diff --git a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json index cf4eba25d65..cbd0e7b5596 100644 --- a/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json +++ b/CVE-2018/CVE-2018-01xx/CVE-2018-0180.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0180", "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-03-28T22:29:01.547", - "lastModified": "2019-10-09T23:31:24.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-24T13:50:31.710", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", @@ -20,13 +20,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -100,18 +100,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:15.3\\(0.0.19\\)sy:*:*:*:*:*:*:*", - "matchCriteriaId": "8894616C-E328-4167-A2A1-2210E7B18704" + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(00.00.19\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "A614606E-0EA1-4C93-B8BE-4F65147B6C5D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)ia1.100:*:*:*:*:*:*:*", - "matchCriteriaId": "DA528E9B-6704-4563-B420-41E4AB064036" + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(01\\)ia001.100:*:*:*:*:*:*:*", + "matchCriteriaId": "6682113B-03CA-4900-83BF-BB23F33B28DA" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1.22\\)t:*:*:*:*:*:*:*", - "matchCriteriaId": "22294202-CAF2-479D-B606-CA2207A22BC6" + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(01.22\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "A41D3D8B-8A14-4A35-BFE2-AA2379DD2A3A" } ] }, @@ -121,63 +121,1520 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:1921:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B186AC90-AB50-487E-843C-354AED2A7939" + "criteria": "cpe:2.3:h:cisco:3925_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83C34A26-E6E2-4651-822D-74F642D7A8FE" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:1941:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4B8367AC-EA3C-4D89-8387-9D3DF5D9552B" + "criteria": "cpe:2.3:h:cisco:3925e_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "096C701F-8203-41FB-82DC-BB5C9263A292" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:1941w:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B4AF16CC-AB6C-4B25-BB52-143E0952E44C" + "criteria": "cpe:2.3:h:cisco:3945_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94332BC5-DD19-4422-B4E3-21D6E2BCA367" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:2901:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D946FEE4-57E9-44DF-92B1-F4753B3AC317" + "criteria": "cpe:2.3:h:cisco:3945e_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB8466AE-B885-40BA-ADB8-C1058D95129C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(00.00.19\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "A614606E-0EA1-4C93-B8BE-4F65147B6C5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(03\\)m4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2BDB4F33-0978-4950-922C-28B9FB6DDF55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4856E07-B3C2-4674-9584-866F6AF643B2" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:2911:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6A4A0846-F0D2-4EBA-89A8-827E23FC49B7" + "criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:2921:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62A88048-98BC-4803-AD86-F43A100141FA" + "criteria": "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F77CD6A-83DA-4F31-A128-AD6DAECD623B" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:2951:-:*:*:*:*:*:*:*", - "matchCriteriaId": "60DDF683-9227-4351-8FB1-10EF41522FB2" + "criteria": "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62564BB8-1282-4597-A645-056298BE7CCB" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:3925:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D51456F-D87C-406C-900B-34ABC2A81625" + "criteria": "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:3925e:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8EA5436A-933D-4975-A8EF-EB2B72D234F5" + "criteria": "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2D2305B-B69E-4F74-A44E-07B3205CE9F7" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:3945:-:*:*:*:*:*:*:*", - "matchCriteriaId": "898464E4-B3B5-4231-A8AA-CA811EC0D974" + "criteria": "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B68B363-3C57-4E95-8B13-0F9B59D551F7" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:3945e:-:*:*:*:*:*:*:*", - "matchCriteriaId": "576DE1E1-F85F-423D-95CE-8B6946A36E58" + "criteria": "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6" }, { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:4451-x:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36B8B210-127D-4006-AED5-90E76EEDED93" + "criteria": "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3F374DC-B9F7-4515-A064-01BB436CA984" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D5E48D7-2266-4649-90A9-62C476AFE6DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99581637-E184-4A02-8313-57C7C31E5479" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3AF3F75-0BD8-4AA6-B696-3624BEE86681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C58CEA6-69F8-4021-98C9-4676C70AB167" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF156D97-7C39-49CF-9938-D9681066FF05" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "871AC0F6-5C01-43A1-8436-7885439BD81F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2147DBF8-B733-4F76-90C5-9D94F1E93625" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9222CA59-F4FD-478D-83C9-566B389140B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03A273EE-41C1-41E9-9002-46F83FC6533F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C90C43-2D7D-43F8-AD7F-421878909AE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445597DA-7EEC-470D-9A71-BC43A9F7DE5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86049773-C88D-4A26-A0D3-D40F3C312AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8A4630-8B21-4994-8EF5-E105593A64E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F799DC02-EB06-458C-8545-A174475FE7A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89FBA68-A8ED-4C5A-916E-A68468F59730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "697BEF89-6D9B-4870-BE85-9090152F3E6E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82225D40-537F-41D2-B1C4-1B7D06466B06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E055F58F-F9FB-4B27-841E-61ECAB5F42B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B832863-E366-46ED-BC35-838762F0CE29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34DAD43-0C95-4830-8078-EFE3E6C0A930" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F5CBF0-7F55-44C0-B321-896BDBA22679" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D381E343-416F-42AF-A780-D330954F238F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B4318C0-0FD0-46B3-8E23-94EC53A34A20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16FC6220-78E1-44A6-A596-6368D3EF7CC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6655851F-58D9-49D9-A56E-8440A7F7BB45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5E2AE67-DED3-4414-A194-386ADB2C8DC7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3920133A-684D-4A9F-B65A-FF4EAE5052E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ED06361-5A68-4656-AEA5-240C290594CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE2514A1-486C-40F7-8746-56E2B973CBE6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91209C16-A620-44A0-9134-8AA456343F29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "917B52DF-4210-4DD6-97EF-8A033497A954" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7F413FB-D4F9-4113-9D67-2956BF1DC30D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE2182E7-C813-4966-A36C-E648A9344299" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33208B25-0CBB-4E31-A892-60B7B5625155" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC03A84F-C8F2-4225-9A00-8FA35368CD57" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51F2A755-556C-4C5E-8622-96D124319AF7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE7401B7-094C-46EB-9869-2F0372E8B26B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C81CC6E3-B989-4730-820E-46734E3E608D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7814FA61-CAF1-46DE-9D84-CEBE6480EA03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EA5EEE3-A084-46B4-84C0-ADFD69800649" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "592F67D5-344B-49AF-A277-1089A40AC2FD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7434059A-25B8-4FAC-A756-6E571348B76E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB2A5355-BF40-437C-8683-A7A81DEE362C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43F4B90E-3499-45D4-864D-18505E2149F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", + "matchCriteriaId": "858FEECF-CC69-4E68-8E8A-674643021964" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5FCCFF-E491-474F-9B86-AB51D8244582" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61007628-A81B-43E0-86DE-1F7DDAD9F1A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B39F250E-6A89-4537-BD31-1FB81734A9A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8904EAF5-25E7-4A6B-8117-1859F913B83B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A369CD35-1242-4556-A83D-BD69CC149CFA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "784A1499-1F33-493D-B433-EB2550C03C19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59A990D6-B748-4AFD-B924-1D19680BD3DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CECFC88D-5480-46E4-BF74-E11A514A8BDD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E54D16A8-0407-41E3-9599-9A6F57E1AA75" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF3818CC-8653-4A9E-A57B-950A15914D6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2A6BC84-91F2-437D-9D2E-F8B3F5966767" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F331F13-5D05-4213-B442-D48D8E22287B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA32EA3F-946D-430D-B00F-939D828DD72C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D239A09C-34D2-4418-B538-03A1080B8479" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C84561E-DD99-4433-9EF2-083F7C300123" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B29871BE-CA7D-4108-B46A-CBD539C9A2B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39CD9189-6524-4157-B90E-FF6A81DE3599" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96269625-CB31-4850-872B-B2C1321B13B6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "426B68A6-3A41-43DB-846F-AEFBA62E221B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA53775A-D3ED-4D34-8338-A384DBEB94E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE7D4522-D6BB-467F-AF5D-4D753A89D524" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C96215F-A300-4B4E-9D3A-C32E484BFC5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C680534-C663-40B0-A4AA-7F292EE60FE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A528EC0-4650-4787-BE52-A588E7E38A31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53898E96-03D6-43A2-AE05-46C62464BD26" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "465917E5-8BF0-4BBB-85A0-DE8F516880C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9FA66D9-E465-406E-A95C-608A1BE34D74" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1456B204-A2A5-4790-A684-7F50D692EC9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD715BDD-7C74-4785-BEDF-75918F6FB37A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CD10664-94D0-48C0-92EF-E8EA66841245" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E988448-36C9-47E0-9356-DA400EB824E3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D067EF9-00DB-4979-B12E-55749059A083" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9FA300A-44B1-44EE-8111-C1296EB0B638" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8598A543-B30B-4BD4-9974-F432FFFDCDD7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48DEBBAD-D28D-4784-BBD8-9FAD1710A919" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A5FC516-6B48-4D77-B26D-FA097AC91D1A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7437E4-5C09-436C-AFBC-F6B6747A4339" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECBC0277-4990-4DE7-AD80-20E8A6F561D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E7DAF69-662B-4999-A6AD-AA528B53EAF7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D28306B1-3DDE-4444-9784-522B3D2163EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9257D187-1F2D-40F4-8C87-78978DB56C3F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25AE251E-E99F-4546-85B0-C57834B040B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C62FFCB9-4253-459B-9298-C252DA9177DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "991CBDFB-6836-4D1F-80A9-14EBCE3F855F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B4C0250-DA0D-4CEE-99F4-C211163C6653" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "005F5347-A5E6-4954-ACAB-E4DF29119724" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C2A8413-DF92-4690-8BC1-A21001BDF76B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "882B8D8F-E154-45C3-BB47-5353167C9776" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A54B4EB4-EB41-4522-B7AB-C30F96099EA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD7BE51-0BA6-4750-B274-A6E33D32B484" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44C3EF8E-DF88-46DC-8E06-B009F346D1D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E87F823-D924-4718-AD81-248A6C619531" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCAC93E0-F982-4E37-866E-43B7BC5AC82E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FC866C9-BB98-4320-9FFA-F0960C560DA6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3AD7495-3DA2-4596-9620-CD36D7C561AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492F3F8-4188-41E4-9A84-5E30C4AC3378" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "718F2FDC-9EA4-4C4C-8821-B15E56AF8101" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC5CB558-BD42-4615-BC31-41CCF25DE5C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E45BCCD0-65BB-431F-B448-221C1595CD92" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33BA722-0680-4074-8D03-41657F8CDCC7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295C46B4-5E9F-4DD8-861B-00BA43923306" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "431570C7-74A1-4F7E-8FD0-690AEF0F823B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5D22E15-E1E8-4115-A55F-5743CA9C5947" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F840171D-CA1C-4E25-BD41-6B871C47BB84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B240B20-CF48-4A72-9653-9D04D59C1391" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74CCD143-3D6E-4880-B275-ECF5B04238C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0D3784F-C572-4A6F-83B9-BCF64D339BC9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E09C466B-CE87-4A57-B40B-88C94BAAF36B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58FF034-8E07-4518-A858-5F16F22217E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "376AD386-373D-4B24-966F-D11F76C9020F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2280CAA3-03F6-4168-8E50-A6B7132A3B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0C1174-C789-4547-9899-F7FCD0905F92" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC366801-655A-403B-ACD9-3BB43802A3C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF5463D0-A8D3-43EC-8CFF-F659A8C84436" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05D4D7E4-B195-46D8-8A6B-6AA4B8357618" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39600E51-4A21-4E5B-9FF9-E7C00AE86646" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E4D5A8-7E4A-44C5-81DC-84712781206D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B13D6D50-D0FA-4527-BED3-52560DDD5253" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "965BF315-D833-4711-97FC-512151113367" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04072C0F-78A2-4D10-87B2-52DC2537BA89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD5C080E-D5C4-47B2-A46C-4EB3051C5221" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41CEBEE0-DA67-4EE5-9BCF-263843053A8F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD262F58-C47F-439E-A9FF-D1C60120D306" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35490BDE-DF21-495E-9F8A-7631FCB32A1F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE9EABE0-5FB0-4277-A389-87732E750B7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E7E8914-7B25-4097-8B22-6928C1F03D5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B207857B-C483-47DF-9FC7-6A05B866BF60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04AB61E9-0148-495E-BD21-64D52DE60A6C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D2C587-E95B-4E74-88CF-5930072258D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74270062-2030-45A0-9C93-C1F3B7C88E8B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F403859-F034-4DD9-9CA5-708EADECB380" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7670A322-31C2-4A8A-86E9-09D63C52E4C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0972076B-5C87-44B3-90EC-4C200B89318A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AED057-2458-4DE0-8D51-ABD766D07F68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19538C03-5FB8-4401-8B21-489C629D7E7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B26D7061-F471-4DF0-A892-ED132958B84A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "033ED443-80E7-4012-9825-07AAC0D44B96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3F3CC6-A349-47B1-B282-B6458683C191" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB24EF21-1C10-48A7-BC68-FFC842A28D12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0625A2-BF14-4552-83D8-AEE0A04EA023" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21AFDC0D-7629-424E-827B-C8A8767324C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A263CFF2-A659-405B-90EA-51E49B25C6D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFBD449-217D-4569-99F7-D56B853A3E07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ED668FC-D1A5-4175-A234-23760BA6E788" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D650C48-9241-42F7-87A9-20733329489A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ED16A65-9AFF-4825-95D1-162FBA0F566D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82D345E7-8208-41AC-B11A-4425D29E98A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E386D461-F1C1-4970-B056-D6119E74D449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99F3A466-F665-4132-ABC4-2DFC0A7E2B55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3395168-FF2E-4CB6-AABE-5E36DEB241CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226F985C-4669-4D0A-9DB4-CB1465B37B02" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B736A43-6F4E-40A9-84E4-D9E251489234" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E99CA124-7D86-463B-A31E-A7836B7493E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E014B028-8DD9-428C-B705-8F428F145932" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6C44229-A842-49B2-AD3E-79C83DB63EBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5306E847-C718-4C83-9C97-8AB498DC4A88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18287CEF-B574-4498-A256-567CA6E6CA7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E9AAA2C-495E-4FD1-9050-264FDC25254B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5713043E-2535-4540-B3EF-41FAC40BECE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67701D77-8B03-446A-AE22-4B8CCCD6F029" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "831A2390-7170-4FC0-A95E-3DAB1791017D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F788CBC4-782F-4A43-AC80-4AEF1C43A22D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "493989DC-8F1B-45C9-AD11-38B97B958C9C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F168FB20-0C44-4A5B-910A-04B9517545C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "737F22AB-C5A9-4A18-BA3D-38A222491397" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5508320-8318-41A8-8026-4A61907C1CD7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAD337D8-8C72-4025-A8C3-E63598DE7BDB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "176ACF88-6112-4179-8492-50C50577B300" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D07FC868-0B38-4F24-BA40-87966FF80AB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C19A801D-02D7-40B0-88E8-FE7BA8630E60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4035136-CC10-4DDD-92AF-9DC41D19CF8A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9ED0E5-CB20-4106-9CF2-8EB587B33543" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B0E620C-8E09-4F7C-A326-26013173B993" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF93F1C8-669F-4ECB-8D81-ECDA7B550175" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0BA345-B7D7-4975-9199-4DC7875BBFD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19017B10-F630-42CD-ACD2-E817FEF0E7F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04A41A34-58D2-4DBC-ABC9-20A62BC8A838" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA015C4-7163-4FCD-ADE1-D5481B10EACA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5361C70A-C036-4254-9698-BC58F48C465B" } ] } @@ -191,29 +1648,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:15.3\\(0.0.19\\)sy:*:*:*:*:*:*:*", - "matchCriteriaId": "8894616C-E328-4167-A2A1-2210E7B18704" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "87BA352E-4C21-4428-A64B-E0C8B8287791" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", - "versionStartIncluding": "15.4\\(2\\)cg", - "matchCriteriaId": "F40A3CD1-AD12-4612-8386-F1BC2EBD11AF" + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5" }, { "vulnerable": true, @@ -235,6 +1671,7 @@ "url": "http://www.securityfocus.com/bid/103556", "source": "ykramarz@cisco.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2020/CVE-2020-116xx/CVE-2020-11639.json b/CVE-2020/CVE-2020-116xx/CVE-2020-11639.json index 0d60e81bd42..0acc4c74453 100644 --- a/CVE-2020/CVE-2020-116xx/CVE-2020-11639.json +++ b/CVE-2020/CVE-2020-116xx/CVE-2020-11639.json @@ -2,13 +2,17 @@ "id": "CVE-2020-11639", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-07-23T18:15:04.820", - "lastModified": "2024-07-23T18:15:04.820", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker could exploit the vulnerability by\ninjecting garbage data or specially crafted data. Depending on the data injected each process might be\naffected differently. The process could crash or cause communication issues on the affected node, effectively causing a denial-of-service attack. The attacker could tamper with the data transmitted, causing\nthe product to store wrong information or act on wrong data or display wrong information.\n\n\nThis issue affects Advant MOD 300 AdvaBuild: from 3.0 through 3.7 SP2.\n\n\n\n\nFor an attack to be successful, the attacker must have local access to a node in the system and be able to\nstart a specially crafted application that disrupts the communication.\nAn attacker who successfully exploited the vulnerability would be able to manipulate the data in such\nway as allowing reads and writes to the controllers or cause Windows processes in 800xA for MOD 300\nand AdvaBuild to crash." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda aprovechar la vulnerabilidad inyectando datos basura o datos especialmente manipulados. Dependiendo de los datos inyectados, cada proceso puede verse afectado de manera diferente. El proceso podr\u00eda fallar o causar problemas de comunicaci\u00f3n en el nodo afectado, provocando efectivamente un ataque de denegaci\u00f3n de servicio. El atacante podr\u00eda alterar los datos transmitidos, provocando que el producto almacene informaci\u00f3n incorrecta o act\u00fae sobre datos incorrectos o muestre informaci\u00f3n incorrecta. Este problema afecta a Advant MOD 300 AdvaBuild: desde 3.0 hasta 3.7 SP2. Para que un ataque tenga \u00e9xito, el atacante debe tener acceso local a un nodo del sistema y poder iniciar una aplicaci\u00f3n especialmente dise\u00f1ada que interrumpa la comunicaci\u00f3n. Un atacante que explotara con \u00e9xito la vulnerabilidad podr\u00eda manipular los datos de tal manera que permitiera lecturas y escrituras en los controladores o provocar que los procesos de Windows en 800xA para MOD 300 y AdvaBuild fallaran." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-116xx/CVE-2020-11640.json b/CVE-2020/CVE-2020-116xx/CVE-2020-11640.json index 2431df141a1..ccb31c465f7 100644 --- a/CVE-2020/CVE-2020-116xx/CVE-2020-11640.json +++ b/CVE-2020/CVE-2020-116xx/CVE-2020-11640.json @@ -2,13 +2,17 @@ "id": "CVE-2020-11640", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-07-23T18:15:05.083", - "lastModified": "2024-07-23T18:15:05.083", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "AdvaBuild uses a command queue to launch certain operations. An attacker who gains access to the\ncommand queue can use it to launch an attack by running any executable on the AdvaBuild node. The\nexecutables that can be run are not limited to AdvaBuild specific executables.\u00a0\n\nImproper Privilege Management vulnerability in ABB Advant MOD 300 AdvaBuild.This issue affects Advant MOD 300 AdvaBuild: from 3.0 through 3.7 SP2." + }, + { + "lang": "es", + "value": "AdvaBuild utiliza una cola de comandos para iniciar determinadas operaciones. Un atacante que obtenga acceso a la cola de comandos puede usarla para lanzar un ataque ejecutando cualquier ejecutable en el nodo AdvaBuild. Los ejecutables que se pueden ejecutar no se limitan a ejecutables espec\u00edficos de AdvaBuild. Vulnerabilidad de gesti\u00f3n de privilegios inadecuada en ABB Advant MOD 300 AdvaBuild. Este problema afecta a Advant MOD 300 AdvaBuild: desde 3.0 hasta 3.7 SP2." } ], "metrics": { diff --git a/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json b/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json index bae0a5a095d..d228160ebd4 100644 --- a/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json +++ b/CVE-2020/CVE-2020-241xx/CVE-2020-24102.json @@ -2,13 +2,17 @@ "id": "CVE-2020-24102", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T18:15:02.967", - "lastModified": "2024-07-22T18:15:02.967", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Punkbuster pbsv.d64 2.351, allows remote attackers to execute arbitrary code." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Directory Traversal en Punkbuster pbsv.d64 2.351, permite a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], "metrics": {}, diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json index c098f930fee..54587d9549e 100644 --- a/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20699", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-02-10T18:15:08.980", - "lastModified": "2023-11-07T03:42:39.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-24T13:48:50.880", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json index 7cad2b5850b..69d903b91d8 100644 --- a/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20700.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20700", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-02-10T18:15:09.033", - "lastModified": "2023-11-07T03:42:39.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-24T13:41:07.373", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json index cf07b45f4cd..6d4bd959be8 100644 --- a/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20701.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20701", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-02-10T18:15:09.087", - "lastModified": "2023-11-07T03:42:39.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-24T13:38:21.353", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json index 9a15b60800e..275cb0de946 100644 --- a/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20703.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20703", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-02-10T18:15:09.197", - "lastModified": "2023-11-07T03:42:40.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-24T13:35:37.437", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", @@ -26,19 +26,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.4, + "baseScore": 8.0, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 2.1, "impactScore": 5.9 }, { diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json index 0543747732a..29718f65cb8 100644 --- a/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20708.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20708", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-02-10T18:15:09.467", - "lastModified": "2023-11-07T03:42:41.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-24T13:34:53.930", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", @@ -26,19 +26,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.0, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.1, "impactScore": 5.9 }, { diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32466.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32466.json index 5440f612f3a..381718e63f5 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32466.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32466.json @@ -2,13 +2,17 @@ "id": "CVE-2023-32466", "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-24T07:15:01.953", - "lastModified": "2024-07-24T07:15:01.953", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Edge Gateway BIOS, versions 3200 and 5200, contains an out-of-bounds write vulnerability. A local authenticated malicious user with high privileges could potentially exploit this vulnerability leading to exposure of some UEFI code, leading to arbitrary code execution or escalation of privilege." + }, + { + "lang": "es", + "value": " El BIOS de Dell Edge Gateway, versiones 3200 y 5200, contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un usuario malicioso local autenticado con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la exposici\u00f3n de alg\u00fan c\u00f3digo UEFI, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario o una escalada de privilegios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32471.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32471.json index 15c55d29dcb..31afdcad664 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32471.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32471.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32471", "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-24T08:15:02.393", - "lastModified": "2024-07-24T08:15:02.393", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json index 8162dc0263e..785bf7d526f 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48362.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48362", "sourceIdentifier": "security@apache.org", "published": "2024-07-24T08:15:02.627", - "lastModified": "2024-07-24T08:15:02.627", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json index a8a6406ac5f..edb5483aa5e 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0760.json @@ -2,13 +2,17 @@ "id": "CVE-2024-0760", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:03.520", - "lastModified": "2024-07-23T16:15:04.620", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. \nThis issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1." + }, + { + "lang": "es", + "value": "Un cliente malintencionado puede enviar muchos mensajes DNS a trav\u00e9s de TCP, lo que podr\u00eda provocar que el servidor se vuelva inestable mientras el ataque est\u00e1 en curso. El servidor puede recuperarse una vez que cese el ataque. El uso de ACL no mitigar\u00e1 el ataque. Este problema afecta a las versiones 9.18.1 a 9.18.27, 9.19.0 a 9.19.24 y 9.18.11-S1 a 9.18.27-S1 de BIND 9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0981.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0981.json index 221cecf6711..bcc922ad7f3 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0981.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0981.json @@ -2,13 +2,17 @@ "id": "CVE-2024-0981", "sourceIdentifier": "psirt@okta.com", "published": "2024-07-23T21:15:12.773", - "lastModified": "2024-07-23T21:15:12.773", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Okta Browser Plugin versions 6.5.0 through 6.31.0 (Chrome/Edge/Firefox/Safari) are vulnerable to cross-site scripting. This issue occurs when the plugin prompts the user to save these credentials within Okta Personal. A fix was implemented to properly escape these fields, addressing the vulnerability. Importantly, if Okta Personal is not added to the plugin to enable multi-account view, the Workforce Identity Cloud plugin is not affected by this issue. The vulnerability is fixed in Okta Browser Plugin version 6.32.0 for Chrome/Edge/Safari/Firefox." + }, + { + "lang": "es", + "value": "Las versiones 6.5.0 a 6.31.0 de Okta Browser Plugin (Chrome/Edge/Firefox/Safari) son vulnerables a Cross Site Scripting. Este problema ocurre cuando el complemento solicita al usuario que guarde estas credenciales en Okta Personal. Se implement\u00f3 una soluci\u00f3n para escapar correctamente de estos campos, solucionando la vulnerabilidad. Es importante destacar que si Okta Personal no se agrega al complemento para habilitar la vista de m\u00faltiples cuentas, el complemento Workforce Identity Cloud no se ve afectado por este problema. La vulnerabilidad se solucion\u00f3 en Okta Browser Plugin versi\u00f3n 6.32.0 para Chrome/Edge/Safari/Firefox." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json index b6bdbfb26c5..4ec3ffe69b1 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1575.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1575", "sourceIdentifier": "security@zyxel.com.tw", "published": "2024-07-23T02:15:02.090", - "lastModified": "2024-07-23T02:15:02.090", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The improper privilege management vulnerability in the Zyxel WBE660S firmware version 6.70(ACGG.3) and earlier versions could allow an authenticated user to escalate privileges and download the configuration files on a vulnerable device." + }, + { + "lang": "es", + "value": " La vulnerabilidad de administraci\u00f3n de privilegios incorrecta en la versi\u00f3n 6.70 (ACGG.3) del firmware Zyxel WBE660S y versiones anteriores podr\u00eda permitir a un usuario autenticado escalar privilegios y descargar los archivos de configuraci\u00f3n en un dispositivo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json index 3eeeb16f535..f92c7bbb5fc 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1737.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1737", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:03.740", - "lastModified": "2024-07-23T16:15:04.713", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name.\nThis issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1." + }, + { + "lang": "es", + "value": " Las cach\u00e9s de resoluci\u00f3n y las bases de datos de zonas autorizadas que contienen cantidades significativas de RR para el mismo nombre de host (de cualquier RTYPE) pueden sufrir un rendimiento degradado a medida que se agrega o actualiza contenido, y tambi\u00e9n al manejar consultas de clientes para este nombre. Este problema afecta a las versiones de BIND 9, 9.11.0 a 9.11.37, 9.16.0 a 9.16.50, 9.18.0 a 9.18.27, 9.19.0 a 9.19.24, 9.11.4-S1 a 9.11.37-S1. 9.16.8-S1 a 9.16.50-S1 y 9.18.11-S1 a 9.18.27-S1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json index 9bd4f5ddd7a..4b6cb07ef44 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1975.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1975", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:03.943", - "lastModified": "2024-07-23T16:15:04.797", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "If a server hosts a zone containing a \"KEY\" Resource Record, or a resolver DNSSEC-validates a \"KEY\" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.\nThis issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1." + }, + { + "lang": "es", + "value": "Si un servidor aloja una zona que contiene un registro de recursos \"KEY\", o un solucionador DNSSEC valida un registro de recursos \"KEY\" de un dominio firmado por DNSSEC en cach\u00e9, un cliente puede agotar los recursos de la CPU del solucionador enviando una secuencia de solicitudes firmadas SIG(0). Este problema afecta a las versiones de BIND 9 9.0.0 a 9.11.37, 9.16.0 a 9.16.50, 9.18.0 a 9.18.27, 9.19.0 a 9.19.24, 9.9.3-S1 a 9.11.37-S1, 9.16.8-S1 a 9.16.49-S1 y 9.18.11-S1 a 9.18.27-S1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21552.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21552.json index 6d17b522cc5..eac1c3e0ee5 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21552.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21552.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21552", "sourceIdentifier": "report@snyk.io", "published": "2024-07-22T15:15:02.410", - "lastModified": "2024-07-22T15:15:02.410", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of `SuperAGI` are vulnerable to Arbitrary Code Execution due to unsafe use of the \u2018eval\u2019 function. An attacker could induce the LLM output to exploit this vulnerability and gain arbitrary code execution on the SuperAGI application server." + }, + { + "lang": "es", + "value": " Todas las versiones de \"SuperAGI\" son vulnerables a la ejecuci\u00f3n de c\u00f3digo arbitrario debido al uso inseguro de la funci\u00f3n \"eval\". Un atacante podr\u00eda inducir la salida de LLM para explotar esta vulnerabilidad y obtener la ejecuci\u00f3n de c\u00f3digo arbitrario en el servidor de aplicaciones SuperAGI." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json index 228ca6b046f..81cbcc56407 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json @@ -2,13 +2,17 @@ "id": "CVE-2024-24507", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T22:15:02.200", - "lastModified": "2024-07-22T22:15:02.200", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Act-On 2023 allows a remote attacker to execute arbitrary code via the newUser parameter in the login.jsp component." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Cross Site Scripting en Act-On 2023 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro newUser en el componente login.jsp." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25638.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25638.json index 3f221b865f6..1371381eee7 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25638.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25638.json @@ -2,13 +2,17 @@ "id": "CVE-2024-25638", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T14:15:04.593", - "lastModified": "2024-07-22T14:15:04.593", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "dnsjava is an implementation of DNS in Java. Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones. This vulnerability is fixed in 3.6.0." + }, + { + "lang": "es", + "value": "dnsjava es una implementaci\u00f3n de DNS en Java. No se verifica la relevancia de los registros en las respuestas DNS para la consulta, lo que permite que un atacante responda con RR de diferentes zonas. Esta vulnerabilidad se solucion\u00f3 en 3.6.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26020.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26020.json index 94156858bd5..d0e5fa0d9e3 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26020.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26020.json @@ -2,13 +2,17 @@ "id": "CVE-2024-26020", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-22T15:15:02.660", - "lastModified": "2024-07-22T17:15:03.240", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary script execution vulnerability exists in the MPV functionality of Ankitects Anki 24.04. A specially crafted flashcard can lead to a arbitrary code execution. An attacker can send malicious flashcard to trigger this vulnerability." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de ejecuci\u00f3n de script arbitraria en la funcionalidad MPV de Ankitects Anki 24.04. Una tarjeta flash especialmente manipulada puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede enviar una tarjeta flash maliciosa para desencadenar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json index ea24fef93f0..e3e4e2b4585 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28698.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28698", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T18:15:03.120", - "lastModified": "2024-07-22T18:15:03.120", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Marimer LLC CSLA .Net before 8.0 allows a remote attacker to execute arbitrary code via a crafted script to the MobileFormatter component." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Directory Traversal en Marimer LLC CSLA .Net anterior a 8.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el componente MobileFormatter." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json index 2ca62fd6eb1..2280e1e79f0 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29070.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29070", "sourceIdentifier": "security@apache.org", "published": "2024-07-23T09:15:02.503", - "lastModified": "2024-07-23T09:15:02.503", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "On versions before 2.1.4,\u00a0session is not invalidated after logout. When the user logged in successfully, the Backend service returns \"Authorization\" as the front-end authentication credential. \"Authorization\" can still initiate requests and access data even after logout.\n\nMitigation:\n\nall users should upgrade to 2.1.4\n\n" + }, + { + "lang": "es", + "value": "En versiones anteriores a la 2.1.4, la sesi\u00f3n no se invalida despu\u00e9s de cerrar sesi\u00f3n. Cuando el usuario inicia sesi\u00f3n correctamente, el servicio Backend devuelve \"Authorization\" como credencial de autenticaci\u00f3n de front-end. La \"Authorization\" a\u00fan puede iniciar solicitudes y acceder a datos incluso despu\u00e9s de cerrar sesi\u00f3n. Mitigaci\u00f3n: todos los usuarios deben actualizar a 2.1.4" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29073.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29073.json index d2b2428aaa6..d44bdd45949 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29073.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29073.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29073", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-22T15:15:02.943", - "lastModified": "2024-07-22T17:15:03.340", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An vulnerability in the handling of Latex exists in Ankitects Anki 24.04. When Latex is sanitized to prevent unsafe commands, the verbatim package, which comes installed by default in many Latex distributions, has been overlooked. A specially crafted flashcard can lead to an arbitrary file read. An attacker can share a flashcard to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en el manejo de Latex en Ankitects Anki 24.04. Cuando se desinfecta Latex para evitar comandos inseguros, se pasa por alto el paquete verbatim, que viene instalado de forma predeterminada en muchas distribuciones de Latex. Una tarjeta flash especialmente manipulada puede provocar la lectura de un archivo arbitrario. Un atacante puede compartir una tarjeta did\u00e1ctica para desencadenar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32152.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32152.json index 558ed2a4b9d..a56be63fb7e 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32152.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32152.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32152", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-22T15:15:03.197", - "lastModified": "2024-07-22T17:15:03.493", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A blocklist bypass vulnerability exists in the LaTeX functionality of Ankitects Anki 24.04. A specially crafted malicious flashcard can lead to an arbitrary file creation at a fixed path. An attacker can share a malicious flashcard to trigger this vulnerability." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de omisi\u00f3n de lista de bloqueo en la funcionalidad LaTeX de Ankitects Anki 24.04. Una tarjeta flash maliciosa especialmente manipulada puede provocar la creaci\u00f3n de un archivo arbitrario en una ruta fija. Un atacante puede compartir una tarjeta flash maliciosa para desencadenar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32484.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32484.json index 57d7018b7cd..45d7a117390 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32484.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32484.json @@ -2,13 +2,17 @@ "id": "CVE-2024-32484", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-07-22T15:15:03.417", - "lastModified": "2024-07-22T17:15:03.600", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An reflected XSS vulnerability exists in the handling of invalid paths in the Flask server in Ankitects Anki 24.04. A specially crafted flashcard can lead to JavaScript code execution and result in an arbitrary file read. An attacker can share a malicious flashcard to trigger this vulnerability." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad XSS reflejado en el manejo de rutas no v\u00e1lidas en el servidor Flask en Ankitects Anki 24.04. Una tarjeta flash especialmente manipulada puede provocar la ejecuci\u00f3n de c\u00f3digo JavaScript y dar como resultado la lectura de un archivo arbitrario. Un atacante puede compartir una tarjeta flash maliciosa para desencadenar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3246.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3246.json index de0f3a059e7..e55dd2ab897 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3246.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3246.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3246", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T04:15:04.280", - "lastModified": "2024-07-24T04:15:04.280", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LiteSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0.1. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the token setting and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento LiteSpeed Cache para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 6.2.0.1 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta. Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del token e inyecten JavaScript malicioso a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json index 7972cabc11d..e76d8c447e8 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3297", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-07-24T08:15:02.880", - "lastModified": "2024-07-24T08:15:02.880", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json index 200ca8e9f81..48852076e53 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34128", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-23T12:15:09.763", - "lastModified": "2024-07-23T12:15:09.763", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones 6.5.20 y anteriores de Adobe Experience Manager se ven afectadas por una vulnerabilidad de Cross Site Scripting (XSS) almacenado que podr\u00eda ser aprovechada por un atacante con pocos privilegios para inyectar scripts maliciosos en campos de formulario vulnerables. Se puede ejecutar JavaScript malicioso en el navegador de la v\u00edctima cuando navega a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json index 3955fb71703..ff6c7f7ffa0 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34329", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T20:15:03.673", - "lastModified": "2024-07-22T20:15:03.673", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in Entrust Datacard XPS Card Printer Driver 8.4 and earlier allows unauthenticated attackers to execute arbitrary code as SYSTEM via a crafted DLL payload." + }, + { + "lang": "es", + "value": " Los permisos inseguros en Entrust Datacard XPS Card Printer Driver 8.4 y versiones anteriores permiten a atacantes no autenticados ejecutar c\u00f3digo arbitrario como SYSTEM a trav\u00e9s de un payload DLL manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json index b25e63fe033..20c26fca3c4 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3454", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-07-24T08:15:03.123", - "lastModified": "2024-07-24T08:15:03.123", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37380.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37380.json index 952fc4de17c..ebbb3b5a003 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37380.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37380.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37380", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-22T19:15:02.537", - "lastModified": "2024-07-22T19:15:02.537", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A misconfiguration on UniFi U6+ Access Point could cause an incorrect VLAN traffic forwarding to APs meshed to UniFi U6+ Access Point.\n\n\nAffected Products:\nUniFi U6+ Access Point (Version 6.6.65 and earlier) \n\n \nMitigation:\nUpdate your UniFi U6+ Access Point to Version 6.6.74 or later.\n" + }, + { + "lang": "es", + "value": " Una mala configuraci\u00f3n en UniFi U6+ Access Point podr\u00eda causar un reenv\u00edo de tr\u00e1fico VLAN incorrecto a los AP conectados al punto de acceso UniFi U6+. Productos afectados: UniFi U6+ Access Point (Versi\u00f3n 6.6.65 y anteriores) Mitigaci\u00f3n: Actualice su UniFi U6+ UniFi U6+ Access Point a la versi\u00f3n 6.6.74 o posterior." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37998.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37998.json index 3eb808dfe3e..b772bd966c2 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37998.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37998.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37998", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-22T14:15:05.453", - "lastModified": "2024-07-22T14:15:05.453", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V5.40), SICORE Base system (All versions < V1.4.0). The password of administrative accounts of the affected applications can be reset without requiring the knowledge of the current password, given the auto login is enabled. This could allow an unauthorized attacker to obtain administrative access of the affected applications." + }, + { + "lang": "es", + "value": " Se ha identificado una vulnerabilidad en CPCI85 Central Processing/Communication/ (todas las versiones < V5.40), SICORE Base system (todas las versiones < V1.4.0). La contrase\u00f1a de las cuentas administrativas de las aplicaciones afectadas se puede restablecer sin necesidad de conocer la contrase\u00f1a actual, siempre que el inicio de sesi\u00f3n autom\u00e1tico est\u00e9 habilitado. Esto podr\u00eda permitir que un atacante no autorizado obtenga acceso administrativo a las aplicaciones afectadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json index e8bbe8b66a5..16a687a733c 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38164", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-23T22:15:08.420", - "lastModified": "2024-07-23T22:15:08.420", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link.\n" + }, + { + "lang": "es", + "value": " Una vulnerabilidad de control de acceso inadecuado en GroupMe permite a un atacante no autenticado elevar los privilegios en una red convenciendo a un usuario de hacer clic en un enlace malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json index da570dc3a25..68378a50f48 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38176", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-23T22:15:08.660", - "lastModified": "2024-07-23T22:15:08.660", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "An improper restriction of excessive authentication attempts in GroupMe allows a unauthenticated attacker to elevate privileges over a network.\n" + }, + { + "lang": "es", + "value": "Una restricci\u00f3n inadecuada de intentos excesivos de autenticaci\u00f3n en GroupMe permite que un atacante no autenticado eleve los privilegios en una red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json index 4a75f824fae..26537c91f32 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38944.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38944", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T19:15:02.760", - "lastModified": "2024-07-22T19:15:02.760", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Intelight X-1L Traffic controller Maxtime v.1.9.6 allows a remote attacker to execute arbitrary code via the /cgi-bin/generateForm.cgi?formID=142 component." + }, + { + "lang": "es", + "value": "Un problema en Intelight X-1L Traffic controller Maxtime v.1.9.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente /cgi-bin/generateForm.cgi?formID=142." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3896.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3896.json new file mode 100644 index 00000000000..9fd90b0115c --- /dev/null +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3896.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-3896", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-24T13:15:10.453", + "lastModified": "2024-07-24T13:15:10.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the Gallery title field in all versions up to, and including, 3.2.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3100759/robo-gallery", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69ab404b-1c2f-441b-8622-3cf830587d95?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json index 9223c6a929b..92f90676fbe 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39250.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39250", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T20:15:04.057", - "lastModified": "2024-07-22T20:15:04.057", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que EfroTech Timetrax v8.3 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL no autenticada a trav\u00e9s del par\u00e1metro q en la interfaz web de b\u00fasqueda." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39601.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39601.json index 486201e887d..48ee9194ffc 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39601.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39601.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39601", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-22T14:15:06.107", - "lastModified": "2024-07-22T14:15:06.107", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V5.40), SICORE Base system (All versions < V1.4.0). Affected devices allow a remote authenticated user or an unauthenticated user with physical access to downgrade the firmware of the device. This could allow an attacker to downgrade the device to older versions with known vulnerabilities." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en CPCI85 Central Processing/Communication (todas las versiones < V5.40), SICORE Base system (todas las versiones < V1.4.0). Los dispositivos afectados permiten que un usuario autenticado remoto o un usuario no autenticado con acceso f\u00edsico degraden el firmware del dispositivo. Esto podr\u00eda permitir a un atacante degradar el dispositivo a versiones anteriores con vulnerabilidades conocidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39676.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39676.json index d2b80346565..3a091b88e01 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39676.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39676", "sourceIdentifier": "security@apache.org", "published": "2024-07-24T08:15:02.773", - "lastModified": "2024-07-24T08:15:02.773", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39685.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39685.json index eed26cbab05..0ce7f285856 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39685.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39685.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39685", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T16:15:03.417", - "lastModified": "2024-07-22T16:15:03.417", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the resample function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier." + }, + { + "lang": "es", + "value": "Bert-VITS2 es la columna vertebral de VITS2 con bert multiling\u00fce. La entrada del usuario proporcionada a la variable data_dir se usa directamente en un comando ejecutado con subprocess.run(cmd, shell=True) en la funci\u00f3n resample, lo que conduce a la ejecuci\u00f3n de un comando arbitrario. Esto afecta a fishaudio/Bert-VITS2 2.3 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39686.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39686.json index 33def19b076..f02f9c67b88 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39686.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39686.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39686", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T16:15:03.657", - "lastModified": "2024-07-22T16:15:03.657", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is used directly in a command executed with subprocess.run(cmd, shell=True) in the bert_gen function, which leads to arbitrary command execution. This affects fishaudio/Bert-VITS2 2.3 and earlier." + }, + { + "lang": "es", + "value": " Bert-VITS2 es la columna vertebral de VITS2 con bert multiling\u00fce. La entrada del usuario proporcionada a la variable data_dir se usa directamente en un comando ejecutado con subprocess.run(cmd, shell=True) en la funci\u00f3n bert_gen, lo que conduce a la ejecuci\u00f3n de comandos arbitrarios. Esto afecta a fishaudio/Bert-VITS2 2.3 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39688.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39688.json index d9c17f53c32..3b6330ccfeb 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39688.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39688.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39688", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T16:15:03.883", - "lastModified": "2024-07-22T16:15:03.883", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is concatenated with other folders and used to open a new file in the generate_config function, which leads to a limited file write. The issue allows for writing /config/config.json file in arbitrary directory on the server. If a given directory path doesn\u2019t exist, the application will return an error, so this vulnerability could also be used to gain information about existing directories on the server. This affects fishaudio/Bert-VITS2 2.3 and earlier." + }, + { + "lang": "es", + "value": "Bert-VITS2 es la columna vertebral de VITS2 con bert multiling\u00fce. La entrada del usuario proporcionada a la variable data_dir se concatena con otras carpetas y se usa para abrir un nuevo archivo en la funci\u00f3n generate_config, lo que conduce a una escritura de archivo limitada. El problema permite escribir el archivo /config/config.json en un directorio arbitrario del servidor. Si una ruta de directorio determinada no existe, la aplicaci\u00f3n devolver\u00e1 un error, por lo que esta vulnerabilidad tambi\u00e9n podr\u00eda usarse para obtener informaci\u00f3n sobre directorios existentes en el servidor. Esto afecta a fishaudio/Bert-VITS2 2.3 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39702.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39702.json index 3de95354f06..137d917c758 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39702.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39702.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39702", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-23T16:15:05.557", - "lastModified": "2024-07-24T05:15:12.813", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected." + }, + { + "lang": "es", + "value": " En lj_str_hash.c en OpenResty 1.19.3.1 a 1.25.3.1, la funci\u00f3n hash de cadena (utilizada durante el internamiento de cadenas) permite ataques HashDoS (denegaci\u00f3n de servicio de hash). Un atacante podr\u00eda provocar un uso excesivo de recursos durante las operaciones de proxy a trav\u00e9s de solicitudes manipuladas, lo que podr\u00eda provocar una denegaci\u00f3n de servicio con relativamente pocas solicitudes entrantes. Esta vulnerabilidad solo existe en la bifurcaci\u00f3n OpenResty en el repositorio de GitHub openresty/luajit2. El repositorio LuaJIT/LuaJIT. no se ve afectado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json index 41dfe960cc7..e225cd7df51 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39902.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39902", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T14:15:06.383", - "lastModified": "2024-07-22T14:15:06.383", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox \"Apply same permissions to all sub-items of this folder\" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8." + }, + { + "lang": "es", + "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Antes de Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8, la casilla de verificaci\u00f3n \"Apply same permissions to all sub-items of this folder\" en el modo de permisos del administrador de documentos no se tiene en cuenta y siempre se considera como desmarcada. En situaciones en las que se restringen los permisos, es posible que algunos usuarios a\u00fan mantengan, incorrectamente, la posibilidad de editar o administrar elementos. Solo se ven afectados los cambios realizados a trav\u00e9s de la interfaz de usuario web; los cambios realizados directamente a trav\u00e9s de la API REST no se ven afectados. Esta vulnerabilidad se solucion\u00f3 en Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json index df09ac1c3b1..003dd758fd6 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40051", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T18:15:03.700", - "lastModified": "2024-07-22T18:15:03.700", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IP Guard v4.81.0307.0 was discovered to contain an arbitrary file read vulnerability via the file name parameter." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que IP Guard v4.81.0307.0 conten\u00eda una vulnerabilidad de lectura de archivos arbitraria a trav\u00e9s del par\u00e1metro file name." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json index 4eb909c2f45..ce30baddc51 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40060.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40060", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-23T15:15:04.810", - "lastModified": "2024-07-23T15:15:04.810", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "go-chart v2.1.1 was discovered to contain an infinite loop via the drawCanvas() function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que go-chart v2.1.1 contiene un bucle infinito a trav\u00e9s de la funci\u00f3n drawCanvas()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40075.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40075.json index 52f64854b24..0f2dccd0c7d 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40075.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40075.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40075", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T19:15:02.867", - "lastModified": "2024-07-22T19:15:02.867", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Laravel v11.x was discovered to contain an XML External Entity (XXE) vulnerability." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que Laravel v11.x contiene una vulnerabilidad de XML External Entity (XXE)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json index 415db2a16a3..68abc7d197a 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40502.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40502", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T21:15:04.077", - "lastModified": "2024-07-22T21:15:04.077", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in Hospital Management System Project in ASP.Net MVC 1 allows aremote attacker to execute arbitrary code via the btn_login_b_Click function of the Loginpage.aspx" + }, + { + "lang": "es", + "value": " Vulnerabilidad de inyecci\u00f3n SQL en Hospital Management System Project in ASP.Net MVC 1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n btn_login_b_Click de Loginpage.aspx" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40634.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40634.json index 11302146d69..31aa9e85d9a 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40634.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40634.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40634", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T18:15:03.770", - "lastModified": "2024-07-22T18:15:03.770", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memory allocation that leads to service disruption by triggering an Out Of Memory (OOM) kill. The issue poses a high risk to the availability of Argo CD deployments. This vulnerability is fixed in 2.11.6, 2.10.15, and 2.9.20.\n" + }, + { + "lang": "es", + "value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Este informe detalla una vulnerabilidad de seguridad en Argo CD, donde un atacante no autenticado puede enviar un gran payload JSON especialmente manipulado al endpoint /api/webhook, lo que provoca una asignaci\u00f3n excesiva de memoria que conduce a la interrupci\u00f3n del servicio al desencadenar un Out Of Memory (OOM) kill. El problema plantea un alto riesgo para la disponibilidad de las implementaciones de Argo CD. Esta vulnerabilidad se solucion\u00f3 en 2.11.6, 2.10.15 y 2.9.20." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json index ff7336ff78a..5841501ffcb 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40767", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T05:15:12.907", - "lastModified": "2024-07-24T05:15:12.907", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498." + }, + { + "lang": "es", + "value": "En OpenStack Nova anterior a 27.4.1, 28 anterior a 28.2.1 y 29 anterior a 29.1.1, al proporcionar una imagen sin formato que en realidad es una imagen QCOW2 manipulada con una ruta de archivo de respaldo o una imagen plana VMDK con una ruta de archivo descriptiva, se El usuario autenticado puede convencer a los sistemas para que devuelvan una copia del contenido del archivo al que se hace referencia desde el servidor, lo que resulta en un acceso no autorizado a datos potencialmente confidenciales. Todas las implementaciones de Nova se ven afectadas. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2022-47951 y CVE-2024-32498." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json index 25f622b999e..7e9518dc5d3 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4076.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4076", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-23T15:15:05.500", - "lastModified": "2024-07-23T16:15:06.287", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure.\nThis issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1." + }, + { + "lang": "es", + "value": " Las consultas de los clientes que desencadenan la entrega de datos obsoletos y que tambi\u00e9n requieren b\u00fasquedas en datos de la zona autorizada local pueden provocar un error de aserci\u00f3n. Este problema afecta a las versiones de BIND 9, 9.16.13 a 9.16.50, 9.18.0 a 9.18.27, 9.19.0 a 9.19.24, 9.11.33-S1 a 9.11.37-S1, 9.16.13-S1 a 9.16. 50-S1 y 9.18.11-S1 a 9.18.27-S1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json index 753b9ec691b..11cf6cf1ec7 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4079", "sourceIdentifier": "security@ni.com", "published": "2024-07-23T14:15:14.353", - "lastModified": "2024-07-23T14:15:14.353", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out of bounds read due to a missing bounds check in LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions." + }, + { + "lang": "es", + "value": "Una lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de l\u00edmites faltantes en LabVIEW puede revelar informaci\u00f3n o resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario. La explotaci\u00f3n exitosa requiere que un atacante proporcione al usuario un VI especialmente manipulado. Esta vulnerabilidad afecta a LabVIEW 2024 Q1 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json index b15d2478558..1d0311b9d80 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4080", "sourceIdentifier": "security@ni.com", "published": "2024-07-23T14:15:14.590", - "lastModified": "2024-07-23T14:15:14.590", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption issue due to an improper length check in LabVIEW tdcore.dll may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions." + }, + { + "lang": "es", + "value": " Un problema de corrupci\u00f3n de memoria debido a una verificaci\u00f3n de longitud incorrecta en LabVIEW tdcore.dll puede revelar informaci\u00f3n o resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario. La explotaci\u00f3n exitosa requiere que un atacante proporcione al usuario un VI especialmente manipulado. Esta vulnerabilidad afecta a LabVIEW 2024 Q1 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4081.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4081.json index 4576766e901..1a085e6b576 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4081.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4081.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4081", "sourceIdentifier": "security@ni.com", "published": "2024-07-23T14:15:14.837", - "lastModified": "2024-07-23T14:15:14.837", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption issue due to an improper length check in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects NI LabVIEW 2024 Q1 and prior versions." + }, + { + "lang": "es", + "value": " Un problema de corrupci\u00f3n de memoria debido a una verificaci\u00f3n de longitud inadecuada en NI LabVIEW puede revelar informaci\u00f3n o resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario. La explotaci\u00f3n exitosa requiere que un atacante proporcione al usuario un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2024 Q1 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json index 6b9ae9810cd..5bd56f0d4c7 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41012", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-23T08:15:01.877", - "lastModified": "2024-07-23T08:15:01.877", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41129.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41129.json index 6fa59d61204..1b36f4302ef 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41129.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41129.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41129", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T15:15:03.710", - "lastModified": "2024-07-22T15:15:03.710", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ops library is a Python framework for developing and testing Kubernetes and machine charms. The issue here is that ops passes the secret content as one of the args via CLI. This issue may affect any of the charms that are using: Juju (>=3.0), Juju secrets and not correctly capturing and processing `subprocess.CalledProcessError`. This vulnerability is fixed in 2.15.0." + }, + { + "lang": "es", + "value": "La librer\u00eda ops es un framework de Python para desarrollar y probar Kubernetes y accesos a m\u00e1quinas. El problema aqu\u00ed es que ops pasa el contenido secreto como uno de los argumentos a trav\u00e9s de CLI. Este problema puede afectar cualquiera de los accesos que est\u00e1n usando: Juju (>=3.0), Juju secrets y no capturen ni procesen correctamente `subprocess.CalledProcessError`. Esta vulnerabilidad se solucion\u00f3 en 2.15.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41130.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41130.json index c0cfffbc908..22c350bf302 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41130.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41130.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41130", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T18:15:04.013", - "lastModified": "2024-07-22T18:15:04.013", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "llama.cpp provides LLM inference in C/C++. Prior to b3427, llama.cpp contains a null pointer dereference in gguf_init_from_file. This vulnerability is fixed in b3427." + }, + { + "lang": "es", + "value": " llama.cpp proporciona inferencia LLM en C/C++. Antes de b3427, llama.cpp contiene una desreferencia de puntero nulo en gguf_init_from_file. Esta vulnerabilidad se soluciona en b3427." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41131.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41131.json index 1918e504c6b..f96e960f15c 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41131.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41131.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41131", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T15:15:03.933", - "lastModified": "2024-07-22T15:15:03.933", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ImageSharp is a 2D graphics API. An Out-of-bounds Write vulnerability has been found in the ImageSharp gif decoder, allowing attackers to cause a crash using a specially crafted gif. This can potentially lead to denial of service. All users are advised to upgrade to v3.1.5 or v2.1.9." + }, + { + "lang": "es", + "value": " ImageSharp es una API de gr\u00e1ficos 2D. Se ha encontrado una vulnerabilidad de escritura fuera de los l\u00edmites en el decodificador de gif de ImageSharp, lo que permite a los atacantes provocar un bloqueo utilizando un gif especialmente manipulado. Esto puede conducir potencialmente a la denegaci\u00f3n del servicio. Se recomienda a todos los usuarios que actualicen a v3.1.5 o v2.1.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41132.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41132.json index 2077ab34d7f..79affbb07ef 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41132.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41132.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41132", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-22T15:15:04.160", - "lastModified": "2024-07-22T15:15:04.160", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ImageSharp is a 2D graphics API. A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in the Gif decoder. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw. All users are advised to upgrade to v3.1.5 or v2.1.9." + }, + { + "lang": "es", + "value": " ImageSharp es una API de gr\u00e1ficos 2D. Una vulnerabilidad descubierta en la librer\u00eda ImageSharp, donde el procesamiento de archivos especialmente manipulados puede provocar un uso excesivo de memoria en el decodificador Gif. La vulnerabilidad se activa cuando ImageSharp intenta procesar archivos de imagen dise\u00f1ados para explotar este fallo. Se recomienda a todos los usuarios que actualicen a v3.1.5 o v2.1.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json index 9a8b53597fe..e913e78f81d 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41178.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41178", "sourceIdentifier": "security@apache.org", "published": "2024-07-23T17:15:12.663", - "lastModified": "2024-07-23T19:15:13.377", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of temporary credentials in logs\u00a0in Apache Arrow Rust Object Store (`object_store` crate), version 0.10.1 and earlier on all platforms using AWS WebIdentityTokens.\u00a0\n\nOn certain error conditions, the logs may contain the OIDC token passed to AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html . This allows someone with access to the logs to impersonate that identity, including performing their own calls to AssumeRoleWithWebIdentity, until the OIDC token expires. Typically OIDC tokens are valid for up to an hour, although this will vary depending on the issuer.\n\nUsers are recommended to use a different AWS authentication mechanism, disable logging or upgrade to version 0.10.2, which fixes this issue.\n\nDetails:\n\nWhen using AWS WebIdentityTokens with the object_store crate, in the event of a failure and automatic retry, the underlying reqwest error, including the full URL with the credentials, potentially in the parameters, is written to the logs.\u00a0\n\nThanks to Paul\u00a0Hatcherian for reporting this vulnerability" + }, + { + "lang": "es", + "value": "Exposici\u00f3n de credenciales temporales en registros en Apache Arrow Rust Object Store (caja `object_store`), versi\u00f3n 0.10.1 y anteriores en todas las plataformas que utilizan AWS WebIdentityTokens. En determinadas condiciones de error, los registros pueden contener el token OIDC pasado a AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html. Esto permite que alguien con acceso a los registros se haga pasar por esa identidad, incluida la realizaci\u00f3n de sus propias llamadas a AssumeRoleWithWebIdentity, hasta que caduque el token OIDC. Normalmente, los tokens OIDC son v\u00e1lidos por hasta una hora, aunque esto variar\u00e1 seg\u00fan el emisor. Se recomienda a los usuarios utilizar un mecanismo de autenticaci\u00f3n de AWS diferente, deshabilitar el registro o actualizar a la versi\u00f3n 0.10.2, que soluciona este problema. Detalles: cuando se utilizan AWS WebIdentityTokens con la caja object_store, en caso de error y reintento autom\u00e1tico, el error de solicitud subyacente, incluida la URL completa con las credenciales, potencialmente en los par\u00e1metros, se escribe en los registros. Gracias a Paul Hatcherian por informar de esta vulnerabilidad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json index 99d779aade0..590986a3583 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41314", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.627", - "lastModified": "2024-07-23T16:15:05.710", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json index c4dfcee0ba3..c4c231d99ab 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41315", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.693", - "lastModified": "2024-07-23T16:15:05.773", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json index 25560d3c5b9..70368f636c3 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41316", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.757", - "lastModified": "2024-07-23T16:15:05.843", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json index e9a3fe73516..b44f8ae55f8 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41317", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.817", - "lastModified": "2024-07-23T16:15:05.910", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json index c8854138559..b15c640a978 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41318", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.880", - "lastModified": "2024-07-23T15:15:04.973", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json index 2bf796845fc..bb0f116cad0 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41319.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41319", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-23T15:15:05.050", - "lastModified": "2024-07-23T15:15:05.050", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the cmd parameter in the webcmd function." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 contiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro cmd en la funci\u00f3n webcmd." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json index c233ba729f8..9ecb8f03b8d 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41320.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41320", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T14:15:06.940", - "lastModified": "2024-07-23T15:15:05.133", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41655.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41655.json index d5f25704cea..0f63dcac715 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41655.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41655.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41655", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T15:15:05.207", - "lastModified": "2024-07-23T15:15:05.207", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TF2 Item Format helps users format TF2 items to the community standards. Versions of `tf2-item-format` since at least `4.2.6` and prior to `5.9.14` are vulnerable to a Regular Expression Denial of Service (ReDoS) attack when parsing crafted user input. This vulnerability can be exploited by an attacker to perform DoS attacks on any service that uses any `tf2-item-format` to parse user input. Version `5.9.14` contains a fix for the issue." + }, + { + "lang": "es", + "value": "TF2 Item Format ayuda a los usuarios a formatear los elementos TF2 seg\u00fan los est\u00e1ndares de la comunidad. Las versiones de `tf2-item-format` desde al menos `4.2.6` y anteriores a `5.9.14` son vulnerables a un ataque de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) al analizar entradas de usuario manipuladas. Un atacante puede aprovechar esta vulnerabilidad para realizar ataques DoS en cualquier servicio que utilice cualquier \"tf2-item-format\" para analizar la entrada del usuario. La versi\u00f3n `5.9.14` contiene una soluci\u00f3n para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41656.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41656.json index 7d079d1d20f..1390d688433 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41656.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41656.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41656", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T22:15:08.970", - "lastModified": "2024-07-23T22:15:08.970", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one's self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting." + }, + { + "lang": "es", + "value": "Sentry es una plataforma de seguimiento de errores y supervisi\u00f3n del rendimiento. A partir de la versi\u00f3n 10.0.0 y antes de la versi\u00f3n 24.7.1, un payload no saneado enviado por una integraci\u00f3n de plataforma de integraci\u00f3n permite almacenar etiquetas HTML arbitrarias en el lado de Sentry y luego representarlas en la p\u00e1gina de Issues. Los usuarios de Sentry autohospedados pueden verse afectados en caso de integraciones de plataformas de integraci\u00f3n no confiables que env\u00eden problemas externos de su lado a Sentry. Se lanz\u00f3 un parche en Sentry 24.7.1. Para los clientes de Sentry SaaS, no es necesario realizar ninguna acci\u00f3n. Esto fue parcheado el 23 de julio e incluso antes de la soluci\u00f3n, la explotaci\u00f3n no era posible debido a la estricta Pol\u00edtica de seguridad de contenido implementada en el sitio sentry.io. Para los usuarios autohospedados, los mantenedores de Sentry recomiendan encarecidamente actualizar Sentry a la \u00faltima versi\u00f3n. Si no es posible, se podr\u00eda habilitar CSP en la instalaci\u00f3n autohospedada con `CSP_REPORT_ONLY = False` (enforcing mode). Esto mitigar\u00e1 el riesgo de Cross Site Scripting." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41661.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41661.json index c6b2f40de4d..35edecada60 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41661.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41661.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41661", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T18:15:06.577", - "lastModified": "2024-07-23T18:15:06.577", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "reNgine is an automated reconnaissance framework for web applications. In versions 1.2.0 through 2.1.1, an authenticated command injection vulnerability in the WAF detection tool allows an authenticated attacker to remotely execute arbitrary commands as root user. The URL query parameter `url` is passed to `subprocess.check_output` without any sanitization, resulting in a command injection vulnerability. This API endpoint is accessible by authenticated users with any use role. Because the process runs as `root`, an attacker has root access. Commit edd3c85ee16f93804ad38dac5602549d2d30a93e contains a patch for the issue." + }, + { + "lang": "es", + "value": "reNgine es un marco de reconocimiento automatizado para aplicaciones web. En las versiones 1.2.0 a 2.1.1, una vulnerabilidad de inyecci\u00f3n de comandos autenticados en la herramienta de detecci\u00f3n WAF permite a un atacante autenticado ejecutar comandos arbitrarios de forma remota como usuario root. El par\u00e1metro de consulta de URL `url` se pasa a `subprocess.check_output` sin ninguna sanitizaci\u00f3n, lo que genera una vulnerabilidad de inyecci\u00f3n de comando. Los usuarios autenticados con cualquier rol de uso pueden acceder a este API endpoint. Debido a que el proceso se ejecuta como \"root\", un atacante tiene acceso de root. La confirmaci\u00f3n edd3c85ee16f93804ad38dac5602549d2d30a93e contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41663.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41663.json index 9f7bb7c1c9e..133555a7273 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41663.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41663.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41663", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T16:15:06.070", - "lastModified": "2024-07-23T16:15:06.070", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Canarytokens help track activity and actions on a network. A Cross-Site Scripting vulnerability was identified in the \"Cloned Website\" Canarytoken, whereby the Canarytoken's creator can attack themselves. The creator of a slow-redirect Canarytoken can insert Javascript into the destination URL of their slow redirect token. When the creator later browses the management page for their own Canarytoken, the Javascript executes. This is a self-XSS. An attacker could create a Canarytoken with this self-XSS, and send the management link to a victim. When they click on it, the Javascript would execute. However, no sensitive information (ex. session information) will be disclosed to the malicious actor. This issue is now patched on Canarytokens.org. Users of self-hosted Canarytokens installations can update by pulling the latest Docker image, or any Docker image after `sha-097d91a`." + }, + { + "lang": "es", + "value": "Los Canarytokens ayudan a rastrear la actividad y las acciones en una red. Se identific\u00f3 una vulnerabilidad de Cross Site Scripting en el Canarytoken \"Cloned Website\", mediante la cual el creador del Canarytoken puede atacarse a s\u00ed mismo. El creador de un Canarytoken de redireccionamiento lento puede insertar Javascript en la URL de destino de su token de redireccionamiento lento. Cuando el creador navega m\u00e1s tarde por la p\u00e1gina de administraci\u00f3n de su propio Canarytoken, se ejecuta Javascript. Este es un XSS propio. Un atacante podr\u00eda crear un Canarytoken con este XSS propio y enviar el enlace de administraci\u00f3n a una v\u00edctima. Cuando hacen clic en \u00e9l, se ejecutar\u00e1 Javascript. Sin embargo, no se revelar\u00e1 ninguna informaci\u00f3n confidencial (por ejemplo, informaci\u00f3n de sesi\u00f3n) al actor malicioso. Este problema ya est\u00e1 solucionado en Canarytokens.org. Los usuarios de instalaciones de Canarytokens autohospedadas pueden actualizar extrayendo la \u00faltima imagen de Docker o cualquier imagen de Docker despu\u00e9s de `sha-097d91a`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41664.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41664.json index dfa62aa3ebf..6233272edf1 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41664.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41664.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41664", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T17:15:12.767", - "lastModified": "2024-07-23T17:15:12.767", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Canarytokens help track activity and actions on a network. Prior to `sha-8ea5315`, Canarytokens.org was vulnerable to a blind SSRF in the Webhook alert feature. When a Canarytoken is created, users choose to receive alerts either via email or via a webhook. If a webhook is supplied when a Canarytoken is first created, the site will make a test request to the supplied URL to ensure it accepts alert notification HTTP requests. No safety checks were performed on the URL, leading to a Server-Side Request Forgery vulnerability. The SSRF is Blind because the content of the response is not displayed to the creating user; they are simply told whether an error occurred in making the test request. Using the Blind SSRF, it was possible to map out open ports for IPs inside the Canarytokens.org infrastructure. This issue is now patched on Canarytokens.org. Users of self-hosted Canarytokens installations can update by pulling the latest Docker image, or any Docker image after `sha-097d91a`." + }, + { + "lang": "es", + "value": "Los Canarytokens ayudan a rastrear la actividad y las acciones en una red. Antes de `sha-8ea5315`, Canarytokens.org era vulnerable a SSRF ciego en la funci\u00f3n de alerta de Webhook. Cuando se crea un Canarytoken, los usuarios eligen recibir alertas por correo electr\u00f3nico o mediante un webhook. Si se proporciona un webhook cuando se crea un Canarytoken por primera vez, el sitio realizar\u00e1 una solicitud de prueba a la URL proporcionada para garantizar que acepta solicitudes HTTP de notificaci\u00f3n de alerta. No se realizaron comprobaciones de seguridad en la URL, lo que provoc\u00f3 una vulnerabilidad de Server-Side Request Forgery. El SSRF es ciego porque el contenido de la respuesta no se muestra al usuario creador; simplemente se les dice si ocurri\u00f3 un error al realizar la solicitud de prueba. Utilizando Blind SSRF, fue posible mapear puertos abiertos para IP dentro de la infraestructura de Canarytokens.org. Este problema ya est\u00e1 solucionado en Canarytokens.org. Los usuarios de instalaciones de Canarytokens autohospedadas pueden actualizar extrayendo la \u00faltima imagen de Docker o cualquier imagen de Docker despu\u00e9s de `sha-097d91a`." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json index 48c6752ba62..80942717070 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41665.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41665", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T18:15:06.790", - "lastModified": "2024-07-23T18:15:06.790", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the \"Playlists - Democratic - Configure Democratic Playlist\" feature. An attacker with Content Manager permissions can set the Name field to ``. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": " Ampache, una aplicaci\u00f3n de transmisi\u00f3n de audio/v\u00eddeo y administrador de archivos basada en web, tiene una vulnerabilidad de Cross Site Scripting (XSS) almacenadas en versiones anteriores a la 6.6.0. Esta vulnerabilidad existe en la funci\u00f3n \"Playlists - Democratic - Configure Democratic Playlist\". Un atacante con permisos de Administrador de contenido puede establecer el campo Name en ``. Cuando cualquier administrador o usuario acceda a la funcionalidad Democratic, se ver\u00e1 afectado por esta vulnerabilidad de XSS almacenado. El atacante puede aprovechar esta vulnerabilidad para obtener las cookies de cualquier usuario o administrador que acceda al archivo `democratic.php`. La versi\u00f3n 6.6.0 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41668.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41668.json index 037741bd9f0..e9d03517899 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41668.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41668.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41668", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-23T19:15:13.437", - "lastModified": "2024-07-23T19:15:13.437", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx." + }, + { + "lang": "es", + "value": "El cBioPortal for Cancer Genomics proporciona visualizaci\u00f3n, an\u00e1lisis y descarga de conjuntos de datos de gen\u00f3mica del c\u00e1ncer a gran escala. Al ejecutar un endpoint proxy expuesto p\u00fablicamente sin autenticaci\u00f3n, cBioPortal podr\u00eda permitir que alguien realice un ataque de Server Side Request Forgery (SSRF). Los usuarios que hayan iniciado sesi\u00f3n podr\u00edan hacer lo mismo en instancias privadas. Se ha publicado una soluci\u00f3n en la versi\u00f3n 6.0.12. Como workaround, se podr\u00eda deshabilitar completamente el endpoint `/proxy` mediante, por ejemplo, nginx." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41824.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41824.json index 32bec37a80c..27467ba80aa 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41824.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41824.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41824", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-07-22T15:15:04.400", - "lastModified": "2024-07-22T15:15:04.400", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07 parameters of the \"password\" type could leak into the build log in some specific cases" + }, + { + "lang": "es", + "value": "En JetBrains TeamCity antes de 2024.07, los par\u00e1metros del tipo \"password\" pod\u00edan filtrarse en el registro de compilaci\u00f3n en algunos casos espec\u00edficos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41825.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41825.json index b9d09d1bf54..1ac4b3ff6cf 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41825.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41825.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41825", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-07-22T15:15:04.630", - "lastModified": "2024-07-22T15:15:04.630", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07 stored XSS was possible on the Code Inspection tab" + }, + { + "lang": "es", + "value": " En JetBrains TeamCity antes de 2024.07, era posible el XSS almacenado en la pesta\u00f1a Code Inspection" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41826.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41826.json index 624e603cd87..b0857793073 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41826.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41826.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41826", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-07-22T15:15:04.847", - "lastModified": "2024-07-22T15:15:04.847", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07 stored XSS was possible on Show Connection page" + }, + { + "lang": "es", + "value": " En JetBrains TeamCity antes de 2024.07, era posible el XSS almacenado en la p\u00e1gina Show Connection" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41827.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41827.json index ba0ede43ba1..fec7eba3952 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41827.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41827.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41827", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-07-22T15:15:05.057", - "lastModified": "2024-07-22T15:15:05.057", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07 access tokens could continue working after deletion or expiration" + }, + { + "lang": "es", + "value": " En JetBrains TeamCity antes de 2024.07, los tokens de acceso pod\u00edan seguir funcionando despu\u00e9s de su eliminaci\u00f3n o vencimiento" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41828.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41828.json index 29b13f9b472..1c430e9ade9 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41828.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41828.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41828", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-07-22T15:15:05.270", - "lastModified": "2024-07-22T15:15:05.270", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07 comparison of authorization tokens took non-constant time" + }, + { + "lang": "es", + "value": " En JetBrains TeamCity antes de 2024.07, la comparaci\u00f3n de tokens de autorizaci\u00f3n no llevaba un tiempo constante" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41829.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41829.json index f5af945b654..bf6e993c36b 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41829.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41829.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41829", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-07-22T15:15:05.487", - "lastModified": "2024-07-22T15:15:05.487", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains TeamCity before 2024.07 an OAuth code for JetBrains Space could be stolen via Space Application connection" + }, + { + "lang": "es", + "value": " En JetBrains TeamCity antes de 2024.07, se pod\u00eda robar un c\u00f3digo OAuth para JetBrains Space a trav\u00e9s de la conexi\u00f3n de Space Application." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json index a9c2ac0fb5c..7b454c3ec8f 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41836", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-23T12:15:10.240", - "lastModified": "2024-07-23T12:15:10.240", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json index 0967b409eb2..ede4c6c8ea7 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41839", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-23T12:15:10.520", - "lastModified": "2024-07-23T12:15:10.520", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json index 3e46013bb2e..c75b3908736 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41880", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T19:15:02.990", - "lastModified": "2024-07-22T19:15:02.990", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In veilid-core in Veilid before 0.3.4, the protocol's ping function can be misused in a way that decreases the effectiveness of safety and private routes." + }, + { + "lang": "es", + "value": " En veilid-core en Veilid anterior a 0.3.4, la funci\u00f3n de ping del protocolo puede usarse indebidamente de una manera que disminuye la efectividad de las rutas privadas y de seguridad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json index 9f1c4f18ca8..b238c132216 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4260.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4260", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-23T06:15:09.907", - "lastModified": "2024-07-23T06:15:09.907", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Page Builder Gutenberg Blocks WordPress plugin before 3.1.12 does not prevent users from pinging arbitrary hosts via some of its shortcodes, which could allow high privilege users such as contributors to perform SSRF attacks." + }, + { + "lang": "es", + "value": " El complemento Page Builder Gutenberg Blocks de WordPress anterior a 3.1.12 no impide que los usuarios hagan ping a hosts arbitrarios a trav\u00e9s de algunos de sus c\u00f3digos cortos, lo que podr\u00eda permitir a usuarios con altos privilegios, como los contribuyentes, realizar ataques SSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5602.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5602.json index d055812c68c..96a9445e314 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5602.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5602.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5602", "sourceIdentifier": "security@ni.com", "published": "2024-07-23T14:15:15.077", - "lastModified": "2024-07-23T14:15:15.077", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy." + "value": "A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.? Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria debido a una verificaci\u00f3n de l\u00edmites faltantes en NI I/O Trace Tool puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario. La explotaci\u00f3n exitosa requiere que un atacante proporcione al usuario un archivo nitrace especialmente manipulado. La herramienta NI I/O Trace se instala como parte de las utilidades de configuraci\u00f3n del sistema NI incluidas con muchos productos de software de NI. Consulte el Aviso de seguridad de NI para identificar la versi\u00f3n de NI IO Trace.exe instalada. La herramienta NI I/O Trace tambi\u00e9n se lanz\u00f3 anteriormente como NI Spy." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5818.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5818.json new file mode 100644 index 00000000000..32f1fb60345 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5818.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-5818", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-24T13:15:10.680", + "lastModified": "2024-07-24T13:15:10.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored DOM-based Cross-Site Scripting via the plugin's Magazine Grid/Slider widget in all versions up to, and including, 1.3.980 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3121073/royal-elementor-addons", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83a0150d-a9fa-4cc2-8fe8-a429747a9964?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5861.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5861.json index c5129a998c2..65e2d47d3ab 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5861.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5861.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5861", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T04:15:04.517", - "lastModified": "2024-07-24T04:15:04.517", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP EasyPay \u2013 Square for WordPress plugin for WordPress is vulnerable to unauthorized modification of datadue to a missing capability check on the wpep_square_disconnect() function in all versions up to, and including, 4.2.3. This makes it possible for unauthenticated attackers to disconnect square." + }, + { + "lang": "es", + "value": " El complemento WP EasyPay \u2013 Square para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n wpep_square_disconnect() en todas las versiones hasta la 4.2.3 incluida. Esto hace posible que atacantes no autenticados desconecten el cuadrado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json index 27a266119d4..60d1f0a6cfc 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6094", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-24T06:15:01.903", - "lastModified": "2024-07-24T06:15:01.903", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": " El complemento WP ULike WordPress anterior a 4.7.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6121.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6121.json index d0039558976..f79edf89ecb 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6121.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6121.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6121", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T20:15:04.267", - "lastModified": "2024-07-22T20:15:04.267", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service." + }, + { + "lang": "es", + "value": " Una versi\u00f3n desactualizada de Redis enviada con NI SystemLink Server es susceptible a m\u00faltiples vulnerabilidades, incluida CVE-2022-24834. Esto afecta a NI SystemLink Server 2024 Q1 y versiones anteriores. Tambi\u00e9n afecta a NI FlexLogger 2023 Q2 y versiones anteriores que instalaron este servicio compartido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6122.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6122.json index e66971d4db0..11115bd8e1f 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6122.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6122.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6122", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T20:15:04.470", - "lastModified": "2024-07-22T20:15:04.470", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service." + }, + { + "lang": "es", + "value": " Un permiso incorrecto en el directorio de instalaci\u00f3n para el servicio compartido NI SystemLink Server KeyValueDatabase puede resultar en la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local. Esto afecta a NI SystemLink Server 2024 Q1 y versiones anteriores. Tambi\u00e9n afecta a NI FlexLogger 2023 Q2 y versiones anteriores que instalaron este servicio compartido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6197.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6197.json index f6d8de67356..f05507d19dc 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6197.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6197.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6197", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-07-24T08:15:03.340", - "lastModified": "2024-07-24T09:15:02.390", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6231.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6231.json index a1274341bfa..86af576569f 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6231.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6231.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6231", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-23T06:15:11.330", - "lastModified": "2024-07-23T06:15:11.330", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Request a Quote WordPress plugin before 2.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": " El complemento de WordPress Request a Quote anterior a 2.4.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en la configuraci\u00f3n de m\u00faltiples sitios)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6420.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6420.json index c8155dde57b..2f179109384 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6420.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6420.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6420", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-23T06:15:11.413", - "lastModified": "2024-07-23T06:15:11.413", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6553.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6553.json index 11e6f5e7756..1e2a2e16ae4 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6553.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6553.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6553", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T07:15:02.350", - "lastModified": "2024-07-24T07:15:02.350", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.3.This is due to the plugin utilizing wpdesk and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento WP Meteor Website Speed Optimization Addon para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 3.4.3 incluida. Esto se debe a que el complemento utiliza wpdesk y deja archivos de prueba con display_errors activado. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6571.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6571.json index 5f5f9dcde39..08848ab27c7 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6571.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6571.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6571", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T07:15:02.600", - "lastModified": "2024-07-24T07:15:02.600", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Optimize Images ALT Text (alt tag) & names for SEO using AI plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.1. This is due the plugin utilizing cocur and not preventing direct access to the generate-default.php file. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento Optimize Images ALT Text (alt tag) & names for SEO using AI para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta la 3.1.1 incluida. Esto se debe a que el complemento utiliza cocur y no impide el acceso directo al archivo generate-default.php. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar en otros ataques. La informaci\u00f3n mostrada no es \u00fatil por s\u00ed sola y requiere que est\u00e9 presente otra vulnerabilidad para da\u00f1ar un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6629.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6629.json index 1f3fdd261be..68f555fdb34 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6629.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6629.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6629", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T07:15:02.820", - "lastModified": "2024-07-24T07:15:02.820", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json index e56fe718fa0..3fc25c5a7d3 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6638.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6638", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T20:15:04.723", - "lastModified": "2024-07-22T20:15:04.723", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow vulnerability due to improper input validation when reading TDMS files in LabVIEW may result in an infinite loop. Successful exploitation requires an attacker to provide a user with a specially crafted TDMS file. This vulnerability affects LabVIEW 2024 Q1 and prior versions." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de enteros debido a una validaci\u00f3n de entrada incorrecta al leer archivos TDMS en LabVIEW puede resultar en un bucle infinito. La explotaci\u00f3n exitosa requiere que un atacante proporcione al usuario un archivo TDMS especialmente manipulado. Esta vulnerabilidad afecta a LabVIEW 2024 Q1 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6675.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6675.json index 9e3464cac19..b774e58fc85 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6675.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6675.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6675", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T20:15:04.940", - "lastModified": "2024-07-22T20:15:04.940", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A deserialization of untrusted data vulnerability exists in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted project file. This vulnerability affects VeriStand 2024 Q2 and prior versions." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de deserializaci\u00f3n de datos no confiables en NI VeriStand que puede resultar en la ejecuci\u00f3n remota de c\u00f3digo. La explotaci\u00f3n exitosa requiere que un atacante consiga que un usuario abra un archivo de proyecto especialmente manipulado. Esta vulnerabilidad afecta a VeriStand 2024 Q2 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6714.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6714.json index 499343b3e74..b293626406b 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6714.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6714.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6714", "sourceIdentifier": "security@ubuntu.com", "published": "2024-07-23T16:15:06.543", - "lastModified": "2024-07-23T16:15:06.543", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in provd before version 0.1.5 with a setuid binary, which allows a local attacker to escalate their privilege." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en provd anterior a la versi\u00f3n 0.1.5 con un binario setuid, que permite a un atacante local escalar sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6717.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6717.json index a70005df20f..38a166fd133 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6717.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6717.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6717", "sourceIdentifier": "security@hashicorp.com", "published": "2024-07-23T01:15:09.190", - "lastModified": "2024-07-23T01:15:09.190", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HashiCorp Nomad and Nomad Enterprise 1.6.12 up to 1.7.9, and 1.8.1 archive unpacking during migration is vulnerable to path escaping of the allocation directory. This vulnerability, CVE-2024-6717, is fixed in Nomad 1.6.13, 1.7.10, and 1.8.2." + }, + { + "lang": "es", + "value": " HashiCorp Nomad y Nomad Enterprise 1.6.12 hasta 1.7.9 y 1.8.1 al desempaquetar archivos durante la migraci\u00f3n es vulnerable a que la ruta se escape del directorio de asignaci\u00f3n. Esta vulnerabilidad, CVE-2024-6717, se solucion\u00f3 en Nomad 1.6.13, 1.7.10 y 1.8.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6750.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6750.json index 9c7d9562998..1e5e94a2a18 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6750.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6750.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6750", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:03.477", - "lastModified": "2024-07-24T03:15:03.477", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.3.14. This makes it possible for unauthenticated attackers to add, modify, or delete post meta and plugin options." + }, + { + "lang": "es", + "value": "El complemento Social Auto Poster para WordPress es vulnerable al acceso no autorizado, modificaci\u00f3n y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones en todas las versiones hasta la 5.3.14 incluida. Esto hace posible que atacantes no autenticados agreguen, modifiquen o eliminen opciones de complementos y metadatos de publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6751.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6751.json index adff858cb9b..79e2d57b4be 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6751.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6751.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6751", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:03.810", - "lastModified": "2024-07-24T03:15:03.810", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.3.14. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to add, modify, or delete post meta and plugin options." + }, + { + "lang": "es", + "value": " El complemento Social Auto Poster para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 5.3.14 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en m\u00faltiples funciones. Esto hace posible que atacantes no autenticados agreguen, modifiquen o eliminen opciones de complementos y metadatos de publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6752.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6752.json index 3076fbbbad9..c6fa43ad1e7 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6752.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6752.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6752", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:04.033", - "lastModified": "2024-07-24T03:15:04.033", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018wp_name\u2019 parameter in the 'wpw_auto_poster_map_wordpress_post_type' AJAX function in all versions up to, and including, 5.3.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Social Auto Poster para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'wp_name' en la funci\u00f3n AJAX 'wpw_auto_poster_map_wordpress_post_type' en todas las versiones hasta la 5.3.14 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6753.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6753.json index 5fb9837ad02..a7d311dc033 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6753.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6753.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6753", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:04.243", - "lastModified": "2024-07-24T03:15:04.243", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018mapTypes\u2019 parameter in the 'wpw_auto_poster_map_wordpress_post_type' AJAX function in all versions up to, and including, 5.3.14 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Social Auto Poster para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'mapTypes' en la funci\u00f3n AJAX 'wpw_auto_poster_map_wordpress_post_type' en todas las versiones hasta la 5.3.14 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6754.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6754.json index 40c321ea7f5..fe503bea424 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6754.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6754.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6754", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:04.463", - "lastModified": "2024-07-24T03:15:04.463", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the \u2018wpw_auto_poster_update_tweet_template\u2019 function in all versions up to, and including, 5.3.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary post metadata." + }, + { + "lang": "es", + "value": "El complemento Social Auto Poster para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'wpw_auto_poster_update_tweet_template' en todas las versiones hasta la 5.3.14 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, actualicen metadatos de publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6755.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6755.json index 94f18f1425e..a258b7ab06f 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6755.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6755.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6755", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:04.687", - "lastModified": "2024-07-24T03:15:04.687", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the \u2018wpw_auto_poster_quick_delete_multiple\u2019 function in all versions up to, and including, 5.3.14. This makes it possible for unauthenticated attackers to delete arbitrary posts." + }, + { + "lang": "es", + "value": " El complemento Social Auto Poster para WordPress es vulnerable a modificaciones no autorizadas y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wpw_auto_poster_quick_delete_multiple' en todas las versiones hasta la 5.3.14 incluida. Esto hace posible que atacantes no autenticados eliminen publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6756.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6756.json index b9432602051..e2e5fc4e19a 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6756.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6756.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6756", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:04.897", - "lastModified": "2024-07-24T03:15:04.897", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Social Auto Poster plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpw_auto_poster_get_image_path' function in all versions up to, and including, 5.3.14. This makes it possible for authenticated attackers, with Contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible. An attacker can use CVE-2024-6754 to exploit with subscriber-level access." + }, + { + "lang": "es", + "value": "El complemento Social Auto Poster para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'wpw_auto_poster_get_image_path' en todas las versiones hasta la 5.3.14 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. Un atacante puede utilizar CVE-2024-6754 para explotar con acceso a nivel de suscriptor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6783.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6783.json index 6cff1b20721..4fcb4e355cd 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6783.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6783.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6783", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2024-07-23T15:15:06.210", - "lastModified": "2024-07-23T15:15:06.210", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code." + }, + { + "lang": "es", + "value": " Se ha descubierto una vulnerabilidad en Vue que permite a un atacante realizar XSS mediante contaminaci\u00f3n de prototipos. El atacante podr\u00eda cambiar la cadena de prototipos de algunas propiedades como `Object.prototype.staticClass` o `Object.prototype.staticStyle` para ejecutar c\u00f3digo JavaScript arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6791.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6791.json index 537a6605c19..85daa532e05 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6791.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6791.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6791", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T21:15:04.360", - "lastModified": "2024-07-22T21:15:04.360", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A directory path traversal vulnerability exists when loading a vsmodel file in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .vsmodel file. This vulnerability affects VeriStand 2024 Q2 and prior versions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal de directorio al cargar un archivo vsmodel en NI VeriStand que puede resultar en la ejecuci\u00f3n remota de c\u00f3digo. La explotaci\u00f3n exitosa requiere que un atacante consiga que un usuario abra un archivo .vsmodel especialmente manipulado. Esta vulnerabilidad afecta a VeriStand 2024 Q2 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6793.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6793.json index f7a64b529fd..d79fa0ca0de 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6793.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6793.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6793", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T21:15:04.547", - "lastModified": "2024-07-22T21:15:04.547", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A\u00a0deserialization of untrusted data\u00a0vulnerability\u00a0exists in NI VeriStand DataLogging Server that may result in remote code execution. Successful exploitation requires an attacker to send a specially crafted message. These vulnerabilities affect NI VeriStand 2024 Q2 and prior versions." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de deserializaci\u00f3n de datos no confiables en NI VeriStand DataLogging Server que puede resultar en la ejecuci\u00f3n remota de c\u00f3digo. La explotaci\u00f3n exitosa requiere que un atacante env\u00ede un mensaje especialmente manipulado. Estas vulnerabilidades afectan a NI VeriStand 2024 Q2 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6794.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6794.json index 0206c4be5a9..0cecd74ba35 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6794.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6794.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6794", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T21:15:04.733", - "lastModified": "2024-07-22T21:15:04.733", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A deserialization of untrusted data vulnerability exists in NI VeriStand Waveform Streaming Server that may result in remote code execution. Successful exploitation requires an attacker to send a specially crafted message. These vulnerabilities affect NI VeriStand 2024 Q2 and prior versions." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de deserializaci\u00f3n de datos no confiables en NI VeriStand Waveform Streaming Server que puede resultar en la ejecuci\u00f3n remota de c\u00f3digo. La explotaci\u00f3n exitosa requiere que un atacante env\u00ede un mensaje especialmente manipulado. Estas vulnerabilidades afectan a NI VeriStand 2024 Q2 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6805.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6805.json index eac11a8a94f..112a9fcdd4c 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6805.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6805.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6805", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T21:15:04.940", - "lastModified": "2024-07-22T21:15:04.940", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NI VeriStand Gateway is missing authorization checks when an actor attempts to access File Transfer resources. These missing checks may result in information disclosure or remote code execution. This affects NI VeriStand 2024 Q2 and prior versions." + }, + { + "lang": "es", + "value": "A NI VeriStand Gateway le faltan verificaciones de autorizaci\u00f3n cuando un actor intenta acceder a los recursos de transferencia de archivos. Estas comprobaciones faltantes pueden resultar en la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n remota de c\u00f3digo. Esto afecta a NI VeriStand 2024 Q2 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6806.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6806.json index a7261294dbc..c095a6bcc56 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6806.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6806.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6806", "sourceIdentifier": "security@ni.com", "published": "2024-07-22T21:15:05.133", - "lastModified": "2024-07-22T21:15:05.133", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NI VeriStand Gateway is missing authorization checks when an actor attempts to access Project resources. These missing checks may result in remote code execution. This affects NI VeriStand 2024 Q2 and prior versions." + }, + { + "lang": "es", + "value": " A NI VeriStand Gateway le faltan verificaciones de autorizaci\u00f3n cuando un actor intenta acceder a los recursos del Proyecto. Estas comprobaciones faltantes pueden provocar la ejecuci\u00f3n remota de c\u00f3digo. Esto afecta a NI VeriStand 2024 Q2 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6828.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6828.json index 7476978f615..ee86545e462 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6828.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6828.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6828", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-23T02:15:02.370", - "lastModified": "2024-07-23T02:15:02.370", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Redux Framework plugin for WordPress is vulnerable to unauthenticated JSON file uploads due to missing authorization and capability checks on the Redux_Color_Scheme_Import function in versions 4.4.12 to 4.4.17. This makes it possible for unauthenticated attackers to upload JSON files, which can be used to conduct stored cross-site scripting attacks and, in some rare cases, when the wp_filesystem fails to initialize - to Remote Code Execution." + }, + { + "lang": "es", + "value": " El complemento Redux Framework para WordPress es vulnerable a cargas de archivos JSON no autenticados debido a la falta de autorizaci\u00f3n y comprobaciones de capacidad en la funci\u00f3n Redux_Color_Scheme_Import en las versiones 4.4.12 a 4.4.17. Esto hace posible que atacantes no autenticados carguen archivos JSON, que pueden usarse para realizar ataques de Cross Site Scripting almacenado y, en algunos casos raros, cuando wp_filesystem no se inicializa, para la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6836.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6836.json index 4d6e4df877f..652d876ccc0 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6836.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6836.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6836", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T06:15:02.087", - "lastModified": "2024-07-24T06:15:02.087", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Funnel Builder for WordPress by FunnelKit \u2013 Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps & One Click Upsells plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to update multiple settings, including templates, designs, checkouts, and other plugin settings." + }, + { + "lang": "es", + "value": "El complemento Funnel Builder for WordPress by FunnelKit \u2013 Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps & One Click Upsells para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones en todas las versiones hasta e incluyendo 3.4.6. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, actualicen m\u00faltiples configuraciones, incluidas plantillas, dise\u00f1os, pagos y otras configuraciones de complementos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json index 4bc99ac7b92..4b6cfcd6357 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6874", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-07-24T08:15:03.413", - "lastModified": "2024-07-24T09:15:02.503", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6885.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6885.json index 29fe7440b04..c5da82880ab 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6885.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6885.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6885", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-23T02:15:02.610", - "lastModified": "2024-07-23T02:15:02.610", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MaxiBlocks: 2200+ Patterns, 190 Pages, 14.2K Icons & 100 Styles plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the maxi_remove_custom_image_size and maxi_add_custom_image_size functions in all versions up to, and including, 1.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento MaxiBlocks: 2200+ Patterns, 190 Pages, 14.2K Icons & 100 Styles para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta del archivo en las funciones maxi_remove_custom_image_size y maxi_add_custom_image_size en todas las versiones hasta la 1.9.2 inclusive. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos arbitrarios en el servidor, lo que puede conducir f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se elimina el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6896.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6896.json index 1b34b117db8..6b99a9fe31b 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6896.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6896.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6896", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T11:15:11.653", - "lastModified": "2024-07-24T11:15:11.653", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AMP for WP \u2013 Accelerated Mobile Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.96.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento AMP for WP \u2013 Accelerated Mobile Pages para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.0.96.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6911.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6911.json index 91a8dcaa2e4..c24f46418db 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6911.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6911.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6911", "sourceIdentifier": "office@cyberdanube.com", "published": "2024-07-22T21:15:05.327", - "lastModified": "2024-07-23T03:15:02.010", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Files on the Windows system are accessible without authentication to external parties due to a local file inclusion in PerkinElmer ProcessPlus.This issue affects ProcessPlus: through 1.11.6507.0." + }, + { + "lang": "es", + "value": " Los archivos en el sistema Windows son accesibles sin autenticaci\u00f3n para terceros debido a la inclusi\u00f3n de un archivo local en PerkinElmer ProcessPlus. Este problema afecta a ProcessPlus: hasta 1.11.6507.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json index a860a0daa41..4474af81fcb 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6912", "sourceIdentifier": "office@cyberdanube.com", "published": "2024-07-22T21:15:05.453", - "lastModified": "2024-07-23T03:15:02.097", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0." + }, + { + "lang": "es", + "value": " El uso de credenciales MSSQL codificadas en PerkinElmer ProcessPlus en Windows permite a un atacante iniciar sesi\u00f3n y eliminar en todas las instalaciones propensas. Este problema afecta a ProcessPlus: hasta 1.11.6507.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json index a24537ac3e5..4fc94b9be97 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6913", "sourceIdentifier": "office@cyberdanube.com", "published": "2024-07-22T21:15:05.560", - "lastModified": "2024-07-23T03:15:02.170", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Execution with unnecessary privileges in PerkinElmer ProcessPlus allows an attacker to spawn a remote shell on the windows system.This issue affects ProcessPlus: through 1.11.6507.0." + }, + { + "lang": "es", + "value": " La ejecuci\u00f3n con privilegios innecesarios en PerkinElmer ProcessPlus permite a un atacante generar un shell remoto en el sistema Windows. Este problema afecta a ProcessPlus: hasta 1.11.6507.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6930.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6930.json index 325125f0da6..21b690c3680 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6930.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6930.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6930", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T08:15:03.477", - "lastModified": "2024-07-24T08:15:03.477", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7014.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7014.json index 17942fed87d..9fc261c304c 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7014.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7014", "sourceIdentifier": "security@eset.com", "published": "2024-07-23T10:15:02.320", - "lastModified": "2024-07-23T10:15:02.320", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7027.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7027.json index 63120516174..0d02368a7f2 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7027.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7027.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7027", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-24T03:15:05.117", - "lastModified": "2024-07-24T03:15:05.117", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce - PDF Vouchers plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.9.3. This is due to insufficient verification on the user being supplied during a QR code login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing Voucher Vendor user on the site, if they have access to the user id." + }, + { + "lang": "es", + "value": " El complemento WooCommerce - PDF Vouchers para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 4.9.3 incluida. Esto se debe a una verificaci\u00f3n insuficiente del usuario que se proporciona durante el inicio de sesi\u00f3n con un c\u00f3digo QR a trav\u00e9s del complemento. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario de proveedor de cupones existente en el sitio, si tienen acceso a la identificaci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7065.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7065.json index 40ba7c249ca..2214b82207f 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7065.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7065.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7065", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-24T10:15:02.567", - "lastModified": "2024-07-24T10:15:02.567", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7066.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7066.json index a0830e4ca73..ec0dbb7befe 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7066.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7066.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7066", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-24T11:15:11.960", - "lastModified": "2024-07-24T11:15:11.960", - "vulnStatus": "Received", + "lastModified": "2024-07-24T12:55:13.223", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in F-logic DataCube3 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/config_time_sync.php of the component HTTP POST Request Handler. The manipulation of the argument ntp_server leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272347." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en F-logic DataCube3 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/config_time_sync.php del componente HTTP POST Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ntp_server conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-272347." } ], "metrics": { diff --git a/README.md b/README.md index e6f8606bf20..488afb279a2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-24T12:00:17.001709+00:00 +2024-07-24T14:00:17.863007+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-24T11:15:11.960000+00:00 +2024-07-24T13:50:31.710000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257883 +257885 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -- [CVE-2024-6896](CVE-2024/CVE-2024-68xx/CVE-2024-6896.json) (`2024-07-24T11:15:11.653`) -- [CVE-2024-7065](CVE-2024/CVE-2024-70xx/CVE-2024-7065.json) (`2024-07-24T10:15:02.567`) -- [CVE-2024-7066](CVE-2024/CVE-2024-70xx/CVE-2024-7066.json) (`2024-07-24T11:15:11.960`) +- [CVE-2024-3896](CVE-2024/CVE-2024-38xx/CVE-2024-3896.json) (`2024-07-24T13:15:10.453`) +- [CVE-2024-5818](CVE-2024/CVE-2024-58xx/CVE-2024-5818.json) (`2024-07-24T13:15:10.680`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `125` +- [CVE-2024-6751](CVE-2024/CVE-2024-67xx/CVE-2024-6751.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6752](CVE-2024/CVE-2024-67xx/CVE-2024-6752.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6753](CVE-2024/CVE-2024-67xx/CVE-2024-6753.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6754](CVE-2024/CVE-2024-67xx/CVE-2024-6754.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6755](CVE-2024/CVE-2024-67xx/CVE-2024-6755.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6756](CVE-2024/CVE-2024-67xx/CVE-2024-6756.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6783](CVE-2024/CVE-2024-67xx/CVE-2024-6783.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6791](CVE-2024/CVE-2024-67xx/CVE-2024-6791.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6793](CVE-2024/CVE-2024-67xx/CVE-2024-6793.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6794](CVE-2024/CVE-2024-67xx/CVE-2024-6794.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6805](CVE-2024/CVE-2024-68xx/CVE-2024-6805.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6806](CVE-2024/CVE-2024-68xx/CVE-2024-6806.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6828](CVE-2024/CVE-2024-68xx/CVE-2024-6828.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6836](CVE-2024/CVE-2024-68xx/CVE-2024-6836.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6874](CVE-2024/CVE-2024-68xx/CVE-2024-6874.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6885](CVE-2024/CVE-2024-68xx/CVE-2024-6885.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6896](CVE-2024/CVE-2024-68xx/CVE-2024-6896.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6911](CVE-2024/CVE-2024-69xx/CVE-2024-6911.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6912](CVE-2024/CVE-2024-69xx/CVE-2024-6912.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6913](CVE-2024/CVE-2024-69xx/CVE-2024-6913.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-6930](CVE-2024/CVE-2024-69xx/CVE-2024-6930.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-7014](CVE-2024/CVE-2024-70xx/CVE-2024-7014.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-7027](CVE-2024/CVE-2024-70xx/CVE-2024-7027.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-7065](CVE-2024/CVE-2024-70xx/CVE-2024-7065.json) (`2024-07-24T12:55:13.223`) +- [CVE-2024-7066](CVE-2024/CVE-2024-70xx/CVE-2024-7066.json) (`2024-07-24T12:55:13.223`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2a1e3c7a078..7fc2d75b7ec 100644 --- a/_state.csv +++ b/_state.csv @@ -109890,7 +109890,7 @@ CVE-2018-0176,0,0,99cd484bd1c7bb7de2b0f843c2256bc24f8042a808271e6e7557cabf410048 CVE-2018-0177,0,0,31eb7676608befeb6f438be18e8a392c751c61ceba1340d04c3c399d3e515061,2021-10-18T12:03:03.887000 CVE-2018-0178,0,0,fcc0266b77ab1fc75799d82f6a7c6e59e18c4d0d7343eda561cb6c3bd85d71f6,2023-11-07T02:50:59.347000 CVE-2018-0179,0,0,3c2d5cb2e0846f782c6813f35d4be6ee4a49d641383a34f8f5ff59a51f469623,2019-10-09T23:31:23.817000 -CVE-2018-0180,0,0,c501c49c280b69b7aeff94aa3a34049289ef809e2d1901066d94e2f8e883ed0e,2019-10-09T23:31:24.037000 +CVE-2018-0180,0,1,b9ca3637ba782db6501883b7ad2d3a94932ccf3deb124e0b81fcff9c428f2ae7,2024-07-24T13:50:31.710000 CVE-2018-0181,0,0,811dd4c57b896349cd31ed129599418e8c18a3b08fe30d97fa626af8c9874e16,2019-10-09T23:31:24.270000 CVE-2018-0182,0,0,6625e65dcb77de4ef278aa05492cde3cc56f8a01e69b687de74349299bbd4e21,2019-10-09T23:31:24.473000 CVE-2018-0183,0,0,94bb7ae6755330992bdc867264c86300ad3ce31abbe1e2b0fad60c3a06c8b64a,2019-10-09T23:31:24.567000 @@ -146607,9 +146607,9 @@ CVE-2020-11633,0,0,37cbcea5a77a962bf1e2b9e27f0ae16785183d1cba7013567d26b76f77193 CVE-2020-11634,0,0,151dce61605ff6717ebf94090aceba19201409fa20137c1f898caf40425b1d3f,2021-07-27T15:39:40.660000 CVE-2020-11635,0,0,2478794e3a7bbfb42301b801c9f6045a58be4c590ead95d38b5a9df813b1009c,2021-07-21T11:39:23.747000 CVE-2020-11637,0,0,adf0e85b69b992bf23350cfadd72968f90964afe06a851016f6f56d9b560d76c,2021-09-14T17:36:29.410000 -CVE-2020-11639,0,0,db5fb9f6acab8c676b85c5d774161e35fb7fd9c819de97223cced44e4933cd09,2024-07-23T18:15:04.820000 +CVE-2020-11639,0,1,367aa7f7af8817aefd9f251e9177b37f1aeae83b9b633ce8a346a4c6eaefa861,2024-07-24T12:55:13.223000 CVE-2020-1164,0,0,689cf2273ddf17764e610873f10f79f07f5534019190c9f4259c3e20ce76c79f,2021-07-21T11:39:23.747000 -CVE-2020-11640,0,0,9d9720b57a9b51bef658431b0b37e002cc97c8c7e9f6d04929102ba1a0eec410,2024-07-23T18:15:05.083000 +CVE-2020-11640,0,1,012e41151a00a414ccdc870fcd92adc59bd15e3c70a431ccc003f5af69da6dbb,2024-07-24T12:55:13.223000 CVE-2020-11641,0,0,b0f9e90a904914b5a85ce14dc4f011db0471b378fb4ea8f89ffee12ccf0c4743,2022-06-03T18:38:45.143000 CVE-2020-11642,0,0,284b6d2e8f3975d208a54f0130610bd937cc9d539252cf0e07e11d88f8ee114b,2022-06-03T18:44:51.203000 CVE-2020-11643,0,0,150fc52ada2768f3cd8fc05e6801ea9c78435009cbc2cabb045c6610cf099f69,2021-11-04T17:31:05.647000 @@ -153813,7 +153813,7 @@ CVE-2020-24075,0,0,a4e1c0929a794592036d4f4f55f2018c473c4420020ce6d38d3ff859bb8f2 CVE-2020-24085,0,0,36dc9ecfad21733adba79f670b8a0c7f72d1bc23a9ed5c08a1249114aa915aee,2021-01-30T01:52:56.210000 CVE-2020-24088,0,0,5daaaa8199391d28694f1b5e660719fee34f66a68451cf84904db2a0d6ae742c,2023-09-13T15:03:46.090000 CVE-2020-24089,0,0,7427b5dec3e8323e3589b26611c1fbfcb9d33a565a9c245ef2e62d02a728a986,2023-09-21T13:21:26.303000 -CVE-2020-24102,0,0,d70e8b75832fc04e2bddfe25a16d499636eb5c35c07d56ce58ff1feca4b44259,2024-07-22T18:15:02.967000 +CVE-2020-24102,0,1,4dc99be1c23b766b4f26e96f2c2ddde1049e7b757649b21d1f80b9b3d114d1f3,2024-07-24T12:55:13.223000 CVE-2020-24104,0,0,fbb4efcf58d1f727ffff0ae67b74aa346d7d8b26414283515bb2ec728cd84fb4,2020-08-31T16:29:12.210000 CVE-2020-24113,0,0,a33d0a4b1ae816dfcdb9871437627d7bc94b10a4e745b33597c039104d4ac8f1,2023-08-28T20:09:43.660000 CVE-2020-24115,0,0,30853f4c52f41b9976ea7ab90988e1af4c04baad5d97a60bd069017a25a9ac4b,2023-11-07T03:19:50.900000 @@ -190053,17 +190053,17 @@ CVE-2022-20695,0,0,a67218050b39b1ebcb3bb9d9ffe620f2393d7aa904bfc0db46b1b3ef9192d CVE-2022-20696,0,0,0e2ec17e85320daef5fa429716ab6e27435f89b1f94f0315cc9b4a011e075f88,2023-11-07T03:42:39.143000 CVE-2022-20697,0,0,ca091db34783bcd68d348033ed7f75688ed0d3c2afbe10bb81b76de2204d8437,2023-11-07T03:42:39.340000 CVE-2022-20698,0,0,54095f5556b313d88f3f5e122ea9374ff1e8a92c6b4d92dba6c3d83489770ded,2023-10-01T11:15:09.633000 -CVE-2022-20699,0,0,44d8e9bc712546b7fbe5b41689ac5e4ed88175a287a35a05152bd388b9d20cc0,2023-11-07T03:42:39.557000 +CVE-2022-20699,0,1,e254453ada9a1bd5adc3c782870b2ef2e4967f2991041d00d05716d5ac9241ea,2024-07-24T13:48:50.880000 CVE-2022-2070,0,0,ebf8102595490c2d4a5029670d3d8dcc1fca8784e6efdcf222581d18ab65653b,2022-09-26T22:39:00.960000 -CVE-2022-20700,0,0,2f1df01ef0ce9670fcfa176b35f9973e0127ebe23119cdae894871b8c302ef8a,2023-11-07T03:42:39.740000 -CVE-2022-20701,0,0,132707e7781506a2b3d7f7faca26e02ae57a3c96e9136da5bebd9150840320aa,2023-11-07T03:42:39.943000 +CVE-2022-20700,0,1,d16e53f01c4be018f921f79807007f55f3e6f1f87ad42b532a98a7e7a8dfeba2,2024-07-24T13:41:07.373000 +CVE-2022-20701,0,1,615eac12aacee411602a3db0cbfd72597dc3ebdb5e2aad3c6f0d87dfcad8bf0a,2024-07-24T13:38:21.353000 CVE-2022-20702,0,0,497a31546634167a7d1444c1f9b11f943d0874cc70ddd046a141d485d8c22070,2023-11-07T03:42:40.140000 -CVE-2022-20703,0,0,fa2bbedb14a88f5ec8d75e57f66b26a912f8d1113fa88f631f67b60d1d7e803d,2023-11-07T03:42:40.330000 +CVE-2022-20703,0,1,8b631797e12e5a4ae3f8f864b5fe05100d20e13f0991b79e4d7fcbc1b979491e,2024-07-24T13:35:37.437000 CVE-2022-20704,0,0,d1eaa2daef702c394337f9b3726615af78cf0936faca0be16b0e2c1b4a755d99,2023-11-07T03:42:40.520000 CVE-2022-20705,0,0,02d315eddcce14eab80b9e5cc82c1ff31aec9f933f37a203c061dad8cb2a33b1,2023-11-07T03:42:40.710000 CVE-2022-20706,0,0,fe0203e43dd8398ecf8d8fed0473fb3261e18714c854be4fd033d952cfc3e3f2,2023-11-07T03:42:40.963000 CVE-2022-20707,0,0,94a26cf44e28e2ae8a6418fa44cafdb3a4fe751c7b77b406fe788b5be26c3520,2023-11-07T03:42:41.160000 -CVE-2022-20708,0,0,2a8e492616fd7e89f663b384e715c62923bafcd111ec8d977599b0390b7f61a3,2023-11-07T03:42:41.357000 +CVE-2022-20708,0,1,a23a02bb80ca5070212136ec2b90055129a907e0f97e57b75b61843ef77629d5,2024-07-24T13:34:53.930000 CVE-2022-20709,0,0,68e1555d29248b3630b08bdc17bdfbf84325b72a0c26ec64368307f5a2b58a99,2023-11-07T03:42:41.540000 CVE-2022-2071,0,0,8bf9fb13da952a040d77a70c15958de046bed034eb5ae682c48171070a72d9fc,2022-07-29T16:41:26.513000 CVE-2022-20710,0,0,9f2e2199ca7c49b7570bf329953c584157d289937017c33c127fd7131b4fd735,2023-11-07T03:42:41.727000 @@ -224253,13 +224253,13 @@ CVE-2023-32462,0,0,e07a0b8cf235c91f117aab5542e8a1e08692a6b7bc816a6d84fdff7939ebf CVE-2023-32463,0,0,9c0648bf3a62c21ad36b1e856d010660c2e367e55959b2f6ee06517e731afabd,2023-07-05T18:33:55.533000 CVE-2023-32464,0,0,5002bc22d174d03b224c414e085222536ab31791807238bbf4cd033cfd86a1ab,2023-07-05T18:31:27.907000 CVE-2023-32465,0,0,3b910cb507c14d4c201ed99e11b2f097c6e541241b586413c4b2c4c1c1c5ebcd,2023-06-27T18:39:23.987000 -CVE-2023-32466,0,0,2390536344af0252ea883e678ac94b8ab2c71aa723dc425d7c107ee620d31531,2024-07-24T07:15:01.953000 +CVE-2023-32466,0,1,aa84849cfa08c7092fc7acbf5a9b02abc1f7dc11e53d6384fb36872c6aab0adf,2024-07-24T12:55:13.223000 CVE-2023-32467,0,0,92dc670a37cbc195f9aee3f2f699c2fc979d516f1a92fbab736ae2a84445b2ab,2024-07-11T13:05:54.930000 CVE-2023-32468,0,0,3aaf8d963cbce4f5d5319dd617a26b2fa711b5f2996fe21d5e604c3f9b4c55f8,2023-08-03T18:23:50.197000 CVE-2023-32469,0,0,6b66634362347d05c43893f73f84b043ba50f94ace2183d7db139e18e104e674,2023-11-29T19:49:42.947000 CVE-2023-3247,0,0,dc024bb4c63f22d2d922c859e74704e54f9264e2ea29c37dc55d1fd134910214,2023-08-01T16:38:09.033000 CVE-2023-32470,0,0,1d1831b86e4f49c8df32eecce1f1b20c4ae5ed94d12e60777f158aa9c9815ea1,2023-09-13T14:37:24.530000 -CVE-2023-32471,0,0,c878c1d06f25f64c1e1f626dca3430edb93f9cfc2f126ec944df578916f4b138,2024-07-24T08:15:02.393000 +CVE-2023-32471,0,1,8e25c012663f3a81d6a55bccb2d24b5cdd8cd51ae78f2b7beced520b9c3113e4,2024-07-24T12:55:13.223000 CVE-2023-32472,0,0,17c2725f723be369591982ed957fd026847faf3ab703e66da6749f40fa5279fc,2024-07-11T13:05:54.930000 CVE-2023-32474,0,0,d6a828b10f15016d3a4296d029159cd45eff255f547ac600257d313f221bad5c,2024-02-12T21:37:18.687000 CVE-2023-32475,0,0,1d606a374c4ae0f3a73cad6cf7cc78e1a939167312580108942fa2c074cb968a,2024-06-07T14:56:05.647000 @@ -235777,7 +235777,7 @@ CVE-2023-48358,0,0,fd42ec30edf0b4bc87a28db5c64e1d59dfe5aa82b9d6889cf14523d9f1e0b CVE-2023-48359,0,0,ccb3f595ead47de0e806cbd75338965d59fe717be8a86c3f09bb684f53159c8a,2024-01-24T20:35:30.263000 CVE-2023-4836,0,0,08652eb22d8d820537a32135d6cdb0072945ba41f47c5813b91b860f7c20fc7e,2023-11-08T18:30:46.937000 CVE-2023-48360,0,0,5b6e5d7b5fe192061e064b563bfee066f7ff8cfae4d4ee5e2ae28883a2e5e83c,2024-01-05T22:04:53.347000 -CVE-2023-48362,0,0,ebfaafb940cfdd6e0c33e0912a5376be9ed5968439213870a60215f83c210d62,2024-07-24T08:15:02.627000 +CVE-2023-48362,0,1,3df0b171100151d39c4325fb280aa8ac39964934d2974ee03f87fa3088272618,2024-07-24T12:55:13.223000 CVE-2023-48363,0,0,2bfc4ec5e7e25cb483b369af5958deb5dd28dd7cd426eb9cf32d0a8e81c4f250,2024-07-09T12:15:10.147000 CVE-2023-48364,0,0,b82391d36b810ac4492568e964e6ec98f18ee88a09432c62aa0865e4a71170e3,2024-07-09T12:15:10.277000 CVE-2023-48365,0,0,08ac0336d1b7c8130bf42658d4f4f8599137b51618c91dfe4765b7deedb1fc3a,2023-11-29T20:43:54.133000 @@ -241480,7 +241480,7 @@ CVE-2024-0756,0,0,b74435a4e5e1d4f3b3a4ce7f115d91d803212fb6f57df8fa4a2fa8d8698a38 CVE-2024-0757,0,0,82f1d5fe239632b077ccabeaf1b70c316c565ea22ca5e26cba66c98605a2ac8c,2024-06-04T16:57:41.053000 CVE-2024-0758,0,0,fc97ebc5b04803b57ecd71df236ee98d87d4a211b2215bb34049825cdbd967a6,2024-01-26T17:00:10.607000 CVE-2024-0759,0,0,1f29bc7ec90b9be141ba5df168c832467834f0104b9d12619d749a3c91302f63,2024-03-07T20:15:50.480000 -CVE-2024-0760,0,0,8105c8416b50506009b355699668dee4859403b64711173a887ee0291d0a1145,2024-07-23T16:15:04.620000 +CVE-2024-0760,0,1,36f24b399642a7d2e4a3be797e5822ecc21a02ca3e694d29c61f205ac07dd803,2024-07-24T12:55:13.223000 CVE-2024-0761,0,0,b79031e86661bd45f67f34e880253c63ee13d5042f1a53406b385d1b1dffaecd,2024-02-13T17:16:46.780000 CVE-2024-0762,0,0,81ad586535781fa8baa3508ec280780590072000f5a50fe32a89e5b366d40ac6,2024-06-21T10:15:10.580000 CVE-2024-0763,0,0,5db758bc3605bfbe323fa32ed26d84a2f001f92484a51218ea35fbdc0710d446,2024-02-28T14:06:45.783000 @@ -241681,7 +241681,7 @@ CVE-2024-0977,0,0,4dea6129caae85894314c934930c2101596d2996e50ec3c75a7e794655207c CVE-2024-0978,0,0,a03b6af7d51db1804e2eaed08f8aa81c6b9c0077650321c83e62ecd6ffee9fe3,2024-02-29T13:49:29.390000 CVE-2024-0979,0,0,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2c4,2024-07-02T14:51:28.827000 CVE-2024-0980,0,0,c8c9084fb2baad3341765fe36b79c09c499a2498d7806837427d52160f9ced2a,2024-07-03T01:44:56.397000 -CVE-2024-0981,0,0,40cd9a859dc34a1fb54c56f91313b668392374576a011c09f212eb6dc74090f4,2024-07-23T21:15:12.773000 +CVE-2024-0981,0,1,8e56067a329ae8be3c50d75a950124e3f0907862c1ec8eaaefc75c7ab7488249,2024-07-24T12:55:13.223000 CVE-2024-0983,0,0,e4b8907c304c2092b03bf4a362956e919545b388414974dac04b6f4743499982,2024-02-29T13:49:29.390000 CVE-2024-0984,0,0,73a3a7bd606259afe92894700c99ddae6e9a89e966e6347fb231a8eb1fd7abd3,2024-02-29T13:49:29.390000 CVE-2024-0985,0,0,6feb39a8a7f264b3cb456efd47a6c85fdf3bdc2b683c0aef1c01ee214b73b389,2024-07-10T18:15:03.083000 @@ -242238,7 +242238,7 @@ CVE-2024-1571,0,0,bfa27c72fb27e25145e1d8fbaa159be8f6817ae8b22600888e4724fd08ccce CVE-2024-1572,0,0,ce54662d932d47130273925c29aeed2cfb97655394c2c48a84b3a3915cba5f12,2024-05-02T18:00:37.360000 CVE-2024-1573,0,0,1dca0fc4b174522b059a5ada22a974faf13b9e7ff7169f0c03f3321575fb2f67,2024-07-05T12:55:51.367000 CVE-2024-1574,0,0,72feffe42c72d6830d032663fa96f8a42adaa592b8140c7ff86296f6edebc03d,2024-07-05T12:55:51.367000 -CVE-2024-1575,0,0,b51a003e56926290a8a8111fbb0b9e9fbe604b559269ddfadec7c4940b97ee96,2024-07-23T02:15:02.090000 +CVE-2024-1575,0,1,72640f5ac75448b4b5509a8cb432003a1dfdf54ba22e8912d56e4943fbc2b8dd,2024-07-24T12:55:13.223000 CVE-2024-1576,0,0,53cb5dbc448926f2ab1efc2aadbe2dfad5145a0890b1fd74dd7c940df36048b4,2024-06-13T18:36:09.010000 CVE-2024-1577,0,0,0825f77547377b72aa868b67a204fdb0b73ad4a5025220d6124ec5802e6bc449,2024-06-18T13:15:51.627000 CVE-2024-1579,0,0,b6d8173dad7692a86ca6531cf14391459a611253254c72b5260cedefe5ac123a,2024-04-30T13:11:16.690000 @@ -242375,7 +242375,7 @@ CVE-2024-1732,0,0,834564798b34803457a0ec9cad4eefb5bcc466f88b5c86130580cd8ef81bdf CVE-2024-1733,0,0,1de98e53179418755768544ec663a550e1c566834940320a34ae086f141e0f3f,2024-03-17T22:38:29.433000 CVE-2024-1735,0,0,3dcff7ae67c98fab6233fc660b83fa45dc36cbd0301a4874decf976f37ddb465,2024-06-12T08:15:50.043000 CVE-2024-1736,0,0,a622ca00070de7a96b73d1a11c2dcf2634e69d5606345f8f86e99a97ccacdaf4,2024-07-18T19:50:31.223000 -CVE-2024-1737,0,0,800111f0aa4745b9ce36cd934896a6a79c8a3bc8bbffe5c389a9c2f5ecec8083,2024-07-23T16:15:04.713000 +CVE-2024-1737,0,1,1e9882d67e688aa57cd7343caeee7823e7b6211bb225680c6854687540557338,2024-07-24T12:55:13.223000 CVE-2024-1738,0,0,65086d20a025a8acdbd054263ca4cd14eb5b5ba61d808610c94ef2eec44edd2f,2024-05-15T16:15:09.807000 CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000 CVE-2024-1740,0,0,974b4647e97273950b6a297affa420d08f59acef309aa37814c6598a456898d5,2024-04-10T19:49:51.183000 @@ -242596,7 +242596,7 @@ CVE-2024-1971,0,0,0d9cb5107f1036f4f23265da8dd7b2bd2dcf4479650a723be6560fae09ba01 CVE-2024-1972,0,0,2560881ff7431f691f7bc00728ec8a23e2620398774dabc33f53c4508cee2e65,2024-05-17T02:35:43.363000 CVE-2024-1973,0,0,626b2f0735da4862b031577cf6d60a60bb435d6eef085a140fda3327fd09bd68,2024-03-26T12:55:05.010000 CVE-2024-1974,0,0,dc475e5db2810e48258099e8096a48a8d4eea51b1241d562afef1cfd4323c64d,2024-04-10T13:23:38.787000 -CVE-2024-1975,0,0,f8e48c48ca9653e070745c933b045525bfa64c87797ea477b65a6ae3d8d7f41a,2024-07-23T16:15:04.797000 +CVE-2024-1975,0,1,beaef9077e417c5b88d4f7e7a33c3d877a45569e428b187efa80dfd126df1238,2024-07-24T12:55:13.223000 CVE-2024-1976,0,0,c42fde98a9f4f021d37eae05be5cdd6a425eba391cce3b7b3b2e8b240d70bd79,2024-02-29T13:49:29.390000 CVE-2024-1977,0,0,f4c93cb09e0dd632ab410c1ff88e1a572fb17d35be648b109a192a65dc30f9e6,2024-02-29T13:49:29.390000 CVE-2024-1978,0,0,194a996e86c18d7c40d1315b29a524d0f48e8a7d042ccb89cd8a2a6beb64d004,2024-02-29T13:49:29.390000 @@ -243665,7 +243665,7 @@ CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 -CVE-2024-21552,0,0,6eebfe9997a6142e992225d163ec9b3ba46054afa1c1b0a4a6018d7345a8c7bd,2024-07-22T15:15:02.410000 +CVE-2024-21552,0,1,cca88d3958ef8dbde43c3d8aa2af78ed997fde7ae88029225af47b23b037e5fa,2024-07-24T12:55:13.223000 CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000 CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000 CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000 @@ -245485,7 +245485,7 @@ CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab131 CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000 CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000 CVE-2024-24506,0,0,352f7b438b05b4fbf04fde226f661101b73c52d15d081ca65fec9f440b295fc5,2024-04-03T12:38:04.840000 -CVE-2024-24507,0,0,20493e0b83b92d513dcf2850c558e9822809c2d0b02020c54d3b4d23ef54525b,2024-07-22T22:15:02.200000 +CVE-2024-24507,0,1,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000 CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000 CVE-2024-24511,0,0,eae91992a4f8ae9aeded116229f78eeb98fc9499dd99da81c095e8822d970bce,2024-03-04T13:58:23.447000 CVE-2024-24512,0,0,5297ae1840ce088f7a7ad9c82816ab5d47fccf4784d399ef43fa4059b97a6a10,2024-03-04T13:58:23.447000 @@ -246216,7 +246216,7 @@ CVE-2024-25634,0,0,a6c0976398d76132e45109770c34649b9cd1b53574ce636d0b3d3dba0d5b6 CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b4eb,2024-02-20T19:50:53.960000 CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000 CVE-2024-25637,0,0,6b107052af4924b87ae030a7574b9b21f62a146f03952919ea9b1d4b0e21ed3d,2024-06-27T12:47:19.847000 -CVE-2024-25638,0,0,774894cf7a7f1a2a03f1711afbd887e27f6fe04a7e9c091c9b5327b5b169ef48,2024-07-22T14:15:04.593000 +CVE-2024-25638,0,1,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000 CVE-2024-25639,0,0,2e0133ad446d332cd68f57f778e89c8682ede3319349a698b825e88d07ce11db,2024-07-08T15:49:22.437000 CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000 CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000 @@ -246479,7 +246479,7 @@ CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cda CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 -CVE-2024-26020,0,0,b7cb9998c266b18c578d825016b36ae1b03ddcf13a744272fe37b72423c0c330,2024-07-22T17:15:03.240000 +CVE-2024-26020,0,1,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000 CVE-2024-26023,0,0,670e783dc656d270b96b38e7fba1adff0be56adda08591c41f9bc61ed8e8e6a6,2024-04-15T13:15:31.997000 CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000 CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000 @@ -248454,7 +248454,7 @@ CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70d CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000 CVE-2024-28683,0,0,a4d093be60b3c2d6b460f6a76cb45ebc186bb3e16caaa646235de3d01aeda1d8,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,dfd73b6865a99ea6334fc6b8649a9d09bd29a09bbb6221cc4e10b05f5c40ada5,2024-03-13T14:28:45.217000 -CVE-2024-28698,0,0,80126620817687c6f2fbc60da0e8df85a6da4c88a25932dd2e46248caee8fa00,2024-07-22T18:15:03.120000 +CVE-2024-28698,0,1,6629faaa6dc4486898bcd56bcd2d9c071f21f9cd7af286acc070a1d3c8580cbd,2024-07-24T12:55:13.223000 CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 CVE-2024-2870,0,0,101cdd5ef34ec78aee7279476042f6231ac50ceb8dcc24da905d675c6dbc10c3,2024-07-15T13:00:34.853000 CVE-2024-2871,0,0,a7a747cc7e44787061231b304b7fa297ab3e10c5c0c5d67f97a2b8176c2eaee9,2024-04-10T13:23:38.787000 @@ -248722,10 +248722,10 @@ CVE-2024-29063,0,0,a8033ce9e699f35cb65dc8d63268bfdd99aa16f594ad08413d90e8003a22b CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a252,2024-04-10T13:24:00.070000 CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000 CVE-2024-2907,0,0,bd4e59455721fd47a3f3bf4cc54009a430bac090133efd0393d311456e4d173d,2024-04-25T13:18:13.537000 -CVE-2024-29070,0,0,658c5d4744dd1a3fb2b6b00c1f6f1676244532e9076a8efb82759dd47c030e95,2024-07-23T09:15:02.503000 +CVE-2024-29070,0,1,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000 CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000 CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd995,2024-06-10T18:15:30.110000 -CVE-2024-29073,0,0,5c3ae86874769801c4eb11bcdfeb51908893e8039c75c17f2607c942f1e7b0de,2024-07-22T17:15:03.340000 +CVE-2024-29073,0,1,edd87d03e74abbe3093f937688b072e38c5d4ed0ca6dad718f63073566a86616,2024-07-24T12:55:13.223000 CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000 CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000 CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 @@ -250830,7 +250830,7 @@ CVE-2024-32147,0,0,ed14700cccfb0cda87a633109f0f7bc757ba5c2081f42bfda22f3a7feb6f7 CVE-2024-32148,0,0,22eaa682ca57be740d99255c2e5fbd248f14af606d84d6d3c9100973529ff0b8,2024-06-13T18:36:45.417000 CVE-2024-32149,0,0,b2b226678f5b6fc3063af16db3df1b1f5beae60c5b5de2cd72494f3a01514fcc,2024-04-15T13:15:31.997000 CVE-2024-3215,0,0,e5fb2a5f0603876a47fbaf0581a5b0a27f3e787377440e3d933b055fa124676e,2024-05-02T18:00:37.360000 -CVE-2024-32152,0,0,f06c2f0dfe06a8f70038db2076eae76d0bec52416a9d81ba5af39a305f48fded,2024-07-22T17:15:03.493000 +CVE-2024-32152,0,1,a8965bd98aaf555e9ed23e2749d018dcc788d77b05f790c2a8051b506ebc5a9c,2024-07-24T12:55:13.223000 CVE-2024-3216,0,0,36d9056f12425336af262dd787bf04647621823ca6d005690ab6601a9ec48458,2024-04-08T18:49:25.863000 CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000 CVE-2024-32162,0,0,25479e1427613088330b7423836da6b673acaf22cdb31bae36970ab530a99a28,2024-04-17T20:08:21.887000 @@ -250978,7 +250978,7 @@ CVE-2024-32456,0,0,d14077b9c0d3fd624bb090c8902408112668af5dcd1ec1392b17398cab655 CVE-2024-32457,0,0,e19d3294c5bd0f5932cb781ff1a6aaf0ad9675f665e5d230b25da52c6eb0ab24,2024-04-17T12:48:07.510000 CVE-2024-32458,0,0,61e534ffc05a2fd1f0c764d7b2f3b2dc812bdfe09bd360efea2bba78b4568568,2024-06-10T18:15:32.790000 CVE-2024-32459,0,0,565c2820f9f40b3ae7ac4380cb45711f29b0c6684b22418bec49fb00db4f3c9e,2024-06-10T18:15:32.940000 -CVE-2024-3246,0,0,ee037dd96ee988a9a5377ef2ebf710eceec3f069a687fae5fc3a3773fe1f463f,2024-07-24T04:15:04.280000 +CVE-2024-3246,0,1,c79fd28ca59ab763673faa857c0bce8ace903e0e33808dbfea5f83a6b45b9730,2024-07-24T12:55:13.223000 CVE-2024-32460,0,0,791d6f5eece9c40a7a8e9bf5719f0d21a50aef5a23765ed0735f0298c727e1a8,2024-06-10T18:15:33.033000 CVE-2024-32461,0,0,7a7784b51f232219ca425c17e34b523d7eced76a74e448dd98d2af59b52810da,2024-04-23T12:52:26.253000 CVE-2024-32462,0,0,3d3d05bcc9e36c0ca38630e8f66ae4fc7d4ac5c6b704d1bc0d85811d4a35b050,2024-05-01T18:15:24.140000 @@ -251002,7 +251002,7 @@ CVE-2024-3248,0,0,250b2dbd79112a5c409f75ad686b891df81af7a505fb4de44a036ccb0053b1 CVE-2024-32480,0,0,19c71cf4b4927bc3b3fafd8de700ee992dac8872f5c7a42dd66fe5bbf9c168fa,2024-04-23T12:52:26.253000 CVE-2024-32481,0,0,c54808d23bab7c98fa436bfac9ea5eb550592b31e4fb9b6afe22c10c85cad030,2024-04-25T17:24:59.967000 CVE-2024-32482,0,0,5a4b91f74f5513de658c6d05ee36d1ae3d22e82071be37fe63fc64fe4f8fa23a,2024-04-24T13:39:42.883000 -CVE-2024-32484,0,0,5d109efecfcc1aea5e65b876a4b09912982b801ff26bb4fbe846290d085519f1,2024-07-22T17:15:03.600000 +CVE-2024-32484,0,1,afbf3ac48d40767c4826dc7dad5b75d298e5e40ad07f8bc177a6c0da4211d395,2024-07-24T12:55:13.223000 CVE-2024-32487,0,0,9b75323b8c9e4bc0024b685cf9b8c4f1bcf527dbb8fcae997b90b5ab98a4af95,2024-07-08T14:18:29.363000 CVE-2024-32488,0,0,81a2243b5e2ca5f70c6717b1a678a8acd8bc42e42f87de6777fd53420c26e9da,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,353f93b44cffff0cad2c885ce60dc0501a49e1b91044e82681218ae35f05717b,2024-04-15T13:15:31.997000 @@ -251447,7 +251447,7 @@ CVE-2024-32964,0,0,b623874e6a0274971696b1b7da0d2f443f746dffed315cb1a514ae93f0a27 CVE-2024-32966,0,0,c438f55196809bbbc973f729157ff8c0c6df1250009855187f1fc3a5f9a87d17,2024-05-01T13:01:51.263000 CVE-2024-32967,0,0,edb16c37f9c2fc6d1e9a47803a7b1119309dad5cfcac07761a5d0ee65a1bacec,2024-05-01T13:01:51.263000 CVE-2024-32969,0,0,6ef0f8d88265e6683965945b29c1106dae41ceee98d494ed8c3a06c6d351066c,2024-05-24T01:15:30.977000 -CVE-2024-3297,0,0,e4dc45707207617e17cd6ca7c1187cdab66d5dfe2081d261d3210381d15c7582,2024-07-24T08:15:02.880000 +CVE-2024-3297,0,1,1d78b9b9ec8cf08b428212aae468d0b6a6340efa6b238bd5187fbcecf64d21ad,2024-07-24T12:55:13.223000 CVE-2024-32970,0,0,5a01359cfb986ee6b849bc2a7e60567b8f37d4b5ce19db35dccc9f7464a14062,2024-05-01T13:02:20.750000 CVE-2024-32971,0,0,ab8a148088c73648f89e5b394dd5a94a547e8c2e4b0230a8c2d6e56a7f3b753a,2024-05-02T13:27:25.103000 CVE-2024-32972,0,0,dc515bb8aec39a31fdf47e578fc51873affc085f71d155b12852513b737283e1,2024-05-06T16:00:59.253000 @@ -252094,7 +252094,7 @@ CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c1 CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000 CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000 CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 -CVE-2024-34128,0,0,c593ef6aa2409394e2909ac7d50f53c977c58dcc4c7ebddfe344508dd50a7d07,2024-07-23T12:15:09.763000 +CVE-2024-34128,0,1,c97915102dfd0e38974bf97aab68fa646e656f1eb3dd71f8dec0f1259a6cd8d8,2024-07-24T12:55:13.223000 CVE-2024-34129,0,0,4b371bd2ce78a755ab5bce8486ffc40418a5eef964d8e637f4bd806924a46c43,2024-07-19T17:30:15.177000 CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,39c33a1c2e45222da36d81ad20fcf2f2dae4088c0999d560d63f2526f4c81a40,2024-07-19T17:28:29.150000 @@ -252181,7 +252181,7 @@ CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70 CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000 CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 CVE-2024-3432,0,0,e551b49681f8859ae36cb659ecb1c23b498009c34da11d9120924e791a83c404,2024-05-17T02:39:55.693000 -CVE-2024-34329,0,0,f0b125a3eec79519978e9d3bc59340a8f3872e8c5d0319dc45c3fad2992d6c93,2024-07-22T20:15:03.673000 +CVE-2024-34329,0,1,55e441069bbbc6aee815994671546edad2f026f6f85fc0fafecd140bdb4cb47a,2024-07-24T12:55:13.223000 CVE-2024-3433,0,0,edcd29ee74449d6852e66c4b5448756dccce5e71a9bad9a5025cf08aebadb09b,2024-05-17T02:39:55.780000 CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 CVE-2024-34338,0,0,0b7082b91aa78856b4b16b824fb5642c1377f61ea50b332ded8dd5ce396d2aa9,2024-07-03T01:59:54.407000 @@ -252351,7 +252351,7 @@ CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682 CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 -CVE-2024-3454,0,0,b41fe92c6b1ce4c99591a736aa8a2914195391fb0c5e815d3f5ffaac980f0333,2024-07-24T08:15:03.123000 +CVE-2024-3454,0,1,7dc4bcdd2a945b795b21148e6388bc0be4868de234be8b0b4ce54b7e0cd35a3a,2024-07-24T12:55:13.223000 CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000 CVE-2024-34547,0,0,823aa1b861a91366dddc57a5e7dd1048515142481ea3eeb344f690ed0a7ca84c,2024-05-08T13:15:00.690000 CVE-2024-34548,0,0,8caa33bdc3c5be33f667017355107b8d8cdf99ab7255d3c04528b6e278893606,2024-05-08T13:15:00.690000 @@ -254175,7 +254175,7 @@ CVE-2024-3737,0,0,26f370727648bebdbdb4484feb8794c0f4f6f501db44738bd488af3fc5030b CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000 CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 -CVE-2024-37380,0,0,e39db0f973b05abf018aed6568fd88f1fdf125311abdbc792cc57d349b118dda,2024-07-22T19:15:02.537000 +CVE-2024-37380,0,1,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000 @@ -254505,7 +254505,7 @@ CVE-2024-37989,0,0,3b94113ccd1695e55c704a3f38d763d5ec54c44f354e4b1fe1efc7884dacd CVE-2024-3799,0,0,099fb34e0ee28d9311fbf29cfaad6b5950bd5e198b1ff9c15d8b2a88d4538973,2024-07-12T10:15:02.353000 CVE-2024-37996,0,0,e39e1581961cad8f5d5dd910100078a11657ad2090cbed7264c9a8bad1310bf5,2024-07-09T18:19:14.047000 CVE-2024-37997,0,0,880ea769e8919f97f57b9878ce449ed40b5cbca31c8883be4629ac4f6a893243,2024-07-09T18:19:14.047000 -CVE-2024-37998,0,0,e4b34239e85a2b7f88d2ee6d8fec8b785efc86457afe4a3ce02fabe648c6ff75,2024-07-22T14:15:05.453000 +CVE-2024-37998,0,1,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000 CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 @@ -254598,9 +254598,9 @@ CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000 CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000 -CVE-2024-38164,0,0,e1415beaca389080aa23dd2faa51ccad8eff9197502c06cc81d7f40be2a0bb3e,2024-07-23T22:15:08.420000 +CVE-2024-38164,0,1,5b186cbc5566689f6db90fce6408389fb12c0a89114180da9a34ca4451572c56,2024-07-24T12:55:13.223000 CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000 -CVE-2024-38176,0,0,993df48e6028513d3ccacfd5e1b4141c5c93ba3488fe4e0be6ab2b18851df8a8,2024-07-23T22:15:08.660000 +CVE-2024-38176,0,1,e3734105ed990bd245172ae5ed3a05cd363068cba1d963f987cf1be1d8483272,2024-07-24T12:55:13.223000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000 CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000 @@ -254992,7 +254992,7 @@ CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f46 CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000 CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000 CVE-2024-3894,0,0,ca8cdba6c6957ab6848a65692183a74921d9acddfe51bc85133b173556c88ac8,2024-06-20T12:44:01.637000 -CVE-2024-38944,0,0,94b1037d427f11d5cb8eb1d5d915230340cebe2b1f6df37cf505fb265db5e634,2024-07-22T19:15:02.760000 +CVE-2024-38944,0,1,948f3b1f9a16710c91801dcf50c7cb2e7491ae3c4a3615beac505b631b576a8f,2024-07-24T12:55:13.223000 CVE-2024-38949,0,0,f1b76a5b198d8cd8e7622b115a8855a4de307f59cefd5215d45fde9cfa0e8235,2024-07-08T14:18:46.730000 CVE-2024-3895,0,0,f1c1a204b725be702c93f4b9fc036bb365050aae2160c5f507be071f13b94669,2024-05-02T18:00:37.360000 CVE-2024-38950,0,0,22d7d74f3fd2a34d71ced28539afa875128a0351336aca0ca02490a642cb6f36,2024-06-27T12:47:19.847000 @@ -255000,6 +255000,7 @@ CVE-2024-38951,0,0,68f3f4da755e62c58899a1c14a3bba19a0238b69cfd8361c9d435e588ebf0 CVE-2024-38952,0,0,f3ef3fd79d2aa5fbb6eac9aa4ae095adbf433e668b0d02d175100cd59627c991,2024-06-25T18:50:42.040000 CVE-2024-38953,0,0,dbde02c3cebb008392d98c40885c4b018b5aa478839fb4271aaec02242524f62,2024-07-01T16:37:39.040000 CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 +CVE-2024-3896,1,1,d41d5bc5495384182084b9ceaf0ce580d5fa4f1a6952dbc3dc4ad6e7d53b051e,2024-07-24T13:15:10.453000 CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000 CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07ca,2024-05-02T18:00:37.360000 CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000 @@ -255106,7 +255107,7 @@ CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2 CVE-2024-39248,0,0,7a563316fd3453bbdb2eea83c64c484bfa847d40ebdeede8de43d451f8cafde1,2024-07-05T12:55:51.367000 CVE-2024-39249,0,0,a8f23e36f9dec7b6dd0c3ed6214de893182dd9a10ec50f4f0f0e7c02e4cdf075,2024-07-09T06:15:01.913000 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000 -CVE-2024-39250,0,0,670ddf2079aeeda0642d1da73a5241b253c98d6877705f74a8fea8a576d09e0f,2024-07-22T20:15:04.057000 +CVE-2024-39250,0,1,206c1c0772f8b7974ecbc9b8c1cc32aa375c8a841d74a38d55059a2612fc1bb2,2024-07-24T12:55:13.223000 CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 @@ -255299,7 +255300,7 @@ CVE-2024-39597,0,0,df02a109c472b1bfeae3b55516c86c7132897faff9d94f70a126a46568b13 CVE-2024-39598,0,0,565f2774e84c891d5996cf36fa669402a223a2e5a490f549b69365c6075a44b7,2024-07-09T18:19:14.047000 CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000 CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000 -CVE-2024-39601,0,0,61817af9355d836186440dc7972c7597190aa4a0231358a845a7ef4bbdfce49d,2024-07-22T14:15:06.107000 +CVE-2024-39601,0,1,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000 @@ -255310,7 +255311,7 @@ CVE-2024-3966,0,0,73fb2ae6dbee87e9388d8eb74bc7dee75170ed92fa9ef996fc6e09e4c624ed CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000 CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000 -CVE-2024-39676,0,0,a6a622475144409ca7eca813502661a61efb33c25469d6887411c8bbacef3ffd,2024-07-24T08:15:02.773000 +CVE-2024-39676,0,1,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000 CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000 CVE-2024-39678,0,0,f0f13ad18e725d440582b3a4bbd425936455389008ece86cf58b8c9519b22e2a,2024-07-18T12:28:43.707000 CVE-2024-39679,0,0,ce5bdc949f2b785748533e9e266e218a34e39cb3d0887231dc8fbb4c0a149bec,2024-07-18T12:28:43.707000 @@ -255320,10 +255321,10 @@ CVE-2024-39681,0,0,16309c066fda62bf8c08baf4cbed854332949a8e78f8b4fd38768b4f30a8c CVE-2024-39682,0,0,00b5f2210802f383ff7e836ad4fd745cef6dcd07875442cfb9d268b986c976d9,2024-07-18T12:28:43.707000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 CVE-2024-39684,0,0,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000 -CVE-2024-39685,0,0,9d725ca61c10906faa09e9e181e60636e1bb55f800fd253199e8114c7d9d7db6,2024-07-22T16:15:03.417000 -CVE-2024-39686,0,0,da2ed9278252bfbd4238dc8f164c8197fbbfd0f91ac0d81b572a0f59e05b3bb1,2024-07-22T16:15:03.657000 +CVE-2024-39685,0,1,793d82d9e6c83e49017cbd37c6bfb6e785552239e80e193ddbdb27afd7b3870c,2024-07-24T12:55:13.223000 +CVE-2024-39686,0,1,90bba9a849faeafa6bf958c9488ad69e3e7383d5c997d965dd1b51974ece6a2d,2024-07-24T12:55:13.223000 CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 -CVE-2024-39688,0,0,376a4deac67de4ef4d7a910fd779fdba5be7b4264f79f65505f71ccb95f84026,2024-07-22T16:15:03.883000 +CVE-2024-39688,0,1,dccea6cc179f4688243addc0514825c9dd13727763645739ebeb475d416db47a,2024-07-24T12:55:13.223000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000 CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 @@ -255336,7 +255337,7 @@ CVE-2024-39699,0,0,711bdc17f9c229479a79abf16418d6f303c1d2fb494a38a72ece58a870304 CVE-2024-3970,0,0,91552b239fa9d8e00e56c74ece4dae5720fa4dc9c44897dc0454091791cfe152,2024-05-15T18:35:11.453000 CVE-2024-39700,0,0,c0797f3628df13d0523a3968cdcee9fc6d1644740c750ed207d822c73c9030ad,2024-07-17T13:34:20.520000 CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8189,2024-07-09T18:19:14.047000 -CVE-2024-39702,0,0,a3d50dd76a272488cbc13e076a00823087fdf99cf9f35c7be99bbf35973db115,2024-07-24T05:15:12.813000 +CVE-2024-39702,0,1,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39708,0,0,000cfabacce752db3861ff9f8f3b1c505cd90f739471d05927bcaf43cab3bb6e,2024-06-28T10:27:00.920000 @@ -255414,7 +255415,7 @@ CVE-2024-39899,0,0,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df CVE-2024-3990,0,0,4df49f2d1a20d6484a35480ddf93415ea905230fdfd638f023a4d51fb9f2296c,2024-05-14T16:11:39.510000 CVE-2024-39900,0,0,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000 CVE-2024-39901,0,0,2e70a8f9f46cc19984c51f63370a0f8333bfb1ff58b809a78b0486415e619ed2,2024-07-18T15:15:03.243000 -CVE-2024-39902,0,0,bef6cf5961c3437d221e841410f01cf8c83eb58267c493aeee4e6ed04473f1e5,2024-07-22T14:15:06.383000 +CVE-2024-39902,0,1,155ca5aa0932cd5e0c0d95f40d78b8f94c26287cf5e699a0e85b11c2bd47887d,2024-07-24T12:55:13.223000 CVE-2024-39903,0,0,935910cac822f79a3bb483747c1709796e1f1686797cd50661d012bb05061bf3,2024-07-12T16:34:58.687000 CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888843,2024-07-11T18:09:58.777000 CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000 @@ -255461,11 +255462,11 @@ CVE-2024-40037,0,0,a1e4fa50992969a69ef78238be5cac21afb6cd0a6f24b8f0651228dd966ce CVE-2024-40038,0,0,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000 CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4c44,2024-07-22T20:03:06.900000 CVE-2024-4005,0,0,980f25dcabac4666d2a5ebf5d973009bd7c7226dd4f2e01aee26b530adf5da1a,2024-06-17T12:42:04.623000 -CVE-2024-40051,0,0,20936052b0bb3980011c19c0052b751939b6bec1e8494d2d1b40959208734703,2024-07-22T18:15:03.700000 +CVE-2024-40051,0,1,75fd7f2906c40209756954dd66b5f5cee33a2db6630cc09e906c96ebd33a611b,2024-07-24T12:55:13.223000 CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000 -CVE-2024-40060,0,0,89b016f158367e52ead3b215f86cc8c74da8a245b566cf4ad04fc853d74e6c19,2024-07-23T15:15:04.810000 +CVE-2024-40060,0,1,85f874f5d021af4dd22e5ffaf10dbd36a63e3c57527b1715c493b27582208cca,2024-07-24T12:55:13.223000 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 -CVE-2024-40075,0,0,be1f3a1614eb2c73b3ebf7d6cfcc89f676aefcd3dd81c28d14eaccf6ea1048a3,2024-07-22T19:15:02.867000 +CVE-2024-40075,0,1,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 @@ -255528,7 +255529,7 @@ CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dd CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 CVE-2024-40492,0,0,18603dc677df2f037c3e12bbfcb2354793a3ae9660f3df13b65361dfae39cba9,2024-07-18T12:28:43.707000 -CVE-2024-40502,0,0,759284841bb389bcfdec1bbbfea4d5c178cb0561900c041855fc7df2247c7b4c,2024-07-22T21:15:04.077000 +CVE-2024-40502,0,1,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000 CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000 CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000 CVE-2024-40515,0,0,aa3af036b6952485bf51fdea15dd678b9b42e4cd0dbbfc73284a7100fad8108a,2024-07-17T13:34:20.520000 @@ -255590,7 +255591,7 @@ CVE-2024-40630,0,0,7de2616afe35fe6a2f4466f98346fd28ee106a7dd06220a48b0a183cb2c5c CVE-2024-40631,0,0,e76fc6e49d84a60697f94ea752f6e05b7f5417e39730b8ace11ee475f8eb8441,2024-07-16T13:43:58.773000 CVE-2024-40632,0,0,e6e0d67d4d0269bad5508951d35718e2d8be48cd6b922ab10030a5117e405f96,2024-07-16T13:43:58.773000 CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07b87,2024-07-18T12:28:43.707000 -CVE-2024-40634,0,0,063ec9a53b7cb5811d0dc10e13cc6c20ab00354f2f60232df6be2e99fa774633,2024-07-22T18:15:03.770000 +CVE-2024-40634,0,1,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000 CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000 CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000 CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000 @@ -255633,14 +255634,14 @@ CVE-2024-40741,0,0,ddd0ff9476ed1ff47a6c6ea90383139e3fceeb76685fa77b077d9f9786ebe CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 -CVE-2024-4076,0,0,c3f4da0ebbad513f4d6376f9fec9325c5fc08f473d80236741b20cd14dc865c8,2024-07-23T16:15:06.287000 +CVE-2024-4076,0,1,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000 CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000 -CVE-2024-40767,0,0,afbfd77332db3ec3c1abc7441d91fd2657e3fdf3870e63732fcac7ece324cc3e,2024-07-24T05:15:12.907000 +CVE-2024-40767,0,1,9740acbc39a8ac904449fe819056cf1ca38febd48badc3555fe4572da26d47f5,2024-07-24T12:55:13.223000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000 -CVE-2024-4079,0,0,99209b6b51eaa8a9d90cd12f677c7e30b866cd2c9ada6d13befa76362cf63168,2024-07-23T14:15:14.353000 -CVE-2024-4080,0,0,560bae462fb211eddacf035e8ddd7895f21fc7d0d5fb7308ab290c999a3d58c7,2024-07-23T14:15:14.590000 -CVE-2024-4081,0,0,ef414c5873253d066739bf6ceaeff30779bac8cfff998e1da63ebd72617023bb,2024-07-23T14:15:14.837000 +CVE-2024-4079,0,1,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000 +CVE-2024-4080,0,1,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000 +CVE-2024-4081,0,1,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000 CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000 CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000 CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000 @@ -255769,7 +255770,7 @@ CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181 CVE-2024-41009,0,0,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000 CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000 CVE-2024-41011,0,0,4c2c460e7d99f33158a9c285f2b0882c56a6716b8d689bc4bd4c6463e3fba1ea,2024-07-18T12:28:43.707000 -CVE-2024-41012,0,0,3f793aee33c6103136a4bb12c753a217c33e47d2b00b5d4520ea39a5dee1fc4c,2024-07-23T08:15:01.877000 +CVE-2024-41012,0,1,98ac685beec3c2bc99dfb952de6ca6d29eb3b71fe5532ae565f113eafbf11346,2024-07-24T12:55:13.223000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000 @@ -255783,17 +255784,17 @@ CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6c CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000 CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 -CVE-2024-41129,0,0,bc59392638c789adcc745ef13a288b2e3e6e91438c87aa552a7b014d65dc3d0a,2024-07-22T15:15:03.710000 +CVE-2024-41129,0,1,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000 -CVE-2024-41130,0,0,5bf4929a80b008af0c49ad7a08e7115fa85869e5a05828ecee916853331ab759,2024-07-22T18:15:04.013000 -CVE-2024-41131,0,0,e538699ef386268c433b58fcc03852c9471eeb30e36419cdaa9d794ecba9cbb9,2024-07-22T15:15:03.933000 -CVE-2024-41132,0,0,ac749779fd41040bf470f257c725a5a91470bf5fb3f37bb8b23c515d3585daf3,2024-07-22T15:15:04.160000 +CVE-2024-41130,0,1,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 +CVE-2024-41131,0,1,a469b327dab2c70b64323f08923a0a3cc6492c0286887e2f02007c413d21dc21,2024-07-24T12:55:13.223000 +CVE-2024-41132,0,1,059caff7cce7231a7c76b300becd4e4b27d779e1effce439666ebf7a5ba8a7a0,2024-07-24T12:55:13.223000 CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41172,0,0,aff170553f604e0c7275db2adb45c6ecf8207e69e7b01abeab9ae04e85025c2a,2024-07-19T13:01:44.567000 -CVE-2024-41178,0,0,d88ebf524cdb1a7d44facf3d9f083277e3c3da0e903c226833f03f44e31cfe4b,2024-07-23T19:15:13.377000 +CVE-2024-41178,0,1,eb51e130885af676333dba0cb4c99b4a91672c03f3463e8d2a02df03e636c643,2024-07-24T12:55:13.223000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 CVE-2024-41184,0,0,5632ca1fe6b4d580f96d1889964128d406f3b607849d31bde6a0492547023118,2024-07-18T14:15:05.137000 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 @@ -255808,13 +255809,13 @@ CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ec CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 CVE-2024-41281,0,0,67d3a54ff6c69e817d1c4d3304511fe0d1b87ffa7ae182f6c630038b3326bf87,2024-07-22T13:00:53.287000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 -CVE-2024-41314,0,0,fbb757145a602671d01d3277038d12255dba8eb70b1580ba575b09ffe4ff2384,2024-07-23T16:15:05.710000 -CVE-2024-41315,0,0,5b06430aa5c923b2c9715b666f01fd994301ba33f8a408d00803142f998b4c8b,2024-07-23T16:15:05.773000 -CVE-2024-41316,0,0,f8405994e7acdc2a2d24863792c0ec27a82ddd7bdb92723ef2f75a35a999a2e1,2024-07-23T16:15:05.843000 -CVE-2024-41317,0,0,527d4d72baf527afab04b156b585818a31101a6fd67674396e566845251ef15e,2024-07-23T16:15:05.910000 -CVE-2024-41318,0,0,18c108befe2fc6c42d41c2578a07ae72341f45f8778f9f6bb91b2ae7402f1325,2024-07-23T15:15:04.973000 -CVE-2024-41319,0,0,94bc49a845d6947968b4f80e3a5d12e86b12266859d7779d4b9fd0058b107ce8,2024-07-23T15:15:05.050000 -CVE-2024-41320,0,0,689e2ad8a9ee3d4af7d517e95ae2356f73fe15837a1e2972e05beec9e4f28250,2024-07-23T15:15:05.133000 +CVE-2024-41314,0,1,b51b0e3a4e5d4ef00805134d9c64392d4de8d2322e969183a3b6dc33816f9694,2024-07-24T12:55:13.223000 +CVE-2024-41315,0,1,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39d47,2024-07-24T12:55:13.223000 +CVE-2024-41316,0,1,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000 +CVE-2024-41317,0,1,5f2fa7a3fdee051d8d33c14a57cfa0a14785eb3306635111cfe4d986a4c4b209,2024-07-24T12:55:13.223000 +CVE-2024-41318,0,1,43716bdb586662299e765abf70504c39aeb4e8f84836a086e46d45893e9363c9,2024-07-24T12:55:13.223000 +CVE-2024-41319,0,1,9ed7dbbc6270be6f827714a032ea704fb49466783bc5f7a869b9586ff0a3bf38,2024-07-24T12:55:13.223000 +CVE-2024-41320,0,1,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000 CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000 CVE-2024-4138,0,0,0f7c3171dd014e7915cab9bf533b57ef231d5c30c6ae20f761b745c0767014ec,2024-05-14T19:17:55.627000 @@ -255851,14 +255852,14 @@ CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000 CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000 -CVE-2024-41655,0,0,3fe02fa61b0dfb920c71488e9c8b5259c7506f728d57d11b14913ec90a7b67aa,2024-07-23T15:15:05.207000 -CVE-2024-41656,0,0,c425c4c54f07d9db685092f24372ea451f28d4c4896cda5ec24db192acb18bc9,2024-07-23T22:15:08.970000 +CVE-2024-41655,0,1,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000 +CVE-2024-41656,0,1,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000 CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000 -CVE-2024-41661,0,0,3d39bacc9134aa7b5a74d0c782719d29769fef5cb25c6095ef21a16121679583,2024-07-23T18:15:06.577000 -CVE-2024-41663,0,0,8042fa4e8e7f69909056503228f4440b95aae4b30fd4e8a4914a9356a142b8b7,2024-07-23T16:15:06.070000 -CVE-2024-41664,0,0,c9d7ddefe086d64fe440f8fda96eba34811ee0b3b187e398c83e4f09b91fffd6,2024-07-23T17:15:12.767000 -CVE-2024-41665,0,0,4fc146b8bac38715ae6814aa50db519ee9251f0a297cbf3ecc94a89099cc3c8b,2024-07-23T18:15:06.790000 -CVE-2024-41668,0,0,e3338505b03ea9835e8fabd72d3b6bf725ee08feb5ea6f842065998c08e670b5,2024-07-23T19:15:13.437000 +CVE-2024-41661,0,1,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000 +CVE-2024-41663,0,1,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000 +CVE-2024-41664,0,1,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000 +CVE-2024-41665,0,1,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000 +CVE-2024-41668,0,1,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000 CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000 @@ -255876,18 +255877,18 @@ CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 -CVE-2024-41824,0,0,31accdae624b977713bb5e405f57ab6be535dbd8d96f895304d22f084eb90782,2024-07-22T15:15:04.400000 -CVE-2024-41825,0,0,9de2b764be803e3cffe5afe5896bf773b56ee9213e49ab615d3769e6fed65862,2024-07-22T15:15:04.630000 -CVE-2024-41826,0,0,65ee4a5c131473ed9ae9ee97c153499f41b9eedd592e2b2ab50b637954f1ffcc,2024-07-22T15:15:04.847000 -CVE-2024-41827,0,0,715ad3c66183d764c98ea5ee168c80910fd9f5e98abd7aa1b21f8f5380727784,2024-07-22T15:15:05.057000 -CVE-2024-41828,0,0,7731b0e8dac203c149972d38551edb3b0fc0a981392a786a8ef63785a16c7547,2024-07-22T15:15:05.270000 -CVE-2024-41829,0,0,93d1466d44910cc9b0281d221e234b59ab0caf3d6a4f1bf584b46869666f39cc,2024-07-22T15:15:05.487000 +CVE-2024-41824,0,1,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000 +CVE-2024-41825,0,1,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000 +CVE-2024-41826,0,1,30e6a9ff82392f979a18e92490fd49ed5b724f02d886364de06b9ec807958da8,2024-07-24T12:55:13.223000 +CVE-2024-41827,0,1,1133639557cfa92d8abf13d7529bc58f97726211543f6d207d6917f4579b173f,2024-07-24T12:55:13.223000 +CVE-2024-41828,0,1,cd8ccf5286135e13986bdc75d7a7e18ecf358d7e53494c275564839c7a6450bc,2024-07-24T12:55:13.223000 +CVE-2024-41829,0,1,5ad52158012623eac040e55f03fc0f37d505417ba3c9906fa85371f094eea3e0,2024-07-24T12:55:13.223000 CVE-2024-4183,0,0,c95eeb02531c25674be296e55025a1bd3e47bb47f078fa8bff79c7eea74c4268,2024-04-26T12:58:17.720000 -CVE-2024-41836,0,0,4defdc5dded1371e2feafa5c07aecf68f547f713f2d0eb5ac055614739958dc4,2024-07-23T12:15:10.240000 -CVE-2024-41839,0,0,01345eba14dd5354369d36ab32b39bca4ffda5c783f1ab69098d2f65c0a29b22,2024-07-23T12:15:10.520000 +CVE-2024-41836,0,1,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 +CVE-2024-41839,0,1,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 -CVE-2024-41880,0,0,fc7c36755bde611f98a14eba2d59bf57bb96e394de6b28bc393d5261a53a802d,2024-07-22T19:15:02.990000 +CVE-2024-41880,0,1,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 @@ -255949,7 +255950,7 @@ CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7ed CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000 -CVE-2024-4260,0,0,3673a1c9921cf50170657755292e4f73fc40b3418acf23ec0120037fce9bf21d,2024-07-23T06:15:09.907000 +CVE-2024-4260,0,1,f504c88df229dc577663728ede510f6bee2dbfbf4e978429e1f1b8f63d1071c2,2024-07-24T12:55:13.223000 CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000 CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000 CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000 @@ -257082,7 +257083,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000 CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 -CVE-2024-5602,0,0,4041257a741ba4edb015af2613f552f2da5cbcb483f9737a6d05c3549139c389,2024-07-23T14:15:15.077000 +CVE-2024-5602,0,1,c64891ac2cd85f56d91d08925d6ceddbdd889440170bfa961976b5a31d8fb155,2024-07-24T12:55:13.223000 CVE-2024-5604,0,0,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000 CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000 CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000 @@ -257239,6 +257240,7 @@ CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232 CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000 CVE-2024-5816,0,0,3d67952ce4a1b2b1ece947260f0beee9de9f9da521a3f15a0343c5e1d47b81ea,2024-07-17T13:34:20.520000 CVE-2024-5817,0,0,e05abd62bd06ccb376baea6b1d5f924e4e6fb0941dae50b59d4aa5f4c769fe7a,2024-07-17T13:34:20.520000 +CVE-2024-5818,1,1,1f85f94f56b5648beb516de29d3772b29eb0b5481d5510a9e032d508b1fed7bf,2024-07-24T13:15:10.680000 CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000 CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000 CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000 @@ -257274,7 +257276,7 @@ CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc CVE-2024-5858,0,0,63cb7f6cd58686ca5ad3c57990888086a18b2814d4915e424991a00332eb64f9,2024-06-17T12:42:04.623000 CVE-2024-5859,0,0,72e4b113c686d9a3109f00890cd02d7c66daeaf956171b1cfade7c196becbe2c,2024-06-24T19:21:07.943000 CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000 -CVE-2024-5861,0,0,cadfe78f0dca9909c50fcadef3482e7faefb4029e624c63cf7884888f0b60f1a,2024-07-24T04:15:04.517000 +CVE-2024-5861,0,1,1d74fe74389b9598033eff341da450e597684505adf6e35011c7758d1b79715d,2024-07-24T12:55:13.223000 CVE-2024-5862,0,0,441ab26bc80ed7c87de8e4be62f6bf1c86b995270dbb376cc8e089e80e683161,2024-06-24T19:26:47.037000 CVE-2024-5863,0,0,8eb388b46dfdca7ac79f7a3487053af7c103c168da16a20899b575731960eec2,2024-06-28T10:27:00.920000 CVE-2024-5864,0,0,539f12905317a790a13c7190e3394133674affd0cb1690d81cb0d56c8ad41bb1,2024-06-28T10:27:00.920000 @@ -257423,7 +257425,7 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 -CVE-2024-6094,0,0,3c90347939a1f190e70109a37076f0ce0dbdf744b626071cec340a61b12536be,2024-07-24T06:15:01.903000 +CVE-2024-6094,0,1,d7f2cdb304cc396e64e032d9bb4fe0d71d15cb3ae6b14e9986dd1176fe25d9f4,2024-07-24T12:55:13.223000 CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000 CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000 @@ -257441,8 +257443,8 @@ CVE-2024-6114,0,0,1d496eb490a052b12517f100a93bb767cf2cf15a2c008e0693dc387c679adb CVE-2024-6115,0,0,b78a8bc77e5cbf73cf04c74141f6177c3ffa0587a4a1d2d98ad3bfe6bcce3476,2024-06-25T18:15:11.857000 CVE-2024-6116,0,0,a6d83e3fcdc09a0a6cf307cbc9b62cfd655f854315f6260ca3a48d86acd6c58e,2024-06-20T12:44:01.637000 CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187c6,2024-06-24T20:03:04.363000 -CVE-2024-6121,0,0,cdc7a3108b5719a8e1c1729330794f42e7b9ec61cb6269a8b485df97c03a12aa,2024-07-22T20:15:04.267000 -CVE-2024-6122,0,0,464506cd3ae71d40325ba51da1e96032a2d7eab878ccb38659b44617ad807e26,2024-07-22T20:15:04.470000 +CVE-2024-6121,0,1,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000 +CVE-2024-6122,0,1,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000 CVE-2024-6123,0,0,75695c59d88081a795c134128ddb6cd1415db185318a55dfce97b139d1d4e40d,2024-07-09T18:19:14.047000 CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000 CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000 @@ -257499,7 +257501,7 @@ CVE-2024-6193,0,0,00fd76685b00c66c75878efc81598a588f58971e8df576cbee2d630c4caeff CVE-2024-6194,0,0,2fd14db6633e624a38e90bae695b4c4d57fa0e3aaeb642623d447d03f1402676,2024-06-21T11:22:01.687000 CVE-2024-6195,0,0,6a062efe55296f0b78677192fb0a748b37d8f49a4a61cffdf8e5d965a387b28b,2024-06-21T11:22:01.687000 CVE-2024-6196,0,0,ee53490a34820f9c77a5a8ca54b2af4db4b9298e709dd53453d8c4a657cc2768,2024-06-21T17:15:11.350000 -CVE-2024-6197,0,0,801370748751e8e8f478d20c164fed6af08010ae773166f84500504349e1402f,2024-07-24T09:15:02.390000 +CVE-2024-6197,0,1,e0b58408ac40be5512926b212b0be03b25cd3d3ae991c0850a1ebc2e8cb8b37b,2024-07-24T12:55:13.223000 CVE-2024-6205,0,0,113d559849ca9c5bf761a83fad7d31b96491373e555c09e3fa45e37c92251187,2024-07-19T20:23:18.960000 CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000 CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 @@ -257516,7 +257518,7 @@ CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08 CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000 CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000 CVE-2024-6229,0,0,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000 -CVE-2024-6231,0,0,53c37ff918556246c27eee143f1467c8a873be16ccc7256e2859edede55e976d,2024-07-23T06:15:11.330000 +CVE-2024-6231,0,1,95e641648a5be9f88ed3da19269ca6779e176bc3a9b366661acbe85f1cf6d0c5,2024-07-24T12:55:13.223000 CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 CVE-2024-6236,0,0,294d07111f47e2594afccb77d041edde3630ac9799928242bfa797180655c347,2024-07-11T13:05:54.930000 CVE-2024-6237,0,0,46541712e840180b3223b10d698baa69ce4ae4ad2290c1cfff1ca39481f71f37,2024-07-12T17:14:19.130000 @@ -257637,7 +257639,7 @@ CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d0 CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000 CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000 CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 -CVE-2024-6420,0,0,64215060acb97216fb3e5f51210b9092431c1ec12ab745bb0cb2067837b1b2b9,2024-07-23T06:15:11.413000 +CVE-2024-6420,0,1,06795481fea0947553364f5cea974cb639ce643ade0fa4994a441e094e065f9d,2024-07-24T12:55:13.223000 CVE-2024-6421,0,0,2fe6e0b05086ec8fe1614a33f3714b1b7412a68316b06964410d48a53c099378,2024-07-11T13:05:54.930000 CVE-2024-6422,0,0,55d1b4b5125b3e6420c56faceebe4743e983319ac647dfed74960e28bff876d9,2024-07-11T13:05:54.930000 CVE-2024-6424,0,0,a4271c75a6c97806333e2d8d45edb2537cf0684790d84aeb8788fc5848fb2e64,2024-07-01T16:37:39.040000 @@ -257693,7 +257695,7 @@ CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d8 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6542,0,0,54f8a75473ca23470adff5375410f0163accbe3baf07cee08839e7a197565332,2024-07-22T13:00:31.330000 CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000 -CVE-2024-6553,0,0,879877ef6ddc882555f2763bcffa21e66b10deb67f1bdd0f69793285dd29e02d,2024-07-24T07:15:02.350000 +CVE-2024-6553,0,1,8a5d95f9a9340732b68e040cf34cd3feae3ce046430b36cadf8644d55781cab3,2024-07-24T12:55:13.223000 CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce662,2024-07-12T17:01:48.353000 CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 @@ -257704,7 +257706,7 @@ CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000 CVE-2024-6570,0,0,1c2083317d49d5094b93c672429fe80fa3944fba8c36de7f1f2403e55beb6b46,2024-07-16T13:43:58.773000 -CVE-2024-6571,0,0,d44d33dd39e189562de2262ba15ca925ae1204c315b8c2cb8b9ed3cea9e44aba,2024-07-24T07:15:02.600000 +CVE-2024-6571,0,1,99e28e1eec016aa2ea1a00034153b94fa7a8f3552e46398f5643f95dd38cab4e,2024-07-24T12:55:13.223000 CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 @@ -257731,12 +257733,12 @@ CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9b CVE-2024-6621,0,0,245e22cf8c695e01e46245f83baf1a8e74fd9ede2206edccd3aaa25f1c00ba0d,2024-07-16T13:43:58.773000 CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000 CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000 -CVE-2024-6629,0,0,5a513387975d08a19e1a9bfd2fa4eb70fd173a82998793f3fcdede44d45e9f3e,2024-07-24T07:15:02.820000 +CVE-2024-6629,0,1,0264a6ecc734e6bba34d74cdd2b710d65bfa2f35085e88ade8ee0f09f00a5520,2024-07-24T12:55:13.223000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84fff,2024-07-22T13:00:31.330000 CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000 CVE-2024-6637,0,0,59f76fa21430fd2f815d25b14c560949a8f50f1f9b39a99ada5c48c5c42ab47c,2024-07-22T13:00:31.330000 -CVE-2024-6638,0,0,0182b258e9bbd325803641e7417caf3e91dbb6983ad6a21127f38cd58eeb58e7,2024-07-22T20:15:04.723000 +CVE-2024-6638,0,1,e1ef78f4a331a1760f078cffbff2fa855ff8b1eb633d9ef9812bbb8cfee1af62,2024-07-24T12:55:13.223000 CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000 CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000 CVE-2024-6644,0,0,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168f9,2024-07-11T13:05:54.930000 @@ -257753,7 +257755,7 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000 CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000 CVE-2024-6669,0,0,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000 -CVE-2024-6675,0,0,f6c2d9102d45f3542afb04219145001debad684766cc5fe3088c5885af03e31c,2024-07-22T20:15:04.940000 +CVE-2024-6675,0,1,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000 CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000 CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000 @@ -257762,9 +257764,9 @@ CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf820 CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 -CVE-2024-6714,0,0,51220ba43cdb8c58907390ac6e78c6d29891545d544dae414b1a0ed2901cb384,2024-07-23T16:15:06.543000 +CVE-2024-6714,0,1,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000 CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000 -CVE-2024-6717,0,0,91d6e2e1e8d85821c6b836019c0c3e544427a23e07d8611904ae6a48961d3cf4,2024-07-23T01:15:09.190000 +CVE-2024-6717,0,1,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000 CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000 CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000 CVE-2024-6729,0,0,b413856446136980bf68a32632989cec2f558712dbc6c4470999a635b3ec5394,2024-07-21T06:15:02.240000 @@ -257785,13 +257787,13 @@ CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744 CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000 CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000 CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000 -CVE-2024-6750,0,0,435a83502c9d608278877fd0e3153853c7c69f8562d0a04fa48bf8e2c7040f4f,2024-07-24T03:15:03.477000 -CVE-2024-6751,0,0,2504625c10fdb84e82db50ae77bb709402084c19ddf25caa83f2f84909eb9aa2,2024-07-24T03:15:03.810000 -CVE-2024-6752,0,0,00a16a86e6fdcfa3511e9189ab8ed94af0ae39d74a74f3120bec1d85e92c4f0f,2024-07-24T03:15:04.033000 -CVE-2024-6753,0,0,f097c371597e283235d1e3c135fdd833f9f5004dc16cca5a2e5d3a7dc785566b,2024-07-24T03:15:04.243000 -CVE-2024-6754,0,0,edcf0ed0442513450807de901109da3f13063b6d4390745023ab42deef69bd1b,2024-07-24T03:15:04.463000 -CVE-2024-6755,0,0,06ffed3a4baa23c893ed475ba4ba5ef4185db7cc0d76ad4d0109078b6e8b0cce,2024-07-24T03:15:04.687000 -CVE-2024-6756,0,0,d9d49c1593b1859f0ac8d6acf81834416abb4f8edd70553b6ef2d08834eecd7a,2024-07-24T03:15:04.897000 +CVE-2024-6750,0,1,bd50438b7fed43c146b767dfe0e34210e750447bcd6a7bde4d43ce21e2127394,2024-07-24T12:55:13.223000 +CVE-2024-6751,0,1,c5b2d82b144e56bdf50cec013d15c657693aebc5f36f3d508d0fe5c46c32db28,2024-07-24T12:55:13.223000 +CVE-2024-6752,0,1,c03cb1f23047a6fd5fa3f7adfd588ecceef1fa572948bd4ddcb122d0d89110a4,2024-07-24T12:55:13.223000 +CVE-2024-6753,0,1,79cd533ef788d1e388d91ad96dd06c23d644eb06446486c79597aa813abb65c6,2024-07-24T12:55:13.223000 +CVE-2024-6754,0,1,bc8cde0e84d8997b1c75c8ce06ab5236a2f6d5b64ebe5ed2b11b2213361d556f,2024-07-24T12:55:13.223000 +CVE-2024-6755,0,1,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d4845c,2024-07-24T12:55:13.223000 +CVE-2024-6756,0,1,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000 CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000 CVE-2024-6772,0,0,cc08723700878586fe2b2cb702b9aeb8e7ff85837a231851739a99e842cb1c05,2024-07-17T13:34:20.520000 CVE-2024-6773,0,0,a5867869124c1a4b8949c923d047a73abaebfa5c6d8b0baadecd79e09f60d48f,2024-07-17T13:34:20.520000 @@ -257802,28 +257804,28 @@ CVE-2024-6777,0,0,1b2f8bc7483fbfc540bfc78d70c330a5b3bd55e3e3b550b722254066c080b4 CVE-2024-6778,0,0,4b9f54a1ab5418724c8d4d40b1c3b12f937747d49588cc60e2bad6855d8270bc,2024-07-17T13:34:20.520000 CVE-2024-6779,0,0,eb8d5debe3ae4525916f27034d3cd0e49a98090896d6ba5d8c5bcdb0d54820b6,2024-07-17T13:34:20.520000 CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000 -CVE-2024-6783,0,0,1e995d50ba4966436ba609fc82d167b4f81781c635bc2a71adba2b8a7ed30f1d,2024-07-23T15:15:06.210000 -CVE-2024-6791,0,0,59433f923d9fc7ff46afaa161eb77f91d2573910fe459bf3d739fa4cb3b0f828,2024-07-22T21:15:04.360000 -CVE-2024-6793,0,0,1e50d4c72ccf22ca7ffc2eb62910606f5bcc86a8538c175560adaab5c207dbc8,2024-07-22T21:15:04.547000 -CVE-2024-6794,0,0,9c548937685e7eadcbd8adef12ff14dde9bbbe9b98aa13e29f5cb0fc83a93b12,2024-07-22T21:15:04.733000 +CVE-2024-6783,0,1,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000 +CVE-2024-6791,0,1,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000 +CVE-2024-6793,0,1,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000 +CVE-2024-6794,0,1,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000 CVE-2024-6799,0,0,d264d144b11594f6ded9670466775d4f3f4cc730c0f4ee32dd0c581019252c1d,2024-07-19T13:01:44.567000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 CVE-2024-6802,0,0,0911fc614ea139d423cd023a1b26ff351c1061407fddd3917beb9c821ca9c47f,2024-07-21T15:15:02.190000 CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 -CVE-2024-6805,0,0,aac822a6d24e6e5d16a00dfb2d902f9ed931a250dfae9c755b811d09641d814d,2024-07-22T21:15:04.940000 -CVE-2024-6806,0,0,77bcd69a6a8caa9f67adcc993e935cac14daa79e2a5c94436f053ea5c93087d9,2024-07-22T21:15:05.133000 +CVE-2024-6805,0,1,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d9704,2024-07-24T12:55:13.223000 +CVE-2024-6806,0,1,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000 CVE-2024-6807,0,0,36a1bf799eb85168b836021ed001160a7d96eb0cb1f17f7dd33adcef058c2a69,2024-07-21T13:15:02.420000 CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 -CVE-2024-6828,0,0,e8e5364a43527004d310abc814718f6da23bb18bdc1eed3d86b65930ef5f36b3,2024-07-23T02:15:02.370000 +CVE-2024-6828,0,1,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000 CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000 CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000 CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000 -CVE-2024-6836,0,0,a7e643cb6230d5e98667acb22e4fe58264e905462db11f5ad0ed41334cc0c973,2024-07-24T06:15:02.087000 +CVE-2024-6836,0,1,e390cd7e31e7aaebb0300f845059693a0906a0a80bba3b00492cbc2a5c299f21,2024-07-24T12:55:13.223000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 -CVE-2024-6874,0,0,2d8921d3e444b9f0010b465e4bbb46c8cc3cf47b5c0a7b34e2564073144ea54f,2024-07-24T09:15:02.503000 -CVE-2024-6885,0,0,d90ac2819f3fbb5ad9a46d3bc60924206cfe9c6a245e942b59dba4be3dd37e51,2024-07-23T02:15:02.610000 +CVE-2024-6874,0,1,6fdb828244d0878bf4334f6c8b61a3ad657fa405006bc4b1bc91d03b240bfdb1,2024-07-24T12:55:13.223000 +CVE-2024-6885,0,1,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000 CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000 -CVE-2024-6896,1,1,341389c50d5c19fd339101e306a7596d55b084aef8796c675b8dbb72d677b327,2024-07-24T11:15:11.653000 +CVE-2024-6896,0,1,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000 CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000 CVE-2024-6899,0,0,397359020457c655f416abd05bdc982e2cbc9cd703cb46d21be66b71a5df8e91,2024-07-19T13:01:44.567000 CVE-2024-6900,0,0,97b5312c98326af5c30c0e6b9075f0ed6d8f0745860573a3aeb28716ac20b0e4,2024-07-19T19:54:20.537000 @@ -257835,11 +257837,11 @@ CVE-2024-6905,0,0,8fc776bf9fa4350104cb7a97d75c3f12956fd9d4638b78f2d808e195f39911 CVE-2024-6906,0,0,9e40f187cd4da90adccf007ba1893c4ad127ba3945e95eb45170fe5a98bef8ec,2024-07-19T13:01:44.567000 CVE-2024-6907,0,0,c55cb1bfd6264ab1ebd6c18009f9792c2ff1421cf59514ea0dbe50319b330c95,2024-07-19T13:01:44.567000 CVE-2024-6908,0,0,39238ceecec75ca0113efef9ebf9de02325a2ecd066a43e78f16c4451849b776,2024-07-22T13:00:53.287000 -CVE-2024-6911,0,0,7f4ddcbca588794e13c2f123b3057f4d2ae0b7c0814e3ad95ee8587c42e2b32f,2024-07-23T03:15:02.010000 -CVE-2024-6912,0,0,19ffbe14a9786c836ebae1173b484d62d4eb03f1527258ec6cd573c3aea4cab0,2024-07-23T03:15:02.097000 -CVE-2024-6913,0,0,f5e293443f520d9493e0fe66d0100592db283e2483702e8be0c1e32232769fc8,2024-07-23T03:15:02.170000 +CVE-2024-6911,0,1,46d89096f6e412b4d1b26c4491b89cca1edef35f1edb197cda4640c904cf9862,2024-07-24T12:55:13.223000 +CVE-2024-6912,0,1,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f527,2024-07-24T12:55:13.223000 +CVE-2024-6913,0,1,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000 CVE-2024-6916,0,0,1d247ae867be71d9af12779cc6db2629ce2403155b9fbbc87b676a3b33127b65,2024-07-19T13:01:44.567000 -CVE-2024-6930,0,0,51e135d21d7c07927d45aad2995c8278e53f9368fe4af477e790eb887ce0df6a,2024-07-24T08:15:03.477000 +CVE-2024-6930,0,1,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000 CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000 CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000 CVE-2024-6934,0,0,2773a2900bf573ac6cdadde3da52af842db87181b62c4a3816dd0aac8b92139a,2024-07-22T13:00:31.330000 @@ -257878,7 +257880,7 @@ CVE-2024-6967,0,0,5f19e165dee42428e0d969fa8fc5f74084843adc50630c62175a00d155773d CVE-2024-6968,0,0,8e5752619c85b26bba4ce547fa3d54bdd5591cb73642b239c05438d96051005a,2024-07-22T13:00:31.330000 CVE-2024-6969,0,0,b23347441c89b903c83a899acb9bf7f48b605b0728961bbb1ac995d86a8850d6,2024-07-22T13:00:31.330000 CVE-2024-6970,0,0,521037b9963b74c39659cf9df97626ee5f8ca87b48a1750eb71f414432d46515,2024-07-22T13:00:31.330000 -CVE-2024-7014,0,0,3476760c5519b5fdcfe985af8a4d25fb6703a8c128669f198be6a5743e65cb39,2024-07-23T10:15:02.320000 -CVE-2024-7027,0,0,0973ed891f232b58320ab58c09ce794c840f463a5a40d10a9b7f26250839c8a4,2024-07-24T03:15:05.117000 -CVE-2024-7065,1,1,ba5fbf8f3ef7783fd419caf3f475f7221a071faba1eef70afb04963f709aff52,2024-07-24T10:15:02.567000 -CVE-2024-7066,1,1,a33f36e80696f77dc49a69f7edb8660c8ea53312ab972ad120be869b17f08f01,2024-07-24T11:15:11.960000 +CVE-2024-7014,0,1,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 +CVE-2024-7027,0,1,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 +CVE-2024-7065,0,1,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000 +CVE-2024-7066,0,1,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000