ef5aa0872aa706f3c75d,2024-10-18T12:53:04.627000 +CVE-2024-47188,0,1,dfa61399ad0e0aec42523d160d88f7c1cf41a75c10c15fb404c3256433a27054,2024-10-18T12:53:04.627000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 CVE-2024-47194,0,0,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000 @@ -261799,7 +261803,7 @@ CVE-2024-47348,0,0,3bc6c881793e0266cf0fa593a08e5c8f8f52f13453391a5ccac45ed88e737 CVE-2024-47349,0,0,6da76508c4a0edbacdd1aadc3d9c5ffadfd8b03541318b01a097fae87e059c7b,2024-10-07T17:47:48.410000 CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000 CVE-2024-47350,0,0,4ec04dd8de1c81002acaaacdfa3f1b4c07e386a17889b06998ea063c2136e635,2024-10-07T17:47:48.410000 -CVE-2024-47351,0,0,0063d6ee6df5f71c2541f0ab0a01757c999422f39be945bebf846709d2919c8e,2024-10-16T16:38:14.557000 +CVE-2024-47351,0,1,d19fe3a1c6b4a20b91df72e979dc66ac4daf8c03a18c13b700c6b34ebf6fecde,2024-10-16T16:38:14.557000 CVE-2024-47352,0,0,45b79099f1ba5aa681217933df202e8d205195991ef3874185e6485b2240d914,2024-10-07T17:47:48.410000 CVE-2024-47353,0,0,d741f1e1b662f00888a036482f543a291b93f9a45bea0fadab05d49a3f134ce7,2024-10-15T12:57:46.880000 CVE-2024-47354,0,0,6134434fa97da25d9165870f5853ccace7086e06da2c04b706195994fa4c1880,2024-10-15T12:58:51.050000 @@ -261896,7 +261900,7 @@ CVE-2024-47508,0,0,429956ab48f11c14bf051f4f1bacba4ac8df38416461ca7db82bee8d071ff CVE-2024-47509,0,0,76ece07115d6fe55eea56c310deff86334b962222c61b334eea857efd424bcd0,2024-10-15T12:58:51.050000 CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000 CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000 -CVE-2024-47522,0,0,d6c93614a20f18412401d7b16d971f12d3cca15d48c0ef13225b9915d5d885f5,2024-10-18T12:53:04.627000 +CVE-2024-47522,0,1,b43b4f5548933c1f99321960f4c5c78047a043c0a59fb40847d66badb9cad37b,2024-10-18T12:53:04.627000 CVE-2024-47523,0,0,22d43e6df5f74e6749ea10e7fe6523466b29bb84b684bbdd4f0562f87b193f88,2024-10-07T19:07:30.287000 CVE-2024-47524,0,0,77296b251ba1494f06bcdfbc6ea161d149e1205d582f48b9fdc9c430ceb9a466,2024-10-04T13:50:43.727000 CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb0cc,2024-10-07T19:08:18.707000 @@ -261957,7 +261961,7 @@ CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000 CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000 CVE-2024-47636,0,0,300b53ad3b56bdfe242daa94b07eff6e5ccd9aa8581554b844321a4f299321e6,2024-10-15T12:58:51.050000 -CVE-2024-47637,0,0,460631ddd78072187a2c1e6ef110da24532ce4fbee078cc7956db8ed1ce3a6e2,2024-10-16T16:38:14.557000 +CVE-2024-47637,0,1,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986af60,2024-10-16T16:38:14.557000 CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 @@ -261965,11 +261969,11 @@ CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000 CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000 CVE-2024-47644,0,0,fd711aaea76127f15b2ba3d3dbc77e4b5102355ce0d5450815f1f781ee51f5f7,2024-10-07T17:47:48.410000 -CVE-2024-47645,0,0,3aaff73fbe6956d83107838291dbbe53b918c97bd51e3a1d1ed49da72e9f9579,2024-10-16T16:38:14.557000 +CVE-2024-47645,0,1,c2c4691f05fe5f6d69a90cf90192633f9c5e008d2df6f31ddfd7ab34edd7c958,2024-10-16T16:38:14.557000 CVE-2024-47646,0,0,01dc941ba058056f80ebe31f50a37207cf5e1478b0e71cd2c82bbad9118a33a9,2024-10-07T17:47:48.410000 CVE-2024-47647,0,0,750a75d1d0089daf3b35f7acd85a584959bc0ef829ba0528ba953f2948970aa5,2024-10-07T17:47:48.410000 CVE-2024-47648,0,0,a27f534f62d175d66d367eaa4d0e9a2adc1f079ffc79c13f5a343d0c9d2859de,2024-10-15T12:58:51.050000 -CVE-2024-47649,0,0,80453337d61d0a575bcb2ba3b5765fe203cbd776dee6977c6945c25121ac26fb,2024-10-16T16:38:14.557000 +CVE-2024-47649,0,1,e512e0a129c0eb95ef63cbe6b00f5bc4bd9a4bb1851f52ead145e6ca40e23b94,2024-10-16T16:38:14.557000 CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000 CVE-2024-47650,0,0,03cd193463056cd00bb497e04d4746a9d06b43100915cce839c17df72217d8de,2024-10-07T17:47:48.410000 CVE-2024-47651,0,0,2a67e121f3a9ddab317c97af10a93f430699735ffe494d2404661e90ec37663c,2024-10-10T21:01:39.413000 @@ -261991,7 +261995,7 @@ CVE-2024-47665,0,0,e8a6fa909a361ab6d7cc78d96e16742c4b3f809215ea5c8834927031949bb CVE-2024-47666,0,0,a5a9f51120f3c9ddd4e33149f72ef447bc4c927097f5851c64b003de19643664,2024-10-10T12:51:56.987000 CVE-2024-47667,0,0,38ec78121e570b51d421eb5ff7db3ba1ac7cdc0e7f949923732012891a8b3d78,2024-10-10T12:51:56.987000 CVE-2024-47668,0,0,e001990644657b5cbf026f76d790a5eb95d1d99bc1acc218664334dad09f5059,2024-10-10T12:51:56.987000 -CVE-2024-47669,0,0,bbce7c909098acabb2c7686f50e22411725b6a0a91e8a4289aadb28a3eb88480,2024-10-10T12:51:56.987000 +CVE-2024-47669,0,1,d3c74651e473e54b2c771d191973d6a5578ab2b7d18d9d43bfaa9bdec83f3cc4,2024-10-10T12:51:56.987000 CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 CVE-2024-47670,0,0,47fba4dee4b00f21dbff6c6decd1bc6ab83cdd30571ca10600e97efb139e20ef,2024-10-17T14:15:13.560000 CVE-2024-47671,0,0,6ed788244a5b1c264869a97a389632df94bcd4e1ed09a4e006408f0739ce7d92,2024-10-17T14:15:13.697000 @@ -262027,7 +262031,7 @@ CVE-2024-47782,0,0,378aebd3accf9c3d67ee33eb38516895e49edcc53cea98d4b8c2ea1a1799f CVE-2024-47789,0,0,5cca8aa9572eb6cd0c059882137f083cb8544427e147bc3f1f0eab6346cef001,2024-10-14T11:15:11.797000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 CVE-2024-47790,0,0,d4701041e3b7826b48d6d13bc4c86004b58b4b8b272120def31051056a8f0260,2024-10-14T11:15:11.930000 -CVE-2024-47793,0,0,2634e004bbe7f6eaec12ea7aebe2771258bff5340889512023f5639548b538ea,2024-10-18T12:52:33.507000 +CVE-2024-47793,0,1,808c4d3b2b8344afda706b9214fe03a600c43998d8782aadca85fadac42e9dfb,2024-10-18T12:52:33.507000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 CVE-2024-47803,0,0,e1d97b5f24ae71b6bd2435048764e12dedac3de98ce838d43be96ca9d7087e5f,2024-10-04T13:50:43.727000 CVE-2024-47804,0,0,a4af3b64d3fcfe309769ac07755d247ecf7636977262b35234365d56289d52aa,2024-10-04T13:50:43.727000 @@ -262129,24 +262133,24 @@ CVE-2024-48022,0,0,b4175bbd9dc213c8eebde24e684b6da643869f3413bffb0c98b51bceac11e CVE-2024-48023,0,0,7606c01748b514c7af5167e4d50730634905faa7a564d1146f302f334279b213,2024-10-18T12:52:33.507000 CVE-2024-48024,0,0,3e5ef650915dc08f1cbeceb47bfcb05ebfb5e05206181fb5517d350fcf3db590,2024-10-18T12:52:33.507000 CVE-2024-48025,0,0,d82726b9469f51ddb2a9df717667577a65353916572c3a972202c2e9b20b9a14,2024-10-18T12:52:33.507000 -CVE-2024-48026,0,0,3c2bb88a55c60e17b5998405c29f47ffbdc9b180f9180ef70c87bbb411385b63,2024-10-16T16:38:14.557000 -CVE-2024-48027,0,0,bf61aef1b4b3ee3680cd0489e8cafb96be0e20eb1a0c26254d11632c0391d4c4,2024-10-16T16:38:14.557000 -CVE-2024-48028,0,0,70e75ead9267ebb77fec716d49af1ac568d9e786fae6ab0fb210d210ad1411a2,2024-10-16T16:38:14.557000 -CVE-2024-48029,0,0,e2057f5a9d399e7f4096e73339b7b91540247933d607ca1f14f26dee8c050343,2024-10-16T16:38:14.557000 +CVE-2024-48026,0,1,5cd107c9d5a362569c01a4f13fb7419c4422decb7956d2547ad36fc89daafd5a,2024-10-16T16:38:14.557000 +CVE-2024-48027,0,1,beb57fce42b62b4e991027bdf55e339f1ae5dde7e8c1189bd8948278301d862f,2024-10-16T16:38:14.557000 +CVE-2024-48028,0,1,bd92aa9e7759ca2340be882eec17e0a534e2f41f46675db9457f6aabc749d5c1,2024-10-16T16:38:14.557000 +CVE-2024-48029,0,1,5d12c2fdbd58afca26225e2083a4187a9988abe6db13dda1d6a77a700c9f8cc7,2024-10-16T16:38:14.557000 CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000 -CVE-2024-48030,0,0,d2093f554efe94949369ea32c1b62693c34dc11165efe9f0ac1376df958a0274,2024-10-16T16:38:14.557000 +CVE-2024-48030,0,1,b3a8aa33b784bf82054fadbbc16c5399b82b1b4a1150cda66c1a1a3be0597622,2024-10-16T16:38:14.557000 CVE-2024-48031,0,0,3ee01e22f269e21a96823bd9bcec36567140403a5082bde6e1597fb6268d179c,2024-10-18T12:52:33.507000 CVE-2024-48032,0,0,92e1368c161f45b5a86e429306c8963eaf241c22633e36f2aca105bc8a933ea6,2024-10-18T12:52:33.507000 CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cddec47,2024-10-15T12:57:46.880000 -CVE-2024-48034,0,0,3c6253bf76357837e82d74b10418d02e10751ff3b719885e87b9afdc07d5b689,2024-10-16T16:38:14.557000 -CVE-2024-48035,0,0,34b65d3473704d69375474d4e446271e1160e956f1c5bcc3256b28f1386c1f65,2024-10-16T16:38:14.557000 +CVE-2024-48034,0,1,a66406ee752af69b89f348feafdbf9b7a9a6f1909f9deb511bf73f2159884dc4,2024-10-16T16:38:14.557000 +CVE-2024-48035,0,1,e68cff1c3b4467623505240b899441f36617f8650c6218b92feb405d25770b55,2024-10-16T16:38:14.557000 CVE-2024-48036,0,0,1335eb269b2e09be86e757e41f1f9eb0f4166fc97d81e03e41272d1b8793a6d0,2024-10-18T12:52:33.507000 CVE-2024-48037,0,0,af7f6d150f03a9ea7d06eae0cb148af2070972458b6f26fc03a935e4b80ee230,2024-10-18T12:52:33.507000 CVE-2024-48038,0,0,c6e31c7f591821e9f6b478f515431fcf0cbc068549b1cf9f8fd564dc7ab1be57,2024-10-18T12:52:33.507000 CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000 CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000 CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000 -CVE-2024-48042,0,0,1d99a07b4cb191da550409fc88c9e5806251fda5dee41ab744024131ce4135b3,2024-10-16T16:38:14.557000 +CVE-2024-48042,0,1,16ddb03b6545634bd517237c4d290ddf5fe66d3a89fdb471199006c76048a6ac,2024-10-16T16:38:14.557000 CVE-2024-48043,0,0,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938ddb4,2024-10-18T12:52:33.507000 CVE-2024-48046,0,0,423091e4b5e8d6a105e8bdc778f5cf951b1df2d4a2635710b325a5130f1d15ea,2024-10-18T12:52:33.507000 CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000 @@ -262184,7 +262188,7 @@ CVE-2024-48251,0,0,d31074b7bd4badb1c138e8ee894c9698881e0c5446022316d3777a7df111e CVE-2024-48253,0,0,4785dec38f248c66fcec1c6a08f99630617849a9c1b186004a9276e2a77e6ad6,2024-10-16T14:27:17.693000 CVE-2024-48255,0,0,8a37573d206d212733144676c7a13f0e1f809dd54f8b31f30b7cb3b84aec7cc0,2024-10-16T14:26:23.287000 CVE-2024-48257,0,0,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f85ee,2024-10-16T14:24:43.237000 -CVE-2024-48259,0,0,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000 +CVE-2024-48259,0,1,05be91466999f287d7c34a7b188d482630d814bc65ce325c3824838e8ad22bcc,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 CVE-2024-48278,0,0,2d230a37c6a5ea93411d7a1b4293f4f461a087e46c8a9a4eaba61f8eeb3339e7,2024-10-16T16:38:43.170000 @@ -262245,7 +262249,7 @@ CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 -CVE-2024-48744,0,0,8e19cb42cde15715851c57e1c66000fdbf20886f6db4ceeb1bd088f8a6da228c,2024-10-16T18:35:07.013000 +CVE-2024-48744,0,1,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-48758,0,0,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 @@ -262349,9 +262353,9 @@ CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 -CVE-2024-49216,0,0,f7822fbf9461c3133fc76f27f463206d627d215af3537c5a6a8de05e31c29804,2024-10-16T16:38:14.557000 +CVE-2024-49216,0,1,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 CVE-2024-49217,0,0,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000 -CVE-2024-49218,0,0,2570ef3627c6053c9f68adc4f61c8aa26caacb3600d9f7588bad30c345e3cf58,2024-10-16T16:38:14.557000 +CVE-2024-49218,0,1,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000 CVE-2024-49219,0,0,09d3d9f1ee1897da8ab96320768337e2ebf5a5a4b1a184a805a8710456b7d1ee,2024-10-18T12:52:33.507000 CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000 CVE-2024-49220,0,0,57952046433432dd8ce12274d4b26b119c0532b2f024dacb0fa79f0239abbb05,2024-10-18T12:52:33.507000 @@ -262359,8 +262363,8 @@ CVE-2024-49221,0,0,923750c677c4e142fd1f1384663b07d08d89e89ab299b2af5eff54307fddf CVE-2024-49223,0,0,0be7b22234ee156e0f2d83dfd91e4e489d5261fae900de72d373a8df8c931b94,2024-10-18T12:52:33.507000 CVE-2024-49224,0,0,0a7a0e5ab11d10e7a081f8b1e8896e83c6c961c8b2a1ed92807e6628891963d7,2024-10-18T12:52:33.507000 CVE-2024-49225,0,0,4c875bf9cbafe8c51011c005dbbc98d24e40cc3ab1cb295ec705278bf1c4f617,2024-10-18T12:52:33.507000 -CVE-2024-49226,0,0,13883343a5a3cf2267fd79d569e3936851ed7f1c26da716189e74a87dd9a1f8e,2024-10-16T16:38:14.557000 -CVE-2024-49227,0,0,665aba79cba032a2afbdf7d35b26aa59e354ac86057ab756add03642768ff246,2024-10-16T16:38:14.557000 +CVE-2024-49226,0,1,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000 +CVE-2024-49227,0,1,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000 CVE-2024-49228,0,0,ffa0093dadad540f50a509499affa5eba7a57259c265416414dea29cec418485,2024-10-18T12:52:33.507000 CVE-2024-49229,0,0,30b75199012dde4362fdef6eb936298f876a9b6a4445d757e9fd5d137e13b1b6,2024-10-18T12:52:33.507000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 @@ -262377,35 +262381,35 @@ CVE-2024-49239,0,0,b31c23ee9bcbe5221f250f9ee9dbd7142d31004ac40cfd09af489acaac19b CVE-2024-4924,0,0,1be75affb45c8b20da2e31570d5662533bb5af7060cf2ef9bdabbaa6aefcbc3f,2024-06-13T18:36:09.013000 CVE-2024-49240,0,0,0c6beaa9afe4b9810f451a38d2b5c5be86ace5a23694510d5782af32543cb95d,2024-10-18T12:52:33.507000 CVE-2024-49241,0,0,6a711d1967ff80385c8163a42d48011e3652f1e3ddaefe48e86bd53703dfc8ee,2024-10-18T12:52:33.507000 -CVE-2024-49242,0,0,f6c2236908df09b243eb5f04b34016a7d391a4bdf5d7976a641bdb9eb344e89e,2024-10-16T16:38:14.557000 +CVE-2024-49242,0,1,586a55fc98220eb3b89355f325d218516b34ca52df3a40b28bc26dfdc1eda854,2024-10-16T16:38:14.557000 CVE-2024-49243,0,0,4b1a7f741e6cf054fab92e99d14eff608dd56e4bfe8460eb4ee0834653621fa1,2024-10-18T12:52:33.507000 CVE-2024-49244,0,0,b48fecbaff1a9b03923440d2dd0ef12c64c8628a3d4ea40c29e741b5ea5e7908,2024-10-18T12:52:33.507000 -CVE-2024-49245,0,0,e6a792f230cfbb73bb79979025c9ba0ce9dace5f1ad8c7e9b1e04054cdece232,2024-10-16T16:38:14.557000 +CVE-2024-49245,0,1,e1bb35202ffa1f933bd0b1ba36b9383d1a9773c1ea82a6674695a238ec231e05,2024-10-16T16:38:14.557000 CVE-2024-49246,0,0,29d95ab5e5ada47ed1ce4c5316c1ed56016d0bd62d5eaa8336ee05aabfec2d48,2024-10-18T12:52:33.507000 -CVE-2024-49247,0,0,3f3ee84a63ca461f2f5448341ea64774f37ef4813adcdc83ba14dcd83630a7a5,2024-10-16T16:38:14.557000 +CVE-2024-49247,0,1,53d4a3018db37a197b470c54ef2b547817388692345ae27d113283d6ff358a44,2024-10-16T16:38:14.557000 CVE-2024-49248,0,0,5faff4bb312391427ded9d8a70538602237b0eda16601aaf8b69a0fc4e882c09,2024-10-18T12:52:33.507000 CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000 -CVE-2024-49251,0,0,480f53c0f15047d305d2699553bcbe81bef3eadd511cf29d56777664b7635b61,2024-10-16T16:38:14.557000 -CVE-2024-49252,0,0,0770a0bcb738f7381f9a45afa3c006b09ea3e02ad7c3ff87420860e96f860b01,2024-10-16T16:38:14.557000 -CVE-2024-49253,0,0,318fd919306033b0ba1af00f1fb24fd093afc62d50b17cdad24b4012b87e229e,2024-10-16T16:38:14.557000 -CVE-2024-49254,0,0,468e6b954543a9c09dbeaa129555d2fef3c67f0cd1fda39a98a776cfe3209bab,2024-10-16T16:38:14.557000 +CVE-2024-49251,0,1,1715499fccdde32ea2c893d31b436444d1bc0be13aed0a2d0465f762db10dd8b,2024-10-16T16:38:14.557000 +CVE-2024-49252,0,1,182fb601bd0f0026d40746462390dd120c29fe4ba3aa7cbbc89f2ffc2d833923,2024-10-16T16:38:14.557000 +CVE-2024-49253,0,1,c1f3ed991f55da6518dd76ba83c95379c82378b9259ca4d054ec768bb2d242ed,2024-10-16T16:38:14.557000 +CVE-2024-49254,0,1,e7ef1c3a159a0774d2ce4796cfca7059e44e389dd0b9b27528b6f5bafeecd9fd,2024-10-16T16:38:14.557000 CVE-2024-49255,0,0,07a531b79dfc3fffbaeeacad16dafd5d0970320fb9cc66893064c6e649bea763,2024-10-18T12:52:33.507000 -CVE-2024-49257,0,0,c746271630a04cc860e90dcc3327f7d3236c3185c4c288f1a83e53501d11c09d,2024-10-16T16:38:14.557000 -CVE-2024-49258,0,0,607145cca293d130fa4daa1388ac2333b0492324dbfe84a2b1fc0b125bf94b24,2024-10-16T16:38:14.557000 +CVE-2024-49257,0,1,da7422c9a82d49c1b889b4945bcf76a282c7aecb33dbd7455a56be9124544fff,2024-10-16T16:38:14.557000 +CVE-2024-49258,0,1,5ce3848e2f711e8c9e6ce82ef4fe0185f7ab55526f88b7c083d75279f019164e,2024-10-16T16:38:14.557000 CVE-2024-49259,0,0,c2aba7e31467c17e32d8186ee6b1c7a465f65ccdcbaf3cabd81e34756cdcdd1d,2024-10-18T12:52:33.507000 CVE-2024-4926,0,0,0d237df43556e4b080e4a7390a685a0eb6e73f0f5564912a819a125e3b5027a7,2024-06-04T19:20:54.033000 -CVE-2024-49260,0,0,f7fbff0e8c687e5cecb849140b580b4536003bd56027a3f942394b9a49504da8,2024-10-16T16:38:14.557000 +CVE-2024-49260,0,1,8e05d5b085f72a55d93d06c86a61451479167616ffce74d06950ff4a5cf37f21,2024-10-16T16:38:14.557000 CVE-2024-49261,0,0,3778426038452d8f4736178a73de5a84167eab3be33c64f5397072da2afe0b75,2024-10-18T12:52:33.507000 CVE-2024-49262,0,0,437b2d1c9a1c92c92007771217d75c42679db853ae4106a3330e1dbcc73f064e,2024-10-18T12:52:33.507000 CVE-2024-49263,0,0,3bcdaf2344eec1d87d5a87ff72cb3cbd030d1cd591944c4aa384451abb43246d,2024-10-18T12:52:33.507000 CVE-2024-49264,0,0,736e21e8114448504cc3d04a1d053b8a2214a75077bcbbb05bd0b709154d2a51,2024-10-18T12:52:33.507000 -CVE-2024-49265,0,0,2cda8a33bc2d03fefdf7c3133030acb05a8e29216eb67c8ab5bbc3492433f6ca,2024-10-16T16:38:14.557000 -CVE-2024-49266,0,0,c5e70b7e770ed5f3df45b9a2a53768df7b374fc1d9d19703902a29c4e17568bc,2024-10-16T16:38:14.557000 -CVE-2024-49267,0,0,4b538f1207d90ff37302c6bbe76796f7901944b13de2b84e82a8e8f808237361,2024-10-16T16:38:14.557000 -CVE-2024-49268,0,0,0fd3b370a3e22a5c2e2b790051009bad50afbb281504212fe91f7bc75fe60dd5,2024-10-16T16:38:14.557000 +CVE-2024-49265,0,1,3d26ceab1a3e9f8de4a672a46a4273a7dda6f152981267a88489b74cc132f95c,2024-10-16T16:38:14.557000 +CVE-2024-49266,0,1,3cf55f8430ef9b1b6e8c7838efab003b2f512318c228f7be3fe9fb1a3140aeb1,2024-10-16T16:38:14.557000 +CVE-2024-49267,0,1,b2b56adbd2f71e2ecb68e3b10ebb5228421c2bfcc6373141506d9727e75f25f9,2024-10-16T16:38:14.557000 +CVE-2024-49268,0,1,8e55027882e89f0cab080b75d56d3c5721f6f46b9ae50eb1c51727bddbf92e0d,2024-10-16T16:38:14.557000 CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000 -CVE-2024-49270,0,0,005f08cde4b6782924e4200040f169e9271a9874c783fd600f7eed89bec64939,2024-10-16T16:38:14.557000 -CVE-2024-49271,0,0,1b6a5992897872a55a65b35d258cee2be874a281a35ad1930932471d7ec23943,2024-10-16T16:38:14.557000 +CVE-2024-49270,0,1,616a2e437b03b1730ae710990d1f9b5d13bcf5a41263b98d33736d5e3831391d,2024-10-16T16:38:14.557000 +CVE-2024-49271,0,1,6fd9d076a620483355861bd31b6d3fba7a6e8c77968d9b9b52f107ebea5c9f8b,2024-10-16T16:38:14.557000 CVE-2024-49276,0,0,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000 CVE-2024-49277,0,0,413e0fb3e700b4ddf1e7bf9c0606cf9c4881f3636c1ad9b858708a2ee8b7a3f5,2024-10-18T12:52:33.507000 CVE-2024-49278,0,0,f5bee9930ffbbfdde604c657853a18e3b9208ed8b4b0cf0c41230a88e43b006c,2024-10-18T12:52:33.507000 @@ -263584,7 +263588,7 @@ CVE-2024-6203,0,0,3b9c553aeaabf6b65504ab651e97d9d81983015dea0894c7aa9459e33da609 CVE-2024-6204,0,0,03d37f06023f0b3304d0d42810d35c838ae110ad51b8135626af35ef3589502f,2024-09-19T15:41:37.263000 CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000 CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000 -CVE-2024-6207,0,0,08bb4d30e77cafa1bbe47d47c0589c64ddb4c025c33c4b431b68c48f4f82f769,2024-10-15T12:57:46.880000 +CVE-2024-6207,0,1,6717075304f5a65da29436540a1da547d648f899e033516b50da48927be13795,2024-10-15T12:57:46.880000 CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000 @@ -263737,7 +263741,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6377,0,0,a4383a12ef7c4e9b6235d084a289049b62e13ce9034f0b68805986655c50a719,2024-08-27T08:15:05.537000 CVE-2024-6378,0,0,7454eef210b98e6b1e597d6be8302018d48792f1f9421573a9f7b1dc13ff197f,2024-08-21T15:53:57.750000 CVE-2024-6379,0,0,a28eade3b1a09164fa7466fcbbaf023824917e2e858c95c995a8e2d79a83a15f,2024-08-27T09:15:03.780000 -CVE-2024-6380,0,0,81562260529f549dc67ba2f33882d014525344c4ba5c4b7a462c579878972eb6,2024-10-16T16:38:14.557000 +CVE-2024-6380,0,1,09f3cb38d0c67d7e5dc9bb4e467f4ce9f14d79a187d0aec62882e33c9ae28cd4,2024-10-16T16:38:14.557000 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 @@ -264022,8 +264026,8 @@ CVE-2024-6722,0,0,fb8aa2f2ca0cae94e615feba9b69d9262c8617acede8a2b74221595d706785 CVE-2024-6723,0,0,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000 CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f22d,2024-08-13T15:35:30.033000 CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000 -CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000 -CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000 +CVE-2024-6726,0,1,621910a16f038707208b9fac8c1b14a6e027bea27425c1a5b6bcbabbd78641b0,2024-07-30T13:33:30.653000 +CVE-2024-6727,0,1,a50264c4016614ca4e3bc7e7cf84ef4e3b966e267308af70051ed4e6ca2f9bfa,2024-07-30T13:33:30.653000 CVE-2024-6728,0,0,89e66778f2b381ea7c063797a9902e44dbd60e43d41df6b9b479954aa8b57128,2024-08-21T18:08:50.630000 CVE-2024-6729,0,0,438e935b071d38757a3034c4a57a4b8df633022c3869f5091a76615478d88f37,2024-08-26T05:15:05.533000 CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000 @@ -265034,8 +265038,8 @@ CVE-2024-7986,0,0,a43751c0931e4929788be7df13e0b692f335646e8ba6bbd66f7625d734a5da CVE-2024-7987,0,0,76927c94eae9954117a932c513da8aebd30f47001e85e588d746e509b6294d24,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,f1ca0f1a43359526a6c9585e72942b31e1455ffa80a01c452c09ecf831a670e6,2024-08-26T18:35:14.617000 CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 -CVE-2024-7993,0,0,57c99793d40ff6094d86dd28d96a6e020afc31bece92fd87ce57ef5f53613adc,2024-10-18T12:53:04.627000 -CVE-2024-7994,0,0,3c66b4f2652e615829fe7657e2b3f479dd4129ca0c3b5fd7ab054f643379ba58,2024-10-18T12:53:04.627000 +CVE-2024-7993,0,1,cbdf33bc2d501acd070768b8a8cf38c2f6cc9875f3af713eaf18ac43b210681c,2024-10-18T12:53:04.627000 +CVE-2024-7994,0,1,864e366ce5a59e3f39b9b6a91884f1978fe6336867846af8953c3f042dce8ddc,2024-10-18T12:53:04.627000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000 @@ -265056,7 +265060,7 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000 CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 -CVE-2024-8040,0,0,79bcf6169bd6439343ffb641dd277d35614af20cfd092a76317356a4e6515db3,2024-10-16T16:38:14.557000 +CVE-2024-8040,0,1,555facc38a09436807ec95eac3c93e796518369d3ae71aba96d567d2bdc81c2f,2024-10-16T16:38:14.557000 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000 CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000 @@ -265069,7 +265073,7 @@ CVE-2024-8051,0,0,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934 CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000 CVE-2024-8054,0,0,f7372d07d80e2782b99a1ec78381d10ed3eddb2361d69efd0f5544951feb686d,2024-09-27T21:29:57.607000 CVE-2024-8056,0,0,7d94e922f5f6064358baece439e000bb5b536e03070693d567d210e7b17a441d,2024-09-27T21:29:42.600000 -CVE-2024-8059,0,0,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000 +CVE-2024-8059,0,1,482c2d88bed6d2c3d18d0eb9b4a25df0984892184060aaaf02ca55bcd3858567,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8067,0,0,21c0729ad9dc772677b9fbf75bb24db3bcf4512001a88b1eef9d39bf31f69153,2024-09-26T13:32:02.803000 CVE-2024-8070,0,0,fe9b454067f74b13c9d22e1bfea14cc77320169fffe5e56dce182517c870c1a6,2024-10-15T12:57:46.880000 @@ -265222,10 +265226,10 @@ CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a37 CVE-2024-8275,0,0,51e1ea7caef25d27b6b41142c09640cebec413599e9a871eb48577f39eda902b,2024-10-02T19:14:54.870000 CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000 CVE-2024-8277,0,0,82bcf1542db43e00d98392122dd79a27dbe1d8e968a985fda92afe2ac464709c,2024-09-26T14:39:20.653000 -CVE-2024-8278,0,0,fc32e2167ccf88370e539f3d055e0ff107942d544d0900ce5dc32eec47fdcd63,2024-09-14T11:47:14.677000 -CVE-2024-8279,0,0,a7de1f6bcd7acd612433087dd62d700c55c2713edbe09e73822c3aefec563e44,2024-09-14T11:47:14.677000 -CVE-2024-8280,0,0,ee8246d9e12854e999c4fc7d4ea10afbd0920ea1f9472e1c543327a9ae0730e7,2024-09-14T11:47:14.677000 -CVE-2024-8281,0,0,6e64aec5696815efe009b246052ca974dfd6e9415a9b5d9826067281cc5ba11d,2024-09-14T11:47:14.677000 +CVE-2024-8278,0,1,e69975b53ce0ef39053ad939a119f0e4e8c9b3aebcdb78285cbb0702908d7feb,2024-09-14T11:47:14.677000 +CVE-2024-8279,0,1,01f644a1ae1f0a4ef44a2343cafe192879360307caeedc9a7c313857131734eb,2024-09-14T11:47:14.677000 +CVE-2024-8280,0,1,88b7153bea0bbf7f9a34ad509910f9c44d6c8ab2e8341e10d53e75fc2169bf02,2024-09-14T11:47:14.677000 +CVE-2024-8281,0,1,725f2625da91213836ca1bceafc918ece44002acd0aff7672f92c90331483080,2024-09-14T11:47:14.677000 CVE-2024-8282,0,0,a2856bd38a75dc608ab77f534123da02823e646362412e35675868041564bc32,2024-10-07T20:11:24.890000 CVE-2024-8283,0,0,2d2a9978130a53c84b94f1aa7904ec768bd6494ba0f0dc2730b572cdd6339438,2024-10-07T15:49:22.043000 CVE-2024-8285,0,0,0dc7b9ae09e1cf8976e262dd1fffb8b648c33c9cca4195663b4b85ea560fc0be,2024-10-01T13:15:02.670000 @@ -265506,7 +265510,7 @@ CVE-2024-8687,0,0,acaaec34cb53b28ae166b73ca3b7beb76d1056832fd2f401fa104cfe417cf0 CVE-2024-8688,0,0,029257a651f738e9f27877382144b226fa4512857c7fc61efd2c2ae6b87c68fd,2024-10-03T00:19:32.047000 CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000 CVE-2024-8690,0,0,eb968451e4e62166b7c59305af1ec818435c2d81bb22259d4694cffd92b8d03d,2024-10-15T18:38:32.260000 -CVE-2024-8691,0,0,86d7d3704e755eef3c9566ae64e8305e022b79dd799f629a7e9e305c606abbfd,2024-10-17T15:25:45.397000 +CVE-2024-8691,0,1,4b921fe47bd264b13b18909fffb00864d4f0fe9b3461261cdf5f017a2536514c,2024-10-17T15:25:45.397000 CVE-2024-8692,0,0,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000 CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000 CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000 @@ -265881,7 +265885,7 @@ CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c37 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 CVE-2024-9347,0,0,131d08ad666b2357ecd19b3118dbe82da22a41e64a4f3a4f02af3909537af845,2024-10-18T12:53:04.627000 -CVE-2024-9348,0,0,17fd5c434e6353e0ea23dd1fe0baa28897cc37ae9e8a1286efead4e96834cb80,2024-10-16T16:38:14.557000 +CVE-2024-9348,0,1,5306ee8a501834848c65c39ccde679f8538adcf6268b8dd12eab61572d72a494,2024-10-16T16:38:14.557000 CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 CVE-2024-9350,0,0,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84f6,2024-10-18T12:52:33.507000 CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 @@ -266060,7 +266064,7 @@ CVE-2024-9787,0,0,36006c5683023b0a550c9d990c27b32cd453733ae048071aa69db8f35e1b00 CVE-2024-9788,0,0,bb47e288d5e5460abea3a374f5e4cdb4b6cc616a2e520b5bc3d247976f89342a,2024-10-17T14:26:12.120000 CVE-2024-9789,0,0,80ea14a4b839222acb6cf5cbf05a0b4bf6c9c7a6ca9fbe680be5063151c1bd7e,2024-10-17T14:26:19.523000 CVE-2024-9790,0,0,5ca7d35e0149465887d771cb28bd9e6c74a2fa674a3dd1abd82977367f4ff4f8,2024-10-17T14:26:30.160000 -CVE-2024-9792,0,0,d68aca032770f3ab555b174d9c980d2b9c8b7e1f4d87418bf0969c937a5a85c0,2024-10-15T12:58:51.050000 +CVE-2024-9792,0,1,cd6fe10744f9cbe2461113b62ef116c322a51ea217f1854f369f223dd8d8050c,2024-10-15T12:58:51.050000 CVE-2024-9793,0,0,0f71c88bb614b0080f91ce00289e6f60c39b1d1486897ebc6c960c3d831b128b,2024-10-15T12:58:51.050000 CVE-2024-9794,0,0,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000 CVE-2024-9796,0,0,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000 @@ -266089,7 +266093,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 -CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 +CVE-2024-9837,0,1,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 CVE-2024-9848,0,0,c9c868f8b4dfcb8a16c343ca24b48f00207606de4438d4f715e98402b24e1592,2024-10-18T12:52:33.507000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000 @@ -266105,7 +266109,7 @@ CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c1843 CVE-2024-9889,0,0,0b3b7545dde906fe90387e12e3b83b4a894a23cbd921465fbc28a4b03f9f9d4f,2024-10-19T07:15:03.073000 CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1fcc,2024-10-16T16:38:14.557000 CVE-2024-9892,0,0,584f5c7c0c5a775fc15fb3ba6088d5cb7abd48140a1f2b1bd6d2a1fd7b17f015,2024-10-18T12:52:33.507000 -CVE-2024-9893,0,0,426d02de035749f6abb2956fee210a61cbcd97da25fe8818e92240a83b0a6b07,2024-10-16T16:38:14.557000 +CVE-2024-9893,0,1,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000 CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000 CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000 CVE-2024-9897,0,0,064099574bceac97f000a2cb328480b18db5cd3caebd8f6bfb5719dc89a2c154,2024-10-19T10:15:05.420000 @@ -266155,7 +266159,7 @@ CVE-2024-9968,0,0,27c4c5baf3e90e0fa17da71c9c0ad07121664aa1282c8fc373fe41ccee1aa0 CVE-2024-9969,0,0,19b96a796919a02a1f37b80d1518be802de7d87a5daeb912cc35f95bde681abb,2024-10-19T00:51:02.383000 CVE-2024-9970,0,0,c1594975fad63b39e2f1f96006d973fcf8b9604faca5774b3f8bf4c0518291c8,2024-10-17T20:33:59.873000 CVE-2024-9971,0,0,e054f71a7ffcc09fb749c3ffbd89d530a69537a1562ea70f78ea5955f5ebd8c7,2024-10-17T20:34:30.257000 -CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000 +CVE-2024-9972,0,1,08d039a557d599e4a77b0ad8849705d7a103109d6e21cb051e6e78e0afa6dcde,2024-10-15T12:57:46.880000 CVE-2024-9973,0,0,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000 CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000 CVE-2024-9975,0,0,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000 @@ -266168,4 +266172,4 @@ CVE-2024-9982,0,0,d639d3774aff1cdbd050ebd7eeccc640e7241022f36e4718db9aa208221201 CVE-2024-9983,0,0,05b40e9cfe77e2a0c57e66e13edd76f3cb7232b22c3913645dde67dce8485932,2024-10-16T22:03:42.020000 CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539a9,2024-10-16T22:03:23.407000 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 -CVE-2024-9986,0,0,6b86931538705e782c94eb63f8638f9fce60876b162654bbbd5048890b6ec551,2024-10-16T16:38:43.170000 +CVE-2024-9986,0,1,81bb0bc1241c76a4c7d183557b7c4426ae7d356c2fe71d5a28d1ab430e0b90ba,2024-10-16T16:38:43.170000